SlideShare a Scribd company logo
Defining Prevention and Response Actions For BusinessDenver UASI Presents“Shared Strategies for Homeland Security”
Presented By:Detective Joe Tennant – Denver Police Bomb Squad
PreventionWho’s responsibility is it?Protection of our citizens and CIKR is the responsibility of everyone!Partnerships must be    formed and strategies    shared.
PreventionPrevention starts with knowledge, understanding, and preparation“It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles…”SunTzu
PreventionKnow your enemy’s intent. “Kill the Americans and their allies, civilian and military. It is an individual duty for every Muslim who can do it in any country in which it is possible to do it.” Osama bin Laden
  “Do not seek any permission when it comes to the killing of the Americans"… "Fighting the devil doesn't need a religious edict, deliberation, prayer or guidance. They are the party of the devil and fighting them is the personal duty of our times.”							Anwar al-Awlaki
Terrorism AwarenessTerrorist Groups InternationalDomesticRight WingLeft WingSpecial Interest GroupsState SponsorsLone Wolves, etc.
Terrorism AwarenessKey PointsJihadist movement  is always evolvingal-Qaeda to the Lone WolfEffects of the InternetDifficult for counterterrorism efforts, but not futile!Terrorists are patient and meticulous planners
Terrorism AwarenessWe know who wants to harm us.
We know their intent.
What does a terrorist look like?Terrorism AwarenessWhat Does a Terrorist Look Like?Terrorists can look like anyone!!!
Look for suspicious behavior, appearances, and activity…BehaviorNervous Anxious/Excited                                Profuse sweatingHesitationLyingHidden gestures and signalsAvoiding eye contactPhysical avoidanceMental stressMumblingPraying
Identifying a TerroristAppearanceDoesn’t fit time, story, and/or eventNot dressed for climateMultiple sets of clothingCarrying oversized bag/multiple bags on streetModifications to bagsElectrical components coming from bag to handActivityInterest in security measuresExtended amount of time in areas that are unusualConstantly looking aroundTaking unusual photos and or videoAvoidance of security and/or law enforcement
The ThreatHow Will They Attack?Explosives are still the terrorist’s weapon of choice.  Why?Easy to acquire/makeEasy to move and placeCan be used remotely to avoid captureLow costHigh YieldDifficult to detect
Execution of ThreatExplosivesHand Placed IEDPerson Borne IEDVehicle Borne IEDDelivery by ProxyOther WMD ConcernsCBNR
Threat to Prevention
Steps to PreventionKnowledgeUnderstandingAssessment PlanningPracticeReassessment
PreventionQuestions To Consider What is your risk level?  Low/HighAre you a potential target?What vulnerabilities or risks is your venue facing?Are you prepared?Can you prevent, deter, disrupt, delay, respond to, and/or mitigate a hazardous incident?Are you protected?PhysicalLiability
PreventionRisks and Vulnerabilities  AssessmentHow do you know what to protect or how to protect it? There may be help!“Protected Critical Infrastructure Information Program” (2002) ACAMS, HSPD-7, and other Initiatives For additional information view video at www.dhs.gov/acams
PreventionAssessments are completed…vulnerability issues have been addressed. The goal now is to apply your knowledge, understanding, and preparedness to preventing an act from occurring.
PreventionSeven Signs of Terrorist ActivitySurveillanceElicitationTests of SecurityAcquiring Supplies/FundingSuspicious People/ImpersonationDry Runs/Rehearsals Deployment  of Assets
Terrorist Attack CycleTarget SelectionSurveillanceFinal Target SelectionPlanningFinal SurveillanceDeploy Attack TeamAttack
