FEB 2018 LCDR Allan Huebs Huebner Agenda 2 Active Shooter GMT Sign Muster Sheet Solid CurtainCitadel Shield Exercise Antiterrorism AT GMT Sign Muster Sheet UNCLASSIFIED UNCLASSIFIED ID: 667834
Download Presentation The PPT/PDF document "1 Anti-terrorism Training" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
1
Anti-terrorism Training
FEB 2018
LCDR Allan “
Huebs
” HuebnerSlide2
Agenda
2
Active Shooter GMT
Sign Muster Sheet
Solid Curtain/Citadel Shield Exercise
Anti-terrorism (AT) GMTSign Muster Sheet
UNCLASSIFIED
UNCLASSIFIEDSlide3
Introduction
3
Active Shooter
i
ncidents are an unfortunate reality in today’s society
Can occur at any locationKnowing how to respond in an active shooter situation could save your lifeRequired training for ALL HANDS
GMT portion (this brief)
Practical Exercise (Tabletop Brief or Drill)
UNCLASSIFIED
UNCLASSIFIEDSlide4
Questions to Ask Yourself
4
How would I describe an active shooter?
What actions will the emergency responders take?
What actions should I take?
What information can I recall?
How can the Command prepare for this?
How can I prepare myself, coworkers & family?
UNCLASSIFIED
UNCLASSIFIEDSlide5
Common Elements
5
Threat is not contained
Immediate risk of injury or death
Acts of violence are not impulsive; they are planned
Most shooters have no prior history of violence or criminal behavior
Active shooter events are considered the greatest terrorist threat in the community
UNCLASSIFIED
UNCLASSIFIEDSlide6
Common Elements
6
Events usually end within 10-15 minutes
Events typically end in one of three ways
Law enforcement neutralizes the shooter
Shooter commits suicideVictims stop the shooter
UNCLASSIFIED
UNCLASSIFIEDSlide7
Shooter’s Mentality
7
Desire to kill & injure without regard for his/her own safety
May or may not have specific victims
Takes targets of opportunity while searching for, or after finding, intended victims
Uses a public or crowded place to inflict most harm
UNCLASSIFIED
UNCLASSIFIEDSlide8
Shooter’s Profile
8
There is no profile that can be used to identify a potential active shooter
Potential warning signs
Aggressive, combative behavior
Changes in personalityMajor life stressors (divorce, financial problems, etc.)
If you observe potential warning signs, do not ignore them
Either approach the individual or your supervisor
“If you see something, say something”
UNCLASSIFIED
UNCLASSIFIEDSlide9
Response Teams
9
First Responder to Active Shooter is YOU
Could be 5-15 minutes before help arrives
How will you communicate?
Internally to inform coworkers of the situationExternally to request supportLaw Enforcement Personnel
Medical Service Response Teams
UNCLASSIFIED
UNCLASSIFIEDSlide10
Law Enforcement
10
Law Enforcement Personnel’s mission is to eliminate the threat (neutralize the shooter)
Do not expect law enforcement to stop and assist you; that is not their job until once the threat is neutralized
If you come in contact with the law enforcement team, take the following actions
Remain calm and make no sudden movementsKeep your hands visible at all times
Answer all questions & follow all instructions
Possible questions include identity, location & number of shooters, types of weapons & location of victims
UNCLASSIFIED
UNCLASSIFIEDSlide11
Medical Response Teams
11
Medical Response Teams will enter the location once informed by law enforcement that the threat has been neutralized
Medical Teams will provide assistance to victims & seek to remove them from the building/shooting location if possible
If you are not injured, you may be requested to assist the medical team in removing the injured from the premises
UNCLASSIFIED
UNCLASSIFIEDSlide12
Your Possible Responses
12
Evacuate
Hide & Barricade Yourself in a Room
UNTIL YOU CAN EVACUATE
Take Actions to Prepare to Defend Yourself
UNCLASSIFIED
UNCLASSIFIEDSlide13
Evacuate
13
Evacuation is always the preferred course of action
Have multiple potential evacuation routes in case one of them is inaccessible
Avoid open hallways due to not knowing who or what is around the corner
Help others escape, if possible
UNCLASSIFIED
UNCLASSIFIEDSlide14
Evacuate
14
If you decide to evacuate, commit to your action, even if others refuse to
follow
Leave your belongings behind
