Presentation is loading. Please wait.

Presentation is loading. Please wait.

iWATCH Army Training for Contractors “See Something -- Say Something”

Similar presentations

Presentation on theme: "iWATCH Army Training for Contractors “See Something -- Say Something”"— Presentation transcript:

1 iWATCH Army Training for Contractors “See Something -- Say Something”
Trainer: Introduces self. Purpose: Inform the attendees of the purpose of the training -- to provide an overview of iWATCH Army, explain the importance, and provide some tools (handouts) for reference. Why is this training important? The threat of terrorist activity is persistent and enduring. The Army needs everyone’s help (including contractors) in protecting against the threat of terrorism. By understanding what iWATCH Army is, and having a base of knowing of the possible indicators of suspicious activity or behavior, every person can serve as an extra set of “eyes and ears” for law enforcement and security. If you see something suspicious -- report it! Instructor Note: Remember to document the training being conducted by capturing the date, time, location, and names of the personnel who attended the training along with the name of the instructor. Also, note there is a video at slide 5 which requires they projection system to have audio. iWATCH Army Training for Contractors “See Something -- Say Something” Unclassified Always Ready. Always Alert. Because someone is depending on you. Unclassified date

2 Training Objective Contractors and all associated subcontractors performing work on Army contracts must receive this training on the local iWATCH Army program. The objective of this training is to inform employees of the types of suspicious activity or behavior to watch for and instruct employees to report suspicious activity or behavior to the Contract Officer Representative (COR), military police, or local law enforcement. Training should be completed within 30 calendar days of contract award and within 5 calendar days of new employees’ commencing performance on active contracts (in the case of personnel changes). The results of the training shall be reported to the COR. Review the training objective information on the slide. Emphasize the training requirement is tied directly to the Army contract in which they support. Inform the audience that following completion of the training, documentation will be provided to the COR to substantiate the training was completed. Unclassified date

3 Training Topics Origin of iWATCH Army
iWATCH Army Public Service Announcement (PSA) Indicators of Suspicious Activity or Behavior “See Something Say Something” What to Report How to Report Source for Other Important Information Local Point of Contact These are the topics to discuss during the training. The subsequent slides will cover each of these areas. Unclassified date

4 Origin of iWATCH Army iWATCH Army is a nation-wide modern version of neighborhood watch designed to encourage and enable members of the Army community to help protect their community by identifying and reporting suspicious activity or behavior that may be associated with terrorist activities. The Passive element of iWATCH Army is individual situational awareness of the surroundings. The Active element of iWATCH Army involves individuals taking action to report suspicious activity or behavior to military police or local law enforcement for investigation. This slides covers the origin and background for the iWATCH Army program. iWATCH Army was launched world-wide on 1 August 2010 under the direction of Headquarters, Department of the Army. iWATCH Army is similar to other terrorism and crime watch programs throughout the Department of Defense (such as the U.S. Air Force’s Eagle Eyes) and other Federal and State law enforcement programs. In addition to hearing the term iWATCH, you may also hear people simply refer to the intent of the program as “See Something Say Something.” Meaning, if you see any activity or behavior that appear suspicious, report it to law enforcement or security. The term “Passive” means to be aware of your surroundings at all time so you can observe or hear any suspicious activity or behavior. The term “Active” means to take ACTION by reporting suspicious activity or behavior. Getting involved! Origin: Headquarters, Department of the Army, ALARACT Message 110/2010, Army Implementation of iWATCH (Terrorist Watch Program), 15 April 2010 Unclassified date

5 IWATCH Army PSA Before we jump into the details of what to look for (indicators of suspicious activity or behavior) we’ll take a minute to watch the iWATCH Army Public Service Announcement (PSA) released by the Department of the Army in March 2011. Instructor Note: Follow the instructions on the screen to run the 59 second video embedded in the slide. Place cursor inside black screen area. Control/play will appear at the bottom of the screen. Click (Play/Pause) to view the video. Unclassified date

6 Indicators of Suspicious Activity or Behavior (What to Report)
• Individuals drawing pictures or taking notes in an area not normally of interest to a tourist or showing unusual interest in or photographing security cameras, guard locations, or watching security reaction drills and procedures • Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or direction • Individuals who stay at bus or train stops for extended periods while buses and trains come and go • Individuals who order food at a restaurant and leave before the food arrives or who order without eating The next three (3) slides provide “indicators” of potential terrorist activity or behavior (the list is not all inclusive). Each of the bullets on this slide represent an example of possible pre-operational activities by terrorist groups (or their affiliates) These activities could represent threat personnel performing intelligence gathering activities to capture information on a potential terrorist target location (or multiple locations) Terrorist groups, as well as affiliates (or even individual actors radicalized by terrorist ideologies) may be conducting intelligence gathering activities on multiple potential targets (such as buildings, airports, transportation, key intersections, etc.). After gathering “target” intelligence these groups typically evaluate their various target options to assess the viability or likelihood of them accomplishing a successful attack against each of the various options. After evaluating their target options, the group typically sends back out more skilled intelligence personnel to refine target information prior to committing to detailed planning and an actual attack. Unclassified date

