Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Education & TrainingPhysical SecurityEducation:University

Top 10 Bomb Threat Response Tips for Colleges and Universities

By Oren Alter
Bomb Threat Response
April 11, 2017

Bomb threat response protocols have been put in place by colleges and universities, and many of these protocols are based on published police and federal guidelines that have been created nearly a decade ago. In light of the recent influx in bomb threats across the country, colleges and universities should review their response protocols and adjust to technological developments and the evolving nature of threat.

  1. Keep plans and protocols confidential and only share with the relevant entities; many schools post their response plans on various outlets, thus providing a potential aggressor with vital information to conduct an attack on the school utilizing its own plans to their advantage.
  2. Customize general plans to your specific location as a potential aggressor can read the same published law enforcement and Federal plans as the schools and religious centers. Add and customize your plans for your organization taking into consideration layout, natural and man-made barriers, neighboring entities and more.
  3. Break the routine: Always define primary and secondary evacuation locations, rotate between them in training and actual response.
  4. Utilize technology to speed up and effectively evacuate your location; the amount of transmitted energy including cell, Wi-Fi, radio and more is so great in the urban setting that utilization of additional technological information transmitting devices has a low probability of activating an explosive device. In general terms and counter to common belief, in many cases the speed of evacuation should supersede the risk of accidentally triggering an IED (Improvised Explosive Device). Consider purchasing a satellite phone in case after an evacuation as the cellular system can collapse.
  5. Implement NIMS (National Incident Management System) and ICS (Incident Command System) principles with your team; this system ensures effective management and decision making, and you will speak the language of potential first responders.
  6. Train your team and practice under various circumstances – bomb threats and suspicious devices can happen at any time. Make sure you are capable of an effective evacuation under fluctuating staffing levels, occupancy levels and available managers.
  7. Provide relevant information to your team: All employees can potentially receive or identify a suspicious object. Make sure they are all familiar with mail or package suspicious signs and keep a bomb threat call sheet under their keyboard (see a few recommended links at the end of this article).
  8. Create a Crisis Response Team. Your team should meet once a month, review various response protocols, train on various scenarios and build a cohesiveness and ownership that will ensure a proactive and effective is available on location to response to a variety of emergencies. Crisis Response is an inherent part to your mission as an education or religious center.
  9. Create a Crisis Response Team bag. This should include in it a list of building occupants, blueprints and the layout of the building, a bullhorn, whistles, caution tape, high visibility vest, medical/trauma kit, games or candy for children, pens and paper. In addition to the bag, get a coded and encrypted flash memory card and keep a list of occupants, blueprints and layout of the building. Be certain that one or more of your team always carries the flash memory card and, in an emergency, provide information to first responders as most have a laptop in their service vehicle.
  10. Form relationships with nearby entities as mutual support is helpful in case of emergency. In some cases you can evacuate into a nearby secure building rather than keep your population exposed to a potential aggressor or the element. However, make certain that you do not follow a single pattern of responses to these incidents. 

 

The “Top 10 Bomb Threat Tips” above are items for consideration based on over 25 years of experience in the field. Colleges and universities should consider these recommendations based on their unique layout, location, climate and more. Though challenging at first, I can assure you that a proactive and pragmatic approach to safety and security will inevitably be accepted and appreciated by the community you serve.

  • Suspicious signs and Safe Mail handling - see for example https://about.usps.com/securing-the-mail/suspiciousmail.htm or http://www.osec.doc.gov/osy/PDF/SafeMailing.pdf
  • Bomb threat call procedures - see the below for an example https://emilms.fema.gov/is906/assets/ocso-bomb_threat_samepage-brochure.pdf
KEYWORDS: bomb threat emergency planning explosive detection public and private security security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Oren is a proud dad and the Associate Vice Chancellor of crisis management for a multi-campus university in the Southeast United States. He is a Security Expert with over 25 years of experience including service in the Israeli Military Bomb Squad, Israeli intelligence, and corporate security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • study abroad

    How Universities Should Prepare Students and Faculty for Travel Abroad Programs

    See More
  • collegeenews

    9 Factors to Choosing a Safe College

    See More
  • Preventing Aggression and Violence Through Education

    Campus Security Moves to the Fore at Colleges and Universities

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing