SlideShare a Scribd company logo
1 of 11
Download to read offline
E&S Technical Information                                                                                         1



Crime Prevention


Bomb Threat Management

Report Number: CP-95-10
Release Date: December 18, 1996
Section Title: Security Management



Abstract
Bombs and the threat of their use have become the primary weapons of the terrorist. They are also used as a
means of retaliation by employees with real or fancied grievances, as well as by criminal extortionists. This
report provides information on the general guidelines that can be used in developing a plan to reduce the risk of
bombing incidents. Information on handling bomb threats and procedures for evacuating a facility and
conducting bomb searches are also included.


Introduction
A bomb threat is an effective means of disrupting business. The problems are intensified when the incident
involves an actual explosive or incendiary device. Although there is no foolproof means of securing a premises
against a bomb threat (or bomb attack), a good security plan, correctly executed, will enable a business to deal
with an incident properly.

Bombs and the threat of their use have become the primary weapon of the terrorist. They are also used as a
means of retaliation by employees with real or fancied grievances, as well as by criminal extortionists.

This report provides information on the general guidelines that can be used in developing a plan to reduce the
risk of bombing incidents. Information on handling bomb threats and procedures for evacuating a facility and
conducting bomb searches are also included.



Bombing Incidents
The Federal Bureau of Investigation (FBI), in its 1994 Bombing Incidents, reported that there were 3,163 actual
and attempted bombing incidents reported to the FBI's Explosives Unit-Bomb Data Center in 1994, the latest
year for which data is available. This was a 6 percent increase over 1993 bombings (2,980).

The 1994 bombings injured 308 and killed 31 individuals. Damage to properties was estimated at $7.5 million.
The top five bombing targets were residential properties at 52 percent, commercial properties and vehicles both
at 11 percent, open areas at 7 percent, and academic facilities at 4 percent.

The use of explosives in bombings accounted for 77 percent of the incidents. The remaining 23 percent were
incendiary incidents. In 78 percent of the bombing incidents, the devices successfully detonated or ignited; 22
percent were unsuccessful. Explosive devices detonated as planned 79 percent of the time, and incendiary
devices detonated 75 percent of the time.

Four percent of actual or attempted bombings were preceded by a warning or a threat. Eighty-six percent of the
threats were verbal, and 14 percent were written.

Table 1 summarizes bombing incidents for the period 1984 through 1994.

Table 1. Bombing Incidents: 1984-1994

Statistic 1984    1985      1986     1987      1988     1989      1990     1991     1992      1993     1994




         COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                              2
Bomb Threat Management

Total    803       847       858       848       977       1208      1582     2499      2989      2980      3163
Actual 518         575       580       600       593       641       931      1551      1911      1880      1916
Explosiv
e
Incendia 127       102       129       104       156       203       267      423       582       538       545
ry
Attempts 118       113       101       102       161       243       254      395       348       375       522
Explosiv
e
Incendia 40        57        48        42        40        91        130      130       112       187       180
ry
Property 5.61      6.35      3.40      4.20      2.26      5.00      9.60     6.44      12.5      518*      7.5
Damage
($M)
Persons 112        144       185       107       145       202       222      230       349       1323*     308
Inujured
Deaths 6           28        14        21        20        11        27       29        26        49        31
[Footnot
e1 ]

There were 474 incidents involving the placement of hoax devices. Thirty-seven percent were preceded by a
threatening note, letter, or telephone call to the establishment or individual target. Financial institutions received
some type of threat before the incident 72 percent of the time and commercial/retail establishments 58 percent
of the time. Offices were warned 29 percent of the time, academic facilities 30 percent, and residential property
owners were warned 18 percent of the time.

Trends in bombing incidents can usually be linked to political and/or social unrest. For example, in the 30-
month period between May 1976 and December 1978, the Red Brigade, an Italian terrorist organization,
carried out bombing attacks against 10 computer centers because of their belief that "computers represent
instruments of the capitalist system." Recently, as a result of political unrest in the Middle East, terrorists have
threatened to bomb U.S. targets throughout the world.

Labor unrest is another example. A labor strike in Virginia in 1989 was the apparent reason for most of the
bombing incidents in that state. The FBI report notes that in fully one-half of all reported incidents in 1989,
strike-related matters were reported as probable motives. Also, when companies and organizations are forced
to reduce their manning levels as a means of cutting costs, some victims of these layoffs feel a sense of
bitterness and frustration against the organization that has "rejected" them. Often they resort to bomb threats
as a means of "revenge."

Narcotics have historically been linked to bombing incidents. In Kentucky, there were several cases in 1989 of
booby-trapped marijuana fields.

Car bombs, such as the ones that destroyed the federal building in Oklahoma City in April 1995 and damaged
New York City's World Trade Center building in February 1993, added a new dimension to terrorism in the U.S.
In response, the U.S. Department of Justice developed and published the Vulnerability Assessment of Federal
Facilities. This publication contains a set of 52 minimum security standards and recommendations for applying
the standards to federal buildings.



Purpose of a Bomb Threat
The only reasonable explanations for a call reporting that a bomb is to go off at a particular location are:

•   The caller has definite knowledge or believes that an explosive or incendiary device has been or will
    be placed and may want to minimize personal injury or property damage. The caller may be either the
    person who placed the device or someone else who has become aware of such information.



           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                           3
Bomb Threat Management

•   The caller wants to create an atmosphere of anxiety and panic which will, in turn, possibly result in a
    disruption of the normal activities at the facility where the device is purportedly located.

When a bomb threat call has been received, there will be a reaction to it. If the call is directed at a business
where there has been no organized, advance planning to handle such a threat, the call may result in panic.

Panic is defined as a "sudden, excessive, unreasoning, infectious terror." Panic is caused by fear - fear of the
known or the unknown. It is one of the most contagious of all human emotions. Panic can also be defined, in
the context of a bomb threat call, as the ultimate achievement of the caller.

Once a state of panic has been reached, the potential for personal injury and property damage is dramatically
increased. Emergency and essential facilities may be shut down or abandoned and the community denied their
use at a critical time.

Leaving facilities unattended can lead to destruction of the facility and the surrounding area. Large chemical
manufacturing plants, power plants, unattended boilers, and other such facilities often require the constant
attention of operating personnel.

Other effects of not being prepared, or not having an organized plan to handle bomb threat calls, can result in a
lack of confidence in the leadership. This will be reflected in lower morale and productivity, or reluctance on the
part of employees to continue employment at a location that is being subjected to bomb threat calls.



Preparation
Lines of organization and plans must be made in advance to handle bomb threats. Clear-cut levels of authority
must be established. By having established procedures, a bomb threat can be handled with the least risk,
instilling confidence in employees and eliminating panic.

In planning, a control center or command post should be designated. This control center should be located in
the switchboard room or other focal point of telephone or radio communications. The management personnel
assigned to operate the control center should have decision-making authority on the action to be taken during
the threat. Only those with assigned duties should be permitted in the control center. Provision should be made
for substitutes in the event someone is absent when the threat is received.

A vulnerability assessment of the facility or building and an estimate of the risk of attack must be made. The
purpose of this evaluation is to assure that security plans are appropriate to the area being protected, to serve
as a basis on which to formulate a security plan that is proportional to the existing or potential risk, and to
provide for updating or revising plans to include appropriate countermeasures for new hazards.

An examination of the physical security of the facility should be made to determine how vulnerable it is to a
bombing attack. Some facilities, due to their physical layout, are inherently more vulnerable. A potential bomber
must, in most cases, situate the explosive device on the premises. Therefore, control of access to the premises
is the cornerstone of a security plan.

The following recommendations are intended as guidelines in developing a plan to handle bomb threats and
incidents:

•   Contact the police, fire department, or other local governmental agencies to determine whether any
    has a bomb disposal unit. Under what conditions is the bomb disposal unit available? What is the
    telephone number? How can the services of the bomb disposal unit be obtained in the event of a
    bomb threat? Will the bomb disposal unit assist in the physical search of the building, or will they only
    disarm or remove explosives?

•   Develop a positive means of identifying personnel and controlling access to the facility.

•   Establish strict procedures for control and inspection of packages and material entering critical areas.




           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                      4
Bomb Threat Management

•   Inspect the building to determine which areas explosives are likely to be concealed. Locations to be
    considered include: elevator shafts; ceiling areas; rest rooms; crawl spaces in rest rooms; utility
    closets for plumbing, electrical and other services; closet areas; spaces under stairwells; boiler
    (furnace) rooms; storage areas; utility areas for main switches and valves for electricity, gas, and fuel;
    indoor trash receptacles; record storage areas; mail rooms; ceiling lights with easily removable
    panels; and fire hose racks. While this list is not complete, it provides suggestions of where a time-
    delayed explosive or an incendiary device may be concealed.

•   Instruct security and maintenance personnel to make periodic checks of all rest rooms, stairwells,
    under stairwells, and other key areas of the building to assure that unauthorized personnel are not
    hiding in the building.

•   Provide adequate protection for classified documents, proprietary information, and other records
    essential to the operation of the business. A well-planted, properly charged device could, upon
    detonation, destroy those records needed in day-to-day operations.

•   Instruct all personnel in the procedures to be followed in the event a bomb threat is received. As a
    minimum, every telephone operator or receptionist should be trained to respond calmly to a bomb
    threat call.

•   In addition, it is always desirable that more than one person listen in on the call. To do this, have a
    covert signaling system, perhaps a coded buzzer signal, to a second reception point. A calm
    response to the bomb threat could result in getting additional information. This is especially true if the
    caller wishes to avoid injuries or deaths. If told that the building is occupied or cannot be evacuated in
    time, the bomber may be willing to give more specific information on the bomb's location.

•   Organize and train an evacuation unit. The organization and training of this unit should be
    coordinated with other tenants of the building.

    The evacuation unit should be trained on how to evacuate the building during a bomb threat.
    Evacuation training is usually available from police, fire, or other units within the community.

    If the facility is in a multi-tenant building, obligations to other tenants in the building must be
    considered. Legal, moral, and ethical considerations will have an impact on what is communicated to
    neighbors.

•   Develop a plan for conducting a bomb search. Consult with the police, fire department, or other local
    authority to determine who will conduct the search. In most cases, because of their familiarity with the
    facility, the search is best conducted by company/building personnel; this requires that they be trained
    properly in search techniques. The police or fire department may be available to assist in the training
    or be able to advise as to who can provide the training.

•   Consider arranging for temporary relocation of facilities in the event of an explosion and the building
    being determined to be unsafe.



Handling a Bomb Threat
In April 1996, Texas City, Texas, was virtually shut down from a bomb scare. A caller to 911 said that seven
bombs had been planted at area chemical plants, that three were dummies, and that four would explode at 6
p.m. on the following day, which was the first anniversary of the Oklahoma City bombing. The harbor was
cleared (seven ships and 21 barges were sent out of the port) and a search of the area's chemical plants
conducted. Some residents fled the city before the caller's deadline. Three dummy bombs, but no real bombs,
were later found.




           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                            5
Bomb Threat Management

Under most circumstances, because of the difficulty in discriminating in advance between a threat which is
credible and one which is not, the response is the same - all threats must be taken seriously and properly
addressed. On the other hand, a business must decide if it is feasible to evacuate a building every time a threat
is received.


Telephone Threats
When a bomb threat is called in, the procedures listed hereafter should be followed:

•   Keep the caller on the line and attempt to get as much information as possible. Ask for the message
    to be repeated to confirm it. If possible, record the message.

•   If the caller does not indicate the location of the bomb or the time of possible detonation, ask for this
    information.

•   Inform the caller that the building is occupied and the detonation of a bomb could result in death or
    serious injury to many innocent people.

•   Pay particular attention to background noises which may give a clue as to the location of the caller.

•   Listen closely to the voice (male or female), voice quality (calm or excited), accents, and speech
    impediments. Immediately after the caller hangs up, report the call to the person designated by
    management to receive such information. Law enforcement personnel will want to talk first-hand with
    the person who received the call.

•   Report the threat immediately to the appropriate agencies, such as the police or fire department or
    FBI.

To assist the individual receiving the call, a bomb threat call checklist of the type illustrated in Appendix A,
which was prepared by the FBI Bomb Data Center, should be kept nearby.


Written Threats
While written messages are usually associated with generalized threats and extortion attempts, a written
warning of a specific device may occasionally be received. It should never be ignored. When a written threat is
received, the procedures listed below should be followed:

•   Save all materials, including any envelope or container. Once the message is recognized as a bomb
    threat, further unnecessary handling should be avoided.

•   Every possible effort must be made to retain evidence, such as fingerprints, handwriting or
    typewriting, paper, and postal marks, which are essential to tracing the threat and identifying the
    writer.


Mail and Package Bombs
In 1989, a series of letter bombings, believed to be racially motivated, resulted in several casualties, including
fatalities. On December 16, 1989, a U.S. Court of Appeals Judge in Alabama was killed instantly and his wife
injured when a package exploded when it was opened in their residence.

Two days later, a Georgia attorney was killed in a similar incident. On the same day, in related attacks, a U.S.
courthouse in Atlanta and the headquarters of the National Association for the Advancement of Colored People
(NAACP) in Jacksonville, Florida, were the targets of attempted bombings.

These attacks spawned copycat bombings, as well as renewed interest in letter and package bombs. In
response to these attacks, the FBI Bomb Data Center developed the following letter and package bomb
indicators and recognition points:




           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                              6
Bomb Threat Management

•   Excessive postage

•   Incorrect titles

•   Titles but no names

•   Misspellings of common words

•   Oily stains or discoloration

•   No return address

•   Excessive weight

•   A rigid envelope

•   Lopsided or an uneven envelope

•   A strange odor

•   Protruding wires or tinfoil

•   Visual distractions

•   Foreign mail, air mail, and special delivery

•   Restrictive markings, such as confidential and personal

•   Hand written or poorly typed messages

•   Excessive securing material, such as masking tape and string

In the Atlanta courthouse incident, routine X-ray screening of incoming mail revealed that the package
contained a pipe bomb. A bomb disposal unit was called and the bomb was removed without incident. Bomb
and metal detection equipment available today employ various technologies to find dangerous objects, and an
investment in such equipment is a function of an assessment of the seriousness of the threat posed to the
business.



The Decision to Evacuate
The most serious of all decisions to be made by management in the event of a bomb threat is evacuation or
non-evacuation of the building. If bomb threats are occurring frequently, management cannot be expected to
evacuate the facility after every threat. All bomb threats present an element of risk, and as such, decisions
must be made during the planning phase as to when an evacuation is ordered.

Management may pronounce a carte blanche policy that, in the event of a bomb threat, evacuation will be
affected immediately. This decision circumvents the calculated risk and gives prime consideration for the safety
of personnel in the building. This can result in production downtime and can be costly if the threat is a hoax.

The alternative is for management to make the decision regarding evacuation when the threat is received. In
this scenario, time is the critical factor. If the time until detonation is determined to be, for example, less than
half an hour, an evacuation should be conducted immediately. If the time until detonation is determined to be
greater than half an hour, then a search of the area should be conducted. If the search uncovers a suspicious
package, then an evacuation is ordered and the bomb disposal unit contacted; if no package is found,
management may decide not to evacuate.




           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                            7
Bomb Threat Management

If the police, fire department, or other local authority receives the bomb threat and orders an evacuation of the
facility, then an evacuation should be conducted immediately. A 30-minute time period is recommended on the
assumption that the size of the area allows for a search to be conducted in such a time period. When properly
planned and managed, most buildings can be searched in this time. If the area cannot be adequately searched
in 30 minutes, however, then a greater time period should be set.

If the threat is from a prominent subversive group that has been linked to recent bombings, then an evacuation
may be considered regardless of the circumstances.

If the caller provides an indication of the location of the bomb, then those departments or floors affected by the
bomb should be evacuated. In high-rise buildings, the two floors below and the two floors above the threatened
floor should be evacuated. If there is no indication as to the location of the bomb, and the threat is determined
to be legitimate, then the entire building may have to be evacuated.



Evacuation
The people in the building should be evacuated to a safe distance from the building to protect them against
debris and other flying objects in the event of an explosion. In highly congested areas, it is usually
recommended that a mutual assistance agreement be arranged with another company which would allow for
evacuation of employees to another building. If the location of the suspected bomb is known, evacuation routes
will have to be determined so as to lead people away from the bomb.

Once the building is evacuated, controls should be established to prevent unauthorized access to the building.
If proper coordination has been arranged with the local police or other agencies, this may assist in establishing
controls to prevent reentry until the danger has passed.

Where possible, all doors and windows should be opened to permit the blast wave to escape in the event of an
explosion. When the building has been evacuated, all gas and fuel lines should be turned off at the main valve.
All electrical equipment should be turned off prior to evacuation. The decision to turn off electrical power at the
main switch should be made by management with consideration given to lighting requirements of search
teams.



Bomb Searches
Although, from a liability standpoint, it may be preferred that bomb searches be conducted by the police or fire
department, from a practicality standpoint, search teams made up of properly trained company/building
personnel are usually the better choice. This is because the police or fire department will often be unfamiliar
with the facility and may not be trained in bomb search techniques, and the time it would take them to respond
to an emergency call could be better spent in conducting a search.

The evacuation unit may be trained in search techniques; however, a separate search unit made up of search
teams for specific areas is preferred. Volunteer personnel should be solicited for this function. To be proficient
in searching the building, search personnel must be thoroughly familiar with all hallways, rest rooms, false
ceiling areas, and other locations in the building where an explosive or incendiary device may be concealed. A
search team for an area should consist of people who work in that area, since they are usually more familiar
with the surroundings and know what belongs and does not belong there.

The search unit should be trained only in search techniques and not in the techniques of neutralizing,
removing, or otherwise having contact with the device. If a device is located, it should not be disturbed. The
following recommendations apply:

•   Do not touch a strange or suspicious object. Its location and description should be reported to the
    person designated to receive this information.

•   The removal and disarming of a bomb or suspicious object should be left to professionals in explosive
    ordinance disposal. Who these professionals are and how to contact them for assistance should be
    included in the bomb threat plan.



           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                             8
Bomb Threat Management

•   Once the danger zone is determined, the area should be blocked off or barricaded with a clear zone
    of three hundred feet until the object has been removed or disarmed.

•   During a search of the building, a rapid two-way communication system is of utmost importance.
    Such a system can be readily established through existing installed telephones. Caution: The use of
    radios or other wireless devices during a search can be dangerous. The radio transmission energy
    can cause premature detonation of an electric initiator (blasting cap).

•   During the search, medical personnel should be alerted to stand by in case of an accident caused by
    the explosion of the device.

•   Fire brigade personnel should be alerted to stand by.



Summary
Planning efforts for bomb threats begin with a vulnerability assessment of the facility. An estimate of the risk of
attack is required, based on the type of business, its location, past threats, and current trends.

Management must establish procedures before an incident occurs, so that a bomb threat can be handled with
the least risk of creating panic. Employees must be trained in the proper procedures to follow in handling bomb
threats, conducting bomb searches and evacuating a building.

In the past, the majority of bomb threats turned out to be hoaxes. However, today more of the threats are
materializing. Thus, management's first consideration must be for the safety of people. It is practically
impossible to determine immediately whether a bomb threat is real or a hoax.



Appendix A - FBI Bomb Threat Call Checklist
Bomb Threat Card: Place this card under your telephone.


Questions to Ask
•   1. When is bomb going to explode?

•   2. Where is it right now?

•   3. What does it look like?

•   4. What kind of bomb is it?

•   5. What will cause it to explode?

•   6. Did you place the bomb?

•   7. Why?

•   8. What is your address?

•   9. What is your name?


Exact Wording of the Threat
•   Sex of caller.

•   Race of caller



           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                      9
Bomb Threat Management

•   Age of caller.

•   Number at which call is received.

•   Time of call.

•   Date of call.


Caller's Voice
•   Calm.

•   Angry.

•   Excited.

•   Slow.

•   Rapid.

•   Soft.

•   Loud.

•   Laughter.

•   Crying.

•   Normal.

•   Distinct.

•   Slurred.

•   Nasal.

•   Stutter.

•   Lisp.

•   Raspy.

•   Deep.

•   Ragged.

•   Cleaning throat.

•   Deep breathing.

•   Cracking voice.

•   Disguised.

•   Accent.

•   Familiar (who did it sound like?)




             COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                       10
Bomb Threat Management

•   Whispered.


Background Sounds
•   Street noises.

•   Crockery.

•   Voices.

•   PA System.

•   Music.

•   House noises.

•   Motor.

•   Office machinery.

•   Factory machinery.

•   Animal noises.

•   Clear.

•   Static.

•   Local.

•   Long distance.

•   Other.


Threat Language
•   Well spoken (educated).

•   Incoherent.

•   Taped (message read by threat maker?)

•   Foul.

•   Irrational.


Remarks
Report call immediately to: [_______]
Phone number: [_______]
Date: [_______]
Name: [_______]
Position: [_______]
Phone Number: [_______]




              COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
E&S Technical Information                                                                                     11
Bomb Threat Management


References
•   1. Cornitius, Tim. "Bomb Threats Shake Up South Texas." Chemical Week 1 May 1996.

•   2. Department of Justice. Vulnerability Assessment of Federal Facilities. Washington, DC: United
    States Marshals Service, 1995.

•   3. Department of Justice. Federal Bureau of Investigation. 1994 Bombing Incidents. General
    Information Bulletin 95-2. Washington, DC: The FBI Explosives Unit-Bomb Data Center, 1995.

•   4. Department of Justice. Federal Bureau of Investigation. Bomb Security Incident Guidelines (2).
    General Information Bulletin 84-1. Washington, DC: FBI Bomb Data Center, 1984.

•   5. Russo, Robert J. "Planning for Damage Control." Security Management 33.9 (1989): 97-99.

•   6. Slahor, Stephanie, Ph.D. "Bombs and Bomb Threats: Have A Response Plan." Access Control
    39.10 (1996): 37-38.



Footnotes
•
              1
    Footnote The 1993 damage figures include $510 million damage to the World Trade Center building
    by a bomb on February 26, 1993. The persons injured figure for 1993 includes the 1,042 persons who
    were injured in the same incident.


COPYRIGHT ©2000, Insurance Services Office, Inc.

The information contained in this publication was obtained from sources believed to be reliable. Insurance
Services Office, Inc., its companies and employees make no guarantee of results and assume no liability in
connection with either the information herein contained or the safety suggestions herein made. Moreover, it
cannot be assumed that every acceptable safety procedure is contained herein or that abnormal or unusual
circumstances may not warrant or require further or additional procedure.




           COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM

More Related Content

Viewers also liked

Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Global terrorism
Global terrorism Global terrorism
Global terrorism namaniitian
 

Viewers also liked (7)

Terrorism
TerrorismTerrorism
Terrorism
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Terrorism
TerrorismTerrorism
Terrorism
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Bomb threat
Bomb threatBomb threat
Bomb threat
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Global terrorism
Global terrorism Global terrorism
Global terrorism
 

Similar to Bomb threatmanagement

Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalredacooil
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalredacooil
 
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...Raveem Ismail
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustryLawrence Nagazina
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industryNumaan Huq
 
Risk management in the movies
Risk management in the moviesRisk management in the movies
Risk management in the moviesGarrett Conti
 
Loss Causation And Analysis.pptx
Loss Causation And Analysis.pptxLoss Causation And Analysis.pptx
Loss Causation And Analysis.pptxCheDillon1
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard GarrityRichard Garrity
 
Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278dflora
 
Exact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - WhitepaperExact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - WhitepaperNIIT Technologies
 
GuzmanRocio_RiskManagementWorksheet.pdf
GuzmanRocio_RiskManagementWorksheet.pdfGuzmanRocio_RiskManagementWorksheet.pdf
GuzmanRocio_RiskManagementWorksheet.pdfRocioGuzmanPerez
 
Hsse safety iceberg theory gp
Hsse safety iceberg theory gpHsse safety iceberg theory gp
Hsse safety iceberg theory gpNoor Ezlina
 
Any emergency situation forces trauma into the mind and heart of .docx
Any emergency situation forces trauma into the mind and heart of .docxAny emergency situation forces trauma into the mind and heart of .docx
Any emergency situation forces trauma into the mind and heart of .docxjustine1simpson78276
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docxRAHUL126667
 
Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27David Palella
 
Protecting People and Property Against Drone Threats
Protecting People and Property Against Drone ThreatsProtecting People and Property Against Drone Threats
Protecting People and Property Against Drone ThreatsNovoQuad
 
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docx
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docxWORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docx
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docxambersalomon88660
 

Similar to Bomb threatmanagement (20)

Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...
JohansmeyerIsmailArtemisBm2016 - On An Optimal Threshold For Terrorism Indust...
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
Risk management in the movies
Risk management in the moviesRisk management in the movies
Risk management in the movies
 
Loss Causation And Analysis.pptx
Loss Causation And Analysis.pptxLoss Causation And Analysis.pptx
Loss Causation And Analysis.pptx
 
Disaster
DisasterDisaster
Disaster
 
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt  Part IV- Bomb Threat Response- Richard GarritySkyscraper Security Mgt  Part IV- Bomb Threat Response- Richard Garrity
Skyscraper Security Mgt Part IV- Bomb Threat Response- Richard Garrity
 
Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278
 
Exact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - WhitepaperExact Catastrophe Exposure Management - Whitepaper
Exact Catastrophe Exposure Management - Whitepaper
 
GuzmanRocio_RiskManagementWorksheet.pdf
GuzmanRocio_RiskManagementWorksheet.pdfGuzmanRocio_RiskManagementWorksheet.pdf
GuzmanRocio_RiskManagementWorksheet.pdf
 
Hsse safety iceberg theory gp
Hsse safety iceberg theory gpHsse safety iceberg theory gp
Hsse safety iceberg theory gp
 
Any emergency situation forces trauma into the mind and heart of .docx
Any emergency situation forces trauma into the mind and heart of .docxAny emergency situation forces trauma into the mind and heart of .docx
Any emergency situation forces trauma into the mind and heart of .docx
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
C H A P T E R  1 4        Risk Management and Worker Protec ti.docxC H A P T E R  1 4        Risk Management and Worker Protec ti.docx
C H A P T E R 1 4 Risk Management and Worker Protec ti.docx
 
Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27Emp.Defense.Council.Li.2011.10.27
Emp.Defense.Council.Li.2011.10.27
 
Protecting People and Property Against Drone Threats
Protecting People and Property Against Drone ThreatsProtecting People and Property Against Drone Threats
Protecting People and Property Against Drone Threats
 
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance MarketMark Lynch - Importance of Big Data and Analytics for the Insurance Market
Mark Lynch - Importance of Big Data and Analytics for the Insurance Market
 
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docx
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docxWORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docx
WORK & STRESS, 1998, VOL. 12, NO. 3 293-306 Achieving a sa.docx
 

More from Ehab El Barbary

More from Ehab El Barbary (20)

Train the trainer attendance certificate
Train the trainer attendance certificateTrain the trainer attendance certificate
Train the trainer attendance certificate
 
Train the trainer-pass certificate
Train the trainer-pass certificateTrain the trainer-pass certificate
Train the trainer-pass certificate
 
Fire extinguisher training
Fire extinguisher trainingFire extinguisher training
Fire extinguisher training
 
Fire pumps
Fire pumpsFire pumps
Fire pumps
 
Fire life
Fire lifeFire life
Fire life
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Customer services.
Customer services.Customer services.
Customer services.
 
Criss mangment
Criss mangmentCriss mangment
Criss mangment
 
Contents administration & general
Contents   administration & generalContents   administration & general
Contents administration & general
 
Certficate
CertficateCertficate
Certficate
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Building evac flow chart
Building evac flow chartBuilding evac flow chart
Building evac flow chart
 
Atf bomb threats
Atf bomb threatsAtf bomb threats
Atf bomb threats
 
Appendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spaAppendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spa
 
Apartment patrol scan last
Apartment patrol scan lastApartment patrol scan last
Apartment patrol scan last
 
Alert levels to staff bomb threat.doc11
Alert levels   to staff bomb threat.doc11Alert levels   to staff bomb threat.doc11
Alert levels to staff bomb threat.doc11
 
Action plan for the new cctv operators
Action plan for the new cctv operatorsAction plan for the new cctv operators
Action plan for the new cctv operators
 
Action plan for ss
Action plan for ssAction plan for ss
Action plan for ss
 
Accidenclub car
Accidenclub carAccidenclub car
Accidenclub car
 
444444444444
444444444444444444444444
444444444444
 

Recently uploaded

Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Muhammad Shamsaddin Megalommatis
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership Award
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership AwardN. Chandrababu Naidu Receives Global Agriculture Policy Leadership Award
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership Awardsrinuseo15
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 

Recently uploaded (20)

Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership Award
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership AwardN. Chandrababu Naidu Receives Global Agriculture Policy Leadership Award
N. Chandrababu Naidu Receives Global Agriculture Policy Leadership Award
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 

