menu

Contributor:

Security Debrief

LAPD Common Sense Approach to Protestor Management

The LAPD operation to clear the park in City Hall was noteworthy for its change in style and was the correct conclusion to what has been a policing operation characterized by engagement and discretion by the police. This and other examples of policing Occupy Protests must be examined closely by the departments that will host National Significant Security Events next year, extracting the lessons that will apply to certain sections of the protest community, and creating effective plans for the those truly violent demonstrators who were patently absent from Occupy LA.

Terrorists Embrace Internet Fraud to Fund Operations

By Rob Strayer
It is an unfortunate modern reality that cyber attacks are commonly used to steal money from businesses and individuals. Cyber attacks that disrupt or destroy physical assets, on the other hand, have been rare up to this time. The news over the weekend that a terrorist organization was able to finance its activities by hacking AT&T business customers’ telecommunications accounts represents a new and disturbing development in the use of cyber attacks by terrorists.

Thad Allen, the Joplin Tornado & a New Resilience

Earlier this month, I was at Rutgers University and fortunate to hear retired U.S. Coast Guard Commandant Admiral Thad Allen speak at the 2nd annual Maritime Risk Symposium. In his address, Adm. Allen developed a theme in discussing resilience that I believe bears greater and deeper discussion. He discussed the Joplin, Missouri, tornado devastation this past spring. At the center of this lesson is a school teacher – it is the story of Dr. C.J. Huff, the young teacher-turned-school superintendent who demonstrated resilience in practice.

The Newest Hardline Protestor Threat to Police

The newest threat to police from hardline protestors is “doxing” – the photographing of police and publishing their personal details, and sometimes that of their families, to the Internet. This tactic has been used to attempt to intimidate officers during events with protestors calling out officers’ names as they film and telling them they will be “doxed.” This tactic is an import from the hardline protest movements in Britain and should be of significant concern to police at all levels of operations and command, although it does have a very simple remedy.

Is There A Doctrine In The Cyber House?

The last several months in D.C. have witnessed a series of Executive Orders, proposed legislation, bureaucratic action and public bickering over how to “defend” cyberspace. This dividing up of provinces of responsibility in cyberspace is interesting. It is a lovely 20th century way of dealing with a 21st century problem. Setting boundaries in the boundless frontier. Those seeking to harm cyberspace must be laughing up their collective sleeves or Guy Fawkes masks.

Protestors as Law Enforcement Allies, Not Enemies

The treatment of protestors as the enemy at National Significant Security Events is the most counter-productive action law enforcement could think of. If one is running a policing effort during a NSSE, surely the principal information tool during the final hours before an event and during that event is the population itself. However, by treating all protestors as potential terrorists and critical threats, police significantly reduce the likelihood that protestors will “see something, say something,” because the police have chosen a confrontational relationship rather than a collaborative one.

Some Odd Turns On Inbound Air Cargo Screening – Here's Hoping 100 Percent is Dead

It has been four years since Congress made the bone-headed move mandating 100 percent screening of passenger plane cargo. Serious risk management is not Congress’s bag, as the institution demonstrates often. Fortunately, some elements within DHS sought to forge a new path, wisely piloting a program to conduct risk analyses of inbound air cargo and to focus DHS’s resources on the high-risk cargo, rather than attempting to subject all cargo to the same level of physical screening. This “risk-based” screening has been successful for DHS in other contexts.

Striking Iran’s Nuclear Weapons Program and Contingency Planning

Recent press reports suggest the world is closer to seeing a military strike on Iran’s nuclear facilities. Whether these particular reports are the result of credible leaks, disinformation campaigns, and/or journalistic speculation, it seems clear that there is a military option with respect to Iran’s nuclear sites and infrastructure. The United States Government will be doing it and its citizens a serious disservice if it does not put in place contingency plans for the “day after” a strike on Iran. Unfortunately, Iran has a menu of options with respect to striking back at the United States and larger Western interests.

Iran's Growing Presence in Region a Menace

Quirky though it was, U.S. officials are convinced that the recently exposed plot to assassinate the Saudi Ambassador to Washington was the work of the vaunted Quds Force, the special operations branch of the Iran’s Islamic Revolutionary Guard Corp (IRGC). As policymakers consider how best to respond to Iran’s increasingly dangerous behavior they should look first to our own back yard south of the border.