NATIONAL PLANNING SCENARIOS: Attack Timelines

Similar documents
The National Preparedness System (NPS) Moving Preparedness into a Net Centric Environment

San Francisco Bay Area

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

Revising the National Strategy for Homeland Security

Target Capabilities List. Draft Version 2.0

Terrorism Incident Law Enforcement and Investigation Annex. Cooperating Agencies: Coordinating Agency:

UNIVERSAL TASK LIST: Version 2.1

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

State and Urban Area Homeland Security Plans and Exercises: Issues for the 110 th Congress

Presidential Policy Directive/ PPD 8 Update

National Preparedness Goal Project

NORAD and USNORTHCOM Theater Strategy

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex

NATIONAL RESPONSE PLAN

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

FY 2006 Homeland Security Grant Program Program Guidance and Application Kit

NIMS and the Incident Command System (ICS)

CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

National Exercise Program (NEP) Overview. August 2009

Terrorism Consequence Management

University of Pittsburgh

CHAPTER 246. C.App.A:9-64 Short title. 1. This act shall be known and may be cited as the "New Jersey Domestic Security Preparedness Act.

ADRP328 DEFENSESUPPORT

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

Terrorism Support Annex

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement

National Incident Management System (NIMS) & the Incident Command System (ICS)

Center for Domestic Preparedness (CDP)

National Strategies and Presidential Directives that are relevant to DoD DSCA support

IS-700.a National Incident Management System (NIMS) An Introduction Final Exam

National Incident Management System (NIMS) Implementation Plan

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Office for Bombing Prevention Bomb Threat Management

State Homeland Security Strategy (SHSS) May 24, 2004

All-Hazards Baseline Operational Plan

CRS Report for Congress

NYS Office of Homeland Security Upcoming Training Course spotlights and schedule

Bay Area UASI. Introduction to the Bay Area UASI (Urban Areas Security Initiative) Urban Shield Task Force Meeting

Introduction. Oil and Hazardous Materials Incident Annex. Coordinating Agencies: Cooperating Agencies:

December 17, 2003 Homeland Security Presidential Directive/Hspd-8

Continuity of Operations (COOP) Planning Workshop. Division of Emergency Management Department of Military Affairs

DRAFT 10/08/2010 VERSION

6 USC 542. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

Tampa Bay Catastrophic Plan

Department of Defense DIRECTIVE

FEMA s Role in Terrorism Preparedness and Response Plan

Bay Area UASI FY 2012 PROJECT PROPOSAL FORM

Chapter 17: Foreign Policy and National Defense Section 2

DOD INSTRUCTION DOD PUBLIC HEALTH AND MEDICAL SERVICES IN SUPPORT OF CIVIL AUTHORITIES

U.S. DEPARTMENT OF HOMELAND SECURITY

Intro to - IS700 National Incident Management System Aka - NIMS

Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) TERRORISM RESPONSE ANNEX

All-Hazards Strategic Plan

Chapter8 Countering Nuclear Threats

U.S. Department of Homeland Security Office for Domestic Preparedness (ODP) ODP Overview. September 28 th, 2004

25 February. Prepared for: National Collegiate Emergency Medical Services Foundation. Conference 2006 Boston, Massachusetts

Homeland Emergency Preparedness and the National Exercise Program: Background, Policy Implications, and Issues for Congress

ANALYSIS FOR THE HOMELAND SECURITY ACT OF 2002

Department of Defense INSTRUCTION

National Response Plan

Public Safety and Security

SCOTSEM Annual Meeting Aug 24, 2016

NATIONAL RESPONSE PLAN I. Introduction

Unit 2: Requirements for Continuity Planning

Department of Defense DIRECTIVE

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D.

HSPD-21: National Strategy for Public Health and Medical Preparedness

HOMELAND SECURITY GRANT PROGRAM

Nuclear/Radiological Incident Annex

On February 28, 2003, President Bush issued Homeland Security Presidential Directive 5 (HSPD 5). HSPD 5 directed the Secretary of Homeland Security

STATE EMERGENCY FUNCTION (SEF) 10 HAZARDOUS MATERIALS. I. Lead Agency: Colorado Department of Public Safety (CDPS), Colorado State Patrol (CSP).

