Friday, December 14, 2018
'Bomb Threat and Explosion Investigation\r'
'In addition, other law enforcement agencies may baffle specific information value. The Intelligence Service, Armed Forces of the Philippines (ISAFP), legal philosophy Intelligence Group (PIG) and National Intelligence organise Agency (NICA) n cardinals files on individuals who make holy terrors against political leaders.The power of Customs (BOC) may brook information of trade goods; the Bureau of Immigration and Deportation (BID) can provide information on individuals entering or leaving the country; the Firearms and Explosive Division, Civil Security Group, Philippine National Police (FED, CSG, PNP) maintains records on firearms and fickles; the Bureau of department of corrections (BUCOR) maintains records on fugitives; the Philippine Postal Corporation (PHILPOST) may assist in matters related to the mails; the National Anti-Kidnapping working class Force (NAKTAF) may, break files of information and intelligence beca accustom they have primary jurisdiction in kidnap- for-ransom cases. On the topical anaesthetic aim, the local police authorities frequently maintain individual p live(a)o or ââ¬Å"mugââ¬Â files, false name files, business indexes, modus operandi (MO) files, victimization records and crime patterns. In addition, coquette records, probation and parole files, and other municipal records such as utilities, may prove valuable. Records of businesses, such as the teleph atomic number 53, galvanising and water companies, may in every case be helpful.Surveillance and stake come outs be important components of kidnap-for-ransom investigations. These work outivities may beg unlike forms of electronic surveillance, including wiretapping, eavesdropping, automobile locator systems, videotaping and p acerbography. Such efforts may require assistance from other agencies. The re wait worker should be familiar, not totally with the use of such equipment, but in like manner with the laws surrounding their application. The investigat or must(prenominal) know when a court order is necessary for the use of electronic surveillance. In no case should an investigator use extralegal means to secure information. CHAPTER 7 washout brat AND EXPLOSION INVESTIGATION INTRODUCTIONThe use of explosives, by certain criminals and criminal organizations, has increased since the mid â⬠1980ââ¬â¢s. Statistics also show that homes, vehicles and businesses were the primary targets of goings and, in eight out of ten incidents, the motive was vandalism and revenge. Bombs argon a good deal do out common household items regularly run aground in the kitchen, garage or beneath the sink. The pipe bomb, the easiest bomb to construct, is often packed with screws and nails which act as projectiles, similar to hand grenades. These are materials that the crampfish relies on, in part, to help conceal their identity. Because they are unremarkably home-made, they are limited in their design only by the imagination of the bomber.W hen essaying for a bomb, the investigator should simply odor for everything that appears unusual. The bomb technician decides what is and is not a bomb. The bombing crime scene must be linked to the bomber and, if found intact, the bombs themselves can sometimes reveal the identity of the bomber. Bombs can be constructed to look like almost anything and can be determined or delivered in a transformation of commissions. The gamble of locating a bomb that looks like the stereotypical bomb is almost non-existent. INVESTIGATING THE betray THREAT Bomb terrors are delivered in a variety of ways. Most are telephoned in to the target. Occasionally, these prognosticates are made through a third party. Sometimes, a little terror is communicated through in writing or via a recording.There are two (2) general ex blueprintations as to why the bombers communicate a bomb threat: 1. The party has definite knowledge or believes that an explosive or incendiary bomb has been or leave alon e be placed, and that he or she wants to minimize personal impairment or proper(a)ty damage. The caller may be the person who placed the catch or someone else who has become aware of such information. 2. The caller wants to make an atmosphere of anxiety and panic that allow, in turn, results in disruption of normal activities at the facility where the whatchamacallit is supposedly placed. Whatever the reason, there exit surely be a reaction to it. However, through proper planning, the wide variety of uncontrollable reactions can be minimized.The bomb threat caller is the best citation of information about a bomb. When bomb threat is called in, the avocation step should be implemented: 1. keep the caller on the line as ache as possible. 2. Ask him or her to repeat the heart and record every word spoken by the person. 3. Ask the caller about the location of the bomb and the time of detonation of the device. 4. Inform the caller that the structure is occupied and the de tonation of a bomb could slay or injure innocent people. 5. Pay crabbed attention to background noise such as motor running, music playing or any other noise. This may give a clew as to the location of the caller. 6.Listen closely to he vocalise (male or female), voice quality (calm or excited), artistic style and speech impediments. 7. Interview the person who received the call for the preceding information. RESPONDING TO A BOMB THREAT In response to a bomb threat, the following reminders must be strictly observed by the graduation exercise responders: 1. Refrain from broadcasting while at the location. radio receiver transmissions big businessman trigger the explosive device. 2. Anyone involved in the search must not touch any suspected items. Under any circumstances, if a untrusting object is located, it should not be touched or disturbed. 3. Maintain a safe distance from the explosive device. 4. Call the Explosive Ordinance Disposal aggroup (EODT) to handle the explosiv e device. SAFETY PRECAUTIONSIn a wear or search situation in which explosive devices are expected to be en counterpunched, investigations should be attended by an explosives expert. This person can be utilize to inform other police officers of what type of device is at hand and how best to go forward safely with the raid. Other precautions include the following: 1. Only one officer at a time should come out the suspected booby trap. 2. When trip wires are located, some(prenominal) ends of the wire should be checked. 3. Wires that appear to be voltaic should not be cut. 4. No containers should be heart-to-heart without thorough examination. ELEMENTS OF BOMB INCIDENT PLANNING To counter bomb incidents, a physical security plan and bomb incident plan should be made.The elements of these plans are as follows: 1. Control 1) Who pull up stakes be in charge of the incident? 2) Where will the control nub be located? 3) How will critical decisions be made? 4) Who will man the contro l reduce? 5) What primary and alternate communication system will be employed during the incident? 2. Initiation What procedures will be followed upon receipt of a bomb threat or notice that a device has been found? 3. Evacuation If evacuation is ordered, what procedure will be followed? 4. Search 1) What will be searched? 2) What search technique will be employed? 3) Who will search? 5. Damage Control 1) What damage control measures will be taken? ) Who will take the damage control measure? 6. Detonation 1) What procedure will be followed if a bomb detonates without warning? BOMB â⬠SEARCHING TECHNIQUES A two-person search item is recommended when aspect for bombs. When the search aggroup enters the direction, they should first move to various parts of the fashion and stand quietly, with their eyes closed, and hear for clockwork device. Often, a clockwork device can easily be detected without the use of specialized equipment. Even if no clockwork mechanism can be detected , the search team is now aware of the background noise level within the room itself. Background noise is invariably disturbing during a building search.If a check mark sound is heard but cannot be located, one might become unnerved. The ticking sound might come from an unbalanced air conditioner fan, several floors away, or from a dripping sink down the hall. dense can transfer through air condition ducts, along water pipes and through skirts. One of the more(prenominal) difficult buildings to search is one that has steam of hot water heat. This type of building will constantly thump, crack, chatter and tick because of the movement of the steam of hot water through the pipes and the expansion and contraction of the pipes. The room should be divided into two virtually tolerable parts. An imaginary line is then drawn amid two objects in the room.The first searching pinnacle will usually cover items in the room up to hip height. The searchers then position themselves on opposi te sides of the room and begin searching their way around the room, working toward each other. During the search, all items resting on the floor and positioned around or on the wall area are inspected. Although many minor variations are possible in searching a room, the following are the summary of the basic searching steps: 1. Divide the area and select a search height. 2. Start from the bottom and work yourself up. 3. Start back-to-back and work toward each other. 4. Go around the walls and proceed toward the center of the room.\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment