MRO Security Advisory Council (SAC) Webinar
“Suspicious Packages and Bomb Threat Considerations”
John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies
May 30, 2019
MRO Security Advisory Council (SAC) Webinar Suspicious Packages and - - PowerPoint PPT Presentation
MRO Security Advisory Council (SAC) Webinar Suspicious Packages and Bomb Threat Considerations John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies May 30, 2019 John Breckenridge is
John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies
May 30, 2019
Email: John.Breckenridge@kcpl.com John Breckenridge is the Director of Corporate Security and Business Continuity for Kansas City Power & Light based in Kansas City, MO. In his current capacity, he directs the overall Corporate Security function to ensure security operations are in compliance with legal, regulatory, and company requirements. Corporate Security responsibilities include physical security, security compliance, investigations, guard force management, protection operations, law enforcement liaison, enterprise- wide crisis management and business continuity planning. To be effective,
industrial security experience to work with each functional department and business unit.
Please don’t think it can’t happen to you – because it can! First, figure out how YOUR company processes mail delivery internally. Work closely, in advance, with your Internal resources; Call Centers, Investor Relations, and
company. Work closely with your External resources; Local, County, State, Federal, Provincial, RCMP, etc., law enforcement agencies and Intelligence units (use your Clearances!) to try and be aware of any threat actors/groups. Try to keep a record of previous threat actors/groups. If/when you become aware of a recent threat – retrain!
1764 - First mail bomb was in Denmark 1970’s to 1996 – Unabomber – Ted Kaczynski 2001 US Anthrax letters soon after terrorist attack of 9/11 October, 2018 – White Powder Mailed to Ted Cruz’s Office – Texas October 2018 – Mail Bomb Suspect Arrested in Florida reference Cesar Sayoc, Jr. January 2019 – Man Arrested After Suspicious Packages Sent to Consulates in Australia March 2019 – United Kingdom and Ireland Recent Missouri issues.
Explosive Devices Chemical Agents Radiological Agents Biological Agents Dead fish?!
https://www.cbsnews.com/news/fedex-package-bomb-today-meant-for-austin-area-delivery/
Rigid or bulky Lopsided or uneven Wrapped in string Badly written or misspelled labels Generic or incorrect titles Excessive postage No postage Foreign writing, postage, or return address Missing, nonsensical, or unknown return address Leaks, stains, powders, or protruding materials Ticking, vibration, or other sound
Leave the mail or package where it was
the substance. Immediately call 911 Clear the immediate area of all persons and cordon off. Instruct people to wash hands and other exposed skin with soap and water. List names of person in immediate are of mail/package. Shut down all heating, ventilation, air conditioning, or fans in room. Document the location of mail/package
The following identification and response plan will be utilized during an event where a suspicious package is recognized on
Suspicious Package Response Flow Diagram. The Suspicious Package Reporting Flow Chart is available to all employees via the Corporate Security Website. Suspicious Package Response Diagram Suspicious Package Reporting Flow Chart Suspicious Package Recognition When a suspicious package is reported to Security, a member of the Security Management Team will Coordinate an appropriate response in a timely manner (This may include personal response or response of emergency personnel depending on the nature of the package) Identify the intended recipient of the package, if applicable. Make notification to the individual. Identify the sender of the package, if possible. Conduct a comprehensive threat assessment of the individual and determine appropriate action. Photograph or make copies of the package and contents if safe to do so. Notify the mail room of the person sending a suspicious package and have future mail from that person screened for foreign substances or threatening content. If suspicious but not deemed dangerous or threatening - Draft a letter briefly explaining the circumstances of the suspicious package, attach the letter to all items deemed safe to handle, and forward them to the intended recipient.
Bomb Threat Issues
Report location and accurate description to authorities ID the danger area and cordon off, and evacuate a clear zone of at least 300 feet, including floors, above and below
PRIOR TO THREAT
IF THREAT IS RECEIVED
BOMB THREAT GUIDANCE
BOMB THREAT CHECKLIST
https://cdp.dhs.gov/find-training https://cdp.dhs.gov/online_course/
https://tripwire.dhs.gov/
PRIOR IOR T TO O THR HREAT T
Plan and prepare Develop a Bomb Threat
Response Plan
Provide Bomb Threat Response
Plan training to all personnel
IF T IF THR HREAT IS IS R RECE CEIV IVED D
Conduct threat assessment Execute appropriate actions
Response Plan
Planning Considerations
Coordinate with local law enforcement and first responders to ensure smooth handling of a bomb threat Develop clear-cut primary and alternate levels of authority (referred to in this document as “Site Decision Maker(s)”) Select Evacuation Teams and Search Teams Develop training plan Determine search procedures Designate control center locations Plan for emergency assistance (police, fire, etc.) Establish primary and alternate evacuation routes and assembly areas Establish evacuation signal(s) Develop a communications plan Determine procedures for accessing/shutting
and reactivating utilities
Preparation Considerations
Control building access Implement strict master key control Inspect incoming parcels Safeguard confidential material Keep exits unobstructed Ensure adequate internal/external emergency lighting Utilize electronic surveillance
Items you may want to consider including in your Emergency Toolkit that will be taken to the Incident Command Post.
