Antiterrorism Training

428 views
324 views

Published on

Suspicious behaviors ... suspicious packages. Do you know what to look for? Do you know how to report what you see? This 3 hour course will teach you.

Published in: Business, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
428
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Antiterrorism Training

  1. 1. Protecting America With Pride Not Prejudice www.cateyesprogram.com Copyright © 2012 Copyright © 2012
  2. 2. Cell Phones• Standby – vibrate mode• Please talk in another room Copyright © 2012
  3. 3. CAUTION: The following video is a graphic reminder of events related to9/11. If you lost someone in this tragedy,you may want to leave the room for the next six minutes. Copyright © 2012
  4. 4. The events of 9/11 changed our world Copyright © 2012
  5. 5. While it is tempting to believe the threat is over … Copyright © 2012
  6. 6. … the reality is, it is not. Foiled terrorist attacks on American soil since 9/11 Providence, RI Killeen, TXPortland, OR Knoxville, TN Jacksonville, FL Seattle, WA San Diego, CA Gadsden, AL Copyright © 2012
  7. 7. Recent Terrorist Attacks on American Soil• Terrorists do not take a holiday – January 7th, 2012 – Tampa, FL (arrested) – January 8th, 2012 – Gadsden, AL (shootout) – January 12th, 2012 – Houston, TX (successful) – February 17th, 2012 – Washington, DC (sting) Copyright © 2012
  8. 8. Copyright © 2012
  9. 9. Why are buses a favorite target of terrorists? Copyright © 2012
  10. 10. The 7 July 2005 London bombings (often referred to as 7/7)were a series of co-ordinated suicide attacks in London whichtargeted civilians using the public transport system during themorning rush hour.On the morning of Thursday, 7 July 2005, four Islamist home-grown terrorists detonated four bombs, three in quicksuccession aboard London Underground trains across the cityand, later, a fourth on a double-decker bus in Tavistock Square.Fifty-two people, as well as the four bombers, were killed inthe attacks, and over 700 more were injured.The explosions were caused by homemade organic peroxide-based devices packed into rucksacks. Copyright © 2012
  11. 11. Why are buses a favorite target of terrorists?According to the National Counterterrorism TerrorismCenter’s (NCTC’s) Worldwide Incident Tracking System(WITS) and open source data, terrorists conducted at least827 attacks on mass transit bus systems from 2004 through2010.These attacks killed approximately 1,867, and injured5,704. None of these attacks occurred in the UnitedStates. SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  12. 12. Why are buses a favorite target of terrorists?“TSA-OI assesses that mass transit bus systems are easy forterrorist groups to attack because they are open to thepublic, operate on predetermined and publicly availableschedules, and travel along routes that can be difficult topatrol. For these reasons, bus mass transit systems willremain attractive targets for the foreseeable future.” SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  13. 13. Why are buses a favorite target of terrorists? SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  14. 14. The difference between a successful attack and a foiled attack on American soil? Copyright © 2012
  15. 15. Protecting America With Pride Not Prejudice www.cateyesprogram.com Copyright © 2012 Copyright © 2012
  16. 16. CAT Eyes Program (Community Anti-Terrorism Training Institute)Nationwide program developed to eliminateracism and terrorism through educating andempowering the average citizens to defend our homeland against terrorism. Copyright © 2012
  17. 17. “Watching America with Pride, Not Prejudice” Kathy Michelle“Watch for actions…trust your instincts…” Copyright © 2012
  18. 18. Kathy Boudin (born 19 May 43) Convicted in 1984 of felony murder for her participation in anarmed robbery that resulted in the killing of 3 people. Released from prison in 2003. Member of the Weather Underground, a domestic terror organization which bombed the Pentagon, US Capitol, and other targets Copyright © 2012
  19. 19. Partnership at Work Police seize terrorist bombs•July 1997- Police raided a Brooklyn apartment andseized five bombs that were intended for use insuicide terrorist attacks on NYC subway system.•At least one of the men, and possibly all three,arrived in the United States within the past twoweeks. Copyright © 2012
  20. 20. Partnership at Work Police seize terrorist bombsA neighbor flagged down a Long Island Rail Roadpolice officer and indicated there were bombs inthe apartment. That tip sent police to the scene. Copyright © 2012
  21. 21. Partnership at Work Police seize terrorist bombs• Rafael Cruz, a driver for Family Car Service, whichoperates from a storefront of the building, said heoften saw the residents and said they made frequenttrips to and from the airport.• Theyre always carrying huge bags and boxes.Come and go all the time, Cruz said. Copyright © 2012
  22. 22. Brooklyn Bomb Scare By DAN BARRY (Published: August 03, 1997)An alleged plan by two Palestinian men to set off bombs in Brooklyn wasthwarted by a police raid, but the specifics of the plot were chilling enough torattle New York City. Law enforcement officials say that Lafi Khalil and Ghazi AbuMaizar planned to detonate bombs in a crowded subway station and acommuter bus, possibly as part of a suicide mission. Acting on a tip from afriend of the suspects, the police burst into a darkened Brooklyn apartmentThursday and shot the two men, authorities said, just as one of them wasreaching for an explosive device.
