Security and Resiliency Guide Counter Ied
Security and Resiliency Guide Counter Ied
Security and Resiliency Guide Counter Ied
Acknowledgements
This guide would not be possible without the contribution of numerous
improvised explosive device (IED) and counter-IED (C-IED) subject matter
experts, stakeholders, and professional communities. The Department of
Homeland Security (DHS) Office of Infrastructure Protection (IP) and
Federal Bureau of Investigation (FBI) Critical Incident Response Group
(CIRG) wish to acknowledge contributions made by the following
organizations: the DHS Office for Bombing Prevention (OBP) and FBI
Counter-IED Section (C-IEDS); local, state, tribal, and territorial emergency
management stakeholders through the Federal Emergency Management
Agency (FEMA) National Integration Center; Federal department and
agency stakeholders through the Joint Program Office for Countering IEDs,
especially the Department of Justice (DOJ) Bureau of Alcohol, Tobacco,
Firearms, and Explosives (ATF), FBI Weapons of Mass Destruction
Directorate, FBI Terrorist Explosive Device Analytical Center (TEDAC), DHS
Transportation Security Administration (TSA), FEMA, DHS Office of Health
Affairs (OHA), DHS Office of Intelligence & Analysis (I&A), National Figure 1: Seals of programs making up
Counterterrorism Center, Department of State Bureau of Counterterrorism the Joint Program Office
and Diplomatic Security Service, and Department of Defense (DOD) Joint Property of DHS
Improvised-Threat Defeat Organization (JIDO); private sector and
government critical infrastructure stakeholders through the Sector
Coordinating Councils, Government Coordinating Councils, State, Local,
Tribal, and Territorial Government Coordinating Council (SLTTGCC), and
Regional Consortium Coordinating Council (RC3); and nationwide law
enforcement stakeholders through the International Association of Chiefs
of Police (IACP) Arson and Explosives Committee.
Companion Website
To access the most up-to-date C-IED guidance and assistance resources,
visit https://TRIPwire.DHS.gov. The Technical Resource for Incident
Prevention (TRIPwire) is DHS’s free, online information-sharing resource on
IED incidents, tactics, techniques, and procedures, as well as corresponding
IED security and resiliency measures. The TRIPwire website gives users
access to:
i
Counter-IED Concepts, Common Goals, and Available Assistance
Any opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect
the views of DHS or the FBI. Additionally, neither DHS or the FBI nor any of their employees makes any warranty,
expressed or implied, or assumes any legal liability for accuracy, completeness, or usefulness of any information,
product, or process included in this publication. Users of information from this publication assume all liabilities
arising from its use.
ii
Counter-IED Concepts, Common Goals, and Available Assistance
Table of Contents
Acknowledgements.......................................................................................................................i
Companion Website......................................................................................................................i
Overview .....................................................................................................................................1
Purpose .......................................................................................................................................1
Counter-IED Fundamentals...........................................................................................................3
Definitions ...................................................................................................................................4
Chapter 3: Common Security and Resiliency Concepts and Goals for IED Incidents ............................. 12
Goal 1: Use and share risk information to guide IED-related physical security, law enforcement,
and emergency response activities ............................................................................................. 15
Goal 3: Prevent the acquisition of explosives and explosive precursor chemicals used in IEDs ...... 19
Goal 4: Implement site-specific protective measures to prevent and minimize the impact of IED
incidents .................................................................................................................................... 23
Goal 5: Utilize IED screening and detection methods in high-risk environments ........................... 25
Goal 6: Take immediate safety precautions for bomb threats, suspicious items, and IEDs ............ 29
Goal 8: Request Public Safety Bomb Squad assets to diagnose suspicious items and render-safe
IEDs ........................................................................................................................................... 36
iii
Counter-IED Concepts, Common Goals, and Available Assistance
Goal 10: Reduce the psychological and economic impacts of IED incidents .................................. 39
iv
Counter-IED Concepts, Common Goals, and Available Assistance
Chapter 1: Introduction
Overview
Bombings using IEDs are a common security concern related to terrorism and violence in the United States (U.S.). High-
profile domestic and international incidents are frequently in the news. Globally, the use of IEDs has trended upward in
frequency and magnitude since 9/11—now accounting for more than 50 percent of all terrorist attacks 1—and the threat
posed to American interests over the coming decade will likely remain high. 2 Terrorists and criminals will continue to use
these weapons in a variety of ways, ranging from bomb threats and hoax devices, to mass-casualty attacks and
sophisticated operations. In the U.S., the most significant historical bombings caused devastating physical and economic
losses within communities and overwhelmed local authorities. Recent incidents targeting mass transit, houses of worship,
and public spaces underscore that IED threats can originate from homegrown violent extremists or be influenced by
events and movements overseas. Americans increasingly experience heightened security, like baggage checks, at
museums, airports, stadiums, and special events. Many local and state governments, public institutions, and private
sector organizations (including critical infrastructure facilities) express concern about IED risks and have sought assistance
to enhance preparedness. This guide is designed to help all stakeholders take proactive steps to enhance their security
and resilience for potential IED incidents and do so consistent with broader all-hazards preparedness and risk
management principles.
Purpose
The Security and Resiliency Guide: Counter-IED Concepts, Common Goals, and Available Assistance (SRG C-IED) is intended
to assist stakeholders to plan and implement C-IED activities within their overall public safety and emergency
management approach. The SRG C-IED builds off of foundational guidance by providing more detailed guidance specific to
countering IEDs, including IED risk information and a series of common C-IED goals and associated tasks derived from U.S.
C-IED policy and input from subject matter experts. In general, entire communities, individual organizations, and specific
facility owner/operators can strengthen their security and resilience for IEDs by using this guide to:
• Understand the IED risk landscape in the U.S. and your locale, including the essential characteristics of IEDs and IED
incidents (Chapter 2);
• Apply common IED-specific security and resiliency goals and tasks designed to prevent incidents from occurring,
protect people and infrastructure, and help respond and recover safely (Chapters 3 and 4); and
• Leverage available U.S. Government programs to build and sustain preparedness, for example through technical
assistance and grant programs in the areas of training, information sharing, planning, exercises, personnel, and
equipment (Appendix A).
Stakeholders can use the SRG C-IED in specific ways, such as to:
• Conduct risk and capability analysis (including Threat and Hazard Identification and Risk Assessment (THIRA)) that
considers IED risks. Understanding how an IED threat may manifest in a community or potential target location helps
stakeholders, including owner/operators or public safety planners, assess preparedness needs and drive capability
development.
1
Counter-IED Concepts, Common Goals, and Available Assistance
• Develop or enhance an Emergency Operations Plan (EOP) with IED incident-specific information. EOPs define the
scope of public safety and emergency management preparedness activities necessary for an entire government
jurisdiction, within an organization, or at a specific facility.
• Take action to enhance security and resilience for IED incidents at a facility or venue. This may include the
development of facility-specific IED incident EOP, preparedness improvement plan, or employee training.
• Develop a security plan for a special event. Special events can stress the resources of a jurisdiction, organization, or
specific facility. Coordinating physical protective measures, screening, and search and detection techniques with local
authorities into a comprehensive security strategy reduces site vulnerabilities and strengthens protection of event
participants.
• Provide personal security guidance to personnel, employees, visitors, or patrons. Some C-IED activities are
appropriate for anyone, such as reporting suspicious activity and responding safely to a bomb threat, suspicious item,
or IED detonation.
The best way to use this guide to enhance security and resiliency for IED incidents is to build off an existing risk and
emergency management approach, including an EOP, for all hazards, which considers all relevant stakeholders, including
the private sector and members of the public.
• Individual stakeholders
• Critical infrastructure facility owner/operators, including commercial businesses
• Public safety officials, including law enforcement, fire service, and emergency medical personnel
• Government or private sector organization planners, including security and emergency managers
While the SRG C-IED focuses on understanding, countering, and responding to IED incidents, much of the guidance is
applicable to broader physical security and emergency management challenges. For example, many of the goals and
recommendations outlined in Chapter 3 are relevant beyond the scope of the IED threat. They address operational
coordination, information sharing and dissemination, and securing and controlling access to potential target sites.
The SRG C-IED also contains information specific to planners. Planning is essential to prepare for potential threats and
hazards. The guide will help security planning team stakeholders understand IED risks and methods to incorporate
effective IED risk management practices into planning efforts and operations in accordance with the National
Preparedness System. The guide can serve as a resource for planners as they begin the planning process and take into
consideration the needs of, and engage with, members of the whole community relevant to IED incident preparedness
activities. Appendix A of the SRG C-IED identifies Federal Government resources available to assist C-IED stakeholders,
especially planners, to enhance their organizations’ C-IED capabilities.