CASE STUDY Regarding Healthcare Facility s Duty to Provide Workplace Violence Training to All Workers.

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Mississippi Emergency Support Function #10 Oil and Hazardous Materials

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

Welcome to the self-study Introductory Course of the:

ATTACHMENT C TO THE SOUTH CAROLINA EMERGENCY OPERATIONS PLAN AUTHORITIES AND REFERENCES

Nuclear Bio Terrorism. Eli Dabich BP22

Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) ANNEX 1 OF THE KNOX COUNTY EMERGENCY OPERATIONS PLAN

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

DOD DIRECTIVE DOD COUNTERING WEAPONS OF MASS DESTRUCTION (WMD) POLICY

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program

Chapter 1 - History and Current Status of Emergency Management

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup

Through. PICCC, Inc. As the NCTF Fiscal Agent. Program Management Services in the North Central Task Force Region (NCTF)

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348

Emergency Medical Services

Funding Resources for. Your Community s. Communications Project. Grants Information Provided by:

NATIONAL INCIDENT MANAGEMENT SYSTEM TRAINING PLAN

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

Department of Defense. Homeland Defense and Civil Support Joint Operating Concept

The Basics of Disaster Response

Research Supporting ALICE

LEADERSHIP IN HOMELAND SECURITY AWARD

FOR OFFICIAL USE ONLY U.S. Department of Homeland Security Washington, DC 20528

Transcription:

FOR OFFICIAL USE ONLY/ Version 17 4 FINAL DRAFT NATIONAL PLANNING SCENARIOS: Attack Timelines Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities March 2006 ACLURM055309 FBI054814

TI1is page intentionally left blank. ACLURM055310 FBI054815

NaJionai Planning Scenarios: FOR OFFICIAL USE ONL Yl Attack Timeiines Contents Introduction... ii Scenario 1: Nuclear Detonation Scenario 2: Biological Attack Scenario 3: Biological....,,..."'"'" Scenario 5: Chemical Attack Scenario 6: Chemical Attack Scenario 7: Chemical Attack Scenario 8: Chemical Attack Scenario 9: Natural Disaster Scenario 10: Natural Disaster Scenario 11: Radiological ~u.." '"'" Scenario 13: Biological Attack Scenario 14: Biological Attack... 1-1... 2-1... 3-1... 4-1... 5-1... 6-1... 7-1... 8-1... 9-1... 10-1... 11-1... 12-1... 13-1... 14-1 Scenario 15: Cyber Attack...:... 15-1 Appendix: Scenario Working Group Members... A-1 Contents ACLURM055311 FBI054816

National Pla:nning Scenarios: FOR OFFICIAL ljse Ot-..1.. Y/ Attack 1/melines Introduction The Federal interagency community has developed 15 all-hazards National Planning Scenarios for use in national, Federal, State, and local homeland security preparedness activities. The scenarios are planning tools and represent the range of potential terrorist attacks and natural disasters and the related impacts that face our Nation. The objective was to develop a minimum number of credible scenarios to establish the range of response requirements to facilitate preparedness planning. Value of the Scenarios to State and Local Leaders TI1e scenarios were designed to help state and local leaders further develop their capacity to prevent acts of terrorism within their communities and to prepare response capabilities to an event should it occur. TI1ese scenarios reflect a rigorous analytical effort by Federal homeland security experts, with reviews by State and local homeland security representatives. However, refinement and revision will be necessary over time to ensure that the scenarios remain accurate, represent the evolving all-hazards threat picture, and embody the capabilities necessary to respond to domestic incidents. In keeping with the congressional mandate that terrorist threats must be "current and real", the Department of Homeland Security (DHS) is developing a Universal Adversary (UA) database to host and maintain terrorist threat models. At present, the UA database contains six distinct categories of terrorist threats, fifteen specific terrorist group profiles, dossiers on key terrorist actors, in-depth descriptions of tactics employed by each group, and sufficient background information for the generation of exercise related intelligence. The National Planning Scenarios and the Universal Adversary (UA) as Tools in the Capabilities-Based Planning Process Capabilities-Based Planning In seeking to prepare the Nation for terrorist attacks, major disasters, and other emergencies, it is impossible to maintain the highest level of preparedness for all possibilities all of the time. Given limited resources, managing the risk posed by major events is imperative. In an atmosphere of changing and evolving threats, it is vital to build flexible capabilities that will enable the Nation to prevent, respond to, and recover from a range of major events. To address this challenge, DHS employs a capabilitiesbased planning process that occurs under uncertainty to identity capabilities suitable for a wide range of challenges and circumstances. The process also works within an economic framework that necessitates prioritization and choice. As one of the principal tools in the capabilities-based planning process, the National Planning Scenarios provide a bounded threat universe to address the question: "How prepared do we need to be?" Figure 1 depicts the relationship between the scenarios and the other capabilities-based planning tools. As a first step in the capabilities-based planning process, the scenarios, while not exhaustive, provide an illustration of the potential threats for which we must be prepared. The scenarios and the UA database will be used to assess relative risk for the capabilities- Introduction ii ACLURM055312 FBI054817

NaJional Planning Scenarios: FOR OFFICIAL USEONL Y/ AttackTimelines based planning process and provide a framework for appropriately designing and scaling ~xercises specific to location and population characteristics. ---+NATIONAL LEVEL POLICY & PLANNING GUIDANCE Figure 1. Tools for the Capabilities-Based Planning Process HSPD-8 Implementation 1l1e scenarios and the UA database will be used in the implementation of Homeland Security Presidential Directive (HSPD)-8 "National Preparedness," including the development of the National Preparedness Goal and National Exercise Program. In helping to develop the National Preparedness Goal, the scenarios and the UA database provide the fotmdation for identifying the capabilities across all mission areas and the target levels of those capabilities needed for effective prevention of, response to, and recovery from major events. Figure 2 illustrates how the scenarios, UA, Target Capabilities List (TCL) and the Universal Task List (UTL) leads planners at all jurisdictional levels to identify common tasks and capabilities for a given mission area, in this instance the Prevention Mission. LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET CAPABILITIES & CRITICAL TASKS NPS 'CRITICAL TASKS TARGET Figure 2. Capabilities-Based Planning and the Prevention.Mission Introduction Ill ACLURM055313 FBI054818

National Planning Scenarios: FOR OFFICIAL USE 0'\1.. Yl Attack Timelines National Planning Scenarios, UA, Red Teams in the National Exercise Program In addition to their use as tools in the capabilities-based planning process, the scenarios and the supporting UA also provide the design basis for exercises in the National Exercise Program (NEP). Used as a common foundation for exercise development, the scenarios complemented by current threat information from the UA database ensures exercise participants focll<; on performing the appropriate critical tasks and will assess capabilities linked to specific homeland security mission areas. The UA detail provided in the following scenarios provides examples of how terrorist groups (or individuals) having the capability, motivation and intent could execute an attack to achieve the outcomes described at the beginning of each scenario. To address exercise design requirements specitic to an individual exercise or exercise series, scenario threat models can be modified using current threat information from the UA database. There may be instances when assessing mission critical tasks and capabilities requires employment of analytical or operational Red Teams. The use of Red Teams is prescribed by the National Strategy for Homeland Security. Through the application of homeland security intelligence and information, Red Teams view the United States from the perspective of terrorists to discern and predict the methods, means, and targets of potential attackers during government sponsored exercises. 1 Red Teams are comprised of individuals selected for their special subject-matter expertise, perspective (professional, cultural), imagination, and penchant for critical analysis. Red Team members have access to terrorism subject matter experts, intelligence and law enforcement professionals throughout the world, and receive extensive cultural and tactical training in preparation for each exercise event. Employing the Scenarios, UA and Red Team in Prevention Exercises Figure 3 provides an example of how the scenarios and the UA are related to the capabilities-based planning process~ how the scenarios and U A are used in conjunction with the capabilities-based planning tools to assist state, local and tribal government planning and exercise design and; how the scenarios, the UA and Red Teams are used during the exercise lifecycle of a Prevention Exercise. 1 OtTice of Homeland Security. National Strategy for Homeland Security. July 2002. Introduction iv ACLURM055314 FBI054819

