©This TCLEOSE approved School-Based Law Enforcement Curriculum is the property of TxSSC-ICJS Receiving Bomb Threats.

Slides:



Advertisements
Similar presentations
Public Health Seattle & King County Incident Command System Overview May 2004.
Advertisements

CERT Program Manager: Training and Exercises
Accident Scene Preservation. Disclaimer This information is for guidance only and does not create additional legal obligation under OSHA regulations.
EDS Public Information Tabletop Exercise
Bomb Threat Training Crime Prevention Office University of Miami Police Department 5665 Ponce De Leon Boulevard Coral Gables, FL
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
2015 Grade 3 Reading Student Portfolio
Topics of Discussion:  Introduction  Identify & describe the protocols & processes for: Lockouts Sheltering in Place Lockdown Evacuation  Active Shooter.
TABLETOP EXERCISE 10 Step Process School Emergency Operations Plan Exercise Toolkit, Part 1 of 11. Colorado School Safety Resource Center (Department of.
Rapid Assessment A quick evaluation of a disaster/emergency impacted area.
Incident Reporting Procedure
Institute for Criminal Justice Studies School Safety Teams School Safety Teams ©This TCLEOSE approved Crime Prevention Curriculum is the property of CSCS-ICJS.
Essentials of Effective Training Programs Cheryl J. Greathouse, MPA, RPL Director, Instructional Services Georgia Public Safety Training Center.
1 Manifestation Determination. 2 Today’s Goals and Objectives…. Define Manifestation Determination Discuss when to complete a Manifestation Determination.
Worker Focused Safety Program Violence in the Workplace Worker Training Module 3.
Forensic Evidence in Elder Mistreatment Cases
PREA Refresher Course. Response Response Appropriate and consistent response to incidents of sexual abuse is important and will assist in maintaining.
Evacuation Units Training [school’s name here]. Evacuation Policy When a threat comes in, it is assessed by our Threat Assessment Team. The Team then.
1. Objectives  Describe the responsibilities and procedures for reporting and investigating ◦ incidents / near-miss incidents ◦ spills, releases, ◦ injuries,
Unit 5.6 Evidence and Sampling.
Overview With trending Crime occurring in our nation, it is important to identify, recognize and understand the potential threats against First Responder.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
UCO Counterterrorism Certificate Program The Problem GatheringAssessing Your Decision You are the risk manager at a medium- sized university. You’ve just.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Institute for Criminal Justice Studies FERPA Family Educational Rights and Privacy Act ©This TCLEOSE approved Crime Prevention Curriculum is the property.
Whose Rules? Social Studies Curriculum Based Assessment.
1 Standard Test Administration Testing Ethics Training PowerPoint Spring 2007 Utah State Office of Education.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Accommodation & Hospitality Services STAFF BRIEFING – No 17 Handling Suspicious Packages.
1 Effective Procedures for Dealing with Problem Behaviors.
1 Standard Test Administration Testing Ethics Training PowerPoint Spring 2011 Utah State Office of Education.
Ethical Justice HOW YOU DECIDE MAKES A DIFFERENCE 1 Texas Juvenile Justice Department Juvenile Justice Training Academy Metric Blvd., Bldg. H, Suite.
Security Management Providing a Secure Environment.
Lesson 12.1The Interview Process and Preparation Lesson 12.2The Interview Lesson 12.3After the Interview 12 CHAPTER Interviewing for a Job ©2013 Cengage.
1. 2 Agenda  What is ReadiStep™?  The College Readiness Pathway  Basics  Coordinating the ReadiStep Program –Before the Test –On Test Day –After the.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Fire and Emergency Services Company Officer — Lesson 21 Fire and Emergency Services Company Officer, 4 th Edition Chapter 21 — Postincident Activities.
Indian Ridge Middle Safety and Emergency Plan
Chapter 2.1 Notes. Objectives Define physical evidence. Discuss the responsibilities of the first police officer who arrives at the crime scene. Explain.
FHM TRAINING TOOLS This training presentation is part of FHM’s commitment to creating and keeping safe workplaces. Be sure to check out all the training.
Accident Scene Preservation These safety materials, resources and PowerPoint ® presentations are not intended to replace your company's health and safety.
Principle #4 – Ethical Staff Behavior This presentation is made possible by the Smart Campaign
 Secure resident safety  Assess the resident, provide medical and/or psychosocial treatment as necessary  Examine the resident’s injury and/or psychosocial.
Crime Prevention Part I CCTV Presentation (Research & Development) Public Speaking ©TCLEOSE Course #2101 Crime Prevention Part I Curriculum is the intellectual.
Disaster Preparedness Are you prepared?. Effective Disaster Plans  Your plan should outline the basic preparedness steps needed to handle the anticipated.
For more course tutorials visit CJS 250 Entire Course CJS 250 Week 1 Checkpoint Historical Laws and Security CJS 250 Week 1 Assignment.
Program Design Chapter 5 6 th Edition Raymond A. Noe Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
4 Steps of Preserving a Crime Scene. Arrival at the crime scene – Step 1 Responding officer Who's responsible? For what? Time Date Notes Securing the.
The Package (Tabletop Exercise). “Suspicious” items at KSU.
Services offered by the Global Center
Bomb Threat Training Crime Prevention Office
Incident Reporting And Investigation Program
Privacy Education Session CMHA-WECB/CCHC Volunteers/Students
2017 Grade 3 Reading Student Portfolio
Emergency Management Training
Bomb Threat Training Crime Prevention Office
Socorro Independent School District
Training Appendix for Adult Protective Services and Employment Supports June 2018.
Cover Slide – have this up on the screen before presentation begins
Incident Reporting And Investigation Program
Chapter 2 and 3 Evidence and Crime Scene
Respond Evaluate Crime Scene Investigation Hermitage Technical Center - Criminal Justice Team Process Debrief.
Read slide.
Grade 3 Reading Student Portfolio
Continuity of Operations Planning
IS-907 – Active Shooter: What You Can Do
Field Notes and Investigating Reporting
2-3 Preserving and Recording the Crime Scene Sketches
Presentation transcript:

©This TCLEOSE approved School-Based Law Enforcement Curriculum is the property of TxSSC-ICJS Receiving Bomb Threats

Learning Objectives 1.Participants will learn and explain why it is important to document a bomb threat and the correct procedures for documenting a threat. 2.Participants will learn, recall and explain the three (3) ways of how threats are delivered. 3.Participants will learn, recall and explain the critical actions for responding to a bomb threat. 4.Participants will learn, recall, distinguish between and explain the difference between a general and specific bomb threat. 5.Participant will learn, recall and explain the four (4) types of bomb threats. 6.Participants will learn and explain why it is important to preserve evidence germane to receiving one of the four (4) types of bomb threats.

Purpose Threat The purpose of this lesson is to acquaint the participants (Call Takers and Law Enforcement Officers) with the correct procedures (actions) for receiving a “Bomb Threat”.

COMPLACENCY “KILLS” Is one of the truest statements in the law enforcement careers to date. When we as law enforcement officers drop our vigilance posture (let down our guard) we are most vulnerable!

Foreword Today you will learn correct procedures from “ Best Practices ” lessons learned in regard to receiving a “Bomb Threats”.

Documenting a “Bomb Threat” Bomb threats are the most common type of bomb incident. Every bomb threat must be carefully evaluated because a threat may launch the response plan.

Threat Delivery 1.Telephone 2.Written— , letters, writing on walls or mirrors 3.Face to face

Receiving a Threat Words Spoken or written (letters or s) Physical item such as a suspicious package. A threat is considered “received” when staff becomes aware of a threat.

4 - Critical Actions 1.Collecting 2.Assessing 3.Notifying 4.Deciding

2-Types of Threats 1.General 2.Specific “I’ve placed a bomb at your company (or school).” “There’s a bomb in the boys locker room in the gym set to detonate at 1:00 p.m.”

Documenting Threat The procedure for documenting a threat must: 1. Collect as much information as possible concerning the bomb 1. Collect as much information as possible concerning the bomb 2. the perpetrator 3. all aspects of the situation.

Four (4) Types of Bomb Threats 1.Telephoned threats: 2.Written threats: 3.Verbal threats: 4.Hoax threats:

Preserving Evidence Help law enforcement link a suspect to other threats through particular details. If the threat is physical, such as writing on a mirror, or a suspicious item, staff must protect the scene around the threat until police arrive. Protects the building occupants Chain of custody for the evidence

SUMMARY – Cont’d: Importance of documenting a bomb threat. Complacency can kill. 33 -Types of Threat Delivery 1. Telephone 2. Written (Letter or ) 3. Face-to-Face

SUMMARY – Cont’d: 4 - basic “Critical Actions” we must take. 1. Collect 2. Assess 3. Notify 4. Decision (Evacuation Procedures) 2-Types of Threats 1. General Specific

SUMMARY – Cont’d: 4 -Types of Threats 1.Telephone 2. Written 3. Verbal 4. Hoax Preservation of evidence.

QUESTIONS

DEFINE & PROCESS Group Activity GROUP #1: Explain why it is important to document a bomb threat and the correct procedures for documenting a threat. And Identify and explain the three (3) ways of how threats are delivered. GROUP #2: Identify and explain the critical actions for responding to a bomb threat. GROUP #3: Identify and distinguish between a general and specific bomb threat. GROUP #4: Identify and explain the four (4) types of bomb threats. VOLUNTEER: Explain why it is important to preserve evidence germane to receiving one of the four (4) types of bomb threats.

REFERENCES - SOURCES Homeland SecurityDepartment of Homeland Security – New Mexico Tech (EMRTC) – Understanding and Planning for Bomb Incidents Student Handout. Bomb Threat ResponseCathleen Corbitt-Dipierro Interactive Designer interFIRE VR and Bomb Threat Response: An Interactive Planning Tool for Schools

EVALUATION Test covering all Learning Objectives. passing score of 70% must be obtained A passing score of 70% must be obtained. Ensure you put you name on your test sheet. Circle the correct answer. Each question is worth 10-points.

THANK YOU & HAVE A NICE DAY

Course Contact Information Texas School Safety Center (TxSSC) 350 N. Guadalupe, Suite 140, PMB 164 San Marcos, Texas