Tuesday, June 30, 2009

AWW on Facebook!

AWW is now on Facebook! http://miniurl.org/ox7

Tuesday, March 24, 2009

Free Terrorist Recognition Resource

Written by a 20-year veteran of the U.S. intelligence community, this second edition reflects the latest geopolitical factors affecting global terrorist incidents and regional insurgencies. A new section includes an analysis of transformations within Al Qaeda, coverage of the modern insurgency, and new global and regional terrorist groups. Completely updated, the section on terrorist tactics reveals the latest trends and attack methods and includes a new chapter on previously unseen suicide bombings. This book is an invaluable training tool on how to identify an attack; how to mitigate damage from successful attacks; and how to recognize the various stages of developing terrorist plots.
480 pages, Publisher: CRC; 2 edition (April 14, 2008) # Language: English # ISBN-10:1420071831. Free download:
http://www.dmos.info/eng/Terrorist%20Recognition%20Handbook.pdf

Wednesday, March 18, 2009

Pennsylvania Terrorism Awareness Resource

The State of Pennsylvania has put together a really good interactive Terrorism Awareness Web site. http://www.pa-aware.org/index.asp

Tuesday, March 17, 2009

The last "S" in S.E.T.S stands for Suspicious Behavior

The fourth and final posting in our Series looking at the S.E.T.S. program, from our Auxiliarist Lenny Douthett:

"This is probably the most confusing and broadest of the four core steps. If you ask ten people what is suspicious behavior, you will most likely get ten different answers. Why? Without proper training, each individual will rely on their own understanding based on their life experience.

For the purposes of S.E.T.S., we define Suspicious Behavior as any behavior enacted within a specific environment that is not "normal" for that environment. Basically, if the behavior is not commonly a part of a particular environment, than it may be viewed as suspicious. It's important to realize that we only identify behavior as suspicious, not individuals as suspicious.

For example, when it's cold, it's not uncommon to see people wear coats and (if you live in the northern areas of the US) possibly a ski mask or wool hat. In that same environment, should you see a person with no coat and no hat or ski mask, that person may be viewed as displaying suspicious behavior.

If you witness what you believe to be a possible Suspicious Behavior, report it immediately to local police or call the AWW hotline (877) 24-WATCH."

Lynwood D. Douthett
Aux Marine Inspector
AUX Sector MDA Coordinator
Prevention Division Sector Los Angeles - Long Beach

Monday, March 2, 2009

The "T" in S.E.T.S. Stand for Tests of Security

The third in our Series looking at the S.E.T.S. program, from our Auxiliarist Lenny Douthett:

"T" or Tests of Security is the third core step in S.E.T.S.

Think of a test of security as deliberately creating a situation that requires a response by police or security; then documenting the elements or logistics of the response. This step can sometimes be difficult to detect; especially, if you are not watching for it. A test of security may be as simple as a trash can or dumpster fire. Or it could be that unattended back pack left on the sidewalk close to a gate or entrance. It may be that friendly person that just happened to walk into a restricted area and leaves politely when challenged. It can even be a staged accident outside, next to or near a critical infrastructure.

Tests of security will most likely occur in close proximity of a potential target such as a building, bridge, plant, vessel, aircraft or area that is host to large crowds. The S.E.T.S. training program offers a better understanding and a closer look at tests of security and offers a more in depth understanding.

If you witness what you believe to be a possible test of security, report it immediately to local police or call the AWW hotline (877) 24-WATCH.

Lynwood D. Douthett
Aux Marine Inspector
AUX Sector MDA Coordinator
Prevention Division Sector Los Angeles - Long Beach

Friday, February 20, 2009

The "E" in S.E.T.S. stands for Elicitation

Continuing with our S.E.T.S discussion, Auxiliarist Douthett provides a good explanation of Elicitation:

Have you ever had a conversation with someone and after you had some time to think about it you say to yourself "Hmmmm that was weird".

Elicitation, the second indicator in S.E.T.S., is someone asking seemingly unrelated questions about things or subjects to gain otherwise hidden information for illicit use.

Elicitation as it pertains to terrorism should leave you with that feeling of ‘why are they asking about that. However, in some cases, the person initiating the query for elicitation may be so well versed in their trade that you may not be aware that you have divulged important or useful information. The realization may come well after the conversation has ended or after an incident has occurred.

When having a conversation, if the person asks a question several different ways throughout the conversation, or continues to ask questions concerning a specific subject such as security, response time, or monitoring, you should suspect possible elicitation.

More to come

Lynwood D. Douthett
Marine Inspector
AUX Sector MDA Coordinator
Prevention Division
Sector Los Angeles - Long Beach

Wednesday, February 4, 2009

The "S" in S.E.T.S. stands for SURVEILLANCE

From our favorite Auxilarists, Mr. Lenny Douthett, comes the next installment of our S.E.T.S. explination:

The S.E.T.S. program defines surveillance as photographing, videotaping, drawing, mapping, and/or other means of monitoring a potential target.

In the simplest terms, each of us has engaged in surveillance at some point in time. Have you ever done internet research on where you're staying or things to do before going on a trip? Have you ever visited a marina or checked out a fishing spot before a weekend on the boat? Ever drawn a map, or marked a chart for someone to help them get to where they are going?

The moment we take a picture or record observed information about a particular area, person, place or thing, we are engaging in surveillance. The purpose for the recorded information dictates the type and the depth of the surveillance performed. This is the challenge in identifying when surveillance should be observed as a possible indicator of terrorist activity.

Surveillance as related to terrorist activity is usually the first identifiable step in a terrorist's plan to carry out an incident. But, how do we identify when we are actually observing possible terrorist surveillance activity?

As a rule, any time you observe a person photographing and taking notes, videotaping and taking notes or using other means of monitoring followed by note taking directed at critical infrastructure (such as bridges, tunnels, wharfs and terminals, etc...) you should record the activity and report it.

The S.E.T.S. program goes more in-depth on the subject of surveillance, the different kinds of surveillance and how to discern the difference between "innocent" surveillance that we all engage in on a daily basis.

More to come

-Lynwood D. Douthett, Aux