SlideShare uma empresa Scribd logo
1 de 198
Protecting America With Pride
        Not Prejudice




      www.cateyesprogram.com
          Copyright © 2012
           Copyright © 2012
Cell Phones
• Standby – vibrate mode

• Please talk in another room




                 Copyright © 2012
CAUTION: The following video is a
  graphic reminder of events related to
9/11. If you lost someone in this tragedy,
you may want to leave the room for the
            next six minutes.


                Copyright © 2012
The events of 9/11 changed our world




                Copyright © 2012
While it is tempting to believe
     the threat is over …




             Copyright © 2012
… the reality is, it is not.
 Foiled terrorist attacks on American soil since 9/11


   Providence, RI
                                                    Killeen, TX
Portland, OR
                                            Knoxville, TN

                    Jacksonville, FL             Seattle, WA
 San Diego, CA
                       Gadsden, AL

                         Copyright © 2012
Recent Terrorist Attacks on American Soil

• Terrorists do not take a holiday
  – January 7th, 2012 – Tampa, FL (arrested)

  – January 8th, 2012 – Gadsden, AL (shootout)

  – January 12th, 2012 – Houston, TX (successful)

  – February 17th, 2012 – Washington, DC (sting)


                     Copyright © 2012
Copyright © 2012
Why are buses a favorite target of terrorists?




                     Copyright © 2012
The 7 July 2005 London bombings (often referred to as 7/7)
were a series of co-ordinated suicide attacks in London which
targeted civilians using the public transport system during the
morning rush hour.

On the morning of Thursday, 7 July 2005, four Islamist home-
grown terrorists detonated four bombs, three in quick
succession aboard London Underground trains across the city
and, later, a fourth on a double-decker bus in Tavistock Square.
Fifty-two people, as well as the four bombers, were killed in
the attacks, and over 700 more were injured.

The explosions were caused by homemade organic peroxide-
based devices packed into rucksacks.


                             Copyright © 2012
Why are buses a favorite target of terrorists?

According to the National Counterterrorism Terrorism
Center’s (NCTC’s) Worldwide Incident Tracking System
(WITS) and open source data, terrorists conducted at least
827 attacks on mass transit bus systems from 2004 through
2010.

These attacks killed approximately 1,867, and injured
5,704. None of these attacks occurred in the United
States.


   SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011


                                Copyright © 2012
Why are buses a favorite target of terrorists?

“TSA-OI assesses that mass transit bus systems are easy for
terrorist groups to attack because they are open to the
public, operate on predetermined and publicly available
schedules, and travel along routes that can be difficult to
patrol. For these reasons, bus mass transit systems will
remain attractive targets for the foreseeable future.”



   SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011


                                Copyright © 2012
Why are buses a favorite target of terrorists?




  SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011


                               Copyright © 2012
The difference between a successful attack
  and a foiled attack on American soil?




                   Copyright © 2012
Protecting America With Pride
        Not Prejudice




      www.cateyesprogram.com
           Copyright © 2012
            Copyright © 2012
CAT Eyes Program
 (Community Anti-Terrorism Training Institute)

Nationwide program developed to eliminate
racism and terrorism through educating and
empowering the average citizens to defend
     our homeland against terrorism.



                   Copyright © 2012
“Watching America with Pride,
          Not Prejudice”




       Kathy                       Michelle

“Watch for actions…trust your instincts…”

                Copyright © 2012
Kathy Boudin
 (born 19 May 43)
 Convicted in 1984
  of felony murder
        for her
 participation in an
armed robbery that
   resulted in the
 killing of 3 people.
   Released from
   prison in 2003.
                           Member of the Weather Underground, a
                        domestic terror organization which bombed the
                           Pentagon, US Capitol, and other targets


                           Copyright © 2012
Partnership at Work
              Police seize terrorist bombs

•July 1997- Police raided a Brooklyn apartment and
seized five bombs that were intended for use in
suicide terrorist attacks on NYC subway system.

•At least one of the men, and possibly all three,
arrived in the United States within the past two
weeks.

                       Copyright © 2012
Partnership at Work
            Police seize terrorist bombs

A neighbor flagged down a Long Island Rail Road
police officer and indicated there were bombs in
the apartment. That tip sent police to the scene.




                      Copyright © 2012
Partnership at Work
             Police seize terrorist bombs

• Rafael Cruz, a driver for Family Car Service, which
operates from a storefront of the building, said he
often saw the residents and said they made frequent
trips to and from the airport.

• ''They're always carrying huge bags and boxes.
Come and go all the time,'' Cruz said.

                       Copyright © 2012
Brooklyn Bomb Scare
                            By DAN BARRY (Published: August 03, 1997)


An alleged plan by two Palestinian men to set off bombs in Brooklyn was
thwarted by a police raid, but the specifics of the plot were chilling enough to
rattle New York City. Law enforcement officials say that Lafi Khalil and Ghazi Abu
Maizar planned to detonate bombs in a crowded subway station and a
commuter bus, possibly as part of a suicide mission. Acting on a tip from a
friend of the suspects, the police burst into a darkened Brooklyn apartment
Thursday and shot the two men, authorities said, just as one of them was
reaching for an explosive device.
Partnership at Work
• Pre-attack
• Pre 9/11
• Pre CAT Eyes trained



                                           What could a CAT Eyes trained
                                           citizen’s instincts do in a post
                                                     9/11 world?


Yu Kikimura, a member of the Japanese Red Army charged with plotting to bomb the U.S. Army
    Recruiting Station in New York City in retaliation for U.S. air strike against Libya in 1986
• Fear
                                        Instincts Signals
  • Apprehension

  • Suspicion

  • Hesitation

  • Doubt

  • Gut feeling

  • Hunches

  • Curiosity

  • Nagging feelings
From the book, The Gift of Fear by Gavin De Becker


                                            Copyright © 2012
Overview
• I. Terrorism Overview (tune your instincts)

• II. Detecting Terrorism (what to look for)

• III. Reporting Procedures (how to report findings)

• IV. Company Policies

• V. ALERT Teams




                      Copyright © 2012
I. TERRORISM
  OVERVIEW
(tune your instincts)




    Copyright © 2012
FBI definition of terrorism

“The unlawful use of force or violence against
  persons or property to intimidate or coerce
  a government or civilian population, or any
      segment thereof, in furtherance of

        political or social objectives”


                   Copyright © 2012
The Terrorist Organization
                General Terrorist Profile
• Intelligent
• Well-educated
• Obsessed with initiating change
• Middle class to affluent
• 22-25 years old

         Remember, these are generalities

                        Copyright © 2012
Categories of Terrorism

Domestic                 International




           Copyright © 2012
Domestic Terrorism
Includes terrorist activity conducted by groups or
individuals who are U.S. citizens that are based and
operate entirely within the US without foreign
direction and whose terrorist acts are directed at
elements of the U.S.
Government or society.
International Terrorism
 Includes terrorist activity committed by groups or
individuals that crosses national boundaries. These
boundaries can be both physical as well as cultural.
State Sponsors of Terrorism
“ … more than 11,500 terrorist attacks occurred in 72 countries
     during 2010, resulting in more than 13,200 deaths.”




         Source: Country Reports on Terrorism 2010,
    Chapter 3: State Sponsors of Terrorism, (pub Aug 2011)

                          Copyright © 2012
Political Motives
                Ranges from the anarchist to communist,
                      from capitalism to socialism

         Right Wing
•   New World Order
•   Gun control
•   Apocalyptic views
•   White supremacy
•   Anti-government
•   Anti-taxation

                        Copyright © 2012
Political Motives
Ranges from the anarchist to communist,
      from capitalism to socialism

                  Left Wing
           • Revolutionary socialist
             doctrine
           • Protectors against
             capitalism
           • Protectors against
             imperialism

       Copyright © 2012
Nationalist Motives
Bound by the same cultural or ethnic background with an
        urge to establish or regain a homeland

        Aryan Nation (Whites)

                    Black Separatists


           Armed Forces for National Liberation
           (Puerto Rican)


                American Indian Movement

                      Copyright © 2012
Incorrect Religious Motives




       Not a Jihad
          Copyright © 2012
Incorrect Religious Motives




                        Courtesy of
                         the BATF


          Copyright © 2012
TERRORIST
OPERATIONS



 Copyright © 2012
Words to Live By

“Those who fail to study their history
     and learn from its lessons are
         destined to repeat it."

       George Santayana, philosopher

                   Copyright © 2012
Beirut Embassy Bombing




Van with a bomb, 63 people dead (18 April 1983)

                   Copyright © 2012
Beirut Marine Barracks Bombing




Terrorists blow up US Marine headquarters with a
 truck bomb, killing 241 Marines and Sailors and
         wounding 75 (23 October 1983)

                    Copyright © 2012
Pan Am Flight 103
  Lockerbie, Scotland




270 dead (20 December 1988)

         Copyright © 2012
World Trade Center, New York


  Over 1000
injured, 6 dead
(26 Feb 1993)




                  Copyright © 2012
Tokyo Subway Chemical Attack




12 dead, thousands injured (20 March 1995)
                 Copyright © 2012
Oklahoma City (Murrah Federal Building)
            April 19, 1995




         168 dead, hundreds injured

                 Copyright © 2012
Murrah Federal Building (Oklahoma City Bombing)




                   Copyright © 2012
Copyright © 2012
Copyright © 2012
Khobar Towers, Saudi Arabia
      June 25, 1996




   19 dead, hundreds injured
           Copyright © 2012
US Embassies, Kenya and Tanzania
        August 7, 1998




     245 dead, thousands injured

              Copyright © 2012
USS Cole, Port Aden, Yemen
     October 12, 2000




         Copyright © 2012
Flight 93, Pennsylvania
                 September 11, 2001




Todd Beamer, Jeremy Glick and other passengers forced jet to crash in a
 field, killing all 44, but saving countless others by missing the intended
                             target, the U.S. Capitol

                               Copyright © 2012
Pentagon
September 11, 2001




189 dead, hundreds injured

        Copyright © 2012
World Trade Center
        September 11, 2001

Approximately 3000 people dead
         and missing
The most devastating terrorist attack
and greatest rescue operation in the
       history of the world!


               Copyright © 2012
Copyright © 2012
This has been a brief, historical
overview of terrorism. For something
           more current …




               Copyright © 2012
2010 – 2011, American Soil
• Mohamed Osman Mohamud plans to detonate what he
  thought was a car bomb at a Christmas tree lighting
  ceremony in Portland, Oregon, but was actually part of a
  FBI Sting operation. He was arrested and charged with
  attempted terrorism.


• Jose Pimentel, a 27-year-old native of the Dominican
  Republic plotted to explode several pipe bombs in the city
  of New York.


                         Copyright © 2012
2010 – 2011, American Soil
• Austin, Texas: Andrew Joseph Stack III crashes his plane
  into an IRS building in Austin, Texas killing himself and a
  person inside the building and injuring 13 others. The
  crash caused a serious fire and significant damage to the
  building.


• Jacksonville, Florida: A man used a pipe bomb to attack a
  mosque. The bomb exploded while about 60 Muslims
  were praying in the mosque. The attack caused no injuries.


                           Copyright © 2012
2010 – 2011, American Soil
• New York's Times Square was evacuated after the
  discovery of a car bomb. US government believes radical
  Islamists in the Pakistani Taliban directed the plot, and
  may have financed it.
• 26 year old Rezwan Ferdaus was arrested by the FBI for
  plotting to use C4 and a remote-controlled model of the
  US Navy's McDonnell Douglas F-4 Phantom II to bomb The
  Pentagon and the US Capitol. Rezwan Ferdaus had links to
  al-Qaeda and attempted to deliver bomb making materials
  for use against US troops in Iraq.

                          Copyright © 2012
2010 – 2011, American Soil
• Two men from Iran were arrested over a plot to
  assassinate the Saudi ambassador to Washington and to
  bomb the Saudi embassy in the city. Later in the day, the
  US government issued a worldwide alert in anticipation of
  other attacks.


• Three letter bombs detonate in the mail rooms in two
  government buildings in Maryland. No one was killed or
  injured in the attack.


                         Copyright © 2012
2010 – 2011, American Soil
• The first letter bomb to explode was in a mailroom of the
  Department of Transport headquarters in the city of
  Hanover, Maryland. One hour later another letter bomb
  exploded inside a building in the city of Annapolis. No one
  was killed but one person was wounded in the blasts.


• A pipe bomb is found on Lake Koshkonong, Wisconsin. The
  bomb squad showed up to detonate the bomb. No deaths
  or injuries occurred.


                          Copyright © 2012
2010 – 2011, American Soil
• A pipe bomb was left outside the U.S. Federal Penitentiary
  in the city of Terre Haute, Indiana. The bomb was made
  safe before it could explode and cause any damage or
  injury.


• Two men planned to blow up a New York synagogue and
  the Empire State Building, but were arrested by
  undercover officers when they attempted to buy weapons.




                         Copyright © 2012
Copyright © 2012
II. DETECTING TERRORISM
      (what to look for)




         Copyright © 2012
Copyright © 2012
4 Basic Cells of Terrorists

     Leadership Cell

       Support Cell

     Intelligence Cell

     Operational Cell




         Copyright © 2012
LEADERSHIP
      CELL
ACTIVITIES
 Copyright © 2012
Leadership Cell Activities


• Hard to Detect

• Better left to professionals

• Generally influential or wealthy
people: professionals, business owners,
doctors, professors, etc…


                     Copyright © 2012
SUPPORT
     CELL
ACTIVITIES
 Copyright © 2012
Safe House
• Pays in cash
• Landlord or maid not
  permitted inside (meets people
  at door)
• No furniture
• Lab equipment inside
• Strange comings and goings;
  lots of different people,
  unusual packages, unusual
  hours
                    Copyright © 2012
Fund Raising




Copyright © 2012
Counterfeit baby formula


 Cigarette
Smuggling




         Copyright © 2012
Illegal drugs
Afghanistan produces 70% of world’s opium supply




               Credit Card Fraud

                  Copyright © 2012
Fake Non-profit Groups

• United Association for Studies and Research

• Benevolence International Foundation

• Global Relief Foundation

• Blessed Relief Foundation




                      Copyright © 2012
INTELLIGENCE
       CELL
 ACTIVITIES
  Copyright © 2012
SURVEILLANCE
         Two Phases

  CASING (Target Selection)

REHEARSAL (Pre-attack phase)




           Copyright © 2012
CASING (Target Selection)
• Use less experienced members of the group

• Usually more than one team

• Observes patterns of activities of potential target

• Earliest and weakest phase of surveillance

• Unusual activities: sketches, videos or photos

• In restricted areas

• Questions about security
                        Copyright © 2012
REHEARSAL (Pre-Attack phase)

• Terrorist decide on target

• Uses more experienced members

• In a restricted area

• Plan of attack is finalized



                     Copyright © 2012
CAT Eyes and bus
 company joint
     effort




                   Copyright © 2012
What does a terrorist look like?
         Make a guess




            Copyright © 2012
Dismiss Popular Television Myths
• Terrorists are not all male

• Terrorists are not all “religious nuts”

• Terrorists won’t come at you screaming and
  wearing hoods

• Surveillance teams will not be wearing
  trench coats, but rather will attempt
  to blend in to the surrounding area
Commonly used ruses to be in area
• Dressed as clergy

• Dressed as police

• Utility workers

• Women with a baby carriage

• Door to door salespeople

• Lovers in the park

• Walking the dog
                       Copyright © 2012
Chicago                        Los
          New York           Angeles


          Copyright © 2012
10 Minute Break
Copyright © 2012
OPERATIONAL
        CELL
 ACTIVITIES

  Copyright © 2012
5 Categories of WMD Materials
       “CBRNE”
     • Chemical

     • Biological

     • Radiological

     • Nuclear

     • Explosive

            Copyright © 2012
Terrorist Operations
                     Biological


      Biological
Hard to detect until sick
– Small Pox:
small red bumps
– Bubonic Plague:
swollen lymph glands
– Call authorities


                     Copyright © 2012
Terrorist Operations
                             Biological

         ANTHRAX
Mail: Powdery substance,
No return address,
Excessive postage, lots of
tape, misspelled words
Take action: cover the
contaminated mail with
plastic or paper



                             Copyright © 2012
United States Statistics

                  • 1,000,000 miles of
                    pipe

                  • 800,000 miles of
                    sewer lines

                  • 170,000 drinking
                    supply stations


        Copyright © 2012
Suspicious Indicators
               • Dead animals

               • Dead plants

               • Unusual smells

                 (Hay, grass, sweet,
                  fruity, etc…)

               • Signs of tampering


       Copyright © 2012
Suspicious Equipment

              • Bolt cutters




              • Plumbing supplies




      Copyright © 2012
Suspicious Equipment

       Discarded
  Personal Protective
   Equipment (PPE)




