Travel Reference
In-Depth Information
Exhibit 11.2
Mailroom Protocol
General
Letter or package bomb incidents have occurred at businesses, universities,
government offices and installations, and private residences. The motivation
for this kind of attack could include revenge, insurance fraud, and political or
environmental terrorism directed against a person or organization.
Using Mail as Bomb Delivery Method
Mail or package service can be a desirable tactic for terrorists or criminals for
several reasons:
Sending a bomb through the mail allows the attacker to strike a specific
target from a distance.
The mail or package can reach any target at any time.
The attack is delivered by an unwitting participant — the postman or parcel
delivery person.
It is very difficult to identify a suspicious item; it may appear to look like any
other piece of mail.
All of these factors make a mail attack desirable as there is a reduced risk of
capture and increased probability in the success of the attack.
Create a Plan
The main goal of a mail bomb security plan is to detect the weaponized letter
or package before it reaches the intended recipient. Therefore, companies
need to have a well-established screening procedure to limit the risk. A mail-
room protocol together with common sense and good judgment can achieve
the goal of reducing the level of vulnerability to this type of attack.
Important Elements to Include in the Plan
While creating a plan, you must differentiate between business mail, regu-
lar mail, and nonregular mail. Business mail and regular mail are received
on a routine basis from other businesses, clients, or customers. Nonregu-
lar mail gets the greatest degree of scrutiny.
When dealing with packages, it's important to create a way for employees
to notify security or mail personnel about the anticipated arrival of a pack-
age. The employee needs to provide information such as the recipient's
name, department, and phone number as well as the name of the sender,
the package contents, and its anticipated size.
(continues)
Search WWH ::




Custom Search