National Plannmg Scenarios:,41/ack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 Fll"'ALDRAFT r - -. - NATIONAL LEVEL POLICY & PLANNING GUIDANCE I LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET.CAPABILITIES & CRITICAL TASKS PREVENTION EXERCISE LIFECYCLE Figure 3. Capabilities-Based Planning and Prevention Exercise Lifecycle Introduction v ACLURM055315 FBI054820

National PlaJining Scenarios: FOR OFFICIAL USE ONL Yl Attack Timelines Considerations Although not meant to be all-inclusive, the scenarios provide a basic set of common homeland security events and their related impacts that can be employed at the national level or by state, local and tribal jurisdictional authorities. Employing up-to-date information from the UA database, the scenarios have been developed so that theycan be adapted to local conditions. Agencies will not be limited to this set of scenarios, and they can exercise scenarios that are not included in the planning set. However, the scenarios provide a mutual starting point for agencies that exercise the basic events included in this set. Intelligence Disclaimer Although the scenarios generally reflect possible terrorist capabilities and known tradecra.ft, neither the intelligence community nor the law enforcement community is aware of any credible specific intelligence that indicates that such an attack is being plrumed, or that the agents or devices in question are in possession of any known terrorist group. Relative Grouping of Scenarios Various schemes have been used to rank scenarios based on probability, number of casualties, extent of property drunage, economic impa'-1, and social disruption. Because the scenarios in this set were developed to test the full range of response capabilities and resources-and to assist Federal, State, and local governments as well as the private sector in preparing for such events-they have not been ranked. The groupings of UA elements with specific scenarios are not intended to isolate potential terrorist threats to an individual type or class of terrorist element. Instead, the use of ditierent UA elements is intended to illustrate the many types of capabilities and motivations that might exist. Multiple Events In preparedness planning etiorts, organizations should always consider the need to respond to multiple incidents of the same type and multiple incidents of different types, at either the srune or other geographic locations. These incidents will invariably require the coordination and cooperation of homeland security response organizations across multiple regional, State, and local jurisdictions. Introduction vi ACLURM055316 FBI054821

Naiionai Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW ENFORC'EMENT SENSITIVE Version 1 7.4 FINAL DRAFT Scenario 1: Nuclear Detonation - ACLURM055317 FBI054822

NaJional Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONLY/ ACLURM055318 FBI054823

National Plmllling Scenarios: Attack Time lines FOR OFFICIAL USE ONL Yl LAW ENFORCFMENT SENSITIVE ACLURM055319 FBI054824

National Planning Scenarios:. Wack 1lmelines FOR OFFICIAL USE O:N1.. Yl Version 17A FINAL DRAFT ACLURM055320 FBI054825

NaJional Planning Scenarios:.4ttack Tirnelines FOR OFFICIAL USE ONLY/ ACLURM055321 FBI054826

National PiaJ!ning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yi Version 17.4 Fll"'AL DRAFT ACLURM055322 FBI054827

National Planning Scenarios.4/lack Time lines FOR OFFiCIAL USE ONLY/ L AW ENFORCEMENT SENSITIVE ACLURM055323 FBI054828

National Planning &enarlos: Attack Time lines FOR OFFICIAL USE ONL Yf Scenario 2: ical Attack - ACLURM055324 FBI054829

Narional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055325 FBI054830

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055326 FBI054831

National Planning Scenarios: Attack Timetines FOR OFFICIAL USE O:r-.1.. Y/ Version 17.4 FL"'AL DRAFT ACLURM055327 FBI054832

NaJionai Pft1J1ning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORCElVfENT SENSITIVE Version l i.4 FINAL DRAFT ACLURM055328 FBI054833

NaJionai Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055329 2-6 FBI054834

NaJional P/(1J1ning Scenarios: FOR OFFICIAL USE ONLY/ Attack Timelines Scenario 3: Biological Disease Outbreak - 3-1 ACLURM055330 FBI054835

NaJional Planning Scenarios: Attack Ti mel.ines FOR OFFIQAL USE ONL Yl Version I 7.4 FINAL DRAFT Scenario 4: Biological Attack - ACLURM055331 FBI054836

NaJionai Planning Scenarios: Attack Time lines FOR OFFICIAL USE 0~1.. Y/ Version I 7.4 FINAL DRAFT ACLURM055332 FBI054837

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW E:N"FORCEMENT SENSITIVE ACLURM055333 FBI054838

NaJional Planning &enarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055334 FBI054839

National Planning Scenarios: A/tack Timelines FOR OFFICIAL USE ONL Yl ACLURM055335 FBI054840

National Planning Scenarios:, 4ttack Time tines FOR OFFICIAL USE ONL Yl Version l7a FINAL DRAFT ACLURM055336 FBI054841

NaJional PliJJtning Scenarios: Attack Timelines FOR OFFICIAL USE O:N1. Y/ Version 17.4 FL~AL DRAFT ACLURM055337 FBI054842

National Planning Scenarios: Attack Ti metin.es FOR OFFICIAL USE ONLY/ Version 17.4 Fli'IAL DRAFT ACLURM055338 FBI054843

NaJionai Planning Scel'lllrios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW El'lFORCEMENT SENSITIVE 4-9 ACLURM055339 FBI054844

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORCEJ'v!ENT SENSITIVE Scenario 5: Chemical Attack - ACLURM055340 FBI054845

National Planning &enarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT ACLURM055341 FBI054846

National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ ACLURM055342 FBI054847

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055343 FBI054848

NaJional Planning &enarios: Attack Tirne/ines FOR OFFICIAL USE ONL Yl Version 1 7.4 FINAL DRAFT ACLURM055344 FBI054849

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01'-<'L Y/ Version 17.4 F'INAL DRAFT ACLURM055345 FBI054850

National Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT ACLURM055346 FBI054851

National Plmming Scenarios: Attack Time lines FOR OFFICIAL USE ONl.. Y/ Version l 7.4 FINAL DRAFT ACLURM055347 FBI054852

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Scenario 6: Chemical Attack - ACLURM055348 FBI054853

NaJional Planning Scenarios: A/lack Time lines FOR OFFICIAL USE ONLY/ Version 17.4 FL"'AL DRAFT ACLURM055349 FBI054854

Naiional Planning Scenarios: Attack Timelines FOR OFFICI..!\L USE ONLY/ Version l7a FINAL DRAFT ACLURM055350 FBI054855

National Planning Scenarios: A/lack Time lines FOR OFFICIAL USE ONLY/ ACLURM055351 FBI054856

National Planning Scenarios: A/tack Timelines FOR OFFICIAL USE ONLY/ ACLURM055352 FBI054857

NaiionaJ Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONL Yl L AW ENFORCEMENT SENSITIVE ACLURM055353 FBI054858

NaJional Planning &enarios: Allack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055354 FBI054859

National Planning.'icenarlos: Attack Timelines FOR OFFICIAL USE ONL Yl Version 1 7.4 Fli"'AL DRAFT ACLURM055355 FBI054860

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ON1.. Y/ L AW ENFORCEMENT SENSITIVE Scenario 7: Chemical Attack - ACLURM055356 FBI054861

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055357 FBI054862

NaJionai Planning &enarios: Attack Time lines FOR OFFICIAL USE O:NL Y/ ACLURM055358 FBI054863

NaJional Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONLY/ ACLURM055359 FBI054864

NaJionaJ Planning Scenarios: Attack Timelines FOR OFFIOAL USE ONLY/ LAW ENFORCEl'\fENT SENSITIVE ACLURM055360 FBI054865

National Planning &enarios: A/tack 1imelines FOR OFFICIAL USE ONLY/ ACLURM055361 FBI054866

Naiional Planning Scenarios: Attack Timelines FOR OFFICIAL USE Ol'i"L Y/ LAW E1'i'FORCEMENT SENSITIVE ACLURM055362 FBI054867

NaJional Planning Scenarios< Attack Timelines FOR OFFICI.A..L USE ONLY/ LAW ENFORC9.lENT SENSITIVE Version 1 7.4 FINAL DRAJ<'T ACLURM055363 FBI054868

National Planning Scenarios: Attack Timetines FOR OFFICIAL USE ONLY/ ACLURM055364 FBI054869

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055365 FBI054870

NaJional Planning Scenarios: Attack Timelines FOR OFFIOAL USE Ol'<'L Y/ Version 1 7.4 FINAL DRAFT 7-11 ACLURM055366 FBI054871

National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONL Yl Scenario 8: Chemical Attack - ACLURM055367 FBI054872

National Planning Scenarios: Attack TimeJines FOR OFFICIAL USE ONL Yl Version 17.4 Fll'IAL DRAFT ACLURM055368 FBI054873

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055369 FBI054874

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORC&"\-lENT SENSITIVE Version 17.4 FL'IAL DRAFT ACLURM055370 FBI054875

Nalionai Planning Scenarios: Attack Timelines FOR OFFICIA.L USE ONLY/ LAW ENrORCE!'viENT SENSITIVE Version 1 7.4 FINAL DRAFT ACLURM055371 FBI054876

National Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055372 FBI054877

Natio11al Plan11i11g Sce11arios: illtack Timelines FOR OFFICIAL USE ONLY/ 8-7 ACLURM055373 FBI054878

National Pi(]Jlning &enarios: Attack Timeiines FOR OFFICI..Q USE ONLY/ LAW ENFORCEJMENT SENSITIVE Scenario 9: Natural Disaster - ACLURM055374 9-1 FBI054879

NaJional Planning Scenanos:.4/lack Timelines FOR OFFICIAL USE ONLY/ Scenario 10: Natural Disaster - 10-1 ACLURM055375 FBI054880

National Planning Scenarios:.Wack Timelines FOR OFFICIAL USE 01'-i"L Y/ Scenario 11 : ical Attack - ACLURM055376 FBI054881

National Planning Scenarios: Attack Ti melines FOR OFFICIAL USE ONLY/ LAW El'<'FORCEMENT SENSITIVE ACLURM055377 FBI054882

NaJionai Planning Scenarios: Attack Time:Jines FOR OFFICIAL USE ONLY/ ACLURM055378 11-3 FBI054883

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055379 FBI054884

National PllJJining Scenarios: Attack Time lines FOR OFFICIAL USE Ol'>L Yl Version l 7 A FINAL DRAFT ACLURM055380 FBI054885

NaJional Planning Scenarios: Allack Ti meiines FOR OFFICIAL USE O~'L Y/ ACLURM055381 FBI054886

Na!ional Planning Scenarios: Auack Timeiines FOR OFFICIAL USE 0!\"L Yf Version 1 7.4 FINAL DRAFT ll-7 ACLURM055382 FBI054887

Na1io1rai Plnnning Scenarios: A/lack Timelines FOR OFFICIAL USE ONL Yl Version 17.4 FINALDRAFT Scenario 12: Explosives Attack - ACLURM055383 FBI054888

National Planning Scenarios: Attack Time Jines FOR OFFICIAL USE ONLY/ ACLURM055384 FBI054889

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version l 7.4 FINAL DRAFT ACLURM055385 FBI054890

National Planning &enarios:.4ttack Timelines FOR OFFICIJ\L USE ONL Yl ACLURM055386 FBI054891

NaJional Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055387 FBI054892

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE Ol:\1. Y/ ACLURM055388 FBI054893

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055389 FBI054894

Nmionai Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONL Yl Version 1 7.4 FINAL DRAFT ACLURM055390 12-8 FBI054895

National Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT Scenario 13: Biological Attack - ACLURM055391 FBI054896

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01\'L Y/ ACLURM055392 FBI054897

National Planning Scenarios: Attack Timelines FOR OFFICii\L USE ONLY/ LAW E:C.'FORCEMENT SENSITIVE Version 1 7.4 FL"'AL DRAFT 13-3 ACLURM055393 FBI054898

