FOR OFFICIAL USE ONLY/ Version 17 4 FINAL DRAFT NATIONAL PLANNING SCENARIOS: Attack Timelines Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities March 2006 ACLURM055309 FBI054814
TI1is page intentionally left blank. ACLURM055310 FBI054815
NaJionai Planning Scenarios: FOR OFFICIAL USE ONL Yl Attack Timeiines Contents Introduction... ii Scenario 1: Nuclear Detonation Scenario 2: Biological Attack Scenario 3: Biological....,,..."'"'" Scenario 5: Chemical Attack Scenario 6: Chemical Attack Scenario 7: Chemical Attack Scenario 8: Chemical Attack Scenario 9: Natural Disaster Scenario 10: Natural Disaster Scenario 11: Radiological ~u.." '"'" Scenario 13: Biological Attack Scenario 14: Biological Attack... 1-1... 2-1... 3-1... 4-1... 5-1... 6-1... 7-1... 8-1... 9-1... 10-1... 11-1... 12-1... 13-1... 14-1 Scenario 15: Cyber Attack...:... 15-1 Appendix: Scenario Working Group Members... A-1 Contents ACLURM055311 FBI054816
National Pla:nning Scenarios: FOR OFFICIAL ljse Ot-..1.. Y/ Attack 1/melines Introduction The Federal interagency community has developed 15 all-hazards National Planning Scenarios for use in national, Federal, State, and local homeland security preparedness activities. The scenarios are planning tools and represent the range of potential terrorist attacks and natural disasters and the related impacts that face our Nation. The objective was to develop a minimum number of credible scenarios to establish the range of response requirements to facilitate preparedness planning. Value of the Scenarios to State and Local Leaders TI1e scenarios were designed to help state and local leaders further develop their capacity to prevent acts of terrorism within their communities and to prepare response capabilities to an event should it occur. TI1ese scenarios reflect a rigorous analytical effort by Federal homeland security experts, with reviews by State and local homeland security representatives. However, refinement and revision will be necessary over time to ensure that the scenarios remain accurate, represent the evolving all-hazards threat picture, and embody the capabilities necessary to respond to domestic incidents. In keeping with the congressional mandate that terrorist threats must be "current and real", the Department of Homeland Security (DHS) is developing a Universal Adversary (UA) database to host and maintain terrorist threat models. At present, the UA database contains six distinct categories of terrorist threats, fifteen specific terrorist group profiles, dossiers on key terrorist actors, in-depth descriptions of tactics employed by each group, and sufficient background information for the generation of exercise related intelligence. The National Planning Scenarios and the Universal Adversary (UA) as Tools in the Capabilities-Based Planning Process Capabilities-Based Planning In seeking to prepare the Nation for terrorist attacks, major disasters, and other emergencies, it is impossible to maintain the highest level of preparedness for all possibilities all of the time. Given limited resources, managing the risk posed by major events is imperative. In an atmosphere of changing and evolving threats, it is vital to build flexible capabilities that will enable the Nation to prevent, respond to, and recover from a range of major events. To address this challenge, DHS employs a capabilitiesbased planning process that occurs under uncertainty to identity capabilities suitable for a wide range of challenges and circumstances. The process also works within an economic framework that necessitates prioritization and choice. As one of the principal tools in the capabilities-based planning process, the National Planning Scenarios provide a bounded threat universe to address the question: "How prepared do we need to be?" Figure 1 depicts the relationship between the scenarios and the other capabilities-based planning tools. As a first step in the capabilities-based planning process, the scenarios, while not exhaustive, provide an illustration of the potential threats for which we must be prepared. The scenarios and the UA database will be used to assess relative risk for the capabilities- Introduction ii ACLURM055312 FBI054817
NaJional Planning Scenarios: FOR OFFICIAL USEONL Y/ AttackTimelines based planning process and provide a framework for appropriately designing and scaling ~xercises specific to location and population characteristics. ---+NATIONAL LEVEL POLICY & PLANNING GUIDANCE Figure 1. Tools for the Capabilities-Based Planning Process HSPD-8 Implementation 1l1e scenarios and the UA database will be used in the implementation of Homeland Security Presidential Directive (HSPD)-8 "National Preparedness," including the development of the National Preparedness Goal and National Exercise Program. In helping to develop the National Preparedness Goal, the scenarios and the UA database provide the fotmdation for identifying the capabilities across all mission areas and the target levels of those capabilities needed for effective prevention of, response to, and recovery from major events. Figure 2 illustrates how the scenarios, UA, Target Capabilities List (TCL) and the Universal Task List (UTL) leads planners at all jurisdictional levels to identify common tasks and capabilities for a given mission area, in this instance the Prevention Mission. LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET CAPABILITIES & CRITICAL TASKS NPS 'CRITICAL TASKS TARGET Figure 2. Capabilities-Based Planning and the Prevention.Mission Introduction Ill ACLURM055313 FBI054818
National Planning Scenarios: FOR OFFICIAL USE 0'\1.. Yl Attack Timelines National Planning Scenarios, UA, Red Teams in the National Exercise Program In addition to their use as tools in the capabilities-based planning process, the scenarios and the supporting UA also provide the design basis for exercises in the National Exercise Program (NEP). Used as a common foundation for exercise development, the scenarios complemented by current threat information from the UA database ensures exercise participants focll<; on performing the appropriate critical tasks and will assess capabilities linked to specific homeland security mission areas. The UA detail provided in the following scenarios provides examples of how terrorist groups (or individuals) having the capability, motivation and intent could execute an attack to achieve the outcomes described at the beginning of each scenario. To address exercise design requirements specitic to an individual exercise or exercise series, scenario threat models can be modified using current threat information from the UA database. There may be instances when assessing mission critical tasks and capabilities requires employment of analytical or operational Red Teams. The use of Red Teams is prescribed by the National Strategy for Homeland Security. Through the application of homeland security intelligence and information, Red Teams view the United States from the perspective of terrorists to discern and predict the methods, means, and targets of potential attackers during government sponsored exercises. 1 Red Teams are comprised of individuals selected for their special subject-matter expertise, perspective (professional, cultural), imagination, and penchant for critical analysis. Red Team members have access to terrorism subject matter experts, intelligence and law enforcement professionals throughout the world, and receive extensive cultural and tactical training in preparation for each exercise event. Employing the Scenarios, UA and Red Team in Prevention Exercises Figure 3 provides an example of how the scenarios and the UA are related to the capabilities-based planning process~ how the scenarios and U A are used in conjunction with the capabilities-based planning tools to assist state, local and tribal government planning and exercise design and; how the scenarios, the UA and Red Teams are used during the exercise lifecycle of a Prevention Exercise. 1 OtTice of Homeland Security. National Strategy for Homeland Security. July 2002. Introduction iv ACLURM055314 FBI054819
National Plannmg Scenarios:,41/ack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 Fll"'ALDRAFT r - -. - NATIONAL LEVEL POLICY & PLANNING GUIDANCE I LOCALIZED THREAT, STATE, LOCAL & TRIBAL TARGET.CAPABILITIES & CRITICAL TASKS PREVENTION EXERCISE LIFECYCLE Figure 3. Capabilities-Based Planning and Prevention Exercise Lifecycle Introduction v ACLURM055315 FBI054820
National PlaJining Scenarios: FOR OFFICIAL USE ONL Yl Attack Timelines Considerations Although not meant to be all-inclusive, the scenarios provide a basic set of common homeland security events and their related impacts that can be employed at the national level or by state, local and tribal jurisdictional authorities. Employing up-to-date information from the UA database, the scenarios have been developed so that theycan be adapted to local conditions. Agencies will not be limited to this set of scenarios, and they can exercise scenarios that are not included in the planning set. However, the scenarios provide a mutual starting point for agencies that exercise the basic events included in this set. Intelligence Disclaimer Although the scenarios generally reflect possible terrorist capabilities and known tradecra.ft, neither the intelligence community nor the law enforcement community is aware of any credible specific intelligence that indicates that such an attack is being plrumed, or that the agents or devices in question are in possession of any known terrorist group. Relative Grouping of Scenarios Various schemes have been used to rank scenarios based on probability, number of casualties, extent of property drunage, economic impa'-1, and social disruption. Because the scenarios in this set were developed to test the full range of response capabilities and resources-and to assist Federal, State, and local governments as well as the private sector in preparing for such events-they have not been ranked. The groupings of UA elements with specific scenarios are not intended to isolate potential terrorist threats to an individual type or class of terrorist element. Instead, the use of ditierent UA elements is intended to illustrate the many types of capabilities and motivations that might exist. Multiple Events In preparedness planning etiorts, organizations should always consider the need to respond to multiple incidents of the same type and multiple incidents of different types, at either the srune or other geographic locations. These incidents will invariably require the coordination and cooperation of homeland security response organizations across multiple regional, State, and local jurisdictions. Introduction vi ACLURM055316 FBI054821
Naiionai Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW ENFORC'EMENT SENSITIVE Version 1 7.4 FINAL DRAFT Scenario 1: Nuclear Detonation - ACLURM055317 FBI054822
NaJional Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONLY/ ACLURM055318 FBI054823
National Plmllling Scenarios: Attack Time lines FOR OFFICIAL USE ONL Yl LAW ENFORCFMENT SENSITIVE ACLURM055319 FBI054824
National Planning Scenarios:. Wack 1lmelines FOR OFFICIAL USE O:N1.. Yl Version 17A FINAL DRAFT ACLURM055320 FBI054825
NaJional Planning Scenarios:.4ttack Tirnelines FOR OFFICIAL USE ONLY/ ACLURM055321 FBI054826
National PiaJ!ning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yi Version 17.4 Fll"'AL DRAFT ACLURM055322 FBI054827
National Planning Scenarios.4/lack Time lines FOR OFFiCIAL USE ONLY/ L AW ENFORCEMENT SENSITIVE ACLURM055323 FBI054828
National Planning &enarlos: Attack Time lines FOR OFFICIAL USE ONL Yf Scenario 2: ical Attack - ACLURM055324 FBI054829
Narional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055325 FBI054830
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055326 FBI054831
National Planning Scenarios: Attack Timetines FOR OFFICIAL USE O:r-.1.. Y/ Version 17.4 FL"'AL DRAFT ACLURM055327 FBI054832
NaJionai Pft1J1ning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORCElVfENT SENSITIVE Version l i.4 FINAL DRAFT ACLURM055328 FBI054833
NaJionai Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055329 2-6 FBI054834
NaJional P/(1J1ning Scenarios: FOR OFFICIAL USE ONLY/ Attack Timelines Scenario 3: Biological Disease Outbreak - 3-1 ACLURM055330 FBI054835
NaJional Planning Scenarios: Attack Ti mel.ines FOR OFFIQAL USE ONL Yl Version I 7.4 FINAL DRAFT Scenario 4: Biological Attack - ACLURM055331 FBI054836
NaJionai Planning Scenarios: Attack Time lines FOR OFFICIAL USE 0~1.. Y/ Version I 7.4 FINAL DRAFT ACLURM055332 FBI054837
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW E:N"FORCEMENT SENSITIVE ACLURM055333 FBI054838
NaJional Planning &enarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055334 FBI054839
National Planning Scenarios: A/tack Timelines FOR OFFICIAL USE ONL Yl ACLURM055335 FBI054840
National Planning Scenarios:, 4ttack Time tines FOR OFFICIAL USE ONL Yl Version l7a FINAL DRAFT ACLURM055336 FBI054841
NaJional PliJJtning Scenarios: Attack Timelines FOR OFFICIAL USE O:N1. Y/ Version 17.4 FL~AL DRAFT ACLURM055337 FBI054842
National Planning Scenarios: Attack Ti metin.es FOR OFFICIAL USE ONLY/ Version 17.4 Fli'IAL DRAFT ACLURM055338 FBI054843
NaJionai Planning Scel'lllrios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW El'lFORCEMENT SENSITIVE 4-9 ACLURM055339 FBI054844
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORCEJ'v!ENT SENSITIVE Scenario 5: Chemical Attack - ACLURM055340 FBI054845
National Planning &enarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT ACLURM055341 FBI054846
National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ ACLURM055342 FBI054847
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055343 FBI054848
NaJional Planning &enarios: Attack Tirne/ines FOR OFFICIAL USE ONL Yl Version 1 7.4 FINAL DRAFT ACLURM055344 FBI054849
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01'-<'L Y/ Version 17.4 F'INAL DRAFT ACLURM055345 FBI054850
National Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT ACLURM055346 FBI054851
National Plmming Scenarios: Attack Time lines FOR OFFICIAL USE ONl.. Y/ Version l 7.4 FINAL DRAFT ACLURM055347 FBI054852
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Scenario 6: Chemical Attack - ACLURM055348 FBI054853
NaJional Planning Scenarios: A/lack Time lines FOR OFFICIAL USE ONLY/ Version 17.4 FL"'AL DRAFT ACLURM055349 FBI054854
Naiional Planning Scenarios: Attack Timelines FOR OFFICI..!\L USE ONLY/ Version l7a FINAL DRAFT ACLURM055350 FBI054855
National Planning Scenarios: A/lack Time lines FOR OFFICIAL USE ONLY/ ACLURM055351 FBI054856
National Planning Scenarios: A/tack Timelines FOR OFFICIAL USE ONLY/ ACLURM055352 FBI054857
NaiionaJ Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONL Yl L AW ENFORCEMENT SENSITIVE ACLURM055353 FBI054858
NaJional Planning &enarios: Allack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055354 FBI054859
National Planning.'icenarlos: Attack Timelines FOR OFFICIAL USE ONL Yl Version 1 7.4 Fli"'AL DRAFT ACLURM055355 FBI054860
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ON1.. Y/ L AW ENFORCEMENT SENSITIVE Scenario 7: Chemical Attack - ACLURM055356 FBI054861
