You are on page 1of 19

C4 Risk Management Group Ltd

BOMB THREATS
Unit Standard 6523
Respond to Emergencies and critical incidents as a security officer

Introduction

This study guide is designed to prepare you for assessment against NZQA Unit
Standard 6523 Respond to emergencies & critical situations as a security officer.

This Unit Standard is a compulsory requirement of the National Certificate in


Security Level 3 and 4.

This is a knowledge based module with a practical component and can be


achieved by completing the following distance learning modules.

1. Introduction to CIMS
2. Bomb Threats
3. White Powder Threats
4. Fire
5. Natural Disasters
6. SMEAC
7. Evacuations
8. Practical Assessment

Trainer/Assessor

Your trainer and assessor will issue you this module and give a time frame for it to
be completed by.

If you have any questions at any time you can contact your assessor at any time.
Once you have completed this module your assessor will discuss this it with you
to ensure your knowledge is sufficient to pass assessment.

2
References

The following references may assist you in gaining further knowledge on this
subject.

Civil Defence and Emergency Management Act 2002

www.police.govt.nz

Recommended Study Technique

1. Browse or read through this workbook to get the general idea of what it is
about.
2. Study each section and complete the Self Assessments at the end of each
section.
3. Complete the activities at the end of this module and hand the evidence to
your assessor for marking.
4. Evidence will be assessed and you will be advised if there are any areas for
you to improve on
5. Successful completion of this unit standard will be reported to NZQA.

3
Bomb Threats

Introduction

The use of explosives as a criminal threat has been happening for hundreds of
years. Thousands of people die every year due to the use of these devices. Bombs
are now the preferred tool of terrorists worldwide. The damage caused to
property is immense and the loss to the economies of various countries is
unknown.

The effect on society and the psychological trauma it has caused to many victims
is immense. This is not only to the victims but to their families and witnesses and
those living in the city or travelling to a country.

The future certainly looks clearly as though this trend will increase with bombs
getting bigger and their use increasing. Bombings and bomb threats are one of
the harsh realities of the world we live in today.

Fortunately in New Zealand most threats of this nature are just hoax calls or
suspicious packages that end up being harmless pranks or lost property.

However even the threat of a bomb is sufficient to raise serious concerns as to the
safety of staff and the public as well as the potential damage that could be caused
as well as the disruption to family life, the business community and even the
economy of our country.

Every threat and suspicious package must be taken seriously.

As a security officer you are likely to be called upon to work at one of these
situations one day. A client will look at you as the person to assist in the
evacuation of their building or at least to seek advice. It is therefore important
that you have an understanding of the standard operating procedures and your
responsibilities in a bomb threat situation.

Quick thinking, decision making and leadership are the vital skills you will need to
take action during a bomb threat situation.

4
Bomb or IED?

We use the terms bomb or IED when referring to situations involving criminal use
of explosives. The term IED means Improvised Explosive device. It means that
someone has put together a bomb using components he has bought or made.

Both terms are fine to use. The term IED is often used by police and military
groups, however it may not always be understood by the general public.

We also use the term suspicious package when referring to an item such as a brief
case, box that we think may contain an IED.

What does a bomb look like?

External appearance

The design and appearance of a bomb depends entirely on the imagination of the
maker. Bombs have looked like pipes, brief cases, motor vehicles, stuffed toys,
envelopes, cigarette packets and in the case of the ‘shoe bomber’ it looked like a
normal size 10 shoe.

Internal appearance

Normally it is not possible to see the inside of a suspicious package. But it is still
important to know what might be there. The bomb has a certain number of
common components. These include;

5
Main charge: can be either explosive or incendiary. See below for descriptions of
commercial, military, improvised or incendiary

An initiating system or a fuse: This may be a burning fuse or a complex system


using switches, battery power source and sensors.

Power supply: Can be electric or other.

Detonator: This is a small explosive component widely available from military or


commercial sources which can be set off by mechanical or electrical devices. In
the commercial world they are often called ‘blasting caps’. Detonators can also be
fabricated by the bomb maker.

Commercial explosives are commonly used for demolition work, mining and other
blasting operations such as tree stump removal. A common explosive available in
New Zealand is known as ‘Power Gel’

Military explosives are known as high end explosives because they detonate at a
faster rate. They are often able to be carried safely for long distances and even
operate under water. Common names used for these are C-4, TNT. Over the years
military explosive has been ‘lost’ or stolen from camps or store rooms.

Improvised Explosives are easily made from ingredients such as ammonium


nitrate, fuel oil as well as potassium and sodium chlorate. Ammonium nitrate is
commonly used as garden fertiliser. Some bomb makers also use black powder
from fireworks.

Incendiary – these are improvised devices used to burn. The devices may simply
use fuels, oils, but more complex devices use iodine crystals, magnesium,
glycerine and aluminium powder.

6
Identifying an IED

While the IED or bomb may take the appearance of anything the bomb maker
wishes there are some accepted ways that we can identify if an IED is present.

The New Zealand Police use the following guidelines;

 Is it foreign to a given setting: An example might be a brief case left outside


a service station
 Is it unusual in appearance: Does it have threats written on the outside or
does it have wires protruding from it
 Is it hidden from view? Was it hidden behind a curtain or under a table?
 Is the owner known?

If the answer to one of these questions indicates to you that it is suspicious then it
is time to do something about it. It is the responsibility of the police to investigate
anything which may present a danger to any person. They are also better trained
to assess the situation. Call them early, they will always respond to this type of
incident.

How are bombs delivered?

Obviously an IED or bomb must be delivered to the target person, building or


area. The prevention of security breaches such as the delivery of an IED is the
primary function of protective security and provides for the safest environment
for people and property.

IEDs can be delivered by;

 Mail
 Courier
 The bomber
 Other person

7
IEDs can be delivered by someone who does not know they are carrying a bomb
or by someone who has threats made against them or their families.

Where are IEDs placed?

IEDs or bombs can be placed anywhere. This is often determined by the target
person or what property is to be destroyed.

They are often hidden in containers such as rubbish bins, mail boxes, vehicles etc
but can also be left in plain sight such as a brief case left in the foyer of an office.

IEDs have also been hidden underground and behind wallboards and paintings.

Searching for IEDs

Having security officers or staff members search for an IED is not always easy.
They cannot be compelled to search a building. However it is recognised that the
people who know their offices the best are the staff. They can quickly identify
what is out of place or has been tampered with

This type of search is known as an occupancy search – having the person who
knows it best do a quick look. Should they find something suspicious they should
not touch it, evacuate the area and advise police of its description and location.

Searching for a suspected IED is a job for a specialist group. The police and
military have specially trained groups that search for these devices. The teams
also utilize some specialised equipment as well as dogs that are trained to sniff
out the common chemicals used to make bombs. Specialist equipment includes
chemical sniffers, portable x-ray machines and cameras.

However should you need to search you should have a basic understanding on
how to do a good search.

8
Building and room searches

Observation:

Stand at the room entrance and scan the entire room for anything that looks
wrong or out of place. Look for wires or off-cuts, things that may have been
tampered, tool marks, tape, dropped tools etc. Don’t enter the room until you
have done this and are confident there is nothing obvious.

Listen:

These days you may not here a ticking sound as most timing devices are digital.
However don’t discount this. Electronic components sometimes give off a sound.
Identifying this sound may save you from serious harm.

Systematic:

Always search in a planned fashion. Start from one point in the room and work
your way around and finish at the exact same point. Don’t miss anything or
anyplace. Hard to get to areas should also be carefully looked at.

When searching walls etc use references such as the floor to your waist or head
to ceiling so your search is thorough.

Team work:

It is best to work as a two man team when searching a room or a building. If


possible have someone cover your area a second time just to make sure.

Occupant search:

The most effective way of searching a room or building is by having those that live
or work there involved in the search. This is not only possible but worth
considering when planning for a bomb threat.

