bomb threat policy and procedure

Bomb Threat Policy and Procedures

Because of its significant impact, making a bomb threat is one of the terrorist group’s most commonly used and straightforward methods. Having a bomb threat policy and procedures is critical for business continuity. Most incidents involving explosive devices take place with little or no warning beforehand. Even though most bomb threats are hoaxes, you still need to be prepared to deal with them in the workplace. In this article, we will demonstrate the action protocol that should be followed during and after a bomb warning, regardless of whether or not the threat posed by the bomb is legitimate.

How should one respond to a threat of a bomb exploding?

When defining a reliable action protocol that enables us to determine whether a threat is real, credible, and plausible or whether it is a false threat or a bad joke, it is difficult to distinguish between the three types of threats. Bombers would be in a position to use such an action protocol to their benefit whenever they saw fit if it were available.

As a result, there is no dependable system that can differentiate between actual incidents and false alarms in an accurate manner. In a nutshell, there are three possible courses of action that can be taken when confronted with a bomb threat:

  1. Failing to pay attention and carry on with activities as though the threat had never occurred while it was happening.
  2. Initiate a mass evacuation without first verifying or assessing the severity of the danger, and do so without taking any precautions.
  3. Acknowledge the possibility that the threat is real and take preventative measures.

Terrorism experts from the military and the Police agree that the third alternative is the most viable choice. During the time of the bomb threat alert: – A bomb threat was made via a phone call or a mobile phone.

If the threat is conveyed in writing:

• Steer clear of handling the paper, email, or support (recorder, CD, etc.) while the container is still in your possession (envelope, box, computer, etc.).

• Immediately give all of the information you know to the person who answers the phone when you call the Police (or if you work for a company, the Security Department), and then hang up. If they ask for it, you should send them audio, a video recording, and a photograph of the message and the package you have received. This will ensure that they have as much information as possible to analyze the danger and give guidance on how to proceed.

• Keep both the content of the message and the container of the message safe until you receive further instructions from the Police (preventing other people from altering, manipulating, or destroying it). When the Police or security personnel arrive, you must provide them with all the information. And you are also required to follow the instructions given by the Police.

If the threat is communicated to the victim over the phone, which is the most common method, the following applies:

Keep the potential bomber on the line for as long as it can be. To glean as much pertinent information as you can and record it all in a way that is reliable and objective:

• Keep in mind that the minutes that the call lasts could be the only contact maintained with the person who is calling. As a result, all information must be collected accurately.

• Focus your efforts on preserving control so that you can supply the Police with valuable information. On the other hand, the information you gather will undoubtedly be misrepresented. This may result in confusion, misunderstanding, and possibly a poor decision that has an unintended effect on people.

It is essential to remember that this phone call will be the only contact with the bombers. The only opportunity where essential data can be obtained and the only means by which it will be possible to determine whether the threat is real or not in the correct manner. If this call is answered correctly, more information can be obtained than a simple warning. Although it may seem strange, the person who makes the threat will often answer questions because he may be inexperienced. If this call is answered correctly, more information can be obtained than a simple warning.

Checklist for a Bomb Threat:

In light of these goals, you should immediately follow the action protocol outlined in the following paragraph if a threat is made via telephone:

  1. Ensure that the call recording system is connected (if any).
  2. If you need assistance from the security personnel, press the panic button (if available).
  3. Be sure to jot down the precise time of the call, including the minute.
  4. Make a note of the precise location of the bomb, if it is necessary to do so, by asking the caller to specify the bomb’s location as many times as necessary.
  5. Make a note of the estimated time that the explosion will occur.
  6. Inquire about and note the device’s outward appearance (briefcase, sports bag, backpack, vehicle, etc.)

• Following the safety procedures in place in your organization. Make a direct phone call to the Police or the Security Department and provide them with the information gathered.

Get as much detail regarding the individual making the phone call. When a person stays on the phone for longer, more information can be provided to the Police bomb treat checklist that will be used afterwards.

Additionally, suppose calls are not recorded for later use in investigations. In that case, it is necessary to pay attention to specifics such as the sex of the person making the call and their accent. And any background noises that may be present (machinery, music, conversations, etc.) Check out the details here to learn more about the bomb threat checklist.

AFTER NOTICE

After a bomb threat is received, either in writing or over the phone, the Police Department must be notified. Who exactly notifies who depends on who is determined to be the interlocutor with the Police in each scenario.

It is recommended that, while you are waiting for instructions from either the Police or the Security Department, you:

1. Keep the bomb warning message and packaging safe until further notice.

2. Start by inspecting the areas most likely to contain explosive devices in person and through video surveillance cameras. These are typically the most accessible areas or common areas of the building, such as the lobby, corridors, stairs, bathrooms, and parking lots.

3. When the Police arrive, inform them of the circumstances in which the call has occurred. Specify all known characteristics and locations that have been reviewed before their arrival, and then guide them through the building for any inspections or checks deemed appropriate.

4. It will be necessary to evacuate all facilities in an orderly manner based on the Emergency Plan’s provisions. Or the Self-Protection Plan if the Police believe that the threat is credible.

5. If the Police decide to call off the search and leave the location or building after determining that the threat is not present, normal operations will resume as usual.

Evacuation:

To ensure the following, the security staff should streamline the evacuation, take measures to prevent panic, and be the last people to leave the premises:

1. That the eviction is taking place in an orderly and calm manner and that it is taking place at the planned locations.

2. Do not make use of hoists or elevators at any point.

3. Turn off the lights, turn off the gas, and disconnect any electrical appliances that aren’t necessary for your area.

4. There should be no one present inside.

5. Establish a safety cordon to ensure that no one approaches the hazardous area, which must be devoid of people at all times.

6. Work closely with law enforcement to the greatest extent.

Conclusion:

When more people are aware of the action protocol, there will be fewer victims. Our society will be more resistant to this kind of modus operandi and the threat of terrorism in general if you find this article both interesting and helpful. We ask that you help us foster an environment that values safety by sharing it with the people in your immediate environment.

Leave a Reply

Your email address will not be published.