CPNI 2016 Hostile Recconnaissance Guidance
CPNI 2016 Hostile Recconnaissance Guidance
HOSTILE RECONNAISSANCE
Understanding and countering the threat
June 2016
Disclaimer
Reference to any specific commercial product, process or service by trade name, trademark,
manufacturer or otherwise, does not constitute or imply its endorsement, recommendation, or
favour by CPNI. The views and opinions of authors expressed within this document shall not be
used for advertising or product endorsement purposes.
To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage
(whether direct, indirect or consequential and including, but not limited to, loss of profits or
anticipated profits, loss of data, business or goodwill) incurred by any person and howsoever
caused arising from or connected with any error or omission in this document or from any
person acting, omitting to act or refraining from acting upon, or otherwise using, the
information contained in this document or its references. You should make your own
judgement as regards use of this document and seek independent professional advice on your
particular circumstances.
OFFICIAL
OFFICIAL
Contents
Overview and aim of the guidance 2
1
OFFICIAL
OFFICIAL
Based on over five years of research and extensive testing and evaluation, this guidance gives
security managers an understanding of why and how hostile reconnaissance is conducted, and the
principles of how to disrupt threats during the reconnaissance phase, along with practical
measures on how to reduce the vulnerability of their site.
Critically, the approaches and suite of tools provided in this guidance have been carefully
developed to disrupt hostile reconnaissance while having a neutral, informing or even reassuring
and recruiting effect on the normal site user. They also focus on utilising existing protective
security resources such as CCTV control rooms, security officers and other important resources,
such as corporate communications and employees, more effectively to disrupt hostile
reconnaissance.
This guidance first provides an overview of hostile reconnaissance in the context of the attack
planning process: how to consider the threats an organisation faces from this perspective, the
hostile’s information requirements, where they will get this information from and how they feel
when doing so.
With this understanding, the guidance then provides the Centre for the Protection of National
Infrastructure’s (CPNI) principles of disrupting hostile reconnaissance: Deny, Detect and Deter. It
explains how understanding these, in combination with a recognition of the threat, can help
determine an organisation’s current vulnerability to hostile reconnaissance and what can be done
to counter this.
The final section includes a checklist to provide a method of assessing a site’s vulnerability to
hostile reconnaissance.
This guidance uses the term ‘hostile’ to refer to the individual or group conducting the
reconnaissance.
2
OFFICIAL
OFFICIAL
But while these threats and their aims may vary, hostiles are united in their desire to succeed.
Recognising they may not get a second chance to achieve their aims, hostiles will typically plan
carefully.
By using online research, on-site visits and, if and where necessary, insider knowledge, the hostile
will try to obtain enough detailed information and get sufficient certainty about the reliability of
this information to inform their modus operandi and be sure of success.
Generally, the more sophisticated the attack the more complex the attack planning, and
consequently the greater the information requirement and reconnaissance need. The
information gathered is typically used by hostiles to assess the state of security and likelihood of
detection; to assess vulnerabilities in security and to assess likelihood of success.
• denying them the ability to obtain the information they need from their research because
they simply cannot obtain it, or they could but the risk of detection to achieve this is too
high
• promoting failure – both of their ability to conduct hostile reconnaissance (they will not
be able to get the information, they will be detected) and of the attack itself
These effects can be achieved because in the process of conducting hostile reconnaissance the
hostiles are making themselves vulnerable – they are online and at the site looking for and
obtaining this vital information.
Protective security can therefore be focussed in the following manner: to deny the hostile the
opportunity to gain information, to detect them when they are conducting their reconnaissance
and to deter them by promoting failure through messaging and physical demonstration of the
effective security. This approach will play on their concerns of failure and detection.
The key to disruption comes from understanding the information hostiles need, and where they
are going to have to go to get this and their state of mind. This, in turn, is dependent on
understanding the threats in a way that enables prediction of likely attack scenarios.
It is important that an organisation understands the threats it faces. Not all threats are applicable
to all organisations so it is important that a security department understands what it is defending
against.
3
OFFICIAL
OFFICIAL
While an organisation may face a variety of different threats with different attack scenarios, there
are likely to be commonalities in information requirements across these. Therefore measures put
in place to disrupt hostile reconnaissance can be effective over a wide range of threats.
Given that not all threats are the same, a useful way of understanding those particular to an
organisation is to consider the mindset of the hostile.
This is what the hostile wants to achieve. Think about their overall aim as
Intent this will help identify the effect the hostile wants the particular attack to
have
This is about the resources at the hostile’s disposal. Think about equipment,
Capability time, personnel, skills and training, financial backing and geographic
location
Culture This is the hostile’s personal motivations and appetite for risk
A security manager may not be able to answer every question relating to a hostile’s mind-set but
by attempting to understand it they can better determine likely attack scenarios, and therefore
what information is needed, and where they will go (online, onsite, inside knowledge) to get this.