  23. 23. Partnership at Work• Pre-attack• Pre 9/11• Pre CAT Eyes trained What could a CAT Eyes trained citizen’s instincts do in a post 9/11 world?Yu Kikimura, a member of the Japanese Red Army charged with plotting to bomb the U.S. Army Recruiting Station in New York City in retaliation for U.S. air strike against Libya in 1986
  24. 24. • Fear Instincts Signals • Apprehension • Suspicion • Hesitation • Doubt • Gut feeling • Hunches • Curiosity • Nagging feelingsFrom the book, The Gift of Fear by Gavin De Becker Copyright © 2012
  25. 25. Overview• I. Terrorism Overview (tune your instincts)• II. Detecting Terrorism (what to look for)• III. Reporting Procedures (how to report findings)• IV. Company Policies• V. ALERT Teams Copyright © 2012
  26. 26. I. TERRORISM OVERVIEW(tune your instincts) Copyright © 2012
  27. 27. FBI definition of terrorism“The unlawful use of force or violence against persons or property to intimidate or coerce a government or civilian population, or any segment thereof, in furtherance of political or social objectives” Copyright © 2012
  28. 28. The Terrorist Organization General Terrorist Profile• Intelligent• Well-educated• Obsessed with initiating change• Middle class to affluent• 22-25 years old Remember, these are generalities Copyright © 2012
  29. 29. Categories of TerrorismDomestic International Copyright © 2012
  30. 30. Domestic TerrorismIncludes terrorist activity conducted by groups orindividuals who are U.S. citizens that are based andoperate entirely within the US without foreigndirection and whose terrorist acts are directed atelements of the U.S.Government or society.
  31. 31. International Terrorism Includes terrorist activity committed by groups orindividuals that crosses national boundaries. Theseboundaries can be both physical as well as cultural.
  32. 32. State Sponsors of Terrorism“ … more than 11,500 terrorist attacks occurred in 72 countries during 2010, resulting in more than 13,200 deaths.” Source: Country Reports on Terrorism 2010, Chapter 3: State Sponsors of Terrorism, (pub Aug 2011) Copyright © 2012
  33. 33. Political Motives Ranges from the anarchist to communist, from capitalism to socialism Right Wing• New World Order• Gun control• Apocalyptic views• White supremacy• Anti-government• Anti-taxation Copyright © 2012
  34. 34. Political MotivesRanges from the anarchist to communist, from capitalism to socialism Left Wing • Revolutionary socialist doctrine • Protectors against capitalism • Protectors against imperialism Copyright © 2012
  35. 35. Nationalist MotivesBound by the same cultural or ethnic background with an urge to establish or regain a homeland Aryan Nation (Whites) Black Separatists Armed Forces for National Liberation (Puerto Rican) American Indian Movement Copyright © 2012
  36. 36. Incorrect Religious Motives Not a Jihad Copyright © 2012
  37. 37. Incorrect Religious Motives Courtesy of the BATF Copyright © 2012
  38. 38. TERRORISTOPERATIONS Copyright © 2012
  39. 39. Words to Live By“Those who fail to study their history and learn from its lessons are destined to repeat it." George Santayana, philosopher Copyright © 2012
  40. 40. Beirut Embassy BombingVan with a bomb, 63 people dead (18 April 1983) Copyright © 2012
  41. 41. Beirut Marine Barracks BombingTerrorists blow up US Marine headquarters with a truck bomb, killing 241 Marines and Sailors and wounding 75 (23 October 1983) Copyright © 2012
  42. 42. Pan Am Flight 103 Lockerbie, Scotland270 dead (20 December 1988) Copyright © 2012
  43. 43. World Trade Center, New York Over 1000injured, 6 dead(26 Feb 1993) Copyright © 2012
  44. 44. Tokyo Subway Chemical Attack12 dead, thousands injured (20 March 1995) Copyright © 2012
  45. 45. Oklahoma City (Murrah Federal Building) April 19, 1995 168 dead, hundreds injured Copyright © 2012
  46. 46. Murrah Federal Building (Oklahoma City Bombing) Copyright © 2012
  47. 47. Copyright © 2012
  48. 48. Copyright © 2012
  49. 49. Khobar Towers, Saudi Arabia June 25, 1996 19 dead, hundreds injured Copyright © 2012
  50. 50. US Embassies, Kenya and Tanzania August 7, 1998 245 dead, thousands injured Copyright © 2012
  51. 51. USS Cole, Port Aden, Yemen October 12, 2000 Copyright © 2012
  52. 52. Flight 93, Pennsylvania September 11, 2001Todd Beamer, Jeremy Glick and other passengers forced jet to crash in a field, killing all 44, but saving countless others by missing the intended target, the U.S. Capitol Copyright © 2012
  53. 53. PentagonSeptember 11, 2001189 dead, hundreds injured Copyright © 2012
  54. 54. World Trade Center September 11, 2001Approximately 3000 people dead and missingThe most devastating terrorist attackand greatest rescue operation in the history of the world! Copyright © 2012
  55. 55. Copyright © 2012
  56. 56. This has been a brief, historicaloverview of terrorism. For something more current … Copyright © 2012
  57. 57. 2010 – 2011, American Soil• Mohamed Osman Mohamud plans to detonate what he thought was a car bomb at a Christmas tree lighting ceremony in Portland, Oregon, but was actually part of a FBI Sting operation. He was arrested and charged with attempted terrorism.• Jose Pimentel, a 27-year-old native of the Dominican Republic plotted to explode several pipe bombs in the city of New York. Copyright © 2012
  58. 58. 2010 – 2011, American Soil• Austin, Texas: Andrew Joseph Stack III crashes his plane into an IRS building in Austin, Texas killing himself and a person inside the building and injuring 13 others. The crash caused a serious fire and significant damage to the building.• Jacksonville, Florida: A man used a pipe bomb to attack a mosque. The bomb exploded while about 60 Muslims were praying in the mosque. The attack caused no injuries. Copyright © 2012
  59. 59. 2010 – 2011, American Soil• New Yorks Times Square was evacuated after the discovery of a car bomb. US government believes radical Islamists in the Pakistani Taliban directed the plot, and may have financed it.• 26 year old Rezwan Ferdaus was arrested by the FBI for plotting to use C4 and a remote-controlled model of the US Navys McDonnell Douglas F-4 Phantom II to bomb The Pentagon and the US Capitol. Rezwan Ferdaus had links to al-Qaeda and attempted to deliver bomb making materials for use against US troops in Iraq. Copyright © 2012
  60. 60. 2010 – 2011, American Soil• Two men from Iran were arrested over a plot to assassinate the Saudi ambassador to Washington and to bomb the Saudi embassy in the city. Later in the day, the US government issued a worldwide alert in anticipation of other attacks.• Three letter bombs detonate in the mail rooms in two government buildings in Maryland. No one was killed or injured in the attack. Copyright © 2012
  61. 61. 2010 – 2011, American Soil• The first letter bomb to explode was in a mailroom of the Department of Transport headquarters in the city of Hanover, Maryland. One hour later another letter bomb exploded inside a building in the city of Annapolis. No one was killed but one person was wounded in the blasts.• A pipe bomb is found on Lake Koshkonong, Wisconsin. The bomb squad showed up to detonate the bomb. No deaths or injuries occurred. Copyright © 2012
  62. 62. 2010 – 2011, American Soil• A pipe bomb was left outside the U.S. Federal Penitentiary in the city of Terre Haute, Indiana. The bomb was made safe before it could explode and cause any damage or injury.• Two men planned to blow up a New York synagogue and the Empire State Building, but were arrested by undercover officers when they attempted to buy weapons. Copyright © 2012
  63. 63. Copyright © 2012
  64. 64. II. DETECTING TERRORISM (what to look for) Copyright © 2012
