mro security advisory council sac webinar
play

MRO Security Advisory Council (SAC) Webinar Suspicious Packages and - PowerPoint PPT Presentation

MRO Security Advisory Council (SAC) Webinar Suspicious Packages and Bomb Threat Considerations John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies May 30, 2019 John Breckenridge is


  1. MRO Security Advisory Council (SAC) Webinar “Suspicious Packages and Bomb Threat Considerations” John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies May 30, 2019

  2. John Breckenridge is the Director of Corporate Security and Business Continuity for Kansas City Power & Light based in Kansas City, MO. In his current capacity, he directs the overall Corporate Security function to ensure security operations are in compliance with legal, regulatory, and company requirements. Corporate Security responsibilities include physical security, security compliance, investigations, guard force management, protection operations, law enforcement liaison, enterprise- wide crisis management and business continuity planning. To be effective, Mr. Breckenridge uses his 30 plus years of military, criminal justice and industrial security experience to work with each functional department and business unit. John Breckenridge Email: John.Breckenridge@kcpl.com

  3. Bottom Line Up Front! (B.L.U.F.!) Please don’t think it can’t happen to you – because it can! First, figure out how YOUR company processes mail delivery internally. Work closely, in advance, with your Internal resources; Call Centers, Investor Relations, and others who may receive any kind of threats to ensure they know who to report to within your company. Work closely with your External resources; Local, County, State, Federal, Provincial, RCMP, etc., law enforcement agencies and Intelligence units (use your Clearances!) to try and be aware of any threat actors/groups. Try to keep a record of previous threat actors/groups. If/when you become aware of a recent threat – retrain!

  4. History US and International Incidents 1764 - First mail bomb was in Denmark 1970’s to 1996 – Unabomber – Ted Kaczynski 2001 US Anthrax letters soon after terrorist attack of 9/11 October, 2018 – White Powder Mailed to Ted Cruz’s Office – Texas October 2018 – Mail Bomb Suspect Arrested in Florida reference Cesar Sayoc, Jr. January 2019 – Man Arrested After Suspicious Packages Sent to Consulates in Australia March 2019 – United Kingdom and Ireland Recent Missouri issues.

  5. Type of Packages Explosive Devices Chemical Agents Radiological Agents Biological Agents Dead fish?!

  6. Package bound for Austin blows up at FedEx Building Near San Antonia – March 2018 https://www.cbsnews.com/news/fedex-package-bomb-today-meant-for-austin-area-delivery/

  7. Department of Homeland Security Anomalies that should raise red flags about a package Rigid or bulky Lopsided or uneven Anomalies that should raise red Wrapped in string Badly written or misspelled labels flags about a package Generic or incorrect titles Excessive postage No postage Foreign writing, postage, or return address Missing, nonsensical, or unknown return address Leaks, stains, powders, or protruding materials Ticking, vibration, or other sound

  8. Leave the mail or package where it was found. Do not disturb. Do not try to clean the substance. Immediately call 911 Clear the immediate area of all persons and cordon off. Instruct people to wash hands and other exposed skin with soap and water. List names of person in immediate are of mail/package. Shut down all heating, ventilation, air conditioning, or fans in room. Document the location of mail/package

  9. Identification and Response Plan The following identification and response plan will be utilized during an event where a suspicious package is recognized on or near Company property. Training is provided to mail room employees and an appropriate response is outlined in the Suspicious Package Response Flow Diagram. The Suspicious Package Reporting Flow Chart is available to all employees Anomalies that should raise red via the Corporate Security Website. Suspicious Package Response Diagram flags about a package Suspicious Package Reporting Flow Chart Suspicious Package Recognition When a suspicious package is reported to Security, a member of the Security Management Team will Coordinate an appropriate response in a timely manner (This may include personal response or response of emergency personnel depending on the nature of the package) Identify the intended recipient of the package, if applicable. Make notification to the individual. Identify the sender of the package, if possible. Conduct a comprehensive threat assessment of the individual and determine appropriate action. Photograph or make copies of the package and contents if safe to do so. Notify the mail room of the person sending a suspicious package and have future mail from that person screened for foreign substances or threatening content. If suspicious but not deemed dangerous or threatening - Draft a letter briefly explaining the circumstances of the suspicious package, attach the letter to all items deemed safe to handle, and forward them to the intended recipient.

  10. Bomb Threat Issues

  11. Discovery of a device or Suspicious Package Anomalies that should raise red Report location and accurate description to authorities flags about a package ID the danger area and cordon off, and evacuate a clear zone of at least 300 feet, including floors, above and below

  12. “BOMB” Threats Anomalies that should raise red PRIOR TO THREAT • Plan and Prepare flags about a package • Develop A Bomb Threat Response Plan • Provide Bomb Threat Response Plan Training to all personnel IF THREAT IS RECEIVED • Conduct threat assessment • Execute appropriate actions • Response Plan BOMB THREAT GUIDANCE • PDF Document added at end of presentation BOMB THREAT CHECKLIST • PDF Document added at end of presentation

  13. Center for Domestic Preparedness site (free training) https://cdp.dhs.gov/find-training https://cdp.dhs.gov/online_course/

  14. TRIP wire https://tripwire.dhs.gov/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend