SlideShare una empresa de Scribd logo
1 de 17
Emily Hubbart
Teresa Long
Charles Varghese
Jeff Wyatt
 Protruding

wires
 Strange odors
 Excessive tape or string
 Oily spots or
discolorations
 Ticking, sloshing or
buzzing sounds
 Excessive
size, weight, or
thickness

Source: Newstipster.com
 Lopsided

Source: slate.com

or uneven

envelope
 Powdery substance
felt through or
noticeable on outside
the package or
envelope
 Metallic components
or batteries
 Loose contents
 Marked

with restrictions

• Personal
• Confidential
• Do not x-ray
 Marked

with threatening or
abusive language
 Placed near ventilation
system
 Postmarked from a location
that does not match the
return address
 Excessive postage

Source: csoonline.com


Addressing Issues
• Misspelled words

• Mistyped or handwritten
•

•
•
•
•
•

addresses
Not addressed to a specific
person
Wrong titles or names
No or strange return
address
Unexpected point of origin
Cut-and-paste lettering
Missing postal stamp
cancellation marks

Source: Hawii.edu
 Chemical

Agents
 Biological Agents
 Explosive Devices
 Radiological Agents

Source: FBI




Includes biotoxins, nerve agents,
blister agents, caustic or corrosive
substances, organic solvents,
choking agents, metallic poisons,
incapacitating agents, etc.
Suspicious envelopes containing
ricin have been mailed to Public
officials
• Can be in the form of a powder, a

mist, a pellet, or it can be dissolved
in water or weak acid
• Death from ricin poisoning may
take place within 36 to 72 hours of
exposure, depending on route of
exposure (inhalation, ingestion, or
injection) and dose received

Source: WVEC.com
 Cause

illness,
disease, and death
• Anthrax
• Small Pox
• Virus

• Bacteria
• Rickettsiae
 Making

biological
weapons is a
complicated process

Source: expats.com


Homemade devices
designed to cause death
or injury that have:
•
•
•
•
•



A switch/trigger
An initiator (fuse)
Main charge (explosive fill)
A power source
A container

Use explosives alone or in
combination with toxic
chemicals, biological
toxins, or radiological
materials

Source: globalsecurity.org
Dirty Bombs or
radiological dispersal
devices (RDD), are
conventional explosives
packaged with
radioactive materials
 Injures or kills via the
initial blast of the
conventional
explosives, and by
airborne radiation
 Easily constructed


Source: SpaceWar.com


Unattended packages
can be found anywhere
• Mail Rooms
• Public buildings such as

•
•
•

•

libraries, churches, malls,
and schools
Government facilities
Near ventilation systems
Mass transit systems
Outside / public events

Source: Menupix.com
Mail rooms face the
biggest threat
 Protective Measures


• Employ professional security
•

•
•

•

personnel
Have security personnel
greet all employees and
visitors and examine their
personal belongings
Restrict access to the facility
to authorized users only
Keep detailed logs of visitor
arrivals and departures
Install an intrusion detection
system

Source: newpaltz.edu
Do
 Isolate

package immediately
 Place package or envelope on stable
surface
 WASH hands with soap and water
 Alert others
 Turn off fans or equipment that circulates air
 Evacuate / secure the area
 Notify appropriate persons or authorities
Don’t
 Use

radios or cellular phones near the
package
 Look closely at it
 Touch it
 Carry it
 Shake it
 Open it
 Empty it
 Taste it
 Smell it
 Show it to others














"Al Qaeda Actively Seeking Dirty Bombs: Documents." Spacewar.com. SpaceDaily, 2 Feb. 2011. Web. 26 May 2013.
<http://www.spacewar.com/reports/Al_Qaeda_actively_seeking_dirty_bombs_documents_999.html>.
Bhattacharjee, Yudhijit. "The Curse of the White Powder: How Fake Bioterrorism Attacks Became a Real Problem."
Slate Magazine. The Slate Group, 30 Jan. 2012. Web. 26 May 2013.
<http://www.slate.com/articles/health_and_science/science/2012/01/white_powder_hoaxes_a_trend_in_fake_terroris
m_.html>.
"Biological Threats and Bio - Terrorism." Biological Threats and Bio - Terrorism. N.p., 22 Feb. 2012. Web. 26 May
2013. <http://cjc.delaware.gov/terrorism/bio.shtml>.
"Campus Security & Emergency Management." Campus Security & Emergency Management. N.p., 7 Nov. 2011.
Web. 26 May 2013. <http://www.hawaii.edu/security/archives_files/category-uh-alerts.html>.
Canada. National Security Directorate. Suspicious Package Response Planning Guide. By So Licito R General
Canada. N.p.: n.p., 2003. Web. 26 May 2013.
<http://www.dps.mo.gov/homelandsecurity/safeschools/documents/Canadian%20Suspicious%20Package%20Guide.
pdf>.
"Capitol Hill Area." Capitol Hill Restaurants and Food. MenuPix, LLC, n.d. Web. 26 May 2013.
<http://www.menupix.com/dc/a/504/Capitol-Hill-restaurants>.
"Charges Dropped against Man in Ricin Letters Case." Wvec.com. WVEC Television, Inc., 23 Apr. 2013. Web. 26
May 2013. <http://www.wvec.com/news/Charges-dropped-against-man-in-ricin-letters-case-204366691.html>.
"Chemical Categories." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013.
<http://emergency.cdc.gov/agent/agentlistchem-category.asp>.
"Council on Foreign Relations." Council on Foreign Relations. Council on Foreign Relations, 19 Oct. 2006. Web. 26
May 2013. <http://www.cfr.org/weapons-of-terrorism/dirty-bombs/p9548>.
"Department of Safety & Homeland SecurityBill Gibbons, Commissioner." Department of Safety & Homeland
Security. Department of Safety, n.d. Web. 26 May 2013. <http://www.tn.gov/homelandsecurity/id_mail.shtml>.
Duffy, Daintry. "Suspicious Packages and Mailroom Security - Handle with Care." CSO. CXO Media Inc, 1 July 2004.
Web. 26 May 2013. <http://www.csoonline.com/article/219412/suspicious-packages-and-mailroom-security-handlewith-care>.














"Envelope with Suspect Powder Found in Malonne Convent." The Bulletin. The Bulletin, 16
Oct. 2012. Web. 26 May 2013. <http://www.xpats.com/envelope-suspect-powder-foundmalonne-convent>.
"Facts About Ricin." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May
2013. <http://www.bt.cdc.gov/agent/ricin/facts.asp>.
"How to Recognize and Handle a Suspicious Package or Envelope." CDC Anthrax. Center
for Disease Control and Protection, n.d. Web. 26 May 2013.
<http://www.bt.cdc.gov/agent/anthrax/mail/suspiciouspackages.asp>.
"Improvised Explosive Devices (IEDs) / Booby Traps." Improvised Explosive Devices (IEDs)
/ Booby Traps. Global Security, n.d. Web. 26 May 2013.
<http://www.globalsecurity.org/military/intro/ied.htm>.
"Mailroom Moved and Mail Backlog Cleared." News Pulse. News Pulse, 9 Sept. 2011. Web.
26 May 2013. <http://newspulse.newpaltz.edu/2011/09/09/mailroom-moved-and-mailbacklog-cleared/>.
"Personal Security in the Courts: Additional Threats in the Workplace." Personal Security in
the Courts: Additional Threats in the Workplace. Judicial Council of California Administrative
Office of the Courts, 2003. Web. 26 May 2013.
<http://www2.courtinfo.ca.gov/protem/courses/ct/personal_security/21_threats.htm>.
"Protect Your Workplace from Suspicious Packages." FBI. FBI, Sept. 2006. Web. 26 May
2013. <http://www.fbi.gov/news/stories/2006/september>.
United States. Homeland Security. Department of Homeland Security. Best Practices for
Safe Mail Handling. By Interagency Security Committee. N.p.: n.p., n.d. Web. 26 May 2013.

Más contenido relacionado

La actualidad más candente

Safety interview question &amp; answer
Safety interview question &amp; answerSafety interview question &amp; answer
Safety interview question &amp; answerSalim Solanki
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017brijesh singh
 
Awareness on housekeeping and safety measures in work place
Awareness on housekeeping and safety measures in work placeAwareness on housekeeping and safety measures in work place
Awareness on housekeeping and safety measures in work placeAditya raj sahu
 
Fire emergency preparedness
Fire emergency preparednessFire emergency preparedness
Fire emergency preparednessSivasuNedumaran
 
Security Officer Training Manual
Security Officer Training ManualSecurity Officer Training Manual
Security Officer Training ManualScott Warner
 
Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!davidhongwei
 
Emergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAEmergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAAtlantic Training, LLC.
 
Fire Risk Assessment.pdf
Fire Risk Assessment.pdfFire Risk Assessment.pdf
Fire Risk Assessment.pdfHSEXINYIPROJECT
 
Fire drill procedure
Fire drill procedureFire drill procedure
Fire drill procedureMaria Hidalgo
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANT
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANTELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANT
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANTBruce Vincent
 

La actualidad más candente (20)

Fire watch man training
Fire watch man trainingFire watch man training
Fire watch man training
 
Power tools safety
Power tools safetyPower tools safety
Power tools safety
 
Safety interview question &amp; answer
Safety interview question &amp; answerSafety interview question &amp; answer
Safety interview question &amp; answer
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017
 
Awareness on housekeeping and safety measures in work place
Awareness on housekeeping and safety measures in work placeAwareness on housekeeping and safety measures in work place
Awareness on housekeeping and safety measures in work place
 
Fire emergency preparedness
Fire emergency preparednessFire emergency preparedness
Fire emergency preparedness
 
Emergency Evacuation Training by UMES
Emergency Evacuation Training by UMESEmergency Evacuation Training by UMES
Emergency Evacuation Training by UMES
 
Security Officer Training Manual
Security Officer Training ManualSecurity Officer Training Manual
Security Officer Training Manual
 
Unit 6
Unit 6Unit 6
Unit 6
 
Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!Accident Investigation Training- Safety First!
Accident Investigation Training- Safety First!
 
Fire fighting course
Fire fighting courseFire fighting course
Fire fighting course
 
EMERGENCY RESPONSE PLAN
EMERGENCY RESPONSE PLANEMERGENCY RESPONSE PLAN
EMERGENCY RESPONSE PLAN
 
Lpg safety
Lpg safetyLpg safety
Lpg safety
 
Emergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSAEmergency Preparedness and Response Training by BCMSA
Emergency Preparedness and Response Training by BCMSA
 
Fire Risk Assessment.pdf
Fire Risk Assessment.pdfFire Risk Assessment.pdf
Fire Risk Assessment.pdf
 
Fire Drill
Fire DrillFire Drill
Fire Drill
 
SCHOOL FIRE SAFETY
SCHOOL FIRE SAFETYSCHOOL FIRE SAFETY
SCHOOL FIRE SAFETY
 
Fire drill procedure
Fire drill procedureFire drill procedure
Fire drill procedure
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANT
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANTELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANT
ELEVATOR RESCUE AWARENESS OSHA & ASME COMPLIANT
 

Más de Teresa Long

Beat the heat 2020
Beat the heat 2020Beat the heat 2020
Beat the heat 2020Teresa Long
 
Heat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS SolutionsHeat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS SolutionsTeresa Long
 
Introduction to confined spaces
Introduction to confined spacesIntroduction to confined spaces
Introduction to confined spacesTeresa Long
 
Noise and hearing loss prevention
Noise and hearing loss preventionNoise and hearing loss prevention
Noise and hearing loss preventionTeresa Long
 
