Most bomb threats are made by telephone to places of employment. Additionally, incidents using email or social media have started to be used. If the threat is made via the telephone, you may be able to obtain vital information about the caller's whereabouts.
- Where is the device?
- When is it set to go off?
- What does it look like?
- Who are you?
- Why are you doing this?
When you are prepared for such a call, you can respond in a calm manner, ask for specific information about the bomb and listen for some identifying characteristics of the caller.
If via email or social media it is important to:
- Retain the message within the system used, outreach to in house IT department should be considered to protect the source message.
- The message should not be replied
- Print out a copy of the message
- Note any IP address or other indicator as to the source of the message
- Note any language used within the message which might provide direction as to potential location, timing for action, type of device