Target SelectionTerrorist’s GoalsKill and/or Injure Cause overreaction by the governmentHarass, weaken or embarrass governmentDestroy InfrastructureDestroy facilitiesInstill fearDisrupt communicationsDiscourage foreign investmentInfluence government decisionsSatisfy a vengeanceDestroy economy
Desirable TargetsTransportationEconomic Infrastructure Soft TargetsSymbolic or “Public Message”MilitarySpecific Individuals
Surveillance-Terrorists Seek Information-Existing security at the facility:Security force sizeSecurity’s normal dutiesSecurity measures (i.e. Searches)Reaction times and procedures to false alarmsSecurity EquipmentPatrol RoutinesShift ChangesAccess control measuresUniforms and clothing worn by personnelLocation of critical assets (fuel, water, power)Computer sitesSchedules of vendorsPhotos, video recordings, etc
Final Target SelectionTargets with greatest weaknesses and vulnerabilities Targets with possibility of greatest success.
Planning PhaseResearch and Intelligence GatheringChoosing method of attack Gathering suppliesDesigning-Building-Testing Device(s)Dry Runs
Methods of AttackBombingsSuicide/Homicide BombingsArsonArmed AssaultAmbushesAssassinationHijackingSkyjackingKidnappingHostage takingCriminal ActivitiesWMDC.B.R.N.
Final SurveillanceTerrorists will look for the same items and routines that showed a particular facility to be vulnerable during the first surveillance phaseThey conduct a final surveillance to make sure nothing has changed in and around the facility during their planning phase.
Attack CycleDeployment of Attack TeamTerrorist have their weapons intact and are en-route to the attack siteThe AttackTerrorists have arrived at the location of the attack, the weapons of choice are in place, and the attack is carried out.
Lodging IndustryInherent ProblemsNo vehicle checkpointsNo security searchesOccupants have free access Occupants have some right to privacy in their roomsMany of the behavioral signs for a criminal/terrorist may be typical for a hotel guest (i.e. bags, clothing, photos)
Lodging IndustryWhat you can doWatch for suspicious vehicles Watch for highly unusual behaviorTrain employees to watch for suspicious behaviorInstruct employees to watch for unusual activities taking place in guest roomsPractice your emergency plansReport suspicious behavior immediately
Other Threats Behavioral awareness is beneficial in stopping any criminal activity RobberyTheftEspionageAssaultCyber AttacksVery real concern in  the U.S. for all entitiesWorkplace violenceActive Shooters
Technology-TechniquesTechnologyTechniquesKeep premises clean and orderly! Know your facility and what belongs there. Incorporate blast mitigation designSecurity (Armed vs. Unarmed)Challenging Unknown VisitorsSign-In Logs and ID ChecksVehicle InspectionsInterview TechniquesBehavioral Analysis TrainingBiometricsCard AccessDetection  Inst.-CBRNECameras/Surveillance/LightingAlarms/Motion SensorsCyber wareSecurity DoorsX-ray/MagnetometersVehicle BarriersBlast Mitigation ProductsCCTV
PreventionSummaryComplete vulnerability assessmentsMinimize risks and vulnerabilities Have a security planPractice and test the plan Reassess the plan  and fine tune Train and conduct exercises. Continually educate  employees
Response Actions for Business
Response(Business)Bomb Threats
Gather information from caller.
Complete Bomb Threat Checklist
Record conversation if possible
Note Caller ID information
Telephone Trap/Trace
Notify supervisors  and police immediately
Search premises for suspicious itemsPolice generally do not searchYou know your facility.Search by twos (floor to waist, waist to head, head to ceiling).Search public access areas and then  more secure areas.If suspicious object is located…DO NOT TOUCH!!
Response (Business)Bomb Threats Evacuation?

