Monday, September 28, 2009

Bomb Threat


The objective of this report is to help you develop an awareness of potential threats.

We definitely do not want to provide any information that may encourage you to take any unnecessary risk once you have developed an awareness of potential threats and have identified a potential threat. In addition, we do not want to provide any information in this report that may be used by any unauthorized persons who have obtained this report thinking they were going to learn how to make a bomb or that we were going to identify counter-measurers for a variety of explosive devices. Our objective is to help you develop an awareness of potential threats so you can move to a safe area, call law enforcement and let them deal with the threat.


We use the word “bomb” in this report to describe any type of explosive device which could include anything from a stick of dynamite to a hand grenade. In addition, we use the word “terrorist” to describe your enemy. If someone sends you a bomb or calls and makes a threat against you, he or she is a terrorist and it doesn’t matter if they are physically located in another country or your next door neighbor. Of course the term bomb can apply to any type of improvised explosive devices (IED) that could include a variety of explosive chemicals from gunpowder in a pipe bomb to RDX (Cyclotrimethylenetrinitramine) which was recently used by a woman in Jordan in a failed suicide bomb attack. The internet is full of sites that claim to tell people how to make explosive devices from a variety of components including household chemicals. In the past, the government offered detailed reports on explosives through a variety of government agencies including the ATF. They have since removed that content from their websites in an attempt to avoid being part of the problem rather than part of the solution.

In our speaking engagements, we would typically take a display of dummy improvised explosive devices ranging from sticks of dynamite with mercury switches and timing devices to a soda can cut out to conceal plastic explosives and an igniter as well as a text book that had been hollowed out to conceal either a weapon or explosive device. In our last presentation at a graduate school in Houston, we used a typical demonstration to make a point of our theme which was awareness. We placed a gym bag at the end of the first row in the classroom and of course everyone came in and no one paid attention to unattended bag even though they are constantly hearing on television about being suspicious of unattended bags in airports. Apparently they have been conditioned to believe that this type of threat only exist in airports. We ask one of the students to pass the bag up to the stage and of course once the bag was moved, an alarm went off since we had rigged it with a mercury switch to trigger the alarm when the bag was moved. Once we opened the bag and displayed several sticks of dynamite with wires, batteries, and digital timers, the students were ready to listed to the concept of awareness.

We understand that it is impossible for us to explain every possible scenario that may be developed by your enemy and that is not our intention. Our intention is to assist you in developing a sense of awareness of something that just doesn’t look, feel, or smell right. Fortunately, we as humans have developed a set of early warning systems we are not even aware of. As an example, we know that bank tellers are better prepared to identify counterfeit money than the average person in another profession. This is not because they have years of training in detecting a variety of inks and papers and the various types of printing operations. The reason they are better at spotting counterfeit money is that they touch money constantly every day. They know what real money feels like and since paper is the weak link in the counterfeit process, this is where a lot of counterfeit money is detected by touch.

We have all developed a very sophisticated set of early warning sensors based on past learned experiences that are constantly running in the back of our mind much like a lot of the programs that are running on your computer that you are never aware of. In reality they are just experiences that you have forgotten about based on your past experiences much like the experiences learned by bank tellers in handling money day in and day out 365 days a year.

Our objective is to make you aware of your best defense which is your own learned experiences. If you notice something that just doesn’t look, smell or feel right, this is your learned early warning system telling you something is wrong. Don’t ignore it!

In the following example we are going to give you some warning signs that could be present in a suspicious letter or package. This is a typical example offered by a variety sources but in addition to offering some good advice if handling suspicious envelopes or packages, it assist in accomplishing our objective which is to make you aware of anything that could be a possible threat. The principles and thought process used in the following Letter & Parcel Bomb Guide can be used for any suspicious situations in the office or parking area of your workplace.

Letter & Parcel Bomb Guide

Some mail devices may be recognized by visual inspection. Mail han¬dling personnel should be alert to a number of recognition clues, the most common of which are detailed below.

Place of Origin: Note the postmark. This may be from a country direct¬ing a terrorist campaign or from an area associated with postal bombs. In addition if you have had a telephone threat (see following threat guide) from a specific region this should be noticed. If the arrival of such mail is uncommon and unexpected, it should be treated as suspect.

Senders Writing: Mail should be treated with caution if it features a foreign style of writing, not normally received, on the address. In addition if you have received any earlier written threats with a similar recognizable style of writing or printing, this should be considered. Any type of distinctive shipping label should be considered. If you are used to receiving professional packages with professional shipping labels, be suspicious of handwritten labels.

Excessive Postage: Mail with excessive postage and no return address should be viewed with caution. In addition, the package may contain excessive postage due to the fact that excessively heavy material is enclosed such as a pipe bomb with nails etc., or because the sender wants to assure that the package will not be stopped for any reason. The Post Office requires that packages over 1 pound be delivered to a Post Office and not left in pick-up boxes. This new rule can easily be circumvented by a terrorist and serves as no real deterrent to a terrorist. It has about the same deterrent value as taking away nail clippers at the airports.

Balance: A letter or package should be treated as suspect if it is unbalanced, has loose con¬tents, or is heavier on one side than the other. This may indicate metal objects on one side used a shrapnel with lighter timing and explosive elements on the other side.

Weight: If a package or letter seems excessively heavy for its volume, it should be treated as suspect. A package could be relative light and contain very powerful plastic explosives with sophisticated digital timing and trigger devices however most bombs of this type contain elements that are readily available such as steel pipes and other heavy metals to increase the destructive effects of the device.

Feel: If an envelope has any feeling of springiness at the top, bottom, or sides, but does not bend or flex, be careful, this is a key sign of an explosive device that could contain a simple spring trigger that when the envelope is opened, the spring triggers the connection to the device. Warning- examine mail gently!

Protruding Wires: Mail devices are often loosened or damaged by rough handling. It is possible that a fuse, electrical wire, or connection may become loose and penetrate the wrapping or the envelope. Any such device is unstable and highly dangerous. This sounds like a simple and obvious warning but when people are busy as would be the case in a corporate mail room or thinking about some personal event in their life, they can easily disregard what would appear to be the obvious.

Holes in the Envelope or Wrapping: An explosive mail device that has been handled roughly may show wire or spring holes in its outer wrapping. This could be the result of unprofessional packaging by an individual. This, by itself or in combination with the other clues described, should alert mail handlers to a suspect device.

Grease Marks: Certain types of explosives leave greasy black marks on paper, a good indica¬tion of a suspect device. It can also mean that the explosive device has become old and unstable, making it extremely dangerous. Some types of explosive chemicals leak with age.

Smell: A smell suggestive of almonds or marzipan, or any other strange smell, including shoe polish is an indication of a suspect device. As explained earlier, you should learn to rely on all of your senses to detect anything that appears out of place.

Un-requested Deliveries: Un-requested deliveries, especially packages, should be screened and treated with caution. A book or thick brochure discovered upon opening a delivery should be reported to the security department or examined for any of the above clues. Any mail which raises the slightest suspicion should not be handled. If the package contains a return address with the name of the sender, they can easily be contacted to determine the contents. If it does not, this is another warning sign.

Suspicious Packaging: If an envelope is taped down all around, instead of having a normal opening flap, it may contain a booby trap spring. Such letters should be handled very carefully and treated as suspect. As explained earlier, simple wire springs are lightweight and make effective trigger devices.

Letter Stiffness: Gentle handling can reveal whether an envelope contains folded paper or a device. The presence of stiff cardboard, metal or plastic should alert the handler to a possible suspect device.

Inner Enclosures: If, after opening a letter or package, the mail handler encounters an inner sealed enclosure whether or not it fits any of the above descriptions—the item should be treated as suspect. As explained earlier, these guidelines have been provided by government agencies for years and anyone could clearly develop a parcel bomb to overcome the exterior warning signs mentioned above but at some point the device has to be included in the package and being aware of anything suspicious or out of the ordinary could be a key defense.

The terrorist is counting on human nature to help him get through your defenses. He is counting on you being to busy to pay close attention to what he has done or he is counting on you to thinking about some personal even in your life that distracts you from paying attention to what he is trying to accomplish. You can use your highly developed built in early warning system to detect something that just seems out of place if you pay attention to your own senses of what is just doesn’t seem right.

TELEPHONE THREATS

Telephone Threats are serious because they in themselves cause psychological and emotional distress on the person who receives the call. The objective of the terrorist is to terrorize and disrupt your life. A terrorist threat could be anything from a disgruntled former employee who simply wants to vent some anger with no intention of actually causing a death to a true fanatic who not only wants to kill you, he or she wants you to know it in advance so as to increase both the psychological and physical effects of his or her actions.

One way to minimize the psychological effects of receiving a terrorist threat is to be prepared and anticipate it. They when it comes to treat it as a professional exercise so you can remain calm and use it as an opportunity to collect information about the caller. In addition to remaining calm and being professional in your responses, you deny the caller of one element of his plan which is to cause you to panic and become emotional.

As mentioned earlier, we use the term terrorist to apply to anyone who threatens to cause you or anyone you know physical or emotional harm. A terrorist could be a radical in another country who object to your corporate presence in his country or it could be a former employee of your company who has a grudge against you personally or the company. A terrorist could have a political, financial, ideological, religious, or even personal motive. If you can be professional and collect enough information from the call, the professionals in law enforcement can have a better chance to determine the real motive of the caller and as such aid in a possible apprehension. As an example, if you are kidnapped in a part of the world for financial motives, you have a better chance of being released than if you are kidnapped in another part of the world by a radical extremist who want to make point. Your objective is to remain calm and professional and collect as much information as possible so as to give the authorities an opportunity to establish the real motive.

The following Telephone Threat Report is designed to give you an opportunity to systematically and professionally documents everything about the call so that when the event has ended, you can better be prepared to assist the authorities in their investigation. This is only a suggested format and you may find it helpful to expand upon it to include topics specific to your particular situation. Ideally, you could have this or some other similar form available in your computer so if you receive such a call, you could easily access it with the click of the mouse. Again, the format is not important as long as you have a systematic method of documenting key elements of the call. The caller is not going to expect you to be calm and ask certain questions. You may be surprised at how willing he is to answer some of your questions. A recording device is a valuable tool but the key element is your professional response and interaction with the caller to key questions. Some callers have been so caught off guard that they inadvertently divulged important information that led to their apprehension.

Telephone Threat Report

Describe Exact Wording of the Threat:

Describe The Caller

Date of Call:

Time of Call:

Sex of Caller:

Age of Caller:

Race of Caller:

Nationality of Caller:

Any Other Comments:

Describe Caller's Voice

Calm Angry Excited

Slow Rapid Soft

Loud Laughter Crying

Normal Distinct Slurred

Nasal Stutter Lisp

Raspy Deep Ragged

Clearing Throat Deep Breathing Cracking Voice

Disguised Accent Familiar

Incoherent Irrational Reading Script

If voice is familiar, who did it sound like?

Background Sounds

Street Noises Crockery Voices

PA Systems Music House Noises

Motor Noises Office Machinery Construction Work

Questions To Ask:

When is the bomb going to explode?

Where is it right now?

What does it look like?

What kind of bomb is it?

What will cause it to explode?

Did you place the bomb?

Why?

What is your address?

What is your name?

Where are you calling from?

Is this a prank?

How do I know this is not a prank?

If a Hostage Situation, May I talk to Hostage?

If a Hostage Situation, Is the Hostage all right?

If a hostage situation, What do you want?

Will you call back in 15 Minutes?

How can I contact you if I have trouble meeting your demands?

Professional Comments & Reviews

"I appreciate your thoughtfulness, and it will be an honor to add your book to my personal library. I have had the opportunity to peruse it, and I look forward to reading it at length in the very near future. Semper Fidelis"

James L. Jones
General, U.S. Marine Corps
Commandant of the Marine Corps
National Security Advisor


"Thank you for sending me a copy of the security manual The Corporate Executive Survival Guide - International Operations. Your thoughtfulness during this great transition in democracy is inspiring."

John Ashcroft
United States Attorney General


"One of my users has purchased a copy of your Terrorist Groups - Profiles and Tactics resource. He has requested that the library make this available on our agency intranet, which is accessible to all NSA / CSS personnel".

Sallie Becker, Agency Librarian
National Security Agency



"In my past work as an Intelligence Analyst, and journalist, I have found your products to be helpful and exciting."

