Soft Targets

From CyberSecurity
Jump to: navigation, search

We have decided to focus on educational institutions as "soft targets".

Project members:

Official Proposal

Draft chapters

  1. Soft Targets:Introduction
  2. Soft Targets:Target Analysis
  3. Soft Targets:Adversaries
  4. Soft Targets:Countermeasures
  5. Soft Targets:Contexts and Costs
  6. Soft Targets:Conclusion

Resources

Proposed outline

  • Introduction (Keunwoo Lee: I will co-author this section with someone.)(Steve Crockett: I will co-author this with Kuenwoo Lee.)
    • Schools as targets: What makes schools worthy of study?
    • Summary of rest of the paper: Resources/Vulnerabilities, adversaries, countermeasures, context
  • Critical Resources and Vulnerabilities(Steven Huang: I'll research this)
    • Types of schools
      • public
      • private
      • US or foreign??
    • Resources: people, facilities...?
      • as in crazy teachers and building weaknesses??
      • Keunwoo Lee: When I wrote the heading for this section, I meant: what are the critical resources that a school needs to fulfill its mission, or that must be protected against adversaries? I'm thinking of the Brian Lopez lecture where they went through TVC analysis; resources and vulnerabilities would be V(ulnerabilities) and C(onsequences). Stuff here might be students' lives (obviously), resources owned by a school (financial, IT, bioengineering, ...), etc. The person who does this section should work closely with the person doing the adversaries section. We might also want to switch the order of these two.
  • Adversaries (Dan Liebling: I'll do this)
    • Casual adversaries (not very interesting or important, IMO)
    • Terrorists
    • Professional Criminals
  • Social concerns and broader context (Keunwoo Lee: I volunteer to take this section)
    • Schools are sites of socialization. Some even argue that this their primary purpose. Do we want to train children to submit to pervasive surveillance and restrictions on their activity as a condition of participating in society?
    • Suppose all the preceding measures succeed. Have we simply diverted activity from schools to other targets, or has society's aggregate security actually gone up?
    • ...

Steve's notes

Notes on the proposal

User:Steve Crockett: I feel the Critical Resources and vulnerabilities section is where you really want to profile schools as targets. Look at a school thru the eyes of a terrorist. What are the characteristics of each school type in terms of liabillities and assets. Exzample would be community college with day/night/weekend classes. open campus and typically 2-3 campus police offciers at any given time. (Because of the open campus and wide variety of age groups normally seen on campus a adult terrorist(non student) could walk into a class a sit down without drawing undue attention. By contrast a ellementary school with no campus police or security might actually be harder for a non student adult to truesspass upon without being noticed or challanged.

So to Illustrate the overlap progression look at campus and local police. We all might discuss the police as part of our individual sections but from different angles.


Steven will write about police as a part of a schools security profile-is there 24 hr on site coverage or 1 cop that drives around to 3 different campuses as a regualar partol check? How many officers per shift, what are thier levels and areas of training? what is thier issued or authorized equipment(gas mask?,body amor?,assualt weapons?,revolvers? etc, do they have establised policies and procedures related to terrorist attacks.

While Dan would look campus police from the positon of a terrosist- how do they deal with police/security forces that defend the targets they want to attack..if on a recon mission would they be extra co-operateve, what measures would they empploy against police if they are in the "climax" phase of thier assualt? do they have a heavily armed back up security team of thier own to "take out" any police that might happen to unkowing make a causal car stop on a veicle moving a bomb into postion for assualt. Would an Islamic terrorist have any particular tatoes or style of a dress. Are there any verbal cues or facial expressions a sucuicide bomber might make? Would they steal police uniforms to wear in disguise durring an attack? with the profile of the terrorist, thier motives and methods of opperation (conducting extensive survalliance on targets prior to launching attack including live access probes and dry run throughs on location), and finally the various forms of attack at the disposal of a terroist that could be employed against a school site such as bombs, susicide bombers, small arms assualt by individual or team, chemical agent, bio, planned arson attack, etc.

I would look at police in terms of what tatics/policies and procedures have they used, are currently using and might use in the future against the various types of threats mentioned by by Dan. Steven might state that a campus police debt conducts ongoing terrorist training such as imeadiate tacticle deployment and I will discuss the concept of imeadite tatcicl deployment in detail-its pros and cons, sucess rate, key ingeadiants. Again Steven might mention that 30% of public high schools in a given state conduct ramdom locker checks while I would look at why a police dept would want to spot check lockers and how valuable of a procedure would this be as a counter measure against the various terror groups and attacks methoeds that Dan has written about

Kuenwoo would of course look at issues of locker checks by campus or local police.Aappropiate or healty thing to do to students?, will it cause mistrust of police in the eyes of the students,other side effects, is it legal? would such a policy really make schools safer even if it sucessfully counters 1 or more attack forms, with so many attack forms to choose from couldnt the terrorist simply pick another attack form tha that locker checks would have no effect on such as a non student(who has no association with any student) driving a delivery truck full with high explossives into a crowded studnet cafatiera.