9
Vehicle searches

Searching a vehicle for a suspected IED is a job for police specialist search groups.
However at times security officers have been required to conduct basic searches
of vehicles at various venues such as embassies, parliament and government
buildings and for individual clients.

Observation & Listen:

Just as in a room search the security officer should stand back and observe for
items that are out of place or are suspicious. Marks can be left on the vehicle or
under the vehicle that indicate that someone has been there.

If a vehicle has been entered it may have been forced. Tamper marks may be
visible

Systematic Team search:

A search should be conducted by a two man team if possible. The search should
be systematic, starting at a fixed point and ending back at the same point.

Search areas:

First the area surrounding the vehicle should be searched for items left by a
bomber. Then the exterior of the vehicle should be searched. This includes the
top of the vehicle.

Next the underneath should be searched by someone dressed for the occasion
and with suitable equipment. The vehicle may need to be raised to enable a
proper search to be conducted. Possibly a mirror may be all that is required to get
a good look under the vehicle.

Finally the interior of the vehicle should be thoroughly checked.

10
Finding an IED

While most searches fail to find any IED it is important to have a plan in the event
that one is found. Even if it is suspected of being a hoax it must be treated
seriously.

Importantly if an IED or suspicious package is found it must not be touched by


anyone. Other standard procedures include;

 Do not panic
 Evacuate all persons from the area immediately
 Don’t let anyone go back to have a look at it
 Do not use cell phones or radios with 45 metres of the device
 Avoid glass window (including those above) as the glass can shatter and
become lethal
 Stay low – bomb blasts generally rises
 Be aware of secondary devices
 Distance is your friend and increases your chance of survival
 Leave doors and windows open to reduce any blast affect and allow entry
to the premises by the bomb experts
 Advise emergency services as soon as practicable
 Advise the client and your supervisor as soon as
 If possible check the evacuation route and assembly area prior to use

11
Evacuating for an IED or suspicious package

An evacuation for an IED should be different than that planed for a fire
evacuation.

If the IED has not yet been located then there is the chance that when people are
evacuated they may end up walking past the IED itself. It is therefore important
that a coordinated and planned evacuation occur.

It is recommended that the evacuation route and assembly areas be checked


prior to the evacuation. The operation should be controlled so that the route is
not blocked and too many people are in one area at the same time.

Evacuees should be told to take personal items such as brief cases and hand bags.
This reduces the work later when police must search the building for the IED.

Assisting emergency services

The police, fire service and military work together to manage an IED situation.
Each has their tasks and they train themselves to a high level. However the
assistance given from a security officer or building warden can make their job a
lot easier or safer.

Information emergency services would like:

 The description and location of the suspicious package or IED


 The reason why an evacuation was conducted
 The description of any suspect
 The best route to the IED
 Other hazards in the building
 Confirmation that everyone has been evacuated
 The location of key holders and person in charge of the building/business

12
Rendering safe procedure

This is the term used by emergency services to prevent the detonation of an IED.
Contrary to most beliefs the IED is not ‘exploded’. In many occasions the IED is
blasted with a jet of water that disrupts the electrical components and hopefully
prevents the IED or bomb from going off.

Cell phones and radios

IEDs can be radio controlled, utilise cell phone, radio, or pager components and
often contain detonators. All these components may be susceptible to
interference from a cell phone or radio used in close proximity.

It should be detailed in standard operating procedures that cell phones, radios or


any other electronic device should not be used near an IED or suspicious package.
The distance often used is 45 metres.

What are secondary devices!

Secondary devices are IEDs that are designed to detonate after the first device
has gone off or after the first suspicious package has caused everybody to move
to an assembly area.

The tactic of using a secondary device has often been used by bombers and
terrorists. A good example is the Bali bombing where a suicide bomber entered
the night club with a small IED in a back pack. When this device detonated it
causes a mass evacuation out onto the streets where a second larger device,
located in a vehicle went off killing and injuring more people.

13
Bomb threats

Bomb threats come in a variety of forms including:

 Phone calls
 Written messages
 Emails

Phone in bomb threats far outweigh the others as the most common means of
delivering a threat.