NaJional Planning Scenarios: Attack Timetines FOR OFFICIAL USE O"Nl.. Y/ ACLURM055394 FBI054899

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 HNAL DRAFT ACLURM055395 FBI054900

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055396 FBI054901

Natioool Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055397 FBI054902

NaJionai Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ ACLURM055398 FBI054903

National Planning Scenarios: A/lack Timeiines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT 13-9 ACLURM055399 FBI054904

Nalionai Planning Scenarios: Allack Timelines FOR OFFICIAL USE 0"1-<'L Y/ Scenario 14: Biological Attack - ACLURM055400 FBI054905

National Planning Scenarios: A flack TimeJines FOR OFFICIAL USE ONLY/ LAW ENFORCEMENt' SENSITIVE ACLURM055401 FBI054906

Nalio11<1i Planning Scenarios: A/lack Timelines FOR OFFICIAL USE ONLY/ Version I 7. 4 FINAL DRAFT ACLURM055402 FBI054907

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONl.. Y/ Version 17.4 FL~ALDRAFT ACLURM055403 FBI054908

National Planning &enarios: Allack TimeJines FOR OFFICIAL USE ONLY/ LAW ENFORCEME:NI' SENSI'nVE Version 17.4 Fil"'AL DRAFT ACLURM055404 FBI054909

NaJionai Planning Scenarios: Attack Timelines FOR OFFICIAL USE O~"L Yl Version l 7 A FINAL DRAFT 14-6 ACLURM055405 FBI054910

NaJionai Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7 4 FINAL DRAFT Scenario 15: ber Attack ACLURM055406 FBI054911

National Planning Scenarios: Allack Timelines FOR OFFICIAL USE ONl. Y/ Version l 7.4 FINAL DRAFT ACLURM055407 FBI054912

NarionaJ Planning Scenarios: A/lack Timelines FOR OFFICIAL USE ONL Yf ACLURM055408 FBI054913

NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01\l Y/ Version l i A FINAL DRAFT ACLURM055409 FBI054914

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 F1"lALDRAFT ACLURM055410 FBI054915

,VaJional Planning Scenarios: A1tack Timetines FOR OFFICIAL USE ONLY/ LAW ENFORCEME r.t SENSITIVE ACLURM055411 FBI054916

NaJiona/ Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW El-WORCEMENT SENSITIVE ACLURM055412 FBI054917

National PiMning Scenarios: Allack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FL'\IAL DRAFT ACLURM055413 FBI054918

National Planning &enarlos: Attack Timelines FOR OFFICIAL USE Ol>.TL Y/ ACLURM055414 FBI054919

Na!ional Planning Scenarios: Attack 11melines FOR OFFICIAL USE Oh'L Yl LAW E:t-.'FORCEMENT SENSITIVE ACLURM055415 FBI054920

National Planning Scenarios: Attack Timelines FOR OFFICIAL USE.O:N1.Y/ ACLURM055416 FBI054921

National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7 A FINAL DRAFT ACLURM055417 FBI054922

National Planning &enarios: Attack Timelines FOR OFFICIAL USE 01'-;L Y/ LAW E!-.lFORCEMENT SENSITIVE ACLURM055418 FBI054923

National Planning Scenarios: Attack Timelines FOR OFFIC!l\L USE ONLY/ Version! i.4 FINAL DRAFT ACLURM055419 FBI054924

National Planning Scenarios: Attack Timetines FOR OFFICIAL USE ONLY/ 15-15 ACLURM055420 FBI054925

National Planning Scenarios: FOR OFFICIAL USE ONL Yf AitackTimelines APPENDIX: UA Development Members l11e UA and associated scenario prequels were developed by Applied Marine Technologies, Inc. (AMTI), principal contractor to OPIA, DRS. The AMTI team is comprised of personnel from diverse backgrounds, including: special operations planning and execution, intelligence collection and analysis, terrorism and insurgency studies, information technology, Arabic language and culture, screenwriting, research, and journalism. APPENDIX: U4 Development lvfembers A-1 ACLURM055421 FBI054926