Upload
others
View
15
Download
5
Embed Size (px)
Citation preview
BOMB THREAT RESPONSE
Location:____________________________________ Event Date:__________ □ Exercise □ Threat
Point of Contact:_________________________________________ Title:_______________________
This guide is designed to help school administrators implement bomb threat response, guidance, and searches that utilizes the Incident Command System (ICS) and current best practices.
This guide is a tool to supplement all hazards emergency plans. It is not meant to replace emergency plans or supersede the actual management of the emergency.
Contents Bomb Threat Response Chart......................................................................................................................Bomb Threat Methods................................................................................................................................... a. Phoned Threats Checklist ....................................................................................................... b. Written Threats Checklist ....................................................................................................... c. Electronic Threats Checklist (email and social media) ..................................................... d. Verbal Threats and Rumors Checklist .................................................................................. e. Suspicious Package / Mailing Indicators Checklist ...........................................................Management & Heightened Security .........................................................................................................Bomb Threat Search ....................................................................................................................................Bomb Threat Assessment ............................................................................................................................Evacuation and Secondary Attack Precautions .......................................................................................Final Checklist and Log ..............................................................................................................................
123456789
1110
12
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
HOW TO USE THIS GUIDE
Resources
Crisis Communications ...............................................................................................................................Suspect and Vehicle Description Form......................................................................................................Bomb Threat Search Coordinator Tracking Form ..................................................................................Bomb Threat Search Sheet .........................................................................................................................Stand-Off Distances ......................................................................................................................................Incident Command Assignment .................................................................................................................Incident Command Chart Guide ..................................................................................................................
1413
1516171819
1
BOMB THREAT RESPONSE
01 BOMB THREAT RESPONSE CHART Complete relevant form
(pages 2 -7)
Page 8
Page 8
Page 9
Page 9
Page 11
Page 11
ResourceSection
Refer to Emergency Plan
Page 10
THREAT
HEIGHTENEDSECURITY
ICS and
NOTIFICATIONS
DEVELOPCRISIS COMMS
STRATEGY
SEARCH
NO OBJECT
ASSESS
HIGH
MED
LOW
SUSPICIOUSOBJECT
COUNTER-MEASURES
ATTACKSECONDARY
EVACUATE
FAMILYREUNI-
FICATIONRESUME NORMAL
OPERATIONS
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
When receiving any type of threat, pay careful attention to pertinent details. The person making the threat may provide enough information to reveal their identity or location, which may assist with the investigation.
02 BOMB THREAT METHODS
TYPES OF THREATS:
2
BOMB THREAT RESPONSE
a Phoned Threats
b Written Threats
c Electronic Threats
01 Emailed Threats
01 Social Media Threats
d Verbal Threats and Rumors
e Suspicious Package / Mailing Indicators
A bomb threat may be received by telephone, written message, email, social media, verbal, or suspicious mail/package. The majority of bomb threats are typically received by telephone, although many of the recent bomb threats have been reported from social media.
Determine the type of threat and fill out the corresponding bomb threat checklist.
......Page 3
......Page 4
......Page 5
......Page 6
......Page 7
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
QUESTIONS TO ASK:
3
BOMB THREAT RESPONSE
□ When is the bomb going to explode? ________________________________
□ Where is it right now? ____________________________________________
□ What does it look like? ___________________________________________
□ What kind of bomb is it? ___________________________________________
□ What will cause it to explode? _____________________________________
□ Did you place the bomb? __________________________________________
□ Why? ____________________________________________________________
□ What is your address? ____________________________________________
□ What is your name? ____________________________________________
EXACT WORDING OF THE THREAT
THREAT LANGUAGE:
BACKGROUND SOUNDS:
SIGNAL ANOTHER STAFF MEMBER TO CALL 9-1-1 (then, monitor their conversation, if possible)
□ Crockery
□ PA System
□ House
□ Local
□ Long-distance
□ Voices
□ Animals
□ Clear
□ Office
□ Phone booth
□ Street
□ Music
□ Static
□ Motor
□ Factory
□ Other: _____________________________________________________________
Sex of caller: □ M □ F Race: _____________________ Age: __________________
Length of call: ________________ Time:__________ (AM/PM) Date: _______________________
□ Well-spoken
□ Foul
□ Incoherent
□ Read by threat maker
□ Irrational
□ Taped
REMARKS:
□ Calm
□ Slow
□ Loud
□ Nasal
□ Raspy
□ Disguised
□ Rapid
□ Laughing
□ Distinct
□ Deep
□ Whispered
□ Excited
□ Crying
□ Slurred
□ Lisped
□ Accented
□ Clearing Throat
□ Cracking voice
□ Normal
□ Angry
□ Stuttering
□ Soft
□ Ragged
□ Breathing Deeply
Number at which call was received:
( ______ ) _________________________________________
Caller ID (if available)
_________________________________________
□ Other: __________________________________________________________________________________________________
CALLER’S VOICE WAS:
□ Familiar – If so, who did it sound like? ___________________________________________________________________________________________________________________________________________________
WHEN THE CALLER HANGS UP, DO NOT HANG UP THE PHONE.
