What's new

Terrorism In Pakistan: Need For Improved Security Management

Nassr

FULL MEMBER
Joined
May 7, 2011
Messages
835
Reaction score
0
Terrorism In Pakistan: Need For Improved Security Management & Vulnerability Assessment

By Khan A. Sufyan
September 18, 2013

Pakistan has faced different kinds of terrorism related threats since long. Though countering terror is an on-going process, availability of improved technological counter measures provide effective ways to counter terror related threats in an integrated environment.

Integrated Security Management System is one such response measure which helps in consolidation of all security related organizational elements, sub systems, security sensors and equipment under one platform.

It also helps in countering varied threats under a unified command and control for functioning of various tiers and aspects through an efficient and effective integrated security environment.

Objectives of Integrated Security Management System
• Prevent loss of life and minimize injury.
• Protect critical assets.
• Prevent loss of operation.
• Deter criminals and terrorists from acting.
• Enhance long-term security for personnel and assets.

Characteristics for Implementation of a Successful Integrated Security Management Plan
• Identifies potential threats.
• Identifies and prioritizes critical assets.
• Develops a comprehensive mitigation strategy.
• Meets current threats and plans for future modifications. <
• Anticipates disasters, emergencies, and potentially damaging events.
• Eliminates single points of failure.
• Provides earliest detection of threats.
• Balances costs while acknowledging and accepting risk.
• Minimizes failure of building systems.
• Facilitates safe evacuation and rescue.
• Prevents intrusions and hostage situations.
• Protects people and assets.
• Facilitates early recovery of operations.

TO MINIMIZE SECURITY RISKS PLAN AROUND FOUR BASIC STRATEGIES

Basic-Strat.png

Security Vulnerability Assessment (SVA) & Procedure
SVA is a critical element in efforts to counter terrorism and other criminal related threats of various kinds. It helps in provision of unified response plan for various emergencies through imposition of effective security to various parts of cities and towns, large and small sensitive areas, facilities, installations, communities and businesses etc. Most SVA procedures follow a well-orchestrated and tiered approach methodology which is risk-based and performance-oriented. This process helps in an all-encompassing integrated security planning, management and execution. The user can choose different means of accomplishing the general SVA methodology, so long as the end result meets the same performance criteria. Major elements impacting the SVA are highlighted.

Asset Characterization
The asset characterization is a procedure which helps in identification of critical assets and functions along with their supporting interdependcies and the consequences of their loss. The procedure also helps in evaluating the existing countermeasures.

Steps/Tasks

Identify critical assets Identify critical assets including facilities, personnel, equipment, systems, and information.

Identify critical functions Identify the critical functions and determine which assets perform or support the critical functions.

Identify critical infrastructures and interdependencies Identify the critical infrastructures and their interdependencies (e.g., electric power, petroleum fuels, natural gas, telecommunications, transportation, water, emergency services, and fire systems etc) that support the critical operations.

Evaluate existing Countermeasures Identify what protects and supports the critical functions and assets including the relevant layers of existing security systems including physical, cyber, operational and administrative, and the process safety systems.

Evaluate impacts Evaluate the hazards and consequences or important acts and the critical functions from disruption, damage, or loss of each of the critical assets or functions.

Select targets for further Analysis Develop a target list of critical functions and assets for further study.

INFRASTRUCTURE INTERDEPENDENCIES​

INFRASTRUCTURE-INTERDEPENDENCIES.png

Threat Assessment

Steps/Tasks

Adversary identification Evaluate threat information and identify threat categories and potential adversaries. Identify general threat categories. Consider threats posed by insiders, external agents (outsiders), and collusion between insiders and outsiders.

Adversary characterization Evaluate each adversary and provide an overall threat assessment and ranking for each adversary, using known or available information. Consider factors like general nature and history of threat; specific threat experience and related history of the facility or operation; known capabilities, methodologies and weapons; potential actions, intent and motivation of adversary.

Analyze target attractiveness Conduct an evaluation of target (from assets characterization) attractiveness from the adversary’s perspective.

Security Audit/Survey
• Analyzes an existing space, individual building or entire urban facility/area.
• The intent is to note all physical elements to be evaluated against threat criteria and to determine potential security vulnerabilities.
• The survey starts from the outer perimeter, includes public and outdoor areas, and works toward the center, or to the location of critical assets.
• All site areas are addressed, as well as building exteriors and internal spaces within the specified area/facility.
• Building systems are identified, infrastructure is evaluated and operational and staffing issues are documented.
• The process consists of interviewing stakeholders and locals and by performing on-site inspections.
• The level of detail in each survey depends on project security requirements and concerns of stakeholders/users.

Vulnerability Analysis
This process involves the identification of existing countermeasures and their level of effectiveness in reducing the existing vulnerabilities. The degree of vulnerability of each asset and threat pairing is evaluated by the formulation of threat-related scenarios or through asset protection evaluation. If certain criteria are met, such as higher threat expectancy or higher attractiveness ranking related to a target, then it may be useful to apply a scenario-based approach to conduct the Vulnerability Analysis. It also includes the assigning of risk rankings to the threat-related scenarios. If the asset-based approach is used, the determination of the asset’s importance and attractiveness may be enough to assign a target ranking value and employ protection measures required for a standard protection set for that target level. In this case, scenarios may not be developed further than the general thought that an adversary is interested in damaging an asset.

Type of effects
o Potential for causing maximum casualties.
o Potential for causing maximum damage/loss.
o Potential for causing maximum damage and economic loss to the national infrastructure.
o Potential for causing fear psychosis.

Type of targets
o To cause collateral damage.
o Proximity to national asset or landmarks.
o Difficulty of attack including ease of access and degree of existing security measures (soft target).
o Iconic or symbolic target.
o Recognition of the target.

Possible-Terrorist-Tactics.png

Steps/Tasks

Define scenarios and evaluate specific consequences Use scenario-analysis and/or use asset-based analysis to document the adversary’s potential actions against an asset.

Evaluate effectiveness of existing security measures Identify the existing measures intended to protect the assets and estimate their levels of effectiveness in reducing the vulnerabilities of each asset to each threat or adversary.

Identify vulnerabilities and estimate degree of vulnerability Identify the potential vulnerabilities of each asset to possible threats or adversaries. Estimate the degree of vulnerability of each asset for each threat-related undesirable event.

Risk Assessment
The risk assessment determines the relative degree of risk to the facility in terms of the expected effect on each locality/area/critical asset as a function of consequence and probability of occurrence. The risk assessment assists in conducting the risk management in an effective manner.

Risk-Assessment.png

Countermeasures Analysis
Based on the vulnerabilities identified and the risks to the layers of security that could be breached, appropriate enhancements to the security countermeasures are recommended. Countermeasure options are identified to further reduce the vulnerability. These include improved countermeasures that follow the security strategies to deter, detect, delay, respond, mitigate and possibly prevent. Some of the factors to be considered are:

• Reduced probability of successful attack.
• Degree of risk reduction by the options.
• Reliability and maintainability of the options.
• Capabilities and effectiveness of mitigation options.
• Costs of mitigation options.
• Feasibility of the options.

SYSTEM INTEGRATION​

System-Integ.png

The countermeasure options are re-ranked to evaluate effectiveness, and prioritized to assist decision making for implementing security program enhancements. The recommendations are included in a SVA report that is used to communicate the results of the SVA.

Protection of assets against terrorism and other kinds of threats is the combined responsibility of all elements of business/civil society and national security infrastructure. It is therefore imperative that all the stake holders in Pakistan generate a well-coordinated and aggressive response through employment of technology based integrated security management systems so that such threats can be mitigated and defeated.


Link: Terrorism In Pakistan: Need For Improved Security Management & Vulnerability Assessment Eurasia Review
 
.
Wow mate you wrote this?

The best thing will be to implement it... am waiting lol
 
. .
Pakistan is moving towards integrated security environment, though there still is a long way to traverse. I do not know about the army but in many cities of Punjab including Lahore, all the police stations are now integrated with the data center established at the Police Headquarters in Lahore. In Lahore, the capital of Punjab Province, all the police stations are integrated and the FIRs are filed electronically and once recorded can not be changed. These are stored in the central data center, as is the case for many other cities. FIA has its own criminal finger print data centrally stored at its data center at FIA Headquarters in Islamabad. FIA is also linked with all Police Headquarters and District Police Headquarters from where the finger print data is uploaded to Islamabad. The finger print data of criminals is electronically checked by all the provincial police forces from the same data center at FIA Headquarters in Islamabad. The provincial police officials through their own wide area police network can send internal emails including pictures of criminals and large files etc without using the internet. They also have their own IP telephones linked to all the police stations which are connected to the network. Many of these are video telephones where the officials talk to each other via this direct telephone video link. Wireless communication link is being used for data transfer in all the cities. And between the cities, fiber as well as satellite links are also used in case of unavailability of fiber optics cable.

There are many other similar projects which are being processed and I hope that if the suggested methodology is also used concurrently, there can be definite improvement in the crime fighting as well as counter terrorism domain.
 
.
Indeed,this is the greatest need of LEA sectors right now,as they need better equipment and plans to ensure efficient performance and to maintain complex system.
We need to bring our LEA sectors to whole new advanced level in order to get better,efficient results.
We need powerful sattelite technology and effcient system for powerful data record,especially in Karachi we need the most.
 
.
Back
Top Bottom