ICERS - In Case of Emergency Response System and Bugout Plan
In - Case - of - Emergency: Response System
Family Bug Out Plan - Communications Guide - Steps of Survival
This is a digital product that is downloaded upon purchase.
Includes a Fillable PDF editable template. (.docx and .odt files also available)
Free lifetime updates as we continue to modify ICERS to adjust to current threats and developments.
ICERS outlines a means to plan for life altering events in order to maintain communications among family & friend’s households while assessing sustainability to determine when to shelter in place, bugout, or pool resources. While contact among households is key, ICERS creates 3 incident based Categories with a set of actionable plans when comms are down. The Actions work in concert with predefined Rally Points and “What If” scenarios so that all affected parties can reunite or self-sustain.
BOTTOM LINE UP FRONT (BLUF):
ICERS is composed multiple House Holds (HHs) working together to support one another. Each may be subject to various Life Altering Events (LAEs) and each may have a varying degree of experience, resources, and security. ICERS works to utilize the HHs strengths to ensure all are prepared to act when an LAE occurs.
During an LAE; If comms are established disregard all plans and formulate actions based on current knowledge.
If comms are down; refer to the Categories (CATs).
Identified your current CAT, initiate the Action Plan (AP) for that CAT.
Action Plans create an order of precedence for how to make contact, when to bug out, and what steps to take as time progresses.
Action Plans incorporate meeting at Rally Points (RPs) or following the Bug Out Guideline (BOG) during pre-planned “What If” scenarios.The end goal of ICERS is to reestablish contact, find resources, and appropriate shelter.
How to get started: When you download your copy you will need to sit down with your trusted households and friends to formulate the plan and record it into ICERS. 1. Decide who's in your circle and assign callsigns. 2. Collect contact information. 3. Determine "Rally Points". 4. Develop "What If" Scenarios for threats specific to your group. 5. Agree upon a communication code. 6. Save and distribute mastercopy, download, and PRINT; then securely store until needed.