SlideShare uma empresa Scribd logo
1 de 17
Emily Hubbart
Teresa Long
Charles Varghese
Jeff Wyatt
 Protruding

wires
 Strange odors
 Excessive tape or string
 Oily spots or
discolorations
 Ticking, sloshing or
buzzing sounds
 Excessive
size, weight, or
thickness

Source: Newstipster.com
 Lopsided

Source: slate.com

or uneven

envelope
 Powdery substance
felt through or
noticeable on outside
the package or
envelope
 Metallic components
or batteries
 Loose contents
 Marked

with restrictions

• Personal
• Confidential
• Do not x-ray
 Marked

with threatening or
abusive language
 Placed near ventilation
system
 Postmarked from a location
that does not match the
return address
 Excessive postage

Source: csoonline.com


Addressing Issues
• Misspelled words

• Mistyped or handwritten
•

•
•
•
•
•

addresses
Not addressed to a specific
person
Wrong titles or names
No or strange return
address
Unexpected point of origin
Cut-and-paste lettering
Missing postal stamp
cancellation marks

Source: Hawii.edu
 Chemical

Agents
 Biological Agents
 Explosive Devices
 Radiological Agents

Source: FBI




Includes biotoxins, nerve agents,
blister agents, caustic or corrosive
substances, organic solvents,
choking agents, metallic poisons,
incapacitating agents, etc.
Suspicious envelopes containing
ricin have been mailed to Public
officials
• Can be in the form of a powder, a

mist, a pellet, or it can be dissolved
in water or weak acid
• Death from ricin poisoning may
take place within 36 to 72 hours of
exposure, depending on route of
exposure (inhalation, ingestion, or
injection) and dose received

Source: WVEC.com
 Cause

illness,
disease, and death
• Anthrax
• Small Pox
• Virus

• Bacteria
• Rickettsiae
 Making

biological
weapons is a
complicated process

Source: expats.com


Homemade devices
designed to cause death
or injury that have:
•
•
•
•
•



A switch/trigger
An initiator (fuse)
Main charge (explosive fill)
A power source
A container

Use explosives alone or in
combination with toxic
chemicals, biological
toxins, or radiological
materials

Source: globalsecurity.org
Dirty Bombs or
radiological dispersal
devices (RDD), are
conventional explosives
packaged with
radioactive materials
 Injures or kills via the
initial blast of the
conventional
explosives, and by
airborne radiation
 Easily constructed


Source: SpaceWar.com


Unattended packages
can be found anywhere
• Mail Rooms
• Public buildings such as

•
•
•

•

libraries, churches, malls,
and schools
Government facilities
Near ventilation systems
Mass transit systems
Outside / public events

Source: Menupix.com
Mail rooms face the
biggest threat
 Protective Measures


• Employ professional security
•

•
•

•

personnel
Have security personnel
greet all employees and
visitors and examine their
personal belongings
Restrict access to the facility
to authorized users only
Keep detailed logs of visitor
arrivals and departures
Install an intrusion detection
system

Source: newpaltz.edu
Do
 Isolate

package immediately
 Place package or envelope on stable
surface
 WASH hands with soap and water
 Alert others
 Turn off fans or equipment that circulates air
 Evacuate / secure the area
 Notify appropriate persons or authorities
Don’t
 Use

radios or cellular phones near the
package
 Look closely at it
 Touch it
 Carry it
 Shake it
 Open it
 Empty it
 Taste it
 Smell it
 Show it to others