        Copyright © 2012
Suspicious Items




Hand pumps


                                Containers

             Copyright © 2012
Nuclear Terrorism


 Nuclear Bombs



   Dirty Bombs



      Nuclear Power plant




                    Copyright © 2012
Dirty Bombs
A regular bomb packaged with radioactive material
    •Materials from hospitals, construction sites, food factories
    •Run crosswind, go inside
    •Listen to news
    •Decontaminate




                                 Smoke from the bomb has
                              radiation and may contaminate
                              from a few blocks to a couple of
                                  miles depending on size

                           Copyright © 2012
Arson



– Low risk

– Inexpensive

– Lethal


                Copyright © 2012
ARSON TOOLS

              • GAS CONTAINERS




              • MOLOTOV
                COCKTAILS




Copyright © 2012
CHEMICAL
     • Unusual packages by
       Heating or Air
       Conditioning Systems
     • Powder or liquid by
       intakes
     • Reports of suspicious
       persons by HVAC
     • Unscheduled
       Maintenance

 Copyright © 2012
Air Ducts




               Unexplained Odors
Fruity, flowery, sharp, garlic, mown grass, or hay

                    Copyright © 2012
Unscheduled spraying
or found spray devices




    

        Copyright © 2012
Terrorist Tactics
                 Worldwide Attacks



                     Other
                     10%
Assassination
      s
     6%
 Hijackings
    12%
                                        Bombings
                                          50%


    Armed
    Attacks
     22%




                     Copyright © 2012
Terrorist Operations: Bombing



– Low risk

– Inexpensive

– Most common

– Extremely lethal

– Generates instant media coverage

                     Copyright © 2012
BOMB PARTS




Switch   Initiator   blasting   explosives   target
                     cap
PARTS OF A BOMB




    Copyright © 2012
Copyright © 2012
SWITCHES




              Manual switch




                                   String Fuses
              Alarm Clocks
Cell phones

                Copyright © 2012
Copyright © 2012
Blasting Caps




                                     Time Fuse




PROFESSIONAL            IMPROVISED


                  Copyright © 2012
GUNPOWDER




  Copyright © 2012
Military Explosives
                    C-4 (aka plastic explosive)




• White solid, malleable

• Shaped charges,
  claymores, etc.
Commercial Explosives

         Dynamite
• Appears red, tan, brown
  or white
• .5 to 25 pound bags and
  bulk
• Manufacturer’s ID


                      Copyright © 2012
Commercial Explosives

                               Datasheet/Flex-X
• Datasheet – Commercial
• Flex-X – Military
• Flexible sheet
• Red to olive drab




                      Copyright © 2012
FERTILIZER
AND FUEL OIL




  Copyright © 2012
Delivery Methods

Abandoned Containers

Obvious Devices

Abandoned Vehicles

Unusual Devices

Trip Wires/Booby Traps

Suspicious Mailing Containers

                  Copyright © 2012
Package Bombs




               U.S. Post Office Poster
   Copyright © 2012
Package Bombs




   Copyright © 2012
What is this?




    Copyright © 2012
This is one of 22 such billboards across the Phoenix metro
area warning citizens about picking up discarded flashlights

                          Copyright © 2012
PIPE BOMBS




  Copyright © 2012
IS THERE A SUICIDE BOMBER PROFILE ?




              NO!


              Copyright © 2012
Terrorist Operations
                     Suicide Bomber

• Praying

• Locked on target

• Appears nervous

• Does not fit in

• Direct eye contact with another person

• Sweating and/or Rapid Eye Movement

• Possibly clean shaven or make up

                         Copyright © 2012
Terrorist Operations
                        Car/Truck Bombs

 Trust your instincts

  Noticeable signs

• Fuel smells

• Burglary marks

• Excessive weight

• Covered objects

• License plates don’t match each other


                           Copyright © 2012
Copyright © 2012
Copyright © 2012
Surface to Air Missile




•The Soviet-made SA-7 missile weighs about 30 pounds, is 5 feet long and
can be carried in a large duffel bag.

•The SA-7 can reach altitudes of up to 12,000 feet, and can be accurately
launched from more than two miles away. The altitude of the weapon
depends on the speed of the target.


                               Copyright © 2012
III. Reporting Procedures
       (How to report)
As a CAT Eyes trained employee you need to
keep your eyes open for terrorist indicators.
If it feels wrong:
      1. Notify the dispatcher on duty
      2. Fill out a Suspicious Activity Report




                     Copyright © 2012
Copyright © 2012
Copyright © 2012
Dispatchers will notify Safety Director ASAP
          and assist in filling out
        Suspicious Activity Report




                  Copyright © 2012
                   Copyright © 2012
Tips Away From Work

• Call your state tip line

• Call your local police




                    Copyright © 2012
… then report your suspicious lead with the FBI
            www.FBI.gov (tips link) or
               Call (202) 324-3000
And ask for local Joint Terrorism Task Force (JTTF)
                 phone number


                     Copyright © 2012
THEN LET LAW ENFORCEMENT
       TAKE OVER!!!

                 DO NOT CONDUCT
                     YOUR OWN
                  INVESTIGATION


                IT IS WRONG TO DO
               AND DANGEROUS!!!


         Copyright © 2012
Your Tip
• Patrol Car Drive By
• Part of an on-going
  investigation

• May be used in a
  future investigation

      Law Enforcement may not get back with you…
     Call it in and write it down for future reference…

                         Copyright © 2012
If you believe you have detected
    terrorism and your life is in jeopardy or
       the action is presently occurring…
•    Move to a safe and highly populated area

•    Go into a building

•    Seek the police

•    Call “911”


                       Copyright © 2012
                        Copyright © 2012
Basic points of observation
      and description
Reporting Procedures

• Think of the 6 W’s
   – Who
   – What
   – Where
   – When
   – Why
   – Write down your information!

                       Copyright © 2012
Bad Lead Vs. Good Lead

 “I saw a suspicious guy near the water tower”
                        vs.
“I saw a white male, about 6 ft tall wearing blue
    jeans, a brown jacket, a red hat and a black
   backpack climbing the north side fence of the
water tower on Washington Street. There was also
  a black Ford F-150 pick up truck parked on the
  grass near the fence. It had New Jersey license
     plates on it and the number was ABC123”

                   Copyright © 2012
C.Y.M.B.A.L.S. (people)

•   C = Color (hair, eyes, skin)
•   Y = Year of birth (age)
•   M = Make (Italian, Asian, Hispanic)
•   B = Body (height and weight)
•   A = Attire (color and type)
•   L = Looks (tattoo, beard, hair type)
•   S = Sex (male or female)


                     Copyright © 2012
EXERCISE
• Practice writing down
  a good lead
• On the back of
  student evaluation
  form write:
•   C
•   Y
•   M
•   B
•   A
•   L
•   S


                   Copyright © 2012
What did you see?
C.Y.M.B.A.L.S. (people)
•   C = Color (hair, eyes, skin)
•   Y = Year of birth (age)
•   M = Make (Italian, Asian, Hispanic)
•   B = Body (height and weight)
•   A = Attire (color and type)
•   L = Looks (tattoo, beard, hair type)
•   S = Sex (male or female)

                     Copyright © 2012
C.Y.M.B.A.L.S. (vehicles)

•   C = Color
•   Y = Year
•   M = Make/Model
•   B = Body style
•   A = All others (damage, signs, markings)
•   L = License Plate Number
•   S = State


                     Copyright © 2012
EXERCISE
• Practice writing down
  a good lead
• On the back of
  student evaluation
  form write:
•   C
•   Y
•   M
•   B
•   A
•   L
•   S


                    Copyright © 2012
What did you see?
C.Y.M.B.A.L.S. (vehicles)
•   C = Color
•   Y = Year
•   M = Make/Model
•   B = Body style
•   A = All others (damage, signs, markings)
•   L = License Plate Number
•   S = State


                     Copyright © 2012
One last reason for a good tip …




            Copyright © 2012
Rewards for Justice Program

           1. Witness Protection

           2. Up to $25 Million in cash

           3. Payable in any currency

           4. 1-800-US REWARDS

           5. www.rewardsforjustice.net
Copyright © 2012
10 Minute Break
Company Policies




     Copyright © 2012
COMPANY POLICIES
                COMPANY ID




Everyone wears visible ID’s while on property

                 Copyright © 2012
COMPANY POLICIES
                        Challenge people

•   Politely ask them what they are doing on property
•    Inside or outside of the buildings
•   Explain where they can get ID’s
•   If suspicious:
    - don’t confront,
    - tell someone
    - observe intruder from a distance
    - get a person/car description