7 Indicators of Suspicious Activity or Behavior (What to Report)
• Joggers who stand and stretch for an inordinate amount of time • Individuals sitting in a parked car for an extended period of time • Individuals who don't fit into the surrounding environment because they are wearing improper attire for the location or season • Individuals who exhibit suspicious behavior, such as staring or quickly looking away from individuals or vehicles as they enter or leave facilities or parking area • People asking questions about security forces, security measures, or sensitive information Like the previous slide, each of these bullets represent examples of possible activities or behavior which may indicate early steps in the intelligence gathering stage of a terrorist group planning an attack. Some of these behaviors could actually be activities that immediately proceed the actual execution of an attack (which could follow within minutes, hours, or days). Example: Generally speaking there is very little logical reason for a person to openly ask questions about the security forces, security measures, or sensitive information unless they have some nefarious purpose in mind for asking the questions. Unclassified date

8 Indicators of Suspicious Activity or Behavior (What to Report)
• Briefcase, backpack, suitcase, or package left unattended • Vehicle parked in NO PARKING ZONES in front of an important building • People in restricted areas where they are not supposed to be • Chemical smells or fumes that worry you • People purchasing supplies or equipment that can be used to make bombs • People purchasing weapons or uniforms without proper credentials • Each of these bullets present examples of potential indicators of suspicious activity or behavior. • Bullets #1 and #2: These items and vehicles, if left unattended, could be bombs (examples: on April 15, 2013, Boston Marathon Bombers left two backpacks near the finish line which contained improvised explosive devices; on April 19, 1995 Timothy McVeigh parked a U-Haul rental vehicle next to the Alfred P. Murrah Federal Building which resulted in the bombing of the building in Oklahoma City). • Bullet #3: People in restricted areas where they should not be should always be reported (whether indoors, outdoors, or even if inside an already cleared facility but the person is in any area they don’t belong). • Bullets #4 and #5: These are possible precursors (or preparatory activities) to terrorists gathering the equipment, supplies, weapons, gear, and explosives they would need to execute an attack. Summary of Indicators Slides: These last three (3) slides provide you an idea of the types of indicators to look for. However, as mentioned they are not all inclusive. If you see, smell, or hear something that concerns you (“gut feel something is wrong”) then report it. Unclassified date

9 “See Something Say Something”
Where to Report: Military Police Local law enforcement Security forces Chain of Command Army Counterintelligence Contracting Officer Representative How to Report: • Date and time activity occurred • Where activity occurred • Physical descriptions of the people involved • Description of the vehicle(s) involved • What type of activity • Describe what you saw or heard • Provide pictures if you took any Where to Report and What to Report is critically important. Options of where you can and should report is listed on the left side. Do not allow your belief that what you are seeing/hearing “may be nothing” and prevent you from reporting; when in doubt REPORT, let law enforcement or security investigate and determine whether there is a risk. The information on the right side provides the type of information you should try to provide when reporting suspicious activity or behavior. Don’t worry if you don’t have all the pieces of information – report what you can. Caution: Do not put yourself in harms way to gather more information to report; do not risk being seen by the person(s) who you are observing. Simply report what you can as soon as possible and provide as much information as possible. Unclassified date

10 Source for Other Information
Examples of Information: Antiterrorism Awareness Training Individual Protective Measures Individual Awareness Tips Insider Threats Active Shooter Cyber Threats Risks Associated with Social Media As we complete this training, this slide provides you with information for additional resources. The website on the bottom of the slide (Army One Source) has a section titled “iWATCH Army/Antiterrorism” where you can find a wide range of unclassified awareness information on the subject of terrorism awareness and measures you can take to protect yourself. Examples of what you can find on the website are shown on the right side of the slide. Instructor Note: In addition to this slide recommend handing out the following materials which are available thru the local Antiterrorism Office or Antiterrorism Officer and is also available on the Army One Source website. Suspicious Activity Reporting Two-Panel Card iWATCH Army Business Card (with local number for reporting suspicious activity or behavior) iWATCH Army Brochure Indicators of potential insider threat Army OneSource (AOS) Website (select iWATCH Army / Antiterrorism logo on website) Unclassified date

11 Local Point of Contact Name: instructor complete prior to training
Phone: instructor complete prior to training instructor complete prior to training Instructor Note: “Personalize” this slide with the most appropriate contact information in the event anyone attending training has questions following the completion of the training. Unclassified date

12 ? Questions Instructors Notes:
End by answering questions from the attendees. Ensure all personnel attending the training have signed the attendance roster. Ensure you submit the attendance roster (accurately completed) to the appropriate COR or Gov’t client who directed the training Unclassified date

Download ppt "iWATCH Army Training for Contractors “See Something -- Say Something”"

Similar presentations

Ads by Google