2
Counter-IED Concepts, Common Goals, and Available Assistance
Finally, this guidance is applicable to all 16 critical infrastructure sectors and their local stakeholders. Millions of people
interact in and around critical infrastructure facilities each day – whether transiting, visiting, or working. Infrastructure is
commonly targeted in bombings. Individual infrastructure facilities, or clusters of facilities that are openly accessible to
the public can be particularly vulnerable. A set of annexes to the SRG C-IED, developed in conjunction with sector-specific
stakeholders, amplify the guidance with additional C-IED information of specific relevance to the following sectors and
subsectors:
• Whole community participation is important for effective C-IED efforts. For example, private sector stakeholders can
help prevent suspicious purchases of explosive precursor chemicals, facility managers can install protective measures
to protect people from blast effects, public safety personnel can deter would-be attackers at major events, and
nongovernmental organizations (NGO) can assist with recovery after an incident.
• A sound C-IED/IED risk management strategy includes efforts to both prevent and mitigate the potential effects of
incidents. U.S. C-IED policy highlights the need to discover and prevent IED incidents before they occur—referred to
as “left-of-boom.”
3
Counter-IED Concepts, Common Goals, and Available Assistance
• An “all-hazards” approach to emergency management should consider C-IED efforts. Each jurisdiction assesses its
risk from IEDs relative to all other threats and hazards, and makes decisions on how to prioritize C-IED efforts
accordingly.
• Jurisdictions and stakeholders may need to share C-IED resources. IED incidents, and IED preparedness for large
special events, may overwhelm the capacity of some jurisdictions. Communities and private sector organizations
should be prepared to work with stakeholders to meet C-IED needs and share C-IED resources.
Definitions
The following IED-specific definitions apply within this guide:
• IED: A device placed or fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or
incendiary chemicals and designed to destroy, incapacitate, harass, or distract.
• IED Incident: Any event that involves a real or suspected IED threat, including IED detonations, bomb threats, the use
of hoax devices, discovery of bomb-making components, or the theft of explosives or precursor materials.
• Countering IEDs: The interdisciplinary process for developing, implementing, evaluating, and adjusting measures to
prevent, discover, protect against, mitigate, respond to, and recover from IED incidents and their consequences.
4
Counter-IED Concepts, Common Goals, and Available Assistance
5
Counter-IED Concepts, Common Goals, and Available Assistance
In the U.S. after the Vietnam War-era, single-issue “lone wolves” and
other violent extremists have been responsible for most IED attacks.
Ted Kaczynski (“The Unabomber”) carried out a serial bombing
campaign that killed three people between 1978 and 1995 to protest
1975 –
industrialization. 10 In 1993, terrorists detonated a bomb in the World
Transportation 1970s-80s –
Trade Center parking garage, killing six people and injuring more than
Commercial and
Education
6
Counter-IED Concepts, Common Goals, and Available Assistance
The current IED threat to the United States ranges along a 1995 – Government
spectrum from bomb threats and crude devices to refined and
sophisticated plots capable of inflicting mass casualties. 14 15 After
September 11, 2001, the majority of bombing-related casualties 1996 – Sports
suffered by U.S. citizens occurred during the conflicts in Iraq and
Afghanistan. 16 However, multiple transnational incidents targeting
the U.S. homeland have subsequently occurred, including a 2009 2010 – Commercial
Al Qaeda attempt to detonate a bomb on a commercial flight 17
and a 2010 attempt to blow up a U.S.-bound cargo plane. 18 The
2013 Boston Marathon bombing and 2016 New Jersey and New
York City bombings demonstrated how homegrown extremists, 2013 – Sports
influenced by global terrorist movements, can use IEDs to inflict
mass casualties. Since September 11, 2001, law enforcement
agencies in the United States have disrupted dozens of IED-related 2016 –
plots, which had the potential for mass casualties. Many of these Commercial and
plots, along with bombings and other incidents in Boston, San Sports Venue
Bernardino, and New Jersey/New York, reflect a shift from
centrally organized operations by groups overseas to a more Figure 5: Timeline of major U.S. incidents and associated
decentralized threat in which bombers are often self-radicalized types of Critical Infrastructure Sector targets.
Property of DHS
via the Internet or only loosely affiliated with foreign movements
and therefore harder to detect and prevent by traditional
intelligence and law enforcement means. Many of these incidents
highlight how adversaries exploit the wide availability of products
that contain explosive precursor chemicals.
7
Counter-IED Concepts, Common Goals, and Available Assistance
IED Characteristics
Depending on the goals and materials available to the bomb-
maker, IEDs range from small, crude devices, such as
overpressure devices or pipe bombs most often filled with
gunpowder, to large vehicle-borne devices containing bulk
quantities of explosives. Many IEDs have common
characteristics, which can be remembered by the acronym,
PIES 1 outlined below:
Enhancements may be deliberately added to IEDs to increase their physical or psychological effects, such as shrapnel (e.g.,
nails, ball bearings, or BBs) or fuel (e.g., propane or other gas tank) and, in rare cases, a chemical, biological, or radiological
agent.
