Protective Security Advisors - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

Protective Security Advisors

Description:

Located in Central Wisconsin with easy Interstate access. Waterpark Capital Wisconsin Dells ... Industry is Wisconsin's largest industry ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 24
Provided by: DHS448
Category:

less

Transcript and Presenter's Notes

Title: Protective Security Advisors


1
Protective Security Advisors
  • Securing the Nations critical infrastructures
    one community at a time

2
Communities Depend Daily on Reliable Systems
These systems are the invisible critical
infrastructure that our communities depend on
every day, for example
  • Telephone systems that allow us to use
    ATMs/credit cards for our financial transactions,
    and real-time communications for business and
    personal use (cellular phones, pagers, e-mail,
    land-lines, and faxes)
  • Electricity that allows us to light and heat our
    homes and businesses, and power computers and
    vital communication devices like radio and
    television
  • Water systems that provide us with water for
    drinking,
  • sanitary needs, irrigation, and firefighting
    capabilities

3
Critical Infrastructure Key Resource Sectors
Critical Infrastructure Sectors
Key Resources
  • Agriculture and food
  • Banking and finance
  • Chemical
  • Defense industrial base
  • Emergency services
  • Energy
  • Information technology
  • Postal and shipping
  • Public health and healthcare
  • Telecommunications
  • Transportation systems
  • Drinking water and water treatment systems
  • National monuments and icons
  • Commercial facilities
  • Dams
  • Government facilities
  • Nuclear reactors, materials, and waste

4
The Threat
  • We will hit hard the American economy at its
    heart and its core.
  • - Osama bin Laden

Without doubt, terrorist groups recognize the
economic ramifications of attacks on the Nations
critical infrastructures and key resources.
5
Dependency on our Critical Infrastructures Key
Resources
  • National Security
  • Economic Vitality
  • Our Way of Life
  • Attacks Could
  • Disrupt government and private industry
    operations and impact our economy and society
  • Result in large-scale human casualties, property
    destruction, and damage to national prestige and
    public confidence

6
Department of Homeland Security (DHS)
Mission
  • Prevent terrorist attacks in the United States
  • Reduce Americas vulnerability to terrorism
  • Minimize the damage from potential attacks
  • and natural disasters

7
DHS Risk-Based Approach
  • Risk management is fundamental to managing the
    threat, while retaining our quality of life and
    living in freedom. Risk management must guide our
    decision-making as we examine how we can best
    organize to prevent, respond and recover from an
    attack.
  • The most effective way, I believe, to apply
    this risk-based approach is by using the trio of
    threat, vulnerability and consequence as a
    general model for assessing risk and deciding on
    the protective measures we undertake.
  • Secretary Michael Chertoff
  • U.S.
    Department of Homeland Security

8
A Focus on Risk
  • How do we set our priorities? We cannot
    protect every single person against every single
    threat at every moment and in every place We
    have to be able to focus ourselves on those
    priorities which most demand our attention. We
    have to focus on Risk Consequence
    Vulnerability Threat.

  • Secretary Chertoff, July 25, 2005

9
A Focus on Risk
  • ... A terrorist attack on the two-lane bridge
    down the street from my house is bad but has a
    relatively low consequence compared to an attack
    on the Golden Gate Bridge. At the other end of
    the spectrum, even a remote threat to detonate a
    nuclear bomb is a high-level priority because of
    the catastrophic effect. Each threat must be
    weighed, therefore, along with consequence and
    vulnerabilities
  • Secretary Chertoff, March 16, 2005

10
A Maturing Risk Management Process
As our knowledge, skills, and experience have
matured, our focus has evolved, as we have begun
targeting key areas for attention.
  • National Infrastructure
  • Protection Plan
  • CI/KR within urban areas
  • Additional Comprehensive Reviews
  • Risk-based UASI grants

Region System
  • Nuclear Comprehensive Review
  • BZPP
  • SAVs
  • Chemical facility security regulatory framework

Sector
  • Selected chemical sites
  • Nuclear Power Plants
  • Tall buildings
  • Stadiums and Arenas

