Office for Bombing Prevention Bomb Threat Management

Similar documents
HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

City of Virginia Beach Police Department

BOMB THREATS. See Suspicious Package section for more information

School Vulnerability Assessment

Insert Name of Facility Here. Emergency Procedure BOMB THREAT. The following procedure shall be utilized when the facility receives a bomb threat.

Administrative Procedure

WHAT IS AN EMERGENCY? WHY IT IS IMPORTANT TO PREPARE COMMUNICATIONS

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

Annex D - Active Shooter

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

NYS Office of Homeland Security Upcoming Training Course spotlights and schedule

Model Policy. Active Shooter. Updated: April 2018 PURPOSE

BOMB THREAT RESPONSE HOW TO USE THIS GUIDE. Contents

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.5

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Part 1.3 PHASES OF EMERGENCY MANAGEMENT

Chemical Plant Bomb Threat Planning Handbook

150-MC-0006 Validate the Protection Warfighting Function Staff (Battalion through Corps) Status: Approved

POLCIE, AMBULANCE, FIRE DEPARTMENT DIAL FIRE, DISASTER, EVACUATE 3 BELLS

School Emergency Management: An Overview

Richland County Sheriff s Department. Homeland Security. Don Murphy Homeland Security Coordinator. Leon Lott. Sheriff

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex

Bay Area UASI FY 2012 PROJECT PROPOSAL FORM

Public Safety and Security

Terrorism Incident Law Enforcement and Investigation Annex. Cooperating Agencies: Coordinating Agency:

CRITICAL INCIDENT MANAGEMENT

Intelligence Bulletin Joint FBI-DHS Bulletin No. 348

Vice President, Finance & Administration. ER801 - Emergency Response Policy Emergency Response Plan

This Annex describes the emergency medical service protocol to guide and coordinate actions during initial mass casualty medical response activities.

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN

NEW JERSEY TRANSIT POLICE DEPARTMENT

EMERGENCY SUPPORT FUNCTION 1 TRANSPORTATION

Emergency Management Resource Guide. Kentucky Center for School Safety. School Plan

KENTUCKY HOSPITAL ASSOCIATION OVERHEAD EMERGENCY CODES FREQUENTLY ASKED QUESTIONS

San Francisco Bay Area

ESF 13 Public Safety and Security

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE

Active Violence and Mass Casualty Terrorist Incidents

Terrorism Consequence Management

EMERGENCY RESPONSE FOR SCHOOLS Checklists

The 2018 edition is under review and will be available in the near future. G.M. Janowski Associate Provost 21-Mar-18

OVERVIEW OF EMERGENCY PROCEDURES

Springfield Technical Community College

San Joaquin County Emergency Medical Services Agency. Active Threat Plan

Tidewater Community College Crisis and Emergency Management Plan Appendix F Emergency Operations Plan. Annex 8 Active Threat Response

Active Shooter Guideline

SANGAMON COUNTY DEPUTY SHERIFF ENTRY LEVEL APPLICATION PROCEDURES

Revising the National Strategy for Homeland Security

University of Virginia Health System TABLE OF CONTENTS

Active Shooter Defense. Facility Tenant Brief

ACTIVE SHOOTER HOW TO RESPOND

UNIVERSITY OF TOLEDO

CYBER ATTACK SCENARIO

Response Protocols July 26,

MARINE CORPS INSTALLATIONS NATIONAL CAPITAL REGION-MARINE CORPS BASE QUANTICO ORDER B

MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF13-Public Safety

ACTIVE SHOOTER GUIDEBOOK

TERR RISM INCIDENT ANNEX

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup

UTAH STATE UNIVERSITY EMERGENCY OPERATIONS PLAN

ANNEX V TERRORIST INCIDENT RESPONSE

ANNEX 13 ESF-13 - LAW ENFORCEMENT

Mission. Directions. Objectives. To protect patients, staff, and visitors during an active shooter incident.

II. PURPOSE III. POLICY

8/15/2016 THREAT ASSESSMENT: THE ACTIVE SHOOTER RISK OBJECTIVES RECENT NEWS K DON EDWARDS DO. Understand what the past has shown us

Course: IS ICS for Single Resources and Initial Action Incidents

Florida Educational Facilities Planners Association, Inc. Security in the Classroom

Integrated Emergency Plan. Overview

ICS POSITIONS & FUNCTIONS

Emergency and Evacuation Procedures CO 500.4:

ACTIVE SHOOTER HOW TO RESPOND. U.S. Department of Homeland Security. Washington, DC

UNIT 2: ICS FUNDAMENTALS REVIEW

7 IA 7 Hazardous Materials. (Accidental Release)

Critical Incident Policy (Business Continuity Plan)

DRAFT 10/08/2010 VERSION

ANNEX R SEARCH & RESCUE

Planning Terrorism Counteraction ANTITERRORISM

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

DEPARTMENT OF THE NAVY NAVAL SERVICE TRAINING COMMAND 2601A PAUL JONES STREET GREAT LAKES, ILLINOIS

COMPLIANCE WITH THIS PUBLICATION IS MANADATORY

To address this need, President Bush issued the following Homeland Security Presidential Directives (HSPDs):

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

UNIT 6: CERT ORGANIZATION

CHAPTER 246. C.App.A:9-64 Short title. 1. This act shall be known and may be cited as the "New Jersey Domestic Security Preparedness Act.

