MRO Security Advisory Council (SAC) Webinar Suspicious Packages and - - PowerPoint PPT Presentation

mro security advisory council sac webinar
SMART_READER_LITE
LIVE PREVIEW

MRO Security Advisory Council (SAC) Webinar Suspicious Packages and - - PowerPoint PPT Presentation

MRO Security Advisory Council (SAC) Webinar Suspicious Packages and Bomb Threat Considerations John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies May 30, 2019 John Breckenridge is


slide-1
SLIDE 1

MRO Security Advisory Council (SAC) Webinar

“Suspicious Packages and Bomb Threat Considerations”

John Breckenridge, Director Corporate Security Business Continuity, KCP&L and Westar, Evergy Companies

May 30, 2019

slide-2
SLIDE 2

John Breckenridge

Email: John.Breckenridge@kcpl.com John Breckenridge is the Director of Corporate Security and Business Continuity for Kansas City Power & Light based in Kansas City, MO. In his current capacity, he directs the overall Corporate Security function to ensure security operations are in compliance with legal, regulatory, and company requirements. Corporate Security responsibilities include physical security, security compliance, investigations, guard force management, protection operations, law enforcement liaison, enterprise- wide crisis management and business continuity planning. To be effective,

  • Mr. Breckenridge uses his 30 plus years of military, criminal justice and

industrial security experience to work with each functional department and business unit.

slide-3
SLIDE 3

Bottom Line Up Front! (B.L.U.F.!)

Please don’t think it can’t happen to you – because it can! First, figure out how YOUR company processes mail delivery internally. Work closely, in advance, with your Internal resources; Call Centers, Investor Relations, and

  • thers who may receive any kind of threats to ensure they know who to report to within your

company. Work closely with your External resources; Local, County, State, Federal, Provincial, RCMP, etc., law enforcement agencies and Intelligence units (use your Clearances!) to try and be aware of any threat actors/groups. Try to keep a record of previous threat actors/groups. If/when you become aware of a recent threat – retrain!

slide-4
SLIDE 4

History US and International Incidents

1764 - First mail bomb was in Denmark 1970’s to 1996 – Unabomber – Ted Kaczynski 2001 US Anthrax letters soon after terrorist attack of 9/11 October, 2018 – White Powder Mailed to Ted Cruz’s Office – Texas October 2018 – Mail Bomb Suspect Arrested in Florida reference Cesar Sayoc, Jr. January 2019 – Man Arrested After Suspicious Packages Sent to Consulates in Australia March 2019 – United Kingdom and Ireland Recent Missouri issues.

slide-5
SLIDE 5

Type of Packages

Explosive Devices Chemical Agents Radiological Agents Biological Agents Dead fish?!

slide-6
SLIDE 6

Package bound for Austin blows up at FedEx Building Near San Antonia – March 2018

https://www.cbsnews.com/news/fedex-package-bomb-today-meant-for-austin-area-delivery/

slide-7
SLIDE 7

Department of Homeland Security Anomalies that should raise red flags about a package

Anomalies that should raise red flags about a package

Rigid or bulky Lopsided or uneven Wrapped in string Badly written or misspelled labels Generic or incorrect titles Excessive postage No postage Foreign writing, postage, or return address Missing, nonsensical, or unknown return address Leaks, stains, powders, or protruding materials Ticking, vibration, or other sound

slide-8
SLIDE 8

Leave the mail or package where it was

  • found. Do not disturb. Do not try to clean

the substance. Immediately call 911 Clear the immediate area of all persons and cordon off. Instruct people to wash hands and other exposed skin with soap and water. List names of person in immediate are of mail/package. Shut down all heating, ventilation, air conditioning, or fans in room. Document the location of mail/package

slide-9
SLIDE 9
slide-10
SLIDE 10

Identification and Response Plan

Anomalies that should raise red flags about a package

The following identification and response plan will be utilized during an event where a suspicious package is recognized on

  • r near Company property. Training is provided to mail room employees and an appropriate response is outlined in the

Suspicious Package Response Flow Diagram. The Suspicious Package Reporting Flow Chart is available to all employees via the Corporate Security Website. Suspicious Package Response Diagram Suspicious Package Reporting Flow Chart Suspicious Package Recognition When a suspicious package is reported to Security, a member of the Security Management Team will Coordinate an appropriate response in a timely manner (This may include personal response or response of emergency personnel depending on the nature of the package) Identify the intended recipient of the package, if applicable. Make notification to the individual. Identify the sender of the package, if possible. Conduct a comprehensive threat assessment of the individual and determine appropriate action. Photograph or make copies of the package and contents if safe to do so. Notify the mail room of the person sending a suspicious package and have future mail from that person screened for foreign substances or threatening content. If suspicious but not deemed dangerous or threatening - Draft a letter briefly explaining the circumstances of the suspicious package, attach the letter to all items deemed safe to handle, and forward them to the intended recipient.

slide-11
SLIDE 11

Bomb Threat Issues

slide-12
SLIDE 12

Discovery of a device or Suspicious Package Anomalies that should raise red flags about a package

Report location and accurate description to authorities ID the danger area and cordon off, and evacuate a clear zone of at least 300 feet, including floors, above and below

slide-13
SLIDE 13

“BOMB” Threats Anomalies that should raise red flags about a package

PRIOR TO THREAT

  • Plan and Prepare
  • Develop A Bomb Threat Response Plan
  • Provide Bomb Threat Response Plan Training to all personnel

IF THREAT IS RECEIVED

  • Conduct threat assessment
  • Execute appropriate actions
  • Response Plan

BOMB THREAT GUIDANCE

  • PDF Document added at end of presentation

BOMB THREAT CHECKLIST

  • PDF Document added at end of presentation
slide-14
SLIDE 14

Center for Domestic Preparedness site (free training)

https://cdp.dhs.gov/find-training https://cdp.dhs.gov/online_course/

slide-15
SLIDE 15

TRIPwire

https://tripwire.dhs.gov/

slide-16
SLIDE 16
slide-17
SLIDE 17

PRIOR IOR T TO O THR HREAT T

 Plan and prepare  Develop a Bomb Threat

Response Plan

 Provide Bomb Threat Response

Plan training to all personnel

IF T IF THR HREAT IS IS R RECE CEIV IVED D

 Conduct threat assessment  Execute appropriate actions

  • utlined in Bomb Threat

Response Plan

  • 1. Planning and Preparation

Planning Considerations

 Coordinate with local law enforcement and first responders to ensure smooth handling of a bomb threat  Develop clear-cut primary and alternate levels of authority (referred to in this document as “Site Decision Maker(s)”)  Select Evacuation Teams and Search Teams  Develop training plan  Determine search procedures  Designate control center locations  Plan for emergency assistance (police, fire, etc.)  Establish primary and alternate evacuation routes and assembly areas  Establish evacuation signal(s)  Develop a communications plan  Determine procedures for accessing/shutting

  • ff

and reactivating utilities

Preparation Considerations

 Control building access  Implement strict master key control  Inspect incoming parcels  Safeguard confidential material  Keep exits unobstructed  Ensure adequate internal/external emergency lighting  Utilize electronic surveillance

  • 2. Emergency Toolkit Contents

Items you may want to consider including in your Emergency Toolkit that will be taken to the Incident Command Post.

Building Facility

 Complete set of master keys: coded to rooms and corresponding with a printed key list  Blueprints and floor plans or site map of building  Video, photographs, or CD depicting building interior and exterior

Emergency Response Plans

 Copies of the Site Crisis Response Plan, Bomb Threat Plan, and Crisis Management Plan  A list of the following phone numbers:  Site Decision Maker(s)  Police/Fire/Emergency Medical Services (EMS)  Federal Bureau of Investigation (FBI)  Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF)  Postal Inspector  Nearest hospital  Facility emergency names and phone numbers

Personnel Information

 Building emergency response team member contact information and assignments  List

  • f

personnel trained in CPR and/or f irst aid  Updated list, with pictures if possible,

  • f

all staff/personnel  Staff/visitors sign-in/out sheets that include names and dates; Include provision for staff/visitors transported to medical facilities  List

  • f

staff with special needs and description

  • f

need  Contact information for n eighboring/contiguous buildings

Additional Emergency Action Resources

 Reflective vests for b uilding emergency response team members with identifying marks  Bullhorn with charged batteries  AM/FM portable radio  Flashlights and batteries  Local street and zone maps  Clipboards  Writing materials (legal pads, pens, pencils, markers)  Plastic red/yellow tape for cordoning off areas

  • 3. Receiving a Threat

Phoned Threat

 Remain calm and DO NOT HANG UP  If possible, signal other staff members to listen and notify Site Decision Maker(s) a nd authorities  If the phone has a display, copy the number a nd/or le tters

  • n

the window display  Write down the exact wording

  • f

the threat  Keep the caller

  • n

the line for a s long as possible and use the Bomb Threat Checklist to gather a s much information as you can  Record, if possible  Fill out the Bomb Threat Checklist immediately  Be available for int erviews with the building’s emergency response team and law enforcement

Verbal Threat

 If the perpetrator leaves, note which direction they went  Notify the Site Decision Maker(s) and authorities  Write down the threat exactly as it was communicated  Note the description

  • f

the person who made the threat:  Name (if known)  Race  Gender  Type/color

  • f

clothing  Body size (height/weight)  Hair and eye color  Distinguishing features  Voice (loud, deep, accent, etc.)

Written Threat

 Handle the document as little as possible  Notify the Site Decision Maker(s) and authorities  Rewrite the threat exactly as is

  • n

another s heet

  • f

paper and note the following:  Date/time/location document was found  Any situations

  • r

conditions surrounding the discovery/ delivery  Full names of any personnel who saw the threat  Secure the

  • riginal

threat; DO NOT alter t he item in any way  If small/removable, place in a bag

  • r e

nvelope  If large/stationary, secure the location

Emailed Threat

 Leave the message open on the computer  Notify the Site Decision Maker(s) and authorities  Print, photograph,

  • r

copy the message and subject line; note the date and time

  • 4. Threat Assessment

All threats should be carefully evaluated. One must consider the facts and the context, and then conclude whether there is a possible threat.

Low Risk

Lacks Realism: A threat that poses a minimum risk to the victim and public safety. Probable motive is to c ause disruption.

 Threat

is vague and indirect.

 Information

contained within the threat is inconsistent, implausible,

  • r

lacks detail.

 Caller is

definitely known and has called numerous times.

 The

threat was discovered instead

  • f

delivered (e.g., a threat written

  • n

a wall).

Medium Risk

Increased Level

  • f Realism: Threat that

could be carried

  • ut,

although it may not appear entirely realistic.

 Threat

is direct and feasible.

 Wording

in the threat suggests the perpetrator h as given some thought

  • n

how the act will be carried

  • ut.

 May

include indications

  • f

a possible place and time.

 No

strong indication the perpetrator h as taken preparatory steps, although there may be some indirect reference pointing to that possibility.

 Indication

the perpetrator h as details regarding the availa- bility

  • f

components needed to construct a bomb.

 Increased

specificity to the threat (e.g., “I’m serious!” o r “ I really mean this!”).

High Risk

Specific and Realistic: Threat appears to pose an immediate and serious danger to the safety

  • f others.

 Threat

is direct, specific, and realistic; may include names

  • f

possible victims, specific time, and location

  • f

device.

 Perpetrator p

rovides his/her ide ntity.

 Threat

suggests concrete steps have been taken toward carrying

  • ut

the threat.

 Perpetrator ind

icates they have practiced with a weapon

  • r

have had the intended victim(s) u nder s urveillance.

slide-18
SLIDE 18
  • 5. Staff Response

Considerations for Site Decision Maker(s)

 Immediately contact local law enforcement if not done  Limit access to building  Review Bomb Threat Response Plan  Conduct Threat Assessment  Determine if s earch is warranted based

  • n

Threat Assessment

If Search Is Initiated

 Enact Search Plan  Communicate situation to staff/personnel and request that they make a quick and complete visual scan of their personal workspace for anything unusual  Account for all personnel  Assemble Search and Evacuation Team(s) and update about bomb threat condition

General Search Team guidelines:

 Search Teams make a quick and complete visual scan of the search area  Divide individual rooms/areas into search levels  Take special note of any object(s) that seem out of place  Check ledges, balconies, waste baskets, and false ceilings and floors  Check for unusual odors and listen for any unusual background noises  If anything unusual is noticed, move people away from the potential hazard and immediately report the location of the

  • bject(s) to the Site Decision Maker(s)

NOTE: Use of radio communications is NOT recommended unless the area has been searched and cleared.

For additional information and products on bomb threats and improvised explosive device (IED) search procedures, please visit the DHS Office for Bombing Prevention website at www.dhs.gov/what-to-do-bomb-threat

  • 6. Suspicious Item

A suspicious item is anything (e.g., package, vehicle) that is reasonably believed to contain explosives, an IED, or other hazardous material that requires a bomb technician to further evaluate it. Potential indicators are threats, placement, and proximity of the item to people and valuable assets. Examples include unexplainable wires or electronics, other visible bomb- like components, unusual sounds, vapors, mists, or odors. Generally anything that is Hidden, Obviously suspicious, and not Typical (HOT) should be deemed suspicious.

If Suspicious Item Is Found

 DO NOT touch, tamper w ith,

  • r

move the item  Immediately report item to Site Decision Maker(s) and local law enforcement/first responders  Site Decision Maker(s) must:  Ensure area is secured and cleared of personnel  Notify Search Teams  Ensure emergency responders are briefed  Evacuation and Search Teams should remain available to assist and inform evacuees, media, staff, and others

Considerations for Site Decision Maker(s)

 Not all items are suspicious  An unattended item is anything (e.g., bag, package, vehicle) not in someone’s possession and where there are no

  • bvious

signs

  • f

being suspicious (see above), especially if no threat was received

NOTE: The discovery of one suspicious item should not automatically mean the conclusion of a search. More suspicious items may be present.

The Site Decision Maker(s) must take the discovery of multiple suspicious items into consideration during the planning and execution stages of the facility’s Bomb Threat Response Plan.

  • 7. Lockdown/Evacuation

Considerations for Site Decision Maker(s)

 Repeat Threat Assessment:  Is the threat still credible?  Were any suspicious items loc ated (if search was initiated)?  Based on Threat Assessment, search (if initiated), and totality of circumstances, determine if addition measures are warranted:  Partial or full lockdown?  Partial or full evacuation?  No further action?

If Evacuation Is Initiated

 Select evacuation routes and assembly areas that are not in the vicinity of the suspicious item; ensure these routes have been searched and cleared  Notify police/fire/EMS

  • f

evacuation and request assistance  Account for a ll personnel  Evacuation Team confirms the building is empty  Bring emergency kit and building trauma kits, if available  Advise all evacuees to remove all personal items ( e.g., purses, backpacks)

Continuing Actions After Evacuation

 Debrief emergency services and assist in coordinating further a ctions  Take accountability and report  Open media, medical, and family areas — brief regularly  As appropriate, determine reoccupy or dismiss action  Reoccupy when cleared and deemed appropriate  Dismiss in consultation with site administration  Notify all personnel of decision and ensure accountability  Site Decision Maker(s) should remain on-scene until situation is resolved or until relieved by another administrator

A Final Note

Every bomb threat requires professional judgment and should be handled in accordance with the facility’s needs. Site Decision Maker(s) and administrators should periodically review Federal guidance and work with local first responders to establish a Bomb Threat Response Plan that addresses each risk level appropriately and is optimal for their building(s) and personnel.

2016

Bomb Threat Guidance

These guidelines are designed to help Site Decision Makers

  • f commercial facilities, schools, etc., respond to a bomb

threat in an orderly and controlled manner with first responders and other stakeholders.

This product was developed jointly by the FBI and DHS Office for Bombing Prevention and reviewed by the National Explosives Task Force (NETF). For more information, contact the DHS Office for Bombing Prevention at OBP@dhs.gov or the NETF at NETF@ic.fbi.gov.

slide-19
SLIDE 19

tsrponmlkihgecbaTSPMCB NATIONAL

PROTECTION AND PROGRAMS DIRECTORATE

OFFICE

FOR BOMBING PREVENTION

Bomb Threat Management Plan Checklist

NOTE: The bomb threat response plan may be included as part

  • f

an

  • verall

emergency response plan.  General  Model

  • n

Incident Command System (ICS) procedures (Actual titles may vary)  Incorporate law enforcement/emergency responder input  Define terms  Describe mitigation measures  Plan for multiple threat scenarios  Provide inclement weather

  • ptions

 Establish explosion protocols  Establish procedures for shutting

  • ff/turning
  • n

utilities  Identify location

  • f

incident command post and alternate location  Identify communications/incident command post equipment requirements  Identify safety and search equipment  Establish communications procedures  Evaluate potential legal issues  Identify training/exercising requirements  Establish review and revision procedures  Coordinate with neighboring properties  Identify Key Personnel/Roles & Responsibilities  Incident commander  Search team leader  Search team members  Law enforcement liaison  Evacuation team leader  Evacuation team members  Runners  Evacuees  Describe Threat Handling Procedures  Bomb threat call procedures  Bomb threat message procedures  Detection protocols  Notification and reporting procedures  Reporting form  Include Threat Evaluation Section Specific  Language

  • f

threat  Witness interviews  Time available for search/evacuation  Known access control breaches  Danger in evacuation areas General  Nature

  • f

facility/event

  • r

 Current threats and events  Prior acts against this

  • r

similar  Significance

  • f

dates/events  Accessibility

  • f

premises

slide-20
SLIDE 20

 Include Evacuation Section  Conditions for evacuation (immediate, as directed by responders, etc.)  How communicated  Assembly/staging and shelter‐in‐place  Evacuation routes  Special needs evacuees  Evacuation procedures  Remove personal items  Unlock

  • r

refrain from locking  Muster reporting requirements/personnel accountability  Include Search Section  High‐priority areas for searches  Incident Command Post  Assembly/Staging areas  Critical areas  Vulnerable areas  Search and marking procedures (systematic and thorough, with work/rest cycle)  Search kit/equipment, including floor plans & maps  Search reporting procedures  Specify Return to Work Procedures  Procedures for a safe return to the building  Debriefing and updating the plan  Contact information for counseling

  • r

medical needs following the incident September 2013

slide-21
SLIDE 21

_______________________________________________ _______________________________________________ _______________________________________________ _______________________________________________

BOMB THREAT CALL PROCEDURES

BOMB THREAT CHECKLIST

Date: Time: Time Caller Phone Number Where Hung Up: Call Received: Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on the reverse of this card. If a bomb threat is received by phone:

  • 1. Remain calm. Keep the caller on the line for as long as
  • possible. DO NOT HANG UP, even if the caller does.
  • 2. Listen carefully. Be polite and show interest.
  • 3. Try to keep the caller talking to learn more information.
  • 4. If possible, write a note to a colleague to call the

authorities or, as soon as the caller hangs up, immediately notify them yourself.

  • 5. If your phone has a display, copy the number and/or

letters on the window display.

  • 6. Complete the Bomb Threat Checklist (reverse side)
  • immediately. Write down as much detail as you can
  • remember. Try to get exact words.
  • 7. Immediately upon termination of the call, do not hang

up, but from a different phone, contact FPS immediately with information and await instructions. If a bomb threat is received by handwritten note:

  • Call ______________________
  • Handle note as minimally as possible.

If a bomb threat is received by email:

  • Call ______________________
  • Do not delete the message.

Signs of a suspicious package:

  • No return address
  • Poorly handwritten
  • Excessive postage
  • Misspelled words
  • Stains
  • Incorrect titles
  • Strange odor
  • Foreign postage
  • Strange sounds
  • Restrictive notes
  • Unexpected

delivery DO NOT:

  • Use two-way radios or cellular phone; radio signals

have the potential to detonate a bomb.

  • Evacuate the building until police arrive and evaluate

the threat.

  • Activate the fire alarm.
  • Touch or move a suspicious package.

WHO TO CONTACT (select one)

  • Follow your local guidelines
  • Federal Protective Service (FPS) Police

1-877-4-FPS-411 (1-877-437-7411)

  • 911

Ask Caller:

  • Where is the bomb located?

(Building, Floor, Room, etc.)

  • When will it go off?
  • What does it look like?
  • What kind of bomb is it?
  • What will make it explode?
  • Did you place the bomb? Yes No
  • Why?
  • What is your name?

Exact Words of Threat: Information About Caller:

  • Where is the caller located? (Background and level of noise)
  • Estimated age:
  • Is voice familiar? If so, who does it sound like?
  • Other points:

Caller’s Voice Background Sounds: Threat Language:

‰ Accent ‰ Animal Noises ‰ Incoherent ‰ Angry ‰ House Noises ‰ Message read ‰ Calm ‰ Kitchen Noises ‰ Taped ‰ Clearing throat ‰ Street Noises ‰ Irrational ‰ Coughing ‰ Booth ‰ Profane ‰ Cracking voice ‰ PA system ‰ Well-spoken ‰ Crying ‰ Conversation ‰ Deep ‰ Music ‰ Deep breathing

‰ Motor

‰ Disguised ‰ Clear ‰ Distinct ‰ Static ‰ Excited ‰ Office machinery ‰ Female ‰ Factory machinery ‰ Laughter ‰ Local ‰ Lisp ‰ Long distance ‰ Loud ‰ Male

Other Information:

‰ Nasal ‰ Normal ‰ Ragged ‰ Rapid ‰ Raspy ‰ Slow ‰ Slurred ‰ Soft ‰ Stutter

_____________________________________ _____________________________________

slide-22
SLIDE 22

Page 1 November 2015

Unattended and Suspicious Items

Definitions

Unattended Item: could be a package of unknown origin and content. There are no obvious signs of being suspicious (i.e., no strange odor or no wires hanging from the item or signs of the item being altered). A law enforcement response is not required. Suspicious Item: is a package that has indications of containing an explosive device. It may have wires exposed, leaking fluids, and/or an odd odor that could smell like cleaning detergents or petroleum

  • products. All suspicious items should elicit a law enforcement response, and the item should be cleared

by the local bomb squad. NOTE: Occupants, because of their familiarity with the space where they work, can most easily spot something that does not belong there. The primary hazard associated with a suspicious item is the threat

  • f explosion or contamination. All suspicious items should be treated with extreme caution. Response

time is important.

Actions Required for an Unattended Item

Take the following actions:

  • Leave the item exactly where it is. DO NOT TOUCH IT.
  • Answer the following questions. If the answer to any of the questions is YES then treat the item as

suspicious and proceed to the Actions Required Suspicious Item section below.

  • Is the Item at or near a potential terrorist target?
  • Have there been any bomb threats or intelligence regarding a bomb threat?
  • Has there been any recent suspicious activity?
  • Was the item hidden or attempted to be hidden?
  • Is it located near a high traffic or queuing area?
  • Is the item unusual for its surroundings?
  • Only if the answers to ALL of the above questions are NO should you consider the item to be an

unattended item. At any point during the examination of the item you become suspicious, treat the item as suspicious.

  • Interview complainant and witnesses, review CCV footage, and have the vehicle license plates

checked if applicable.

  • Attempt to determine the owner/custodian of the item.
slide-23
SLIDE 23

Page 2 November 2015

  • Notify owner/custodian to retrieve the item if inquiry reveals the identity of the owner/custodian of

the article.

  • If ownership of the item cannot be determined or the owner cannot be reached request Explosive

Detection Dog Team response if available. If not available, follow the Suspicious Item Actions below.

  • If the K9 Officer determines the item to be suspicious then proceed to the Suspicious Item Actions

below.

  • If the K9 Officer determines the item not to be suspicious it can be physically examined.
  • Keep area clear.
  • Remove cell phone and radios from your person.
  • Put on full finger style gloves to create a barrier to the skin.
  • Carefully examine the exterior then interior of the item to determine if it is suspicious.
  • Attempt to establish ownership of the item.
  • If ownership cannot be determined contact supervisor for disposition instructions.
  • Enter all information in your log and prepare the necessary reports

NOTE: If a package, bag, item, or vehicle is deemed suspicious for any reason, Explosive Detection Dog (K-9) Teams will not be used to inspect suspicious packages, bags, items, or vehicles. While the K- 9 is an effective tool for alerting law enforcement personnel to the possible presence of explosives, it is not the final diagnostic tool. This is the responsibility of trained bomb squads. If an item is deemed to be suspicious, the determination that explosives may be contained in the item has already been made.

Actions Required for a Suspicious Item

Take the following actions:

  • Leave the item exactly where it is. DO NOT TOUCH IT.
  • If lights or other electrical or mechanical devices are on in the area leave them on. If they are off

leave them off.

  • You are responsible to maintain control of the area and item.
  • Immediately notify your supervisor. Be prepared to provide a description of the item and its location.
  • Cell phone and radio communication should be as far as possible from the location without losing

control of the scene.

  • Witnesses to the initial discovery of the item should be kept in a safe area.
  • Be aware of the potential for a secondary device.
  • Monitor the item and ensure no disturbance of the item occurs.
  • Evacuate immediate area and establish a perimeter utilizing the DHS/FBI Bomb Threat Stand-Off

Card.

  • It may be necessary to evacuate the building – this order will come from the Designated Official

based on recommendations from local first responders or your supervisor, based on the totality of the circumstances.

slide-24
SLIDE 24

Page 3 November 2015

  • If the building is evacuated, ensure unauthorized person(s) do not enter.
  • Begin an evacuation from areas that may be immediately impacted upon a detonation and

establish safe distances by utilizing the DHS/FBI Bomb Threat Stand Off Card.

  • Select routes and assembly areas that are away from the suspect item in the event an evacuation
  • f the facility is initiated.
  • Utilize other officers or K-9 teams to search for secondary devices and suspicious persons in the

area.

  • Use the information gathered during the search for secondary devices to establish or revise

evacuation routes and assembly areas.

  • Search all designated assembly areas for secondary devices.
  • Meet arriving emergency responders and brief them, letting them speak with person(s) who found

the item and inform them where the item is located.

  • If the item is in a securable space, such as a private office, leave the office and close the door.
  • If the item is in a large office area, have people move to a secure area outside of the large office area

and close off the affected area.

  • Release control of the scene when relieved by law enforcement personnel.
  • Assist emergency service with containing the scene.
  • Enter all information in your log and prepare the necessary reports.
  • Once the event has ended and the building declared safe for re-entry, conduct normal screening

procedures for entry.

slide-25
SLIDE 25