Atmospheric Testing in Confined Spaces
Atmospheric Testing in Confined SpacesAtmospheric Testing in Confined Spaces
Atmospheric Testing in Confined SpacesTeresa Long
 
Chain of custody form
Chain of custody formChain of custody form
Chain of custody formTeresa Long
 
Collecting bacteria sample
Collecting bacteria sampleCollecting bacteria sample
Collecting bacteria sampleTeresa Long
 
Water quality in the galveston bay system
Water quality in the galveston bay systemWater quality in the galveston bay system
Water quality in the galveston bay systemTeresa Long
 
Bucket Elevator Poster
Bucket Elevator PosterBucket Elevator Poster
Bucket Elevator PosterTeresa Long
 
Fabrication Shop Ergonomics
Fabrication Shop ErgonomicsFabrication Shop Ergonomics
Fabrication Shop ErgonomicsTeresa Long
 
Ensuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case StudyEnsuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case StudyTeresa Long
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Employee Privacy vs. Patient Safety
Employee Privacy vs. Patient SafetyEmployee Privacy vs. Patient Safety
Employee Privacy vs. Patient SafetyTeresa Long
 
Slavery as a cause of the civil war
Slavery as a cause of the civil warSlavery as a cause of the civil war
Slavery as a cause of the civil warTeresa Long
 
Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?Teresa Long
 
Ensuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supplyEnsuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supplyTeresa Long
 
Smoking: Why Quit?
Smoking: Why Quit?Smoking: Why Quit?
Smoking: Why Quit?Teresa Long
 

Más de Teresa Long (20)

Beat the heat 2020
Beat the heat 2020Beat the heat 2020
Beat the heat 2020
 
Heat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS SolutionsHeat-Related Illnesses: Symptoms and First Aid--OHS Solutions
Heat-Related Illnesses: Symptoms and First Aid--OHS Solutions
 
Introduction to confined spaces
Introduction to confined spacesIntroduction to confined spaces
Introduction to confined spaces
 
Noise and hearing loss prevention
Noise and hearing loss preventionNoise and hearing loss prevention
Noise and hearing loss prevention
 
Atmospheric Testing in Confined Spaces
Atmospheric Testing in Confined SpacesAtmospheric Testing in Confined Spaces
Atmospheric Testing in Confined Spaces
 
Field refguide
Field refguideField refguide
Field refguide
 
Chain of custody form
Chain of custody formChain of custody form
Chain of custody form
 
Collecting bacteria sample
Collecting bacteria sampleCollecting bacteria sample
Collecting bacteria sample
 
Sop bacteria
Sop bacteriaSop bacteria
Sop bacteria
 
Water quality in the galveston bay system
Water quality in the galveston bay systemWater quality in the galveston bay system
Water quality in the galveston bay system
 
Bucket Elevator Poster
Bucket Elevator PosterBucket Elevator Poster
Bucket Elevator Poster
 
Fabrication Shop Ergonomics
Fabrication Shop ErgonomicsFabrication Shop Ergonomics
Fabrication Shop Ergonomics
 
Ensuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case StudyEnsuring a Safe, Sustainable Future Water Supply--Case Study
Ensuring a Safe, Sustainable Future Water Supply--Case Study
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Employee Privacy vs. Patient Safety
Employee Privacy vs. Patient SafetyEmployee Privacy vs. Patient Safety
Employee Privacy vs. Patient Safety
 
Slavery as a cause of the civil war
Slavery as a cause of the civil warSlavery as a cause of the civil war
Slavery as a cause of the civil war
 
Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?Total War: An Unnecessary Evil?
Total War: An Unnecessary Evil?
 
Ensuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supplyEnsuring a Safe Sustainable Future Water supply
Ensuring a Safe Sustainable Future Water supply
 
Bucket Elevator
Bucket ElevatorBucket Elevator
Bucket Elevator
 
Smoking: Why Quit?
Smoking: Why Quit?Smoking: Why Quit?
Smoking: Why Quit?
 

