Dec 12, 2025  
2025-2026 Policies and Procedures 
    
2025-2026 Policies and Procedures

3357:12-18-01-Bomb Threat Guidelines


POLICY

All campus employees should adhere to the following procedures when they are confronted with a bomb threat concerning either College.

POLICY GUIDELINES

It is always desirable that more than one person listen to the call or threat. To do this, a covert signaling system can be implemented, perhaps by using a coded buzzer signal to a second reception point.

A calm response to the caller could result in obtaining additional information. This is especially true if the caller wishes to avoid injuries or deaths. If told that the building is occupied or cannot be evacuated in time, the bomber may be willing to give more specific information on the bomb’s location, components, or method of initiation. Remember, in all probability the bomb threat is a hoax; however, we are still vitally interested in identifying and prosecuting the person responsible.

The bomb threat caller is the best source of information about the bomb. When a bomb threat is called in:

Keep the caller on the line as long as possible. Ask him/her to repeat the message. If possible, record every word spoken by the person.

If the caller does not indicate the location of the bomb or the time of possible detonation, ask him/her for this information.

Inform the caller that the building is occupied and the detonation of a bomb could result in death or serious injury to many innocent people.

Pay particular attention to background noises, such as motors running, music playing, and any other noise, which may give a clue as to the location of the caller.

Report the information immediately to the police and/or fire department.

Remain available, as law enforcement personnel will want to interview you.

When a written threat is received, save all materials, including any envelope or container. Once the message is recognized as a bomb threat, further unnecessary handling should be avoided. Every possible effort must be made to retain evidence such as fingerprints, handwriting or typewriting, papers, and postal marks. These will prove essential in tracing the threat and identifying the writer.

 

A form should be posted by each telephone (whether linked to the outside or not), which includes appropriate space for the following questions:

Exact time of call: Exact words of caller: Questions to ask caller:

 

When is the bomb going to explode?

 

Where is the bomb?

What does it look like?

What kind of bomb is it?

What will cause it to explode?

Did you place the bomb?

Why?

Where are you calling from?

What is your address?

What is you name?

Indicate whether the caller’s voice was:

 

  • calm
  • slow
  • crying
  • normal
  • disguised
  • sincere
  • stutter
  • lisp
  • Nasal
  • Rapid
  • Giggling
  • deep
  • Angry
  • Squeaky
  • Excited
  • loud
  • broken
  • slurred
  • stressed
  • accent

If the voice is familiar, whom did it sound like?

Were there any background noises?

Remarks:

Person receiving call:

Telephone number call is received at:

Date:

Reported call immediately to:

 

UPON RECEIVING ANY BOMB THREAT

Contact the campus security immediately. (If campus security cannot be reached, attempt to contact either the Dean’s or the President’s office. If unsuccessful, contact the fire department and/or police department immediately.)

If an evacuation is determined to be necessary, this should be accomplished in an orderly manner to holding/releasing areas. **To be determined. Special attention must be given to Post Secondary Enrollment Options students as most will be under age. (If the weather is appropriate, students should be assembled a safe distance from the building.)

An ample supply of master keys and locker keys should be kept on hand to assist in the building search.

Faculty members are to stay with their assigned students until the search is completed unless they are given specific instructions to do otherwise.

Faculty and staff members are asked to report anything that looks suspicious to campus security immediately. (i.e. broken window, unlocked door, forced entry, strange sound, etc.)

Once the fire department and the search team (s) (to be determined) have arrived, the search will take place.

Upon the completion of the search, the decision to re-enter the building will be made by the administration and campus security.

A post evacuation meeting will be conducted to go over findings. (Persons attending should include the following: campus security, search team leader, fire officials, police, and person taking the initial call.)

DECISIONS

Essentially, there are three alternatives when faced with a bomb threat:

Ignore the threat.

Evacuate immediately.

Search and evacuate if warranted.

Ignoring the threat completely can result in some problems. While a statistical argument can be made that very few bomb threats are real, it cannot be overlooked that bombs have been located in connection with threats. If employees and students learn that bomb threats have been received and ignored, it could result in morale problems and have a long-term adverse effect on attendance and employee absence. Also, there is the possibility that if the bomb threat caller feels that he/she is being ignored, he/she may go beyond the threat and actually plant a bomb.

Evacuating immediately on every bomb threat is an alternative that on face value appears to be the preferred approach. However, the negative factors inherent in this approach must be considered. The obvious result of immediate evacuation is the disruptive effect on our educational mission. If the bomb threat caller knows that our policy is to evacuate each time a call is made, he/she can continually call and force our campus to a standstill. An employee, knowing that the policy is to evacuate immediately, may make a threat in order to get out of work. A student may use a bomb threat to avoid a class or miss a test. Also, a bomber wishing to cause personal injuries could place a bomb near an exit normally used to evacuate and then call in the threat.

Initiating a search after a threat is received and evacuation of a building after a suspicious package or device is found is the third, and perhaps most desired, approach. It is certainly not as disruptive as an immediate evacuation and will satisfy the requirement to do something when a threat is received. If a device is found, the evacuation can be accomplished expeditiously while at the same time voiding the potential danger areas of the bomb.

 

SEARCH TEAMS

It is advisable to use more than one individual to search any area or room, no matter how small.

Searches can be conducted by administrators and/or professional staff , area occupants or trained explosive search teams. There are advantages and disadvantages to each method of staffing the search teams.

Using supervisory personnel to search is a rapid approach and causes little disturbance. There will be little loss of class time, but a morale problem may develop if it is discovered that a bomb threat has been received and employees were not informed. Using a supervisor to search will usually not be as thorough because of his/her unfamiliarity with many areas. This method should be used for only the weaker (very general and vague in nature) of threats.

Using area occupants to search their own areas is the best method for a rapid search. The

 

occupant’s concern for his or her own safety will contribute toward a more thorough search. Furthermore, the personnel conducting the search are familiar with what does or does not belong in a particular area. Using occupants to search will result in a shorter loss of work time than if all were evacuated prior to search by trained teams. Using the occupants to search can have a positive effect on morale, given a good training program to develop confidence. Of course, this requires training of all faculty and staff and ideally the performance of practical training exercises. One drawback of this search method is the increased danger to unevacuated workers. This method should be used for moderately strong (specific in nature) threats.

 

Searches conducted by trained search teams are the best for safety, morale, and thoroughness, though it does take the most time. Using a trained team will result in a significant loss of production time. It is a slow operation that requires comprehensive training and practice. This method should be used for strong threats. (Specific detailed information is included in the threat.)

 

SEARCH TECHNIQUE

 

The following room-search technique is based on the use of a two-person searching team. There are many minor variations possible in searching a room. The following contains only basic techniques.

When the two-person search team enters the room to be searched, they should first move to various parts of the room and stand quietly with their eyes closed and listen for a clockwork device. Frequently, a clockwork mechanism can be quickly detected without use of special equipment. Even if no clockwork mechanism is detected, the team is now aware of the background noise level within the room itself.

Background noise or transferred sound is always disturbing during a building search. If a ticking sound is heard but cannot be located, one might become unnerved. The ticking sound may come from an unbalanced air-conditioner fan several floors away or from a dripping sink down the hall. Sound will transfer through air-conditioning ducts, along water pipes, and through walls. One of the most difficult buildings to search is one that has steam or hot water heat. This type of building will constantly thump, crack, chatter, and tick due to the movement of hot water through the pipes and the expansion and contraction of the pipes. Background noise may also include outside traffic sounds, rain, and wind.