Older notes

SOFT TAGRETS-SCHOOL SITES

INTRO/OVERVIEW/DEFINATIONS/

TARGET CHACTERISTICS/SCHOOL TYPES/PHYISCIAL STRUCTURE OF SCHOOL/LOCAL ENVIROEMNT/DEGREE OF SECURITY/CAMPUS POLICE/CAPABILLITIES OF LOCAL LAW ENF/ EMS/ HOPITALS/ ADDL RESOURCES/ HIGH RISK FACTORS ASSCOATIED WITH SPECIFIC SCHOOL TYPE-[BIO/CHEM/IT/HIGH VALUE HUMAN TARGETS OTHER FACTORS-BUS SYSTEM-VENDORS[GARBAGE-FOOD-GROUNDS KEEPING ETC) MAJOR EVENTS (SPORTS-CEROMONYS-VIP'S-HEADS OF STATE-FAIRS-PERORMING ARTS-PULIC EVENTS ETC)

ATTACKER CHARACTERISITICS/FORIEGN TERR/DOM TERR/RELIGIOUS/ POLITICAL/OHTER CAUSES-ENVIOMENTAL-ANIMAL RIGHTS-ANARCHIST MISCL GROUPS-MENTALLY INSANE AND LONE WOLF INDIVIDUALS/ KNOWN METHOEDS OF OPERATION/PROBABILLITY TO ATTACK SCHOOL MINDSET OF THE ATTACKER-WHAT DONT THEY LIKE-WHAT DO THEY LOOK FOR IN A VICTIM SCHOOL-

KNOWN ATTACKS/POSSBILE ATTACKS/CONSEQUENCES/PROBABILLITY OF EACH ATTACK FORM/AVAILBILLITY OF HUMAN RESOURES AND EQUIPMENT NEEDED TO LAUNCH GIVEN ATTACK FORM

PAST DEFENSE POLICES-PROCEDURES-STRENGTS/WEAKNESSES-ELOULATION TO CURRENT DEFENSE CURRENT DEFENSES-DETERENCE/PREVENTION/ DETECTION/RESPONSE/COUNTERMEASURES UINFORMITYOF DEFENSE'S ON NATIONAL SCALE/FOLLOW UP INVESTIGATION-RETALIATION

POSSIBLE FUTURE IMPROVENTS TO DEFENSE-NEW POLICIES,PROCEDURES/ COMUNICATION UPGRADES/VIDEO-SATALITE MONITORING-CHEMICAL AND BOMB DETCETION/ACCESS CONTROL/ID SYSTEMS/BADGES-UNIFORM-PARKING AND VEH PERMITS/SMART PERIMTERS/GATED ACCESS/SILENT ALARMS/COUNTER SURVAILANCE COVERT OPPERATIONS/PRATICALLITY AND LOGISITCAL CONTRANTS

LEAGAL-SOCIAL-ECONOMIC-POLITICAL-ISSUES-BIG BROTHER/SEARCH AND SEIZURE/PROFILING/PRIVACY RIGHTS/FORIEGN-TEACHER-PROFESSOR-STUDENT ACCESS-EXPULSION/NON TERROR CAMPUS STUDENT ORGANIZATIONS THAT MAY KNOWINGLY OR UNKOWINGLY GIVE FINNACICAL SUPPORT TO TERROR GROUP THRU FUNDRAISING-DONTAIONS ETC ECONOMIC-POLICITCAL-CONTRANTS ON EXISTING DEFENSE AND POSSIBLE FURURE DEFENSE'S

SUMARRY AND CONCLUSION




GEN OVERVIEW AND DEFINATION OF SOFT TARGET

SCHOOLS AS SOFT TARGETS IN THE USA

SCHOOL TYPES AND THIER CHARTERISITCS AS POTIENTIAL TERRORIST TARGETS IN TERMS OF VULNERABILLITY, STRATIGIC VALUE, PUBLIC RELATIONS, MEDIA EXPOSURE..LIST COULD INCLUDE [ ELEM/MIDDLE/HIGH/JR COLL/4 YR COLL OR UNIV/TRADE/TECH/POLICE-FIRE-MITLITARY ACAD/ FLIGHT SCHOOLS PUBLIC VRS PRIV FOR ALL THE ABOVE

KNOWN TERRORIST ATTACKS ON SCHOOLS (FORIEGN AND DOMESTIC) THAT HAVE OCCURED IN THE LAST FEW DECADES

KNOWN TERRORIST ATTACKS OF OTHER SOFT TARGETS THAT COULD BE CARRIED AGAINST A SCHOOL

KNOWN ATTACKS AGAINST AGAINST SCHOOLS BY INDIVIDUALS OR GROUPS NOT DEFINED AS TERROSIST THAT COULD BE COPIED BY TERRORIST

KNOW ATTACKS AGAINST OTHER SOFT TARGETS BY INDIVIDUALS OR GROUPS NOT DEFINED AS TERRORIST THAT COULD BE COPIED BY TERRORIST AND CARRIED OUT AGAINST A SCHOOL

ADDITIONAL IDEAS OF HOW A TERRORIST MIGHT BE ABLE TO ATTACK A SCHOOL OR IN SOME MANOR VICIMIZE A SCHOOL IN ORDER TO FURTHER TERRORIST GOALS (HERE IS WHERE CYBER ATTACKS LAUNCHED FROM USE OF SCHOOL RESOURES MIGHT BE VALUABELE-OR WHAT ABOUT HACKING INTO SCHOOL RECORDS TO GAIN ADDMISSION TO TECH/TRADE-FLIGHT SCHOOL ETC SAME FOR 4 YR UNIV PERHAPS FOR VISA- FINNACIAL AIDE SCAMS ETC

OVERVIEW OF THE ELOULATION OF TRAING AND PREPERATION FOR TERROR ATTACKS OVER THE LAST FEW DECADES

CURRENT LEVEL OF PREPERATION IN ANY FORM BY EACH TYPE OF SCHOOL LISTED ABOVE, HOW DO PREP LEVELS AND THREAT LEVELS ARRY BY THIER INDIDUAL CHARACTERISTICS SUCH AS GEOGRAPHY-NEAR WATER--NEAR CHEM PLANT-URBAN-RURAL-LARGE-SMALL-POLICED BY SINGLE LARGE AGENCY OR SMALL-HOSPITAL FACILLITIES AVAIL, IN FLIGHT PATHS-NEAR TRAIN TRACKS-ETC ETC

WHO WOULD NEED TO RESPOND AND WHAT WOULD NEED TO BE DONE I THE EVENT OF A TERRORIST ATTACK TO ANY OF THE SCHOOL TYPES INVOLING ANY OF THE KNOWN OR POSSIBLE ATTACK FORMS WITH VARIOUS INDIVIDUAL SCHOOL CHARACTERISTICS IN MIND

CRITIQUE RESPONSE TO ATTACKS ON SCHOOLS THAT HAVE OCCURRED BOTH DOMESTIC AND FOREIGN

WHAT HAVE LAW ENFORCEMENT, EMS, MILTARY LEARNED FROM THESE EVENTS AND HOW HAVE TATICS AND PROCEDURES BEEN IMPROVED. WHAT ARE THE ROAD BLOCKS TO FURTHER IMPROVMENT?

WHAT ARE THE VITAL ELLEMENTS IN DETERING, PREVENTING, DECTECTING, REPELLING, RESPONDING, AND EFFECTIVE POST EVENT RESPONSE SUCH AS RETALTIATION, APPREHENSION, CALMING PUBLIC FEARS ETC

HOW CAN PREPERATION-TRAINING AND PROCEDURES RELATED TO TERROR ATTACKS TO SCHOOLS BE IMPROVED? ARE THEY ALREADY AT PEAK LEVELS?

CAN THE PHYISCAL DESIGN OF SCHOOLS BE IMPROVED TO MAKE LESS VULNERABLE ARE SOME EXISITNG CAMPUS TYPE BETTER OR WORS W R T POINTS OF ENTRY-AMBUSH AREAS-STAIR WELLS-LUNCH QUADS-..AIR VENT SYSTEMS ETC

HOW CAN TECHNOLOGY BE USED TO HARDEN SCHOOLS FROM ATTACK?

BOMB DECTIION TECH

WHAT ARE THE ATIVE BOMB INGREADIENTS BEING USED IN SUSCIDE BELTS, CAR BOMBS ETC. ARE THEY DETECTABLE NOW? IF NOT CAN THEY BE DETECTED WITH BETTER TECHNOLOGY-WOULD THIS BE PRATICLE OR AFFORADABLE-WHAT ARE THE LEGAL IMPLICATIONS

OHTER TECH CHALLENGES AND POSS IMPROVEMENTS

MULTI AGENCY COMMUNICATIONS DURRING LAGRE SCALE ATTACK

GETTING REAL TIME INFO FROM VICTIMS THRU DISPATCH TO RESPONDERS

SATLILTE IMAGES-REAL TIME VIVISUAL AIDES- VIDEO SURVAILANCE-CHEMICAL AGENT DECTECTORS ETC

SUMARRY-CONCLUSIONS