Último

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Workplace Security-Suspicious Package Protocol

  • 1. Emily Hubbart Teresa Long Charles Varghese Jeff Wyatt
  • 2.  Protruding wires  Strange odors  Excessive tape or string  Oily spots or discolorations  Ticking, sloshing or buzzing sounds  Excessive size, weight, or thickness Source: Newstipster.com
  • 3.  Lopsided Source: slate.com or uneven envelope  Powdery substance felt through or noticeable on outside the package or envelope  Metallic components or batteries  Loose contents
  • 4.  Marked with restrictions • Personal • Confidential • Do not x-ray  Marked with threatening or abusive language  Placed near ventilation system  Postmarked from a location that does not match the return address  Excessive postage Source: csoonline.com
  • 5.  Addressing Issues • Misspelled words • Mistyped or handwritten • • • • • • addresses Not addressed to a specific person Wrong titles or names No or strange return address Unexpected point of origin Cut-and-paste lettering Missing postal stamp cancellation marks Source: Hawii.edu
  • 6.
  • 7.  Chemical Agents  Biological Agents  Explosive Devices  Radiological Agents Source: FBI
  • 8.   Includes biotoxins, nerve agents, blister agents, caustic or corrosive substances, organic solvents, choking agents, metallic poisons, incapacitating agents, etc. Suspicious envelopes containing ricin have been mailed to Public officials • Can be in the form of a powder, a mist, a pellet, or it can be dissolved in water or weak acid • Death from ricin poisoning may take place within 36 to 72 hours of exposure, depending on route of exposure (inhalation, ingestion, or injection) and dose received Source: WVEC.com
  • 9.  Cause illness, disease, and death • Anthrax • Small Pox • Virus • Bacteria • Rickettsiae  Making biological weapons is a complicated process Source: expats.com
  • 10.  Homemade devices designed to cause death or injury that have: • • • • •  A switch/trigger An initiator (fuse) Main charge (explosive fill) A power source A container Use explosives alone or in combination with toxic chemicals, biological toxins, or radiological materials Source: globalsecurity.org
  • 11. Dirty Bombs or radiological dispersal devices (RDD), are conventional explosives packaged with radioactive materials  Injures or kills via the initial blast of the conventional explosives, and by airborne radiation  Easily constructed  Source: SpaceWar.com
  • 12.  Unattended packages can be found anywhere • Mail Rooms • Public buildings such as • • • • libraries, churches, malls, and schools Government facilities Near ventilation systems Mass transit systems Outside / public events Source: Menupix.com
  • 13. Mail rooms face the biggest threat  Protective Measures  • Employ professional security • • • • personnel Have security personnel greet all employees and visitors and examine their personal belongings Restrict access to the facility to authorized users only Keep detailed logs of visitor arrivals and departures Install an intrusion detection system Source: newpaltz.edu
  • 14. Do  Isolate package immediately  Place package or envelope on stable surface  WASH hands with soap and water  Alert others  Turn off fans or equipment that circulates air  Evacuate / secure the area  Notify appropriate persons or authorities
  • 15. Don’t  Use radios or cellular phones near the package  Look closely at it  Touch it  Carry it  Shake it  Open it  Empty it  Taste it  Smell it  Show it to others