Prevent others from entering an area where the shooter might beGet far away from the scene & seek shelter
UNCLASSIFIED
UNCLASSIFIEDSlide15
Hide
Until You Can Evacuate
15
If evacuation is not possible, find a place to hide where the shooter is less likely to find you
Be out of the shooter’s view
Do not trap yourself or restrict your options to get awayHide behind protective itemsProactively seek opportunity to evacuate
Prevent Entry
Lock the door & barricade it with heavy objects
Silence cell phones & sources of noise
Remain calm
UNCLASSIFIED
UNCLASSIFIEDSlide16
Hide
Until You Can Evacuate
16
Prevent Re-entry
If the shooter enters & then leaves your room, secure the entrance(s) using the methods listed on the previous slide
The shooter may bang on the door & yell for help to trick you into letting them inNo end-all solution; use your best judgmentIf the shooter’s identity is known, try to recognize his/her voice
UNCLASSIFIED
UNCLASSIFIEDSlide17
Take Action
17
If you are unable to evacuate or hide & you are in imminent danger, take action to defend yourself
This is a last resort
Attempt to incapacitate the shooter by taking aggressive physical action or using/throwing improvised weapons
Commit to your decision
UNCLASSIFIED
UNCLASSIFIEDSlide18
Extended Incident
18
Most shooter incidents end within 20 minutes, however some have lasted for hours
If in an extended shooter situation, take the following actions:
Assemble in a secure area & barricade yourself in
OrganizeEstablish Chain of CommandInventory supplies
Food, water, possible weapons
Attempt internal & external communication
Keep in mind that the shooter may be able to see posted signs
Develop a survivalist mentality
Remain calmDiscuss alternatives & plan to defend yourself as a last resort
UNCLASSIFIED
UNCLASSIFIEDSlide19
Assisting Victims
19
If you are in a position to assist victims, do so
Restore their breathing
Stop the bleeding
Apply direct pressure to the woundElevate the wound
Apply a makeshift tourniquet to limbs, as necessary
Treat for shock
Keep the victim lying down
Keep the victim warm
Elevate the legs
UNCLASSIFIED
UNCLASSIFIEDSlide20
Once Threat is Over
20
Law Enforcement
W
ill turn attention to providing assistance to victims
May establish safe zones & safety corridors into & out of the buildingMust account for all personnelBase will be on lockdown until accountability is obtainedWill begin investigation process
UNCLASSIFIED
UNCLASSIFIEDSlide21
Once Threat is Over
21
Your Responsibilities
Expect to be questioned & possibly searched by law enforcement
Do not leave until formally released by law enforcement
Ensure Command has accurate recall information for youRealize that personal belongings such as cell phones, car keys, etc. may still be in the building
Remain clear of the shooting location until authorized to return
The location is considered a crime scene
It may be several days until you are permitted access
UNCLASSIFIED
UNCLASSIFIEDSlide22
How can the Command Prepare?
22
Develop an Emergency Action Plan (EAP)
Should contain procedures for major emergencies (fire, hurricane, etc.)
Contains contact information for support services
All personnel need to be familiar with EAPPost evacuation routes in all spaces
Training
GMT such as this brief
Practical exercises such as drills
UNCLASSIFIED
UNCLASSIFIEDSlide23
Prevention
23
It is not possible to completely eliminate the threat of an active shooter
An organization can perform actions in an effort to minimize the risk
Foster a professional work environment at all times
Build an awareness of workplace violenceRecognize the need for help in others & in yourself
Seeking help is a sign of strength, not weakness
UNCLASSIFIED
UNCLASSIFIEDSlide24
Solid Curtain/Citadel Shield
24
Regional Exercise Conducted 29 JAN -
9
FEB 2018
Elevated Force Protection Condition(s)Impact to CNATRA StaffTraffic Delays
Road Closures
Parking Plan
UNCLASSIFIED
UNCLASSIFIEDSlide25
Additional AT Topics
25
Active Shooter Tabletop Exercise (TTX)
Scheduled at a later date by your leadership
Active Shooter GMT (this brief) & TTX must both be completed for all hands
Be Familiar with CNATRA AT Instruction & EAPEnsure Recall is Current for Effective
Comms
NOW is the time to prepare
UNCLASSIFIED
UNCLASSIFIEDSlide26
AT Training
26
Questions?
UNCLASSIFIED
UNCLASSIFIEDSlide27
Department of Defense
AT Level I
CONUS TrainingSlide28
.
About This Training
Designed by JCS in coordination with OSD and Services
Designed to increase awareness of terrorism and improve ability to apply personal protective measures
Meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16
Complements Web-based and CD-ROM trainingSlide29
Understand the terrorist threat
Understand how to employ situation-based measures to lower your vulnerability
Recognize proper responses to threat actions
Understand how to support unit security
Learning ObjectivesSlide30
Introduction to the AT Level I Training
Threat is a real and present danger
Remain vigilant while executing responsibilities
International terrorist network may be present where you servePersonal safety is important
Remain alertBe aware of your surroundingsReport suspicious activityPay attention to antiterrorism briefingsMake security part of your routineDo not be a tempting target!
America's effort to fight terrorism includes everyoneSlide31
Threat Factors
There are eight factors you should consider to understand the threat.
Are terrorist groups in the area?
Are they violent?
Do they attack Americans? How active are they? How sophisticated are they? Are they predictable? Will local citizens warn Americans? What tactics and weapons are used?
Weapons seized after a failed terrorist attack in IraqSlide32
How Terrorists Identify and Select Targets
Consider ways you might become a victim of a terrorist attack.
Location: Avoid possible target locations
Association: Avoid disclosing your DOD or US Government affiliation
Opportunity: Terrorists look for "soft targets”To attack you, terrorists generally must perceive you, your association, or your location as a target. While overseas it is advisable to conceal your DOD affiliationSlide33
Combatant Command Overview
DOD personnel and assets have been targeted in virtually every region of the world.
When traveling, you should receive a Combatant Command terrorist threat briefing 90 days prior to departure
Modify your personal protective measures based upon the information in these briefings
Threats vary in different parts of the worldSlide34
NORTHCOM Region
Within the United States, several organizations and individuals use terrorist tactics to achieve their goals.
Prior attack methods include:Vehicle bombs
Letter bombsSkyjacked aircraftBiological weaponsPrior attacks in NORTHCOM include:Plot to attack Ft DixUnited Flight 93Oklahoma City Bombing
In 2001, anthrax tainted letters were sent to several prominent individualsSlide35
Terrorist Planning Cycle Overview
Be alert to signs of intelligence gathering, surveillance, collecting materials for attack, and rehearsals:
Taking photos or videos of potential targets
Writing notes or sketching
Showing abnormal attention to details of security measuresUsing false identificationPaying cash for items normally bought on creditPurchasing large quantities of items such as chemicals or cell phonesTerrorists prepare for and conduct attacks through predictable steps.Slide36
FPCONs
US military facilities use protective measures organized in a system called Force Protection Conditions, or FPCONs.
As the threat of attack changes, Commanders change the FPCON to protect personnel.
FPCONs are organized in five levels with increased protection at each level: NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA.
Terrorists used a VBIED to attack Rhein-Main Air Base in 1985Slide37
Homeland Security Advisory System
The Homeland Security Advisory System was created to better inform the American public of changes in the threat of domestic terrorism.
Color code system is adjusted at national and local levels based on intelligence and law enforcement information.
The Homeland Security Advisory System applies only to the United States and its territories.
