Download presentation
Presentation is loading. Please wait.
Published byAlexander Ross Modified over 9 years ago
1
Security awareness 24 May 2015 Security awareness
2
PRESENTED BY: MR. JOSPHAT BWONYA,SP
3
SCOPE ATPU DEFINITION OF TERRORISM ATPU MANDATE TERRORISM OVERVIEW FACTORS CONTRIBUTING TO TERRORISM TERRORISM OPERATIONS METHODS OF EXECUTING TERRORISM TERRORISM CYCLE IED CURRENT SITUATION
4
ANTI-TERRORISM POLICE UNIT (ATPU) The Anti - terrorism Police Unit (ATPU) is a unit within the Directorate of Criminal investigation mandated to mitigate terrorism related cases in the country. 24 May 2015 SECURITY AWARENESS) 4
5
TERRORISM It is unlawful use of force or violence to intimidate governments, the civilian population or any segment of the community thereof in furtherance of political, ideological or religious objective. Path to Terrorism involves; Radicalization - brainwashing Religious extremism – justified killings - Jihad 31 oct 2011 5ANTI-TERRORISM POLICE UNIT (ATPU)
6
ATPU MANDATE Prevent, detect, disrupt and interdict imminent terrorist activities within the country, Exhaustively investigate all terrorism and terrorism related cases Take control, secure, evidence at all scenes of terrorist incidents Share intelligence with other security related agencies operating within the country Review and monitor security of vital installations 24 May 2015 SECURITY AWARENESS 6
7
TERRORISM OVERVIEW Terrorism knows no borders Causes loss of life and property Perpetrated by clandestine groups Requires joint efforts to combat Complex in nature 5/24/2015 SECURITY AWARENESS 7
8
TRENDS IN TERRORISM TECHNIQUES Improved methods of concealment and attacks Ties with other crimes Complex modes of attack Increased use of modern technology 24 May 2015 SECURITY AWARENESS ) 8
9
FACTORS CONTRIBUTING TO TERRORISM Political : Unpopular, repressive or corrupt governments Social : Gross discrimination Economic : Extreme poverty or unemployment, Ideological : Divergence of Political ideology Geopolitical : Border disputes Religious: Religious strife, or religious violence Foreign influence : Foreign support of dissident activities. 24 May 2015 SECURITY AWARENESS )9 9
10
TERRORIST OPERATIONS Terrorist groups are well organized. Their respective Organizations and structure go through the following processes; - Recruitment, Training- radicalization - Propaganda. - Selection of Action/Target - Planning Finances, - Execution. 24 May 2015 SECURITY AWARENESS )10
11
METHODS OF EXECUTING TERRORISM Bombing : E.g car bombs, parcel bombs, suicide bombers etc., road side IED’s and use of remote control. Assassinations Hostage taking Hijacking Others : assault, arson, kidnapping etc. 24 May 2015 SECURITY AWARENESS )11
12
TERRORISM CYCLE Organization and planning Target selection The attack Post-attack operations 24 May 2015 SECURITY AWARENESS 12
13
TARGET SURVEILLANCE Scheduled deliveries Work-shift changes Identification procedures Presence of a guard force Hardening of the facility or area surrounding the site Barriers, fences, sensors, cameras,CCTV and personnel Package and vehicle screening procedures Request for unusual information Photograph taking/drawing. Luggage – bulky, empty, abandoned etc Suspicious person(s) loitering near parking area, vents, and air intakes, equipment, etc. 24 May 2015 SECURITY AWARENESS ) 13
14
SUICIDE ATTACKER INDICATORS Alone and nervous. Loose and/or bulky clothing (may not fit weather condition). Exposed wire (possibly through sleeves). Rigid mid-section (explosive device or may be carrying a rifle) Tightened hands (may hold detonation device). 24 May 2015 SECURITY AWARENESS 14
15
SECURITY ROLES Access control Vetting of all guests and staff Manning the barrier Recording entries/exits Surveillance detecting equipments Checking entries/exits- by use of detectors Perimeter security Patrolling around the facility Parking control Reporting of suspicion persons. 24 May 2015 SECURITY AWARENESS 15
16
SCREENING OF PASSENGER/LUGGAGES. Change of screening procedure occasionally Terrorist disguising as christian,or any other person. Electronically screening of luggage 16
17
IED A switch/trigger; An initiator (fuze); Main charge (explosive fill); A power source for the switch/trigger; and A container. 17
18
Examples of IEDs 18
19
A briefcase? 19
20
BRIEFCASE IED 5/24/2015 SECURITY AWARENESS - 20
21
Suicide bomb vest SECURITY AWARENESS ) 24 May 2015
22
Suicide bomb vest cont’d SECURITY AWARENESS 24 May 2015
23
MAIN CHARGE 23
24
DETONATOR 24
25
IED’S RECOVERED IN SOMALI By KDF
26
Examples of Commercial Explosives Quarry Type) 26
27
IED -Cont IEDs are terrorists explosive devices of choice Terrorists are becoming more and more creative and tactical in the art of bomb making. Security agencies should think ahead of terrorists and come up with measures to detect and eliminate acquisition and transportation of explosives/weapons by terror individual(s) 27
28
Action to take on bomb explosion scene Evacuate, open doors and windows, keep area clear. Evacuation Distance – as far away as possible DO NOT TOUCH UNKNOWN ‘SUSPICIOUS’ ITEMS !! Call the nearest Police Station; Bomb squad Unit or Explosive Ordinance Disposal Team (EOD). SECURITY AWARENESS 24 May 2015 28
29
intervention Enhanced cooperation among security agencies to fight terrorism Capacity building – training 24 May 201529
30
VULNERABILITIES Availability of foreign interests in the country including foreign missions. The country’s geo-strategic location on the eastern coast of Africa along the Indian Ocean, Its porous borders particularly with Somalia where internal strife has made maintenance of security difficult Influx of Refugees 24 May 2015 SECURITY AWARENESS )30
31
CURRENT SITUATION Threats by Al-shabaab – Kenya a target Several Kenyan youth recruits of Al-shabaab Attacks perpetrated by radicalized hi-tech youth Increased use of shootings, grenades and IEDs Non-combatants the victims – crowds Open opportunities for terrorists - lapses 24 May 2015TERRORISM THREAT IN KENYA 31
32
END – THANK YOU ATPU CONTACTS HOTLINE – 0729999988 EMAIL – atpukenya@yahoo.comatpukenya@yahoo.com atpu@kenya.go.ke 24 May 2015 SECURITY AWARENESS 32
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.