/
1 Anti-terrorism Training 1 Anti-terrorism Training

1 Anti-terrorism Training - PowerPoint Presentation

tatyana-admore
tatyana-admore . @tatyana-admore
Follow
384 views
Uploaded On 2018-09-17

1 Anti-terrorism Training - PPT Presentation

FEB 2018 LCDR Allan Huebs Huebner Agenda 2 Active Shooter GMT Sign Muster Sheet Solid CurtainCitadel Shield Exercise Antiterrorism AT GMT Sign Muster Sheet UNCLASSIFIED UNCLASSIFIED ID: 667834

security unclassified amp attack unclassified security attack amp threat shooter surveillance suspicious location introduction terrorist personnel hotel active room situation hostage enforcement

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "1 Anti-terrorism Training" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

1

Anti-terrorism Training

FEB 2018

LCDR Allan “

Huebs

” HuebnerSlide2

Agenda

2

Active Shooter GMT

Sign Muster Sheet

Solid Curtain/Citadel Shield Exercise

Anti-terrorism (AT) GMTSign Muster Sheet

UNCLASSIFIED

UNCLASSIFIEDSlide3

Introduction

3

Active Shooter

i

ncidents are an unfortunate reality in today’s society

Can occur at any locationKnowing how to respond in an active shooter situation could save your lifeRequired training for ALL HANDS

GMT portion (this brief)

Practical Exercise (Tabletop Brief or Drill)

UNCLASSIFIED

UNCLASSIFIEDSlide4

Questions to Ask Yourself

4

How would I describe an active shooter?

What actions will the emergency responders take?

What actions should I take?

What information can I recall?

How can the Command prepare for this?

How can I prepare myself, coworkers & family?

UNCLASSIFIED

UNCLASSIFIEDSlide5

Common Elements

5

Threat is not contained

Immediate risk of injury or death

Acts of violence are not impulsive; they are planned

Most shooters have no prior history of violence or criminal behavior

Active shooter events are considered the greatest terrorist threat in the community

UNCLASSIFIED

UNCLASSIFIEDSlide6

Common Elements

6

Events usually end within 10-15 minutes

Events typically end in one of three ways

Law enforcement neutralizes the shooter

Shooter commits suicideVictims stop the shooter

UNCLASSIFIED

UNCLASSIFIEDSlide7

Shooter’s Mentality

7

Desire to kill & injure without regard for his/her own safety

May or may not have specific victims

Takes targets of opportunity while searching for, or after finding, intended victims

Uses a public or crowded place to inflict most harm

UNCLASSIFIED

UNCLASSIFIEDSlide8

Shooter’s Profile

8

There is no profile that can be used to identify a potential active shooter

Potential warning signs

Aggressive, combative behavior

Changes in personalityMajor life stressors (divorce, financial problems, etc.)

If you observe potential warning signs, do not ignore them

Either approach the individual or your supervisor

“If you see something, say something”

UNCLASSIFIED

UNCLASSIFIEDSlide9

Response Teams

9

First Responder to Active Shooter is YOU

Could be 5-15 minutes before help arrives

How will you communicate?

Internally to inform coworkers of the situationExternally to request supportLaw Enforcement Personnel

Medical Service Response Teams

UNCLASSIFIED

UNCLASSIFIEDSlide10

Law Enforcement

10

Law Enforcement Personnel’s mission is to eliminate the threat (neutralize the shooter)

Do not expect law enforcement to stop and assist you; that is not their job until once the threat is neutralized

If you come in contact with the law enforcement team, take the following actions

Remain calm and make no sudden movementsKeep your hands visible at all times

Answer all questions & follow all instructions

Possible questions include identity, location & number of shooters, types of weapons & location of victims

UNCLASSIFIED

UNCLASSIFIEDSlide11

Medical Response Teams

11

Medical Response Teams will enter the location once informed by law enforcement that the threat has been neutralized

Medical Teams will provide assistance to victims & seek to remove them from the building/shooting location if possible

If you are not injured, you may be requested to assist the medical team in removing the injured from the premises