"Al Qaeda Actively Seeking Dirty Bombs: Documents." Spacewar.com. SpaceDaily, 2 Feb. 2011. Web. 26 May 2013.
<http://www.spacewar.com/reports/Al_Qaeda_actively_seeking_dirty_bombs_documents_999.html>.
Bhattacharjee, Yudhijit. "The Curse of the White Powder: How Fake Bioterrorism Attacks Became a Real Problem."
Slate Magazine. The Slate Group, 30 Jan. 2012. Web. 26 May 2013.
<http://www.slate.com/articles/health_and_science/science/2012/01/white_powder_hoaxes_a_trend_in_fake_terroris
m_.html>.
"Biological Threats and Bio - Terrorism." Biological Threats and Bio - Terrorism. N.p., 22 Feb. 2012. Web. 26 May
2013. <http://cjc.delaware.gov/terrorism/bio.shtml>.
"Campus Security & Emergency Management." Campus Security & Emergency Management. N.p., 7 Nov. 2011.
Web. 26 May 2013. <http://www.hawaii.edu/security/archives_files/category-uh-alerts.html>.
Canada. National Security Directorate. Suspicious Package Response Planning Guide. By So Licito R General
Canada. N.p.: n.p., 2003. Web. 26 May 2013.
<http://www.dps.mo.gov/homelandsecurity/safeschools/documents/Canadian%20Suspicious%20Package%20Guide.
pdf>.
"Capitol Hill Area." Capitol Hill Restaurants and Food. MenuPix, LLC, n.d. Web. 26 May 2013.
<http://www.menupix.com/dc/a/504/Capitol-Hill-restaurants>.
"Charges Dropped against Man in Ricin Letters Case." Wvec.com. WVEC Television, Inc., 23 Apr. 2013. Web. 26
May 2013. <http://www.wvec.com/news/Charges-dropped-against-man-in-ricin-letters-case-204366691.html>.
"Chemical Categories." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013.
<http://emergency.cdc.gov/agent/agentlistchem-category.asp>.
"Council on Foreign Relations." Council on Foreign Relations. Council on Foreign Relations, 19 Oct. 2006. Web. 26
May 2013. <http://www.cfr.org/weapons-of-terrorism/dirty-bombs/p9548>.
"Department of Safety & Homeland SecurityBill Gibbons, Commissioner." Department of Safety & Homeland
Security. Department of Safety, n.d. Web. 26 May 2013. <http://www.tn.gov/homelandsecurity/id_mail.shtml>.
Duffy, Daintry. "Suspicious Packages and Mailroom Security - Handle with Care." CSO. CXO Media Inc, 1 July 2004.
Web. 26 May 2013. <http://www.csoonline.com/article/219412/suspicious-packages-and-mailroom-security-handlewith-care>.














"Envelope with Suspect Powder Found in Malonne Convent." The Bulletin. The Bulletin, 16
Oct. 2012. Web. 26 May 2013. <http://www.xpats.com/envelope-suspect-powder-foundmalonne-convent>.
"Facts About Ricin." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May
2013. <http://www.bt.cdc.gov/agent/ricin/facts.asp>.
"How to Recognize and Handle a Suspicious Package or Envelope." CDC Anthrax. Center
for Disease Control and Protection, n.d. Web. 26 May 2013.
<http://www.bt.cdc.gov/agent/anthrax/mail/suspiciouspackages.asp>.
"Improvised Explosive Devices (IEDs) / Booby Traps." Improvised Explosive Devices (IEDs)
/ Booby Traps. Global Security, n.d. Web. 26 May 2013.
<http://www.globalsecurity.org/military/intro/ied.htm>.
"Mailroom Moved and Mail Backlog Cleared." News Pulse. News Pulse, 9 Sept. 2011. Web.
26 May 2013. <http://newspulse.newpaltz.edu/2011/09/09/mailroom-moved-and-mailbacklog-cleared/>.
"Personal Security in the Courts: Additional Threats in the Workplace." Personal Security in
the Courts: Additional Threats in the Workplace. Judicial Council of California Administrative
Office of the Courts, 2003. Web. 26 May 2013.
<http://www2.courtinfo.ca.gov/protem/courses/ct/personal_security/21_threats.htm>.
"Protect Your Workplace from Suspicious Packages." FBI. FBI, Sept. 2006. Web. 26 May
2013. <http://www.fbi.gov/news/stories/2006/september>.
United States. Homeland Security. Department of Homeland Security. Best Practices for
Safe Mail Handling. By Interagency Security Committee. N.p.: n.p., n.d. Web. 26 May 2013.

Mais conteúdo relacionado

Mais procurados

Presentation working at height
Presentation working at heightPresentation working at height
Presentation working at height
sankarnagar
 
Scaffolding safety training.ppt
Scaffolding safety training.pptScaffolding safety training.ppt
Scaffolding safety training.ppt
IrfanAwan25
 
Accident investigation 3
Accident investigation 3Accident investigation 3
Accident investigation 3
Hien Dinh
 

Mais procurados (20)

Chemcial handling
 Chemcial handling Chemcial handling
Chemcial handling
 
Chemical Safety in the Workplace
Chemical Safety in the WorkplaceChemical Safety in the Workplace
Chemical Safety in the Workplace
 
EHS induction Presentation slides
EHS induction Presentation slidesEHS induction Presentation slides
EHS induction Presentation slides
 
HIRA training
HIRA   trainingHIRA   training
HIRA training
 
Presentation working at height
Presentation working at heightPresentation working at height
Presentation working at height
 
Emergency Evacuation Training by UMES
Emergency Evacuation Training by UMESEmergency Evacuation Training by UMES
Emergency Evacuation Training by UMES
 
nearmiss.ppt
nearmiss.pptnearmiss.ppt
nearmiss.ppt
 
Chemical Handling Training.pptx
Chemical Handling Training.pptxChemical Handling Training.pptx
Chemical Handling Training.pptx
 
Chemical safety
Chemical safety  Chemical safety
Chemical safety
 
Scaffolding safety training.ppt
Scaffolding safety training.pptScaffolding safety training.ppt
Scaffolding safety training.ppt
 
Near miss awareness for Petroleum Oil Refinery
Near miss awareness  for Petroleum Oil RefineryNear miss awareness  for Petroleum Oil Refinery
Near miss awareness for Petroleum Oil Refinery
 
A Part 1 Safety Induction
A  Part 1 Safety InductionA  Part 1 Safety Induction
A Part 1 Safety Induction
 
Safety Quiz
Safety QuizSafety Quiz
Safety Quiz
 
Electrical safety new
Electrical safety newElectrical safety new
Electrical safety new
 
Hazard Communication Training by PA L&I
Hazard Communication Training by PA L&IHazard Communication Training by PA L&I
Hazard Communication Training by PA L&I
 
Confined Space by MSU
Confined Space by MSUConfined Space by MSU
Confined Space by MSU
 
Hazard assessment and risk management techniques
Hazard assessment and risk management techniquesHazard assessment and risk management techniques
Hazard assessment and risk management techniques
 
Safe Chemical Handling & Initial Spill Response
Safe Chemical Handling & Initial Spill ResponseSafe Chemical Handling & Initial Spill Response
Safe Chemical Handling & Initial Spill Response
 
Accident investigation 3
Accident investigation 3Accident investigation 3
Accident investigation 3
 
Basic safety
Basic safetyBasic safety
Basic safety
 

Mais de Teresa Long

Chain of custody form
Chain of custody formChain of custody form
Chain of custody form
Teresa Long
 
Collecting bacteria sample
Collecting bacteria sampleCollecting bacteria sample
Collecting bacteria sample
Teresa Long
 
Water quality in the galveston bay system
Water quality in the galveston bay systemWater quality in the galveston bay system
Water quality in the galveston bay system
Teresa Long
 
Bucket Elevator Poster
Bucket Elevator PosterBucket Elevator Poster
Bucket Elevator Poster
Teresa Long
 
Fabrication Shop Ergonomics
Fabrication Shop ErgonomicsFabrication Shop Ergonomics
Fabrication Shop Ergonomics
Teresa Long
 
Ensuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case StudyEnsuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case Study
Teresa Long
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
Teresa Long
 
Employee Privacy vs. Patient Safety
Employee Privacy vs. Patient SafetyEmployee Privacy vs. Patient Safety
Employee Privacy vs. Patient Safety
Teresa Long
 
Slavery as a cause of the civil war
Slavery as a cause of the civil warSlavery as a cause of the civil war
Slavery as a cause of the civil war
Teresa Long
 
Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?
Teresa Long
 
Ensuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supplyEnsuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supply
Teresa Long
 
Smoking: Why Quit?
Smoking: Why Quit?Smoking: Why Quit?
Smoking: Why Quit?
Teresa Long
 

Mais de Teresa Long (20)

Beat the heat 2020
Beat the heat 2020Beat the heat 2020
Beat the heat 2020
 
Heat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS SolutionsHeat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS Solutions
 
Introduction to confined spaces
Introduction to confined spacesIntroduction to confined spaces
Introduction to confined spaces
 
Noise and hearing loss prevention
Noise and hearing loss preventionNoise and hearing loss prevention
Noise and hearing loss prevention
 
Atmospheric Testing in Confined Spaces
Atmospheric Testing in Confined SpacesAtmospheric Testing in Confined Spaces
Atmospheric Testing in Confined Spaces
 
Field refguide
Field refguideField refguide
Field refguide
 
Chain of custody form
Chain of custody formChain of custody form
Chain of custody form
 
Collecting bacteria sample
Collecting bacteria sampleCollecting bacteria sample
Collecting bacteria sample
 