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055357 FBI054862
NaJionai Planning &enarios: Attack Time lines FOR OFFICIAL USE O:NL Y/ ACLURM055358 FBI054863
NaJional Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONLY/ ACLURM055359 FBI054864
NaJionaJ Planning Scenarios: Attack Timelines FOR OFFIOAL USE ONLY/ LAW ENFORCEl'\fENT SENSITIVE ACLURM055360 FBI054865
National Planning &enarios: A/tack 1imelines FOR OFFICIAL USE ONLY/ ACLURM055361 FBI054866
Naiional Planning Scenarios: Attack Timelines FOR OFFICIAL USE Ol'i"L Y/ LAW E1'i'FORCEMENT SENSITIVE ACLURM055362 FBI054867
NaJional Planning Scenarios< Attack Timelines FOR OFFICI.A..L USE ONLY/ LAW ENFORC9.lENT SENSITIVE Version 1 7.4 FINAL DRAJ<'T ACLURM055363 FBI054868
National Planning Scenarios: Attack Timetines FOR OFFICIAL USE ONLY/ ACLURM055364 FBI054869
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055365 FBI054870
NaJional Planning Scenarios: Attack Timelines FOR OFFIOAL USE Ol'<'L Y/ Version 1 7.4 FINAL DRAFT 7-11 ACLURM055366 FBI054871
National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONL Yl Scenario 8: Chemical Attack - ACLURM055367 FBI054872
National Planning Scenarios: Attack TimeJines FOR OFFICIAL USE ONL Yl Version 17.4 Fll'IAL DRAFT ACLURM055368 FBI054873
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055369 FBI054874
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ LAW ENFORC&"\-lENT SENSITIVE Version 17.4 FL'IAL DRAFT ACLURM055370 FBI054875
Nalionai Planning Scenarios: Attack Timelines FOR OFFICIA.L USE ONLY/ LAW ENrORCE!'viENT SENSITIVE Version 1 7.4 FINAL DRAFT ACLURM055371 FBI054876
National Planning &enarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055372 FBI054877
Natio11al Plan11i11g Sce11arios: illtack Timelines FOR OFFICIAL USE ONLY/ 8-7 ACLURM055373 FBI054878
National Pi(]Jlning &enarios: Attack Timeiines FOR OFFICI..Q USE ONLY/ LAW ENFORCEJMENT SENSITIVE Scenario 9: Natural Disaster - ACLURM055374 9-1 FBI054879
NaJional Planning Scenanos:.4/lack Timelines FOR OFFICIAL USE ONLY/ Scenario 10: Natural Disaster - 10-1 ACLURM055375 FBI054880
National Planning Scenarios:.Wack Timelines FOR OFFICIAL USE 01'-i"L Y/ Scenario 11 : ical Attack - ACLURM055376 FBI054881
National Planning Scenarios: Attack Ti melines FOR OFFICIAL USE ONLY/ LAW El'<'FORCEMENT SENSITIVE ACLURM055377 FBI054882
NaJionai Planning Scenarios: Attack Time:Jines FOR OFFICIAL USE ONLY/ ACLURM055378 11-3 FBI054883
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055379 FBI054884
National PllJJining Scenarios: Attack Time lines FOR OFFICIAL USE Ol'>L Yl Version l 7 A FINAL DRAFT ACLURM055380 FBI054885
NaJional Planning Scenarios: Allack Ti meiines FOR OFFICIAL USE O~'L Y/ ACLURM055381 FBI054886
Na!ional Planning Scenarios: Auack Timeiines FOR OFFICIAL USE 0!\"L Yf Version 1 7.4 FINAL DRAFT ll-7 ACLURM055382 FBI054887
Na1io1rai Plnnning Scenarios: A/lack Timelines FOR OFFICIAL USE ONL Yl Version 17.4 FINALDRAFT Scenario 12: Explosives Attack - ACLURM055383 FBI054888
National Planning Scenarios: Attack Time Jines FOR OFFICIAL USE ONLY/ ACLURM055384 FBI054889
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version l 7.4 FINAL DRAFT ACLURM055385 FBI054890
National Planning &enarios:.4ttack Timelines FOR OFFICIJ\L USE ONL Yl ACLURM055386 FBI054891
NaJional Planning Scenarios: Attack Time/ines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055387 FBI054892
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE Ol:\1. Y/ ACLURM055388 FBI054893
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT ACLURM055389 FBI054894
Nmionai Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONL Yl Version 1 7.4 FINAL DRAFT ACLURM055390 12-8 FBI054895
National Planning Scenarios: Attack Time lines FOR OFFICIAL USE ONLY/ Version 1 7.4 FINAL DRAFT Scenario 13: Biological Attack - ACLURM055391 FBI054896
