SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Defining Prevention and Response Actions For Business Denver UASI Presents “Shared Strategies for Homeland Security”
Presented By: Detective Joe Tennant – Denver Police Bomb Squad
Prevention Who’s responsibility is it? Protection of our citizens and CIKR is the responsibility of everyone! Partnerships must be     formed and strategies     shared.
Prevention Prevention starts with knowledge, understanding, and preparation “It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles…” SunTzu
Prevention Know your enemy’s intent.  “Kill the Americans and their allies, civilian and military. It is an individual duty for every Muslim who can do it in any country in which it is possible to do it.”  Osama bin Laden
  “Do not seek any permission when it comes to the killing of the Americans"… "Fighting the devil doesn't need a religious edict, deliberation, prayer or guidance. They are the party of the devil and fighting them is the personal duty of our times.” 							Anwar al-Awlaki
Terrorism Awareness Terrorist Groups  International Domestic Right Wing Left Wing Special Interest Groups State Sponsors Lone Wolves, etc.
Terrorism Awareness Key Points Jihadist movement  is always evolving al-Qaeda to the Lone Wolf Effects of the Internet Difficult for counterterrorism efforts, but not futile! Terrorists are patient and meticulous planners
Terrorism Awareness ,[object Object]
We know their intent.
What does a terrorist look like?,[object Object]
Look for suspicious behavior, appearances, and activity…Behavior Nervous  Anxious/Excited                                 Profuse sweating Hesitation Lying Hidden gestures and signals Avoiding eye contact Physical avoidance Mental stress Mumbling Praying
Identifying a Terrorist Appearance Doesn’t fit time, story, and/or event Not dressed for climate Multiple sets of clothing Carrying oversized bag/multiple bags on street Modifications to bags Electrical components coming from bag to hand Activity Interest in security measures Extended amount of time in areas that are unusual Constantly looking around Taking unusual photos and or video Avoidance of security and/or law enforcement
The ThreatHow Will They Attack? Explosives are still the terrorist’s weapon of choice.  Why? Easy to acquire/make Easy to move and place Can be used remotely to avoid capture Low cost High Yield Difficult to detect
Execution of Threat Explosives Hand Placed IED Person Borne IED Vehicle Borne IED Delivery by Proxy Other WMD Concerns CBNR
Threat to Prevention
Steps to Prevention Knowledge Understanding Assessment  Planning Practice Reassessment
PreventionQuestions To Consider  What is your risk level?  Low/High Are you a potential target? What vulnerabilities or risks is your venue facing? Are you prepared? Can you prevent, deter, disrupt, delay, respond to, and/or mitigate a hazardous incident? Are you protected? Physical Liability
PreventionRisks and Vulnerabilities  Assessment How do you know what to protect or how to protect it?  There may be help! “Protected Critical Infrastructure Information Program” (2002)  ACAMS, HSPD-7, and other Initiatives  For additional information view video at www.dhs.gov/acams
Prevention Assessments are completed…vulnerability issues have been addressed.  The goal now is to apply your knowledge, understanding, and preparedness to preventing an act from occurring.
Prevention Seven Signs of Terrorist Activity Surveillance Elicitation Tests of Security Acquiring Supplies/Funding Suspicious People/Impersonation Dry Runs/Rehearsals  Deployment  of Assets
Terrorist Attack Cycle Target Selection Surveillance Final Target Selection Planning Final Surveillance Deploy Attack Team Attack
Target Selection Terrorist’s Goals Kill and/or Injure  Cause overreaction by the government Harass, weaken or embarrass government Destroy Infrastructure Destroy facilities Instill fear Disrupt communications Discourage foreign investment Influence government decisions Satisfy a vengeance Destroy economy
Desirable Targets Transportation Economic Infrastructure  Soft Targets Symbolic or “Public Message” Military Specific Individuals
Surveillance-Terrorists Seek Information- Existing security at the facility: Security force size Security’s normal duties Security measures (i.e. Searches) Reaction times and procedures to false alarms Security Equipment Patrol Routines Shift Changes Access control measures Uniforms and clothing worn by personnel Location of critical assets (fuel, water, power) Computer sites Schedules of vendors Photos, video recordings, etc
Final Target Selection Targets with greatest weaknesses and vulnerabilities  Targets with possibility of greatest success.
Planning Phase Research and Intelligence Gathering Choosing method of attack  Gathering supplies Designing-Building-Testing Device(s) Dry Runs
Methods of Attack Bombings Suicide/Homicide Bombings Arson Armed Assault Ambushes Assassination Hijacking Skyjacking Kidnapping Hostage taking Criminal Activities WMD C.B.R.N.
Final Surveillance Terrorists will look for the same items and routines that showed a particular facility to be vulnerable during the first surveillance phase They conduct a final surveillance to make sure nothing has changed in and around the facility during their planning phase.
Attack Cycle Deployment of Attack Team Terrorist have their weapons intact and are en-route to the attack site The Attack Terrorists have arrived at the location of the attack, the weapons of choice are in place, and the attack is carried out.
Lodging Industry Inherent Problems No vehicle checkpoints No security searches Occupants have free access  Occupants have some right to privacy in their rooms Many of the behavioral signs for a criminal/terrorist may be typical for a hotel guest (i.e. bags, clothing, photos)
Lodging Industry What you can do Watch for suspicious vehicles  Watch for highly unusual behavior Train employees to watch for suspicious behavior Instruct employees to watch for unusual activities taking place in guest rooms Practice your emergency plans Report suspicious behavior immediately
Other Threats  Behavioral awareness is beneficial in stopping any criminal activity  Robbery Theft Espionage Assault Cyber Attacks Very real concern in  the U.S. for all entities Workplace violence Active Shooters
Technology-Techniques Technology Techniques Keep premises clean and orderly!  Know your facility and what belongs there.  Incorporate blast mitigation design Security (Armed vs. Unarmed) Challenging Unknown Visitors Sign-In Logs and ID Checks Vehicle Inspections Interview Techniques Behavioral Analysis Training Biometrics Card Access Detection  Inst.-CBRNE Cameras/Surveillance/Lighting Alarms/Motion Sensors Cyber ware Security Doors X-ray/Magnetometers Vehicle Barriers Blast Mitigation Products CCTV
PreventionSummary Complete vulnerability assessments Minimize risks and vulnerabilities  Have a security plan Practice and test the plan  Reassess the plan  and fine tune  Train and conduct exercises.  Continually educate  employees
Response Actions for Business
Response(Business) ,[object Object]
Gather information from caller.
Complete Bomb Threat Checklist
Record conversation if possible
Note Caller ID information
Telephone Trap/Trace
Notify supervisors  and police immediately
Search premises for suspicious itemsPolice generally do not search You know your facility. Search by twos (floor to waist, waist to head, head to ceiling). Search public access areas and then  more secure areas. ,[object Object],[object Object]
Response (Business) Bomb Threats  ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
Cip 004, R1 Physical Security Awareness Webinar   10 23 09 Final LipubCip 004, R1 Physical Security Awareness Webinar   10 23 09 Final Lipub
Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
shamburg
 
Upgradation in Hotel & Guest Security
Upgradation in Hotel & Guest SecurityUpgradation in Hotel & Guest Security
Upgradation in Hotel & Guest Security
Mudit Grover
 

Was ist angesagt? (6)

25 Th District Court House
25 Th District Court House25 Th District Court House
25 Th District Court House
 
IMT 120 Lesson 1 for slide share
IMT 120 Lesson 1 for slide shareIMT 120 Lesson 1 for slide share
IMT 120 Lesson 1 for slide share
 
Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
Cip 004, R1 Physical Security Awareness Webinar   10 23 09 Final LipubCip 004, R1 Physical Security Awareness Webinar   10 23 09 Final Lipub
Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
 
Upgradation in Hotel & Guest Security
Upgradation in Hotel & Guest SecurityUpgradation in Hotel & Guest Security
Upgradation in Hotel & Guest Security
 
Introduction To Firearms For Home Protection
Introduction To Firearms For Home ProtectionIntroduction To Firearms For Home Protection
Introduction To Firearms For Home Protection
 
Value of Enhanced Hotel Security
Value of Enhanced Hotel SecurityValue of Enhanced Hotel Security
Value of Enhanced Hotel Security
 

Andere mochten auch

Автоматизация документооборота и хранилища данных
Автоматизация документооборота и хранилища данныхАвтоматизация документооборота и хранилища данных
Автоматизация документооборота и хранилища данных
vo1kov
 

Andere mochten auch (20)

Morten Fischer Mortensen - datering og drifthistorie af oldtidsagre
Morten Fischer Mortensen -  datering og drifthistorie af oldtidsagreMorten Fischer Mortensen -  datering og drifthistorie af oldtidsagre
Morten Fischer Mortensen - datering og drifthistorie af oldtidsagre
 
103 lars juelthiis_museer
103 lars juelthiis_museer103 lars juelthiis_museer
103 lars juelthiis_museer
 
Søren A. Sørensen - oversigt over det seneste års resultater
Søren A. Sørensen - oversigt over det seneste års resultaterSøren A. Sørensen - oversigt over det seneste års resultater
Søren A. Sørensen - oversigt over det seneste års resultater
 
20 bj+©rnar m+ñge_ahrensburglokalitet med faunalevn
20 bj+©rnar m+ñge_ahrensburglokalitet med faunalevn20 bj+©rnar m+ñge_ahrensburglokalitet med faunalevn
20 bj+©rnar m+ñge_ahrensburglokalitet med faunalevn
 
123 rikke lagersted-olsen_romantikkens k+ªrestebreve
123 rikke lagersted-olsen_romantikkens k+ªrestebreve123 rikke lagersted-olsen_romantikkens k+ªrestebreve
123 rikke lagersted-olsen_romantikkens k+ªrestebreve
 
Mathilde Schytz Marvit - co produktioner
Mathilde Schytz Marvit - co produktionerMathilde Schytz Marvit - co produktioner
Mathilde Schytz Marvit - co produktioner
 
Pauline Asingh - den første kejser
Pauline Asingh - den første kejserPauline Asingh - den første kejser
Pauline Asingh - den første kejser
 
46 peter steenhenriksen_gammelt tr+ªkul
46 peter steenhenriksen_gammelt tr+ªkul46 peter steenhenriksen_gammelt tr+ªkul
46 peter steenhenriksen_gammelt tr+ªkul
 
Arne jouttijärvi materialeanalyser
Arne jouttijärvi   materialeanalyserArne jouttijärvi   materialeanalyser
Arne jouttijärvi materialeanalyser
 
109 ilsevan zeeland_collection in new naturalis
109 ilsevan zeeland_collection in new naturalis109 ilsevan zeeland_collection in new naturalis
109 ilsevan zeeland_collection in new naturalis
 
Samir rafla guidelines arterial-hypertension-2013
Samir rafla guidelines arterial-hypertension-2013Samir rafla guidelines arterial-hypertension-2013
Samir rafla guidelines arterial-hypertension-2013
 
Rainey tisdale - poetry of objects
Rainey tisdale -   poetry of objectsRainey tisdale -   poetry of objects
Rainey tisdale - poetry of objects
 
Katrine Segel - konservering af poul gernes skulptur
Katrine Segel -  konservering af poul gernes skulpturKatrine Segel -  konservering af poul gernes skulptur
Katrine Segel - konservering af poul gernes skulptur
 
Lene Dammand Lund - nutid og fremtid på kadk
Lene Dammand Lund - nutid og fremtid på kadkLene Dammand Lund - nutid og fremtid på kadk
Lene Dammand Lund - nutid og fremtid på kadk
 
Mailing Lists and IRC
Mailing Lists and IRCMailing Lists and IRC
Mailing Lists and IRC
 
Anita Terp
Anita TerpAnita Terp
Anita Terp
 
Thomas Berg - ved iskanten
Thomas Berg - ved iskantenThomas Berg - ved iskanten
Thomas Berg - ved iskanten
 
Chinese erv 90-_new_testament
Chinese erv 90-_new_testamentChinese erv 90-_new_testament
Chinese erv 90-_new_testament
 
Автоматизация документооборота и хранилища данных
Автоматизация документооборота и хранилища данныхАвтоматизация документооборота и хранилища данных
Автоматизация документооборота и хранилища данных
 
69 Ingelise Nielsen, Vandmærker
69 Ingelise Nielsen, Vandmærker69 Ingelise Nielsen, Vandmærker
69 Ingelise Nielsen, Vandmærker
 

Ähnlich wie Prevention and response shared copy

Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
Mahmoud
 
Accident investigation 3
Accident investigation 3Accident investigation 3
Accident investigation 3
Hien Dinh
 

Ähnlich wie Prevention and response shared copy (20)

CRIME SCENE AWARENESS AND SAFETY FOR FIRE AND EMS RESPONDERS
CRIME SCENE AWARENESS AND SAFETY FOR FIRE AND EMS RESPONDERSCRIME SCENE AWARENESS AND SAFETY FOR FIRE AND EMS RESPONDERS
CRIME SCENE AWARENESS AND SAFETY FOR FIRE AND EMS RESPONDERS
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Security Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxSecurity Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptx
 
Meetings and the Law: Creating and Managing a Risk Management Plan
Meetings and the Law: Creating and Managing a Risk Management PlanMeetings and the Law: Creating and Managing a Risk Management Plan
Meetings and the Law: Creating and Managing a Risk Management Plan
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 
Accident Investigation
Accident  InvestigationAccident  Investigation
Accident Investigation
 
Action Scouting
Action ScoutingAction Scouting
Action Scouting
 
A risk assessment is a process used to identify potential hazards and analyze...
A risk assessment is a process used to identify potential hazards and analyze...A risk assessment is a process used to identify potential hazards and analyze...
A risk assessment is a process used to identify potential hazards and analyze...
 
Accident investigation 3
Accident investigation 3Accident investigation 3
Accident investigation 3
 
Accident_Investigation_3.ppt
Accident_Investigation_3.pptAccident_Investigation_3.ppt
Accident_Investigation_3.ppt
 
crisis managment 5.pdf
crisis managment 5.pdfcrisis managment 5.pdf
crisis managment 5.pdf
 
Accident Investigation
Accident InvestigationAccident Investigation
Accident Investigation
 
Skype School Session One Making Action Safe
Skype School Session One Making Action SafeSkype School Session One Making Action Safe
Skype School Session One Making Action Safe
 
Conflict march 16
Conflict   march 16Conflict   march 16
Conflict march 16
 
2023 Compliatric Webinar Series - Leading Practices for Workplace Violence Pr...
2023 Compliatric Webinar Series - Leading Practices for Workplace Violence Pr...2023 Compliatric Webinar Series - Leading Practices for Workplace Violence Pr...
2023 Compliatric Webinar Series - Leading Practices for Workplace Violence Pr...
 
Terrasol security training f
Terrasol security training fTerrasol security training f
Terrasol security training f
 
Resume_1-3-2
Resume_1-3-2Resume_1-3-2
Resume_1-3-2
 
Accidents
AccidentsAccidents
Accidents
 
Acinv 8 1
Acinv 8 1Acinv 8 1
Acinv 8 1
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 

Mehr von Brandon Williams

Cmwg contract breaches presentation
Cmwg contract breaches presentationCmwg contract breaches presentation
Cmwg contract breaches presentation
Brandon Williams
 
Mar 2012 cdphe contractor performance monitoring trng
Mar 2012 cdphe contractor performance monitoring trngMar 2012 cdphe contractor performance monitoring trng
Mar 2012 cdphe contractor performance monitoring trng
Brandon Williams
 
Tobacco wb webinar 6.22.12
Tobacco wb webinar 6.22.12Tobacco wb webinar 6.22.12
Tobacco wb webinar 6.22.12
Brandon Williams
 
Applicant webinar tobacco cessation initiatives
Applicant webinar tobacco cessation initiativesApplicant webinar tobacco cessation initiatives
Applicant webinar tobacco cessation initiatives
Brandon Williams
 
Applicant webinar ccpd final 05-29-12
Applicant webinar ccpd final 05-29-12Applicant webinar ccpd final 05-29-12
Applicant webinar ccpd final 05-29-12
Brandon Williams
 
Applicant webinar tobacco community initiatives
Applicant webinar tobacco community initiativesApplicant webinar tobacco community initiatives
Applicant webinar tobacco community initiatives
Brandon Williams
 
Cdphe cd presentation for ccpd 10 14 11a
Cdphe cd presentation for ccpd 10 14 11aCdphe cd presentation for ccpd 10 14 11a
Cdphe cd presentation for ccpd 10 14 11a
Brandon Williams
 
Jillians slides for 12 9 11 ccpd final
Jillians slides for 12 9 11 ccpd finalJillians slides for 12 9 11 ccpd final
Jillians slides for 12 9 11 ccpd final
Brandon Williams
 
Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12
Brandon Williams
 
Ttfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cbTtfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cb
Brandon Williams
 
Ttfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cbTtfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cb
Brandon Williams
 