More Related Content

PPT
Bomb Threat Its Detection & Prevention
PPTX
Security Precautions for the Hospitality Industry
PPT
Safety & security
PPT
Safety & Security Hotel
PPT
Safety and security
PDF
Insurance Risk
PPTX
Safety and security for women in Hotels
PPT
Spengler chap03
Bomb Threat Its Detection & Prevention
Security Precautions for the Hospitality Industry
Safety & security
Safety & Security Hotel
Safety and security
Insurance Risk
Safety and security for women in Hotels
Spengler chap03

What's hot (6)

PPT
25 Th District Court House
PPTX
IMT 120 Lesson 1 for slide share
PDF
Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
PPTX
Upgradation in Hotel & Guest Security
PDF
Introduction To Firearms For Home Protection
PPTX
Value of Enhanced Hotel Security
25 Th District Court House
IMT 120 Lesson 1 for slide share
Cip 004, R1 Physical Security Awareness Webinar 10 23 09 Final Lipub
Upgradation in Hotel & Guest Security
Introduction To Firearms For Home Protection
Value of Enhanced Hotel Security
Ad

Viewers also liked (8)

PDF
Samir rafla guidelines arterial-hypertension-2013
ODP
Mailing Lists and IRC
PDF
Chinese erv 90-_new_testament
PPTX
Автоматизация документооборота и хранилища данных
PPTX
Lead Management in SugarCRM Series: Campaigns and Conversions
PPTX
Lead Management in SugarCRM Series: Lead Statuses
PDF
Egyptian Society of Cardiology,Thrombosis conference 2014 final program
PDF
Cardio egypt2016 scientific program eps & pediatrics samir rafla
Samir rafla guidelines arterial-hypertension-2013
Mailing Lists and IRC
Chinese erv 90-_new_testament
Автоматизация документооборота и хранилища данных
Lead Management in SugarCRM Series: Campaigns and Conversions
Lead Management in SugarCRM Series: Lead Statuses
Egyptian Society of Cardiology,Thrombosis conference 2014 final program
Cardio egypt2016 scientific program eps & pediatrics samir rafla
Ad

Similar to Prevention and response shared copy (20)

PPTX
Antiterrorism Point of Instruction
PPT
SECURITY AWARENESS
PPTX
Get Licensed - Level 2 Award For Door Supervisors - Part 2
PPTX
Presentation PR Presentation - Copy.pptx
PDF
Active Shooter Situations in the Workplace
PPTX
Crisis Action Planning for VIP Bodyguards
PPSX
Chris hunter
PPSX
Chris hunter
PPT
DOC_OPSEC security operations of a group.ppt
PPSX
Andrea Schultz, Dept. of Homeland Security, Power Point Presentation
PPTX
[Challenge:Future] Proactive Counter-Terrorism
PPTX
Active Shooter Threat Awareness and Safety
PPTX
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
PPTX
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
PDF
Hotels restaurants security
PPTX
Security Awareness training for employee
PPTX
Emergency Response on any Accidents resulting to injury.pptx
DOCX
Perimeter Security Scenario Questions
PPT
Webinar slides oct 21 2021 dr joshua sinai
PPTX
Suspicious Activity Reporting
Antiterrorism Point of Instruction
SECURITY AWARENESS
Get Licensed - Level 2 Award For Door Supervisors - Part 2
Presentation PR Presentation - Copy.pptx
Active Shooter Situations in the Workplace
Crisis Action Planning for VIP Bodyguards
Chris hunter
Chris hunter
DOC_OPSEC security operations of a group.ppt
Andrea Schultz, Dept. of Homeland Security, Power Point Presentation
[Challenge:Future] Proactive Counter-Terrorism
Active Shooter Threat Awareness and Safety
By. Chila G. Lipata EMT, So2 -BOMB THREAT.pptx
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
Hotels restaurants security
Security Awareness training for employee
Emergency Response on any Accidents resulting to injury.pptx
Perimeter Security Scenario Questions
Webinar slides oct 21 2021 dr joshua sinai
Suspicious Activity Reporting

More from Brandon Williams (20)

