You are on page 1of 59

IMPROVISED

EXPLOSIVE DEVICES
[IEDS TOPIC]

Lecturer: IS Alvaro V. Marana


Plant 1 Canteen

March 1, 2015

Identification of IED components:


power sources, initiators, explosives, and switches
Identification of low, high, solid, plastic, and liquid
explosives used in IEDs
Identification of screening methodologies used to aid
in the detection of IEDs and IED components
Identification of concealment techniques use to
smuggle IEDs past a security checkpoint

Complete IED

Explosives

SULFU
R

Initiators

Blasting cap

Power sources

Battery component of bomb

Switches component of bomb

Completed components of G.I. pipe IED bomb..

Completed
components of IED
bomb..

IED bio-bomb liquid component of


bomb

bomb-cellphone

X-ray photos Bomb inside the box

Modern
IED

bombcellphone

Warning signs

BOMB EXPERTS

GI Pipes explosion intensity

Warning signs of possible


explosions

Q&A portion

IS Alvaro during the seminar

Class Participants 2015

Awarding of certificates

INTRODUCTION TO
TERRORISM
Lecturer: PAF Tomy P. Cabaluna
Plant 1 Canteen

March 1, 2015

WEBSTER DICTIONARY
defines TERRORISM as the systematic
use of terror specially as a means of coercion
and as state of intense fear. One that inspires
fear a frightening aspect and a cause of
anxiety..

CHARACTERISTICS COMMON TO TERRORIST


OR TERRORIST GROUPS
Promote fear,
Posses limited resources,
Are usually military weaker than the opposing
law enforces.
Do not necessarily equate tactical success with
mission success. Publicity may be the main
terrorist objectives.
Are highly mobile,
Operate most often undercover,
Believed that small groups mean security and
efficiency.

TERRORIST TACTICS
1. BOMBING
2. ARSON
3. HIJACKING
4. ASSASSINATION
5. AMBUSH
6. KIDNAPPING
7. HOSTAGE TAKING
8. ROBBERRIES/EXPROPRIATIONS

POTENTIAL TARGETS OF
TERRORISM
LOCAL GOVERNMENT FACILITIES

MILITARY FACILITIES
CORPORATE AND INDUSTRIAL FACILITIES
HISTORIC LANDMARK
PUBLIC PLACES
COMPUTER SYSTEMS AND NETWORKS
SCHOOL BUILDINGS

SECURITY AWARENESS AND


BASICAsCOUNTER
MEASURES
a Basis for Individual Facility
Training

Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Document Security

SECURITY TRAINING AND THREAT


AWARENESS
Purpose:
To train employees to recognize and be aware of the threat
posed by terrorists at each point in the supply chain.
Employees must be aware of emergency procedures the
company has in place.
safe rooms, evacuation procedures

Employees must know how to report situations that may

compromise security (who, what, when).

Each facility has guidelines and emergency numbers

YOUR FACILITY: EMERGENCY


Safe room
What to do if there is a Hazmat situation
Where to meet outside the facility in case of an

evacuation
Numbers to call: (posted in _________)
When to call: (posted in ___________)

Suspicious Persons

LOOK FOR..
Any person without
an employee
badge, visitor
badge or uniform.

These are stock photos, take and use actual photos


of your employees walking down a hallway. Or use
images from a surveillance camera

Suspicious Persons

and ACT
Determine if the person is an
employee or a visitor
If an employee, remind them
always to display their ID
badge and uniform.
If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
Report the incident to your
immediate supervisor.

Suspicious Persons

LOOK FOR..
Any person in

unauthorized/restricted areas

Suspicious Persons

AND ACT..
Get them out of the area
If a visitor, escort them to the reception area.
Report the incident to your immediate
supervisor

Suspicious Persons

Look for .

Any person:
wearing an overcoat on a

95 degree day, or any kind


of inappropriate clothing
waiting or loitering in an

area or hallway
asking
Cam 7

1:17:23AM

8/02/06

for an unknown
department, person or
employee

Suspicious Persons
LOOK FOR.

Any person:
who seems not to belong

in the area
going door to door, office

to office
entering a private office

unescorted
selling items
who seems lost
Cam 7

1:17:23AM

8/02/06

Suspicious Persons

LOOK FOR ..
Any person:

Cam 7

1:17:23AM

8/02/06

Tampering with somebodys desk,


boxes, personal items, equipment,
vehicles, cameras, lights

running,
especially
something

hiding behind doors, fences, desks,

if

carrying

Suspicious Persons

AND ACT
Immediately report the
incident to your
immediate supervisor

SUSPICIOUS
ACTIVITY

LOOK FOR
Objects obstructing access points
Disconnected or obstructed cameras
Broken locks or access control

systems

Unexplained clutter or debris


Objects thrown from a vehicle,

especially while traveling at a high


speed.

SUSPICIOUS
ACTIVITY

ACT
Immediately report any

suspicious activity to
your superiors.

Suspicious Objects
or Packages

LOOK FOR.
Unexplained objects or packages
that look strange or do not
belong to the area
Strange markings on boxes
(unknown code, color) or strange
characteristics (weight, number,
odd shape)
Strange leaking substance

Suspicious Objects
or Packages

Suspicious Objects
or Packages

AND ACT
Immediately report

any suspicious
packages or objects to
your supervisor,
security, local police,
911 and/or FBI.

Suspicious Objects
or Packages

AND ACT.

Employee Identification

Your
Responsibilities
While
on company property
Your

company identification
badge must be properly
displayed and worn at all
times.

Your

company uniform (if


applicable) must be worn at
all times.

Properly secure and protect

your ID badge, uniform, keys


and access control card, etc.

VISITOR CONTROLS
Visitor Pre-meeting Requirements
Inform your visitor of the companys

visitor
policies
including
photo
identification,
check
in
with
receptionist prior to their visit.

Visitor Entrance Requirements


Ensure that your visitor has logged in

and has been issued a visitor badge

VISITOR CONTROLS
Visitor Escort Requirements
You
must escort your

visitors at ALL times


Do not leave your visitor
unattended

Visitor Exit Requirements


Ensure that your visitor has

logged
out
and
has
returned the visitor badge
to the guard or receptionist

VISITOR CONTROLS RECEPTIONIST


ONLY RESPONSIBILITIES

Visitor Entrance
Notify
hosting
employee
Visitor Exit
Collect
visitor
badge

Document
Check
arrival on
photo
Visitor Log
identification

Document
departure
on Visitor
Log

Issue
visitor
badge

Use colors and shapes of


you choosing.

QUESTIONS?

CONTAINER SECURITY
Inspection/storage of containers and seals
Employees should immediately report to their supervisors,
customs coordinator and plant manager any signs of:
Container (or trailer) damage;
Broken container (or trailer) seals;
Unauthorized personnel in container/trailer storage areas;
Paperwork discrepancies (unaccounted for cargo, missing cargo).

PHYSICAL SECURITY
Employees should immediately report:
Damage to exterior fencing, lighting and the building
structure;
Defective locking devices and signs of tampering or forcing
locks in the building or along the fence line;
Missing keys and access cards or the use of keys and cards by
unauthorized personnel;
Any damage to the alarm systems or video surveillance
systems.

PHYSICAL ACCESS CONTROLS


IMPORTANT AREA OF EMPLOYEE PARTICIPATION
Employees should know fellow co-workers and challenge
unauthorized personnel to identify themselves when seen on
the premises.
Employees should notify the head of security about ANY
unauthorized personnel on premises.
(follow reporting chain for each facility)

PHYSICAL ACCESS CONTROLS


(CONTD)
Employees must wear badges at all times and should

report cases where:

Visitors and delivery personnel are not wearing identifying

badges while on the facility premises


Any proposed break in procedure

I just need to drop something off. (follow reporting chain for each
facility)

PERSONNEL SECURITY
HR is responsible for verifying previous employment,

background checks, termination procedures


Remove access keys, cards, IT passwords
Follow all written procedures

Employees should immediately report if terminated

employees try to access the facility premises.


Most Wanted wall

PROCEDURAL SECURITY
Shipping employees must:
Inspect trailer before loading for any damage
7-point test, especially if trailer was in storage
Verify paperwork and seal number
Cargo integrity (correct quantity, weight, description)

Properly affix seal (or seals if multiple stops)


Report any signs of tampering or suspicious activity
Follow written procedures: keep logs updated

PROCEDURAL SECURITY
Receiving employees must:
Verify that cargo specifications match paperwork
Verify seal number
Check for exterior signs of tampering
After unloading, check interior for tampering
Report any signs of tampering or suspicious activity
Make sure container/trailer is properly reloaded or stored
Follow all written procedures: keep all logs updated

SECURITY AWARENESS FOR


GUARDS
First line of defense: the perimeter
Check for damage to facility, unauthorized entry of persons and vehicles
Report breaches IMMEDIATELY
Guards are responsible for verifying incoming and exiting trailers and containers
Paperwork (shipping or receiving)
Seals
Driver IDs
Visitors: ID and appointment checked before allowed to enter
Delivery drivers: ID and delivery approval before entry
Employees: ID required, survey employee parking, watch for terminated employees
Follow all written procedures; log all persons/vehicles

RECOGNIZING INTERNAL
CONSPIRACIES
Employees not in appropriate work spaces at

appropriate time

Example: assembly line personnel in warehouse

Excessive contact with outside personnel


Parking violations
- leaving vehicles in a restricted area
No employee parking permit displayed

Can you do me a favor?

SECURITY AWARENESS AND YOU


All COMPANY employees should participate in keeping

their part of the supply chain as strong as possible at


their facility.
Always be aware of potential security threats
Follow procedures
Report suspicious activity

Any Questions?

You might also like