‘A’ is for Terror ‘Awareness’ and ‘A’ is for August (Learn More, Multi-Video)

The Terror Threat Snapshot this month states that there were 157 homegrown terror plots in the United States – in 30 different states – since 2013.
The August Terror Threat Snapshot states that there were 157 homegrown terror plots in the United States – in 30 different states – since 2013. (Courtesy of the House Homeland Security Committee)

Guest Editorial by Stanley I. White, IACSP, ATO

As we push on through the dog days of summer, the major media outlets don’t seem to be reporting about the threat of terrorism.

Society with its short term memory seems to be just tired of the subject.

But this does not mean the threat is less real.

ISIS has been crushed but not eliminated; its splintered components seek to enter Europe, the United States and other western societies to continue their deadly ways.

Terrorist organizations often seek to launch attacks on the anniversary dates of past terrorist events and dates of significance.

Listed below are some important dates that may be exploited in the month of August:

  • August 7, 1998: United States embassy bombings in Dar es Salaam, Tanzania and Nairobi, Kenya.

    • The attack resulted in the deaths of 224 individuals and injuries to 4000 more.

(Learn More. It has been years since the al-Qaeda bomb attacks on US embassies in Kenya and Tanzania. Thousands of people are expected to gather in Nairobi and Dar es Salaam to remember the 224 people killed in the twin explosions. Courtesy of Al Jazeera and YouTube. Posted on Aug 7, 2013.)

  • August 13, 2015: 70 people were killed and 200 were injured in the truck bombing of a marketplace in  Baghdad, Iraq.

  • August 21, 2015: An active shooter and stabbing attack occurred on a train traveling from Amsterdam to Paris with 5 people injured during the assault.

(Learn More. Three Americans are being hailed as heroes for foiling an attack on a high speed train in Europe. The train was travelling between Amsterdam and Paris when the American thwarted the gunman’s plan by tackling him and tying him up. Courtesy of CBS This Morning and YouTube. Posted on Aug 22, 2015.)

  • August 8, 2016: 77 people were killed and over 100 were injured in a suicide bombing at a government hospital in Quetta, Pakistan.

  • August 8, 2017: A series of terrorist attacks occurred in Barcelona, Spain that killed 15 people and injured over 100 others at various locations.

(Learn More. ISIS claimed responsibility for plowing a van through a crowd in Spain, killing more than a dozen people and injuring 100 others. Courtesy of ABC News and YouTube. Posted on Aug 17, 2017.)

The purpose of this piece is to explore the use of personal awareness as it relates to physical security and provide the reader the ability to enhance their personal levels of safety.

The development of a baseline for security, the detection of anomalies, the use of WHITE, AMBER and RED Personal Alert System (WAR PPS), and recommended practices will be explored to enhance the personal awareness of the reader when confronted with potentially dangerous situations.

Personal Awareness, is the state of mental focus an individual assumes to assess the people, activities and environment around their person for the enhancement of their safety levels.

The average person generally lives their life within one of three areas of interaction.

  • Home: their place of residence

  • Work: their place of employment

  • Individual Specific: area specific to the individual (ie. their school, their gym, their favorite venues and all areas outside of home and work)

The security baseline seeks to identify anomalies (signs, actions, cues of potential danger or threat) for an area of interaction.

Anomalies as they relate to physical security are generally caused by specific human action.

Human action is the result of 3 components.

  • The will to act

  • The means to act

  • The opportunity to act

Each of these will usually produce a set of anomalies that a trained individual can pick up on when observing a suspicious individual.

EXAMPLES OF ANOMALIES AS THEY RELATE TO A VIOLENT ACTOR:

The will to act

Many times what someone obsesses on, they usually will talk about (such as a man thinks, that he is) or express themselves on social media.

The violent actor may speak of his desire for violence especially if debated/challenged in conversation.

LISTEN ANALYZE WHAT PEOPLE SAY AND REPORT SUSPICIOUS BEHAVIOR/STATEMENTS

Usually friends, family and work associates will be the first to hear a violent actor speak of committing violence against others.

Sometimes when questioned about their statements they will say they were just joking.

Irrational and violent statements are often voiced online via social media where the actor feels shielded and supported by like minded individuals.

The means to act

The actor may engage in activities to support their violent intentions such as extreme physical conditioning, combative drills and or the training of various weapons (ie. firearms and edged weapons) for more than self defense purposes.

This training may even involve experimentation with chemicals and explosives materials.

OBSERVE, DOCUMENT AND REPORT SUSPICIOUS BEHAVIOR

The opportunity to act

Testing of security barriers for a selected target, intense study of a potential target, intense surveillance.

OBSERVE, DOCUMENT AND REPORT SUSPICIOUS ACTIVITIES

The WHITE, AMBER and RED Personal Alert System (WAR PPS) is a personal awareness system that utilizes information from security baselines, human actions and areas of interaction to provide users a method to assess, generate options and take action to raise their personal security levels.

WAR PPS uses a color coded breakdown for each level of awareness and reaction, as follows:

White

  • White is the level assumed when the user has made a complete assessment of the people, activities and surroundings within their area of interaction.

  • Once the area is deemed safe the user can lower their guard and level of awareness.

Amber

  • Amber is a continual state that requires the user to be alert and scanning  for anomalies until they assume the white level again.

  • Once an anomaly is detected and assessed  the user raises their level of awareness.

  • Once it is deemed necessary the user will generate a tactically sound option to address the anomaly.

RED

  • Red is the level where the user’s countermeasures are engaged.

  • The user must engage the threat and overcome denial, fear of making a mistake, embarrassment and failure to act.

(NOTE: WHEN A W.A.R PPS USER IS AT AN AMBER OR WHITE LEVEL THEY SHOULD IMAGINE THEMSELVES IN VARIOUS SCENARIOS OF DANGER AND VISUALIZE THEIR RESPONSE. THIS WILL ENHANCE THEIR ABILITY TO REACT IN REAL LIFE CIRCUMSTANCES)

The WAR Personal Protective System relies on the user executing a 3 step process that is as follows:

Preparation

  • Prepare through training and study.

  • A basic example of virtual training follows the popular phrase “If this were to happen, then my response would be”.

  • The PPS user regularly conducts such mental role play to prevent freezing up during situations that require action.

Application

  • Application consists of training newly acquired techniques and tactics, until the time of execution.

Evaluation

  • Whenever you act, even with flawless success always evaluate your actions.

  • There will always be something that could have been done better.

  • This will improve your responses to dangerous situations.

TYPICAL ANOMALIES THAT WAR PPS USERS SHOULD MENTALLY WALKOUT THROUGH AND VISUALIZE A TACTIALLY SOUND RESPONSE FOR INCLUDE:

  • A door that is usually locked found to be unlocked

  • Darkened pathway due broken light fixtures in an isolated area

  • A cut lock or chain used to secure a point of ingress/egress

  • Threatening messages in the form of graffiti, emails, social media etc. found in one of your areas of interaction

  • An individual(s) asking about, the staff/employee numbers as well as security or police presence at a location

  • Strange sets of footprints across your property

  • Individuals loitering outside of a secure area

  • Abandoned vehicle left outside a restricted area

  • Suspicious individuals slowly driving, parking or filming a residential or secure area

  • A suspicious vehicle driving behind you in traffic for an extended length of time

  • A suspicious individual following you on foot

  • A suspicious individual filming you

  • Individuals filming or taking of notes on unusual features such as bus stops, structural features of buildings, security cameras, exit doors, fire extinguishers, locks/chains that secure ingress and egress locations, bridges, tunnels, railroad tracks, fueling depots etc.

  • Individuals abandoning luggage, backpacks, baby strollers, boxes etc. outside areas where people gather or enter/exit a venue

(Note: One of the above activities alone may not mean the existence of a threat or highly nefarious activity requiring a counter response. However, it provides an opportunity for the user to sharpen their awareness, with this said a combination of 2 or more anomalies is definitely a reason to heighten your awareness and mentally generate options regarding safety.)

Additional recommendations for the PPS user that fall into the preparation and application phases should include the following:

  • Regularly assess your own mental, physical and spiritual fitness (review your strengths and weaknesses)

  • Regardless of the task assess your abilities to succeed “are you good to go?”

  • Know where you are physically located at all times and be conscious of those around you.

  • Verify the status of your cell phone reception and battery strength regularly

  • Have direct numbers of local fire, police and emergency services saved in your phone incase the regional 911 system is disabled

  • When entering a venue determine a second means of ingress/egress. Studies have determined that during an emergency people will usually attempt to evacuate a location by using the same route they entered the venue.

  • Always attempt to maintain space to maneuver when in a crowd and avoid being boxed in by others

  • Look for areas of cover and concealment if an emergency requires you to shield yourself (ie. vending machines, kiosks, concrete structures, dumpsters, automobiles, etc.)

  • Create a “GO Bag” for your vehicle that includes but is not limited to a:

    • A blanket, flashlight with batteries kept separate, liter of water, first aid kit, disposable lighter, rain gear, multi-tool, 5-10 energy bars and an envelope of 50 to 100 dollars cash in dominations from singles to twenty dollar bills.

  • Identify the locations of fire extinguishers, alarms systems, emergency lighting and fire doors

  • Identify the presence of wall mounted first aid kits and AED units

  • Receive basic first aid training

  • Receive basic self defensive training for realistic threats (Note: basic training in self defense will teach you how to repel and escape an attacker and stress survival/ self protection for you and loved ones. The core goal of such training is not to win a contest but survival and the restoration of the level of safety you had prior to an attack)

  • Stay informed to local, regional and international threats environments and utilize available resources such as:

  • American Security Today (www.americansecuritytoday.com)
  • Counter Extremism Project (www.counterextremism.com)
  • The Investigative Project on Terrorism (www.investigativeproject.org)
  • IACSP (www.iacsp.com)

The above mentioned items in these phases are just the basics; an individual’s arsenal of techniques should increase the more they utilize a personal awareness mindset.

As the user engages himself or herself in training their confidence will increase.

Whether you are a regular citizen going about your personal business or a first responder, you must always keep in mind that the adversary will have the advantage each time.

They will know the location, time and the method of the attack (active shooter, hostile vehicle assault, explosive device, edged weapon attack, etc.)

Confidence is key in questioning anomalies and developing effective responses.

“PREPARATION BREEDS CONFIDENCE, ITS FAR BETTER TO PREPARE AND NOT HAVE TO ACT, THEN ACT AND NOT BE PREPARED. CONFIDENCE IS THE STRUCTURE OF SUCCESS…”

You SLEEP IN THE WHITE, YOU LIVE IN THE AMBER and YOU REACT IN THE RED.

About the Author:

Stanley I. White, IACSP, ATO
Stanley I. White, IACSP, ATO

Stanley I. White is currently the CI Advisor for the International Association for Counterrorism & Security Professionals (IACSP)as well as a defensive tactics instructor who has trained personnel from numerous local, state and federal law enforcement agencies.

He is a certified Anti-Terrorism Officer, holds an active membership with the Association of Former Intelligence Officers (AFIO), and is listed as a general services DoD contractor.

Mr. White is also an internationally published author on the topics of personal security and counter terrorism.

He can be reached for comment at swhite@atix.riss.net.

Stanley I. White: Nominated in the 2018 ‘ASTORS’ Homeland Security Awards Program

AST focuses on Homeland Security and Public Safety Breaking News, the Newest Initiatives and Hottest Technologies in Physical & IT Security, essential to meeting today’s growing security challenges.

2017 ASTORSThe 2018 ‘ASTORS’ Homeland Security Awards Program, is organized to recognize the most distinguished vendors of Physical, IT, Port Security, Law Enforcement, Border Security, First Responders, (Fire, EMT, Military, Support Services Vets, SBA, Medical Tech) as well as the Federal, State, County and Municipal Government Agencies – to acknowledge their outstanding efforts to ‘Keep our Nation Secure, One City at a Time.’

To Learn More about the ‘ASTORS’ Homeland Security Awards Program, see 2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East.

2018 ASTORSOver 100 distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government, gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included representatives from:

  • The Department of Homeland Security(DHS) Science and Technology Directorate (S&T)
  • U.S. Customs and Border Protection
  • The Department of Justice
  • The Security Exchange Commission
  • State and Municipal Law Enforcement Agencies
  • The Royal Canadian Mounted Police
  • Leaders in Private Security

Nominations are now being accepted for the 2018 ‘ASTORS’ Homeland Security Awards at https://americansecuritytoday.com/ast-awards/.

American Security Today will be holding the 2018 ‘ASTORS’ Awards Presentation Luncheon to honor Nominees, Finalists and Winners on November 14, 2018 at ISC East 2018 in New York City.

The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

Good luck to Stanley White on becoming a Winner of the 2018 American Security Today’s Homeland Security Awards Program!

For ‘ASTORS’ Sponsorship Opportunities and More Information on the AST 2018 ‘ASTORS’ Homeland Security Awards Program, please contact Michael Madsen, AST Publisher at: mmadsen@americansecuritytoday.com or call 732.233.8119 (mobile) or 646-450-6027 (office).

Learn More…

See Feature Article: Latest Terror Threat Snapshot: More ISIS-Linked Plots in USA’ in the August 2018 AST Fully Interactive Digital Magazine at https://joom.ag/dAoY.

Game Changer: America’s Suicide Bombers (Learn More, Multi-Video)