PPT
Cmwg contract breaches presentation
PPTX
Mar 2012 cdphe contractor performance monitoring trng
PPTX
Tobacco wb webinar 6.22.12
PPTX
Cmpu orientation webinar
PPTX
Applicant webinar tobacco cessation initiatives
PPTX
Applicant webinar ccpd final 05-29-12
PPTX
Applicant webinar tobacco community initiatives
PPTX
MCH Data to Action
PDF
Tobacco wb webinar 5 1-12
PDF
Cdphe cd presentation for ccpd 10 14 11a
PDF
Jillians slides for 12 9 11 ccpd final
PDF
Ccpd stakeholder input process 01 13-12
PPT
Ttfcci mid program presentation to trc 121411.cb
PPTX
Federal tobacco control
PPT
Ttfcci mid program presentation to trc 121411.cb
PDF
Colorado lgbt data scan final 10 14-11
PPTX
PSD Obesity Presentation 2011
PDF
Epe literature review training november 28 2011 (1)
PPTX
Colorado leadership v4
PPTX
LGBT HOPP Strategic Plan Slides
Cmwg contract breaches presentation
Mar 2012 cdphe contractor performance monitoring trng
Tobacco wb webinar 6.22.12
Cmpu orientation webinar
Applicant webinar tobacco cessation initiatives
Applicant webinar ccpd final 05-29-12
Applicant webinar tobacco community initiatives
MCH Data to Action
Tobacco wb webinar 5 1-12
Cdphe cd presentation for ccpd 10 14 11a
Jillians slides for 12 9 11 ccpd final
Ccpd stakeholder input process 01 13-12
Ttfcci mid program presentation to trc 121411.cb
Federal tobacco control
Ttfcci mid program presentation to trc 121411.cb
Colorado lgbt data scan final 10 14-11
PSD Obesity Presentation 2011
Epe literature review training november 28 2011 (1)
Colorado leadership v4
LGBT HOPP Strategic Plan Slides