NEVER HANG UP THE PHONE!PHONED IN THREATS Place a copy of this page under your telephonea
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
STEPS TO TAKE:
4
□ Handle the note as little as possible
□ Preserve the threat (note) or access to the scene
□ Notify 9-1-1
SUSPECT / VEHICLE DESCRIPTIONS:
(REFER TO SUSPECT DESCRIPTION FORM IN THE RESOURCES SECTION)
ANY OTHER POSSIBLE WITNESSES:
SITUATIONS / CONDITIONS SURROUNDING THE DISCOVERY:
NOTES TO TAKE:
□ Location of the note? __________________________________________
□ Date the note was found? ____________________________________
□ Time the note was found? ____________________________________
□ Does the note indicate a detonation time? _____________________
□ What will cause it to explode? __________________________________
□ Does the note indicate where the bomb is planted? □ Yes □ No
If Yes, where ___________________________________________________
□ Is the area under video surveillance? ___________________________
□ What is your name? _________________________________________
WRITTEN THREATSNOTIFY 9-1-1 b
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
STEPS TO TAKE:
NOTES TO TAKE:
5
□ Preserve the threat (take a screen-shot if possible). DO NOT turn off the computer or close any windows.
□ Print, photograph, or copy down the message (include the header if the threat was sent by email)
□ If the threat was by email SAVE THE EMAIL and leave email open until assistance arrives.
□ Where was the threat found (in an email , social media - Facebook /
Twitter / Instagram, etc.)? _________________________________________
□ Date and Time threat was found: ____________________________________
RECORD THE EXACT WORDING OF THE THREAT AS IT WAS POSTED (Remember to print off entire email with header) :
□ Date and Time threat was originally posted or sent:
__________________________________________________________________________________________
□ If the threat was on social media, was it liked or shared by others? □ Yes □ No
If Yes, who ____________________________________________________________________________
ELECTRONIC THREATS - email and social mediaNOTIFY 9-1-1
□ Name / Username / Handle of person who posted or sent the threat?
_________________________________________________________________________________________
□ Was the threat sent to a specific person? □ Yes □ No
If yes, who? __________________________________________________________________________
□ Does the note indicate where the bomb is planted? □ Yes □ No
If Yes, where ___________________________________________________________________________
□ Does the threat indicate a detonation time? _____________________________________________
□ Does the threat indicate what will cause it to explode? □ Yes □ No
If yes, what? ___________________________________________________________________________
cBOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
6
□ Name if you know him or her, or if he or she gives you one?
____________________________________________________________________
□ Date and Time of the threat: _______________________________________
□ Where the person who made the threat is now, if known: ___________
_____________________________________________________________________
□ Note the direction in which the person who made the threat leaves
and report to local law enforcement: _______________________________
_____________________________________________________________________
EXACT WORDING OF THE THREAT
THREAT LANGUAGE:
REPORT THREAT IMMEDIATELY TO THE POLICE
NOTE THE RACE AND SEX; BODY SIZE; TYPE AND COLOR OF CLOTHING; HAIR,EYE AND SKIN COLOR, ETC.
(REFER TO SUSPECT DESCRIPTION FORM IN THE RESOURCES SECTION)
□ When is the bomb going to explode? _____________________________
□ Where is it right now? _________________________________________
□ What does it look like? ________________________________________
□ What kind of bomb is it? ________________________________________
□ What will cause it to explode? ___________________________________
NOTIFY 9-1-1 (as soon as you can safely do so)
□ Well-spoken
□ Foul
□ Incoherent
□ Read by threat maker
□ Irrational
□ Taped
THREAT VOICE WAS:
ANY OTHER DISTINGUISHING FEATURES:
REMARKS:
□ Calm
□ Slow
□ Loud
□ Normal
□ Nasal
□ Raspy
□ Disguised
□ Angry
□ Rapid
□ Laughing
□ Distinct
□ Stuttering
□ Deep
□ Whispered
□ Excited
□ Soft
□ Crying
□ Slurred
□ Lisped
□ Ragged
□ Accented
□ Clearing Throat
□ Cracking voice
□ Breathing Deeply
□ Other: ___________________________________________________________________________
REMAIN CALMVERBAL THREATS and RUMORS
□ Project calmness; move and speak slowly, quietly, and confidently.
□ Notify 9-1-1 when it is safe to do so.
STEPS TO TAKE:
NOTES TO TAKE:
dBOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
7
If your staff receives a suspicious package or letter, it is important to know how to identify, respondand report to authorities. A suspicious package is treated as an immediate danger, not a threat.
IF A SUSPICIOUS PACKAGE / MAILING OR DEVICE IS FOUND:
□ Do NOT touch, tamper with, or move the item. □ Immediately report item to site decision maker(s) and notify local law enforcement. □ Do NOT open, smell or taste. □ Wash your hands with soap or water if in contact.
Site decision maker(s) must: □ Ensure area is secured and cleared of personnel. □ Ensure law enforcement was notified and follow police directives. □ Ensure emergency responders are continuously briefed. □ Follow Secondary Attack and Evacuation guidelines.
SUSPICIOUS PACKAGE / MAILING INDICATORSe
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
(Page 11)
Strange OdorOily Stains, Discolorations, orCrystalization on Wrapper
8
After a bomb threat has been received, restricting students to classrooms is recommended to prevent a student from accidentally or intentionally triggering an explosive device on campus. Heightened Security is a procedure to increase the security of a school without invoking the concerns of an active shooter that is associated with “lockdown.”
03
04
MANAGEMENT
□ Recall all staff and students outside the school.
□ Restrict hallway access. Order students to their next scheduled classrooms immediately
□ Establish a command post.
□ Secure all entrances.
□ Establish communications with law enforcement
□ Delegate a Staff Member/SRO to monitor entrances and parking lots (from inside).
□ Inform staff of situation and review plans in case the situation escalates.
□ Develop plans to accommodate persons with special needs, restroom breaks and meals in case the event lasts for over an hour.
“Attention! We have an incident requiring Heightened Security. This is not a drill. Students report immediately to your scheduled class. Teachers allow students into the classroom and then restrict hallway access. Additional information will follow.”
Teachers and staff can be provided updates via email or in person.
Effective communication and collaboration are keys to managing bomb threats. Identify all stakeholders that need to be notified.
The Incident Command System or ICS is an effective approach to managing complex emergencies, like a bomb threat. The key components of ICS are establishing realistic objectives (i.e. implementing Heightened Security Procedures or Determine if there is an explosive device on campus), collaboratingwith other stakeholders. (i.e. District and Law Enforcement) and delegating responsibilities (i.e. establishing search teams).
NOTIFICATION:
STAKEHOLDER
9-1-11.
2.
5.
6.
3.
4.
District
Parents
NOTIFIED BY DATE / TIME
Objectives:
Example Language:
ICS (optional)
Heightened Security
REFER TO THE “INCIDENT COMMAND ASSIGNMENT” IN THE RESOURCES SECTION
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
Searching your campus is an important step in insuring the safety of all students, staff, and visitors.Persons conducting the search need only look for items that appear suspicious and/or look out ofplace. The determination as to whether an object is an explosive device is left to law enforcementexperts. Should any person locate an item that is suspicios, follow the “Suspicious Object Response”steps below and
05 BOMB THREAT SEARCH
KEY POINTS TO SEARCH
GENERAL SEARCH GUIDELINES
**IF TICKING SOUND IS HEARD, ATTEMPT TO VISUALLY LOCATE THE ITEM. IF THE ITEM CANNOT BE LOCATED, TREAT THE SOUND AS IF YOU HAVE LOCATED A SUSPICIOUS ITEM.
9
Search in two-person teams whenever possible.
Divide area to be searched in half (based on content, not size).
Listen for “ticking” or “clockwork” sounds**.
FIRST - search your half of the room waist high (around three feet) and BELOW.
SECOND - search your half of the room ABOVE waist high.
IF A SUSPICIOUS OBJECT IS LOCATED □ Do NOT touch the object.
□ Stop searching that area (there may be additional devices elsewhere).
□ Notify teachers and have everyone move to the other side of the building.
□ Persons who located the object are to report to the Facility Leader.
(Facility Leader will notify the authorities and recall other search teams)
□ Secure the area where the item was located, but do not guard it.
(STAY AWAY FROM THE ITEM)
□ If possible on the way out of the area, open doors and windows near the item.
□ Facility Leader will determine evacuation route and rally point.
□ Search teams will re-deploy to search evacuation routes and paths to the rally point.
□ When routes are cleared, assist in evacuation as needed.
Identify all packages, boxes, briefcases, and bags. If you CANNOT identify that the item belongs in the area you are searching, treat it as a suspicious object.
Desks
Air Ducts
Bookcases
Wastebaskets
Filing Cabinets
Window Sills
REFER TO THE “BOMB STANDOFF DISTANCES CHART” IN THE RESOURCES SECTION
REFER TO THE “BOMB THREAT SEARCH COORDINATOR” AND “BOMB THREAT SEARCH” FORMS N THE RESOURCES SECTION
REFER TO THE “BOMB THREAT SEARCH COORDINATOR” AND “BOMB THREAT SEARCH” FORMS IN THE RESOURCES SECTION
The Search Coordinator should identify areas that need to be searched. Typically, teachers are askedto search their own classrooms so these search areas are limited to common areas, hallways, exits, and paths to possible evacuation rally points. Lockers are not searched during this phase.
Search Instructions
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
10
Assessing the Threat- Considering the totality of bomb threat and actual Improvised Explosive Device (IED) incidents, there is no single deciding factor on whether a bomb threat is legitimate or a hoax. Measure all of the facts, context, and conclude from the whole picture whether the possibility of a “real” threat exists. All threats should be carefully evaluated on an individual basis and called in to local law enforcement regardless of the circumstances.
06 BOMB THREAT ASSESSMENT
LOW RISK
MEDIUM RISK
LACKS REALISM:
INCREASED LEVEL OF REALISM:
HIGH RISK INCREASED LEVEL OF REALISM:
□ Threat is direct, specific, and realistic; may include names of possible victims, specific time, location of devices.
□ Perpetrator provides his/her identity.
□ Threat suggests concrete steps have been taken toward carrying out the threat.
□ Perpetrator makes statements indicating they have practiced with a weapon or have had the intended victim(s) under surveillance.
□ Threat is vague and indirect.
□ Information contained within the threat is inconsistent, implausible, or lacks detail.
□ Caller is definitely known and has called numerous times.
□ The threat was discovered instead of delivered (e.g., written on a wall).
A threat that poses a minimum risk to the victim and public safety. Probable motive is tocause disruption.
□ Threat is direct and feasible.
□ Wording in the threat suggests the perpetrator has given some thought on how the act will be carried out.
□ May include indications of a possible place and time.
□ No strong indication the perpetrator has taken preparatory steps, although there may
be some indirect reference pointing to that possibility.
□ Indication the perpetrator has details regarding the availability of components needed to construct a bomb.
□ Increased specificity to a threat (e.g. “I know your lunch periods.”)
Threat that could be carried out, although it may not appear entirely realistic.
LOW
MEDIUM
HIGH
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
11
07 EVACUATION AND SECONDARY ATTACK PRECAUTIONS
b □ Select Evacuation Rally Point ___________________________________
□ Enact Secondary Attack Counter-measures (below)
□ Arrange for Transportation
□ Notify Off-Site Shelter Location Location name:_________________________
□ Security Awareness
□ Enforce visitor check-in policies
□ Properly screen all deliveries
□ Maintain access control
Evacuation
a Secondary Attack Counter-Measures
□ N / A
□ N / A
NOTES
ONGOING COUNTER-MEASURES
□ Request law enforcement at the rally point
□ Prior to evacuation, search exits and paths to rally points
□ Avoid parking lots and prevent access to cars
□ Prevent groups from gathering away from rally point
□ Prevent students from gathering near emergency response vehicles
POST-THREAT EVACUATION COUNTER-MEASURES
□ Implement “Heightened Security” procedures to restrict student movement (Page 8)
□ Prevent student access to lockers
□ Search (“eyes open, hands in pockets”) for suspicious devices
POST-THREAT INTERIOR COUNTER-MEASURES
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
12
08 FINAL CHECKLIST & LOG
INCIDENT COMMANDER COMPLETE NOTES
□ Yes □ No □ N/A
□ Yes □ No □ N/A
□ Yes □ No □ N/A
□ Low □ Med □ High
□ Yes □ No □ N/A
Establish Communications
Implement Heightened Security
Assess Threat
□ Yes □ No □ N/AEvacuate
Search Conducted
□ Yes □ No □ N/ASuspicious Object Located (if yes turn over command to Law Enforcement)
□ Yes □ No □ N/ADocument the Threat
□ Yes □ No □ N/ASecondary Attack Countermeasures
o ICS Staff & School o Response Agencies o District o Parents
Announce all clear OR Transfer command to appropriate response agency and establish unified command.
NOTES
BOMB THREAT RESPONSE
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
13
When active crisis communications are required, there are just four things your stakeholders, the public and the media want to know: 1. WHAT HAPPENED? 2.WHAT IS BEING DONE? 3.WHAT ARE YOUR NEXT STEPS? 4.WHAT CAN WE DO TO HELP?
Maximum disclosure and minimum delay is always worth considering, but when and what to release is unique to each incident. In any emergency, but especially with bomb threats, all messages should be coordinated with internal (district) and external (law enforcement) release authorities. Releasing sensitive information can jeopardize lives and disseminating inaccurate information harms credibility and impacts people’s confidence in the organization.
When developing messages for an actual emergency, work with your response partners to provide consistent messages that target your audience and stay within your lane.
Do not speculate or release unapproved information. Be sure your messages answer the four questions; this will help prevent an information vacuum.
If measures were enacted to secure your school(s) consider using the term “Heightened Security” instead “lockdown.” People may associate “lockdown” with an active shooter-type threat.
CRISIS COMMUNICATIONS
Terminology for Bomb Threats
1 What Happened? Remember “B.L.U.F.” (Bottom Line Up Front). A clear, concise statement that illustrates your organization understands the scope of the incident and is taking appropriate actions. Rather than using the “lockdown”, use “heightened security”.
2 What is Being Done? Without jeopardizing operational security, privacy or ongoing investigations, provide a brief, high-level overview of actions.
EXAMPLE: “A concerning social media post that referenced our school and a possible bomb was discovered today that required our school to implement heightened security procedures.”
EXAMPLE: “The school has implemented heightened security procedures and is restricting public access into the school while limiting student movement inside. Law enforcement is at the school and assisting us in our response.”
4 What Can We Do to Help? Without jeopardizing operational security, privacy or ongoing investigations, provide a brief, high-level overview of actions.
EXAMPLE: “Please do not come to the school as students cannot be released until law enforcement provides an “all-clear.” We will provide more information through local media outlets and our messaging system as soon as it becomes available.”
3 What Are Your Next Steps? Again, protect operational security and do not divulge too many specifics. For instance, if a school is to be evacuated, there is no need to publicly divulge where the students are being evacuated to before the site is prepared and parents have been notified. Remember, the overarching goal is to communicate you have a plan.
EXAMPLE: : “Our district and school have detailed emergency plans and these plans have been enacted. We will continue to work with local law enforcement to insure the safety of our students and staff.”
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
14
BOMB THREAT RESPONSESUSPECT AND VEHICLE DESCRIPTION FORM
REMARKS:
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
BOMB THREAT COORDINATOR SEARCH TRACKING FORM
AREA TO BE SEARCHED= CLEAR= DANGER SEARCH TEAM MEMBERS
15
NOTES
Name of Coordinator Search Tracking Form:
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
This form is to be provided to persons being asked to search for suspicious devices.
BOMB THREAT SEARCH SHEET
KEY POINTS TO SEARCH
NAME OF PERSON(S) CONDUCTING THE SEARCH
AREAS TO BE SEARCHED
GENERAL SEARCH GUIDELINES
**IF TICKING SOUND IS HEARD, ATTEMPT TO VISUALLY LOCATE THE ITEM. IF THE ITEM CANNOT BE LOCATED, TREAT THE SOUND AS IF YOU HAVE LOCATED A SUSPICIOUS ITEM.
16
1 2
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Complete
□ Search in two-person teams whenever possible.
□ Divide area to be searched in half (based on content, not size).
□ Listen for “ticking” or “clockwork” sounds**.
□ FIRST - search your half of the room waist high (around three feet) and BELOW.
□ SECOND - search your half of the room ABOVE waist high.
IF A SUSPICIOUS OBJECT IS LOCATED □ Do NOT touch the object.
□ Stop searching that area (there may be additional devices elsewhere).
□ Notify teachers and have everyone move to the other side of the building.
□ Persons who located the object are to report to the Facility Leader.
(Facility Leader will notify the authorities and recall others search teams)
□ Secure the area where the item was located, but do not guard it.
(STAY AWAY FROM THE ITEM)
□ If possible on the way out of the area, open doors and windows near the item.
□ Facility Leader will determine evacuation route and rally point.
□ Search teams will re-deploy to search evacuation routes and paths to the rally point.
□ When routes are cleared, assist in evacuation as needed.
□ Identify all packages, boxes, briefcases, and bags. If you CANNOT identify that the item belongs in the area you are searching, treat it as a suspicious object.
□ Desks
□ Air Ducts
□ Bookcases
□ Wastebaskets
□ Filing Cabinets
□ Window Sills
MAKE ADDITIONAL COPIES OF THIS PAGE AS NEEDED
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
17
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
This distance is governed by the greater hazard of fragmentation distance, glass breakage or threshold for ear drum rupture.
Use the Incident Command System (ICS) to help delegate authority and achieve the Incident Objectives. Not every ICS position that is listed below has to be staffed and people can fill more than one assignment. Assignments should be prioritized based on the Incident Objectives.
08 INCIDENT COMMAND ASSIGNMENT
INCIDENT COMMANDER
TRANSFER OF COMMAND
I.C.S. CHART
REMEMBER – ICS Staffing is based on incident objectives and available resources. YOU ARE NOT REQUIRED TO FILL ALL ICS POSITIONS.
Name
Cell # / Radio CallPUBLIC INFORMATIONName
Cell # / Radio Call
SAFETY COORDINATORName
Cell # / Radio Call
FINANCE/ADMINName
Cell # / Radio Call
LOGISTICSName
Cell # / Radio Call
TRANSPORTATIONName
Cell # / Radio Call
OPERATIONSName
Cell # / Radio Call
PLANNING & INTELLIGENCEName
Cell # / Radio Call
SECURITYName
Cell # / Radio Call
STUDENT TRACKINGName
Cell # / Radio Call
FIRST AID/MEDICALName
Cell # / Radio Call
EMERGENCY TEAMName
Cell # / Radio Call
Name
Cell # / Radio Call
Name
Cell # / Radio Call
FAMILY REUNIFICATIONName
Cell # / Radio Call
PSYCHOLOGICALName
Cell # / Radio Call
NEW INCIDENT COMMANDER
Agency
Rank / Name
Cell # / Radio Call
Time
NOTESSCHOOL/DISTRICT INCIDENT COMMANDER
Name
New Assignment?
Cell # / Radio Call
DOCUMENTATIONName
Cell # / Radio Call
□ N / A (Optional)
18
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.
INCIDENT COMMAND CHART GUIDE
I.C.S. CHART GUIDE
19
This I.C.S. Chart is optional. If your district or school has not received formal Incident Command System (I.C.S.) training, you are strongly encouraged to complete the FEMA IS-100.SCa (ICS for Schools) course.
INCIDENT COMMANDER (I.C.) This is the person in charge of the drill (or response in an actual emergency). The I.C. can change as the emergency changes or as more qualified people arrive; this is called “Transfer of Command (Section 8).
(MANDATORY)
SAFETY COORDINATOR A member of the Command Staff responsible for monitoring and assessing safety hazards or unsafe situations, and for developing measures for ensuring personnel safety.
(OPTIONAL)
PLANNING AND INTELLIGENCE Responsible for the collection, evaluation, and dissemination of information related to the incident, and for the preparation and documentation of Incident Action Plans.
(RECOMMENDED)
1. DOCUMENTATION (Student Accountability)
1. EMERGENCY TEAM (School Safety or Crisis Teams fall under Operations) 2. SECURITY (Security officers report to Operations during the emergency) 3. FIRST AID & MEDICAL (First aid teams are under Operations) 4. FAMILY REUNIFICATION (Implementing renunciation falls under Operations) 5. MENTAL HEALTH (Mental health services are coordinated through Operations)
OPERATIONS Responsible for implementing all aspects of the emergency response and meeting the objectives set by the I.C.
(MANDATORY)
1. TRANSPORTATION
LOGISTICS Provides resources and other services to support incident management.
(OPTIONAL)
FINANCE AND ADMIN Responsible for all incident costs and financial considerations.
(OPTIONAL)
TRANSFER OF COMMAND When command is transferred, the process must include a briefing that captures all essential information for continuing safe and effective operations.
PUBLIC INFORMATION A member of the Command Staff responsible for interfacing with the public and media or other agencies with incident-related information requirements.
(OPTIONAL)
BOMB THREAT RESPONSE
RESOURCESS E C T I O N
©2013 SafePlans.com Disclaimer: This guide is intended to supplement an all-hazards emergency plans. This guide is not meant to serve as a standalone emergency plan.