1 / 35

MLCLant Fire Marshall

todd
Download Presentation

MLCLant Fire Marshall

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. MLCLant Fire Marshall

    3. The Coast Guard in High Rise Buildings Today Headquarters District Offices MLCLant Marine Safety Offices Marine Inspection Offices Recruiting Offices Auxiliary

    7. SA Greg HARTMAN FBI Norfolk (757) 455-0100 Bomb Threat Checklist Suspicious Packages

    10. Bomb Threat Card

    14. Does the Threat Include Building Layout Information? Knowledge of the Type of Business? Reason for planting the bomb? Details of Bomb Construction?

    15. Evaluating Bomb Threats Have there been prior acts against this entity? Have there been prior acts against other, similar entities? Is this part of a series of threats? How accessible is the facility to the public? What facility security measures are in place? What other tenants are in the facility?

    16. Organizations need to establish a plan for dealing with bomb threats and/or actual explosive devices prior to receiving the threat. An understanding of the concepts of risk management, threat assessment and a realistic understanding of the power of explosives are required to prepare a plan that is appropriate for the circumstances. Without a plan in place that is current, reasonable and clear, the organizations response can lead to disruption, damage or personal injury.Organizations need to establish a plan for dealing with bomb threats and/or actual explosive devices prior to receiving the threat. An understanding of the concepts of risk management, threat assessment and a realistic understanding of the power of explosives are required to prepare a plan that is appropriate for the circumstances. Without a plan in place that is current, reasonable and clear, the organizations response can lead to disruption, damage or personal injury.

    17. Planning Bomb Threat Response Requires Input from: Management Supervisors Employees Maintenance Security All levels of an organization must participate in preparing a bomb threat response. The people within an organization are aware of their surroundings and their knowledge of and participation in a response plan can greatly increase the odds of its success.All levels of an organization must participate in preparing a bomb threat response. The people within an organization are aware of their surroundings and their knowledge of and participation in a response plan can greatly increase the odds of its success.

    18. Minimizing the Threat Restrict Access Inspect Packages/Deliveries Control Keys Video Surveillance Lighting The first step of developing a response plan is to minimize the threat. By taking basic steps, companies and organizations can make it more difficult for the bomber to gain access to the facilities to place a device in the first place. Where feasible, access should be restricted to those personnel required to perform the function of the organization. Obviously, in a retail environment, restricting access to the public is not feasible,whereas it may be entirely feasible in a manufacturing environment. All incoming packages and deliveries should be inspected before being accepted. By using the Letter and Package Bomb Identification procedures, personnel can identify suspicious packages before they are opened. Control access to the facility through security measures. Record key numbers and/or use electronic entry tracking systems to monitor access to areas of the facility. Video surveillance and proper lighting can deter criminal acts as well as intimidate the bomber.The first step of developing a response plan is to minimize the threat. By taking basic steps, companies and organizations can make it more difficult for the bomber to gain access to the facilities to place a device in the first place. Where feasible, access should be restricted to those personnel required to perform the function of the organization. Obviously, in a retail environment, restricting access to the public is not feasible,whereas it may be entirely feasible in a manufacturing environment. All incoming packages and deliveries should be inspected before being accepted. By using the Letter and Package Bomb Identification procedures, personnel can identify suspicious packages before they are opened. Control access to the facility through security measures. Record key numbers and/or use electronic entry tracking systems to monitor access to areas of the facility. Video surveillance and proper lighting can deter criminal acts as well as intimidate the bomber.

    20. Reporting Bomb Threats

    21. Building Searches

    22. Types of Searches Overt Each Employee searches their own work area Covert Management searches areas Special Team Search Composed of representatives from all levels and sectors of entity

    23. Search Areas Exterior Search Interior Search Room Search

    24. Exterior Searches Unidentified vehicles Sewers, drainage ditches, runoff areas Mailboxes Ornamental Structures Generators and all other power systems Trash receptacles Shrubbery Exterior ledges, overhangs, light fixtures, window boxes and gutters

    25. Interior Searches Lobbies Halls Stairs Restrooms Mechanical Areas Elevator Shafts (including tops of elevators) Cleaning and Storage Closets All rooms in the building

    26. Room Searches Two people per team Listen when entering room for unusual noises First person searches, second person watches, alternating during sweep If multiple teams are used in a room, divide responsibility for the room between teams

    27. Room Searches Search Pattern: Search perimeter of room then interior of room Check area from floor to waist on first pass Check inside all counters and workspaces Examine area from waist to ceiling Check on top of furniture, particularly cabinets Check false ceilings

    30. LETBOM Series

    31. LETBOM Envelope

    32. Other Indicators Package Appears to have been opened and resealed Pressure or resistance noted when opening package Package makes unusual noise Personal Mail Sent to Office Homemade Labels, Cut and Paste Addressing, Disguised Handwriting Peculiar odor to package

    33. Other Indicators Package appears to contain a liquid Sloshing sound Shifting balance Could be a chemical/biological weapon

    34. Package Bomb Considerations These are Indicators only A letter or package bomb may exibit none, some or all of these characteristics Explosive devices may be shipped via any possible means, including FedEx, UPS, or Courier Delivery. Some delivery services now allow the introduction of shipments into their system without dealing with a clerk

    35. Available Publications The Bomb Threat Challenge Bomb Threat Phone Card

More Related