|
|
|
|
| ||||||||
Printer Friendly | |||||||||
MAIL CENTER SECURITY
ADDRESSING WEAPONS OF MASS DESTRUCTION, THREATS, AND MAIL BOMBS PRESENTED BY UNITED STATES POSTAL INSPECTION SERVICE DECEMBER 2001 MAIL CENTER SECURITY AWARENESS The mail room is the focal point for businesses and government agencies and is often the most overlooked when applying security policies and procedures. A comprehensive and effective mail room security program should include policies and procedures to reduce risks and losses. This handbook highlights recommended security awareness related to Biological, Chemical, and Radiological Threats (including Anthrax) and Mail Bombs. Security is extremely important to mail room operations both large and small. Lack of security can result in theft of supplies, postage, mail, and valuable information about your business contained in sensitive mail. When reviewing your mail center policies and procedures, the word is Prevention. BIOLOGICAL AND CHEMICAL THREATS: Federal Criminal Code defines weapons of mass destruction as:
ANTHRAX I. HOW LIKELY IS IT THAT SOMEONE WOULD RECEIVE A HARMFUL BIOLOGICAL OR CHEMICAL AGENT IN THE MAIL? The Postal Service delivers approximately 208 billion pieces of mail per year. Presently, there have been a relatively small number of suspected incidents of anthrax bacteria being sent through the mail. II. HOW OFTEN DO THESE THREATS AND HOAXES OCCUR? During FY 1999 and FY 2000, there were approximately 178 anthrax threats received at courthouses, reproductive health service providers (clinics offering abortion services or counseling), churches, schools, and post offices. During FY 2001 we have had only approximately 60 threats or hoaxes, which included anthrax, hoof and mouth disease, the Klingerman virus hoax, and others. Chemical and biological weapons are sometimes referred to as the "poor man's nuclear weapons" and pose a significant threat in the post-Cold War environment. The relative low cost and simplicity of design and technology make them weapons of choice for a variety of rogue states and terrorist and non-state organizations. Although acts of chemical and biological terrorism have not been prevalent in the U.S. up to now, use of these weapons or the threat of their use are disruptive forces. The Federal Bureau of Investigation (FBI) has been designated as the lead Federal Agency for crisis management in all acts of terrorism and uses or threats of harmful biological or chemical weapons. III. WHAT SHOULD I DO IF I RECEIVE A SUSPECT ANTHRAX THREAT BY MAIL?
IV. WHAT IS ANTHRAX? Anthrax is a bacterial, zoonotic disease caused by Bacillus Anthracis. Anthrax occurs in domesticated and wild animals, including goats, sheep, cattle, horses, and deer. The skin form of the disease may be contracted by handling contaminated hair, wool, hides, flesh, blood or excreta of infected animals and from manufactured products such as bone meal. Infection is introduced through scratches or abrasions of the skin, wounds, inhalation of spores, eating insufficiently cooked infected meat or from flies. The spores are very stable and may remain viable for many years in soil and water. They will resist sunlight for varying periods. V. WHAT ARE THE SYMPTOMS AND EFFECTS OF ANTHRAX? After an incubation period of 1-7 days, the onset of inhalation anthrax is gradual. Possible symptoms include:
This mild illness can progress rapidly to respiratory distress and shock in 2-4 days followed by a range of more severe symptoms, including breathing difficulty and exhaustion. Death usually occurs within 24 hours of respiratory distress. VI. WHAT ARE THE CLINICAL FEATURES OF ANTHRAX? Anthrax is an acute bacterial infection of the skin, lungs, or gastrointestinal tract. Infection occurs most commonly via the skin. The cutaneous or skin form occurs most frequently on the hands and forearms of persons working with infected livestock or contaminated animal products and represents 95% of cases of human anthrax. It is initially characterized by a small solid elevation of the skin, which progresses to a fluid filled blister with swelling at the site of infection. The scab that typically forms over the lesion can be black as coal, hence the name anthrax - Greek for coal. With treatment, the case fatality rate is less than 1% among people who get the skin form of the disease. The fatality rate for untreated inhaled or intestinal anthrax is over 90%. The inhaled form of anthrax is contracted by inhalation of the spores, occurs mainly among workers handling infected animal hides, wool, and furs. Under natural conditions, inhaled anthrax is exceedingly rare, with only 18 cases reported in the United States in the 20th century. VII. WHAT IS THE TREATMENT FOR ANTHRAX? Treatment with antibiotics beginning one day after exposure has been shown to provide significant protection against death in tests with monkeys, especially when combined with active immunization. Penicillin, doxycycline, ciproflaxin, are all effective against most strains of the disease. Penicillin is the drug of