Sop bacteria
Sop bacteriaSop bacteria
Sop bacteria
 
Water quality in the galveston bay system
Water quality in the galveston bay systemWater quality in the galveston bay system
Water quality in the galveston bay system
 
Bucket Elevator Poster
Bucket Elevator PosterBucket Elevator Poster
Bucket Elevator Poster
 
Fabrication Shop Ergonomics
Fabrication Shop ErgonomicsFabrication Shop Ergonomics
Fabrication Shop Ergonomics
 
Ensuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case StudyEnsuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case Study
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Employee Privacy vs. Patient Safety
Employee Privacy vs. Patient SafetyEmployee Privacy vs. Patient Safety
Employee Privacy vs. Patient Safety
 
Slavery as a cause of the civil war
Slavery as a cause of the civil warSlavery as a cause of the civil war
Slavery as a cause of the civil war
 
Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?
 
Ensuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supplyEnsuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supply
 
Bucket Elevator
Bucket ElevatorBucket Elevator
Bucket Elevator
 
Smoking: Why Quit?
Smoking: Why Quit?Smoking: Why Quit?
Smoking: Why Quit?
 

Último

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Último (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Workplace Security-Suspicious Package Protocol

  • 1. Emily Hubbart Teresa Long Charles Varghese Jeff Wyatt
  • 2.  Protruding wires  Strange odors  Excessive tape or string  Oily spots or discolorations  Ticking, sloshing or buzzing sounds  Excessive size, weight, or thickness Source: Newstipster.com
  • 3.  Lopsided Source: slate.com or uneven envelope  Powdery substance felt through or noticeable on outside the package or envelope  Metallic components or batteries  Loose contents
  • 4.  Marked with restrictions • Personal • Confidential • Do not x-ray  Marked with threatening or abusive language  Placed near ventilation system  Postmarked from a location that does not match the return address  Excessive postage Source: csoonline.com
  • 5.  Addressing Issues • Misspelled words • Mistyped or handwritten • • • • • • addresses Not addressed to a specific person Wrong titles or names No or strange return address Unexpected point of origin Cut-and-paste lettering Missing postal stamp cancellation marks Source: Hawii.edu
  • 6.
  • 7.  Chemical Agents  Biological Agents  Explosive Devices  Radiological Agents Source: FBI
  • 8.   Includes biotoxins, nerve agents, blister agents, caustic or corrosive substances, organic solvents, choking agents, metallic poisons, incapacitating agents, etc. Suspicious envelopes containing ricin have been mailed to Public officials • Can be in the form of a powder, a mist, a pellet, or it can be dissolved in water or weak acid • Death from ricin poisoning may take place within 36 to 72 hours of exposure, depending on route of exposure (inhalation, ingestion, or injection) and dose received Source: WVEC.com
  • 9.  Cause illness, disease, and death • Anthrax • Small Pox • Virus • Bacteria • Rickettsiae  Making biological weapons is a complicated process Source: expats.com
  • 10.  Homemade devices designed to cause death or injury that have: • • • • •  A switch/trigger An initiator (fuse) Main charge (explosive fill) A power source A container Use explosives alone or in combination with toxic chemicals, biological toxins, or radiological materials Source: globalsecurity.org
  • 11. Dirty Bombs or radiological dispersal devices (RDD), are conventional explosives packaged with radioactive materials  Injures or kills via the initial blast of the conventional explosives, and by airborne radiation  Easily constructed  Source: SpaceWar.com
  • 12.  Unattended packages can be found anywhere • Mail Rooms • Public buildings such as • • • • libraries, churches, malls, and schools Government facilities Near ventilation systems Mass transit systems Outside / public events Source: Menupix.com
  • 13. Mail rooms face the biggest threat  Protective Measures  • Employ professional security • • • • personnel Have security personnel greet all employees and visitors and examine their personal belongings Restrict access to the facility to authorized users only Keep detailed logs of visitor arrivals and departures Install an intrusion detection system Source: newpaltz.edu