Prevention and response shared copy

  • 1. Defining Prevention and Response Actions For BusinessDenver UASI Presents“Shared Strategies for Homeland Security”
  • 2. Presented By:Detective Joe Tennant – Denver Police Bomb Squad
  • 3. PreventionWho’s responsibility is it?Protection of our citizens and CIKR is the responsibility of everyone!Partnerships must be formed and strategies shared.
  • 4. PreventionPrevention starts with knowledge, understanding, and preparation“It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles…”SunTzu
  • 5. PreventionKnow your enemy’s intent. “Kill the Americans and their allies, civilian and military. It is an individual duty for every Muslim who can do it in any country in which it is possible to do it.” Osama bin Laden
  • 6. “Do not seek any permission when it comes to the killing of the Americans"… "Fighting the devil doesn't need a religious edict, deliberation, prayer or guidance. They are the party of the devil and fighting them is the personal duty of our times.” Anwar al-Awlaki
  • 7. Terrorism AwarenessTerrorist Groups InternationalDomesticRight WingLeft WingSpecial Interest GroupsState SponsorsLone Wolves, etc.
  • 8. Terrorism AwarenessKey PointsJihadist movement is always evolvingal-Qaeda to the Lone WolfEffects of the InternetDifficult for counterterrorism efforts, but not futile!Terrorists are patient and meticulous planners
  • 9. Terrorism AwarenessWe know who wants to harm us.
  • 10. We know their intent.
  • 11. What does a terrorist look like?Terrorism AwarenessWhat Does a Terrorist Look Like?Terrorists can look like anyone!!!
  • 12. Look for suspicious behavior, appearances, and activity…BehaviorNervous Anxious/Excited Profuse sweatingHesitationLyingHidden gestures and signalsAvoiding eye contactPhysical avoidanceMental stressMumblingPraying
  • 13. Identifying a TerroristAppearanceDoesn’t fit time, story, and/or eventNot dressed for climateMultiple sets of clothingCarrying oversized bag/multiple bags on streetModifications to bagsElectrical components coming from bag to handActivityInterest in security measuresExtended amount of time in areas that are unusualConstantly looking aroundTaking unusual photos and or videoAvoidance of security and/or law enforcement
  • 14. The ThreatHow Will They Attack?Explosives are still the terrorist’s weapon of choice. Why?Easy to acquire/makeEasy to move and placeCan be used remotely to avoid captureLow costHigh YieldDifficult to detect
  • 15. Execution of ThreatExplosivesHand Placed IEDPerson Borne IEDVehicle Borne IEDDelivery by ProxyOther WMD ConcernsCBNR
  • 18. PreventionQuestions To Consider What is your risk level? Low/HighAre you a potential target?What vulnerabilities or risks is your venue facing?Are you prepared?Can you prevent, deter, disrupt, delay, respond to, and/or mitigate a hazardous incident?Are you protected?PhysicalLiability
  • 19. PreventionRisks and Vulnerabilities AssessmentHow do you know what to protect or how to protect it? There may be help!“Protected Critical Infrastructure Information Program” (2002) ACAMS, HSPD-7, and other Initiatives For additional information view video at www.dhs.gov/acams
  • 20. PreventionAssessments are completed…vulnerability issues have been addressed. The goal now is to apply your knowledge, understanding, and preparedness to preventing an act from occurring.
  • 21. PreventionSeven Signs of Terrorist ActivitySurveillanceElicitationTests of SecurityAcquiring Supplies/FundingSuspicious People/ImpersonationDry Runs/Rehearsals Deployment of Assets
  • 22. Terrorist Attack CycleTarget SelectionSurveillanceFinal Target SelectionPlanningFinal SurveillanceDeploy Attack TeamAttack
  • 23. Target SelectionTerrorist’s GoalsKill and/or Injure Cause overreaction by the governmentHarass, weaken or embarrass governmentDestroy InfrastructureDestroy facilitiesInstill fearDisrupt communicationsDiscourage foreign investmentInfluence government decisionsSatisfy a vengeanceDestroy economy
  • 24. Desirable TargetsTransportationEconomic Infrastructure Soft TargetsSymbolic or “Public Message”MilitarySpecific Individuals
  • 25. Surveillance-Terrorists Seek Information-Existing security at the facility:Security force sizeSecurity’s normal dutiesSecurity measures (i.e. Searches)Reaction times and procedures to false alarmsSecurity EquipmentPatrol RoutinesShift ChangesAccess control measuresUniforms and clothing worn by personnelLocation of critical assets (fuel, water, power)Computer sitesSchedules of vendorsPhotos, video recordings, etc
  • 26. Final Target SelectionTargets with greatest weaknesses and vulnerabilities Targets with possibility of greatest success.
  • 27. Planning PhaseResearch and Intelligence GatheringChoosing method of attack Gathering suppliesDesigning-Building-Testing Device(s)Dry Runs
  • 28. Methods of AttackBombingsSuicide/Homicide BombingsArsonArmed AssaultAmbushesAssassinationHijackingSkyjackingKidnappingHostage takingCriminal ActivitiesWMDC.B.R.N.