Monitor the Homeland Security Advisory System. It can alert you to developing threatsSlide38
Section 2: Situation-Based TrainingSlide39
AT Fundamentals Introduction
AT Level I themes: Anticipate; Be Vigilant; Don’t be a Target; Respond and Report
Modules presented:
Surveillance detectionSecurity at a Government facility
Residential securityOff-duty / free time activitiesAir travel securityGround travel securityHotel securityHostage survivalCBRNE 39Slide40
Anticipate
Several sources allow you to research threats for yourself
Anticipating threats, risks, and vulnerabilities is fundamental to antiterrorism and personal security.
Ways to do this include:Research criminal activity
Understand the tactics and techniquesKnow types of targets and locationsConsider consulting these sources:Police crime reportsOther internet and media resources40Slide41
Be Vigilant
Vigilance can thwart many terrorist attacks
Vigilance is required to continuously observe your surroundings and recognize suspicious activities.
Understand your environment's normal conditions. Knowledge of the normal amplifies abnormal activities.
Items that are out of placeAttempted surveillance Circumstances that correspond to prior criminal activity in your areaInformed vigilance is fundamental to personal security.41Slide42
Don't be a Target
DOD affiliation may identify you as a potential target
Blend in with your surroundings.
Do not wear clothing or carry items that attract criminal attentionRemain low key
Avoid high criminal locationsReduce your vulnerability and exposure:Select places with security measuresBe unpredictableTravel in a small groupUse automobiles and residences with adequate security features42Slide43
Report and Respond
The Fort Dix attack plot was thwarted by an alert store clerk
Report suspicious activities to appropriate authorities.
Report suspicious activity, do not try to deal with it yourselfIn threatening situations, take steps to reduce your exposure
Follow the instructions of emergency personnel and first respondersSecurity is a team effort. 43Slide44
Surveillance Detection Introduction
Timothy McVeigh’s activities were not detected or reported
Personnel surveillance to determine:
Residential security measuresModes of travel
Routes and times of travelTypical behaviorThe target's security awarenessFacility surveillance to determine:General security postureSecurity SOPsInformation on force shift rotationsPhysical security weaknessesReaction times to emergencies44Slide45
Surveillance Detection Fundamentals
Terrorists performed surveillance of Fort Dix, New Jersey
Be vigilant for anything that might be a sign of surveillance:
People loitering in the same general area without a recognizable legitimate reason
People that appear preoccupied with a specific building or areaCertain civilian vehicles that seem to appear repeatedly Electronic audio and video devices in unusual places45Slide46
Methods of Surveillance 1
Terrorists performed surveillance of Fort Dix, New Jersey
Surveillance may be conducted over a long period of time and employ various methods:
Stationary surveillance: a common method in which operatives observe from a fixed location. Moving surveillance: conducted on foot or in vehicles.
Vary your routes and routines!46Slide47
Methods of Surveillance 2
Surveillance
and recording devices used by terrorists
Additional surveillance methods include:Technical surveillance: uses electronic means to record or gain access to security information.Casual questioning: used to elicit security information from approachable personnel.
Be aware of terrorist surveillance methods.47Slide48
Government Facility Security Introduction
An attack can occur anywhere, even on your own installation
Attacks and plots against US Government facilities include:
Fort Hood: 2009 small arms attack against deployment processing centerArmy-Navy Career Center in Little Rock, AR: 2009 small arms attack
US Military Recruiting Station in New York City: 2008 bombingFort Dix: 2007 thwarted plot using small arms, RPGs, and grenadesMurrah Federal Building in Oklahoma City: 1995 VBIED attack48Slide49
Government Facility Security Fundamentals
Be a team player, cooperate with installation security procedures
The success of installation security protocols and procedures depends upon everyone.
Be aware of the current Force Protection Condition (FPCON)
Understand your installation's security systemRecognize problems and take steps to correct themRecognize threats and report themKnow proper incident responseInstallation security is a team effort!49Slide50
Recognizing Problems in Government Facility Security
Report
suspicious behavior to the appropriate personnel
Report problems you observe:Inattentive guard personnel
Weapons, identification badges, or keys improperly handledGaps in proceduresPersons with an inappropriate curiosity in security measuresPersons photographing sensitive areasPersons attempting to conceal itemsInappropriate persons observed in residential areas 50Slide51
Government Facility Incident Response
Be familiar
with emergency response procedures
Incident response preparation:Be aware of emergency contact phone numbers and procedures
Be familiar with the location and use of fire fighting equipment and first aid kits Know and rehearse evacuation and accountability procedures for work places, your residence, and other frequently used facilitiesBe aware of normal patterns of activities and respond quickly to things that are unusual51Slide52
Residential Security Introduction
Consider the
local threat when selecting your home
In selecting a new residence, some security considerations include:Location in a low crime area
Access to emergency servicesSecurity measures such as visitor controlStrong crime prevention measuresWell-maintained neighborhoods with effective community organizations generally have lower crime rates. Even so, lax security can make your home a target for criminal break-in.52Slide53
Residential Security – Physical Security
There are many things you can do to enhance your home's security
Consider these physical security measures:
Solid doors, quality locks, deadbolts, slide locks, and reinforcing plates
Ensure sliding doors cannot be lifted out and lay a rod in the trackKeep valuables out of sightDo not hide spare keys outsideUse an alarm systemImprove exterior lightingPut gravel outside windowsConsider replacing locks53Slide54
Residential Security Practices
Information
provided over the internet may put you at risk
Good habits are essential for good security. Ways to improve your security and confidence:Carefully control your keys
Permit access to known personnelCall the utility company to confirm identities Be wary of strangers showing interestUse only reputable, licensed companiesBe on good relations with your neighbors and look out for each otherKeep close watch on all Internet trafficDiscuss security and family routines54Slide55
Residential Preparation for Emergencies
Emergency
preparedness kits
Consider what your family should do in case of an emergency situation:A utility worker says he needs to check a gas line in your house
Your children come home from school and unexpectedly no one is there to care for themSomeone breaks into your home and demands money and valuablesDiscuss contingencies so your family is ready.55Slide56
Off-Duty Security Introduction
Public sites
with large crowds, may be targeted by terrorists
Civilian sites may be softer and more appealing targets than DOD installations.Examples are:Infrastructure assets
National landmarks and tourist sitesRecreation sitesReligious sitesPersonal security should be considered in all off-duty activities.56Slide57
Off-Duty Fundamentals
A 40-pound pipe bomb detonated at the Atlanta Olympics in 1996
Enhance your personal security by:
Travelling in a small groupLetting someone know your plans
Avoiding isolated, poorly lit areas Concealing high value itemsRisk may be higher at:Religious sites (and during holidays)Political eventsHigh crime areasVenues with large crowds57Slide58
Public Transportation
2005 London
subway bombing
Consider the following if public transportation is used:Select major hubs
Do not wait in large groupsBe vigilantWatch for unattended bags or itemsKeep personal items secureIf taxis are used, consider:Looking for legitimate taxi companyVerifying the photo on the license with the driver58Slide59
During Your Activity
In 2009 a
gunman attacked the Holocaust Memorial Museum
Reduce your risk at public sites:Identify an exit route
Identify a location to meet if separatedWatch for suspicious behavior in othersNotice suspicious objects Cooperate with security measures If an attack occurs, remember:In a grenade attack shrapnel will rise from the point of detonationIn a smalls arm attack, crouching on the floor may reduce exposure59Slide60
Air Travel Introduction
The
Flight 93 Memorial
Examples and tactics used against the air transportation sector since 2001 include:Midair explosion – December 2001 shoe-bomb plot
Small arms attack – 2002 attack against El Al ticket counter in LAVBIED – 2007 attack against the Glasgow International AirportAttack against airport infrastructure – 2007 plot against JFK airportSkyjacking – several incidents in Africa and the eastern Mediterranean60Slide61
Reducing Your Exposure
Conceal
items that show your DOD or Government affiliation
Keep a low profile by:Not wearing clothing with DOD symbols or slogans
Not including rank or organization information on luggage tagsUsing standard civilian luggage instead of military duffle bagsPlacing significant documents in a sealed envelopeSelecting a window seat reduces your exposure in a skyjacking but also reduces your mobility.61Slide62
Security at the Airport
A police
sharpshooter at the Los Angeles International Airport
While at the airport terminal, be vigilant for:Vehicles left unattended at the curbside check-in areas
Individuals that appear nervousAny activity that is out of place in an airport environmentReport suspicious activity to airport authorities immediately. 62Slide63
Airline Skyjackings
Threats to aircraft come in many forms, and each terrorist may have a different motivation
When choosing to cooperate or actively resist in a skyjacking situation, try to understand the skyjackers' intent. Things to consider include:
Are pilots left in control of the aircraft?
Have passengers or crew been physically abused? Are passengers singled out by nationality or religion? 63Slide64
Ground Travel Introduction
DC snipers, Lee Boyd Malvo (L) and John Allen Muhammad (R)
For many decades, DOD personnel have had to protect themselves against threats while traveling in vehicles.
Most attacks occurred overseas but domestic threats are real. For example:Ted Kaczynski, the Unabomber, left disguised IEDs in parking lots he knew were used by his intended victims
The DC Sniper fired from the trunk of a car mostly on people who were with their vehicles at the time of attack64Slide65
Ground Travel Introduction
Items that should be kept in a car at all times
Security and safety measures:
Prepare adequately. Local maps, cell phone, and first aid kitEnsure your vehicle is well maintained. Tires properly inflated and the gas tank at least half full
Be Vigilant. When exiting your car, look around for suspicious activities and individualsReport suspicious behavior. If you witness suspicious behavior or possible threats, alert l authorities immediately 65Slide66
Inspecting Your Vehicle
Inspect all compartments of your vehicle regularly
A vehicle inspection consists of the following:
Visual exterior inspection: Look for any evidence of tamperingVisual interior inspection: Look through the windows for anything unusual
Complete interior inspection: Look anywhere something may be hiddenIf you believe your vehicle has been tampered with or you see something suspicious, report it to the proper authorities immediately. 66Slide67
Hotel Security Introduction
Hotels in the US have been increasingly targeted by criminal for room invasions
Criminals may attempt room invasions to gain access to valuables using these tactics:
Following individuals or families from the lobby to their room and then forcing their way in when the door is unlocked
Disguising themselves as hotel staff and asking guests to open the doorAttempts to force open hotel room doors without warning67Slide68
Selecting a Hotel
Many hotels use CCTV camera systems for surveillance
Certain features can enhance your protection from a safety and security perspective when selecting a hotel:
Location in a non-violent and low-crime area
A common lobby through which all persons entering the hotel must passProtection by hotel security personnelElectronic key card securityClosed-circuit television (CCTVs) monitoring common areas68Slide69
Selecting Your Hotel Room
Hotel rooms should be selected with security in mind
If you have the choice, consider the following room preferences:
3rd to 5th floors –1st and 2nd floors are easily accessible from the outside, above the 5th floor is difficult to reach by emergency services
Not adjacent to fire escapes or exits – criminals target these rooms because of ease of escapeNo balcony - criminals may use balconies to enter rooms and to go from one room to the next 69Slide70
Inspecting Your Hotel Room
Night latches are common in hotel rooms and should be used
Consider these things:
Functioning locks on all doors and windowsScratches or marks on the door frame
Location of emergency exits and escape routesSolid doors to help resist break-insOperational telephoneBe sure you know how to call the front desk and to dial out of the hotel for 911.Also, when you leave your room, give it the appearance of being occupied.70Slide71
Hostage Survival Introduction
Hostages are taken for a variety of reasons and captivity may last for a few hours or for years
Hostage taking within CONUS is rare, however, it is a threat.
Hostages may be taken to obtain political concessions, ransom, or publicity.In CONUS hostage situations usually occur during a robbery and are resolved through negotiations or rescue.