Krysta Davies
Intelligence Analyst



"It is my sincere wish that you enjoyed viewing the amphibious assault and all other related activities. Enclosed is a video memento of your participation in Amphibious Orientation Training 1996."

J. E. Ward
Brigadier General
U.S. Marine Corps Reserve



"This etching of the Iwo Jima flag raising is presented with our sincere appreciation for your outstanding support. Your loyalty and dedication is living testimony that "Once a Marine, always a Marine, Semper Fidelis"

Major M.D. Becker, Commanding
United States Marine Corps



Mr. Doyle: "I have forwarded your martial arts training videos to our Marine Security Guard School in Quantico." "I want to thank you for being our guest speaker and the troops have been informed that you are a "Marines Marine".

Gilberto Tores, Master Sergeant
United States Marine Corps



"On more than one occasion, Mr. Doyle provided invaluable assistance to me in overcoming delays that would have seriously impaired my ability to respond to in-kingdom problems."

Mr. P. J. Hillestad, Contracting Officer, U.S. Air Force
Peace Shield Program, Saudi Arabia


"The class truly enjoyed meeting you and learning from your thorough presentation. A week later, everybody asked me for a copy of the outline of your book that you left behind. I sincerely thank you for coming to speak to my class."

Zlatica I. Kralijevic, Professor - International Business
University of Houston - Graduate School



"Subsequent to last year's traumatic events on September 11th, your book will indisputably serve as a resource guide to our entire staff of security professionals. Thank you for keeping our city in your thoughts; I will share your book with my staff"

Lee P. Brown
Mayor, City of Houston



"I have thoroughly enjoyed reading the materials you sent me; and expect to refer to them for some time to come."

Dr. Ian Q. R. Thomas, author of "The Promise of Alliance - NATO and the Political Imagination"


"Your remarks are most encouraging and we are grateful to you for recognizing our efforts as you did. Please convey our thanks to your family as well. It is a pleasure to enclose one of my photographs which I have autographed for you."

Clarence M. Kelley, Director
Federal Bureau of Investigation



"In honor of The Director, Federal Bureau of Investigation The Honorable Louis J. Freeh, The Assistant Commandant of the Marine Corps and Mrs. Neal request the pleasure of your company at an Evening Parade on Friday, the twenty-fifth of July, Marine Barracks, Washington, D.C."

General Richard I. Neal, USMC
Assistant Commandant of the Marine Corps



"Mr. Doyle has worked on the Peace Shield Program with the Kingdom of Saudi Arabia for many years. Mr. Doyle is known for his professionalism and integrity."

Fawaz A. Kayal, Consul General
Royal Kingdom of Saudi Arabia



"We are satisfied with the success of your meeting with His Royal Highness, the Prince." "We truely believe that Mr. James Doyle, President of INTERCORP, has done a wonderful job for all of us in bringing our mutual interest together".

Sheikh Abdul Karim Al Sadoun
Al Eirad Trading & Contracting Co.


Following is the text from an official Saudi Embassy Christmas Card: "Best Wishes for a happy Christmas and a prosperous New Year." "So peace is on me the day I was born, the day that I die and the day that I shall be brought forth alive again. Such was Jesus son of Mary...","Surat Maryam, Holy Quran"

Mohamed R.Abu Al-Hamayel
Head of Consular Section
Royal Embassy Of Saudi Arabia
Washington, D.C.


"Mr. Doyle has a clear understanding of international business operations and related security considerations in Latin America."

Sergio A. Lopez, Director
America Hispania Magazine



"Thank you very much for your comments in the article regarding the kidnapping of Mr. Konno of Sanyo Video Components (USA) Corp which was carried in The Nikkei Weekly's Aug. 19 edition." We are sending you a copy of the article containing your comments.

Joshua Ogawa, Staff Writer
The Nikkei Weekly, Tokyo, Japan



Dear Mr. Doyle: " I would like to thank you for your contributions to and participation in the F.B. I., A.N.S.I.R. program."

Ed Shaw, Special Agent
F.B.I., Houston Division



"Dear Mr. Doyle: On behalf of the Diplomatic Security Service, U.S. Department of State, I would like to welcome you to the Overseas Security Advisory Council."

Tim Haley
Special Agent in Charge
Diplomatic Security Service
U.S. Department Of State