                            Copyright © 2012
COMPANY POLICIES
   START OF DAY




      Copyright © 2012
Copyright © 2012
COMPANY POLICIES
                    END OF DAY

• Check lower baggage bay
• Unless in use keep baggage bays locked
• Lock any doors that can be locked on the buses




                      Copyright © 2012
COMPANY POLICIES
              Refusing or Ejecting PASSENGERS

Permitted, warn passenger first, then call police or supervisor
             to remove uncontrollable passengers




                           Copyright © 2012
COMPANY POLICIES
                       SUICIDE BOMBERS

• You must see the actual device

• Look for an empty parking lot

• Call Police and dispatcher

• Stop bus and evacuate tell
passengers there is a mechanical
problem



                           Copyright © 2012
COMPANY POLICIES
                           BOMB THREAT

        Check For Caller ID
Ask questions, think 6 W’s
• When will it explode?
• Where is it?
• Why did you place the bomb?
• What is your name?
• Where are you?
• What does it look like

                              Copyright © 2012
COMPANY POLICIES
                       BOMB THREAT

Prior to evacuation
This is a bomb threat not a Fire…
You don’t need to race out of building or bus
Do a quick search ( 1 minute maximum)
Grab keys, jacket, any quick items to continue operations
Leave the building to pre-designated safe area…
Safe area a bus with flashers on 300 feet from the building



                          Copyright © 2012
COMPANY POLICIES
                          BOMB THREAT

Search Techniques:

1) Floor to waist height

2) Waist height to eye level

3) Eye level to ceiling

4) Make note of unusual or out-of- place objects



                            Copyright © 2012
COMPANY POLICIES
   BOMB THREAT




     Copyright © 2012
COMPANY POLICIES
   BOMB THREAT




     Copyright © 2012
COMPANY POLICIES
   BOMB THREAT




     Copyright © 2012
COMPANY POLICIES
                      BUS BOMB THREAT


   DIRECTED TO ONE BUS ONLY
• Call 911 or dispatch for help
• Pull into an empty lot if possible
• Ask people to evacuate the bus for
a mechanical problem. Tell them to
take all their packages.




                           Copyright © 2012
COMPANY POLICIES
                 SUSPICIOUS PACKAGES

If the package appears suspicious, leave in place and
                 notify a supervisor




     If the package is not suspicious, follow lost
                and found procedures
                       Copyright © 2012
COMPANY POLICIES
           DETERMINING SUSPICIOUS PACKAGES

If a package is sealed with no markings
and left in a place not normally used
by the employees or public
          or

There are unusual noises, smells,
wires, leaking fluid or powder …
Then consider package suspicious


                          Copyright © 2012
Copyright © 2012
National Terrorism Advisory
      System (NTAS)



          Copyright © 2012
National Terrorism Advisory
      System (NTAS)




          Copyright © 2012
National Terrorism Advisory
         System (NTAS)
Elevated threat of a terror attack with an end date




                     Copyright © 2012
National Terrorism Advisory
         System (NTAS)
Imminent threat of a terror attack with an end date




                     Copyright © 2012
Family Policies




    Copyright © 2012
Family Terrorism plan
1. Family Communication plan
2. Family stay plan
3. Family leave plan




                       Copyright © 2012
“Don’t be afraid…be ready”




1. Make a kit
2. Make a plan
3. Be informed


Call 1-800-Be-Ready or visit www.ready.gov
                     Copyright © 2012
V. ALERT Teams




    Copyright © 2012
How do you maintain a high
   level of awareness?




         Copyright © 2012
By developing Awareness Leaders




           Copyright © 2012
How do you maintain a high level
      disaster readiness?




            Copyright © 2012
By developing
  Emergency
Response Teams




                 Copyright © 2012
What do you get when you have a
team of people dedicated to being
    Awareness Leaders and
  Emergency Response Teams?


                    An ALERT team!!




            Copyright © 2012
ALERT Teams
              What They Are


Awareness
Leaders and
Emergency
 Response
  Teams

                Copyright © 2012
ALERT Teams
   Dedicated group of professionals in each property that
volunteer their time to learn and educate other employees on
    terrorist threats and counter measures. ALERT Team
     members will be leaders in the event of disasters.




                         Copyright © 2012
Conclusion
Copyright © 2012
Copyright © 2012
Now let’s roll up our sleeves and “Protect
  America With Pride, Not Prejudice”




                 Copyright © 2012
REGISTER and FEEDBACK

       Please fill out critiques

Your evaluations are important to us

   Presenter: Frank Margulis

  WATCHING AMERICA WITH PRIDE, NOT PREJUDICE



                 Copyright © 2012

Mais conteúdo relacionado

Mais procurados

Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismAnthony Veluz
 
Unit #5 Terrorism Student Verision
Unit #5 Terrorism Student VerisionUnit #5 Terrorism Student Verision
Unit #5 Terrorism Student VerisionNick Allgyer
 
His 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperHis 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperhis145Phoenix
 
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS DAVID ADDINGTON - One Of Baker Donelson's WEAPONS
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS VogelDenise
 
What is terrorism
What is terrorismWhat is terrorism
What is terrorismazamhicks
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To TerrorismFaheem Ul Hasan
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International ProblemKeshav Choudhary
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issuerandima Dulanjani
 
Terrorism
TerrorismTerrorism
Terrorismu439
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorismmeducationdotnet
 
History of Terrorism
History of TerrorismHistory of Terrorism
History of Terrorismjmalagon42
 

Mais procurados (20)

6651
66516651
6651
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorism
 
Unit #5 Terrorism Student Verision
Unit #5 Terrorism Student VerisionUnit #5 Terrorism Student Verision
Unit #5 Terrorism Student Verision
 
His 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperHis 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paper
 
Terrorism
TerrorismTerrorism
Terrorism
 
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS DAVID ADDINGTON - One Of Baker Donelson's WEAPONS
DAVID ADDINGTON - One Of Baker Donelson's WEAPONS
 
M phil sem-ii cprt-altaf
M phil sem-ii cprt-altafM phil sem-ii cprt-altaf
M phil sem-ii cprt-altaf
 
What is terrorism
What is terrorismWhat is terrorism
What is terrorism
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Group no 7 terrorism
Group no 7 terrorismGroup no 7 terrorism
Group no 7 terrorism
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International Problem
 
War and Terrorism
War and TerrorismWar and Terrorism
War and Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorism
 
History of Terrorism
History of TerrorismHistory of Terrorism
History of Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 

Destaque

MRUG Presentation - Revit Dynamo
MRUG Presentation - Revit DynamoMRUG Presentation - Revit Dynamo
MRUG Presentation - Revit Dynamorevitator
 
Scarlet Clicks payment proof
Scarlet Clicks payment proofScarlet Clicks payment proof
Scarlet Clicks payment proofendor37
 
Identificacion de personas
Identificacion de personasIdentificacion de personas
Identificacion de personashecmilepi
 
Los tres cerditos
Los tres cerditosLos tres cerditos
Los tres cerditosmajean1
 
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case Study
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case StudyOracle Big Data Spatial & Graph 
Social Media Analysis - Case Study
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case StudyMark Rittman
 
Producto Ecoturistico y Comercializacion
Producto Ecoturistico y ComercializacionProducto Ecoturistico y Comercializacion
Producto Ecoturistico y ComercializacionAllan Rhodes
 
Desarrollo del Turismo en Áreas Protegidas
Desarrollo del Turismo en Áreas ProtegidasDesarrollo del Turismo en Áreas Protegidas
Desarrollo del Turismo en Áreas ProtegidasAllan Rhodes
 
Principios generales de la farmacología
Principios generales de la farmacologíaPrincipios generales de la farmacología
Principios generales de la farmacologíaLogan_sv
 
Maximal sprinting speed of elite soccer players
Maximal sprinting speed of elite soccer playersMaximal sprinting speed of elite soccer players
Maximal sprinting speed of elite soccer playersFernando Farias
 
Acute cardiopulmonary and metabolic responses to high intensity interval trai...
Acute cardiopulmonary and metabolic responses to high intensity interval trai...Acute cardiopulmonary and metabolic responses to high intensity interval trai...
Acute cardiopulmonary and metabolic responses to high intensity interval trai...Fernando Farias
 
Fol 8 el salario y la nómina 2016
Fol 8 el salario y la nómina  2016Fol 8 el salario y la nómina  2016
Fol 8 el salario y la nómina 2016jossansan1
 