Building Facility
Complete set of master keys: coded to rooms and corresponding with a printed key list Blueprints and floor plans or site map of building Video, photographs, or CD depicting building interior and exterior
Emergency Response Plans
Copies of the Site Crisis Response Plan, Bomb Threat Plan, and Crisis Management Plan A list of the following phone numbers: Site Decision Maker(s) Police/Fire/Emergency Medical Services (EMS) Federal Bureau of Investigation (FBI) Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Postal Inspector Nearest hospital Facility emergency names and phone numbers
Personnel Information
Building emergency response team member contact information and assignments List
personnel trained in CPR and/or f irst aid Updated list, with pictures if possible,
all staff/personnel Staff/visitors sign-in/out sheets that include names and dates; Include provision for staff/visitors transported to medical facilities List
staff with special needs and description
need Contact information for n eighboring/contiguous buildings
Additional Emergency Action Resources
Reflective vests for b uilding emergency response team members with identifying marks Bullhorn with charged batteries AM/FM portable radio Flashlights and batteries Local street and zone maps Clipboards Writing materials (legal pads, pens, pencils, markers) Plastic red/yellow tape for cordoning off areas
Phoned Threat
Remain calm and DO NOT HANG UP If possible, signal other staff members to listen and notify Site Decision Maker(s) a nd authorities If the phone has a display, copy the number a nd/or le tters
the window display Write down the exact wording
the threat Keep the caller
the line for a s long as possible and use the Bomb Threat Checklist to gather a s much information as you can Record, if possible Fill out the Bomb Threat Checklist immediately Be available for int erviews with the building’s emergency response team and law enforcement
Verbal Threat
If the perpetrator leaves, note which direction they went Notify the Site Decision Maker(s) and authorities Write down the threat exactly as it was communicated Note the description
the person who made the threat: Name (if known) Race Gender Type/color
clothing Body size (height/weight) Hair and eye color Distinguishing features Voice (loud, deep, accent, etc.)
Written Threat
Handle the document as little as possible Notify the Site Decision Maker(s) and authorities Rewrite the threat exactly as is
another s heet
paper and note the following: Date/time/location document was found Any situations
conditions surrounding the discovery/ delivery Full names of any personnel who saw the threat Secure the
threat; DO NOT alter t he item in any way If small/removable, place in a bag
nvelope If large/stationary, secure the location
Emailed Threat
Leave the message open on the computer Notify the Site Decision Maker(s) and authorities Print, photograph,
copy the message and subject line; note the date and time
All threats should be carefully evaluated. One must consider the facts and the context, and then conclude whether there is a possible threat.
Low Risk
Lacks Realism: A threat that poses a minimum risk to the victim and public safety. Probable motive is to c ause disruption.
Threat
is vague and indirect.
Information
contained within the threat is inconsistent, implausible,
lacks detail.
Caller is
definitely known and has called numerous times.
The
threat was discovered instead
delivered (e.g., a threat written
a wall).
Medium Risk
Increased Level
could be carried
although it may not appear entirely realistic.
Threat
is direct and feasible.
Wording
in the threat suggests the perpetrator h as given some thought
how the act will be carried
May
include indications
a possible place and time.
No
strong indication the perpetrator h as taken preparatory steps, although there may be some indirect reference pointing to that possibility.
Indication
the perpetrator h as details regarding the availa- bility
components needed to construct a bomb.
Increased
specificity to the threat (e.g., “I’m serious!” o r “ I really mean this!”).
High Risk
Specific and Realistic: Threat appears to pose an immediate and serious danger to the safety
Threat
is direct, specific, and realistic; may include names
possible victims, specific time, and location
device.
Perpetrator p
rovides his/her ide ntity.
Threat
suggests concrete steps have been taken toward carrying
the threat.
Perpetrator ind
icates they have practiced with a weapon
have had the intended victim(s) u nder s urveillance.
