FOR OFFICIAL USE ONLY/ Version 17 4 FINAL DRAFT LAW ENFORCEMENT SENSITIVE NATIONAL PLANNING SCENARIOS: Attack Timelines Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities March 2006 FBI054814 ACLURM055309
113
Embed
NATIONAL PLANNING SCENARIOS: Attack Timelines › sites › default › files › field_document › ... · 2019-12-21 · Attack Timelines LAW ENFORCEMENT SENSITIVE National Planning
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
FOR OFFICIAL USE ONLY/ Version 17 4 FINAL DRAFT LAW ENFORCEMENT SENSITIVE
NATIONAL PLANNING SCENARIOS: Attack Timelines
Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities
March 2006
FBI054814ACLURM055309
awilli47
Line
awilli47
Line
TI1is page intentionally left blank.
FBI054815ACLURM055310
7(E)
7(E)
7(E)
7(E)
NaJionai Planning Scenarios: FOR OFFICIAL USE ONL Yl Version 17.4 FINAL DRAFT Attack Timeiines LAW ENFORCEMENT SENSITIVE
Contents
Introduction ..................................................................................................................................... ii
Appendix: Scenario Working Group Members ....................... ... .. .............................................. A-1
Contents
FBI054816ACLURM055311
awilli47
Line
awilli47
Line
National Pla:nning Scenarios: FOR OFFICIAL lJSE Ot-..1.. Y/ Version 17.4 FINAL DRAFT Attack 1/melines LAW ENFORCEMENT SENSITIVE
Introduction
The Federal interagency community has developed 15 all-hazards National Planning Scenarios for use in national, Federal, State, and local homeland security preparedness activities. The scenarios are planning tools and represent the range of potential terrorist attacks and natural disasters and the related impacts that face our Nation. The objective was to develop a minimum number of credible scenarios to establish the range of response requirements to facilitate preparedness planning.
Value of the Scenarios to State and Local Leaders TI1e scenarios were designed to help state and local leaders further develop their capacity to prevent acts of terrorism within their communities and to prepare response capabilities to an event should it occur.
TI1ese scenarios reflect a rigorous analytical effort by Federal homeland security experts, with reviews by State and local homeland security representatives. However, refinement and revision will be necessary over time to ensure that the scenarios remain accurate, represent the evolving all-hazards threat picture, and embody the capabilities necessary to respond to domestic incidents. In keeping with the congressional mandate that terrorist threats must be "current and real", the Department of Homeland Security (DHS) is developing a Universal Adversary (UA) database to host and maintain terrorist threat models. At present, the UA database contains six distinct categories of terrorist threats, fifteen specific terrorist group profiles, dossiers on key terrorist actors, in-depth descriptions of tactics employed by each group, and sufficient background information for the generation of exercise related intelligence.
The National Planning Scenarios and the Universal Adversary (UA) as Tools in the Capabilities-Based Planning Process
Capabilities-Based Planning In seeking to prepare the Nation for terrorist attacks, major disasters, and other emergencies, it is impossible to maintain the highest level of preparedness for all possibilities all of the time. Given limited resources, managing the risk posed by major events is imperative. In an atmosphere of changing and evolving threats, it is vital to build flexible capabilities that will enable the Nation to prevent, respond to, and recover from a range of major events. To address this challenge, DHS employs a capabilitiesbased planning process that occurs under uncertainty to identity capabilities suitable for a wide range of challenges and circumstances. The process also works within an economic framework that necessitates prioritization and choice. As one of the principal tools in the capabilities-based planning process, the National Planning Scenarios provide a bounded threat universe to address the question: "How prepared do we need to be?" Figure 1 depicts the relationship between the scenarios and the other capabilities-based planning tools. As a first step in the capabilities-based planning process, the scenarios, while not exhaustive, provide an illustration of the potential threats for which we must be prepared. The scenarios and the UA database will be used to assess relative risk for the capabilities-
Introduction ii
FBI054817ACLURM055312
awilli47
Line
awilli47
Line
NaJional Planning Scenarios: FOR OFFICIAL USEONL Y/ Version 17.4 FINAL DRAFT AttackTimelines LAW ENFORCEMENT SENSITIVE
based planning process and provide a framework for appropriately designing and scaling ~xercises specific to location and population characteristics.
---+NATIONAL LEVEL POLICY & PLANNING GUIDANCE
Figure 1. Tools for the Capabilities-Based Planning Process
HSPD-8 Implementation 1l1e scenarios and the UA database will be used in the implementation of Homeland Security Presidential Directive (HSPD)-8 "National Preparedness," including the development of the National Preparedness Goal and National Exercise Program. In helping to develop the National Preparedness Goal, the scenarios and the UA database provide the fotmdation for identifying the capabilities across all mission areas and the target levels of those capabilities needed for effective prevention of, response to, and recovery from major events. Figure 2 illustrates how the scenarios, UA, Target Capabilities List (TCL) and the Universal Task List (UTL) leads planners at all jurisdictional levels to identify common tasks and capabilities for a given mission area, in this instance the Prevention Mission .
Figure 2. Capabilities-Based Planning and the Prevention .Mission
Introduction Ill
FBI054818ACLURM055313
awilli47
Line
awilli47
Line
National Planning Scenarios: FOR OFFICIAL USE 0'\1.. Yl Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
National Planning Scenarios, UA, Red Teams in the National Exercise Program In addition to their use as tools in the capabilities-based planning process, the scenarios and the supporting UA also provide the design basis for exercises in the National Exercise Program (NEP). Used as a common foundation for exercise development, the scenarios complemented by current threat information from the UA database ensures exercise participants foclL<; on performing the appropriate critical tasks and will assess capabilities linked to specific homeland security mission areas. The UA detail provided in the following scenarios provides examples of how terrorist groups (or individuals) having the capability, motivation and intent could execute an attack to achieve the outcomes described at the beginning of each scenario. To address exercise design requirements specitic to an individual exercise or exercise series, scenario threat models can be modified using current threat information from the UA database. There may be instances when assessing mission critical tasks and capabilities requires employment of analytical or operational Red Teams. The use of Red Teams is prescribed by the National Strategy for Homeland Security. Through the application of homeland security intelligence and information, Red Teams view the United States from the perspective of terrorists to discern and predict the methods, means, and targets of potential attackers during government sponsored exercises.1 Red Teams are comprised of individuals selected for their special subject-matter expertise, perspective (professional, cultural), imagination, and penchant for critical analysis. Red Team members have access to terrorism subject matter experts, intelligence and law enforcement professionals throughout the world, and receive extensive cultural and tactical training in preparation for each exercise event.
Employing the Scenarios, UA and Red Team in Prevention Exercises Figure 3 provides an example of how the scenarios and the UA are related to the capabilities-based planning process~ how the scenarios and U A are used in conjunction with the capabilities-based planning tools to assist state, local and tribal government planning and exercise design and; how the scenarios, the UA and Red Teams are used during the exercise lifecycle of a Prevention Exercise.
1 OtTice of Homeland Security. National Strategy for Homeland Security. July 2002.
Introduction iv
FBI054819ACLURM055314
awilli47
Line
awilli47
Line
National Plannmg Scenarios: ,41/ack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll"'ALDRAFT
r - -. ·- NATIONAL LEVEL POLICY & PLANNING GUIDANCE
Figure 3. Capabilities-Based Planning and Prevention Exercise Lifecycle
Introduction v
FBI054820ACLURM055315
awilli47
Line
awilli47
Line
National PlaJining Scenarios: FOR OFFICIAL USE ONL Yl Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
Considerations
Although not meant to be all-inclusive, the scenarios provide a basic set of common homeland security events and their related impacts that can be employed at the national level or by state, local and tribal jurisdictional authorities. Employing up-to-date information from the UA database, the scenarios have been developed so that theycan be adapted to local conditions. Agencies will not be limited to this set of scenarios, and they can exercise scenarios that are not included in the planning set. However, the scenarios provide a mutual starting point for agencies that exercise the basic events included in this set.
Intelligence Disclaimer Although the scenarios generally reflect possible terrorist capabilities and known tradecra.ft, neither the intelligence community nor the law enforcement community is aware of any credible specific intelligence that indicates that such an attack is being plrumed, or that the agents or devices in question are in possession of any known terrorist group.
Relative Grouping of Scenarios Various schemes have been used to rank scenarios based on probability, number of casualties, extent of property drunage, economic impa'-1, and social disruption. Because the scenarios in this set were developed to test the full range of response capabilities and resources-and to assist Federal, State, and local governments as well as the private sector in preparing for such events-they have not been ranked.
The groupings of UA elements with specific scenarios are not intended to isolate potential terrorist threats to an individual type or class of terrorist element. Instead, the use of ditierent UA elements is intended to illustrate the many types of capabilities and motivations that might exist.