Colorado lgbt data scan final 10 14-11
Colorado lgbt data scan final 10 14-11Colorado lgbt data scan final 10 14-11
Colorado lgbt data scan final 10 14-11
Brandon Williams
 
PSD Obesity Presentation 2011
PSD Obesity Presentation 2011PSD Obesity Presentation 2011
PSD Obesity Presentation 2011
Brandon Williams
 
Epe literature review training november 28 2011 (1)
Epe literature review training november 28 2011 (1)Epe literature review training november 28 2011 (1)
Epe literature review training november 28 2011 (1)
Brandon Williams
 
LGBT HOPP Strategic Plan Slides
LGBT HOPP Strategic Plan SlidesLGBT HOPP Strategic Plan Slides
LGBT HOPP Strategic Plan Slides
Brandon Williams
 

Mehr von Brandon Williams (20)

Cmwg contract breaches presentation
Cmwg contract breaches presentationCmwg contract breaches presentation
Cmwg contract breaches presentation
 
Mar 2012 cdphe contractor performance monitoring trng
Mar 2012 cdphe contractor performance monitoring trngMar 2012 cdphe contractor performance monitoring trng
Mar 2012 cdphe contractor performance monitoring trng
 
Tobacco wb webinar 6.22.12
Tobacco wb webinar 6.22.12Tobacco wb webinar 6.22.12
Tobacco wb webinar 6.22.12
 
Cmpu orientation webinar
Cmpu orientation webinarCmpu orientation webinar
Cmpu orientation webinar
 
Applicant webinar tobacco cessation initiatives
Applicant webinar tobacco cessation initiativesApplicant webinar tobacco cessation initiatives
Applicant webinar tobacco cessation initiatives
 
Applicant webinar ccpd final 05-29-12
Applicant webinar ccpd final 05-29-12Applicant webinar ccpd final 05-29-12
Applicant webinar ccpd final 05-29-12
 
Applicant webinar tobacco community initiatives
Applicant webinar tobacco community initiativesApplicant webinar tobacco community initiatives
Applicant webinar tobacco community initiatives
 
MCH Data to Action
MCH Data to ActionMCH Data to Action
MCH Data to Action
 
Tobacco wb webinar 5 1-12
Tobacco wb webinar 5 1-12Tobacco wb webinar 5 1-12
Tobacco wb webinar 5 1-12
 
Cdphe cd presentation for ccpd 10 14 11a
Cdphe cd presentation for ccpd 10 14 11aCdphe cd presentation for ccpd 10 14 11a
Cdphe cd presentation for ccpd 10 14 11a
 
Jillians slides for 12 9 11 ccpd final
Jillians slides for 12 9 11 ccpd finalJillians slides for 12 9 11 ccpd final
Jillians slides for 12 9 11 ccpd final
 
Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12Ccpd stakeholder input process 01 13-12
Ccpd stakeholder input process 01 13-12
 
Ttfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cbTtfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cb
 
Federal tobacco control
Federal tobacco controlFederal tobacco control
Federal tobacco control
 
Ttfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cbTtfcci mid program presentation to trc 121411.cb
Ttfcci mid program presentation to trc 121411.cb
 
Colorado lgbt data scan final 10 14-11
Colorado lgbt data scan final 10 14-11Colorado lgbt data scan final 10 14-11
Colorado lgbt data scan final 10 14-11
 
PSD Obesity Presentation 2011
PSD Obesity Presentation 2011PSD Obesity Presentation 2011
PSD Obesity Presentation 2011
 
Epe literature review training november 28 2011 (1)
Epe literature review training november 28 2011 (1)Epe literature review training november 28 2011 (1)
Epe literature review training november 28 2011 (1)
 
Colorado leadership v4
Colorado leadership v4Colorado leadership v4
Colorado leadership v4
 
LGBT HOPP Strategic Plan Slides
LGBT HOPP Strategic Plan SlidesLGBT HOPP Strategic Plan Slides
LGBT HOPP Strategic Plan Slides
 