choice for naturally occurring anthrax. If untreated, inhaled anthrax is fatal. A vaccine is available and consists of a series of 6 doses over 18 months with yearly boosters. This vaccine, while known to protect against anthrax acquired through the skin, is also believed to be effective against inhaled spores. Effective decontamination can be accomplished by boiling contaminated articles in water for 30 minutes or longer and using some of the common disinfectants. Chlorine is effective in destroying spores and vegetative cells. Remember, anthrax spores are stable, able to resist sunlight for several hours and able to remain alive in soil and water for years. VIII. WHAT CONSTITUTES A SUSPICIOUS LETTER OR PARCEL? Some typical characteristics which ought to trigger suspicion include letters or parcels that:
IX. WHAT SHOULD I DO IF I'VE RECEIVED A SUSPICIOUS LETTER OR PARCEL IN THE MAIL?
X. HOW CAN I LIMIT PHYSICAL EXPOSURE OF THE MAIL ROOM TO SUSPECT ANTHRAX MAILINGS?
XI. ADDITIONAL RESOURCES: The Federal Bureau of Investigation (FBI) is the lead Federal agency for crisis management for all acts of terrorism and in all threats or incidents of WMD. The FBI will coordinate the Federal Government's efforts to prepare the nation's response community for threats involving Weapons of Mass Destruction (WMD). The WMD Unit works in conjunction with other Federal, State, and Local Crisis Managers specific to WMD and will perform an Interagency Threat Assessment. If a threat is received, please contact your local FBI office, FBI Special Information Operations Center (SIOC). Their Web site is http://fbi.gov. The Centers for Disease Control and Prevention (CDC) is responsible for coordinating all public health and would be contacted at the Emergency Preparedness and Response Branch, National Center for Environmental Health to report an incident at 770-488-7100. Their Web site is http://cdc.gov. MAIL BOMB SCREENING AND DETECTION: PLANNING YOUR RESPONSE I. WHAT ARE THE CHANCES OF MY FIRM RECEIVING A MAIL BOMB? The chances of your firm receiving a mail bomb are extremely remote. The chances are considerably greater of receiving a telephoned bomb threat or finding a suspicious and potentially harmful device placed at your office or on your property. The number of instances over the last six years has been minimal. By comparison, the U. S. Postal Service safely delivers five hundred million letters and packages every day. The key is to have a comprehensive bomb threat response plan to deal with mail bombs, bomb threats, and suspicious placed devices. When properly planned and implemented, a bomb threat response plan will prevent any such incident from creating panic among your workforce or inflicting physical harm to your employees or facilities. Postal inspectors are the experts in mail bomb detection and investigation. We offer the following suggestions to help you formulate a comprehensive bomb threat response plan that addresses bomb threats and placed devices. We also offer a ten-step mail bomb screening program to help your mail center personnel detect suspicious devices in the U.S. mail or delivered by private courier. II. HOW VULNERABLE IS MY FIRM? The vulnerability of you and your firm depend on a variety of factors - both internal and external. Experience has shown that no individual or organization is completely immune from attack. A sound assessment of your vulnerability is critical to the preparation of a bomb threat response plan. Consider the following possible sources of danger in evaluating your firm's vulnerability:
Positive answers to any of these questions will help you and your security manager identify potential sources of bombs or bomb threats. III. WHAT MOTIVATES PEOPLE TO SEND MAIL BOMBS? There is a popular stereotype of the typical mail bomber as a person motivated by radical political beliefs. This stereotype is incorrect and it may cause your organization to improperly assess and respond to existing threats. Law enforcement authorities find that revenge is the motivation which most often "triggers" a mail bomb or bomb threat. Jilted spouses or lovers may seek revenge when their romantic involvement is finished. Former business partners or employees may seek revenge when a business relationship goes sour, or business reversals cause layoffs or firings. Law enforcement officers and members of the judiciary have been targeted for bombs and bomb threats by individuals seeking revenge that have been investigated or prosecuted. Postal inspectors have found that mail bombs generally target specific individuals. Placed devices, however, are generally intended to disrupt organizations and injure indiscriminately. Bomb threats may target either individuals or organizations. IV. HOW CAN I DETERMINE IF SECURITY PRECAUTIONS AT MY FIRM ARE ADEQUATE? Good question! Your bomb threat response plan should be part of an overall corporate security program, addressing all personnel and physical security issues. If no such plan exists, your firm must appoint individuals from corporate management and security to formulate the bomb threat response plan. Postal inspectors recommend including the mail center manager, or a designee, in the planning group because that person, as Mail Center Security Coordinator, will be responsible for the mail bomb-screening program. Command Center Organization Representatives from corporate management, security and the mail center should form the nucleus of a Command Center working group to deal with any emergency where bombs or bomb threats must be confronted. Members of the Command Center working group, and their alternates, should be specified by name and title. Most importantly, Command Center members should have authority to make important decisions as to how the firm will respond to any bomb threat situation, including evacuation of company facilities. The Command Center must be at or near the communications center of the firm. The Command Center should be equipped with telephone numbers for police, postal inspectors, the Bureau of Alcohol, Tobacco and Firearms (BATF), the fire department, and emergency medical services. An employee roster with all current telephone numbers, including home, office, pagers, and cellular telephones should be maintained. Current copies of the firms' floor plans or building blueprints are also of critical importance. Preparation should include planning for evacuation routes and alternates, easily adapted from fire escape routes, and evacuation signals. Evacuation routes should be furnished to all supervisors. However, we recommend fire alarms not be used to signal an emergency bomb response evacuation. The possibility exists that a bomber would target routes, such as stairwells and/or emergency exits, normally used during an evacuation due to a fire alarm. Your local police and fire departments should be contacted about their respective bomb search policies. In the event of a threat, will they help conduct the search? If so, what will they need from your Command Center? The bomb threat response plan must include provisions to ensure that non-postal deliveries (except commercial shipments) are channeled through the mail center. Since all organizations receive mail and other parcel deliveries, a mail bomb-screening program through which all parcel deliveries are channeled is an essential component of this process. By the same token, telephone threats received by company receptionists, or others, should be brought to the attention of the security officer and then relayed to the mail center manager, who needs to be informed of any specific information which would assist the mail bomb screening process. Lastly, the bomb threat response plan should encompass all facilities at the site, including outbuildings, and parking lots or garages immediately adjacent to buildings occupied by employees. If the firm maintains offices at multiple sites, security officers at each site must be included in the communications loop. Postal inspectors highly recommend consultations with security experts knowledgeable in terrorist tactics and vulnerability assessment. V. WHAT ABOUT THE DANGER OF BOMBS PLACED AT OUR OFFICE? Since the majority of explosive devices are placed, not mailed, it is imperative that your security plan includes sound controls over those that can physically gain access and move about your facility and the immediate surroundings. Such steps can reduce much of your risk. Physical Security Consider the following suggestions:
VI. WHAT ABOUT BOMB THREATS? Your firm's bomb threat response plan must address the possibility of receiving bomb threats in writing or by telephone. While all threats should be taken seriously, your firm's response may depend on the circumstances present at any given time. Each bomb threat presents three basic options:
A fourth option, to ignore the threat, is not generally considered viable. If the company policy is to evacuate all employees and shut down operations when any threat is received, this will probably result in false alarms placed by employees anxious to exploit the policy. It is better to judge the credibility of each threat individually. The decision to evacuate all or part of the facility should be made by the command center-working group. Whatever the policy, it should not be publicized. Written threats provide physical evidence which must be protected from contamination. Written threats, and any envelopes, in which they are received, should be placed under clear plastic or glassine covers. All the circumstances of their receipt should be recorded. Telephone threats offer an opportunity to obtain more detailed information, perhaps even the caller's identity. For that reason, telephone receptionist or others who take calls from the public should be trained to remain calm and to solicit as much information as possible. They should keep the caller on the line, asking him to repeat the message several times, and attempt to gather additional information, such as caller ID information, etc. Telephone receptionists should be trained to remain calm and ask the following questions:
The bomber's intentions may be to damage property, not injure or kill anyone. If so, the person receiving the call may be able to obtain useful information before the caller ends the conversation. Under no circumstances should the person taking the call hang up if the caller is still on the line. The person taking the call should write down the threat verbatim, in the caller's own words, and record any additional information as indicated on Pub. 54. Once the threat has been received, corporate security and management must decide on the proper response such as evacuation procedures. Police and fire departments should be notified immediately. Searches may be conducted by individuals from within the firm who have volunteered for such duty, but they must be trained for this purpose. Remember, police agencies often will not conduct searches of private facilities. You and your employees know your facility and are more likely to observe unusual items that police and fire personnel could overlook. Search Team Deployment If your local police and fire departments will not assist in the search for an explosive device, company search teams will have to be deployed. Teams may consist of managers only or teams of managers and employees. For best results, the individuals conducting the search should be very familiar with all the sights, sounds and smells of the area to be searched. The ideal search team usually consists of two volunteer employees and a supervisor. The employees conduct the search under the direction of the supervisor, who communicates the progress of the search to the command center. Volunteers should be trained in basic search and building clearance techniques by private security professionals. Search techniques should be kept confidential and training should be limited to employees with a "need to know." Search teams should be outfitted beforehand with a few elementary tools, such as screw- drivers, crescent wrenches, pry bars, and flashlights. Remember to have the necessary keys or a custodian available to open storage rooms, boiler rooms, telephone, and utility closets. A complete building search should begin with the areas most accessible to the public. Typically, this means beginning with the building's exterior and moving indoors through the main entrance or lobby to waiting rooms, rest rooms, stairwells, and elevators. Once inside, a two-employee team should begin its search at the same point and work in opposite directions around the room or office back to the center of the room. They should begin at floor level and work their way up in four-foot increments. The search patterns should overlap somewhat. This process should be repeated in a methodical manner from office to office and from floor to floor throughout the facility. If a suspicious item is found, the area should be cordoned off and the police called. Once cleared, the search should continue throughout the facility until the entire area is declared safe for re-entry. This precaution is necessary because a bomber may plant more than one device. Under no circumstances should volunteers attempt to handle or remove suspicious devices. VII. WHAT IF A SUSPICIOUS PARCEL OR DEVICE IS FOUND ON OUR PROPERTY? We recommend incorporating procedures into your bomb threat response plan for dealing with suspicious placed devices. These devices have been handled in the delivery system and are not likely to explode merely by moving them to a safer location. Therefore, some of these actions differ from recommended tactics concerning mailed devices or those delivered by courier. For suspicious items found placed on your property:
VIII. HOW DO WE SCREEN MAIL AND OTHER PACKAGES DELIVERED TO THE MAIL CENTER? Postal inspectors have devised a mail bomb screening program that can be adapted to virtually any mail center operation, regardless of the size of the firm. To be successful, the mail bomb-screening program depends on a well-trained mail center staff, good communication within the firm's management, security and mail center, and the cooperation of employees at every level. The KEY POINTS which follow will guide the mail center manager or security manager through the ten steps necessary to establish a mail (and privately delivered package) bomb screening program. KEY POINTS
IX. BOMB SCREENING PROGRAM Vulnerability Assessment The security officer and top management should meet to evaluate the probability of your organization or its personnel becoming targets for mail bombs and bomb threats. The following are typical questions asked during this assessment. They can be used to develop any information that would help identify company officers or employees who could be targeted, or organizations that may attempt a bombing. Care must be given not to violate individual employees' privacy, and all information should be treated as extremely sensitive. This information should be shared with the mail center security coordinator in the event a suspicious package is received, but should not be disseminated to other employees.
Appointment of the Mail Center Security Coordinator Management should ensure that the mail center security coordinator (the coordinator) and an alternate are mature, responsible, and emotionally stable. This selection should be made from those persons already participating and trained in the overall bomb threat response plan. Duties of the mail center coordinator:
Direct lines of communication are vital Direct channels of communication between the mail center security coordinator, management, and security is vital. A "command center" of management and security representatives should be the focal point of communications when the bomb threat response plan is operational. The mail center security coordinator must be able to communicate directly with managers in this command center. Security must receive prompt notification when a suspicious package is identified or a threat is received in the mail center. Additional verification may be required of corporate security, or notification may be given to the supporting police, postal inspector, and bomb squad disposal units. These channels of communications will also be of significant help when a package clears the screening process and is delivered and is declared suspicious by the recipient. Information concerning that parcel should be relayed back to the mail center in the event other similar parcels are being processed. Screening procedures Incoming mail in any organization follows much the same pattern. Bags or bundles of mail, and other courier deliveries are delivered to a centralized mail center for distribution. (If this centralized receiving procedure is not currently in operation, steps should be taken to institute such a program immediately). The actual initial sorting of the mail for delivery to units, divisions, or individuals must be done by hand, with each item being picked up, its address read, and the mail item placed into its proper distribution box for delivery. This is the point where screening of incoming mail for suspect items should occur and those individuals who normally handle this mail sorting function should perform the screening. This is critical because those individuals are most likely to notice packages that are out of the ordinary. This procedure can also be used when an employee who has already received the package is concerned that it may contain an explosive device. This normally results from some personal situation that may or may not have been brought to management's attention. Based upon past patterns of mail bomb construction, packaging, mailing, and addressing, the screening of incoming mail should involve the search for those items of mail which have one or more of the recognition points listed on the enclosed Poster 26, Letter and Package Bomb Indicators. Please display this poster in your mail room. It is important to remember that the general screening procedures of incoming mail and packages are by no means foolproof. In many cases, the only person to detect anything suspicious about a package is the ultimate recipient. For this reason, these same mail bomb recognition points should be distributed company wide to all employees to increase employee sensitivity to this threat. Your vulnerability assessment should dictate the degree of heightened awareness to the danger of mail bombs and identify the employee for whom this training would be most beneficial. IMPORTANT Because of the increased sophistication of mail and placed bombs, fewer of the devices can be readily identified by merely examining the exterior of the package. Employees should be told:
X. RESPONSE PROCEDURES FOR SUSPECTED MAIL BOMBS ENCOUNTERED DURING SCREENING A. Upon notification that a suspicious package has been found, the mail center coordinator should:
B. When management or security receives the notification from the mail center coordinator, their actions should, in general, follow these guidelines:
Verification of suspect package by addressee and/or sender Before calling the police, security personnel should attempt to find out if the addressee of the suspicious package has any knowledge of the item or its contents. If the addressee can positively identify the suspect item, it may be opened by security with relative safety. If the sender must be contacted to identify the item and contents, a management decision must be made as to the reliability of the information. Below are sample questions to ask the addressee or sender during the verification process:
If the verification process determines that the sender is unknown at the return address, or the return address is fictitious, consider that as a very serious indication that the parcel may be dangerous. Establishing an isolation area for suspicious packages When the mail screening process identifies a suspect item, it is essential to rapidly remove personnel from the area and the potential bomb from the workflow. The potential bomb should be placed in an area of isolation. Security personnel and the mail center coordinator should jointly evaluate the spaces or areas available around the mail center and select one which offers a degree of isolation where a parcel may be placed pending verification and/or the arrival of the police. In selecting and creating the isolation area, the following points should serve as general guidelines:
Construct holding/carrying containers A holding/carrying container should be available in settings where no loading dock or outside covered area is available to hold a suspicious item until police or postal inspectors arrive. It should be placed away from high traffic areas where other employees are working. The container should be constructed of heavy wood or exceptionally strong plastic (not metal) and light enough for one or two individuals to carry. The container is not intended to contain an explosion, but it would help direct the force of any explosion away from other employees, flammables, or windows. It is extremely important that the container be well ventilated. Testing We cannot overemphasize the need to test contingency plans with mock suspicious parcels placed in the mail center or elsewhere in the facility. Naturally, these tests should be conducted in such a manner as to not alarm employees. These "dress rehearsals" help ensure that your lines of communication function as planned and that everyone who has a role to play knows his part. There is no better way to test the efficiency of an emergency contingency plan than to conduct scheduled tests. Hold post-testing meetings to go over problems and resolve them before the next test. Use the Bomb Threat Response Plan key points checklist on page 16 to periodically review your firm's preparations. XI. SUMMARY A successful mail bomb response plan begins with a commitment from your organization to protect its employees and their working environment. The plan cannot succeed without the cooperation of many different individuals involved in the process of establishing and maintaining a safe work environment. The mail center manager's role should be a significant one in this effort. The Postal Inspection Service can provide assistance to help you achieve your goals. BOMB THREAT RESPONSE PLAN: KEY POINTS CHECKLIST
[ ] Command Center Staff should include corporate management, security, and mail center security coordinator. First step is to perform vulnerability assessment. [ ] Command Center Staff must have authority to deal with any threat received and to order evacuation. [ ] Equip Command Center with telephone numbers of police, fire department, medical emergency services, and all employees. Have facility floor plans or blueprints on file. [ ] Determine local police policy on conducting bomb threat searches. [ ] If needed, organize and train search teams of volunteer employees familiar with areas to be searched. [ ] Equip search teams with basic tools, such as flashlights, screwdrivers, pry bars and keys to all offices and storage areas. [ ] Train telephone operators and receptionists to remain calm if receiving a threat and to gather additional information. [ ] Establish policy requiring all mailed and privately delivered parcels to undergo screening in mail center. [ ] Train mail center employees to recognize suspicious parcel and mail bomb characteristics during screening. [ ] Advise all employees to contact mail center if they receive a parcel they are not expecting and which cannot be explained DO NOT OPEN ANY PARCEL UNTIL VERIFIED TO BE SAFE SUSPICIOUS MAIL GUIDELINES
If you receive a suspicious letter or package:
For a Bomb: Evacuate Immediately Call Police Contact Postal Inspectors Call Local Fire Department/HAZMAT Unit For Radiological: Limit Exposure - Don't Handle Distance (Evacuate Area) Shield Yourself From Object Call Police Contact Postal Inspectors Call Local Fire Department/HAZMAT Unit For Biological or Chemical: Isolate - Don't Handle Wash Your Hands With Soap and Warm Water Call Police Contact Postal Inspectors Call Local Fire Department/HAZMAT Unit ### |
POSTAL INSPECTORS Preserving the Trust
| |
site map | contact us | Careers | national & premier accounts | |
Copyright © 2008 USPS. All Rights Reserved. Terms of Use Privacy Policy |