Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Bomb threat


Published on

Published in: Education

Bomb threat

  1. 1. BOMB THREAT A bomb threat is an effective means of disrupting business.
  2. 2. <ul><li>The problems are intensified when the incident involves an </li></ul><ul><li>actual explosive or incendiary device.Although there is no </li></ul><ul><li>foolproof means of securing a premises against a bomb threat </li></ul><ul><li>(or bomb attack), a good security plan, correctly executed, </li></ul><ul><li>will enable a business to deal with an incident properly. </li></ul><ul><li>Bombs and the threat of their use have become the primary </li></ul><ul><li>weapon of the terrorist. They are also used as a means of </li></ul><ul><li>retaliation by employees with real or fancied grievances, as </li></ul><ul><li>well as by criminal extortionists. </li></ul>
  3. 3. <ul><li>Reasons: </li></ul><ul><li>1.Political and/or social unrest </li></ul><ul><li>2.Labour unrest </li></ul><ul><li>37% were preceded by a threatening note, letter, or telephone call to the establishment or individual target. </li></ul><ul><li>Financial institutions received some type of threat b4 the incident 72% of the time and commercial/retail establishments </li></ul><ul><li>58 % of the time. </li></ul><ul><li>Offices were warned 29% of the time, academic facilities 30%, and </li></ul><ul><li>Residential property owners were warned 18% of the time. </li></ul>
  4. 4. Purpose <ul><li>The caller has definite knowledge or believes that an explosive or incendiary device has been or willbe placed and may want to minimize personal injury or property damage. The caller may be either the person who placed the device or someone else who has become aware of such information </li></ul><ul><li>The caller wants to create an atmosphere of anxiety and panic which will, in turn, possibly result in a disruption of the normal activities at the facility where the device is purportedly located. </li></ul><ul><li>Panic personal injury and property damage </li></ul><ul><li>ultimate achievement of the caller - Panic </li></ul>
  5. 5. Responding To Bomb Threats <ul><li>Instruct Employees in what to do if a bomb threat call is received. </li></ul><ul><li>A calm response to the bomb threat caller could result in obtaining additional information. </li></ul><ul><li>Especially true if the caller wishes to avoid injuries or deaths. </li></ul><ul><li>If told that the building is occupied or cannot be evacuated in time, the bomb threat caller may be willing to give more specific information on the bomb’s location, components, or methods of initiation. </li></ul>
  6. 6. If Called – Actions to be performed <ul><li>Remain calm </li></ul><ul><li>Attempt to keep the caller on the line as long as possible. Ask him/her to repeat the message. Record every word spoken by the person and use the telephone bomb threat checklist (Attachment II). </li></ul><ul><li>*Ask for the exact location where bomb has been or </li></ul><ul><li>is going to be planted. </li></ul><ul><li>*Get as much information as possible about the </li></ul><ul><li>caller, e.g., vocal characteristic, race, sex, group </li></ul><ul><li>affiliation, why the bomb was placed. </li></ul><ul><li>*Clues from background noises, which might indicate </li></ul><ul><li>caller's identification and location. </li></ul><ul><li>Immediately after the caller hangs up, report the threat to 911 , your supervisor, and the Emergency Response Coordinator. </li></ul><ul><li>*Remain available, as law enforcement personnel will </li></ul><ul><li>want to interview you. </li></ul><ul><li>*Wait for further direction from the Emergency </li></ul><ul><li>Response Coordinator. </li></ul><ul><li>*Do not spread rumors </li></ul>
  7. 7. Written Received, Perform to be performed <ul><li>Remain calm. </li></ul><ul><li>Avoid handling it unnecessarily in order to preserve possible fingerprint(s), handwriting or typewriting, paper, and postal marks. These will prove essential in tracing the threat and identifying the writer. </li></ul><ul><li>While written messages are usually associated with generalized threats and extortion attempts, a written warning of a specific device may occasionally be received; it should never be ignored. </li></ul><ul><li>Contact the Emergency Response Coordinator. </li></ul><ul><li>Wait for further direction from the Emergency Response Coordinator. </li></ul><ul><li>Do not spread rumors </li></ul>
  8. 8. Physical Characteristics of Suspicious Packages and Letters Ticking sound Marked with restrictive endorsements, such as “Personal” or “Confidential” Excessive security material such as masking tape, string, etc. No return address discoloration or odor Excessive weight Oily stains Misspellings of common words Title, but no name Lopsided or uneven envelope Protruding wires or aluminum foil Handwritten or poorly typed addresses Incorrect titles Excessivepostage Foreign Mail, Air mail and Special Delivery Shows a city or state in the postmark that does not match the return address
  9. 9. Suspicious Object or Package Is Discovered <ul><li>Remain calm. </li></ul><ul><li>The finder must not disturb or move the suspected object. </li></ul><ul><li>Clear all persons from the immediate vicinity. </li></ul><ul><li>Call the Emergency Response Coordinator or 911 </li></ul><ul><li>Retreat to a safe distance and warn others to avoid the area. Be available to provide the whereabouts of the suspected object to the police. </li></ul><ul><li>Wait for further direction from the Emergency Response Coordinator. </li></ul><ul><li>Do not spread rumors </li></ul>
  10. 10. BOMB THREAT EVACUATION PROCEDURES <ul><li>The Emergency Response Coordinator will: </li></ul><ul><li>Notify 911 - make a decision to: </li></ul><ul><li>1. Ignore the threat </li></ul><ul><li>2. Search and Evacuate </li></ul><ul><li>3. Evacuate Immediately </li></ul><ul><li>If Search and Evacuate is warranted: </li></ul><ul><li>1.Emergency Response Coordinator notify by telephone all Assistant Emergency Response Coordinators who in turn contact Floor Monitors within their areas of responsibility. Instructions must be obeyed promptly. </li></ul><ul><li>2. suspicious items reported </li></ul><ul><li>3. Floor Monitors and Facilities Management personnel should check their assigned areas such as restrooms, office areas, stairwells, and other common areas. </li></ul><ul><li>4. Employees should check (SCAN) their immediate work area for any unusual or suspicious items as they leave their workstation. </li></ul>
  11. 11. <ul><li>If a suspicious object/item is located: Clear the area </li></ul><ul><li>where the suspicious object is located, and then evacuate the </li></ul><ul><li>rest of the building. </li></ul><ul><li>1.Employees should take all personal belongings with </li></ul><ul><li>them (i.e., car keys, coats, purse, and bags or backpacks). If a </li></ul><ul><li>suspect item is found, the employee may not return to the </li></ul><ul><li>building until it is found clear. This may take considerable </li></ul><ul><li>time. </li></ul><ul><li>2. All employees should exit through a designated </li></ul><ul><li>evacuation route that has been checked for any devices, and </li></ul><ul><li>proceed to their designated assembly area. </li></ul><ul><li>3.Parking lots and garages should be avoided, as they </li></ul><ul><li>may contain a vehicle bomb. </li></ul><ul><li>After the bomb disposal organization has disposed of the </li></ul><ul><li>suspicious object or verified that it is harmless, initiate action </li></ul><ul><li>to recall evacuees to their offices and work areas. </li></ul>
  12. 12. Types of actions considered essential are <ul><li>Planning and Inspecting </li></ul><ul><li>Suspicious Actions </li></ul><ul><li>Building Service Spaces </li></ul><ul><li>Stairwells and Restrooms </li></ul><ul><li>Key Control </li></ul><ul><li>After‑Hour Entry </li></ul>
  13. 13. FBI Bomb Threat Call Checklist <ul><li>Questions to Ask </li></ul><ul><li>Exact Wording of the Threat – Sex,Age,Race of caller, </li></ul><ul><li>Number at which call is received, Time & Date of call. </li></ul><ul><li>Caller's Voice – Calm,Angry,Excited,Slow. </li></ul><ul><li>Background Sounds - Street noises,Crockery,Voices,PA System,Music. </li></ul><ul><li>Threat Language - Well spoken, educated) ,Incoherent, Taped (message read by threat maker), Foul, Irrational. </li></ul>