Bomb threatmanagement

  • 1. E&S Technical Information 1 Crime Prevention Bomb Threat Management Report Number: CP-95-10 Release Date: December 18, 1996 Section Title: Security Management Abstract Bombs and the threat of their use have become the primary weapons of the terrorist. They are also used as a means of retaliation by employees with real or fancied grievances, as well as by criminal extortionists. This report provides information on the general guidelines that can be used in developing a plan to reduce the risk of bombing incidents. Information on handling bomb threats and procedures for evacuating a facility and conducting bomb searches are also included. Introduction A bomb threat is an effective means of disrupting business. The problems are intensified when the incident involves an actual explosive or incendiary device. Although there is no foolproof means of securing a premises against a bomb threat (or bomb attack), a good security plan, correctly executed, will enable a business to deal with an incident properly. Bombs and the threat of their use have become the primary weapon of the terrorist. They are also used as a means of retaliation by employees with real or fancied grievances, as well as by criminal extortionists. This report provides information on the general guidelines that can be used in developing a plan to reduce the risk of bombing incidents. Information on handling bomb threats and procedures for evacuating a facility and conducting bomb searches are also included. Bombing Incidents The Federal Bureau of Investigation (FBI), in its 1994 Bombing Incidents, reported that there were 3,163 actual and attempted bombing incidents reported to the FBI's Explosives Unit-Bomb Data Center in 1994, the latest year for which data is available. This was a 6 percent increase over 1993 bombings (2,980). The 1994 bombings injured 308 and killed 31 individuals. Damage to properties was estimated at $7.5 million. The top five bombing targets were residential properties at 52 percent, commercial properties and vehicles both at 11 percent, open areas at 7 percent, and academic facilities at 4 percent. The use of explosives in bombings accounted for 77 percent of the incidents. The remaining 23 percent were incendiary incidents. In 78 percent of the bombing incidents, the devices successfully detonated or ignited; 22 percent were unsuccessful. Explosive devices detonated as planned 79 percent of the time, and incendiary devices detonated 75 percent of the time. Four percent of actual or attempted bombings were preceded by a warning or a threat. Eighty-six percent of the threats were verbal, and 14 percent were written. Table 1 summarizes bombing incidents for the period 1984 through 1994. Table 1. Bombing Incidents: 1984-1994 Statistic 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 2. E&S Technical Information 2 Bomb Threat Management Total 803 847 858 848 977 1208 1582 2499 2989 2980 3163 Actual 518 575 580 600 593 641 931 1551 1911 1880 1916 Explosiv e Incendia 127 102 129 104 156 203 267 423 582 538 545 ry Attempts 118 113 101 102 161 243 254 395 348 375 522 Explosiv e Incendia 40 57 48 42 40 91 130 130 112 187 180 ry Property 5.61 6.35 3.40 4.20 2.26 5.00 9.60 6.44 12.5 518* 7.5 Damage ($M) Persons 112 144 185 107 145 202 222 230 349 1323* 308 Inujured Deaths 6 28 14 21 20 11 27 29 26 49 31 [Footnot e1 ] There were 474 incidents involving the placement of hoax devices. Thirty-seven percent were preceded by a threatening note, letter, or telephone call to the establishment or individual target. Financial institutions received some type of threat before the incident 72 percent of the time and commercial/retail establishments 58 percent of the time. Offices were warned 29 percent of the time, academic facilities 30 percent, and residential property owners were warned 18 percent of the time. Trends in bombing incidents can usually be linked to political and/or social unrest. For example, in the 30- month period between May 1976 and December 1978, the Red Brigade, an Italian terrorist organization, carried out bombing attacks against 10 computer centers because of their belief that "computers represent instruments of the capitalist system." Recently, as a result of political unrest in the Middle East, terrorists have threatened to bomb U.S. targets throughout the world. Labor unrest is another example. A labor strike in Virginia in 1989 was the apparent reason for most of the bombing incidents in that state. The FBI report notes that in fully one-half of all reported incidents in 1989, strike-related matters were reported as probable motives. Also, when companies and organizations are forced to reduce their manning levels as a means of cutting costs, some victims of these layoffs feel a sense of bitterness and frustration against the organization that has "rejected" them. Often they resort to bomb threats as a means of "revenge." Narcotics have historically been linked to bombing incidents. In Kentucky, there were several cases in 1989 of booby-trapped marijuana fields. Car bombs, such as the ones that destroyed the federal building in Oklahoma City in April 1995 and damaged New York City's World Trade Center building in February 1993, added a new dimension to terrorism in the U.S. In response, the U.S. Department of Justice developed and published the Vulnerability Assessment of Federal Facilities. This publication contains a set of 52 minimum security standards and recommendations for applying the standards to federal buildings. Purpose of a Bomb Threat The only reasonable explanations for a call reporting that a bomb is to go off at a particular location are: • The caller has definite knowledge or believes that an explosive or incendiary device has been or will be placed and may want to minimize personal injury or property damage. The caller may be either the person who placed the device or someone else who has become aware of such information. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 3. E&S Technical Information 3 Bomb Threat Management • The caller wants to create an atmosphere of anxiety and panic which will, in turn, possibly result in a disruption of the normal activities at the facility where the device is purportedly located. When a bomb threat call has been received, there will be a reaction to it. If the call is directed at a business where there has been no organized, advance planning to handle such a threat, the call may result in panic. Panic is defined as a "sudden, excessive, unreasoning, infectious terror." Panic is caused by fear - fear of the known or the unknown. It is one of the most contagious of all human emotions. Panic can also be defined, in the context of a bomb threat call, as the ultimate achievement of the caller. Once a state of panic has been reached, the potential for personal injury and property damage is dramatically increased. Emergency and essential facilities may be shut down or abandoned and the community denied their use at a critical time. Leaving facilities unattended can lead to destruction of the facility and the surrounding area. Large chemical manufacturing plants, power plants, unattended boilers, and other such facilities often require the constant attention of operating personnel. Other effects of not being prepared, or not having an organized plan to handle bomb threat calls, can result in a lack of confidence in the leadership. This will be reflected in lower morale and productivity, or reluctance on the part of employees to continue employment at a location that is being subjected to bomb threat calls. Preparation Lines of organization and plans must be made in advance to handle bomb threats. Clear-cut levels of authority must be established. By having established procedures, a bomb threat can be handled with the least risk, instilling confidence in employees and eliminating panic. In planning, a control center or command post should be designated. This control center should be located in the switchboard room or other focal point of telephone or radio communications. The management personnel assigned to operate the control center should have decision-making authority on the action to be taken during the threat. Only those with assigned duties should be permitted in the control center. Provision should be made for substitutes in the event someone is absent when the threat is received. A vulnerability assessment of the facility or building and an estimate of the risk of attack must be made. The purpose of this evaluation is to assure that security plans are appropriate to the area being protected, to serve as a basis on which to formulate a security plan that is proportional to the existing or potential risk, and to provide for updating or revising plans to include appropriate countermeasures for new hazards. An examination of the physical security of the facility should be made to determine how vulnerable it is to a bombing attack. Some facilities, due to their physical layout, are inherently more vulnerable. A potential bomber must, in most cases, situate the explosive device on the premises. Therefore, control of access to the premises is the cornerstone of a security plan. The following recommendations are intended as guidelines in developing a plan to handle bomb threats and incidents: • Contact the police, fire department, or other local governmental agencies to determine whether any has a bomb disposal unit. Under what conditions is the bomb disposal unit available? What is the telephone number? How can the services of the bomb disposal unit be obtained in the event of a bomb threat? Will the bomb disposal unit assist in the physical search of the building, or will they only disarm or remove explosives? • Develop a positive means of identifying personnel and controlling access to the facility. • Establish strict procedures for control and inspection of packages and material entering critical areas. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 4. E&S Technical Information 4 Bomb Threat Management • Inspect the building to determine which areas explosives are likely to be concealed. Locations to be considered include: elevator shafts; ceiling areas; rest rooms; crawl spaces in rest rooms; utility closets for plumbing, electrical and other services; closet areas; spaces under stairwells; boiler (furnace) rooms; storage areas; utility areas for main switches and valves for electricity, gas, and fuel; indoor trash receptacles; record storage areas; mail rooms; ceiling lights with easily removable panels; and fire hose racks. While this list is not complete, it provides suggestions of where a time- delayed explosive or an incendiary device may be concealed. • Instruct security and maintenance personnel to make periodic checks of all rest rooms, stairwells, under stairwells, and other key areas of the building to assure that unauthorized personnel are not hiding in the building. • Provide adequate protection for classified documents, proprietary information, and other records essential to the operation of the business. A well-planted, properly charged device could, upon detonation, destroy those records needed in day-to-day operations. • Instruct all personnel in the procedures to be followed in the event a bomb threat is received. As a minimum, every telephone operator or receptionist should be trained to respond calmly to a bomb threat call. • In addition, it is always desirable that more than one person listen in on the call. To do this, have a covert signaling system, perhaps a coded buzzer signal, to a second reception point. A calm response to the bomb threat could result in getting additional information. This is especially true if the caller wishes to avoid injuries or deaths. If told that the building is occupied or cannot be evacuated in time, the bomber may be willing to give more specific information on the bomb's location. • Organize and train an evacuation unit. The organization and training of this unit should be coordinated with other tenants of the building. The evacuation unit should be trained on how to evacuate the building during a bomb threat. Evacuation training is usually available from police, fire, or other units within the community. If the facility is in a multi-tenant building, obligations to other tenants in the building must be considered. Legal, moral, and ethical considerations will have an impact on what is communicated to neighbors. • Develop a plan for conducting a bomb search. Consult with the police, fire department, or other local authority to determine who will conduct the search. In most cases, because of their familiarity with the facility, the search is best conducted by company/building personnel; this requires that they be trained properly in search techniques. The police or fire department may be available to assist in the training or be able to advise as to who can provide the training. • Consider arranging for temporary relocation of facilities in the event of an explosion and the building being determined to be unsafe. Handling a Bomb Threat In April 1996, Texas City, Texas, was virtually shut down from a bomb scare. A caller to 911 said that seven bombs had been planted at area chemical plants, that three were dummies, and that four would explode at 6 p.m. on the following day, which was the first anniversary of the Oklahoma City bombing. The harbor was cleared (seven ships and 21 barges were sent out of the port) and a search of the area's chemical plants conducted. Some residents fled the city before the caller's deadline. Three dummy bombs, but no real bombs, were later found. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 5. E&S Technical Information 5 Bomb Threat Management Under most circumstances, because of the difficulty in discriminating in advance between a threat which is credible and one which is not, the response is the same - all threats must be taken seriously and properly addressed. On the other hand, a business must decide if it is feasible to evacuate a building every time a threat is received. Telephone Threats When a bomb threat is called in, the procedures listed hereafter should be followed: • Keep the caller on the line and attempt to get as much information as possible. Ask for the message to be repeated to confirm it. If possible, record the message. • If the caller does not indicate the location of the bomb or the time of possible detonation, ask for this information. • Inform the caller that the building is occupied and the detonation of a bomb could result in death or serious injury to many innocent people. • Pay particular attention to background noises which may give a clue as to the location of the caller. • Listen closely to the voice (male or female), voice quality (calm or excited), accents, and speech impediments. Immediately after the caller hangs up, report the call to the person designated by management to receive such information. Law enforcement personnel will want to talk first-hand with the person who received the call. • Report the threat immediately to the appropriate agencies, such as the police or fire department or FBI. To assist the individual receiving the call, a bomb threat call checklist of the type illustrated in Appendix A, which was prepared by the FBI Bomb Data Center, should be kept nearby. Written Threats While written messages are usually associated with generalized threats and extortion attempts, a written warning of a specific device may occasionally be received. It should never be ignored. When a written threat is received, the procedures listed below should be followed: • Save all materials, including any envelope or container. Once the message is recognized as a bomb threat, further unnecessary handling should be avoided. • Every possible effort must be made to retain evidence, such as fingerprints, handwriting or typewriting, paper, and postal marks, which are essential to tracing the threat and identifying the writer. Mail and Package Bombs In 1989, a series of letter bombings, believed to be racially motivated, resulted in several casualties, including fatalities. On December 16, 1989, a U.S. Court of Appeals Judge in Alabama was killed instantly and his wife injured when a package exploded when it was opened in their residence. Two days later, a Georgia attorney was killed in a similar incident. On the same day, in related attacks, a U.S. courthouse in Atlanta and the headquarters of the National Association for the Advancement of Colored People (NAACP) in Jacksonville, Florida, were the targets of attempted bombings. These attacks spawned copycat bombings, as well as renewed interest in letter and package bombs. In response to these attacks, the FBI Bomb Data Center developed the following letter and package bomb indicators and recognition points: COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 6. E&S Technical Information 6 Bomb Threat Management • Excessive postage • Incorrect titles • Titles but no names • Misspellings of common words • Oily stains or discoloration • No return address • Excessive weight • A rigid envelope • Lopsided or an uneven envelope • A strange odor • Protruding wires or tinfoil • Visual distractions • Foreign mail, air mail, and special delivery • Restrictive markings, such as confidential and personal • Hand written or poorly typed messages • Excessive securing material, such as masking tape and string In the Atlanta courthouse incident, routine X-ray screening of incoming mail revealed that the package contained a pipe bomb. A bomb disposal unit was called and the bomb was removed without incident. Bomb and metal detection equipment available today employ various technologies to find dangerous objects, and an investment in such equipment is a function of an assessment of the seriousness of the threat posed to the business. The Decision to Evacuate The most serious of all decisions to be made by management in the event of a bomb threat is evacuation or non-evacuation of the building. If bomb threats are occurring frequently, management cannot be expected to evacuate the facility after every threat. All bomb threats present an element of risk, and as such, decisions must be made during the planning phase as to when an evacuation is ordered. Management may pronounce a carte blanche policy that, in the event of a bomb threat, evacuation will be affected immediately. This decision circumvents the calculated risk and gives prime consideration for the safety of personnel in the building. This can result in production downtime and can be costly if the threat is a hoax. The alternative is for management to make the decision regarding evacuation when the threat is received. In this scenario, time is the critical factor. If the time until detonation is determined to be, for example, less than half an hour, an evacuation should be conducted immediately. If the time until detonation is determined to be greater than half an hour, then a search of the area should be conducted. If the search uncovers a suspicious package, then an evacuation is ordered and the bomb disposal unit contacted; if no package is found, management may decide not to evacuate. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 7. E&S Technical Information 7 Bomb Threat Management If the police, fire department, or other local authority receives the bomb threat and orders an evacuation of the facility, then an evacuation should be conducted immediately. A 30-minute time period is recommended on the assumption that the size of the area allows for a search to be conducted in such a time period. When properly planned and managed, most buildings can be searched in this time. If the area cannot be adequately searched in 30 minutes, however, then a greater time period should be set. If the threat is from a prominent subversive group that has been linked to recent bombings, then an evacuation may be considered regardless of the circumstances. If the caller provides an indication of the location of the bomb, then those departments or floors affected by the bomb should be evacuated. In high-rise buildings, the two floors below and the two floors above the threatened floor should be evacuated. If there is no indication as to the location of the bomb, and the threat is determined to be legitimate, then the entire building may have to be evacuated. Evacuation The people in the building should be evacuated to a safe distance from the building to protect them against debris and other flying objects in the event of an explosion. In highly congested areas, it is usually recommended that a mutual assistance agreement be arranged with another company which would allow for evacuation of employees to another building. If the location of the suspected bomb is known, evacuation routes will have to be determined so as to lead people away from the bomb. Once the building is evacuated, controls should be established to prevent unauthorized access to the building. If proper coordination has been arranged with the local police or other agencies, this may assist in establishing controls to prevent reentry until the danger has passed. Where possible, all doors and windows should be opened to permit the blast wave to escape in the event of an explosion. When the building has been evacuated, all gas and fuel lines should be turned off at the main valve. All electrical equipment should be turned off prior to evacuation. The decision to turn off electrical power at the main switch should be made by management with consideration given to lighting requirements of search teams. Bomb Searches Although, from a liability standpoint, it may be preferred that bomb searches be conducted by the police or fire department, from a practicality standpoint, search teams made up of properly trained company/building personnel are usually the better choice. This is because the police or fire department will often be unfamiliar with the facility and may not be trained in bomb search techniques, and the time it would take them to respond to an emergency call could be better spent in conducting a search. The evacuation unit may be trained in search techniques; however, a separate search unit made up of search teams for specific areas is preferred. Volunteer personnel should be solicited for this function. To be proficient in searching the building, search personnel must be thoroughly familiar with all hallways, rest rooms, false ceiling areas, and other locations in the building where an explosive or incendiary device may be concealed. A search team for an area should consist of people who work in that area, since they are usually more familiar with the surroundings and know what belongs and does not belong there. The search unit should be trained only in search techniques and not in the techniques of neutralizing, removing, or otherwise having contact with the device. If a device is located, it should not be disturbed. The following recommendations apply: • Do not touch a strange or suspicious object. Its location and description should be reported to the person designated to receive this information. • The removal and disarming of a bomb or suspicious object should be left to professionals in explosive ordinance disposal. Who these professionals are and how to contact them for assistance should be included in the bomb threat plan. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 8. E&S Technical Information 8 Bomb Threat Management • Once the danger zone is determined, the area should be blocked off or barricaded with a clear zone of three hundred feet until the object has been removed or disarmed. • During a search of the building, a rapid two-way communication system is of utmost importance. Such a system can be readily established through existing installed telephones. Caution: The use of radios or other wireless devices during a search can be dangerous. The radio transmission energy can cause premature detonation of an electric initiator (blasting cap). • During the search, medical personnel should be alerted to stand by in case of an accident caused by the explosion of the device. • Fire brigade personnel should be alerted to stand by. Summary Planning efforts for bomb threats begin with a vulnerability assessment of the facility. An estimate of the risk of attack is required, based on the type of business, its location, past threats, and current trends. Management must establish procedures before an incident occurs, so that a bomb threat can be handled with the least risk of creating panic. Employees must be trained in the proper procedures to follow in handling bomb threats, conducting bomb searches and evacuating a building. In the past, the majority of bomb threats turned out to be hoaxes. However, today more of the threats are materializing. Thus, management's first consideration must be for the safety of people. It is practically impossible to determine immediately whether a bomb threat is real or a hoax. Appendix A - FBI Bomb Threat Call Checklist Bomb Threat Card: Place this card under your telephone. Questions to Ask • 1. When is bomb going to explode? • 2. Where is it right now? • 3. What does it look like? • 4. What kind of bomb is it? • 5. What will cause it to explode? • 6. Did you place the bomb? • 7. Why? • 8. What is your address? • 9. What is your name? Exact Wording of the Threat • Sex of caller. • Race of caller COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 9. E&S Technical Information 9 Bomb Threat Management • Age of caller. • Number at which call is received. • Time of call. • Date of call. Caller's Voice • Calm. • Angry. • Excited. • Slow. • Rapid. • Soft. • Loud. • Laughter. • Crying. • Normal. • Distinct. • Slurred. • Nasal. • Stutter. • Lisp. • Raspy. • Deep. • Ragged. • Cleaning throat. • Deep breathing. • Cracking voice. • Disguised. • Accent. • Familiar (who did it sound like?) COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 10. E&S Technical Information 10 Bomb Threat Management • Whispered. Background Sounds • Street noises. • Crockery. • Voices. • PA System. • Music. • House noises. • Motor. • Office machinery. • Factory machinery. • Animal noises. • Clear. • Static. • Local. • Long distance. • Other. Threat Language • Well spoken (educated). • Incoherent. • Taped (message read by threat maker?) • Foul. • Irrational. Remarks Report call immediately to: [_______] Phone number: [_______] Date: [_______] Name: [_______] Position: [_______] Phone Number: [_______] COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM
  • 11. E&S Technical Information 11 Bomb Threat Management References • 1. Cornitius, Tim. "Bomb Threats Shake Up South Texas." Chemical Week 1 May 1996. • 2. Department of Justice. Vulnerability Assessment of Federal Facilities. Washington, DC: United States Marshals Service, 1995. • 3. Department of Justice. Federal Bureau of Investigation. 1994 Bombing Incidents. General Information Bulletin 95-2. Washington, DC: The FBI Explosives Unit-Bomb Data Center, 1995. • 4. Department of Justice. Federal Bureau of Investigation. Bomb Security Incident Guidelines (2). General Information Bulletin 84-1. Washington, DC: FBI Bomb Data Center, 1984. • 5. Russo, Robert J. "Planning for Damage Control." Security Management 33.9 (1989): 97-99. • 6. Slahor, Stephanie, Ph.D. "Bombs and Bomb Threats: Have A Response Plan." Access Control 39.10 (1996): 37-38. Footnotes • 1 Footnote The 1993 damage figures include $510 million damage to the World Trade Center building by a bomb on February 26, 1993. The persons injured figure for 1993 includes the 1,042 persons who were injured in the same incident. COPYRIGHT ©2000, Insurance Services Office, Inc. The information contained in this publication was obtained from sources believed to be reliable. Insurance Services Office, Inc., its companies and employees make no guarantee of results and assume no liability in connection with either the information herein contained or the safety suggestions herein made. Moreover, it cannot be assumed that every acceptable safety procedure is contained herein or that abnormal or unusual circumstances may not warrant or require further or additional procedure. COPYRIGHT © 2000, Insurance Services Office, Inc.; EngineeringAndSafety@ISO.COM