  • 29. Final SurveillanceTerrorists will look for the same items and routines that showed a particular facility to be vulnerable during the first surveillance phaseThey conduct a final surveillance to make sure nothing has changed in and around the facility during their planning phase.
  • 30. Attack CycleDeployment of Attack TeamTerrorist have their weapons intact and are en-route to the attack siteThe AttackTerrorists have arrived at the location of the attack, the weapons of choice are in place, and the attack is carried out.
  • 31. Lodging IndustryInherent ProblemsNo vehicle checkpointsNo security searchesOccupants have free access Occupants have some right to privacy in their roomsMany of the behavioral signs for a criminal/terrorist may be typical for a hotel guest (i.e. bags, clothing, photos)
  • 32. Lodging IndustryWhat you can doWatch for suspicious vehicles Watch for highly unusual behaviorTrain employees to watch for suspicious behaviorInstruct employees to watch for unusual activities taking place in guest roomsPractice your emergency plansReport suspicious behavior immediately
  • 33. Other Threats Behavioral awareness is beneficial in stopping any criminal activity RobberyTheftEspionageAssaultCyber AttacksVery real concern in the U.S. for all entitiesWorkplace violenceActive Shooters
  • 34. Technology-TechniquesTechnologyTechniquesKeep premises clean and orderly! Know your facility and what belongs there. Incorporate blast mitigation designSecurity (Armed vs. Unarmed)Challenging Unknown VisitorsSign-In Logs and ID ChecksVehicle InspectionsInterview TechniquesBehavioral Analysis TrainingBiometricsCard AccessDetection Inst.-CBRNECameras/Surveillance/LightingAlarms/Motion SensorsCyber wareSecurity DoorsX-ray/MagnetometersVehicle BarriersBlast Mitigation ProductsCCTV
  • 35. PreventionSummaryComplete vulnerability assessmentsMinimize risks and vulnerabilities Have a security planPractice and test the plan Reassess the plan and fine tune Train and conduct exercises. Continually educate employees
  • 39. Complete Bomb Threat Checklist
  • 41. Note Caller ID information
  • 43. Notify supervisors and police immediately
  • 44. Search premises for suspicious itemsPolice generally do not searchYou know your facility.Search by twos (floor to waist, waist to head, head to ceiling).Search public access areas and then more secure areas.If suspicious object is located…DO NOT TOUCH!!
  • 47. Write statements with exact quote of threat!
  • 50. Witnesses will be asked to testify in court. Response(Business)What is a suspicious item? Evaluate the totality of the circumstancesGather intelligence on the item. Trust your gut feelings. Use of phones or other transmitting devices?Do not handle a suspicious item!Evacuation suggestedNotify police!
  • 53. Response(Business)Vehicle Borne IEDs (VBIED)Indicators of a VBIEDSagging shocks, indicating heavy payloadOdors, smoke, or fluids coming from vehiclePaperwork or plates do not match vehicle registrationVehicle appears to be abandoned Wires, switches, or other suspicious items observed inside of vehicle. Appears to be stolenSigns that it may be a cloned vehicleItems lying in vehicle that appear to be suspicious.
  • 54. Response(Business)Business Response to VBIEDEvacuate area immediately, allowing for blast hazards. Notify police immediately. Do not attempt to tow vehicle! Always keep Secondary Devices in mind!
  • 55. Response(Business)Business response to a post-blast bombing incident.Evacuate Notify police and EMS immediately. Care for injured. Stay on phone with police dispatcher to keep LE/EMS updated. Keep employee roster/log book to manage personnel at scene.
  • 56. Response (Business)Business Response to Bombing ScenesSecure the building, parking structure, and surrounding area until police arrive.Building maintenance, management, and security need to remain available to LE. Have communications system available for employees. Minimize media contactPoint person to collect statements/documents Do not handle evidence! Security can attempt to keep streets open for arriving LE/EMSAttempt to minimize emotional distress in employees.Follow instructions from LE
  • 57. Police ResponsePolice and EMS will arrive on scene very quickly.The injured will be cared for by EMS, while LE secures the crime scene and searches for additional hazards.Once hazards are identified and eliminated, the crime scene will be evaluated and processed ASAP. Command Post(s) will be set up and an Incident Command System will be implemented to manage all agencies. LE will immediately begin investigative processes to maximize their chances of a successful prosecution. Your help will be needed!!!
  • 58. SummaryPrevention and response is everyone's responsibility. Conduct Risk and Vulnerability AssessmentHarden security as much as possible Based on assessments, make a plan practice the plan, re-evaluate, make necessary changesTrain and educate employeesContact your local LE officials for additional training and information.
  • 59. Contact InformationDetective Joe Tennant-Denver Police Bomb Squad, #720-913-6381 or joe.tennant@denvergov.org