National Academies Press: OpenBook
« Previous: Appendix K
Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×

L ''Be Aware for America" Survey

MEMORANDUM

September 16, 1997

TO:

Bob Pentz, Director, Western Region

CC:

Jim Keller, Director, Rocky Mountain Region

FROM:

Karen Duffala, Deputy Director, Rocky Mountain Region

SUBJECT:

Inquiry Regarding "Be Aware" Program

Regarding the "Be Aware" program and the attendant issues/concerns:

I conducted a brief survey of 16 agencies in 8 states of the Rocky Mountain Region that are either largely or totally rural in nature and have significant agricultural operations occurring within their jurisdictions. Agencies represented local police, sheriffs, and state enforcement organizations. Ten agencies responded for a return rate of 62.5 percent.

The following States and agencies were surveyed:

Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×

States

Agencies

Kansas

Lawrence Police Department; Leavenworth Police Department; Lenexa Police Department

Montana

Garfield County Sheriff's Office (Jordan); Lewis and Clark County Sheriff's Office (Helena)

New Mexico

State Department of Public Safety

Nebraska

Scottsbluff County Sheriff's Office

North Dakota

Burleigh County Sheriff's Office (Bismarck); State Bureau of Investigation

Oklahoma

Canadian County Sheriff's Office (Okla. City); Cleveland County Sheriff's Office (Okla. City); Grady County Sheriff's Office (Okla. City); Pottawatomie County Sheriff's Office (Okla. City); Shawnee Police Department

South Dakota

Sioux Falls Police Department

Wyoming

Cheyenne Police Department

The results are as follows:

SURVEY QUESTION

YES

NO

MAYBE

Aware of program?

1

9

0

Federal endorsement needed?

5

3

2

Federal mandate needed?

2

4*

4

Program needed in your area?

5

1

4

Program duplicates/interferes

 

 

 

with local program/customs?

0

9

1

* Comment added: "Too much federal involvement already."

The most glaring information revealed above is the lack of knowledge, familiarization, and/or awareness of the program by law enforcement personnel. While they are not the primary "target market" of this program, they are an integral part

Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×

of any follow-up that might occur subsequent to an unlawful event. I, too, share this lack of awareness so cannot speak to what all of the components of the program are. Therefore, I have many questions as to the more practical aspects of the program after a vendor's awareness has been raised. Issues such as:

  1. Calling local law enforcement while the person is still present or has just left the premises so there might be an opportunity to locate the person and conduct an investigation and, perhaps, prevent further criminal activity.

  2. What is the vendor supposed to do with the documents that have been saved? Stuffing them in a drawer without proper precaution could damage them for forensic purposes although the content would still be helpful. Vendors also need these documents for their own filing/tracking purposes. Is this a convenient process for them?

I applaud the industry's efforts to increase awareness and enhance public safety. In order to enhance the positive aspects of this program, I strongly recommend consideration of the following:

  1. Establish a partnership with national law enforcement organizations to increase their members' awareness of this program. The National Sheriff's Association and the International Association of Chiefs of Police would welcome the opportunity to review the program, make appropriate recommendations for enhancement, and enter into a joint support program. This program is a natural for such established public/law enforcement partnerships as "Crime Stoppers," "Neighborhood Watch" (and its many derivations), etc.

  2. Using the partnerships formed above, advertise the program to the general public. An additional purpose of public awareness programs is prevention. If a potential criminal is aware he/she is dealing with an informed community, they will seek other avenues to commit the crime or decide to not commit the crime. This also enhances the vendors' interest in continuing with the program. One of the biggest problems with volunteer prevention programs is the inability to measure what has been prevented. With little or no activity, participation rapidly drops off. Letting the public know they are the "eyes and ears" for each other and for law enforcement makes public safety everyone's responsibility.

  3. Solicit input from respected law enforcement professionals and prosecutors as to any additions/deletions needed in the program in order to optimize enforcement effectiveness.

Once the above issues have been addressed, I believe the issue of whether or not this program should be endorsed or mandated at the federal level will become a clearer issue.

Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×
Page 356
Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×
Page 357
Suggested Citation:"Appendix L." National Research Council. 1998. Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors. Washington, DC: The National Academies Press. doi: 10.17226/5966.
×
Page 358
Next: Appendix M »
Containing the Threat from Illegal Bombings: An Integrated National Strategy for Marking, Tagging, Rendering Inert, and Licensing Explosives and Their Precursors Get This Book
×
Buy Paperback | $80.00 Buy Ebook | $64.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In response to the rising concern of the American public over illegal bombings, the Bureau of Alcohol, Tobacco, and Firearms asked the National Research Council to examine possible mechanisms for reducing this threat. The committee examined four approaches to reducing the bombing threat: addition of detection markers to explosives for pre-blast detection, addition of identification taggants to explosives for post-blast identification of bombers, possible means to render common explosive materials inert, and placing controls on explosives and their precursors. The book makes several recommendations to reduce the number of criminal bombings in this country.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!