UNCLASSIFIED

UNCLASSIFIEDSlide12

Your Possible Responses

12

Evacuate

Hide & Barricade Yourself in a Room

UNTIL YOU CAN EVACUATE

Take Actions to Prepare to Defend Yourself

UNCLASSIFIED

UNCLASSIFIEDSlide13

Evacuate

13

Evacuation is always the preferred course of action

Have multiple potential evacuation routes in case one of them is inaccessible

Avoid open hallways due to not knowing who or what is around the corner

Help others escape, if possible

UNCLASSIFIED

UNCLASSIFIEDSlide14

Evacuate

14

If you decide to evacuate, commit to your action, even if others refuse to

follow

Leave your belongings behind

Prevent others from entering an area where the shooter might beGet far away from the scene & seek shelter

UNCLASSIFIED

UNCLASSIFIEDSlide15

Hide

Until You Can Evacuate

15

If evacuation is not possible, find a place to hide where the shooter is less likely to find you

Be out of the shooter’s view

Do not trap yourself or restrict your options to get awayHide behind protective itemsProactively seek opportunity to evacuate

Prevent Entry

Lock the door & barricade it with heavy objects

Silence cell phones & sources of noise

Remain calm

UNCLASSIFIED

UNCLASSIFIEDSlide16

Hide

Until You Can Evacuate

16

Prevent Re-entry

If the shooter enters & then leaves your room, secure the entrance(s) using the methods listed on the previous slide

The shooter may bang on the door & yell for help to trick you into letting them inNo end-all solution; use your best judgmentIf the shooter’s identity is known, try to recognize his/her voice

UNCLASSIFIED

UNCLASSIFIEDSlide17

Take Action

17

If you are unable to evacuate or hide & you are in imminent danger, take action to defend yourself

This is a last resort

Attempt to incapacitate the shooter by taking aggressive physical action or using/throwing improvised weapons

Commit to your decision

UNCLASSIFIED

UNCLASSIFIEDSlide18

Extended Incident

18

Most shooter incidents end within 20 minutes, however some have lasted for hours

If in an extended shooter situation, take the following actions:

Assemble in a secure area & barricade yourself in

OrganizeEstablish Chain of CommandInventory supplies

Food, water, possible weapons

Attempt internal & external communication

Keep in mind that the shooter may be able to see posted signs

Develop a survivalist mentality

Remain calmDiscuss alternatives & plan to defend yourself as a last resort

UNCLASSIFIED

UNCLASSIFIEDSlide19

Assisting Victims

19

If you are in a position to assist victims, do so

Restore their breathing

Stop the bleeding

Apply direct pressure to the woundElevate the wound

Apply a makeshift tourniquet to limbs, as necessary

Treat for shock

Keep the victim lying down

Keep the victim warm

Elevate the legs

UNCLASSIFIED

UNCLASSIFIEDSlide20

Once Threat is Over

20

Law Enforcement

W

ill turn attention to providing assistance to victims

May establish safe zones & safety corridors into & out of the buildingMust account for all personnelBase will be on lockdown until accountability is obtainedWill begin investigation process

UNCLASSIFIED

UNCLASSIFIEDSlide21

Once Threat is Over

21

Your Responsibilities

Expect to be questioned & possibly searched by law enforcement

Do not leave until formally released by law enforcement

Ensure Command has accurate recall information for youRealize that personal belongings such as cell phones, car keys, etc. may still be in the building

Remain clear of the shooting location until authorized to return

The location is considered a crime scene

It may be several days until you are permitted access

UNCLASSIFIED

UNCLASSIFIEDSlide22

How can the Command Prepare?

22

Develop an Emergency Action Plan (EAP)

Should contain procedures for major emergencies (fire, hurricane, etc.)

Contains contact information for support services

All personnel need to be familiar with EAPPost evacuation routes in all spaces

Training

GMT such as this brief

Practical exercises such as drills

UNCLASSIFIED

UNCLASSIFIEDSlide23

Prevention

23

It is not possible to completely eliminate the threat of an active shooter

An organization can perform actions in an effort to minimize the risk

Foster a professional work environment at all times

Build an awareness of workplace violenceRecognize the need for help in others & in yourself

Seeking help is a sign of strength, not weakness

UNCLASSIFIED

UNCLASSIFIEDSlide24

Solid Curtain/Citadel Shield

24

Regional Exercise Conducted 29 JAN -

9

FEB 2018

Elevated Force Protection Condition(s)Impact to CNATRA StaffTraffic Delays

Road Closures

Parking Plan

UNCLASSIFIED

UNCLASSIFIEDSlide25

Additional AT Topics

25

Active Shooter Tabletop Exercise (TTX)

Scheduled at a later date by your leadership

Active Shooter GMT (this brief) & TTX must both be completed for all hands

Be Familiar with CNATRA AT Instruction & EAPEnsure Recall is Current for Effective

Comms

NOW is the time to prepare

UNCLASSIFIED

UNCLASSIFIEDSlide26

AT Training

26

Questions?

UNCLASSIFIED

UNCLASSIFIEDSlide27

Department of Defense

AT Level I

CONUS TrainingSlide28

.

About This Training

Designed by JCS in coordination with OSD and Services

Designed to increase awareness of terrorism and improve ability to apply personal protective measures

Meets the annual requirement for Level I antiterrorism training prescribed by DoDI 2000.16

Complements Web-based and CD-ROM trainingSlide29

Understand the terrorist threat

Understand how to employ situation-based measures to lower your vulnerability

Recognize proper responses to threat actions

Understand how to support unit security

Learning ObjectivesSlide30

Introduction to the AT Level I Training

Threat is a real and present danger

Remain vigilant while executing responsibilities

International terrorist network may be present where you servePersonal safety is important

Remain alertBe aware of your surroundingsReport suspicious activityPay attention to antiterrorism briefingsMake security part of your routineDo not be a tempting target!

America's effort to fight terrorism includes everyoneSlide31

Threat Factors

There are eight factors you should consider to understand the threat.

Are terrorist groups in the area?

Are they violent?

Do they attack Americans? How active are they? How sophisticated are they? Are they predictable? Will local citizens warn Americans? What tactics and weapons are used?

Weapons seized after a failed terrorist attack in IraqSlide32

How Terrorists Identify and Select Targets

Consider ways you might become a victim of a terrorist attack.

Location: Avoid possible target locations

Association: Avoid disclosing your DOD or US Government affiliation

Opportunity: Terrorists look for "soft targets”To attack you, terrorists generally must perceive you, your association, or your location as a target. While overseas it is advisable to conceal your DOD affiliationSlide33

Combatant Command Overview

DOD personnel and assets have been targeted in virtually every region of the world.

When traveling, you should receive a Combatant Command terrorist threat briefing 90 days prior to departure

Modify your personal protective measures based upon the information in these briefings

Threats vary in different parts of the worldSlide34

NORTHCOM Region

Within the United States, several organizations and individuals use terrorist tactics to achieve their goals.

Prior attack methods include:Vehicle bombs

Letter bombsSkyjacked aircraftBiological weaponsPrior attacks in NORTHCOM include:Plot to attack Ft DixUnited Flight 93Oklahoma City Bombing

In 2001, anthrax tainted letters were sent to several prominent individualsSlide35

Terrorist Planning Cycle Overview

Be alert to signs of intelligence gathering, surveillance, collecting materials for attack, and rehearsals:

Taking photos or videos of potential targets

Writing notes or sketching

Showing abnormal attention to details of security measuresUsing false identificationPaying cash for items normally bought on creditPurchasing large quantities of items such as chemicals or cell phonesTerrorists prepare for and conduct attacks through predictable steps.Slide36

FPCONs

US military facilities use protective measures organized in a system called Force Protection Conditions, or FPCONs.

As the threat of attack changes, Commanders change the FPCON to protect personnel.

FPCONs are organized in five levels with increased protection at each level: NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA.

Terrorists used a VBIED to attack Rhein-Main Air Base in 1985Slide37

Homeland Security Advisory System

The Homeland Security Advisory System was created to better inform the American public of changes in the threat of domestic terrorism.

Color code system is adjusted at national and local levels based on intelligence and law enforcement information.

The Homeland Security Advisory System applies only to the United States and its territories.

Monitor the Homeland Security Advisory System. It can alert you to developing threatsSlide38

Section 2: Situation-Based TrainingSlide39

AT Fundamentals Introduction

AT Level I themes: Anticipate; Be Vigilant; Don’t be a Target; Respond and Report

Modules presented:

Surveillance detectionSecurity at a Government facility

Residential securityOff-duty / free time activitiesAir travel securityGround travel securityHotel securityHostage survivalCBRNE 39Slide40

Anticipate

Several sources allow you to research threats for yourself

Anticipating threats, risks, and vulnerabilities is fundamental to antiterrorism and personal security.

Ways to do this include:Research criminal activity

Understand the tactics and techniquesKnow types of targets and locationsConsider consulting these sources:Police crime reportsOther internet and media resources40Slide41

Be Vigilant

Vigilance can thwart many terrorist attacks

Vigilance is required to continuously observe your surroundings and recognize suspicious activities.

Understand your environment's normal conditions. Knowledge of the normal amplifies abnormal activities.

Items that are out of placeAttempted surveillance Circumstances that correspond to prior criminal activity in your areaInformed vigilance is fundamental to personal security.41Slide42

Don't be a Target

DOD affiliation may identify you as a potential target

Blend in with your surroundings.

Do not wear clothing or carry items that attract criminal attentionRemain low key

Avoid high criminal locationsReduce your vulnerability and exposure:Select places with security measuresBe unpredictableTravel in a small groupUse automobiles and residences with adequate security features42Slide43

Report and Respond

The Fort Dix attack plot was thwarted by an alert store clerk

Report suspicious activities to appropriate authorities.

Report suspicious activity, do not try to deal with it yourselfIn threatening situations, take steps to reduce your exposure

Follow the instructions of emergency personnel and first respondersSecurity is a team effort. 43Slide44

Surveillance Detection Introduction

Timothy McVeigh’s activities were not detected or reported

Personnel surveillance to determine:

Residential security measuresModes of travel

Routes and times of travelTypical behaviorThe target's security awarenessFacility surveillance to determine:General security postureSecurity SOPsInformation on force shift rotationsPhysical security weaknessesReaction times to emergencies44Slide45

Surveillance Detection Fundamentals

Terrorists performed surveillance of Fort Dix, New Jersey

Be vigilant for anything that might be a sign of surveillance:

People loitering in the same general area without a recognizable legitimate reason

People that appear preoccupied with a specific building or areaCertain civilian vehicles that seem to appear repeatedly Electronic audio and video devices in unusual places45Slide46

Methods of Surveillance 1

Terrorists performed surveillance of Fort Dix, New Jersey

Surveillance may be conducted over a long period of time and employ various methods:

Stationary surveillance: a common method in which operatives observe from a fixed location. Moving surveillance: conducted on foot or in vehicles.

Vary your routes and routines!46Slide47

Methods of Surveillance 2

Surveillance

and recording devices used by terrorists

Additional surveillance methods include:Technical surveillance: uses electronic means to record or gain access to security information.Casual questioning: used to elicit security information from approachable personnel.

Be aware of terrorist surveillance methods.47Slide48

Government Facility Security Introduction

An attack can occur anywhere, even on your own installation

Attacks and plots against US Government facilities include:

Fort Hood: 2009 small arms attack against deployment processing centerArmy-Navy Career Center in Little Rock, AR: 2009 small arms attack

US Military Recruiting Station in New York City: 2008 bombingFort Dix: 2007 thwarted plot using small arms, RPGs, and grenadesMurrah Federal Building in Oklahoma City: 1995 VBIED attack48Slide49

Government Facility Security Fundamentals

Be a team player, cooperate with installation security procedures

The success of installation security protocols and procedures depends upon everyone.

Be aware of the current Force Protection Condition (FPCON)

Understand your installation's security systemRecognize problems and take steps to correct themRecognize threats and report themKnow proper incident responseInstallation security is a team effort!49Slide50

Recognizing Problems in Government Facility Security

Report

suspicious behavior to the appropriate personnel

Report problems you observe:Inattentive guard personnel

Weapons, identification badges, or keys improperly handledGaps in proceduresPersons with an inappropriate curiosity in security measuresPersons photographing sensitive areasPersons attempting to conceal itemsInappropriate persons observed in residential areas 50Slide51

Government Facility Incident Response

Be familiar

with emergency response procedures

Incident response preparation:Be aware of emergency contact phone numbers and procedures

Be familiar with the location and use of fire fighting equipment and first aid kits Know and rehearse evacuation and accountability procedures for work places, your residence, and other frequently used facilitiesBe aware of normal patterns of activities and respond quickly to things that are unusual51Slide52

Residential Security Introduction

Consider the

local threat when selecting your home

In selecting a new residence, some security considerations include:Location in a low crime area

Access to emergency servicesSecurity measures such as visitor controlStrong crime prevention measuresWell-maintained neighborhoods with effective community organizations generally have lower crime rates. Even so, lax security can make your home a target for criminal break-in.52Slide53

Residential Security – Physical Security

There are many things you can do to enhance your home's security

Consider these physical security measures:

Solid doors, quality locks, deadbolts, slide locks, and reinforcing plates

Ensure sliding doors cannot be lifted out and lay a rod in the trackKeep valuables out of sightDo not hide spare keys outsideUse an alarm systemImprove exterior lightingPut gravel outside windowsConsider replacing locks53Slide54

Residential Security Practices

Information

provided over the internet may put you at risk

Good habits are essential for good security. Ways to improve your security and confidence:Carefully control your keys

Permit access to known personnelCall the utility company to confirm identities Be wary of strangers showing interestUse only reputable, licensed companiesBe on good relations with your neighbors and look out for each otherKeep close watch on all Internet trafficDiscuss security and family routines54Slide55

Residential Preparation for Emergencies

Emergency

preparedness kits

Consider what your family should do in case of an emergency situation:A utility worker says he needs to check a gas line in your house

Your children come home from school and unexpectedly no one is there to care for themSomeone breaks into your home and demands money and valuablesDiscuss contingencies so your family is ready.55Slide56

Off-Duty Security Introduction

Public sites

with large crowds, may be targeted by terrorists

Civilian sites may be softer and more appealing targets than DOD installations.Examples are:Infrastructure assets

National landmarks and tourist sitesRecreation sitesReligious sitesPersonal security should be considered in all off-duty activities.56Slide57

Off-Duty Fundamentals

A 40-pound pipe bomb detonated at the Atlanta Olympics in 1996

Enhance your personal security by:

Travelling in a small groupLetting someone know your plans

Avoiding isolated, poorly lit areas Concealing high value itemsRisk may be higher at:Religious sites (and during holidays)Political eventsHigh crime areasVenues with large crowds57Slide58

Public Transportation

2005 London

subway bombing

Consider the following if public transportation is used:Select major hubs

Do not wait in large groupsBe vigilantWatch for unattended bags or itemsKeep personal items secureIf taxis are used, consider:Looking for legitimate taxi companyVerifying the photo on the license with the driver58Slide59

During Your Activity

In 2009 a

gunman attacked the Holocaust Memorial Museum

Reduce your risk at public sites:Identify an exit route

Identify a location to meet if separatedWatch for suspicious behavior in othersNotice suspicious objects Cooperate with security measures If an attack occurs, remember:In a grenade attack shrapnel will rise from the point of detonationIn a smalls arm attack, crouching on the floor may reduce exposure59Slide60

Air Travel Introduction

The

Flight 93 Memorial

Examples and tactics used against the air transportation sector since 2001 include:Midair explosion – December 2001 shoe-bomb plot

Small arms attack – 2002 attack against El Al ticket counter in LAVBIED – 2007 attack against the Glasgow International AirportAttack against airport infrastructure – 2007 plot against JFK airportSkyjacking – several incidents in Africa and the eastern Mediterranean60Slide61

Reducing Your Exposure

Conceal

items that show your DOD or Government affiliation

Keep a low profile by:Not wearing clothing with DOD symbols or slogans

Not including rank or organization information on luggage tagsUsing standard civilian luggage instead of military duffle bagsPlacing significant documents in a sealed envelopeSelecting a window seat reduces your exposure in a skyjacking but also reduces your mobility.61Slide62

Security at the Airport

A police

sharpshooter at the Los Angeles International Airport

While at the airport terminal, be vigilant for:Vehicles left unattended at the curbside check-in areas

Individuals that appear nervousAny activity that is out of place in an airport environmentReport suspicious activity to airport authorities immediately. 62Slide63

Airline Skyjackings

Threats to aircraft come in many forms, and each terrorist may have a different motivation

When choosing to cooperate or actively resist in a skyjacking situation, try to understand the skyjackers' intent. Things to consider include:

Are pilots left in control of the aircraft?

Have passengers or crew been physically abused? Are passengers singled out by nationality or religion? 63Slide64

Ground Travel Introduction

DC snipers, Lee Boyd Malvo (L) and John Allen Muhammad (R)

For many decades, DOD personnel have had to protect themselves against threats while traveling in vehicles.

Most attacks occurred overseas but domestic threats are real. For example:Ted Kaczynski, the Unabomber, left disguised IEDs in parking lots he knew were used by his intended victims

The DC Sniper fired from the trunk of a car mostly on people who were with their vehicles at the time of attack64Slide65

Ground Travel Introduction

Items that should be kept in a car at all times

Security and safety measures:

Prepare adequately. Local maps, cell phone, and first aid kitEnsure your vehicle is well maintained. Tires properly inflated and the gas tank at least half full

Be Vigilant. When exiting your car, look around for suspicious activities and individualsReport suspicious behavior. If you witness suspicious behavior or possible threats, alert l authorities immediately 65Slide66

Inspecting Your Vehicle

Inspect all compartments of your vehicle regularly

A vehicle inspection consists of the following:

Visual exterior inspection: Look for any evidence of tamperingVisual interior inspection: Look through the windows for anything unusual

Complete interior inspection: Look anywhere something may be hiddenIf you believe your vehicle has been tampered with or you see something suspicious, report it to the proper authorities immediately. 66Slide67

Hotel Security Introduction

Hotels in the US have been increasingly targeted by criminal for room invasions

Criminals may attempt room invasions to gain access to valuables using these tactics:

Following individuals or families from the lobby to their room and then forcing their way in when the door is unlocked

Disguising themselves as hotel staff and asking guests to open the doorAttempts to force open hotel room doors without warning67Slide68

Selecting a Hotel

Many hotels use CCTV camera systems for surveillance

Certain features can enhance your protection from a safety and security perspective when selecting a hotel:

Location in a non-violent and low-crime area

A common lobby through which all persons entering the hotel must passProtection by hotel security personnelElectronic key card securityClosed-circuit television (CCTVs) monitoring common areas68Slide69

Selecting Your Hotel Room

Hotel rooms should be selected with security in mind

If you have the choice, consider the following room preferences:

3rd to 5th floors –1st and 2nd floors are easily accessible from the outside, above the 5th floor is difficult to reach by emergency services

Not adjacent to fire escapes or exits – criminals target these rooms because of ease of escapeNo balcony - criminals may use balconies to enter rooms and to go from one room to the next 69Slide70

Inspecting Your Hotel Room

Night latches are common in hotel rooms and should be used

Consider these things:

Functioning locks on all doors and windowsScratches or marks on the door frame

Location of emergency exits and escape routesSolid doors to help resist break-insOperational telephoneBe sure you know how to call the front desk and to dial out of the hotel for 911.Also, when you leave your room, give it the appearance of being occupied.70Slide71

Hostage Survival Introduction

Hostages are taken for a variety of reasons and captivity may last for a few hours or for years

Hostage taking within CONUS is rare, however, it is a threat.

Hostages may be taken to obtain political concessions, ransom, or publicity.In CONUS hostage situations usually occur during a robbery and are resolved through negotiations or rescue.

To prepare for this possibility, review "Isolated Personnel Guidance," an annex to CJCS Guide 5260. This is available from your Antiterrorism Officer.71Slide72

Initial Response to Hostage Incident

Response to a hostage situation at Hillary Clinton's campaign office in Rochester, New York

The initial moments of a hostage taking situation are the most chaotic. The decision to resist or comply is a personal choice. If taken hostage, focus on defusing the situation:

Control your fear and maintain your dignity

Follow instructions of your captorsAvoid sudden movements that your captors may view as hostileThe initial moments and hours of a hostage situation can be the most dangerous. Your decisions can increase your chance for survival.72Slide73

Time in Captivity

In a hostage situation, do not let your fear takeover

Your demeanor toward your captors may influence the treatment you receive:

Respond to your captors with respectTry not to display emotion or ego

Do not lie or volunteer informationBe prepared for a long captivity:Keep active and maintain a daily routineEngage guards in conversation, Eat the food that isFind ways to exerciseGet enough sleep73Slide74

Hostage Resolution

Do not attempt to assist rescue personnel and cooperate with all instructions

In the event of a rescue attempt:

Immediately drop to the floor or dive behind a piece of furniture for coverAfter taking cover, do not make any sudden moves

Do not attempt to assist rescue personnelCooperate with rescue74Slide75

CBRNE Introduction

Hosam-Maher Husein Smadi attempted to use a VBIED in Dallas in September 2009

Chemical, biological, radiological, nuclear, and explosives (CBRNE) attacks are a proven threat to US Government facilities within the United States.

In 2002, the US post office was used to deliver anthrax laden letters to multiple targets.In 1995, Timothy McVeigh detonated a massive VBIED in Oklahoma City killing 168 persons.

A chemical attack has not yet occurred on US soil , but the 1995 Sarin nerve gas attack in the Tokyo subway demonstrates the threat.75Slide76

Responding to CBRNE Attacks

Responders in protective gear at the Hart Senate Office Building during the 2001 anthrax attacks

The exact nature of a CBRNE attack may be hard to determine. Regardless of the nature, you can protect yourself by:

Covering as much of your body as you can, especially your nose and mouth

Washing any exposed part of your body with soap and waterSeeking medical attention as soon as possibleFollowing instructions of local authorities and first responders76Slide77

Responding to IEDs

Pipe bomb in Centennial Olympic Park in Atlanta, Georgia

IEDs can be disguised as everyday objects. Be alert for:

Suspicious objects and packaging: Unattended items that could conceal a bombItems with unusual batteries, wires, cables, and strings

Suspicious behavior: Persons dressed in unseasonably warm clothing or behaving nervouslyPersons leaving a suspicious object prior to leaving an area77Slide78

SUMMARY

AND REVIEW

STAY VIGILANTIntro to TerrorismTerrorist OperationsIndividual Protective MeasuresSurveillance

Improvised explosive devices Kidnapping and hostageThreat levels and FPCONSSlide79

Suspicious Letters and Packages

Letters and packages displaying unusual markings may indicate a potential threat

Mail and suspicious packages may also contain a CBRNE threat. Potential indicators may be:

No return address

markings such as "personal”Excessive tapeMisspelled wordsUnknown powder, oily stains, odorForeign / excessive postageAddressed only to a person's title or uses an incorrect titleProtruding wires or package is lopsided and uneven79Slide80

Section 3: Historical Examples

80Slide81

Historical Examples Included in this Briefing

Historical Example

Year

Location(s)

Attack Method(s)

Mumbai Terrorist Attacks2008

Mumbai, India

Assault Weapons / IEDs

Fort Dix Plot

2007

Fort Dix, NJ

Automatic Weapons Fire

Camp Pennsylvania

2003

Camp Pennsylvania, Kuwait

Small Arms, Grenades

DC Sniper

2002

Washington, DC, Virginia, Maryland

Small Arms

Bali Nightclub Bombing

2002

Bali, Indonesia

Vehicle / Backpack IED (Suicide Bombing)

US Anthrax Attacks

2001

NY, DC, FL

Biological Weapon

United Flight 93

2001

Shanksville, PA

Skyjacking of Passenger Jetliner

Oklahoma City Bombing

1995

Oklahoma City, OK

Vehicle-Borne IED

General Dozier

1981

Verona, Italy

Kidnapping

Stockholm Syndrome

1973

Stockholm, Sweden

Hostage Holding

81Slide82

Questions?

82