Threats normally do not comprise of an actual IED. A threat rather than a real
device is used by the suspect because of the disruption and concern it will cause
to the person or business. Also the caller also knows that no one will die or injure
themselves.

The following page shows the standard bomb threat checklist issued by the New
Zealand Police. It is held by many call centres and government offices in the event
of a bomb threat call.

Standard operating procedures include;

 Let the caller give the message without interrupting them


 Record the message electronically or in written form
 Advise supervisor/work colleagues immediately
 Keep the caller on line as long as possible
 Trace the call or identify the calling number
 Ask the caller questions as outlined in the bomb threat checklist
 Record any other information that can be gained from the call

14
Support for the call taker

Taking a call from someone threatening to injure or kill is a stressful and difficult
thing to do unless you have police training. The operator receiving the call should
be supported by a supervisor or colleague at all times during and after the call.

Mail bombs

The standard courier and mail delivery systems operating in most cities and towns
offers an ideal means for the delivery of a bomb threat or an IED. Although this
delivery method has not been used much in New Zealand. The offender doesn’t
even have to get close to the business or person he is threatening or intending to
injure. The package is delivered by someone normally trusted and the package is
mixed in with many other letters and parcels to look commonplace.

The New Zealand Postal Service has a preventative capability with each letter or
parcel being inspected prior to being delivered to a customer. The chances of a
package containing an IED getting through the system are very small.

Clearly if a letter or package shows signs of wiring, electronic components and is


not promotional material then it should be considered suspicious.

The New Zealand Police give the following factors to help businesses identify
suspicious letters or packages. These factors should form part of the organisations
standard operating procedures;

 Excessive postage
 Incorrect titles
 Title but no name
 Misspelling of common words
 Handwritten or poorly typed addresses
 Oily stains, discolourations or odour

15
 No return address
 Excessive weight
 Lopsided or uneven envelope
 Protruding wires or aluminum foil
 Excessive security material such as masking tape, string, etc
 Visual distractions
 Ticking sound
 Marked with restrictive endorsements, such as 'Personal' or 'Confidential'
 Shows a city, state or province in the postmark that does not match the
return address.

Police guidelines sate that if at least three of these factors are present then the
item should be considered suspicious.

16
Activities

1. Read the information attached. Further information is available from the NZ


government website www.police.govt.nz.

2. Complete a copy of the NZ Police Bomb Threat Checklist. Base the answers
on a scenario that you think up yourself.

3. Complete the multi-choice test at the back of the module.

4. Check your business or site for information and plans for responding to a
bomb threat emergency.

5. Attach all the evidence to your workbook and hand to your assessor once
completed.

17
18
Bomb Threats Name…………..………………..
Question 1 Question 2
In most cases a bomb is actually found after a The term IED means;
bomb call has been made; a. Improvised Explosive Device
a. Yes b. Initiating Explosive Decvice
b. No c. Irritating Exploding Design
d. Individual Exposive Device

Question 3 Question 4
IEDs can be placed in what places; The police issued bomb threat checklist is
a. rubbish bins available at my place of work;
b. under cars a. Yes
c. outside buidlings b. No
d. anywhere c. Not sure buit I will check

Question 5 Question 6
What does a bomb or IED look like; Employees can be compelled to search for an IED
a. a stuffed toy a. Yes
b. Sticks of dynamite b. No
c. a briefcase
d. box of chocolate
Question 7 Question 8
Which of the following are factors police advise Doors & windows should be left open when
could indicate a suspicious package; evacuating because;
a. Oily stains a. let air into the buidling
b. Protruding wires b. so police can hear any ticking
c. Incorrect titles c. reduces the blast affect
d. No return address d. allows access by the bomb squad

Question 9 Question 10
When evacuating a building for a bomb threat When emergency services arrive they will want
which of the following apply; to know;
a. check routes prior to use a. where the bomb is
b. get everyone out as soon as possible b. everyones name and addresses
c. go to the highest part of the building c. the buidling address
d. avoid glass d. what it looks like

19

You might also like