The individual in charge of the room searching team should look around the room and determine how the room is to be divided for searching and to what height the first searching sweep should extend. The first searching sweep will cover all items resting on the floor up to the selected height. The rooms should be divided into two equal parts. This equal division should be based on the number and type of objects in the room to be searched. An imaginary line is then drawn between two objects in the room; e.g., the edge of the window on the north wall to the edge of the window on the south wall.

First room-searching sweep:

Look at the furniture or objects in the room and determine the average height of the majority of items resting on the floor. In an average room, this height usually includes tables, desktops, and chair backs. The first searching height usually covers the items in the room up to hip height. After the room has been divided and a searching height has been selected, both individuals go to one end of the room division line and start from a back-to-back position. This is the starting point, and the same point will be used on each successive searching sweep. Each person now starts searching his/her way around the room, working toward the other person, checking all items resting on the floor around the wall area of the room. When the two individuals meet, they will have completed a “wall sweep.” They should then work together and check all items in the middle of the room up to the selected hip height, including the floor under the rugs. This first searching sweep should also include those items which may be mounted on or in the walls, such as air-conditioning ducts, baseboard heaters, and built-in wall cupboards, if these fixtures are below hip height. The first searching sweep usually consumes the most time and effort. During all the searching sweeps, whenever possible, use a stethoscope on walls, furniture items, and floors.

Second room-searching sweep:

The individual in charge again looks at the furniture or objects in the room and determines the height of the second searching sweep. This height is usually from the hip to the chin or top of the head. The two persons return to the starting point and repeat the searching technique at the second selected searching height. This sweep usually covers pictures hanging on the walls, built-in bookcases, and tall table lamps.

Third room-searching sweep:

When the second searching sweep is completed, the person in charge again determines the next searching height, usually from the chin or the top of the head up to the ceiling. The sweep usually covers high mounted air-conditioning ducts and hanging light fixtures.

Fourth room-searching sweep:

If the room has a flush or suspended ceiling, the fourth sweep involves investigation of this area. Check flush or ceiling-mounted light fixtures, air-conditioning or ventilation ducts, wiring, and structural frame members. Have a sign or marker indicating “Search Completed” conspicuously posted in the area. Place a piece of colored Scotch tape across the door and doorjamb approximately 2 feet above the floor level if the use of signs is not practical.

*The room searching technique can be expanded. The same basic technique can be applied to search any enclosed area. Encourage the use of common sense or logic in searching. If a speaker at graduation has been threatened, common sense  would indicate searching the speaker’s platform and microphones first, but always return to the searching technique. Do not rely on random or spot-checking of only logical target areas. The bomber may not be a logical person.

Searching summary:

  • Divide the area and select a search height.
  • Start from the bottom and work up.
  • Start back-to-back and work toward each other.
  • Go around the walls and proceed toward the center of the room.

 

If a suspicious object is located:

Under no circumstances should anyone move, jar, or touch a suspicious object or anything attached to it. The removal or disarming of a bomb must be left to the professionals in explosive ordnance disposal. When a suspicious object is discovered, the following procedures are recommended:

Contact the campus security immediately. (If campus security cannot be reached, attempt to contact either the Dean’s or the President’s office. If unsuccessful, contact the fire department and/or police department immediately.) The use of cell phonesis not recommended.

 

  • If absolutely necessary, place mattresses, never metal shields, around the suspicious object. Do not attempt to cover the object.
  • Identify the danger area, and block it off with a clear zone of at least 300 feet, including floors below and above the object.
  • Check to see that all doors and windows are open to minimize primary damage from blast and secondary damage from fragmentation.
  • Evacuate the building.
  • Do not permit re-entry into the building until the device has been removed/disarmed, and the building declared safe for re-entry.

POLICY HISTORY

·Policy reformatted June 2017

INITIATING DIVISION

Campus Safety and Security; Business Services

POLICY REVIEWERS

Campus Safety and Security; Business Services

 

POLICY REFERENCES

  • No forms referenced
  • No codified rules
  • No connecting policies