C3 Bomb Incident Management Flashcards
What common security principles is bomb security built on?
Access control, security awareness training, business continuity, emergency management, and human resource support for victims. Bomb response is a management-level responsibility.
Is it preferable to evacuate in all cases of a bomb threat? (Better safe than)
No, some organizations must continue operations until the hazard has been deemed probable.
What is the technical term for a bomb? What is that term defined as?
Improvised Explosive Device: a device placed or fabricated in an improvised manner incorporating destruction, lethal, noxious, pyrotechnic, or incendiary chemical design to destroy, incapacitate, harass, or distract. It may incorporate military stores, but is normally devised from non-military components.
How is bomb defined?
An explosive or incendiary device designed to create damage and injury. A bomb can be made from commercial, military, or improvised (homemade) explosives and components. A bomb can be hand delivered, vehicle borne, part of a suicide attack, projected by a weapon, or delivered to the target by other means.
How is “unattended item” defined?
An item whose presence is not readily explained and which could contain or be a hazard, such as a bomb.
How is “Bomb Threat” defined?
A threat that a bomb has been or will be used against an organization or person.
How is “Hoax” defined?
An item or threat that does not actually represent a hazard but is designed to create the impression that a real bomb is on-site.
How are “Secondary Hazards” defined?
Materials that are safe until affected by an explosion. Mangers need to know the type and location of all hazardous materials and processes so emergency services can briefed.
What are 3 motives for a bombing?
Criminal, Political, or Personal.
How is the “Materials” element applicable in terms of bombing?
Materials include: a main charge of explosive or incendiary material, an initiator detonator, a triggering mechanism and safety switch. The components may be commercial, military, or homemade in origin.
How is the “Knowledge” element applicable in terms of bombing? What are the three knowledge sub-elements?
Formal training by mining/construction industries, pyrotechnic and special effects companies, military/law enforcement agencies, and terrorist agencies.
Personal research: reading texts both hard copy and on internet.
Site knowledge: (operations and physical layouts) is often required to ensure appropriate placement of a bomb.
How is the “Opportunity” element used in the terms of bombing?
The offender needs an opportunity to place the bomb on or near the target site or individual. This element can be controlled by an organizations bomb security management plan.
What are the “Four elements of a Bombing?
1) Motive
2) Material
3) Knowledge
4) Opportunity
What are 5 advantages for a bomber to bombing instead of using another method of attack?
1) Large amount of damage compared to size of device,
2) Greater level of damage than from an armed assaultdegree of anonymity, as the offender does not have to be on-site at the time of the explosion
3) Ability to cause damage to a site with a device placed outside the site
4) Ability to cause considerable disruption to the operations operation and reputation with little expense.
5) High media value for publicizing a cause.
What are four disadvantages for a bomber to bombing instead of using another method of attack?
1) Possibility of bomb maker will be killed by an explosion during construction or transportation of the bomb.
2) Risk of detection when placing the bomb on or near the site or into a delivery system (mail or courier)
3) Risk that the device may be detected before it detonates, resulting in site evacuation and potential bomb disarmament.
4) Forensic evidence from the bomb components, increasing the risk of identification and arrest.
What should be included in a bomb incident management plan?
Information specific guidance, Policies, procedures, and training. The plan must be site specific. It should address unattended items, bomb threats, combs, hazardous mail, and post-blast conditions.
What are the four Principles of Bomb Security?
1) Preventing the bomb from entering the site.
2) Early Detection of Bomb Incidents.
3) Appropriate Response Measures.
4) Careful Design of facilities.
What are seven measures that can be used to help an organization protect itself from a bomb incident?
1) Access control
2) Defence in depth
3) Good workplace practices
4) Staff awareness
5) Training of supervisors and managers
6) Standoff distance-keeping assets far from the site boundary.
7) Detection Equipment.
What are the five R’s of a threat evaluation?
1) Receive-method of threat arrival
2) Record-the threat wording must be accurately recorded for evaluation
3) Report-Threats should be passed to the TET quickly
4) Review-The assessment of if a threat warrants an evacuation.
5) Respond-Either perform a full or partial evacuation. if the threat has been evaluated as not plausible either notify police of threat, ask employees to stay on the lookout, record the evaluation for future reference and continue working.
What is a TET? Who is the Threat Coordinator?
Threat Evaluation Team meets to review Bomb incidents.
The threat coordinator summons the TET and should have sufficient authority or call in all managers and order an evacuation. The Threat Coordinator coordinates the Threat Evaluation. The threat coordinator conducts a quick initial review to determine if a threat is serious enough to warrant them to call an immediate evacuation prior to summoning the TET.
What is the formula for the time available to evaluate a threat? What would cause the formula/Bomb elevation to immediately occur.
Threat evaluation time = (Threat Time of Bomb Detonation) - (Evacuation time of site) - (Safety margin) - (Current Time)
If Threat Time of Bomb detonation is not provided, evaluation must be completed asap.
What four steps should be included in the planned response to a bomb?
1) Report incident to the designated manager.
2) Confirm if the bomb has been identified as a bomb and is not just an unidentified item.
3) Initiate an immediate evacuation if the item is believed to be a bomb.
4) Supervise the evacuation/shutdown in accordance with incident management plan.
What are the two key elements to protect persons from a bomb blast?
Distance and Cover
Why are suicide bombers particularly dangerous?
Suicide bombers are guided weapons, capable of changing their target and timing.