It is hard to think rationally/logically about how to prepare to survive a terror attack. Attacks in our past are horrible and hard to think about. But thinking of how you would survive and how you would be in a position to help others is important. It can reduce the amount of harm that terrorists cause and save lives.
The information here comes largely from the Ready.gov site, which captures information suggested by a wide range of reputable community groups including the American Red Cross, the National Fire Protection Association and many others to develop these suggestions. We modified them a bit to tailor them to our audience here at ThreatBrief.com since we know you are an Internet-savvy group.
Terrorists have frequently used explosive devices as one of their most common weapons. Terrorists do not have to look far to find out how to make explosive devices; the information is readily available in books and other information sources. Explosive devices can be highly portable, using vehicles and humans as a means of transport. They are easily detonated from remote locations or by suicide bombers.
Conventional bombs have been used to damage and destroy financial, political, social, and religious institutions. Attacks have occurred in public places and on city streets with thousands of people around the world injured and killed.
Learn what to do if you receive a bomb threat or get a suspicious package or letter.
Devastating acts, such as the terrorist attacks on the Oklahoma City and September 11th, have left many concerned about the possibility of future incidents in the United States.
Nevertheless, there are things you can do to prepare for the unexpected. Preparing for such events will reduce the stress that you may feel now, and later, should another emergency arise.
Taking preparatory action can reassure you and your children that you can exert a measure of control even in the face of such events.
Before an Explosion
The following are things you can do to enhance your ability to protect yourself, your family, your business and your property in the event of an explosion.
- Businesses should read the more corporate-focused reference at “Prepare Your Business TO Withstand All Hazards“
- Individuals should build an Emergency Supply Kit, which includes items like non-perishable food, water, a battery-powered or hand-crank radio, extra flashlights and batteries. You may want to prepare a kit for your workplace and a portable kit to keep in your car in case you are told to evacuate. This kit should include:
- Copies of prescription medications and medical supplies.
- Bedding and clothing, including sleeping bags and pillows.
- Copies of important documents: driver’s license, Social Security card, proof of residence, insurance policies, wills, deeds, birth and marriage certificates, tax records, etc.
- Make a Family Emergency Plan. Your family may not be together when disaster strikes, so it is important to know how you will contact one another, how you will get back together and what you will do in case of an emergency.
- Plan places where your family will meet, both within and outside of your immediate neighborhood.
- It may be easier to make a long-distance phone call than to call across town, so an out-of-town contact may be in a better position to communicate among separated family members.
- You may also want to inquire about emergency plans at places where your family spends time: work, daycare and school. If no plans exist, consider volunteering to help create one.
- Knowing your community’s warning systems and disaster plans, including evacuation routes.
- Notify caregivers and babysitters about your plan.
- Make plans for your pets
- Businesses should ensure preparation is taken seriously including managing activities with a program manager. Continuity of operations can be enhanced with prior preparation.
- Sign up now for the Daily Threat Brief and stay informed before any attack.
- Follow @ThreatBrief on twitter.
During an Explosion
- Get under a sturdy table or desk if things are falling around you. When they stop falling, leave quickly, watching for obviously weakened floors and stairways. As you exit from the building, be especially watchful of falling debris.
- Leave the building as quickly as possible. Stay low if there is smoke. Do not stop to retrieve personal possessions or make phone calls.
- Do not use elevators.
- Check for fire and other hazards.
- Once you are out, do not stand in front of windows, glass doors or other potentially hazardous areas.
- Move away from sidewalks or streets to be used by emergency officials or others still exiting the building.
- If you are trapped in debris, use a flashlight, if possible, to signal your location to rescuers.
- Tap on a pipe or wall so rescuers can hear where you are.
- If possible, use a whistle to signal rescuers.
- Shout only as a last resort. Shouting can cause a person to inhale dangerous amounts of dust.
- Avoid unnecessary movement so you don’t kick up dust.
- Cover your nose and mouth with anything you have on hand. (Dense-weave cotton material can act as a good filter. Try to breathe through the material.)
After an Explosion
As we learned from the events of September 11, 2001, the following things can happen after a terrorist attack:
- There can be significant numbers of casualties and/or damage to buildings and the infrastructure. So employers need up-to-date information about any medical needs you may have and on how to contact your designated beneficiaries.
- Heavy law enforcement involvement at local, state and federal levels follows a terrorist attack due to the event’s criminal nature.
- Health and mental health resources in the affected communities can be strained to their limits, maybe even overwhelmed.
- Extensive media coverage, strong public fear and international implications and consequences can continue for a prolonged period.