Security managers should revisit and update these scenarios regularly as their understanding of
their threats evolves. As each route is closed to hostiles, the more motivated and those flexible in
time and resources may continue to look at alternative ways to achieve their aims, including the
use of insiders (those that use their legitimate access to an organisation to cause harm).
Conducting this assessment across all the main threats will enable an organisation to identify
commonalities in information requirements. This assessment will enable the security manager to
focus their protective security measures, whether cyber, personnel or physical, more effectively
to disrupt a range of hostile groups and to be as effective as possible if the threat increases.
The next section will examine the principles of countering hostile reconnaissance.
4
OFFICIAL
OFFICIAL
The diagram on page eight illustrates the relationship between these three key components of
disruption and, if done well, the effects of these on the mindset and assessment of the hostile.
5
OFFICIAL
OFFICIAL
Denying what they need can also mean creating uncertainty and unpredictability about security
arrangements at a site. For example, unpredictable timing, type and location of security patrols
makes it difficult to determine a pattern of activity that they can exploit with any confidence.
Deterrence is a vital component of disrupting hostile reconnaissance. Deterrence is, for a majority
of sites and organisations, the main desired effect of their protective security on hostiles. In many
cases it is assumed that because protective security measures are in place they are, by default,
deterring. To get the most out of deterrence for a site requires proactive effort by the
organisation.
CPNI defines deterrence as: “The intelligent, co-ordinated promotion of protective security
provision to the hostile that results in the perception and/or assessment that the reconnaissance
or the attack itself will fail.”
6
OFFICIAL
OFFICIAL
For example, an organisation may have an excellent employee vigilance and reporting culture,
with staff reporting in suspicious activity immediately and security officers officers responding
rapidly. This can be hugely deterring to the hostile – it’s not just CCTV and security officers they
need to worry about spotting them, everyone could be watching.
These effects work for a multitude of protective security capabilities. Of course, this has to be
done carefully and needs to be achieved in a way that doesn’t give hostiles the information they
are looking for.
How to proactively promote DENY and DETECT capabilities to DETER
How an organisation provides its messages and evidence of these capabilities needs to be done
carefully and thoughtfully. For example, being considerate of the normal site user and their
perceptions of such messages (ideally to be reassuring and informative or to have a neutral
effect), and critically, to convey the protective security without giving away detail that could be
helpful to hostiles
It is important to see this not just as a one-off requirement. Hostiles will potentially be coming
back many times online and at the site, so it is important to keep the ‘drumbeat’ going in terms of
promoting capabilities.
Where possible, use video and pictures – social media is an excellent platform for this – to help
provide credible evidence that these capabilities exist and work. For these reasons, ‘co-ordinated’
is also an important term in CPNI’s definition of deterrence. For example, if an organisation has
just had CCTV cameras upgraded, there is a perfect opportunity to put out a news story in the
publically-available site magazine, informing about its effectiveness but without giving away too
much technical information that would assist the hostile.
However there is an important caveat to the promotion of DENY and DETECT capabilities. Any
promotion of capabilities must be truthful. If it isn’t, the hostile will soon uncover this deceit,
with the resulting effect of potentially not believing anything that an organisation has highlighted
and potentially even motivating them to continue.
7
OFFICIAL
OFFICIAL
When thinking about these, security managers should ask themselves the questions on the
following pages and if they are unable to answer them, they should consult the CPNI or the
National Association of Counter Terrorism Security Officers (NaCTSO) websites, or they should
speak to their CPNI adviser or Counter Terrorism Security Advisor (CTSA).
8
OFFICIAL
OFFICIAL
9
OFFICIAL
OFFICIAL
Do your CCTV operators know what Improved effectiveness of CCTV operators in deterring
to look for in terms of hostile and detecting hostile reconnaissance.
reconnaissance?
CPNI advice
The CPNI website – www.cpni.gov.uk provides more information on how to deter hostile
reconnaissance.
If the hostile is unable to gather the information they require from their online or on-site
reconnaissance, they may attempt to recruit an insider to help achieve their aims.
To help mitigate the threat of insiders, CPNI has produced a range of personnel security guidance
products and training based around the following four components:
When applied consistently, personnel security measures not only reduce operational
vulnerabilities, they can also help build a hugely beneficial security culture at every level of an
organisation. Robust personnel security helps organisations to:
10
OFFICIAL
OFFICIAL
• minimise the chances of staff becoming unreliable once they have been employed
• detect suspicious behaviour and resolve security concerns once they emerge
Physical security
CPNI has also produced a range of physical security guidance products and training looking at the
following areas:
Utilisation of and, where appropriate, demonstration of efficient physical security measures will
help with countering hostile reconnaissance.
A good starting point to help plan the implementation of security measures is to read CPNI’s
Guide to Producing Operational Requirements for Security Measures. This lays out a systematic
assessment process and has been successfully used in many organisations.
11
OFFICIAL