Destaque (18)

resumescott1
resumescott1resumescott1
resumescott1
 
MRUG Presentation - Revit Dynamo
MRUG Presentation - Revit DynamoMRUG Presentation - Revit Dynamo
MRUG Presentation - Revit Dynamo
 
Autodesk Certificate Amir
Autodesk Certificate AmirAutodesk Certificate Amir
Autodesk Certificate Amir
 
Scarlet Clicks payment proof
Scarlet Clicks payment proofScarlet Clicks payment proof
Scarlet Clicks payment proof
 
Colegio nacional nicolás esquerra
Colegio nacional nicolás esquerraColegio nacional nicolás esquerra
Colegio nacional nicolás esquerra
 
Informe de toe
Informe de toeInforme de toe
Informe de toe
 
Identificacion de personas
Identificacion de personasIdentificacion de personas
Identificacion de personas
 
Sde1
Sde1Sde1
Sde1
 
Los tres cerditos
Los tres cerditosLos tres cerditos
Los tres cerditos
 
Trabajo Final Bases De Datos
Trabajo Final Bases De DatosTrabajo Final Bases De Datos
Trabajo Final Bases De Datos
 
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case Study
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case StudyOracle Big Data Spatial & Graph 
Social Media Analysis - Case Study
Oracle Big Data Spatial & Graph 
Social Media Analysis - Case Study
 
Producto Ecoturistico y Comercializacion
Producto Ecoturistico y ComercializacionProducto Ecoturistico y Comercializacion
Producto Ecoturistico y Comercializacion
 
Desarrollo del Turismo en Áreas Protegidas
Desarrollo del Turismo en Áreas ProtegidasDesarrollo del Turismo en Áreas Protegidas
Desarrollo del Turismo en Áreas Protegidas
 
Principios generales de la farmacología
Principios generales de la farmacologíaPrincipios generales de la farmacología
Principios generales de la farmacología
 
Maximal sprinting speed of elite soccer players
Maximal sprinting speed of elite soccer playersMaximal sprinting speed of elite soccer players
Maximal sprinting speed of elite soccer players
 
Acute cardiopulmonary and metabolic responses to high intensity interval trai...
Acute cardiopulmonary and metabolic responses to high intensity interval trai...Acute cardiopulmonary and metabolic responses to high intensity interval trai...
Acute cardiopulmonary and metabolic responses to high intensity interval trai...
 
Fol 8 el salario y la nómina 2016
Fol 8 el salario y la nómina  2016Fol 8 el salario y la nómina  2016
Fol 8 el salario y la nómina 2016
 
Práctica 1
Práctica 1Práctica 1
Práctica 1
 

Semelhante a Antiterrorism Training

His 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperHis 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperhis145Phoenix
 
In the years following the September 11, 2001, attacks, the number.docx
In the years following the September 11, 2001, attacks, the number.docxIn the years following the September 11, 2001, attacks, the number.docx
In the years following the September 11, 2001, attacks, the number.docxmigdalialyle
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror Boutkhil Guemide
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremismRichard Ali
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
AntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdfAntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdfeliasox
 
Govt 490 Paper Final Draft
Govt 490 Paper Final DraftGovt 490 Paper Final Draft
Govt 490 Paper Final DraftCurtis Pittman
 
Criminal subjects in the U.S. corporate media in the context of the "war on t...
Criminal subjects in the U.S. corporate media in the context of the "war on t...Criminal subjects in the U.S. corporate media in the context of the "war on t...
Criminal subjects in the U.S. corporate media in the context of the "war on t...Robert Beshara
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAmjad Ali
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?Denise Scelsi
 
enegren final research paper
enegren final research paperenegren final research paper
enegren final research paperMark Enegren
 

Semelhante a Antiterrorism Training (20)

His 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paperHis 145 week 5 individual assignment terrorism paper
His 145 week 5 individual assignment terrorism paper
 
In the years following the September 11, 2001, attacks, the number.docx
In the years following the September 11, 2001, attacks, the number.docxIn the years following the September 11, 2001, attacks, the number.docx
In the years following the September 11, 2001, attacks, the number.docx
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror
 
Terror
Terror Terror
Terror
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
 
Ms. Guyer's 2nd Period Terrorism/9-11 Group
Ms. Guyer's 2nd Period Terrorism/9-11 GroupMs. Guyer's 2nd Period Terrorism/9-11 Group
Ms. Guyer's 2nd Period Terrorism/9-11 Group
 
Terrorismo 12
Terrorismo 12Terrorismo 12
Terrorismo 12
 
Ppt 9 global crises
Ppt 9 global crisesPpt 9 global crises
Ppt 9 global crises
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
AntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdfAntiTerrorism_Level1-7.pdf
AntiTerrorism_Level1-7.pdf
 
Govt 490 Paper Final Draft
Govt 490 Paper Final DraftGovt 490 Paper Final Draft
Govt 490 Paper Final Draft
 
Criminal subjects in the U.S. corporate media in the context of the "war on t...
Criminal subjects in the U.S. corporate media in the context of the "war on t...Criminal subjects in the U.S. corporate media in the context of the "war on t...
Criminal subjects in the U.S. corporate media in the context of the "war on t...
 
Terrorism in Today's World lesson by Dean Berry
 Terrorism in Today's World  lesson by Dean Berry Terrorism in Today's World  lesson by Dean Berry
Terrorism in Today's World lesson by Dean Berry
 
AQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on TerrorismAQA Short Course- RE- Lesson on Terrorism
AQA Short Course- RE- Lesson on Terrorism
 
Terrorism 2010
Terrorism 2010Terrorism 2010
Terrorism 2010
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?
 
enegren final research paper
enegren final research paperenegren final research paper
enegren final research paper
 
Envision brief
Envision briefEnvision brief
Envision brief
 
Envision brief
Envision briefEnvision brief
Envision brief
 

Último

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 

Último (20)