  • 14. Do  Isolate package immediately  Place package or envelope on stable surface  WASH hands with soap and water  Alert others  Turn off fans or equipment that circulates air  Evacuate / secure the area  Notify appropriate persons or authorities
  • 15. Don’t  Use radios or cellular phones near the package  Look closely at it  Touch it  Carry it  Shake it  Open it  Empty it  Taste it  Smell it  Show it to others
  • 16.            "Al Qaeda Actively Seeking Dirty Bombs: Documents." Spacewar.com. SpaceDaily, 2 Feb. 2011. Web. 26 May 2013. <http://www.spacewar.com/reports/Al_Qaeda_actively_seeking_dirty_bombs_documents_999.html>. Bhattacharjee, Yudhijit. "The Curse of the White Powder: How Fake Bioterrorism Attacks Became a Real Problem." Slate Magazine. The Slate Group, 30 Jan. 2012. Web. 26 May 2013. <http://www.slate.com/articles/health_and_science/science/2012/01/white_powder_hoaxes_a_trend_in_fake_terroris m_.html>. "Biological Threats and Bio - Terrorism." Biological Threats and Bio - Terrorism. N.p., 22 Feb. 2012. Web. 26 May 2013. <http://cjc.delaware.gov/terrorism/bio.shtml>. "Campus Security & Emergency Management." Campus Security & Emergency Management. N.p., 7 Nov. 2011. Web. 26 May 2013. <http://www.hawaii.edu/security/archives_files/category-uh-alerts.html>. Canada. National Security Directorate. Suspicious Package Response Planning Guide. By So Licito R General Canada. N.p.: n.p., 2003. Web. 26 May 2013. <http://www.dps.mo.gov/homelandsecurity/safeschools/documents/Canadian%20Suspicious%20Package%20Guide. pdf>. "Capitol Hill Area." Capitol Hill Restaurants and Food. MenuPix, LLC, n.d. Web. 26 May 2013. <http://www.menupix.com/dc/a/504/Capitol-Hill-restaurants>. "Charges Dropped against Man in Ricin Letters Case." Wvec.com. WVEC Television, Inc., 23 Apr. 2013. Web. 26 May 2013. <http://www.wvec.com/news/Charges-dropped-against-man-in-ricin-letters-case-204366691.html>. "Chemical Categories." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013. <http://emergency.cdc.gov/agent/agentlistchem-category.asp>. "Council on Foreign Relations." Council on Foreign Relations. Council on Foreign Relations, 19 Oct. 2006. Web. 26 May 2013. <http://www.cfr.org/weapons-of-terrorism/dirty-bombs/p9548>. "Department of Safety & Homeland SecurityBill Gibbons, Commissioner." Department of Safety & Homeland Security. Department of Safety, n.d. Web. 26 May 2013. <http://www.tn.gov/homelandsecurity/id_mail.shtml>. Duffy, Daintry. "Suspicious Packages and Mailroom Security - Handle with Care." CSO. CXO Media Inc, 1 July 2004. Web. 26 May 2013. <http://www.csoonline.com/article/219412/suspicious-packages-and-mailroom-security-handlewith-care>.
  • 17.         "Envelope with Suspect Powder Found in Malonne Convent." The Bulletin. The Bulletin, 16 Oct. 2012. Web. 26 May 2013. <http://www.xpats.com/envelope-suspect-powder-foundmalonne-convent>. "Facts About Ricin." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013. <http://www.bt.cdc.gov/agent/ricin/facts.asp>. "How to Recognize and Handle a Suspicious Package or Envelope." CDC Anthrax. Center for Disease Control and Protection, n.d. Web. 26 May 2013. <http://www.bt.cdc.gov/agent/anthrax/mail/suspiciouspackages.asp>. "Improvised Explosive Devices (IEDs) / Booby Traps." Improvised Explosive Devices (IEDs) / Booby Traps. Global Security, n.d. Web. 26 May 2013. <http://www.globalsecurity.org/military/intro/ied.htm>. "Mailroom Moved and Mail Backlog Cleared." News Pulse. News Pulse, 9 Sept. 2011. Web. 26 May 2013. <http://newspulse.newpaltz.edu/2011/09/09/mailroom-moved-and-mailbacklog-cleared/>. "Personal Security in the Courts: Additional Threats in the Workplace." Personal Security in the Courts: Additional Threats in the Workplace. Judicial Council of California Administrative Office of the Courts, 2003. Web. 26 May 2013. <http://www2.courtinfo.ca.gov/protem/courses/ct/personal_security/21_threats.htm>. "Protect Your Workplace from Suspicious Packages." FBI. FBI, Sept. 2006. Web. 26 May 2013. <http://www.fbi.gov/news/stories/2006/september>. United States. Homeland Security. Department of Homeland Security. Best Practices for Safe Mail Handling. By Interagency Security Committee. N.p.: n.p., n.d. Web. 26 May 2013.