Considerations for Site Decision Maker(s)
Immediately contact local law enforcement if not done Limit access to building Review Bomb Threat Response Plan Conduct Threat Assessment Determine if s earch is warranted based
Threat Assessment
If Search Is Initiated
Enact Search Plan Communicate situation to staff/personnel and request that they make a quick and complete visual scan of their personal workspace for anything unusual Account for all personnel Assemble Search and Evacuation Team(s) and update about bomb threat condition
General Search Team guidelines:
Search Teams make a quick and complete visual scan of the search area Divide individual rooms/areas into search levels Take special note of any object(s) that seem out of place Check ledges, balconies, waste baskets, and false ceilings and floors Check for unusual odors and listen for any unusual background noises If anything unusual is noticed, move people away from the potential hazard and immediately report the location of the
NOTE: Use of radio communications is NOT recommended unless the area has been searched and cleared.
For additional information and products on bomb threats and improvised explosive device (IED) search procedures, please visit the DHS Office for Bombing Prevention website at www.dhs.gov/what-to-do-bomb-threat
A suspicious item is anything (e.g., package, vehicle) that is reasonably believed to contain explosives, an IED, or other hazardous material that requires a bomb technician to further evaluate it. Potential indicators are threats, placement, and proximity of the item to people and valuable assets. Examples include unexplainable wires or electronics, other visible bomb- like components, unusual sounds, vapors, mists, or odors. Generally anything that is Hidden, Obviously suspicious, and not Typical (HOT) should be deemed suspicious.
If Suspicious Item Is Found
DO NOT touch, tamper w ith,
move the item Immediately report item to Site Decision Maker(s) and local law enforcement/first responders Site Decision Maker(s) must: Ensure area is secured and cleared of personnel Notify Search Teams Ensure emergency responders are briefed Evacuation and Search Teams should remain available to assist and inform evacuees, media, staff, and others
Considerations for Site Decision Maker(s)
Not all items are suspicious An unattended item is anything (e.g., bag, package, vehicle) not in someone’s possession and where there are no
signs
being suspicious (see above), especially if no threat was received
NOTE: The discovery of one suspicious item should not automatically mean the conclusion of a search. More suspicious items may be present.
The Site Decision Maker(s) must take the discovery of multiple suspicious items into consideration during the planning and execution stages of the facility’s Bomb Threat Response Plan.
Considerations for Site Decision Maker(s)
Repeat Threat Assessment: Is the threat still credible? Were any suspicious items loc ated (if search was initiated)? Based on Threat Assessment, search (if initiated), and totality of circumstances, determine if addition measures are warranted: Partial or full lockdown? Partial or full evacuation? No further action?
If Evacuation Is Initiated
Select evacuation routes and assembly areas that are not in the vicinity of the suspicious item; ensure these routes have been searched and cleared Notify police/fire/EMS
evacuation and request assistance Account for a ll personnel Evacuation Team confirms the building is empty Bring emergency kit and building trauma kits, if available Advise all evacuees to remove all personal items ( e.g., purses, backpacks)
Continuing Actions After Evacuation
Debrief emergency services and assist in coordinating further a ctions Take accountability and report Open media, medical, and family areas — brief regularly As appropriate, determine reoccupy or dismiss action Reoccupy when cleared and deemed appropriate Dismiss in consultation with site administration Notify all personnel of decision and ensure accountability Site Decision Maker(s) should remain on-scene until situation is resolved or until relieved by another administrator
A Final Note
Every bomb threat requires professional judgment and should be handled in accordance with the facility’s needs. Site Decision Maker(s) and administrators should periodically review Federal guidance and work with local first responders to establish a Bomb Threat Response Plan that addresses each risk level appropriately and is optimal for their building(s) and personnel.
2016
These guidelines are designed to help Site Decision Makers
threat in an orderly and controlled manner with first responders and other stakeholders.
This product was developed jointly by the FBI and DHS Office for Bombing Prevention and reviewed by the National Explosives Task Force (NETF). For more information, contact the DHS Office for Bombing Prevention at OBP@dhs.gov or the NETF at NETF@ic.fbi.gov.
