Sei sulla pagina 1di 13

ILITCH HOLDINGS/CORPORATE GENERAL TOPIC Number: 3345

SECURITY AND SAFETY


MAJOR INCIDENT SITUATIONS Page 1 of 13

Approved By: SPECIFIC TOPIC Date Issued:

BOMB THREATS Date Revised: 6/24/13

PURPOSE

To define various types of bomb threats and the proper handling of each type of threat.

PROCEDURE

3345.05 Reporting Threats: All bomb threats shall be reported to the Command
Center. The Command Center will then notify the appropriate local law
enforcement agency.

Details Needed:
 What kind of bomb?

 Where is it?

 What does it look like?

 What time will it detonate?

 Is anyone claiming responsibility?

.13 Types of Threats:

.1 Specific Threat: A threat is considered specific when a place, time,


and specific target are indicated.

.2 Non-Specified Threat: Non-specific threats are when a place, time


or specific target is not identified. The person(s) responsible for
determining whether the threat is specific or non-specific is the
ranking Corporate Executive and Security Representative who are
on duty/contacted at the time the threat is received.

A non-specific threat may be upgraded by an EOD Technician in


the interest of public safety.

WARNING NOTICE: This document contains confidential information; no part of it may be released or reproduced without the express,
written permission of the President of Ilitch Holdings.
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 2 of 13

3345.21 Non-Specific Threat:

The corporate designee in consultation with corporate security and safety,


will make a determination of whether the threat will be handled as a
specific or non-specific threat.

The Security Representative should have a heightened sense of


awareness; searching public areas looking for unattended, unusual, or
suspicious items. The search may require additional personnel, including
area colleagues.

3345.29 Specific Bomb Threat – Unknown Device Location:

.1 Initial Response: The assigned Security Representative will meet


with reporting party. The Security Representative will gather all
pertinent information regarding the threat from all possible parties.
This information will be given to the Corporate Designee and/or the
Tactical Command Post as soon as possible. Additional personnel
will be assigned to the affected area to assess the scene.

.2 Command Post: The Security Supervisor will establish a Tactical


Command Post, outside of the inner perimeter, if not already
established. Implement Incident Command System (ICS).

.3 Incident Command System:


Incident Commander (IC) is primarily responsible for determining
the outcome and actions taken in response to the threat.

 Assess/evaluate

 Coordinate with the Emergency Responders

 Assess threat (with Management)

 Establish IC location(s)

 Respond to threat – continue to assess/monitor, initiate search


procedures and initiate evacuation procedures

 Reoccupation
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 3 of 13

3345.29 Specific Bomb Threat – Unknown Device Location, continued:

Receipt
of threat

Return Assess
to work

Incident
Commander

Evacuation Search

Bomb Threat Incident Flow Chart (Notional)


Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 4 of 13
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 5 of 13

3345.30 Specific Bomb Threat – Unknown Device Location, continued:

.3 Incident Command System, continued:

Assess and Monitor – continue to assess developments in the area


if the threat is not plausible enough to warrant disturbance and/or
the individual is known to conduct threats.

.4 Corporate Designee/Security Supervisor of Evaluation


Assessment: The Tactical Command Post will evaluate the
situation. If they determine that there is an imminent threat to
public safety, they may evacuate the area and establish an Inner
Perimeter. In the event of evacuation, the corporate designee will
keep other corporate executives fully informed and seek their
cooperation for an orderly evacuation.

Threat Evaluation – focus on the following:

 Characteristics of the caller – age, ethnic grouping and physical


and/or mental condition

 Repeated deliberate message

 Background noises – caller’s location

 Did the threat indicate a specific target? (i.e. specific knowledge


of threat)

 Is the device described as logical and possible?

Additional threat evaluation factors:

 Current events – political climate, terrorist events and foreign


policy

 National Terrorism Advisory System (NTAS) alerts

 Threat information sharing groups

 Organization’s image

 Current Intelligence Environment


Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 6 of 13

3345.29 Specific Bomb Threat – Unknown Device Location, continued:

Low Risk Medium Risk High Risk


 Lacks realism  Threat is feasible  Specificity to the degree
 How threat was received:  Sufficient detail of naming individuals as
- Indirect/vague - More credible than possible victims
 Location of threat: low risk  The caller identifies
- Note discovered  Increased specificity themselves or affiliation
- Written on wall inherent in threat  Detailed knowledge of
 Characteristics of caller  Time and place device &/or facility
 Identification and  Indication of device size  Specifies the location and
time of detonation
frequency of threat  Indication of details
 Ability to carry out threat regarding availability of  Threat is relative to
is questionable components used to current events
build device

.5 Assuming Command: The Corporate Designee and Security


Supervisor shall meet at the Tactical Command Post to assume
command and to decide upon the method for handling the incident.

Response – possible courses of action:

 Continue to assess/monitor the situation

 Shelter-in-place

 Initiate search procedures


- Evacuate route search
- Comprehensive search
- Affected area search
- Search before evacuation
- Search after evacuation
- Emergency responder staging area search
- Police assisted search
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 7 of 13

3345.29 Specific Bomb Threat – Unknown Device Location, continued:

.5 Assuming Command, continued:

 Initiate evacuation procedures


- Total evacuation
- Partial evacuation - affected area evacuation
- Phased evacuation

 Initiate a combination of search and evacuation procedures

.6 Search Responsibility: The corporate entity utilizing the affected


area will be responsible for assisting Corporate Security and Safety
with searching the area. A representative for the corporate entity
shall remain at the Tactical Command Post for purposes of liaison
during the period of the emergency.

.7 Searching Public Areas: In searching public areas, and/or areas


where a corporate representative of the affected area is
unavailable, the Tactical Command Post will assist in the
assignment of police personnel to search specified locations within
the affected area with K-9 team(s).

 Refer to SOP# 2160 – Area Searching

.8 Complete Search: The Tactical Command Post Supervisor shall


ensure that areas under the Supervisor’s responsibility are
systematically and completely searched. If a device is found, the
search shall continue to locate other possible devices after the
device has been rendered safe by EOD. The Command Post will
be notified upon discovery of a device.

 If a suspect explosive device is found while conducting a


Search, it should never be moved unless done so by a trained
EOD Technician.

.8 Terminating Search: The Executive/Security Supervisor may


terminate the search within their area by declaring their affected
area secure.
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 8 of 13

3445.37 Specific Threat – Known Device Location:

.1 Secure the Critical Area: Establish Perimeter(s) and Command


Post(s), if not already established. As a general rule, the Inner
Perimeter should be placed, as a minimum, about 300 feet away
from the device. The Security Supervisor should also take into
consideration areas and floors above and below the device. The
Security Supervisor may extend this distance based upon the size
of the device and/or recommendations of the EOD Technician.

.2 Notification: Notify the EOD Technicians and any other appropriate


agencies and/or organizations.

.3 Decision to Evacuate:

 “Evacuation Only” plan – assumes that safety of personnel is


prime consideration, circumvents calculated risk and can
significantly affect operations.

 Time until stated detonation of device

 Receipt of threat by Police or Fire – the decision to evacuate in


certain instances may not be negotiable.

 Actionable intelligence may necessitate immediate evacuation –


based upon prominent subversive group linked to recent
bombings and threat evaluation.

Factors Favoring a Search Before Evacuation:

 High incident of hoax telephone threat

 Effective security arrangements have been established

 Information regarding the facility in the warning is imprecise or


incorrect

 Level of threat activity in region/sector is low

 Time until detonation is sufficient

 Inability to safely evacuate

 Current Intelligence Environment


Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 9 of 13

3445.37 Specific Threat – Known Device Location, continued:

. Evacuations: Three types of evacuations are possible including:


 Total evacuation

 Partial area evacuation – affected areas

 Phased evacuation – large or complex facilities

Prior to evacuating the Critical Area of all non-emergency


personnel, the Security Supervisor/law enforcement should check
and clear the planned evacuation route/site. Once evacuated,
locate the people that were in the Critical Area and ensure they are
accounted for. This area should not be located where it would be
susceptible to shattering glass or flying objects from an explosion.

When a person refuses to evacuate or leave the Critical Area after


receiving notice to evacuate, police personnel should advise the
person that refusal to leave may subject them to arrest pursuant to
Penal Code, MCL 750.552 (Trespass upon land of another), or if
the situation escalates, MCL 750.479 (Resisting, opposing or
obstructing an officer in discharge of duty.)
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 10 of 13

3445.37 Specific Threat – Known Device Location, continued:

.4 Evidence: Once the device has been totally rendered safe by the
EOD Technician, the device should be kept for the appropriate
investigation agency as evidence.

.5 EOD Technician Decisions: Any decision made in the affected area


by the Bomb Technician will be made in coordination with the
Tactical Command Post personnel, Corporate Designee and
Corporate Security and Safety, circumstances permitting.

.45 Changes of Procedures:

In the interest of public safety, any of the above listed procedures may be
altered by the EOD Technician, Tactical Command Post personnel and
Designated Law Enforcement/Public Safety Official.

.53 K-9 Team:

.1 Request for K-9 Team: The Corporate Designee/Security


Supervisor at the Command Post will make the request for the K-9
Team when appropriate.

.2 Location Where K-9 Team Responds: The K-9 handler will be


directed to the Field Command Post for entry into the affected
area. If the Field Command Post has not yet been established, the
dog handler will be directed to the Tactical Command Post, and the
handler will be briefed.

 If a suspect explosive device is found while conducting a


Search. It should never be moved unless done so by a trained
EOD Technician.
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 11 of 13

3345.61 Area Secure:

.1 Resumption of Normal Operations: When no device is found, or a


device is found and rendered safe, the Command Post will advise
the Corporate Designee of the findings. A determination will be as
to how and when they wish to resume their normal operations.

.2 Command Center Notifications: When the bomb threat situation


has been cleared, Tactical Command Post will advise the
Command Center.

.69 Post Detonation:

.1 Perimeters and Command Posts: The Security Supervisor will


establish Perimeters and Command Posts, if not already done.

.2 Search: A search for a second device would be conducted prior to


the gathering of evidence.

.3 Evidence: Security Representatives should remember the scene of


an intentional explosion is a crime scene and police Identification
Units and Investigative Units shall be notified. As such, all practical
precautions should be utilized in protecting possible evidence. Due
to the extreme forces involved, this evidence is not limited to the
immediate area of the explosion.

.4 Hazards: Security Representatives should be aware that many


hazards may exist after an explosion. These hazards include open
gas lines, exposed electrical wires and broken water lines. Should
these hazards exist, Corporate Operations should be notified so
that proper emergency repairs can be made.

.5 Evacuation: Evacuate all civilians not involved in official emergency


services from the Critical Area. Security Representatives should
locate and attend to the injured. The Security Supervisor will
update the Command Center as to the number injured and the
severity of injuries.

.6 Deaths: Upon the location of a death victim, the Security


Representative will notify the responding law enforcement agency.
The Security Representative will preserve the scene until the arrival
of the law enforcement agency and provide appropriate assistance.
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 12 of 13

3345.69 Post Detonation, continued:

.7 Traffic Control: Scenes of explosions, due to the large and


devastating destruction, will shortly thereafter become a highly
congested area. Emergency personnel, employees, bystanders,
press and others will want to gather at or enter the scene. For
these reasons, the Security Supervisor should plan for ingress and
egress traffic control to allow for the efficient movement of this
traffic.

.8 Crowd Control: The Security Supervisor should make plans for the
control of crowds that will inevitably appear at the scene of an
emergency.

.77 Investigative Responsibility:

The Security Supervisor shall ensure that the proper law enforcement
agency has been notified.

.85 Reporting:

It shall be the responsibility of the Corporate Security and Safety to obtain


all information for a detailed Incident Report. Corporate Security and
Safety will serve as a direct liaison with responding law enforcement
agencies (Federal, State, County and Local) and will obtain the necessary
information and reports not restricted by law, for Corporate Officials.
Service: CORPORATE SECURITY AND SAFETY
General Topic: MAJOR INCIDENT SITUATIONS
Specific Topic: BOMB THREATS
Number: 3345
Page: 13 of 13

Potrebbero piacerti anche