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01\'L Y/ ACLURM055392 FBI054897
National Planning Scenarios: Attack Timelines FOR OFFICii\L USE ONLY/ LAW E:C.'FORCEMENT SENSITIVE Version 1 7.4 FL"'AL DRAFT 13-3 ACLURM055393 FBI054898
NaJional Planning Scenarios: Attack Timetines FOR OFFICIAL USE O"Nl.. Y/ ACLURM055394 FBI054899
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 HNAL DRAFT ACLURM055395 FBI054900
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ ACLURM055396 FBI054901
Natioool Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl ACLURM055397 FBI054902
NaJionai Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ ACLURM055398 FBI054903
National Planning Scenarios: A/lack Timeiines FOR OFFICIAL USE ONLY/ Version I 7.4 FINAL DRAFT 13-9 ACLURM055399 FBI054904
Nalionai Planning Scenarios: Allack Timelines FOR OFFICIAL USE 0"1-<'L Y/ Scenario 14: Biological Attack - ACLURM055400 FBI054905
National Planning Scenarios: A flack TimeJines FOR OFFICIAL USE ONLY/ LAW ENFORCEMENt' SENSITIVE ACLURM055401 FBI054906
Nalio11<1i Planning Scenarios: A/lack Timelines FOR OFFICIAL USE ONLY/ Version I 7. 4 FINAL DRAFT ACLURM055402 FBI054907
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONl.. Y/ Version 17.4 FL~ALDRAFT ACLURM055403 FBI054908
National Planning &enarios: Allack TimeJines FOR OFFICIAL USE ONLY/ LAW ENFORCEME:NI' SENSI'nVE Version 17.4 Fil"'AL DRAFT ACLURM055404 FBI054909
NaJionai Planning Scenarios: Attack Timelines FOR OFFICIAL USE O~"L Yl Version l 7 A FINAL DRAFT 14-6 ACLURM055405 FBI054910
NaJionai Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7 4 FINAL DRAFT Scenario 15: ber Attack ACLURM055406 FBI054911
National Planning Scenarios: Allack Timelines FOR OFFICIAL USE ONl. Y/ Version l 7.4 FINAL DRAFT ACLURM055407 FBI054912
NarionaJ Planning Scenarios: A/lack Timelines FOR OFFICIAL USE ONL Yf ACLURM055408 FBI054913
NaJional Planning Scenarios: Attack Timelines FOR OFFICIAL USE 01\l Y/ Version l i A FINAL DRAFT ACLURM055409 FBI054914
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONLY/ Version 17.4 F1"lALDRAFT ACLURM055410 FBI054915
,VaJional Planning Scenarios: A1tack Timetines FOR OFFICIAL USE ONLY/ LAW ENFORCEME r.t SENSITIVE ACLURM055411 FBI054916
NaJiona/ Planning Scenarios: Attack Timelines FOR OFFICIAL USE ONL Yl LAW El-WORCEMENT SENSITIVE ACLURM055412 FBI054917
National PiMning Scenarios: Allack Timelines FOR OFFICIAL USE ONLY/ Version I 7.4 FL'\IAL DRAFT ACLURM055413 FBI054918
National Planning &enarlos: Attack Timelines FOR OFFICIAL USE Ol>.TL Y/ ACLURM055414 FBI054919
Na!ional Planning Scenarios: Attack 11melines FOR OFFICIAL USE Oh'L Yl LAW E:t-.'FORCEMENT SENSITIVE ACLURM055415 FBI054920
National Planning Scenarios: Attack Timelines FOR OFFICIAL USE.O:N1.Y/ ACLURM055416 FBI054921
National Planning Scenarios: Attack Timeiines FOR OFFICIAL USE ONLY/ Version 1 7 A FINAL DRAFT ACLURM055417 FBI054922
National Planning &enarios: Attack Timelines FOR OFFICIAL USE 01'-;L Y/ LAW E!-.lFORCEMENT SENSITIVE ACLURM055418 FBI054923
National Planning Scenarios: Attack Timelines FOR OFFIC!l\L USE ONLY/ Version! i.4 FINAL DRAFT ACLURM055419 FBI054924
National Planning Scenarios: Attack Timetines FOR OFFICIAL USE ONLY/ 15-15 ACLURM055420 FBI054925
National Planning Scenarios: FOR OFFICIAL USE ONL Yf AitackTimelines APPENDIX: UA Development Members l11e UA and associated scenario prequels were developed by Applied Marine Technologies, Inc. (AMTI), principal contractor to OPIA, DRS. The AMTI team is comprised of personnel from diverse backgrounds, including: special operations planning and execution, intelligence collection and analysis, terrorism and insurgency studies, information technology, Arabic language and culture, screenwriting, research, and journalism. APPENDIX: U4 Development lvfembers A-1 ACLURM055421 FBI054926