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 

Antiterrorism Training

  • 1. Protecting America With Pride Not Prejudice www.cateyesprogram.com Copyright © 2012 Copyright © 2012
  • 2.
  • 3. Cell Phones • Standby – vibrate mode • Please talk in another room Copyright © 2012
  • 4. CAUTION: The following video is a graphic reminder of events related to 9/11. If you lost someone in this tragedy, you may want to leave the room for the next six minutes. Copyright © 2012
  • 5.
  • 6. The events of 9/11 changed our world Copyright © 2012
  • 7. While it is tempting to believe the threat is over … Copyright © 2012
  • 8. … the reality is, it is not. Foiled terrorist attacks on American soil since 9/11 Providence, RI Killeen, TX Portland, OR Knoxville, TN Jacksonville, FL Seattle, WA San Diego, CA Gadsden, AL Copyright © 2012
  • 9. Recent Terrorist Attacks on American Soil • Terrorists do not take a holiday – January 7th, 2012 – Tampa, FL (arrested) – January 8th, 2012 – Gadsden, AL (shootout) – January 12th, 2012 – Houston, TX (successful) – February 17th, 2012 – Washington, DC (sting) Copyright © 2012
  • 11.
  • 12. Why are buses a favorite target of terrorists? Copyright © 2012
  • 13. The 7 July 2005 London bombings (often referred to as 7/7) were a series of co-ordinated suicide attacks in London which targeted civilians using the public transport system during the morning rush hour. On the morning of Thursday, 7 July 2005, four Islamist home- grown terrorists detonated four bombs, three in quick succession aboard London Underground trains across the city and, later, a fourth on a double-decker bus in Tavistock Square. Fifty-two people, as well as the four bombers, were killed in the attacks, and over 700 more were injured. The explosions were caused by homemade organic peroxide- based devices packed into rucksacks. Copyright © 2012
  • 14. Why are buses a favorite target of terrorists? According to the National Counterterrorism Terrorism Center’s (NCTC’s) Worldwide Incident Tracking System (WITS) and open source data, terrorists conducted at least 827 attacks on mass transit bus systems from 2004 through 2010. These attacks killed approximately 1,867, and injured 5,704. None of these attacks occurred in the United States. SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  • 15. Why are buses a favorite target of terrorists? “TSA-OI assesses that mass transit bus systems are easy for terrorist groups to attack because they are open to the public, operate on predetermined and publicly available schedules, and travel along routes that can be difficult to patrol. For these reasons, bus mass transit systems will remain attractive targets for the foreseeable future.” SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  • 16. Why are buses a favorite target of terrorists? SOURCE: TSA-OI, Mass Transit and Passenger Bus Attacks, 10 Nov 2011 Copyright © 2012
  • 17. The difference between a successful attack and a foiled attack on American soil? Copyright © 2012
  • 18. Protecting America With Pride Not Prejudice www.cateyesprogram.com Copyright © 2012 Copyright © 2012
  • 19. CAT Eyes Program (Community Anti-Terrorism Training Institute) Nationwide program developed to eliminate racism and terrorism through educating and empowering the average citizens to defend our homeland against terrorism. Copyright © 2012
  • 20. “Watching America with Pride, Not Prejudice” Kathy Michelle “Watch for actions…trust your instincts…” Copyright © 2012
  • 21. Kathy Boudin (born 19 May 43) Convicted in 1984 of felony murder for her participation in an armed robbery that resulted in the killing of 3 people. Released from prison in 2003. Member of the Weather Underground, a domestic terror organization which bombed the Pentagon, US Capitol, and other targets Copyright © 2012
  • 22. Partnership at Work Police seize terrorist bombs •July 1997- Police raided a Brooklyn apartment and seized five bombs that were intended for use in suicide terrorist attacks on NYC subway system. •At least one of the men, and possibly all three, arrived in the United States within the past two weeks. Copyright © 2012
  • 23. Partnership at Work Police seize terrorist bombs A neighbor flagged down a Long Island Rail Road police officer and indicated there were bombs in the apartment. That tip sent police to the scene. Copyright © 2012
  • 24. Partnership at Work Police seize terrorist bombs • Rafael Cruz, a driver for Family Car Service, which operates from a storefront of the building, said he often saw the residents and said they made frequent trips to and from the airport. • ''They're always carrying huge bags and boxes. Come and go all the time,'' Cruz said. Copyright © 2012
  • 25. Brooklyn Bomb Scare By DAN BARRY (Published: August 03, 1997) An alleged plan by two Palestinian men to set off bombs in Brooklyn was thwarted by a police raid, but the specifics of the plot were chilling enough to rattle New York City. Law enforcement officials say that Lafi Khalil and Ghazi Abu Maizar planned to detonate bombs in a crowded subway station and a commuter bus, possibly as part of a suicide mission. Acting on a tip from a friend of the suspects, the police burst into a darkened Brooklyn apartment Thursday and shot the two men, authorities said, just as one of them was reaching for an explosive device.
  • 26. Partnership at Work • Pre-attack • Pre 9/11 • Pre CAT Eyes trained What could a CAT Eyes trained citizen’s instincts do in a post 9/11 world? Yu Kikimura, a member of the Japanese Red Army charged with plotting to bomb the U.S. Army Recruiting Station in New York City in retaliation for U.S. air strike against Libya in 1986
  • 27. • Fear Instincts Signals • Apprehension • Suspicion • Hesitation • Doubt • Gut feeling • Hunches • Curiosity • Nagging feelings From the book, The Gift of Fear by Gavin De Becker Copyright © 2012
  • 28. Overview • I. Terrorism Overview (tune your instincts) • II. Detecting Terrorism (what to look for) • III. Reporting Procedures (how to report findings) • IV. Company Policies • V. ALERT Teams Copyright © 2012
  • 29. I. TERRORISM OVERVIEW (tune your instincts) Copyright © 2012
  • 30. FBI definition of terrorism “The unlawful use of force or violence against persons or property to intimidate or coerce a government or civilian population, or any segment thereof, in furtherance of political or social objectives” Copyright © 2012
  • 31. The Terrorist Organization General Terrorist Profile • Intelligent • Well-educated • Obsessed with initiating change • Middle class to affluent • 22-25 years old Remember, these are generalities Copyright © 2012
  • 32. Categories of Terrorism Domestic International Copyright © 2012
  • 33. Domestic Terrorism Includes terrorist activity conducted by groups or individuals who are U.S. citizens that are based and operate entirely within the US without foreign direction and whose terrorist acts are directed at elements of the U.S. Government or society.
  • 34. International Terrorism Includes terrorist activity committed by groups or individuals that crosses national boundaries. These boundaries can be both physical as well as cultural.
  • 35. State Sponsors of Terrorism “ … more than 11,500 terrorist attacks occurred in 72 countries during 2010, resulting in more than 13,200 deaths.” Source: Country Reports on Terrorism 2010, Chapter 3: State Sponsors of Terrorism, (pub Aug 2011) Copyright © 2012
  • 36. Political Motives Ranges from the anarchist to communist, from capitalism to socialism Right Wing • New World Order • Gun control • Apocalyptic views • White supremacy • Anti-government • Anti-taxation Copyright © 2012
  • 37. Political Motives Ranges from the anarchist to communist, from capitalism to socialism Left Wing • Revolutionary socialist doctrine • Protectors against capitalism • Protectors against imperialism Copyright © 2012
  • 38. Nationalist Motives Bound by the same cultural or ethnic background with an urge to establish or regain a homeland Aryan Nation (Whites) Black Separatists Armed Forces for National Liberation (Puerto Rican) American Indian Movement Copyright © 2012
  • 39. Incorrect Religious Motives Not a Jihad Copyright © 2012
  • 40. Incorrect Religious Motives Courtesy of the BATF Copyright © 2012
  • 42. Words to Live By “Those who fail to study their history and learn from its lessons are destined to repeat it." George Santayana, philosopher Copyright © 2012
  • 43. Beirut Embassy Bombing Van with a bomb, 63 people dead (18 April 1983) Copyright © 2012
  • 44. Beirut Marine Barracks Bombing Terrorists blow up US Marine headquarters with a truck bomb, killing 241 Marines and Sailors and wounding 75 (23 October 1983) Copyright © 2012
  • 45. Pan Am Flight 103 Lockerbie, Scotland 270 dead (20 December 1988) Copyright © 2012
  • 46. World Trade Center, New York Over 1000 injured, 6 dead (26 Feb 1993) Copyright © 2012
  • 47. Tokyo Subway Chemical Attack 12 dead, thousands injured (20 March 1995) Copyright © 2012
  • 48. Oklahoma City (Murrah Federal Building) April 19, 1995 168 dead, hundreds injured Copyright © 2012
  • 49. Murrah Federal Building (Oklahoma City Bombing) Copyright © 2012
  • 52. Khobar Towers, Saudi Arabia June 25, 1996 19 dead, hundreds injured Copyright © 2012
  • 53. US Embassies, Kenya and Tanzania August 7, 1998 245 dead, thousands injured Copyright © 2012
  • 54. USS Cole, Port Aden, Yemen October 12, 2000 Copyright © 2012
  • 55. Flight 93, Pennsylvania September 11, 2001 Todd Beamer, Jeremy Glick and other passengers forced jet to crash in a field, killing all 44, but saving countless others by missing the intended target, the U.S. Capitol Copyright © 2012
  • 56. Pentagon September 11, 2001 189 dead, hundreds injured Copyright © 2012
  • 57. World Trade Center September 11, 2001 Approximately 3000 people dead and missing The most devastating terrorist attack and greatest rescue operation in the history of the world! Copyright © 2012
  • 59. This has been a brief, historical overview of terrorism. For something more current … Copyright © 2012
  • 60. 2010 – 2011, American Soil • Mohamed Osman Mohamud plans to detonate what he thought was a car bomb at a Christmas tree lighting ceremony in Portland, Oregon, but was actually part of a FBI Sting operation. He was arrested and charged with attempted terrorism. • Jose Pimentel, a 27-year-old native of the Dominican Republic plotted to explode several pipe bombs in the city of New York. Copyright © 2012
  • 61. 2010 – 2011, American Soil • Austin, Texas: Andrew Joseph Stack III crashes his plane into an IRS building in Austin, Texas killing himself and a person inside the building and injuring 13 others. The crash caused a serious fire and significant damage to the building. • Jacksonville, Florida: A man used a pipe bomb to attack a mosque. The bomb exploded while about 60 Muslims were praying in the mosque. The attack caused no injuries. Copyright © 2012
  • 62. 2010 – 2011, American Soil • New York's Times Square was evacuated after the discovery of a car bomb. US government believes radical Islamists in the Pakistani Taliban directed the plot, and may have financed it. • 26 year old Rezwan Ferdaus was arrested by the FBI for plotting to use C4 and a remote-controlled model of the US Navy's McDonnell Douglas F-4 Phantom II to bomb The Pentagon and the US Capitol. Rezwan Ferdaus had links to al-Qaeda and attempted to deliver bomb making materials for use against US troops in Iraq. Copyright © 2012
  • 63. 2010 – 2011, American Soil • Two men from Iran were arrested over a plot to assassinate the Saudi ambassador to Washington and to bomb the Saudi embassy in the city. Later in the day, the US government issued a worldwide alert in anticipation of other attacks. • Three letter bombs detonate in the mail rooms in two government buildings in Maryland. No one was killed or injured in the attack. Copyright © 2012
  • 64. 2010 – 2011, American Soil • The first letter bomb to explode was in a mailroom of the Department of Transport headquarters in the city of Hanover, Maryland. One hour later another letter bomb exploded inside a building in the city of Annapolis. No one was killed but one person was wounded in the blasts. • A pipe bomb is found on Lake Koshkonong, Wisconsin. The bomb squad showed up to detonate the bomb. No deaths or injuries occurred. Copyright © 2012
  • 65. 2010 – 2011, American Soil • A pipe bomb was left outside the U.S. Federal Penitentiary in the city of Terre Haute, Indiana. The bomb was made safe before it could explode and cause any damage or injury. • Two men planned to blow up a New York synagogue and the Empire State Building, but were arrested by undercover officers when they attempted to buy weapons. Copyright © 2012
  • 67. II. DETECTING TERRORISM (what to look for) Copyright © 2012
  • 69. 4 Basic Cells of Terrorists Leadership Cell Support Cell Intelligence Cell Operational Cell Copyright © 2012
  • 70. LEADERSHIP CELL ACTIVITIES Copyright © 2012
  • 71. Leadership Cell Activities • Hard to Detect • Better left to professionals • Generally influential or wealthy people: professionals, business owners, doctors, professors, etc… Copyright © 2012
  • 72. SUPPORT CELL ACTIVITIES Copyright © 2012
  • 73. Safe House • Pays in cash • Landlord or maid not permitted inside (meets people at door) • No furniture • Lab equipment inside • Strange comings and goings; lots of different people, unusual packages, unusual hours Copyright © 2012
  • 75. Counterfeit baby formula Cigarette Smuggling Copyright © 2012
  • 76. Illegal drugs Afghanistan produces 70% of world’s opium supply Credit Card Fraud Copyright © 2012
  • 77. Fake Non-profit Groups • United Association for Studies and Research • Benevolence International Foundation • Global Relief Foundation • Blessed Relief Foundation Copyright © 2012
  • 78. INTELLIGENCE CELL ACTIVITIES Copyright © 2012
  • 79. SURVEILLANCE Two Phases CASING (Target Selection) REHEARSAL (Pre-attack phase) Copyright © 2012
  • 80. CASING (Target Selection) • Use less experienced members of the group • Usually more than one team • Observes patterns of activities of potential target • Earliest and weakest phase of surveillance • Unusual activities: sketches, videos or photos • In restricted areas • Questions about security Copyright © 2012
  • 81. REHEARSAL (Pre-Attack phase) • Terrorist decide on target • Uses more experienced members • In a restricted area • Plan of attack is finalized Copyright © 2012
  • 82. CAT Eyes and bus company joint effort Copyright © 2012
  • 83. What does a terrorist look like? Make a guess Copyright © 2012
  • 84. Dismiss Popular Television Myths • Terrorists are not all male • Terrorists are not all “religious nuts” • Terrorists won’t come at you screaming and wearing hoods • Surveillance teams will not be wearing trench coats, but rather will attempt to blend in to the surrounding area
  • 85. Commonly used ruses to be in area • Dressed as clergy • Dressed as police • Utility workers • Women with a baby carriage • Door to door salespeople • Lovers in the park • Walking the dog Copyright © 2012
  • 86. Chicago Los New York Angeles Copyright © 2012
  • 87.
  • 90. OPERATIONAL CELL ACTIVITIES Copyright © 2012
  • 91. 5 Categories of WMD Materials “CBRNE” • Chemical • Biological • Radiological • Nuclear • Explosive Copyright © 2012
  • 92. Terrorist Operations Biological Biological Hard to detect until sick – Small Pox: small red bumps – Bubonic Plague: swollen lymph glands – Call authorities Copyright © 2012
  • 93. Terrorist Operations Biological ANTHRAX Mail: Powdery substance, No return address, Excessive postage, lots of tape, misspelled words Take action: cover the contaminated mail with plastic or paper Copyright © 2012
  • 94. United States Statistics • 1,000,000 miles of pipe • 800,000 miles of sewer lines • 170,000 drinking supply stations Copyright © 2012
  • 95. Suspicious Indicators • Dead animals • Dead plants • Unusual smells (Hay, grass, sweet, fruity, etc…) • Signs of tampering Copyright © 2012
  • 96. Suspicious Equipment • Bolt cutters • Plumbing supplies Copyright © 2012
  • 97. Suspicious Equipment Discarded Personal Protective Equipment (PPE) Copyright © 2012
  • 98. Suspicious Items Hand pumps Containers Copyright © 2012
  • 99. Nuclear Terrorism  Nuclear Bombs  Dirty Bombs  Nuclear Power plant Copyright © 2012
  • 100. Dirty Bombs A regular bomb packaged with radioactive material •Materials from hospitals, construction sites, food factories •Run crosswind, go inside •Listen to news •Decontaminate Smoke from the bomb has radiation and may contaminate from a few blocks to a couple of miles depending on size Copyright © 2012
  • 101. Arson – Low risk – Inexpensive – Lethal Copyright © 2012
  • 102. ARSON TOOLS • GAS CONTAINERS • MOLOTOV COCKTAILS Copyright © 2012
  • 103. CHEMICAL • Unusual packages by Heating or Air Conditioning Systems • Powder or liquid by intakes • Reports of suspicious persons by HVAC • Unscheduled Maintenance Copyright © 2012
  • 104. Air Ducts Unexplained Odors Fruity, flowery, sharp, garlic, mown grass, or hay Copyright © 2012
  • 105. Unscheduled spraying or found spray devices  Copyright © 2012
  • 106. Terrorist Tactics Worldwide Attacks Other 10% Assassination s 6% Hijackings 12% Bombings 50% Armed Attacks 22% Copyright © 2012
  • 107. Terrorist Operations: Bombing – Low risk – Inexpensive – Most common – Extremely lethal – Generates instant media coverage Copyright © 2012
  • 108. BOMB PARTS Switch Initiator blasting explosives target cap
  • 109. PARTS OF A BOMB Copyright © 2012
  • 111. SWITCHES Manual switch String Fuses Alarm Clocks Cell phones Copyright © 2012
  • 112.
  • 114. Blasting Caps Time Fuse PROFESSIONAL IMPROVISED Copyright © 2012
  • 116. Military Explosives C-4 (aka plastic explosive) • White solid, malleable • Shaped charges, claymores, etc.
  • 117. Commercial Explosives Dynamite • Appears red, tan, brown or white • .5 to 25 pound bags and bulk • Manufacturer’s ID Copyright © 2012
  • 118. Commercial Explosives Datasheet/Flex-X • Datasheet – Commercial • Flex-X – Military • Flexible sheet • Red to olive drab Copyright © 2012
  • 119. FERTILIZER AND FUEL OIL Copyright © 2012
  • 120. Delivery Methods Abandoned Containers Obvious Devices Abandoned Vehicles Unusual Devices Trip Wires/Booby Traps Suspicious Mailing Containers Copyright © 2012
