.

Tuesday, February 19, 2019

Bomb Threat and Explosion Investigation

In addition, different law enforcement agencies may perplex specific information value. The Intelligence Service, Armed Forces of the Filipinos (ISAFP), Police Intelligence stem (PIG) and national Intelligence Coordinating Agency (NICA) maintains files on individuals who make threats against semipolitical leaders.The representation of Customs (BOC) may provide information of imported goods the Bureau of Immigration and Deportation (BID) digest provide information on individuals get in or leaving the country the Firearms and Explosive Division, Civil Security Group, Philippine National Police (FED, CSG, PNP) maintains proves on firearms and fickles the Bureau of Corrections (BUCOR) maintains records on fugitives the Philippine Postal Corporation (PHILPOST) may assist in matters related to the mails the National Anti-Kidnapping Task Force (NAKTAF) may, have files of information and intelligence beca subprogram they have autochthonic jurisdiction in kidnap-for-ransom cases. On the local level, the local police politics frequently maintain individual p thermalo or mug files, a.k.a. files, business indexes, modus operandi (MO) files, victimization records and crime patterns. In addition, court records, probation and parole files, and some early(a) municipal records much(prenominal) as utilities, may prove valuable. Records of businesses, such as the telephone, electric car and water companies, may alike be helpful.Surveillance and s organiseouts are weighty components of kidnap-for-ransom investigations. These activities may require respective(a) forms of electronic surveillance, including wiretapping, eavesdropping, automobile locator systems, videotaping and photography. such efforts may require assistance from other agencies. The re reckon worker should be familiar, non only with the use of such equipment, but also with the laws surrounding their application. The investigator must k instantly when a court order is necessary for the use of electronic surveillance. In no case should an investigator use illegal means to secure information. CHAPTER 7 conk out THREAT AND EXPLOSION investigation INTRODUCTIONThe use of explosives, by certain criminals and criminal organizations, has increased since the mid 1980s. Statistics also show that homes, vehicles and businesses were the primary targets of bombings and, in eight out of ten incidents, the causative was vandalism and revenge. Bombs are often made out common place items regularly found in the kitchen, garage or under the sink. The tube-shaped structure bomb, the easiest bomb to construct, is often packed with screws and nails which act as projectiles, similar to consider grenades. These are materials that the bomber relies on, in part, to help conceal their identity. Because they are commonly home-made, they are limited in their design only by the conceit of the bomber.When search for a bomb, the investigator should simply look for boththing that appears unu sual. The bomb technician decides what is and is not a bomb. The bombing crime scene must be coupled to the bomber and, if found intact, the bombs themselves thunder mug sometimes reveal the identity of the bomber. Bombs can be constructed to look like almost anything and can be fixed or delivered in a variety of ways. The chance of locating a bomb that looks like the stereotypical bomb is almost non-existent. INVESTIGATING THE bombard THREAT Bomb threats are delivered in a variety of ways. nigh are telephoned in to the target. Occasion entirelyy, these calls are made by dint of a leash party. Sometimes, a threat is communicated through in writing or via a recording.There are two (2) general explanations as to why the bombers communicate a bomb threat 1. The society has definite knowledge or believes that an explosive or incendiary bomb has been or bequeath be placed, and that he or she wants to minimize personal injury or property damage. The caller may be the person who p laced the finesse or soulfulness else who has wrick aware of such information. 2. The caller wants to create an atmosphere of perplexity and panic that will, in turn, results in disruption of normal activities at the deftness where the device is supposedly placed. Whatever the reason, there will certainly be a reaction to it. However, through proper planning, the wide variety of refractory reactions can be minimized.The bomb threat caller is the best writer of information nigh a bomb. When bomb threat is called in, the following step should be implemented 1. Keep the caller on the line as long as possible. 2. Ask him or her to repeat the message and record every word spoken by the person. 3. Ask the caller about the location of the bomb and the time of detonation of the device. 4. Inform the caller that the expression is occupied and the detonation of a bomb could kill or appall innocent people. 5. Pay particular attention to background noise such as motor running, music playing or any other noise. This may give a clue as to the location of the caller. 6.Listen well to he voice (male or female), voice quality (calm or excited), dialect and speech impediments. 7. Interview the person who received the call for the preceding information. RESPONDING TO A BOMB THREAT In response to a bomb threat, the following reminders must be strictly observed by the firstborn responders 1. refrain from broadcasting while at the location. Radio transmissions might trigger the explosive device. 2. Anyone involved in the search must not touch any suspected items. Under any circumstances, if a suspicious object is located, it should not be touched or disturbed. 3. Maintain a safe outdistance from the explosive device. 4. Call the Explosive Ordinance Disposal Team (EODT) to incubate the explosive device. SAFETY PRECAUTIONSIn a raid or search business office in which explosive devices are expected to be encountered, investigations should be tended to(p) by an explos ives expert. This person can be used to inform other police officers of what type of device is at hand and how best to choke safely with the raid. Other precautions include the following 1. Only one officer at a time should approach the suspected booby trap. 2. When hinge on wires are located, both ends of the wire should be checked. 3. Wires that appear to be electric should not be cut. 4. No containers should be opened without thorough examination. ELEMENTS OF BOMB INCIDENT PLANNING To counter bomb incidents, a physical security department plan and bomb incident plan should be made.The elements of these plans are as follows 1. hear 1) Who will be in charge of the incident? 2) Where will the control center be located? 3) How will critical decisions be made? 4) Who will man the control center? 5) What primary and replacement communication system will be employed during the incident? 2. inductance What maps will be followed upon receipt of a bomb threat or notice that a devic e has been found? 3. Evacuation If evacuation is ordered, what procedure will be followed? 4. Search 1) What will be searched? 2) What search technique will be employed? 3) Who will search? 5. Damage Control 1) What damage control measures will be taken? ) Who will take the damage control measure? 6. Detonation 1) What procedure will be followed if a bomb detonates without warning? BOMB SEARCHING TECHNIQUES A two-person search item is recommended when looking for bombs. When the search team enters the way of life, they should first move to various parts of the agency and stand quietly, with their eyes closed, and listen for clockwork device. Often, a clockwork device can easily be detected without the use of specialized equipment. make up if no clockwork mechanism can be detected, the search team is now aware of the background noise level within the room itself. basis noise is always disturbing during a building search.If a go sound is heard but cannot be located, one might b ecome unnerved. The turn backing sound might come from an unbalanced air conditioner fan, some(prenominal) floors away, or from a dripping sink down the hall. Sound can transfer through air conditioning ducts, along water pipes and through walls. One of the more difficult buildings to search is one that has steam of hot water heat. This type of building will constantly thump, crack, chatter and tick because of the movement of the steam of hot water through the pipes and the expansion and muscle contraction of the pipes. The room should be divided into two virtually equal parts. An fanciful line is then drawn between two objects in the room.The first searching height will usually cover items in the room up to hip height. The searchers then position themselves on opposite sides of the room and begin searching their way or so the room, working toward each other. During the search, all items resting on the floor and positioned around or on the wall subject field are inspected. Alt hough many minor variations are possible in searching a room, the following are the summary of the basic searching go 1. Divide the area and select a search height. 2. Start from the tin can and work yourself up. 3. Start back-to-back and work toward each other. 4. Go around the walls and proceed toward the center of the room.

No comments:

Post a Comment