Amid the multiple hoax bomb threat messages to airlines, the Ministry of Civil Aviation, along with security agencies, has come up with new protocols and guidelines to evaluate bomb threats on Indian airlines, especially those emerging via pseudonymous social media accounts. The guidelines are structured to more effectively distinguish between credible threats and hoaxes.
As per the new protocols, the Bomb Threat Assessment Committee (BTAC) will establish the identity of the person or organisation making the threat, check their credentials to see if they belong to a terrorist or proscribed outfit, and ascertain the motive and specific socio-economic and political situation within the country or around the globe that could be linked to the threat.
Some additional questions will now be answered by the BTAC before categorising a threat as specific, that would lead to triggering of established security protocols of diverting an aircraft, sending it to an isolation bay upon landing or just before taking off, and conducting fresh anti-sabotage checks of passengers and their belongings.
The protocols are designed to swiftly analyse and neutralise digital threats based on their severity, responding effectively to the alarming trend of threats proliferating through social media and online platforms. Despite being hoaxes, the threats caused significant flight delays and financial losses for airlines, estimated at Rs 13-17 lakh per hour, with average disruption costs of Rs1.5- Rs 2 crore per domestic flight, escalating further for larger aircraft and international routes. On Wednesday, a message claiming a bomb had been placed on Air India’s flight from Delhi to Mumbai via Indore was posted on a social media platform, which later turned out to be a hoax.
Under the revised Bomb Threat Contingency Plan, the process now begins with an immediate review of flight details upon receiving a threat. This initial check focuses on identifying any VIP passengers such as politicians, bureaucrats, diplomats, scientists, senior officials of the sensitive department and celebrities who may have been specifically received threat recently. If any such passengers are confirmed, all security protocols will be promptly activated.
As per the guidelines, the BTAC will adopt a multilayered approach to distinguish between specific threats and hoaxes, saving operational resources.
As per the current practice, BTAC is convened at a designated airport to analyse a bomb or security threat issued against an airline, airport or any part of the aviation ecosystem that decides to declare it “specific” or serious or “non-specific” or hoax. The committee comprises officials from the Bureau of Civil Aviation Security (BCAS), Central Industrial Security Force (CISF), local police, airport operator and airline officials and representatives of some other agencies.
Identifying the origin of the threat is crucial, as it allows officials to assess the reliability of the source. A verified source may elevate the priority of the threat. If the threat is received via email, message, or letter, analysing the language, phrasing, and writing style can provide valuable insights into the sender’s background or intent. In cases where the threat is received by phone, voicemail and call records can offer clues, such as geographical location or identifiable background noise.Capability of the person / organisation giving threat, “key component in threat evaluation, this factor involves assessing whether the organisation or individual has the practical means, resources, or technical skills required to carry out the threat.Assessing the capability of a person or organisation making a threat involves evaluating their resources, intent, past actions, and potential to carry out the threat.
This assessment provides insights into how serious the threat might be and what preventive measures are necessary. Also, its key considerations include financial capability, as wealthier organisations have financial resources that could support the threat, and also investigate if the person or group has access to firearms, explosives, digital hacking tools, or other equipment that might be needed to act on the threat. the likelihood of a follow-through based on past behaviours,” it said.
The BTAC, as per the new guidelines notified on October 19, will adopt a “multi-layered” approach to assess threats and determine the “credibility and seriousness” of such threats issued on social media and satisfy themselves about the “credibility” of the source of information. Some additional questions will now be answered by the BTAC before categorising a threat as specific, that would lead to triggering of established security protocols of diverting an aircraft, sending it to an isolation bay upon landing or just before taking off, and conducting fresh anti-sabotage checks of passengers and their belongings