Prevention and response shared copy

  • 1. Defining Prevention and Response Actions For Business Denver UASI Presents “Shared Strategies for Homeland Security”
  • 2. Presented By: Detective Joe Tennant – Denver Police Bomb Squad
  • 3. Prevention Who’s responsibility is it? Protection of our citizens and CIKR is the responsibility of everyone! Partnerships must be formed and strategies shared.
  • 4. Prevention Prevention starts with knowledge, understanding, and preparation “It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles…” SunTzu
  • 5. Prevention Know your enemy’s intent. “Kill the Americans and their allies, civilian and military. It is an individual duty for every Muslim who can do it in any country in which it is possible to do it.” Osama bin Laden
  • 6. “Do not seek any permission when it comes to the killing of the Americans"… "Fighting the devil doesn't need a religious edict, deliberation, prayer or guidance. They are the party of the devil and fighting them is the personal duty of our times.” Anwar al-Awlaki
  • 7. Terrorism Awareness Terrorist Groups International Domestic Right Wing Left Wing Special Interest Groups State Sponsors Lone Wolves, etc.
  • 8. Terrorism Awareness Key Points Jihadist movement is always evolving al-Qaeda to the Lone Wolf Effects of the Internet Difficult for counterterrorism efforts, but not futile! Terrorists are patient and meticulous planners
  • 9.
  • 10. We know their intent.
  • 11.
  • 12. Look for suspicious behavior, appearances, and activity…Behavior Nervous Anxious/Excited Profuse sweating Hesitation Lying Hidden gestures and signals Avoiding eye contact Physical avoidance Mental stress Mumbling Praying
  • 13. Identifying a Terrorist Appearance Doesn’t fit time, story, and/or event Not dressed for climate Multiple sets of clothing Carrying oversized bag/multiple bags on street Modifications to bags Electrical components coming from bag to hand Activity Interest in security measures Extended amount of time in areas that are unusual Constantly looking around Taking unusual photos and or video Avoidance of security and/or law enforcement
  • 14. The ThreatHow Will They Attack? Explosives are still the terrorist’s weapon of choice. Why? Easy to acquire/make Easy to move and place Can be used remotely to avoid capture Low cost High Yield Difficult to detect
  • 15. Execution of Threat Explosives Hand Placed IED Person Borne IED Vehicle Borne IED Delivery by Proxy Other WMD Concerns CBNR
  • 17. Steps to Prevention Knowledge Understanding Assessment Planning Practice Reassessment
  • 18. PreventionQuestions To Consider What is your risk level? Low/High Are you a potential target? What vulnerabilities or risks is your venue facing? Are you prepared? Can you prevent, deter, disrupt, delay, respond to, and/or mitigate a hazardous incident? Are you protected? Physical Liability
  • 19. PreventionRisks and Vulnerabilities Assessment How do you know what to protect or how to protect it? There may be help! “Protected Critical Infrastructure Information Program” (2002) ACAMS, HSPD-7, and other Initiatives For additional information view video at www.dhs.gov/acams
  • 20. Prevention Assessments are completed…vulnerability issues have been addressed. The goal now is to apply your knowledge, understanding, and preparedness to preventing an act from occurring.
  • 21. Prevention Seven Signs of Terrorist Activity Surveillance Elicitation Tests of Security Acquiring Supplies/Funding Suspicious People/Impersonation Dry Runs/Rehearsals Deployment of Assets
  • 22. Terrorist Attack Cycle Target Selection Surveillance Final Target Selection Planning Final Surveillance Deploy Attack Team Attack
  • 23. Target Selection Terrorist’s Goals Kill and/or Injure Cause overreaction by the government Harass, weaken or embarrass government Destroy Infrastructure Destroy facilities Instill fear Disrupt communications Discourage foreign investment Influence government decisions Satisfy a vengeance Destroy economy
  • 24. Desirable Targets Transportation Economic Infrastructure Soft Targets Symbolic or “Public Message” Military Specific Individuals
  • 25. Surveillance-Terrorists Seek Information- Existing security at the facility: Security force size Security’s normal duties Security measures (i.e. Searches) Reaction times and procedures to false alarms Security Equipment Patrol Routines Shift Changes Access control measures Uniforms and clothing worn by personnel Location of critical assets (fuel, water, power) Computer sites Schedules of vendors Photos, video recordings, etc
  • 26. Final Target Selection Targets with greatest weaknesses and vulnerabilities Targets with possibility of greatest success.
  • 27. Planning Phase Research and Intelligence Gathering Choosing method of attack Gathering supplies Designing-Building-Testing Device(s) Dry Runs
  • 28. Methods of Attack Bombings Suicide/Homicide Bombings Arson Armed Assault Ambushes Assassination Hijacking Skyjacking Kidnapping Hostage taking Criminal Activities WMD C.B.R.N.
  • 29. Final Surveillance Terrorists will look for the same items and routines that showed a particular facility to be vulnerable during the first surveillance phase They conduct a final surveillance to make sure nothing has changed in and around the facility during their planning phase.
  • 30. Attack Cycle Deployment of Attack Team Terrorist have their weapons intact and are en-route to the attack site The Attack Terrorists have arrived at the location of the attack, the weapons of choice are in place, and the attack is carried out.
  • 31. Lodging Industry Inherent Problems No vehicle checkpoints No security searches Occupants have free access Occupants have some right to privacy in their rooms Many of the behavioral signs for a criminal/terrorist may be typical for a hotel guest (i.e. bags, clothing, photos)
  • 32. Lodging Industry What you can do Watch for suspicious vehicles Watch for highly unusual behavior Train employees to watch for suspicious behavior Instruct employees to watch for unusual activities taking place in guest rooms Practice your emergency plans Report suspicious behavior immediately
  • 33. Other Threats Behavioral awareness is beneficial in stopping any criminal activity Robbery Theft Espionage Assault Cyber Attacks Very real concern in the U.S. for all entities Workplace violence Active Shooters
  • 34. Technology-Techniques Technology Techniques Keep premises clean and orderly! Know your facility and what belongs there. Incorporate blast mitigation design Security (Armed vs. Unarmed) Challenging Unknown Visitors Sign-In Logs and ID Checks Vehicle Inspections Interview Techniques Behavioral Analysis Training Biometrics Card Access Detection Inst.-CBRNE Cameras/Surveillance/Lighting Alarms/Motion Sensors Cyber ware Security Doors X-ray/Magnetometers Vehicle Barriers Blast Mitigation Products CCTV
  • 35. PreventionSummary Complete vulnerability assessments Minimize risks and vulnerabilities Have a security plan Practice and test the plan Reassess the plan and fine tune Train and conduct exercises. Continually educate employees
  • 37.
  • 39. Complete Bomb Threat Checklist
  • 41. Note Caller ID information
  • 43. Notify supervisors and police immediately
  • 44.
  • 45.
  • 47. Write statements with exact quote of threat!
  • 50.
  • 51.
  • 53. Response(Business) Vehicle Borne IEDs (VBIED) Indicators of a VBIED Sagging shocks, indicating heavy payload Odors, smoke, or fluids coming from vehicle Paperwork or plates do not match vehicle registration Vehicle appears to be abandoned Wires, switches, or other suspicious items observed inside of vehicle. Appears to be stolen Signs that it may be a cloned vehicle Items lying in vehicle that appear to be suspicious.
  • 54. Response(Business) Business Response to VBIED Evacuate area immediately, allowing for blast hazards. Notify police immediately. Do not attempt to tow vehicle! Always keep Secondary Devices in mind!
  • 55. Response(Business) Business response to a post-blast bombing incident. Evacuate Notify police and EMS immediately. Care for injured. Stay on phone with police dispatcher to keep LE/EMS updated. Keep employee roster/log book to manage personnel at scene.
  • 56. Response (Business) Business Response to Bombing Scenes Secure the building, parking structure, and surrounding area until police arrive. Building maintenance, management, and security need to remain available to LE. Have communications system available for employees. Minimize media contact Point person to collect statements/documents Do not handle evidence! Security can attempt to keep streets open for arriving LE/EMS Attempt to minimize emotional distress in employees. Follow instructions from LE
  • 57. Police Response Police and EMS will arrive on scene very quickly. The injured will be cared for by EMS, while LE secures the crime scene and searches for additional hazards. Once hazards are identified and eliminated, the crime scene will be evaluated and processed ASAP. Command Post(s) will be set up and an Incident Command System will be implemented to manage all agencies. LE will immediately begin investigative processes to maximize their chances of a successful prosecution. Your help will be needed!!!
  • 58. Summary Prevention and response is everyone's responsibility. Conduct Risk and Vulnerability Assessment Harden security as much as possible Based on assessments, make a plan practice the plan, re-evaluate, make necessary changes Train and educate employees Contact your local LE officials for additional training and information.
  • 59. Contact Information Detective Joe Tennant-Denver Police Bomb Squad, #720-913-6381 or joe.tennant@denvergov.org