Asset
Year
2004
2005
2006 and beyond
Best professional judgment
Limited consequence analysis
Prioritization
Risk analysis
11
Changing Real-World Risk
PeriodicNetAssessment
Potential Targetsin 56 States andTerritories
Apply ThreatAssessConsequence Prioritize
Identify andCharacterizeAssets
DetermineVulnerabilitiesand Protective Gaps
ImplementProtectiveMeasures
ReducedRiskfrom TerroristAttacks
Intelligence
SituationalAwareness
12
FY 2006 Goals
  • Goal 1 Identify and catalog critical
    infrastructure and key resources (CI/KR)
  • Goal 2 Identify and assess vulnerabilities of
    our nations CI/KR to terrorist attack, including
    consequences of successful attack and
    cross-sector interdependencies
  • Goal 3 Utilize a risk assessment framework,
    based on vulnerability, consequence, and threat,
    to prioritize assets and rationalize allocation
    of limited protective resources
  • Goal 4 Enhance the protective security of the
    nations CI/KR by facilitating better detection,
    deterrence, and defense against potential
    attacks
  • Goal 5 Build a more effective headquarters and
    field organization focused on policy planning and
    program management directed at NIPP
    implementation and SSA responsibilities, with a
    surge capability to respond to emerging threats
    and operational needs.

13
The Challenge to Protect Critical Infrastructures
Key Resources
  • 85 of all critical infrastructures and key
    resources are privately-owned
  • Homeland Security must work together with
    industry and state, territorial, local, and
    tribal governments to protect critical
    infrastructures and key resources
  • To help communities better protect the Nations
    assets, Homeland Security is placing specialized
    Protective Security Advisors around the country

14
PSA Districts
15
Protective Security Advisors Sector Coverage
PSAs cover all 17 CI/KR sectors.
16
Protective Security Advisors Initial Focus
  • Although they cover all 17 CI/KR sectors,
    Protective Security Advisors initial focus will
    be primarily on two sectors
  • Commercial facilities
  • Dams

17
Examples of Commercial Activities
State Capitol
Waterpark Capital Wisconsin Dells
University of Wisconsin
  • 13 four-year campuses statewide
  • 13 UW 2 year colleges statewide
  • 153,000 students
  • 83 major attractions
  • 8,000 hotel rooms
  • Located in Central Wisconsin with easy Interstate
    access.
  • Houses the Governor, Legislature, and the State
    Supreme Court

State Fair West Allis
Summerfest Milwaukee
  • The Worlds largest music festival, lasting 11
    days
  • 2005 attendance was 901,841
  • 2004 Fair Attendance 879,323

18
Key Wisconsin Sport Venues
Lambeau Field
Miller Park
Camp Randall Stadium
Bradley Center
  • Seating capacity 72,601
  • Badgers Football seating capacity is nearly 80,000
  • Milwaukee Bucks
  • Seating capacity 20,000
  • Seating capacity for Brewers games is 42,200

19
Agriculture/Food Industry
  • Agriculture/Food Industry is Wisconsins largest
    industry
  • 2nd largest milk producing State, producing 22
    billion pounds of milk in 2004

20
Homeland Security Provides Community-Based Support
  • Protective Security Advisors will
  • Assist with ongoing local and state critical
    infrastructure security efforts which are
    coordinated by the state Homeland Security
    Advisors
  • Support the development of the national risk
    picture by identifying, assessing, monitoring,
    and minimizing risk to critical assets at the
    local or district level
  • Upon request, facilitate, and coordinate
    vulnerability assessments for local critical
    infrastructures and key resources

21
Protective Security AdvisorsWill Also
  • Provide reach-back capability to Homeland
    Security and other Federal government resources
  • Assist in confirmation of critical asset
    information for accurate inclusion into the
    National Asset Database
  • Serve as advisors regarding local infrastructure
    during activation of the National Response Plan
  • Provide local context and expertise to Homeland
    Security to ensure that community resources are
    used effectively

22
How Can You Help?
  • Engage with your Protective Security Advisors to
    facilitate protective actions and establish
    priorities and the need for information
  • Assist in efforts to identify, assess, and secure
    critical infrastructures and key resources in
    your community
  • Communicate local critical infrastructure
    protection-related concerns
  • Business and economic ramifications of actions
  • Issues unique to the community

23
Summary
  • When we have a free path, we go forward.
  • If we meet an obstacle, we go around it.
  • If the object cannot be overcome, we retreat.
  • When the enemy is unprepared, we surprise him.
  • If he is alert, we leave him alone.
  • Baader-Meinhoff
  • Former German urban terrorist organization
Write a Comment
User Comments (0)
About PowerShow.com