SAFEVISITOR BLOG
Someone phoned in a bomb threat. Now what?
It’s an ordinary day, and the person at your front desk smiles as she chats with a co-worker. The phone rings, and her smile remains as she greets the caller, only to hear a nervous voice tell her there is a bomb in your building and everyone had better get out before it explodes.
What’s the next step? If you’ve been proactive, you’ve already developed a plan for this situation and trained the people who answer your phones about what they should do. If you don’t have a plan, the response is likely to be a panicked evacuation.
Bomb threats are some of the most disruptive situations a school, church, business, or other facility is likely to encounter. While the overwhelming majority of such threats turns out to be pranks, the potential damage from an actual explosive device is so significant that experts recommend the threats be taken seriously.
According to the U.S. Bomb Data Center, the federal agency responsible for tracking bomb- and arson-related incidents, there were 1,536 bomb threats reported in 2016. Of those, 529 were made to schools and 254 to businesses. The agency reported that there’s been a 33 percent increase in bomb threats to schools since 2014. Students know a bomb threat will be taken seriously and bring classes to a temporary halt, so whether someone has a gripe with the administration or really isn’t ready for that Algebra test, a threat -- whether it’s phoned in or takes the form of a note in a restroom or a comment on social media -- seems to be an effective way to cause trouble.
The Department of Homeland Security (DHS) cautions that every bomb threat is unique and has to be considered in light of the nature of the facility and who uses it. They note that law enforcement officials and facility managers are usually in the best position to determine whether the threat is credible and how to act.
If your facilities don’t have a plan for dealing with this type of threat, it’s a good idea to develop one and share it with those who are most likely to receive the threat and those who will have to make decisions. It’s also wise to obtain the advice of local law enforcement agencies so your plan is consistent with their procedures. You can find information about developing a plan at the DHS website, and many organizations have posted their plans online. A quick Google search can provide a great starting point.
Generally, the first step in a response is to remain calm and notify the authorities immediately. With phoned threats, DHS encourages people to stay on the line with the caller as long as possible while someone else makes the notification. Be polite and engage the caller by asking questions about the specific location of the device, when it is supposed to detonate, how it looks, and what type of explosive it contains. If the caller is willing to talk, ask whether he or she placed the bomb and why he or she did it. More information makes it easier for law enforcement to make the right response. The person taking the information should not hang up the phone even if the caller does, because it may be possible to determine where the call came from.
If the people responsible for decisions about evacuation determine that’s the right course of action, evacuate calmly and carefully. If your facility conducts regular fire drills, sounding a fire alarm is an effective way to get everyone out of the building.
A similar issue is what to do if someone discovers a suspicious item in your facility, such as an unusual bag or package that appears to be out of place. Here again, you should have a policy that spells out procedures to follow. Not every item is suspicious -- for example, people accidentally walk away from backpacks and purses all the time. On the other hand, if it appears someone tried to hide the object, if it has a strange smell or odd sounds coming from it, or if it’s in an unusual place, there may be reason to be concerned. People who leave bombs or other hazardous materials tend to put them in locations where they can do damage to people and important assets.
If you do find a suspicious item, DHS recommends that you remain calm and refrain from touching or moving it. Follow your organization’s procedure, whether that involves contacting a facility manager or placing a call to law enforcement, and follow their instructions. If you can’t reach someone and are convinced that there’s an immediate danger, calmly evacuate the area. Moving farther away from an explosive device generally is the safest course of action.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019