  65. 65. Copyright © 2012
  66. 66. 4 Basic Cells of Terrorists Leadership Cell Support Cell Intelligence Cell Operational Cell Copyright © 2012
  67. 67. LEADERSHIP CELLACTIVITIES Copyright © 2012
  68. 68. Leadership Cell Activities• Hard to Detect• Better left to professionals• Generally influential or wealthypeople: professionals, business owners,doctors, professors, etc… Copyright © 2012
  69. 69. SUPPORT CELLACTIVITIES Copyright © 2012
  70. 70. Safe House• Pays in cash• Landlord or maid not permitted inside (meets people at door)• No furniture• Lab equipment inside• Strange comings and goings; lots of different people, unusual packages, unusual hours Copyright © 2012
  71. 71. Fund RaisingCopyright © 2012
  72. 72. Counterfeit baby formula CigaretteSmuggling Copyright © 2012
  73. 73. Illegal drugsAfghanistan produces 70% of world’s opium supply Credit Card Fraud Copyright © 2012
  74. 74. Fake Non-profit Groups• United Association for Studies and Research• Benevolence International Foundation• Global Relief Foundation• Blessed Relief Foundation Copyright © 2012
  75. 75. INTELLIGENCE CELL ACTIVITIES Copyright © 2012
  76. 76. SURVEILLANCE Two Phases CASING (Target Selection)REHEARSAL (Pre-attack phase) Copyright © 2012
  77. 77. CASING (Target Selection)• Use less experienced members of the group• Usually more than one team• Observes patterns of activities of potential target• Earliest and weakest phase of surveillance• Unusual activities: sketches, videos or photos• In restricted areas• Questions about security Copyright © 2012
  78. 78. REHEARSAL (Pre-Attack phase)• Terrorist decide on target• Uses more experienced members• In a restricted area• Plan of attack is finalized Copyright © 2012
  79. 79. CAT Eyes and bus company joint effort Copyright © 2012
  80. 80. What does a terrorist look like? Make a guess Copyright © 2012
  81. 81. Dismiss Popular Television Myths• Terrorists are not all male• Terrorists are not all “religious nuts”• Terrorists won’t come at you screaming and wearing hoods• Surveillance teams will not be wearing trench coats, but rather will attempt to blend in to the surrounding area
  82. 82. Commonly used ruses to be in area• Dressed as clergy• Dressed as police• Utility workers• Women with a baby carriage• Door to door salespeople• Lovers in the park• Walking the dog Copyright © 2012
  83. 83. Chicago Los New York Angeles Copyright © 2012
  84. 84. 10 Minute Break
  85. 85. Copyright © 2012
  86. 86. OPERATIONAL CELL ACTIVITIES Copyright © 2012
  87. 87. 5 Categories of WMD Materials “CBRNE” • Chemical • Biological • Radiological • Nuclear • Explosive Copyright © 2012
  88. 88. Terrorist Operations Biological BiologicalHard to detect until sick– Small Pox:small red bumps– Bubonic Plague:swollen lymph glands– Call authorities Copyright © 2012
  89. 89. Terrorist Operations Biological ANTHRAXMail: Powdery substance,No return address,Excessive postage, lots oftape, misspelled wordsTake action: cover thecontaminated mail withplastic or paper Copyright © 2012
  90. 90. United States Statistics • 1,000,000 miles of pipe • 800,000 miles of sewer lines • 170,000 drinking supply stations Copyright © 2012
  91. 91. Suspicious Indicators • Dead animals • Dead plants • Unusual smells (Hay, grass, sweet, fruity, etc…) • Signs of tampering Copyright © 2012
  92. 92. Suspicious Equipment • Bolt cutters • Plumbing supplies Copyright © 2012
  93. 93. Suspicious Equipment Discarded Personal Protective Equipment (PPE) Copyright © 2012
  94. 94. Suspicious ItemsHand pumps Containers Copyright © 2012
  95. 95. Nuclear Terrorism Nuclear Bombs  Dirty Bombs  Nuclear Power plant Copyright © 2012
  96. 96. Dirty BombsA regular bomb packaged with radioactive material •Materials from hospitals, construction sites, food factories •Run crosswind, go inside •Listen to news •Decontaminate Smoke from the bomb has radiation and may contaminate from a few blocks to a couple of miles depending on size Copyright © 2012
  97. 97. Arson– Low risk– Inexpensive– Lethal Copyright © 2012
  98. 98. ARSON TOOLS • GAS CONTAINERS • MOLOTOV COCKTAILSCopyright © 2012
  99. 99. CHEMICAL • Unusual packages by Heating or Air Conditioning Systems • Powder or liquid by intakes • Reports of suspicious persons by HVAC • Unscheduled Maintenance Copyright © 2012
  100. 100. Air Ducts Unexplained OdorsFruity, flowery, sharp, garlic, mown grass, or hay Copyright © 2012
  101. 101. Unscheduled sprayingor found spray devices  Copyright © 2012
  102. 102. Terrorist Tactics Worldwide Attacks Other 10%Assassination s 6% Hijackings 12% Bombings 50% Armed Attacks 22% Copyright © 2012
  103. 103. Terrorist Operations: Bombing– Low risk– Inexpensive– Most common– Extremely lethal– Generates instant media coverage Copyright © 2012
  104. 104. BOMB PARTSSwitch Initiator blasting explosives target cap
  105. 105. PARTS OF A BOMB Copyright © 2012
  106. 106. Copyright © 2012
  107. 107. SWITCHES Manual switch String Fuses Alarm ClocksCell phones Copyright © 2012
  108. 108. Copyright © 2012
  109. 109. Blasting Caps Time FusePROFESSIONAL IMPROVISED Copyright © 2012
  110. 110. GUNPOWDER Copyright © 2012
  111. 111. Military Explosives C-4 (aka plastic explosive)• White solid, malleable• Shaped charges, claymores, etc.
  112. 112. Commercial Explosives Dynamite• Appears red, tan, brown or white• .5 to 25 pound bags and bulk• Manufacturer’s ID Copyright © 2012
  113. 113. Commercial Explosives Datasheet/Flex-X• Datasheet – Commercial• Flex-X – Military• Flexible sheet• Red to olive drab Copyright © 2012
  114. 114. FERTILIZERAND FUEL OIL Copyright © 2012
  115. 115. Delivery MethodsAbandoned ContainersObvious DevicesAbandoned VehiclesUnusual DevicesTrip Wires/Booby TrapsSuspicious Mailing Containers Copyright © 2012
  116. 116. Package Bombs U.S. Post Office Poster Copyright © 2012
  117. 117. Package Bombs Copyright © 2012
  118. 118. What is this? Copyright © 2012
  119. 119. This is one of 22 such billboards across the Phoenix metroarea warning citizens about picking up discarded flashlights Copyright © 2012
  120. 120. PIPE BOMBS Copyright © 2012
  121. 121. IS THERE A SUICIDE BOMBER PROFILE ? NO! Copyright © 2012
  122. 122. Terrorist Operations Suicide Bomber• Praying• Locked on target• Appears nervous• Does not fit in• Direct eye contact with another person• Sweating and/or Rapid Eye Movement• Possibly clean shaven or make up Copyright © 2012
  123. 123. Terrorist Operations Car/Truck Bombs Trust your instincts Noticeable signs• Fuel smells• Burglary marks• Excessive weight• Covered objects• License plates don’t match each other Copyright © 2012
  124. 124. Copyright © 2012
  125. 125. Copyright © 2012
  126. 126. Surface to Air Missile•The Soviet-made SA-7 missile weighs about 30 pounds, is 5 feet long andcan be carried in a large duffel bag.•The SA-7 can reach altitudes of up to 12,000 feet, and can be accuratelylaunched from more than two miles away. The altitude of the weapondepends on the speed of the target. Copyright © 2012
  127. 127. III. Reporting Procedures (How to report)
  128. 128. As a CAT Eyes trained employee you need tokeep your eyes open for terrorist indicators.If it feels wrong: 1. Notify the dispatcher on duty 2. Fill out a Suspicious Activity Report Copyright © 2012
  129. 129. Copyright © 2012
  130. 130. Copyright © 2012
  131. 131. Dispatchers will notify Safety Director ASAP and assist in filling out Suspicious Activity Report Copyright © 2012 Copyright © 2012
  132. 132. Tips Away From Work• Call your state tip line• Call your local police Copyright © 2012
  133. 133. … then report your suspicious lead with the FBI www.FBI.gov (tips link) or Call (202) 324-3000And ask for local Joint Terrorism Task Force (JTTF) phone number Copyright © 2012
  134. 134. THEN LET LAW ENFORCEMENT TAKE OVER!!! DO NOT CONDUCT YOUR OWN INVESTIGATION IT IS WRONG TO DO AND DANGEROUS!!! Copyright © 2012
  135. 135. Your Tip• Patrol Car Drive By• Part of an on-going investigation• May be used in a future investigation Law Enforcement may not get back with you… Call it in and write it down for future reference… Copyright © 2012
  136. 136. If you believe you have detected terrorism and your life is in jeopardy or the action is presently occurring…• Move to a safe and highly populated area• Go into a building• Seek the police• Call “911” Copyright © 2012 Copyright © 2012
  137. 137. Basic points of observation and description
  138. 138. Reporting Procedures• Think of the 6 W’s – Who – What – Where – When – Why – Write down your information! Copyright © 2012
  139. 139. Bad Lead Vs. Good Lead “I saw a suspicious guy near the water tower” vs.“I saw a white male, about 6 ft tall wearing blue jeans, a brown jacket, a red hat and a black backpack climbing the north side fence of thewater tower on Washington Street. There was also a black Ford F-150 pick up truck parked on the grass near the fence. It had New Jersey license plates on it and the number was ABC123” Copyright © 2012
  140. 140. C.Y.M.B.A.L.S. (people)• C = Color (hair, eyes, skin)• Y = Year of birth (age)• M = Make (Italian, Asian, Hispanic)• B = Body (height and weight)• A = Attire (color and type)• L = Looks (tattoo, beard, hair type)• S = Sex (male or female) Copyright © 2012
  141. 141. EXERCISE• Practice writing down a good lead• On the back of student evaluation form write:• C• Y• M• B• A• L• S Copyright © 2012
  142. 142. What did you see?
  143. 143. C.Y.M.B.A.L.S. (people)• C = Color (hair, eyes, skin)• Y = Year of birth (age)• M = Make (Italian, Asian, Hispanic)• B = Body (height and weight)• A = Attire (color and type)• L = Looks (tattoo, beard, hair type)• S = Sex (male or female) Copyright © 2012
  144. 144. C.Y.M.B.A.L.S. (vehicles)• C = Color• Y = Year• M = Make/Model• B = Body style• A = All others (damage, signs, markings)• L = License Plate Number• S = State Copyright © 2012
  145. 145. EXERCISE• Practice writing down a good lead• On the back of student evaluation form write:• C• Y• M• B• A• L• S Copyright © 2012
  146. 146. What did you see?
  147. 147. C.Y.M.B.A.L.S. (vehicles)• C = Color• Y = Year• M = Make/Model• B = Body style• A = All others (damage, signs, markings)• L = License Plate Number• S = State Copyright © 2012
  148. 148. One last reason for a good tip … Copyright © 2012
  149. 149. Rewards for Justice Program 1. Witness Protection 2. Up to $25 Million in cash 3. Payable in any currency 4. 1-800-US REWARDS 5. www.rewardsforjustice.net
  150. 150. Copyright © 2012
  151. 151. 10 Minute Break
  152. 152. Company Policies Copyright © 2012
  153. 153. COMPANY POLICIES COMPANY IDEveryone wears visible ID’s while on property Copyright © 2012
  154. 154. COMPANY POLICIES Challenge people• Politely ask them what they are doing on property• Inside or outside of the buildings• Explain where they can get ID’s• If suspicious: - don’t confront, - tell someone - observe intruder from a distance - get a person/car description Copyright © 2012
  155. 155. COMPANY POLICIES START OF DAY Copyright © 2012
  156. 156. Copyright © 2012
  157. 157. COMPANY POLICIES END OF DAY• Check lower baggage bay• Unless in use keep baggage bays locked• Lock any doors that can be locked on the buses Copyright © 2012
  158. 158. COMPANY POLICIES Refusing or Ejecting PASSENGERSPermitted, warn passenger first, then call police or supervisor to remove uncontrollable passengers Copyright © 2012
  159. 159. COMPANY POLICIES SUICIDE BOMBERS• You must see the actual device• Look for an empty parking lot• Call Police and dispatcher• Stop bus and evacuate tellpassengers there is a mechanicalproblem Copyright © 2012
  160. 160. COMPANY POLICIES BOMB THREAT Check For Caller IDAsk questions, think 6 W’s• When will it explode?• Where is it?• Why did you place the bomb?• What is your name?• Where are you?• What does it look like Copyright © 2012
  161. 161. COMPANY POLICIES BOMB THREATPrior to evacuationThis is a bomb threat not a Fire…You don’t need to race out of building or busDo a quick search ( 1 minute maximum)Grab keys, jacket, any quick items to continue operationsLeave the building to pre-designated safe area…Safe area a bus with flashers on 300 feet from the building Copyright © 2012
  162. 162. COMPANY POLICIES BOMB THREATSearch Techniques:1) Floor to waist height2) Waist height to eye level3) Eye level to ceiling4) Make note of unusual or out-of- place objects Copyright © 2012
  163. 163. COMPANY POLICIES BOMB THREAT Copyright © 2012
  164. 164. COMPANY POLICIES BOMB THREAT Copyright © 2012
  165. 165. COMPANY POLICIES BOMB THREAT Copyright © 2012
  166. 166. COMPANY POLICIES BUS BOMB THREAT DIRECTED TO ONE BUS ONLY• Call 911 or dispatch for help• Pull into an empty lot if possible• Ask people to evacuate the bus fora mechanical problem. Tell them totake all their packages. Copyright © 2012
  167. 167. COMPANY POLICIES SUSPICIOUS PACKAGESIf the package appears suspicious, leave in place and notify a supervisor If the package is not suspicious, follow lost and found procedures Copyright © 2012
  168. 168. COMPANY POLICIES DETERMINING SUSPICIOUS PACKAGESIf a package is sealed with no markingsand left in a place not normally usedby the employees or public orThere are unusual noises, smells,wires, leaking fluid or powder …Then consider package suspicious Copyright © 2012
  169. 169. Copyright © 2012
  170. 170. National Terrorism Advisory System (NTAS) Copyright © 2012
  171. 171. National Terrorism Advisory System (NTAS) Copyright © 2012
  172. 172. National Terrorism Advisory System (NTAS)Elevated threat of a terror attack with an end date Copyright © 2012
  173. 173. National Terrorism Advisory System (NTAS)Imminent threat of a terror attack with an end date Copyright © 2012
  174. 174. Family Policies Copyright © 2012
  175. 175. Family Terrorism plan1. Family Communication plan2. Family stay plan3. Family leave plan Copyright © 2012
  176. 176. “Don’t be afraid…be ready”1. Make a kit2. Make a plan3. Be informedCall 1-800-Be-Ready or visit www.ready.gov Copyright © 2012
  177. 177. V. ALERT Teams Copyright © 2012
  178. 178. How do you maintain a high level of awareness? Copyright © 2012
  179. 179. By developing Awareness Leaders Copyright © 2012
  180. 180. How do you maintain a high level disaster readiness? Copyright © 2012
  181. 181. By developing EmergencyResponse Teams Copyright © 2012
  182. 182. What do you get when you have ateam of people dedicated to being Awareness Leaders and Emergency Response Teams? An ALERT team!! Copyright © 2012
  183. 183. ALERT Teams What They AreAwarenessLeaders andEmergency Response Teams Copyright © 2012
  184. 184. ALERT Teams Dedicated group of professionals in each property thatvolunteer their time to learn and educate other employees on terrorist threats and counter measures. ALERT Team members will be leaders in the event of disasters. Copyright © 2012
  185. 185. Conclusion
  186. 186. Copyright © 2012
  187. 187. Copyright © 2012
  188. 188. Now let’s roll up our sleeves and “Protect America With Pride, Not Prejudice” Copyright © 2012
  189. 189. REGISTER and FEEDBACK Please fill out critiquesYour evaluations are important to us Presenter: Frank Margulis WATCHING AMERICA WITH PRIDE, NOT PREJUDICE Copyright © 2012

×