Emergency Management 101. What Every School District Needs to Know

Nuclear/Radiological Incident Annex

NATIONAL RESPONSE PLAN

BOMB THREATS, CLANDESTINE LABORATORIES, DESTRUCTIVE DEVICES, EXPLOSIONS, AND FIREWORKS

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

City of Torrance Police Department

Draft 2016 Emergency Management Standard Release for Public Comment March 2015

Emergency Operations Plan

SCHOOL CRISIS, EMERGENCY MANAGEMENT, AND MEDICAL EMERGENCY RESPONSE PLANS

Position Vacancy

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

Western New Mexico University Crisis Intervention Plan

Emergency Support Function #13 - Public Safety and Security

4-223 BODY WORN CAMERAS (06/29/16) (07/29/17) (B-D) I. PURPOSE

PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES

PATROL OFFICER. 3. Aid individuals who are in danger of physical harm. 4. Facilitate the movement of vehicular and pedestrian traffic.

Transcription:

Bomb Threat Management FOR OFFICIAL USE ONLY Rev: B 1

Second level Third level Fourth level Fifth level

Homeland Security Presidential Directive-19 Homeland Security Presidential Directive 19: Establishes a national policy on the prevention and detection of, protection against, and response to terrorist use of explosives and IEDs HSPD-19 Report to the President: Outlines 36 Recommendations, developed with interagency concurrence, to execute the National Strategy to Combat Terrorist Use of Explosives HSPD-19 Implementation Plan (IPLAN): DHS is lead agency for 22 of the 36 Implementation Tasks Executing over 90 individual items subordinate to these tasks 3

The Threat According to an analysis of information received from reported bomb threat incidents over time. What percentage of bomb threats are considered to be real? a) 2-5% b) 6-8% c) 9-12% d) 13-15% 4

Current Events (National)- OCT 2012 253 Incidents resulted in bomb squad response 109 bomb threats 69 Suspicious packages Bomb squads rendered safe IEDs, explosive materials, and ordnance on 45 occasions 26 ordnance 6 pipe bombs 14 Emplaced IEDs (3 chemical pressure bombs) 3 injured 59 arrests (16 juveniles) 5

Current Events- OCT 2012 Bomb threats and suspicious packages: 70% Actual IED explosions: 6% 6 60% of all bomb threats occurred at schools and commercial facilities Office for Bombing Prevention 6

The Threat How do you counter the bomb threat? Aggressive preparation 7

The Threat Hoax Caller Disruption of Operations Intimidation Amusement Activism Malevolent Individual Crime Concealment Extortion Grievance Activism Terrorist Political Impact Racial/Ethnic/Religious Hatred Retaliation Reduction of casualties First responder assets associated with response efforts Psychological effect associated with facility (decreased patronage) Monetary losses associated with decreased patronage Furtherance of perpetrators strategic goals Decreased morale, lack of confidence in leadership, decreased productivity, attrition 8

The Threat 9

BTM Continuum Receipt of threat Return to work Assess Incident Commander Evacuation Search 10

Receipt of Threat Receipt of the threat (message) Telephone Note Internet based platforms: Email or social networking sites Drawing 3rd Party News media Police Person 11

Receipt of Threat Bomb Threat Call Procedures http://emilms.fema.gov/is906/assets/ocso- bomb_threat_samepage-brochure.pdf 12

ReceiptEvaluation of Threat Threat Characteristics of the caller Age Ethnic grouping Physical and mental condition Repeated deliberate message Background noises Callers location Did the threat indicate a valid target? Specific of knowledge of target Is the device described logical and possible? 13

Receipt of threat Receipt of the threat (suspicious item) Determine if item is suspicious or unattended Answer these questions: Is the Item at or near a potential terrorist target? Have there been any bomb threats or intelligence regarding a bomb threat? Has there been any recent suspicious activity? Was the item hidden or attempted to be hidden? Is it located near a high traffic or queuing area? Is the item unusual for its surroundings? Only if the answers to ALL of the above questions are NO should you consider the item to be an unattended item. At any point during the examination of the item you become suspicious, treat the item as suspicious. 14

Receipt of Threat Receipt of the threat (suspicious item) Notify security Control access Isolate threat Create standoff (evacuation) Preserve evidence Do not alter environmental conditions Review CCTV footage or witnesses Reduce risk exposure Do not touch, move, or cover the object Do not confront persons that appear to be dangerous Limit cellular or radio communications around device Attempt to gain enough information for: Suspicious object/circumstances report Emergency responder inquiry Be aware of secondary devices 15

Assess Threat Evaluation Current events Current political climate Current terrorist events Current foreign policy National Terrorism Advisory System (NTAS) Alerts Threat information sharing groups Organization s image 16

Threat Evaluation Low Risk Lacks Realism How threat was received: Indirect/vague Location of threat: Note discovered Written on wall Characteristics of caller Identification and frequency of threat Ability to carry out threat is questionable Medium Risk Threat is feasible Sufficient detail More credible than low risk Increased specificity inherent in threat Time and place Indication of device size Indication of details regarding availability of components used to build device Office for High Risk Specificity to the degree of naming individuals as possible victims The caller identifies themselves or affiliation Detailed knowledge of device &/or facility Specifies the location and time of detonation Threat is relative to current events 17

Response Options Courses of Action: Continue to assess/monitor the situation Shelter-in-place Initiate evacuation Initiate search Initiate a combination of search and evacuation procedures 18

Response Possible Courses of Action: Continue to assess/monitor the situation Shelter-in-place Initiate search procedures Evacuation route search Comprehensive search Affected area search Search before evacuation Search after evacuation Emergency responder staging area search Police assisted search Initiate evacuation procedures Total evacuation Partial evacuation Affected area evacuation Phased evacuation Initiate a combination of search and evacuation procedures 19

Bomb Incident Flow Chart (Notional) Return to work Assess Evacuate Bomb Threat Search evac. route Clear Search w/out evacuation Bomb Incident Search Suspicious package Assess Suspicious package Search evac. route Evacuate Emer. Services Suspicious Package Emer. Services Clear Return to work Clear Damage control Return to work Evacuation Clear Emer. Services Damage control Return to work Clear Damage control 20 Return to work

Pre-Incident Planning Facility Management Responsibilities: Utilize risk management process to: Establish a Risk Management Team Other teams: Security Team, Security Working Group, BTM Response Team, BTM Planning Team, etc. Identify risk Conduct risk/vulnerability assessment Develop a comprehensive security/emergency management plan Develop Bomb Threat Management Plan Identify and train a BTM Response Team Implement protective measures Evaluate and assess security measures Exercise BTM plan Evaluate threats, monitor situation, conduct search, evacuate facility Communicate to all persons affected by threat 21

Pre-Incident Planning Facility Management Responsibilities (cont.): Ensure accounting of ALL personnel (recall roster) Coordination with first responders Reoccupation of facility (all clear) Establish a security working group Consult local first responders and specialized units Include tenant agencies/businesses and facilities Intel sharing agencies (fusion centers) Link with info-sharing entities (and like facilities) neighboring Establish a BTM Planning Team Designate individuals to specialize in efficient bomb threat management Include local responders or emergency management personnel Document resources used for the final plan 22

Pre-Incident Planning Conduct a facility vulnerability assessment Identification of critical assets Estimation of potential for attack Identification of vulnerabilities that can be exploited by an aggressor Identification of functions and systems that lack redundancy Determination of the criticality and protection of each area www.fema.gov/plan/prevent/rms/index.shtm 23

Pre-Incident Planning Facility Management Responsibilities: Utilize risk management process to: Establish a Risk Management Team Other teams: Security Team, Security Working Group, BTM Response Team, BTM Planning Team, etc. Identify risk Conduct risk/vulnerability assessment Develop a comprehensive security/emergency management plan Develop Bomb Threat Management Plan Identify and train a BTM Response Team Implement protective measures Evaluate and assess security measures Exercise BTM plan Evaluate threats, monitor situation, conduct search, evacuate facility Communicate to all persons affected by threat 24

Pre-Incident Planning Create the BTM plan Define terminology Incident Command System procedures Identify key personnel (BTM Response Team) Clarify roles and responsibilities Identify primary/alternate command (IC) and assembly locations Safety items-communication restrictions, evacuation distances Provide training Explosion protocol Steps for receiving a threat Threat evaluation process Search, evacuation, and procedures Exercise development Review and revise Prattville Widget Factory Security / Emergency Action Plan reoccupation April, 11, 2012 25

BTM Response Team BTM Response Team Create an organization chart with clearly defined roles Specific to the organization Utilize modified Incident Command System (ICS) Receiving Party Incident Commander Media Relations Runner Search Team Leader Runner Police Liaison Evacuation Team Leader Runner Search Team Evacuation Team 26

BTM Plan Threat Evaluation Section This section should be used to decide the response. The following items may be considered: Exact wording of the threat Prior acts against this or similar facilities Current events regarding this or similar facilities Individuals or actions at the site Accessibility of the site Occupants of the site Danger in evacuation areas Advice of local law enforcement www.dhs.gov/files/programs/ntas.shtm 27

BTM Plan Search Section This section should ensure the search is safe and effective Roles and tasks to complete during search Floor plans, outside area layout Critical or vulnerable areas to search Areas to search if evacuation is called for Basic procedure for a systematic and thorough search Tools and equipment needed for searchers Items to use for marking or securing cleared areas Procedure to use if suspicious item is found Additional search resources that may be available offsite Explosive detection K9 teams Law enforcement, military, private security personnel 28

BTM plan Evacuation Section This section should provide steps for orderly evacuation How evacuation order will be delivered to personnel Identify assembly areas/shelter-in-place locations (internal & external)-include concerns with neighboring properties Areas to avoid during evacuation Directions for employees regarding items to take with them How evacuees report suspicious items they see while leaving Removal of personnel with special needs Assembly point personnel accountability plan Awareness to threats posed while in assembly point 29

BTM Response Team Receiving Party The first employee that becomes aware of: Bomb threat Suspicious object Capture the threat Immediately notify persons responsible for carrying out the bomb threat management response plan Preserve threat material Remain calm 30

BTM Response Team Incident Commander (IC): Primarily responsible for determining the outcome and actions taken in response to the threat Assess/evaluate threat Coordination with Emer. Responders Assess threat (w/ management) Receipt of threat Establishes IC location(s) Respond to threat Continue to assess/monitor Initiate Search procedures Initiate Evacuation procedures Return to work Reoccupation Assess Incident Commande r Evacuation Search 31

Search Factors favoring a search before evacuation: High incident of hoax telephone threats Effective security arrangements have been established Level of threat activity in region/sector is low Time until detonation is sufficient Factors favoring a search after evacuation: Accessibility Precise information/insider knowledge Threat vs. risk Significance of date Current events Level of threat activity in region/sector is high Recent significant incidents 32

Search Search priorities Areas to be used as: Shelter-in-place Evacuation routes Evacuation assembly areas Emergency response staging areas Hazardous Areas: Targeted areas Service areas Mail Room Loading Dock Sensitive areas Secondary disaster zone 33

Search A well defined plan, using a systematic pattern ensuring total coverage Interior search Hazardous areas Detailed room search Evacuation routes Exterior search Hazardous areas Parking areas Evacuation are 34

Evacuation 35

Evacuation Total evacuation Partial area evacuation Affected areas Phased evacuation Large or complex facilities 36

Information Sharing & Awareness Bombing Prevention Training Surveillance Detection (SD) Training: Provides participants with the knowledge, skills, and abilities to detect hostile surveillance conducted against critical infrastructure IED Counterterrorism Workshop: Provides exposure to key elements of the IED threat, surveillance detection methods, and soft target awareness by illustrating baseline awareness and prevention actions that reduce vulnerabilities to counter the threat along with information sharing resources to improve preparedness Protective Measures Course: Provides owners and operators with the knowledge to identify the appropriate protective measures for their unique sector by outlining available protective measures and the strategies for determining which can be effectively employed in their sector IED Search Procedures Workshop: Provides IED awareness, prevention measures, and planning protocols by outlining specific search techniques that reduce vulnerability and mitigate the risk of terrorist IED attacks IED Awareness/Bomb Threat Management Workshop: Provides an IED overview and focuses on the steps for managing bomb-related threats by outlining specific mitigation and response strategies to deal with explosive incidents and bomb threats Since 2003, OBP has delivered 1,183 courses to over 41,000 participants 37

Information Sharing & Awareness Technical Resource for Incident Prevention (TRIPwire) TRIPwire is an online network for State and local law enforcement officials tasked with bombing prevention to discover and share the tactics, techniques, and procedures (TTPs) of terrorist IED use Assists both DHS and State and local law enforcement to ensure that IED security capabilities match terrorist and criminal adversaries technical capabilities TRIPwire has over 13,600 registered users 38

If you See Something Say Something!! 39

Conclusion Create a plan Identify key players Create bomb threat aids Maps of facility Liaise with local police units Develop partnerships with local businesses Impose control measures Conduct rehearsals Continually revise and update plan Remain Calm Always believe the device is ready to detonate Do not touch, keep your distance and report on observations 40