In response to a sharp increase in bomb threat hoaxes targeting Indian airlines and airports, with over 350 incidents reported recently, the Bureau of Civil Aviation Security (BCAS) has rolled out a Bomb Threat Contingency Plan(BTCP) in which An advanced layered security and emergency operation protocol across all major airports. This protocol is designed to swiftly analyse and neutralise digital threats based on their severity, responding effectively to the alarming trend of threats proliferating through social media and online platforms.
According to reliable sources, the new plan is structured to more effectively distinguish between credible threats and hoaxes. Under the revised Bomb Threat Contingency Plan(BTCP),the process now begins with an immediate review of flight details upon receiving a threat.
This initial check focuses on identifying any VIP or VVIP passengers, such as politicians, bureaucrats, diplomats, scientists,senior officials of the sensitive department and celebrities who may have been specifically received threat recently. If any such passengers are confirmed, all security protocols will be promptly activated.
To further enhance security measures, the Bureau of Civil Aviation Security (BCAS) has mandated that airlines and airport operators adopt intensified security protocols under the revised Bomb Threat Contingency Plan (BTCP). These protocols include real-time threat assessments and an expanded framework for collaboration with law enforcement agencies.
The recently updated BTCP, disseminated from BCAS headquarters, emphasises the necessity of evaluating several critical factors before categorising threats as “specific” or “non-specific.” Authorities are now required to assess a broad range of indicators to ascertain the credibility of each threat, particularly those originating from anonymous online accounts.
Under the recent protocol, upon receiving a threat, a preemptive security drill will be activated,wherein security teams will commence an authentication process to evaluate the validity and severity of the threat. The revised guidelines outline several essential factors for effective threat authentication and assessment.