Every facility emergency operations plan should include procedures for bomb threats and receipt of suspicous packages. When I reviewed the following article, I thought it was timely advice worth passing along. The following advice is reprinted from the Emergency Management and Response Information Sharing and Analysis Center (EMR-ISAC) CIP Bulletin 11-08, December 22, 2008. If you would like to obtain additional resources for bomb threats and suspicious packages, please check out the "Bomb Threats & Suspicious Packages" links on the "Resources" page of the Preparedness, LLC website.
Overview
Improvised Explosive Devices (IEDs) can be arranged in a number of configurations, the only limitation to their design and functionality is the bomber’s imagination. The first action for awareness is identification of the suspect IED. Unattended or suspicious packages or containers could potentially contain an explosive device and should be reported to security personnel immediately. Likewise, individuals behaving suspiciously or vehicles that seem out of place could also represent an explosive threat and should be reported immediately to security personnel.
Preliminary Actions
Authorities, first responders, and citizens should take the following actions to strengthen the existing security posture in the event of a bomb threat:
- Most bomb threats are received by phone. Remain calm and try to obtain information necessary for responders. (Be sure a bomb threat checklist like the one available from ATF is posted at all phones that can receive incoming calls--especially whoever answers the main incoming line.)
- Preserve any evidence if the threat is received in a note or letter, and do not handle it.
- Conduct a cursory search of the venue/facility for items or packages that may be out of place.
- Use CCTV capabilities to monitor activities inside the facility, and along the periphery of the building, after notification of a threat.
- Follow evacuation procedures keeping clear of the location of any suspected device and assemble at a safe location distant from or protected frm the location of the suspected device.
- Check to be sure the pre-designated evacuation route and assembly area is clear of any potential threats, such as a secondary device. A secondary location should be identified in advance, in the event the first site is compromised.
- Be vigilant for characteristics of a suspect suicide bomber (e.g., wearing bulky clothing or coat, or attire uncharacteristic for the season; exhibiting nervousness or a distant look; sweating profusely, etc.)
Immediate Actions
Follow these steps when a suspect IED is encountered:
- Once out of the immediate area of the suspect IED, call 911 immediately;
- Employees should be trained not touch or disturb suspect items in any way;
- Immediately evacuate the surrounding area, for small packages (e.g. pipe bomb, briefcases etc.) a minimum of 300 ft is recommended;
- Prior to evacuation, check the designated evacuation assembly site, to ensure additional IEDs have not been placed to target those evacuating the venue.
- Do not use cellular phones or two-way radios in the immediate area of the device, since this action may cause the device to detonate.
- Remain vigilant for any additional suspicious activity.
- Identify interdependencies in the immediate area that could compound the effects of a detonation (e.g. gas lines, electric grids etc.), and consider increasing evacuation distances.
Follow On Actions
The following actions are vital, since the possibility for an additional incident cannot be eliminated:
- Conduct immediate review of any video or pictures captured by CCTV system.
- Attempt to gain information from those evacuated regarding what they may have witnessed.
- Immediately record any details from witnesses for law enforcement needs.
- Determine if evacuees took any videos or photos prior to the attack, and attempt to obtain that documentation for evidentiary purposes for the authorities.
- Look for anyone monitoring the response and notify responding law enforcement authorities of these actions.. (e.g. videoing the site, conducting time checks, taking notes, monitoring radio traffic with a scanner etc.)
No comments:
Post a Comment
Please favor us with your comments on our blog. If you have a suggestion for a topic, a question, or an idea, please let us know.