  • 121. Package Bombs U.S. Post Office Poster Copyright © 2012
  • 122. Package Bombs Copyright © 2012
  • 123. What is this? Copyright © 2012
  • 124. This is one of 22 such billboards across the Phoenix metro area warning citizens about picking up discarded flashlights Copyright © 2012
  • 125. PIPE BOMBS Copyright © 2012
  • 126. IS THERE A SUICIDE BOMBER PROFILE ? NO! Copyright © 2012
  • 127. Terrorist Operations Suicide Bomber • Praying • Locked on target • Appears nervous • Does not fit in • Direct eye contact with another person • Sweating and/or Rapid Eye Movement • Possibly clean shaven or make up Copyright © 2012
  • 128. Terrorist Operations Car/Truck Bombs Trust your instincts Noticeable signs • Fuel smells • Burglary marks • Excessive weight • Covered objects • License plates don’t match each other Copyright © 2012
  • 131. Surface to Air Missile •The Soviet-made SA-7 missile weighs about 30 pounds, is 5 feet long and can be carried in a large duffel bag. •The SA-7 can reach altitudes of up to 12,000 feet, and can be accurately launched from more than two miles away. The altitude of the weapon depends on the speed of the target. Copyright © 2012
  • 132. III. Reporting Procedures (How to report)
  • 133. As a CAT Eyes trained employee you need to keep your eyes open for terrorist indicators. If it feels wrong: 1. Notify the dispatcher on duty 2. Fill out a Suspicious Activity Report Copyright © 2012
  • 136. Dispatchers will notify Safety Director ASAP and assist in filling out Suspicious Activity Report Copyright © 2012 Copyright © 2012
  • 137. Tips Away From Work • Call your state tip line • Call your local police Copyright © 2012
  • 138. … then report your suspicious lead with the FBI www.FBI.gov (tips link) or Call (202) 324-3000 And ask for local Joint Terrorism Task Force (JTTF) phone number Copyright © 2012
  • 139. THEN LET LAW ENFORCEMENT TAKE OVER!!! DO NOT CONDUCT YOUR OWN INVESTIGATION IT IS WRONG TO DO AND DANGEROUS!!! Copyright © 2012
  • 140. Your Tip • Patrol Car Drive By • Part of an on-going investigation • May be used in a future investigation Law Enforcement may not get back with you… Call it in and write it down for future reference… Copyright © 2012
  • 141. If you believe you have detected terrorism and your life is in jeopardy or the action is presently occurring… • Move to a safe and highly populated area • Go into a building • Seek the police • Call “911” Copyright © 2012 Copyright © 2012
  • 142. Basic points of observation and description
  • 143. Reporting Procedures • Think of the 6 W’s – Who – What – Where – When – Why – Write down your information! Copyright © 2012
  • 144. Bad Lead Vs. Good Lead “I saw a suspicious guy near the water tower” vs. “I saw a white male, about 6 ft tall wearing blue jeans, a brown jacket, a red hat and a black backpack climbing the north side fence of the water tower on Washington Street. There was also a black Ford F-150 pick up truck parked on the grass near the fence. It had New Jersey license plates on it and the number was ABC123” Copyright © 2012
  • 145. C.Y.M.B.A.L.S. (people) • C = Color (hair, eyes, skin) • Y = Year of birth (age) • M = Make (Italian, Asian, Hispanic) • B = Body (height and weight) • A = Attire (color and type) • L = Looks (tattoo, beard, hair type) • S = Sex (male or female) Copyright © 2012
  • 146. EXERCISE • Practice writing down a good lead • On the back of student evaluation form write: • C • Y • M • B • A • L • S Copyright © 2012
  • 147.
  • 148. What did you see?
  • 149. C.Y.M.B.A.L.S. (people) • C = Color (hair, eyes, skin) • Y = Year of birth (age) • M = Make (Italian, Asian, Hispanic) • B = Body (height and weight) • A = Attire (color and type) • L = Looks (tattoo, beard, hair type) • S = Sex (male or female) Copyright © 2012
  • 150.
  • 151. C.Y.M.B.A.L.S. (vehicles) • C = Color • Y = Year • M = Make/Model • B = Body style • A = All others (damage, signs, markings) • L = License Plate Number • S = State Copyright © 2012
  • 152. EXERCISE • Practice writing down a good lead • On the back of student evaluation form write: • C • Y • M • B • A • L • S Copyright © 2012
  • 153.
  • 154. What did you see?
  • 155. C.Y.M.B.A.L.S. (vehicles) • C = Color • Y = Year • M = Make/Model • B = Body style • A = All others (damage, signs, markings) • L = License Plate Number • S = State Copyright © 2012
  • 156.
  • 157. One last reason for a good tip … Copyright © 2012
  • 158. Rewards for Justice Program 1. Witness Protection 2. Up to $25 Million in cash 3. Payable in any currency 4. 1-800-US REWARDS 5. www.rewardsforjustice.net
  • 161. Company Policies Copyright © 2012
  • 162. COMPANY POLICIES COMPANY ID Everyone wears visible ID’s while on property Copyright © 2012
  • 163. COMPANY POLICIES Challenge people • Politely ask them what they are doing on property • Inside or outside of the buildings • Explain where they can get ID’s • If suspicious: - don’t confront, - tell someone - observe intruder from a distance - get a person/car description Copyright © 2012
  • 164. COMPANY POLICIES START OF DAY Copyright © 2012
  • 166. COMPANY POLICIES END OF DAY • Check lower baggage bay • Unless in use keep baggage bays locked • Lock any doors that can be locked on the buses Copyright © 2012
  • 167. COMPANY POLICIES Refusing or Ejecting PASSENGERS Permitted, warn passenger first, then call police or supervisor to remove uncontrollable passengers Copyright © 2012
  • 168. COMPANY POLICIES SUICIDE BOMBERS • You must see the actual device • Look for an empty parking lot • Call Police and dispatcher • Stop bus and evacuate tell passengers there is a mechanical problem Copyright © 2012
  • 169. COMPANY POLICIES BOMB THREAT Check For Caller ID Ask questions, think 6 W’s • When will it explode? • Where is it? • Why did you place the bomb? • What is your name? • Where are you? • What does it look like Copyright © 2012
  • 170. COMPANY POLICIES BOMB THREAT Prior to evacuation This is a bomb threat not a Fire… You don’t need to race out of building or bus Do a quick search ( 1 minute maximum) Grab keys, jacket, any quick items to continue operations Leave the building to pre-designated safe area… Safe area a bus with flashers on 300 feet from the building Copyright © 2012
  • 171. COMPANY POLICIES BOMB THREAT Search Techniques: 1) Floor to waist height 2) Waist height to eye level 3) Eye level to ceiling 4) Make note of unusual or out-of- place objects Copyright © 2012
  • 172. COMPANY POLICIES BOMB THREAT Copyright © 2012
  • 173. COMPANY POLICIES BOMB THREAT Copyright © 2012
  • 174. COMPANY POLICIES BOMB THREAT Copyright © 2012
  • 175. COMPANY POLICIES BUS BOMB THREAT DIRECTED TO ONE BUS ONLY • Call 911 or dispatch for help • Pull into an empty lot if possible • Ask people to evacuate the bus for a mechanical problem. Tell them to take all their packages. Copyright © 2012
  • 176. COMPANY POLICIES SUSPICIOUS PACKAGES If the package appears suspicious, leave in place and notify a supervisor If the package is not suspicious, follow lost and found procedures Copyright © 2012
  • 177. COMPANY POLICIES DETERMINING SUSPICIOUS PACKAGES If a package is sealed with no markings and left in a place not normally used by the employees or public or There are unusual noises, smells, wires, leaking fluid or powder … Then consider package suspicious Copyright © 2012
  • 179. National Terrorism Advisory System (NTAS) Copyright © 2012
  • 180. National Terrorism Advisory System (NTAS) Copyright © 2012
  • 181. National Terrorism Advisory System (NTAS) Elevated threat of a terror attack with an end date Copyright © 2012
  • 182. National Terrorism Advisory System (NTAS) Imminent threat of a terror attack with an end date Copyright © 2012
  • 183. Family Policies Copyright © 2012
  • 184. Family Terrorism plan 1. Family Communication plan 2. Family stay plan 3. Family leave plan Copyright © 2012
  • 185. “Don’t be afraid…be ready” 1. Make a kit 2. Make a plan 3. Be informed Call 1-800-Be-Ready or visit www.ready.gov Copyright © 2012
  • 186. V. ALERT Teams Copyright © 2012
  • 187. How do you maintain a high level of awareness? Copyright © 2012
  • 188. By developing Awareness Leaders Copyright © 2012
  • 189. How do you maintain a high level disaster readiness? Copyright © 2012
  • 190. By developing Emergency Response Teams Copyright © 2012
  • 191. What do you get when you have a team of people dedicated to being Awareness Leaders and Emergency Response Teams? An ALERT team!! Copyright © 2012
  • 192. ALERT Teams What They Are Awareness Leaders and Emergency Response Teams Copyright © 2012
  • 193. ALERT Teams Dedicated group of professionals in each property that volunteer their time to learn and educate other employees on terrorist threats and counter measures. ALERT Team members will be leaders in the event of disasters. Copyright © 2012
  • 197. Now let’s roll up our sleeves and “Protect America With Pride, Not Prejudice” Copyright © 2012
  • 198. REGISTER and FEEDBACK Please fill out critiques Your evaluations are important to us Presenter: Frank Margulis WATCHING AMERICA WITH PRIDE, NOT PREJUDICE Copyright © 2012