tsrponmlkihgecbaTSPMCB NATIONAL
PROTECTION AND PROGRAMS DIRECTORATE
OFFICE
FOR BOMBING PREVENTION
NOTE: The bomb threat response plan may be included as part
an
emergency response plan. General Model
Incident Command System (ICS) procedures (Actual titles may vary) Incorporate law enforcement/emergency responder input Define terms Describe mitigation measures Plan for multiple threat scenarios Provide inclement weather
Establish explosion protocols Establish procedures for shutting
utilities Identify location
incident command post and alternate location Identify communications/incident command post equipment requirements Identify safety and search equipment Establish communications procedures Evaluate potential legal issues Identify training/exercising requirements Establish review and revision procedures Coordinate with neighboring properties Identify Key Personnel/Roles & Responsibilities Incident commander Search team leader Search team members Law enforcement liaison Evacuation team leader Evacuation team members Runners Evacuees Describe Threat Handling Procedures Bomb threat call procedures Bomb threat message procedures Detection protocols Notification and reporting procedures Reporting form Include Threat Evaluation Section Specific Language
threat Witness interviews Time available for search/evacuation Known access control breaches Danger in evacuation areas General Nature
facility/event
Current threats and events Prior acts against this
similar Significance
dates/events Accessibility
premises
Include Evacuation Section Conditions for evacuation (immediate, as directed by responders, etc.) How communicated Assembly/staging and shelter‐in‐place Evacuation routes Special needs evacuees Evacuation procedures Remove personal items Unlock
refrain from locking Muster reporting requirements/personnel accountability Include Search Section High‐priority areas for searches Incident Command Post Assembly/Staging areas Critical areas Vulnerable areas Search and marking procedures (systematic and thorough, with work/rest cycle) Search kit/equipment, including floor plans & maps Search reporting procedures Specify Return to Work Procedures Procedures for a safe return to the building Debriefing and updating the plan Contact information for counseling
medical needs following the incident September 2013
_______________________________________________ _______________________________________________ _______________________________________________ _______________________________________________
Date: Time: Time Caller Phone Number Where Hung Up: Call Received: Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on the reverse of this card. If a bomb threat is received by phone:
authorities or, as soon as the caller hangs up, immediately notify them yourself.
letters on the window display.
up, but from a different phone, contact FPS immediately with information and await instructions. If a bomb threat is received by handwritten note:
If a bomb threat is received by email:
Signs of a suspicious package:
delivery DO NOT:
have the potential to detonate a bomb.
the threat.
WHO TO CONTACT (select one)
1-877-4-FPS-411 (1-877-437-7411)
Ask Caller:
(Building, Floor, Room, etc.)
Exact Words of Threat: Information About Caller:
Caller’s Voice Background Sounds: Threat Language:
Accent Animal Noises Incoherent Angry House Noises Message read Calm Kitchen Noises Taped Clearing throat Street Noises Irrational Coughing Booth Profane Cracking voice PA system Well-spoken Crying Conversation Deep Music Deep breathing
Motor
Disguised Clear Distinct Static Excited Office machinery Female Factory machinery Laughter Local Lisp Long distance Loud Male
Other Information:
Nasal Normal Ragged Rapid Raspy Slow Slurred Soft Stutter
_____________________________________ _____________________________________
Page 1 November 2015
Definitions
Unattended Item: could be a package of unknown origin and content. There are no obvious signs of being suspicious (i.e., no strange odor or no wires hanging from the item or signs of the item being altered). A law enforcement response is not required. Suspicious Item: is a package that has indications of containing an explosive device. It may have wires exposed, leaking fluids, and/or an odd odor that could smell like cleaning detergents or petroleum
by the local bomb squad. NOTE: Occupants, because of their familiarity with the space where they work, can most easily spot something that does not belong there. The primary hazard associated with a suspicious item is the threat
time is important.
Actions Required for an Unattended Item
Take the following actions:
suspicious and proceed to the Actions Required Suspicious Item section below.
unattended item. At any point during the examination of the item you become suspicious, treat the item as suspicious.
checked if applicable.
Page 2 November 2015
the article.
Detection Dog Team response if available. If not available, follow the Suspicious Item Actions below.
below.
NOTE: If a package, bag, item, or vehicle is deemed suspicious for any reason, Explosive Detection Dog (K-9) Teams will not be used to inspect suspicious packages, bags, items, or vehicles. While the K- 9 is an effective tool for alerting law enforcement personnel to the possible presence of explosives, it is not the final diagnostic tool. This is the responsibility of trained bomb squads. If an item is deemed to be suspicious, the determination that explosives may be contained in the item has already been made.
Actions Required for a Suspicious Item
Take the following actions:
leave them off.
control of the scene.
Card.
based on recommendations from local first responders or your supervisor, based on the totality of the circumstances.
Page 3 November 2015
establish safe distances by utilizing the DHS/FBI Bomb Threat Stand Off Card.
area.
evacuation routes and assembly areas.
the item and inform them where the item is located.
and close off the affected area.
procedures for entry.