  • 16.            "Al Qaeda Actively Seeking Dirty Bombs: Documents." Spacewar.com. SpaceDaily, 2 Feb. 2011. Web. 26 May 2013. <http://www.spacewar.com/reports/Al_Qaeda_actively_seeking_dirty_bombs_documents_999.html>. Bhattacharjee, Yudhijit. "The Curse of the White Powder: How Fake Bioterrorism Attacks Became a Real Problem." Slate Magazine. The Slate Group, 30 Jan. 2012. Web. 26 May 2013. <http://www.slate.com/articles/health_and_science/science/2012/01/white_powder_hoaxes_a_trend_in_fake_terroris m_.html>. "Biological Threats and Bio - Terrorism." Biological Threats and Bio - Terrorism. N.p., 22 Feb. 2012. Web. 26 May 2013. <http://cjc.delaware.gov/terrorism/bio.shtml>. "Campus Security & Emergency Management." Campus Security & Emergency Management. N.p., 7 Nov. 2011. Web. 26 May 2013. <http://www.hawaii.edu/security/archives_files/category-uh-alerts.html>. Canada. National Security Directorate. Suspicious Package Response Planning Guide. By So Licito R General Canada. N.p.: n.p., 2003. Web. 26 May 2013. <http://www.dps.mo.gov/homelandsecurity/safeschools/documents/Canadian%20Suspicious%20Package%20Guide. pdf>. "Capitol Hill Area." Capitol Hill Restaurants and Food. MenuPix, LLC, n.d. Web. 26 May 2013. <http://www.menupix.com/dc/a/504/Capitol-Hill-restaurants>. "Charges Dropped against Man in Ricin Letters Case." Wvec.com. WVEC Television, Inc., 23 Apr. 2013. Web. 26 May 2013. <http://www.wvec.com/news/Charges-dropped-against-man-in-ricin-letters-case-204366691.html>. "Chemical Categories." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013. <http://emergency.cdc.gov/agent/agentlistchem-category.asp>. "Council on Foreign Relations." Council on Foreign Relations. Council on Foreign Relations, 19 Oct. 2006. Web. 26 May 2013. <http://www.cfr.org/weapons-of-terrorism/dirty-bombs/p9548>. "Department of Safety & Homeland SecurityBill Gibbons, Commissioner." Department of Safety & Homeland Security. Department of Safety, n.d. Web. 26 May 2013. <http://www.tn.gov/homelandsecurity/id_mail.shtml>. Duffy, Daintry. "Suspicious Packages and Mailroom Security - Handle with Care." CSO. CXO Media Inc, 1 July 2004. Web. 26 May 2013. <http://www.csoonline.com/article/219412/suspicious-packages-and-mailroom-security-handlewith-care>.
  • 17.         "Envelope with Suspect Powder Found in Malonne Convent." The Bulletin. The Bulletin, 16 Oct. 2012. Web. 26 May 2013. <http://www.xpats.com/envelope-suspect-powder-foundmalonne-convent>. "Facts About Ricin." CDC. Centers for Disease Control and Prevention, n.d. Web. 26 May 2013. <http://www.bt.cdc.gov/agent/ricin/facts.asp>. "How to Recognize and Handle a Suspicious Package or Envelope." CDC Anthrax. Center for Disease Control and Protection, n.d. Web. 26 May 2013. <http://www.bt.cdc.gov/agent/anthrax/mail/suspiciouspackages.asp>. "Improvised Explosive Devices (IEDs) / Booby Traps." Improvised Explosive Devices (IEDs) / Booby Traps. Global Security, n.d. Web. 26 May 2013. <http://www.globalsecurity.org/military/intro/ied.htm>. "Mailroom Moved and Mail Backlog Cleared." News Pulse. News Pulse, 9 Sept. 2011. Web. 26 May 2013. <http://newspulse.newpaltz.edu/2011/09/09/mailroom-moved-and-mailbacklog-cleared/>. "Personal Security in the Courts: Additional Threats in the Workplace." Personal Security in the Courts: Additional Threats in the Workplace. Judicial Council of California Administrative Office of the Courts, 2003. Web. 26 May 2013. <http://www2.courtinfo.ca.gov/protem/courses/ct/personal_security/21_threats.htm>. "Protect Your Workplace from Suspicious Packages." FBI. FBI, Sept. 2006. Web. 26 May 2013. <http://www.fbi.gov/news/stories/2006/september>. United States. Homeland Security. Department of Homeland Security. Best Practices for Safe Mail Handling. By Interagency Security Committee. N.p.: n.p., n.d. Web. 26 May 2013.