Multiple Events In preparedness planning etiorts, organizations should always consider the need to respond to multiple incidents of the same type and multiple incidents of different types, at either the srune or other geographic locations. These incidents will invariably require the coordination and cooperation of homeland security response organizations across multiple regional, State, and local jurisdictions.
Introduction vi
FBI054821ACLURM055316
awilli47
Line
awilli47
Line
7(E)
Naiionai Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORC'EMENT SENSITIVE
Scenario 1:
Version 1 7.4 FINAL DRAFT
Nuclear Detonation -
FBI054822ACLURM055317
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054823ACLURM055318
awilli47
Line
awilli47
Line
7(E)
National Plmllling Scenarios: Attack Time lines
FOR OFFICIAL USE ONL Yl LAW ENFORCFMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054824ACLURM055319
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: . Wack 1lmelines
FOR OFFICIAL USE O:N1.. Yl LAW ENFORCEMENT SENSITIVE
Version 17A FINAL DRAFT
FBI054825ACLURM055320
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: .4ttack Tirnelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054826ACLURM055321
awilli47
Line
awilli47
Line
7(E)
National PiaJ!ning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yi LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll"'AL DRAFT
FBI054827ACLURM055322
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios· .4/lack Time lines
FOR OFFiCIAL USE ONLY/ L AW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054828ACLURM055323
awilli47
Line
awilli47
Line
7(E)
National Planning &enarlos: Attack Time lines
FOR OFFICIAL USE ONL Yf LAW ENFORCEMENT SENSITIVE
Scenario 2:
ical Attack
Version 17.4 FINAL DRAFT
-
FBI054829ACLURM055324
awilli47
Line
awilli47
Line
7(E)
Narional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054830ACLURM055325
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054831ACLURM055326
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE O:r-.1.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL"'AL DRAFT
FBI054832ACLURM055327
awilli47
Line
awilli47
Line
7(E)
NaJionai Pft1J1ning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCElVfENT SENSITIVE
Version l i .4 FINAL DRAFT
FBI054833ACLURM055328
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJionai Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
2-6
FBI054834ACLURM055329
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJional P/(1J1ning Scenarios: FOR OFFICIAL USE ONLY/ Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
Scenario 3:
Biological Disease Outbreak -
3-1
FBI054835ACLURM055330
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Ti mel.ines
FOR OFFIQAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 4:
Version I 7.4 FINAL DRAFT
Biological Attack -
FBI054836ACLURM055331
awilli47
Line
awilli47
Line
7(E)
NaJionai Planning Scenarios: Attack Time lines
FOR OFFICIAL USE 0~1.. Y/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054837ACLURM055332
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW E:N"FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054838ACLURM055333
awilli47
Line
awilli47
Line
7(E)
NaJional Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054839ACLURM055334
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: A/tack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054840ACLURM055335
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: , 4ttack Time tines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version l7A FINAL DRAFT
FBI054841ACLURM055336
awilli47
Line
awilli47
Line
7(E)
NaJional PliJJtning Scenarios: Attack Timelines
FOR OFFICIAL USE O:N1. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL~AL DRAFT
FBI054842ACLURM055337
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Ti metin.es
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 Fli'IAL DRAFT
FBI054843ACLURM055338
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJionai Planning Scel'lllrios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW El'lFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
4-9
FBI054844ACLURM055339
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEJ'v!ENT SENSITIVE
Scenario 5:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054845ACLURM055340
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054846ACLURM055341
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054847ACLURM055342
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054848ACLURM055343
awilli47
Line
awilli47
Line
7(E)
NaJional Planning &enarios: Attack Tirne/ines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054849ACLURM055344
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01'-<'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 F'INAL DRAFT
FBI054850ACLURM055345
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054851ACLURM055346
awilli47
Line
awilli47
Line
7(E)
National Plmming Scenarios: Attack Time lines
FOR OFFICIAL USE ONl.. Y/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054852ACLURM055347
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 6:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054853ACLURM055348
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: A/lack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL"'AL DRAFT
FBI054854ACLURM055349
awilli47
Line
awilli47
Line
7(E)
Naiional Planning Scenarios: Attack Timelines
FOR OFFICI . .!\L USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version l7A FINAL DRAFT
FBI054855ACLURM055350
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: A/lack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054856ACLURM055351
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: A/tack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054857ACLURM055352
awilli47
Line
awilli47
Line
7(E)
NaiionaJ Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONL Yl L AW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054858ACLURM055353
awilli47
Line
awilli47
Line
7(E)
NaJional Planning &enarios: Allack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054859ACLURM055354
awilli47
Line
awilli47
Line
7(E)
National Planning .'icenarlos: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 Fli"'AL DRAFT
FBI054860ACLURM055355
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ON1.. Y/ L AW ENFORCEMENT SENSITIVE
Scenario 7:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054861ACLURM055356
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054862ACLURM055357
awilli47
Line
awilli47
Line
7(E)
NaJionai Planning &enarios: Attack Time lines
FOR OFFICIAL USE O:NL Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054863ACLURM055358
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054864ACLURM055359
awilli47
Line
awilli47
Line
7(E)
NaJionaJ Planning Scenarios: Attack Timelines
FOR OFFIOAL USE ONLY/ LAW ENFORCEl'\fENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054865ACLURM055360
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: A/tack 1imelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054866ACLURM055361
awilli47
Line
awilli47
Line
7(E)
Naiional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE Ol'i"L Y/ LAW E1'i'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054867ACLURM055362
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios<· Attack Timelines
FOR OFFICI.A..L USE ONLY/ LAW ENFORC9.lENT SENSITIVE
Version 1 7.4 FINAL DRAJ<'T
FBI054868ACLURM055363
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054869ACLURM055364
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054870ACLURM055365
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFIOAL USE Ol'<'L Y/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
7-11
FBI054871ACLURM055366
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 8:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054872ACLURM055367
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack TimeJines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll'IAL DRAFT
FBI054873ACLURM055368
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054874ACLURM055369
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORC&"\-lENT SENSITIVE
Version 17.4 FL'IAL DRAFT
FBI054875ACLURM055370
awilli47
Line
awilli47
Line
7(E)
Nalionai Planning Scenarios: Attack Timelines
FOR OFFICIA.L USE ONLY/ LAW ENrORCE!'viENT SENSITIVE
FOR OFFICI . .Q USE ONLY/ LAW ENFORCEJMENT SENSITIVE
Scenario 9:
Natural Disaster
Version 17.4 FINAL DRAFT
-
9-1
FBI054879ACLURM055374
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJional Planning Scenanos: .4/lack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 10:
Natural Disaster
Version 17.4 FINAL DRAFT
-
10-1
FBI054880ACLURM055375
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: .Wack Timelines
FOR OFFICIAL USE 01'-i"L Y/ LAW ENFORCEMENT SENSITIVE
Scenario 11 :
Version 17.4 FINAL DRAFT
ical Attack -
FBI054881ACLURM055376
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Ti melines
FOR OFFICIAL USE ONLY/ LAW El'<'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054882ACLURM055377
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJionai Planning Scenarios: Attack Time:Jines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
11-3
FBI054883ACLURM055378
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054884ACLURM055379
awilli47
Line
awilli47
Line
7(E)
National PllJJining Scenarios: Attack Time lines
FOR OFFICIAL USE Ol'>L Yl LAW ENFORCEMENT SENSITIVE
Version l 7 A FINAL DRAFT
FBI054885ACLURM055380
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Allack Ti meiines
FOR OFFICIAL USE O~'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054886ACLURM055381
awilli47
Line
awilli47
Line
7(E)
7(E)
Na!ional Planning Scenarios: Auack Timeiines
FOR OFFICIAL USE 0!\"L Yf LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
ll-7
FBI054887ACLURM055382
awilli47
Line
awilli47
Line
7(E)
Na1io1rai Plnnning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 12:
Version 17.4 FINALDRAFT
Explosives Attack -
FBI054888ACLURM055383
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Time Jines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054889ACLURM055384
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054890ACLURM055385
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: .4ttack Timelines
FOR OFFICIJ\L USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054891ACLURM055386
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054892ACLURM055387
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE Ol:\1. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054893ACLURM055388