- Workplaces and schools may be closed, and there may be restrictions on domestic and international travel.
- You and your family or household may have to evacuate an area, avoiding roads blocked for your safety.
- Clean-up may take many months.
If you require more information about any of these topics, the following resources may be helpful.
- IED Attack Fact Sheet: Improvised Explosive Devices. Document providing preparation guidance for a terrorist attack or similar emergency.
- Terrorism, Preparing for the Unexpected. Document providing preparation guidance for a terrorist attack or similar emergency.
Find additional information on how to plan and prepare for an explosion and learn about available resources by visiting the following websites:
- Federal Emergency Management Agency
- American Red Cross
- Center for Disease Control and Prevention – Mass Casualty Event
- UN report on Hashtag Standards for Emergencies. Also track key hashtags of #VOST and #SMEM on Twitter.
If you receive a telephoned bomb threat, you should do the following:
- Get as much information from the caller as possible. Try to ask the following questions:
- When is the bomb going to explode?
- Where is it right now?
- What does it look like?
- What kind of bomb is it?
- What will cause it to explode?
- Did you place the bomb?
- Keep the caller on the line and record everything that is said.
- Get as much information from the caller as possible. Try to ask the following questions:
Suspicious Packages and Letters
Be wary of suspicious packages and letters. They can contain explosives, chemical or biological agents. Be particularly cautious at your place of employment.
Some typical characteristics postal inspectors have detected over the years, which ought to trigger suspicion, include parcels that:
- Are unexpected or from someone unfamiliar to you.
- Have no return address or a return address that can’t be verified as legitimate.
- Are marked with restrictive endorsements such as “Personal,” “Confidential,” or “Do not X-ray.”
- Have protruding wires or aluminum foil, strange odors or stains.
- Show a city or state in the postmark that doesn’t match the return address.
- Are of unusual weight given their size or are lopsided or oddly shaped.
- Are marked with threatening language.
- Have inappropriate or unusual labeling.
- Have excessive postage or packaging material, such as masking tape and string.
- Have misspellings of common words.
- Are addressed to someone no longer with your organization or are otherwise outdated.
- Have incorrect titles or titles without a name.
- Are not addressed to a specific person.
- Have hand-written or poorly typed addresses.
With suspicious envelopes and packages other than those that might contain explosives, take these additional steps against possible biological and chemical agents.
- Refrain from eating or drinking in a designated mail handling area.
- Place suspicious envelopes or packages in a plastic bag or some other type of container to prevent leakage of contents. Never sniff or smell suspect mail.
- If you do not have a container, then cover the envelope or package with anything available (e.g., clothing, paper, trash can, etc.) and do not remove the cover.
- Leave the room and close the door or section off the area to prevent others from entering.
- Wash your hands with soap and water to prevent spreading any powder to your face.
- If you are at work, report the incident to your building security official or an available supervisor, who should notify police and other authorities without delay.
- List all people who were in the room or area when this suspicious letter or package was recognized. Give a copy of this list to both the local public health authorities and law enforcement officials for follow-up investigations and advice.
- If you are at home, report the incident to local police.
We provide our CTO Advisory Services clients with unique success-focused capabilities through engagement teams led by the award winning Top 25 Global CTO Bob Gourley. Services include:
Strategic Consulting: Leverage experienced professionals with proven past performance. Our clients include major telecommunications firms, defense systems integrators and IT firms with dramatic, “game changing” technology. We also help highly regulated businesses and government agencies respond to a continuous stream of new mandates for cybersecurity compliance.
CTO Outsourcing and CTO-as-a-Service: Our model provides highly qualified, experienced Chief Technology Officer (CTO) or Chief Information Security Officer (CISO) leadership on your staff to manage and lead your technology partners, developers, engineers and IT support. We offer part-time, full-time, retained and hourly services. We also provide compliance services.
Technology Research: Our experts in technology can assess the relevance of technology prior to investment and prior to you bringing the capability into your enterprise. We prepare customized briefings on technology and provide context on IT focused on your needs.
Due Diligence:We support private equity firms, venture capital, and businesses looking to acquire other businesses. We can also help independently verify and place into context the discriminators of technologies in the firms you are considering.
Cybersecurity and CISO-as-a-Service Crucial Point provides architecture reviews and action plans for enhancing cybersecurity. We also provide analysis of solutions and products and strategies associates with cybersecurity, including market potential analysis, product offering development and marketing/messaging creation.
Government Market Evaluation and Support: We serve high tech companies who want to do business with the government. We can assist you in flattening the learning curve and will help you produce a winning strategy.