To prepare for this possibility, review "Isolated Personnel Guidance," an annex to CJCS Guide 5260. This is available from your Antiterrorism Officer.71Slide72
Initial Response to Hostage Incident
Response to a hostage situation at Hillary Clinton's campaign office in Rochester, New York
The initial moments of a hostage taking situation are the most chaotic. The decision to resist or comply is a personal choice. If taken hostage, focus on defusing the situation:
Control your fear and maintain your dignity
Follow instructions of your captorsAvoid sudden movements that your captors may view as hostileThe initial moments and hours of a hostage situation can be the most dangerous. Your decisions can increase your chance for survival.72Slide73
Time in Captivity
In a hostage situation, do not let your fear takeover
Your demeanor toward your captors may influence the treatment you receive:
Respond to your captors with respectTry not to display emotion or ego
Do not lie or volunteer informationBe prepared for a long captivity:Keep active and maintain a daily routineEngage guards in conversation, Eat the food that isFind ways to exerciseGet enough sleep73Slide74
Hostage Resolution
Do not attempt to assist rescue personnel and cooperate with all instructions
In the event of a rescue attempt:
Immediately drop to the floor or dive behind a piece of furniture for coverAfter taking cover, do not make any sudden moves
Do not attempt to assist rescue personnelCooperate with rescue74Slide75
CBRNE Introduction
Hosam-Maher Husein Smadi attempted to use a VBIED in Dallas in September 2009
Chemical, biological, radiological, nuclear, and explosives (CBRNE) attacks are a proven threat to US Government facilities within the United States.
In 2002, the US post office was used to deliver anthrax laden letters to multiple targets.In 1995, Timothy McVeigh detonated a massive VBIED in Oklahoma City killing 168 persons.
A chemical attack has not yet occurred on US soil , but the 1995 Sarin nerve gas attack in the Tokyo subway demonstrates the threat.75Slide76
Responding to CBRNE Attacks
Responders in protective gear at the Hart Senate Office Building during the 2001 anthrax attacks
The exact nature of a CBRNE attack may be hard to determine. Regardless of the nature, you can protect yourself by:
Covering as much of your body as you can, especially your nose and mouth
Washing any exposed part of your body with soap and waterSeeking medical attention as soon as possibleFollowing instructions of local authorities and first responders76Slide77
Responding to IEDs
Pipe bomb in Centennial Olympic Park in Atlanta, Georgia
IEDs can be disguised as everyday objects. Be alert for:
Suspicious objects and packaging: Unattended items that could conceal a bombItems with unusual batteries, wires, cables, and strings
Suspicious behavior: Persons dressed in unseasonably warm clothing or behaving nervouslyPersons leaving a suspicious object prior to leaving an area77Slide78
SUMMARY
AND REVIEW
STAY VIGILANTIntro to TerrorismTerrorist OperationsIndividual Protective MeasuresSurveillance
Improvised explosive devices Kidnapping and hostageThreat levels and FPCONSSlide79
Suspicious Letters and Packages
Letters and packages displaying unusual markings may indicate a potential threat
Mail and suspicious packages may also contain a CBRNE threat. Potential indicators may be:
No return address
markings such as "personal”Excessive tapeMisspelled wordsUnknown powder, oily stains, odorForeign / excessive postageAddressed only to a person's title or uses an incorrect titleProtruding wires or package is lopsided and uneven79Slide80
Section 3: Historical Examples
80Slide81
Historical Examples Included in this Briefing
Historical Example
Year
Location(s)
Attack Method(s)
Mumbai Terrorist Attacks2008
Mumbai, India
Assault Weapons / IEDs
Fort Dix Plot
2007
Fort Dix, NJ
Automatic Weapons Fire
Camp Pennsylvania
2003
Camp Pennsylvania, Kuwait
Small Arms, Grenades
DC Sniper
2002
Washington, DC, Virginia, Maryland
Small Arms
Bali Nightclub Bombing
2002
Bali, Indonesia
Vehicle / Backpack IED (Suicide Bombing)
US Anthrax Attacks
2001
NY, DC, FL
Biological Weapon
United Flight 93
2001
Shanksville, PA
Skyjacking of Passenger Jetliner
Oklahoma City Bombing
1995
Oklahoma City, OK
Vehicle-Borne IED
General Dozier
1981
Verona, Italy
Kidnapping
Stockholm Syndrome
1973
Stockholm, Sweden
Hostage Holding
81Slide82
Questions?
82