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054894ACLURM055389
awilli47
Line
awilli47
Line
7(E)
7(E)
Nmionai Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
12-8
FBI054895ACLURM055390
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 13:
Version 1 7.4 FINAL DRAFT
Biological Attack -
FBI054896ACLURM055391
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01\'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054897ACLURM055392
awilli47
Line
awilli47
Line
7(E)
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICii\L USE ONLY/ LAW E:C.'FORCEMENT SENSITIVE
Version 1 7.4 FL"'AL DRAFT
13-3
FBI054898ACLURM055393
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timetines
FOR OFFICIAL USE O"Nl.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054899ACLURM055394
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 HNAL DRAFT
FBI054900ACLURM055395
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054901ACLURM055396
awilli47
Line
awilli47
Line
7(E)
Natioool Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054902ACLURM055397
awilli47
Line
awilli47
Line
7(E)
NaJionai Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054903ACLURM055398
awilli47
Line
awilli47
Line
7(E)
7(E)
National Planning Scenarios: A/lack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
13-9
FBI054904ACLURM055399
awilli47
Line
awilli47
Line
7(E)
Nalionai Planning Scenarios: Allack Timelines
FOR OFFICIAL USE 0"1-<'L Y/ LAW ENFORCEMENT SENSITIVE
Scenario 14:
Version 17.4 FINAL DRAFT
Biological Attack -
FBI054905ACLURM055400
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: A flack TimeJines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENt' SENSITIVE
Version 17.4 FINAL DRAFT
FBI054906ACLURM055401
awilli47
Line
awilli47
Line
7(E)
Nalio11<1i Planning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7. 4 FINAL DRAFT
FBI054907ACLURM055402
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONl.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL~ALDRAFT
FBI054908ACLURM055403
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: Allack TimeJines
FOR OFFICIAL USE ONLY/ LAW ENFORCEME:NI' SENSI'nVE
Version 17.4 Fil"'AL DRAFT
FBI054909ACLURM055404
awilli47
Line
awilli47
Line
7(E)
7(E)
NaJionai Planning Scenarios: Attack Timelines
FOR OFFICIAL USE O~"L Yl LAW ENFORCEMENT SENSITIVE
Version l 7 A FINAL DRAFT
14-6
FBI054910ACLURM055405
awilli47
Line
awilli47
Line
7(E)
NaJionai Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 15:
ber Attack
Version 1 7 4 FINAL DRAFT
FBI054911ACLURM055406
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Allack Timelines
FOR OFFICIAL USE ONl. Y/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054912ACLURM055407
awilli47
Line
awilli47
Line
7(E)
NarionaJ Planning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONL Yf LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054913ACLURM055408
awilli47
Line
awilli47
Line
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01\l Y/ LAW ENFORCEMENT SENSITIVE
Version l i A FINAL DRAFT
FBI054914ACLURM055409
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 F1"lALDRAFT
FBI054915ACLURM055410
awilli47
Line
awilli47
Line
7(E)
,VaJional Planning Scenarios: A1tack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEME r.T SENSITIVE
Version 17.4 FINAL DRAFT
FBI054916ACLURM055411
awilli47
Line
awilli47
Line
7(E)
NaJiona/ Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW El-WORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054917ACLURM055412
awilli47
Line
awilli47
Line
7(E)
National PiMning Scenarios: Allack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FL'\IAL DRAFT
FBI054918ACLURM055413
awilli47
Line
awilli47
Line
7(E)
National Planning &enarlos: Attack Timelines
FOR OFFICIAL USE Ol>.TL Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054919ACLURM055414
awilli47
Line
awilli47
Line
7(E)
Na!ional Planning Scenarios: Attack 11melines
FOR OFFICIAL USE Oh'L Yl LAW E:t-.'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054920ACLURM055415
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE .O:N1.Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054921ACLURM055416
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7 A FINAL DRAFT
FBI054922ACLURM055417
awilli47
Line
awilli47
Line
7(E)
National Planning &enarios: Attack Timelines
FOR OFFICIAL USE 01'-;L Y/ LAW E!-.lFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054923ACLURM055418
awilli47
Line
awilli47
Line
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFIC!l\L USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version! i.4 FINAL DRAFT
FBI054924ACLURM055419
awilli47
Line
awilli47
Line
7(E)
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
15-15
FBI054925ACLURM055420
awilli47
Line
awilli47
Line
National Planning Scenarios: FOR OFFICIAL USE ONL Yf Version 17.4 FINAL DRAFT AitackTimelines LAW ENFORCEMENT SENSITIVE
APPENDIX: UA Development Members
l11e UA and associated scenario prequels were developed by Applied Marine Technologies, Inc. (AMTI), principal contractor to OPIA, DRS. The AMTI team is comprised of personnel from diverse backgrounds, including: special operations planning and execution, intelligence collection and analysis, terrorism and insurgency studies, information technology, Arabic language and culture, screenwriting, research, and journalism.