NATIONAL PLANNING SCENARIOS: Attack Timelines › sites › default › files › field_document ›...
Transcript of NATIONAL PLANNING SCENARIOS: Attack Timelines › sites › default › files › field_document ›...
FOR OFFICIAL USE ONLY/ Version 17 4 FINAL DRAFT LAW ENFORCEMENT SENSITIVE
NATIONAL PLANNING SCENARIOS: Attack Timelines
Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities
March 2006
FBI054814ACLURM055309
TI1is page intentionally left blank.
FBI054815ACLURM055310
7(E)
7(E)
7(E)
7(E)
NaJionai Planning Scenarios: FOR OFFICIAL USE ONL Yl Version 17.4 FINAL DRAFT Attack Timeiines LAW ENFORCEMENT SENSITIVE
Contents
Introduction ..................................................................................................................................... ii
Scenario 1: Nuclear Detonation
Scenario 2: Biological Attack
Scenario 3: Biological .__ .... ,, ... "'"'"
Scenario 5: Chemical Attack
Scenario 6: Chemical Attack
Scenario 7: Chemical Attack
Scenario 8: Chemical Attack
Scenario 9: Natural Disaster
Scenario 10: Natural Disaster
Scenario 11: Radiological ~u .. "·'"'"
Scenario 13: Biological Attack
Scenario 14: Biological Attack
............................ 1-1
............................ 2-1
........................................... 3-1
............................................. 4-1
............................................. 5-1
............................................ 6-1
............................................. 7-1
............................................. 8-1
.............................................. 9-1
............................................ 10-1
........ 11-1
....... 12-1
........ 13-1
........ 14-1
Scenario 15: Cyber Attack .................................................................. : ...................................... 15-1
Appendix: Scenario Working Group Members ....................... ... .. .............................................. A-1
Contents
FBI054816ACLURM055311
National Pla:nning Scenarios: FOR OFFICIAL lJSE Ot-..1.. Y/ Version 17.4 FINAL DRAFT Attack 1/melines LAW ENFORCEMENT SENSITIVE
Introduction
The Federal interagency community has developed 15 all-hazards National Planning Scenarios for use in national, Federal, State, and local homeland security preparedness activities. The scenarios are planning tools and represent the range of potential terrorist attacks and natural disasters and the related impacts that face our Nation. The objective was to develop a minimum number of credible scenarios to establish the range of response requirements to facilitate preparedness planning.
Value of the Scenarios to State and Local Leaders TI1e scenarios were designed to help state and local leaders further develop their capacity to prevent acts of terrorism within their communities and to prepare response capabilities to an event should it occur.
TI1ese scenarios reflect a rigorous analytical effort by Federal homeland security experts, with reviews by State and local homeland security representatives. However, refinement and revision will be necessary over time to ensure that the scenarios remain accurate, represent the evolving all-hazards threat picture, and embody the capabilities necessary to respond to domestic incidents. In keeping with the congressional mandate that terrorist threats must be "current and real", the Department of Homeland Security (DHS) is developing a Universal Adversary (UA) database to host and maintain terrorist threat models. At present, the UA database contains six distinct categories of terrorist threats, fifteen specific terrorist group profiles, dossiers on key terrorist actors, in-depth descriptions of tactics employed by each group, and sufficient background information for the generation of exercise related intelligence.
The National Planning Scenarios and the Universal Adversary (UA) as Tools in the Capabilities-Based Planning Process
Capabilities-Based Planning In seeking to prepare the Nation for terrorist attacks, major disasters, and other emergencies, it is impossible to maintain the highest level of preparedness for all possibilities all of the time. Given limited resources, managing the risk posed by major events is imperative. In an atmosphere of changing and evolving threats, it is vital to build flexible capabilities that will enable the Nation to prevent, respond to, and recover from a range of major events. To address this challenge, DHS employs a capabilitiesbased planning process that occurs under uncertainty to identity capabilities suitable for a wide range of challenges and circumstances. The process also works within an economic framework that necessitates prioritization and choice. As one of the principal tools in the capabilities-based planning process, the National Planning Scenarios provide a bounded threat universe to address the question: "How prepared do we need to be?" Figure 1 depicts the relationship between the scenarios and the other capabilities-based planning tools. As a first step in the capabilities-based planning process, the scenarios, while not exhaustive, provide an illustration of the potential threats for which we must be prepared. The scenarios and the UA database will be used to assess relative risk for the capabilities-
Introduction ii
FBI054817ACLURM055312
NaJional Planning Scenarios: FOR OFFICIAL USEONL Y/ Version 17.4 FINAL DRAFT AttackTimelines LAW ENFORCEMENT SENSITIVE
based planning process and provide a framework for appropriately designing and scaling ~xercises specific to location and population characteristics.
---+NATIONAL LEVEL POLICY & PLANNING GUIDANCE
Figure 1. Tools for the Capabilities-Based Planning Process
HSPD-8 Implementation 1l1e scenarios and the UA database will be used in the implementation of Homeland Security Presidential Directive (HSPD)-8 "National Preparedness," including the development of the National Preparedness Goal and National Exercise Program. In helping to develop the National Preparedness Goal, the scenarios and the UA database provide the fotmdation for identifying the capabilities across all mission areas and the target levels of those capabilities needed for effective prevention of, response to, and recovery from major events. Figure 2 illustrates how the scenarios, UA, Target Capabilities List (TCL) and the Universal Task List (UTL) leads planners at all jurisdictional levels to identify common tasks and capabilities for a given mission area, in this instance the Prevention Mission .
LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET CAPABILITIES & CRITICAL TASKS
NPS 'CRITICAL
TASKS TARGET
Figure 2. Capabilities-Based Planning and the Prevention .Mission
Introduction Ill
FBI054818ACLURM055313
National Planning Scenarios: FOR OFFICIAL USE 0'\1.. Yl Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
National Planning Scenarios, UA, Red Teams in the National Exercise Program In addition to their use as tools in the capabilities-based planning process, the scenarios and the supporting UA also provide the design basis for exercises in the National Exercise Program (NEP). Used as a common foundation for exercise development, the scenarios complemented by current threat information from the UA database ensures exercise participants foclL<; on performing the appropriate critical tasks and will assess capabilities linked to specific homeland security mission areas. The UA detail provided in the following scenarios provides examples of how terrorist groups (or individuals) having the capability, motivation and intent could execute an attack to achieve the outcomes described at the beginning of each scenario. To address exercise design requirements specitic to an individual exercise or exercise series, scenario threat models can be modified using current threat information from the UA database. There may be instances when assessing mission critical tasks and capabilities requires employment of analytical or operational Red Teams. The use of Red Teams is prescribed by the National Strategy for Homeland Security. Through the application of homeland security intelligence and information, Red Teams view the United States from the perspective of terrorists to discern and predict the methods, means, and targets of potential attackers during government sponsored exercises.1 Red Teams are comprised of individuals selected for their special subject-matter expertise, perspective (professional, cultural), imagination, and penchant for critical analysis. Red Team members have access to terrorism subject matter experts, intelligence and law enforcement professionals throughout the world, and receive extensive cultural and tactical training in preparation for each exercise event.
Employing the Scenarios, UA and Red Team in Prevention Exercises Figure 3 provides an example of how the scenarios and the UA are related to the capabilities-based planning process~ how the scenarios and U A are used in conjunction with the capabilities-based planning tools to assist state, local and tribal government planning and exercise design and; how the scenarios, the UA and Red Teams are used during the exercise lifecycle of a Prevention Exercise.
1 OtTice of Homeland Security. National Strategy for Homeland Security. July 2002.
Introduction iv
FBI054819ACLURM055314
National Plannmg Scenarios: ,41/ack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll"'ALDRAFT
r - -. ·- NATIONAL LEVEL POLICY & PLANNING GUIDANCE
I
LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET .CAPABILITIES & CRITICAL TASKS·
PREVENTION EXERCISE LIFECYCLE
Figure 3. Capabilities-Based Planning and Prevention Exercise Lifecycle
Introduction v
FBI054820ACLURM055315
National PlaJining Scenarios: FOR OFFICIAL USE ONL Yl Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
Considerations
Although not meant to be all-inclusive, the scenarios provide a basic set of common homeland security events and their related impacts that can be employed at the national level or by state, local and tribal jurisdictional authorities. Employing up-to-date information from the UA database, the scenarios have been developed so that theycan be adapted to local conditions. Agencies will not be limited to this set of scenarios, and they can exercise scenarios that are not included in the planning set. However, the scenarios provide a mutual starting point for agencies that exercise the basic events included in this set.
Intelligence Disclaimer Although the scenarios generally reflect possible terrorist capabilities and known tradecra.ft, neither the intelligence community nor the law enforcement community is aware of any credible specific intelligence that indicates that such an attack is being plrumed, or that the agents or devices in question are in possession of any known terrorist group.
Relative Grouping of Scenarios Various schemes have been used to rank scenarios based on probability, number of casualties, extent of property drunage, economic impa'-1, and social disruption. Because the scenarios in this set were developed to test the full range of response capabilities and resources-and to assist Federal, State, and local governments as well as the private sector in preparing for such events-they have not been ranked.
The groupings of UA elements with specific scenarios are not intended to isolate potential terrorist threats to an individual type or class of terrorist element. Instead, the use of ditierent UA elements is intended to illustrate the many types of capabilities and motivations that might exist.
Multiple Events In preparedness planning etiorts, organizations should always consider the need to respond to multiple incidents of the same type and multiple incidents of different types, at either the srune or other geographic locations. These incidents will invariably require the coordination and cooperation of homeland security response organizations across multiple regional, State, and local jurisdictions.
Introduction vi
FBI054821ACLURM055316
7(E)
Naiionai Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORC'EMENT SENSITIVE
Scenario 1:
Version 1 7.4 FINAL DRAFT
Nuclear Detonation -
FBI054822ACLURM055317
7(E)
NaJional Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054823ACLURM055318
7(E)
National Plmllling Scenarios: Attack Time lines
FOR OFFICIAL USE ONL Yl LAW ENFORCFMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054824ACLURM055319
7(E)
National Planning Scenarios: . Wack 1lmelines
FOR OFFICIAL USE O:N1.. Yl LAW ENFORCEMENT SENSITIVE
Version 17A FINAL DRAFT
FBI054825ACLURM055320
7(E)
NaJional Planning Scenarios: .4ttack Tirnelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054826ACLURM055321
7(E)
National PiaJ!ning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yi LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll"'AL DRAFT
FBI054827ACLURM055322
7(E)
National Planning Scenarios· .4/lack Time lines
FOR OFFiCIAL USE ONLY/ L AW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054828ACLURM055323
7(E)
National Planning &enarlos: Attack Time lines
FOR OFFICIAL USE ONL Yf LAW ENFORCEMENT SENSITIVE
Scenario 2:
ical Attack
Version 17.4 FINAL DRAFT
-
FBI054829ACLURM055324
7(E)
Narional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054830ACLURM055325
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054831ACLURM055326
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE O:r-.1.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL"'AL DRAFT
FBI054832ACLURM055327
7(E)
NaJionai Pft1J1ning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCElVfENT SENSITIVE
Version l i .4 FINAL DRAFT
FBI054833ACLURM055328
7(E)
7(E)
NaJionai Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
2-6
FBI054834ACLURM055329
7(E)
7(E)
NaJional P/(1J1ning Scenarios: FOR OFFICIAL USE ONLY/ Version 17.4 FINAL DRAFT Attack Timelines LAW ENFORCEMENT SENSITIVE
Scenario 3:
Biological Disease Outbreak -
3-1
FBI054835ACLURM055330
7(E)
NaJional Planning Scenarios: Attack Ti mel.ines
FOR OFFIQAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 4:
Version I 7.4 FINAL DRAFT
Biological Attack -
FBI054836ACLURM055331
7(E)
NaJionai Planning Scenarios: Attack Time lines
FOR OFFICIAL USE 0~1.. Y/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054837ACLURM055332
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW E:N"FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054838ACLURM055333
7(E)
NaJional Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054839ACLURM055334
7(E)
National Planning Scenarios: A/tack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054840ACLURM055335
7(E)
National Planning Scenarios: , 4ttack Time tines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version l7A FINAL DRAFT
FBI054841ACLURM055336
7(E)
NaJional PliJJtning Scenarios: Attack Timelines
FOR OFFICIAL USE O:N1. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL~AL DRAFT
FBI054842ACLURM055337
7(E)
National Planning Scenarios: Attack Ti metin.es
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 Fli'IAL DRAFT
FBI054843ACLURM055338
7(E)
7(E)
NaJionai Planning Scel'lllrios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW El'lFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
4-9
FBI054844ACLURM055339
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEJ'v!ENT SENSITIVE
Scenario 5:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054845ACLURM055340
7(E)
National Planning &enarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054846ACLURM055341
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054847ACLURM055342
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054848ACLURM055343
7(E)
NaJional Planning &enarios: Attack Tirne/ines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054849ACLURM055344
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01'-<'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 F'INAL DRAFT
FBI054850ACLURM055345
7(E)
National Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054851ACLURM055346
7(E)
National Plmming Scenarios: Attack Time lines
FOR OFFICIAL USE ONl.. Y/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054852ACLURM055347
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 6:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054853ACLURM055348
7(E)
NaJional Planning Scenarios: A/lack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL"'AL DRAFT
FBI054854ACLURM055349
7(E)
Naiional Planning Scenarios: Attack Timelines
FOR OFFICI . .!\L USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version l7A FINAL DRAFT
FBI054855ACLURM055350
7(E)
National Planning Scenarios: A/lack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054856ACLURM055351
7(E)
National Planning Scenarios: A/tack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054857ACLURM055352
7(E)
NaiionaJ Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONL Yl L AW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054858ACLURM055353
7(E)
NaJional Planning &enarios: Allack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054859ACLURM055354
7(E)
National Planning .'icenarlos: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 Fli"'AL DRAFT
FBI054860ACLURM055355
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ON1.. Y/ L AW ENFORCEMENT SENSITIVE
Scenario 7:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054861ACLURM055356
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054862ACLURM055357
7(E)
NaJionai Planning &enarios: Attack Time lines
FOR OFFICIAL USE O:NL Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054863ACLURM055358
7(E)
NaJional Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054864ACLURM055359
7(E)
NaJionaJ Planning Scenarios: Attack Timelines
FOR OFFIOAL USE ONLY/ LAW ENFORCEl'\fENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054865ACLURM055360
7(E)
National Planning &enarios: A/tack 1imelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054866ACLURM055361
7(E)
Naiional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE Ol'i"L Y/ LAW E1'i'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054867ACLURM055362
7(E)
NaJional Planning Scenarios<· Attack Timelines
FOR OFFICI.A..L USE ONLY/ LAW ENFORC9.lENT SENSITIVE
Version 1 7.4 FINAL DRAJ<'T
FBI054868ACLURM055363
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054869ACLURM055364
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054870ACLURM055365
7(E)
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFIOAL USE Ol'<'L Y/ LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
7-11
FBI054871ACLURM055366
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 8:
Chemical Attack
Version 17.4 FINAL DRAFT
-
FBI054872ACLURM055367
7(E)
National Planning Scenarios: Attack TimeJines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 Fll'IAL DRAFT
FBI054873ACLURM055368
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054874ACLURM055369
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORC&"\-lENT SENSITIVE
Version 17.4 FL'IAL DRAFT
FBI054875ACLURM055370
7(E)
Nalionai Planning Scenarios: Attack Timelines
FOR OFFICIA.L USE ONLY/ LAW ENrORCE!'viENT SENSITIVE
Version 1 7.4 FINAL DRAFT
FBI054876ACLURM055371
7(E)
National Planning &enarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054877ACLURM055372
7(E)
7(E)
Natio11al Plan11i11g Sce11arios: illtack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
8-7
FBI054878ACLURM055373
7(E)
7(E)
National Pi(]Jlning &enarios: Attack Timeiines
FOR OFFICI . .Q USE ONLY/ LAW ENFORCEJMENT SENSITIVE
Scenario 9:
Natural Disaster
Version 17.4 FINAL DRAFT
-
9-1
FBI054879ACLURM055374
7(E)
7(E)
NaJional Planning Scenanos: .4/lack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 10:
Natural Disaster
Version 17.4 FINAL DRAFT
-
10-1
FBI054880ACLURM055375
7(E)
National Planning Scenarios: .Wack Timelines
FOR OFFICIAL USE 01'-i"L Y/ LAW ENFORCEMENT SENSITIVE
Scenario 11 :
Version 17.4 FINAL DRAFT
ical Attack -
FBI054881ACLURM055376
7(E)
National Planning Scenarios: Attack Ti melines
FOR OFFICIAL USE ONLY/ LAW El'<'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054882ACLURM055377
7(E)
7(E)
NaJionai Planning Scenarios: Attack Time:Jines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
11-3
FBI054883ACLURM055378
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054884ACLURM055379
7(E)
National PllJJining Scenarios: Attack Time lines
FOR OFFICIAL USE Ol'>L Yl LAW ENFORCEMENT SENSITIVE
Version l 7 A FINAL DRAFT
FBI054885ACLURM055380
7(E)
NaJional Planning Scenarios: Allack Ti meiines
FOR OFFICIAL USE O~'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054886ACLURM055381
7(E)
7(E)
Na!ional Planning Scenarios: Auack Timeiines
FOR OFFICIAL USE 0!\"L Yf LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
ll-7
FBI054887ACLURM055382
7(E)
Na1io1rai Plnnning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Scenario 12:
Version 17.4 FINALDRAFT
Explosives Attack -
FBI054888ACLURM055383
7(E)
National Planning Scenarios: Attack Time Jines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054889ACLURM055384
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054890ACLURM055385
7(E)
National Planning &enarios: .4ttack Timelines
FOR OFFICIJ\L USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054891ACLURM055386
7(E)
NaJional Planning Scenarios: Attack Time/ines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054892ACLURM055387
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE Ol:\1. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054893ACLURM055388
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
FBI054894ACLURM055389
7(E)
7(E)
Nmionai Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 1 7.4 FINAL DRAFT
12-8
FBI054895ACLURM055390
7(E)
National Planning Scenarios: Attack Time lines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 13:
Version 1 7.4 FINAL DRAFT
Biological Attack -
FBI054896ACLURM055391
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01\'L Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054897ACLURM055392
7(E)
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICii\L USE ONLY/ LAW E:C.'FORCEMENT SENSITIVE
Version 1 7.4 FL"'AL DRAFT
13-3
FBI054898ACLURM055393
7(E)
NaJional Planning Scenarios: Attack Timetines
FOR OFFICIAL USE O"Nl.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054899ACLURM055394
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 HNAL DRAFT
FBI054900ACLURM055395
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054901ACLURM055396
7(E)
Natioool Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054902ACLURM055397
7(E)
NaJionai Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054903ACLURM055398
7(E)
7(E)
National Planning Scenarios: A/lack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FINAL DRAFT
13-9
FBI054904ACLURM055399
7(E)
Nalionai Planning Scenarios: Allack Timelines
FOR OFFICIAL USE 0"1-<'L Y/ LAW ENFORCEMENT SENSITIVE
Scenario 14:
Version 17.4 FINAL DRAFT
Biological Attack -
FBI054905ACLURM055400
7(E)
National Planning Scenarios: A flack TimeJines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENt' SENSITIVE
Version 17.4 FINAL DRAFT
FBI054906ACLURM055401
7(E)
Nalio11<1i Planning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7. 4 FINAL DRAFT
FBI054907ACLURM055402
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONl.. Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FL~ALDRAFT
FBI054908ACLURM055403
7(E)
National Planning &enarios: Allack TimeJines
FOR OFFICIAL USE ONLY/ LAW ENFORCEME:NI' SENSI'nVE
Version 17.4 Fil"'AL DRAFT
FBI054909ACLURM055404
7(E)
7(E)
NaJionai Planning Scenarios: Attack Timelines
FOR OFFICIAL USE O~"L Yl LAW ENFORCEMENT SENSITIVE
Version l 7 A FINAL DRAFT
14-6
FBI054910ACLURM055405
7(E)
NaJionai Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Scenario 15:
ber Attack
Version 1 7 4 FINAL DRAFT
FBI054911ACLURM055406
7(E)
National Planning Scenarios: Allack Timelines
FOR OFFICIAL USE ONl. Y/ LAW ENFORCEMENT SENSITIVE
Version l 7.4 FINAL DRAFT
FBI054912ACLURM055407
7(E)
NarionaJ Planning Scenarios: A/lack Timelines
FOR OFFICIAL USE ONL Yf LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054913ACLURM055408
7(E)
NaJional Planning Scenarios: Attack Timelines
FOR OFFICIAL USE 01\l Y/ LAW ENFORCEMENT SENSITIVE
Version l i A FINAL DRAFT
FBI054914ACLURM055409
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 F1"lALDRAFT
FBI054915ACLURM055410
7(E)
,VaJional Planning Scenarios: A1tack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEME r.T SENSITIVE
Version 17.4 FINAL DRAFT
FBI054916ACLURM055411
7(E)
NaJiona/ Planning Scenarios: Attack Timelines
FOR OFFICIAL USE ONL Yl LAW El-WORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054917ACLURM055412
7(E)
National PiMning Scenarios: Allack Timelines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version I 7.4 FL'\IAL DRAFT
FBI054918ACLURM055413
7(E)
National Planning &enarlos: Attack Timelines
FOR OFFICIAL USE Ol>.TL Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054919ACLURM055414
7(E)
Na!ional Planning Scenarios: Attack 11melines
FOR OFFICIAL USE Oh'L Yl LAW E:t-.'FORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054920ACLURM055415
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFICIAL USE .O:N1.Y/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054921ACLURM055416
7(E)
National Planning Scenarios: Attack Timeiines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 1 7 A FINAL DRAFT
FBI054922ACLURM055417
7(E)
National Planning &enarios: Attack Timelines
FOR OFFICIAL USE 01'-;L Y/ LAW E!-.lFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
FBI054923ACLURM055418
7(E)
National Planning Scenarios: Attack Timelines
FOR OFFIC!l\L USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version! i.4 FINAL DRAFT
FBI054924ACLURM055419
7(E)
7(E)
National Planning Scenarios: Attack Timetines
FOR OFFICIAL USE ONLY/ LAW ENFORCEMENT SENSITIVE
Version 17.4 FINAL DRAFT
15-15
FBI054925ACLURM055420
National Planning Scenarios: FOR OFFICIAL USE ONL Yf Version 17.4 FINAL DRAFT AitackTimelines LAW ENFORCEMENT SENSITIVE
APPENDIX: UA Development Members
l11e UA and associated scenario prequels were developed by Applied Marine Technologies, Inc. (AMTI), principal contractor to OPIA, DRS. The AMTI team is comprised of personnel from diverse backgrounds, including: special operations planning and execution, intelligence collection and analysis, terrorism and insurgency studies, information technology, Arabic language and culture, screenwriting, research, and journalism.
APPENDIX: U4 Development lvfembers A-1
FBI054926ACLURM055421