Crisis Management Moreover, remaining on the line with the caller might elicit valuable information. This information can be used to identify the location of the explosives as well as the perpetrator.
The most important step in the crisis management is gathering situational information. Decisions and responses should be based on the information at hand, evaluated on a situation-by-situation basis. If the bomb threat occurs in a school, it must be taken seriously. However, "many school bomb threats have been made by students seeking to disrupt the school day and to get out of school," (National School Safety and Security Services," 2013). Therefore, evacuations are not necessarily warranted or desirable.
An immediate visual search of the area is warranted, to determine whether or not the threat is to be taken seriously. Ideally, personnel familiar with the building will perform a visual scan because they will know if suspicious objects are seen. If a suspicious object has been detected, then an evacuation will be advisable. Effective crisis management demands a smooth evacuation procedure, with pre-designed protocols that all employees are familiar with for maximum efficiency and minimum panic.
It is important to have protocols and procedures in place with clear chains of command. One of the measures specific to bomb threats in particular is phone call management. If the threat was phoned in, the receiver of the call is instructed to remain on the phone as long as possible without hanging up to ensure the potential of being able to trace the ...
Bomb threats do not end with the initial phone call and evacuation. First responders place themselves at considerable risk, given "some bombers, terrorists, and related offenders who plant bombs also place secondary explosive devices to harm first responders and others after an initial bomb is located and/or exploded," (National School Safety and Security Services, 2013). For this reason, first responders should be thoroughly debriefed. Effective crisis management depends on having strong relationships with first responders, ensuring that the channels of communication and information sharing remain open.
Effective crisis management involves an ongoing and preventative program. Therefore, all members of the management team need to participate in the creation of procedural guidelines for crisis management. A communications network and protocol are essential for responding to bomb threats, especially given that bomb threats are linked to communications networks. There should be clearly outlined evacuation plans and protocols for alerting first responders and law enforcement personnel. Finally, the administrators should also have a public relations protocol because in most cases, there will be a need to manage the media in the time of…
Moreover, remaining on the line with the caller might elicit valuable information. This information can be used to identify the location of the explosives as well as the perpetrator.
Department of Homeland Security (2013). Bomb threat call procedures. Retrieved online: http://emilms.fema.gov/is906/assets/ocso-bomb_threat_samepage-brochure.pdf
Miller, L. (2006). Practical Police Psychology. Charles C. Thomas.
National School Safety and Security Services (2013). School bomb threats and bombs. Retrieved online: http://www.schoolsecurity.org/trends/school-bombs.html
Wisconsin Department of Justice (2007). Crisis Management. Retrieved online: http://naminc.org/nn/blet/wisc-training-guide.pdf
Terrorism in Seattle Even before the World Trade Center attack in September, 2011, most major cities in the United States were not only aware, but anticipatory regarding the potential for a terrorist attack. Seattle has been fortunate in that it has never experienced an actual international attack, but has had three major domestic incidents since 1999 that continue to be in the minds of Emergency Management professionals. In 1999, Ahmed Ressam,
It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying
The Federal Emergency Management Agency institutionalized Emergency Management in 1979 (Lindsay, 2012). Since then, various local and state organizations have included emergency management in their practices. It shifted from specialized preparedness to narrowly defined or single categories of hazard to an all-hazard approach including potential threats to property and life through technological and environmental dangers and local and foreign risks. The whole idea of emergency management does not include a
Disaster Preparedness and Emergency Response for Natural Disasters or Terrorists Attacks in Florida Emergency management has been described regarding the phases by using words such as prepare. Mitigate, respond and recover. For this paper, we are going to examine the underlying concepts, variation, limitations, and implications of emergency management phases. Moreover, we are going to look at the various preparedness and response strategies applied by the State of Florida when dealing
Figure 3. Central England Temperature Note: Blue bars indicates changes in CET annual values during the period 1877 to 2006 relative to the average over the 1961-90 baseline period (about 9.5 "C). Error bars enclose the 95% confidence range and the red line highlights decadal variations. Source: UK Climate Projections 2011 at http://ukclimateprojections.defra.gov.uk / content/view/751/500/ As shown in Figure 3 above, the Central England temperature (CET) has increased by approximately one degree Celsius
Non-Traditional Security Threats and the EU Theoretical Study Terrorism Weapons of Mass Destruction and Nuclear Threat Regional Conflict Organized Crime Environmental Degradation Non-Traditional Security Threats and the EU Due to the discontentment with the conventional concepts of security, the research schedule based on these conventional concepts, associated theoretical debates and their impact on policy, have given rise to the idea of non-traditional security. In the present era, it is universally acknowledged that security possesses multifaceted characteristics. Growing from