Figure 6 lists several types of commonly constructed IEDs. All can be manufactured from materials readily available
through both legal commercial means and black markets, and bombers are constantly adapting their tactics to circumvent
law enforcement detection and countermeasures.
1
READER’S NOTE: More technical stakeholders may use the alternative acronym, SIMPCE, which stands for Switch, Initiator,
Main charge, Power supply, Container, and Enhancements.
8
Counter-IED Concepts, Common Goals, and Available Assistance
2
READER’S NOTE: Understanding the terrorist attack planning cycle is a key step in assisting with the potential disruption of
nefarious activities; however, the cycle is fluid and steps may be skipped, or repeated. Most terrorist incidents in the West over
the last 5-10 years have had limited pre-operational activity compared to attacks prior to 9/11. Therefore, Figure 7 represents a
simplified representation of the cycle intended to assist the reader in identifying stages of the planning cycle that are often
observable and can offer opportunities to identify plots and prevent attacks. For more information on the full terrorist attack
planning cycle, visit the National Counterterrorism Center’s Joint Counterterrorism Assessment Counterterrorism Guide for
Public Safety Personnel.
9
Counter-IED Concepts, Common Goals, and Available Assistance
Potential Consequences
Understanding the potential consequences of IED incidents will help stakeholders, especially planners, to identify and
estimate their C-IED requirements, associated capabilities, and tasks. Predicting injuries and damages resulting from
bombings with certainty is difficult, as they vary widely depending on the specific details of the blast. 19 However, IED blast
effects generally relate to the size of the explosive charge, whether the IED has fragmentation or enhancements, and its
distance from a potential target. Communities should be prepared to deal with a broad spectrum of IED incident
consequences. At the low end, IED incidents, including threats and hoaxes, may simply cause disruptions to daily life and
commerce. At the high end, a significant incident may cause hundreds of casualties, millions of dollars in damage, and
require a prolonged recovery. A hypothetical scenario involving a large truck bomb (20,000 pounds) detonated at street
level in a major U.S. city resulted in an estimate of as much as $30 billion in direct and indirect economic losses. 20 Table 1
contains examples of IED incident consequences from the United States.
buildings to collapse, as well as kill individuals or cause serious injury to the ears and lungs. Explosions may also throw
people from their feet leading to additional injuries. In urban settings, the reflection and amplification of pressure waves
from surrounding buildings can cause additional injury and damage patterns.
Debris thrown by the IED blast may also cause injury and damage. Debris may originate from the IED, as fragmentation
from the container or enhancement like BBs added to increase IED lethality, or come from surrounding structures and
objects thrown by the blast. Lacerations and puncture wounds from flying glass fragments have been responsible for a
significant portion of the injuries during IED incidents. In the Oklahoma City bombing, 40 percent of the survivors cited
glass (and window blinds) as contributing to their injuries. 28 The 1998 bombing of the U.S. Embassy in Nairobi, Kenya,
injured more than 4,500 people, most of whom suffered debris-related injuries.
Additional Sources of Risk Information Figure 8: IED Effects by IED Weight and Distance
Property of DHS
The information provided here is only a starting point to gain
perspective on risk posed by IEDs to a given region, jurisdiction, or stakeholder group. More detailed information may be
available in THIRAs developed for the large city or state considering C-IED planning. For example, they may include
statistics and analysis on the frequency and estimated impact of IED events at the regional-, state-, or local-level based on
real-world data and input from experts.
11
Counter-IED Concepts, Common Goals, and Available Assistance
# Goal
Use and share risk information to guide IED-related physical security, law enforcement, and
1
emergency response activities.
3 Prevent the acquisition of explosives and explosive precursor chemicals used in IEDs.
4 Implement site-specific protective measures to prevent and minimize the impact of IED incidents.
6 Take immediate safety precautions for bomb threats, suspicious items, and IEDs.
8 Request Public Safety Bomb Squad assets to diagnose suspicious items and render-safe IEDs.
12
Counter-IED Concepts, Common Goals, and Available Assistance
Improvised explosive device subject matter experts in relevant technical disciplines of law enforcement, military, physical
security, emergency services, and counterparts representing broader emergency management and national preparedness
policy stakeholder interests, developed the goals collaboratively to ensure the guidance is relevant and practical. The
goals draw upon decades of experience and lessons learned from past bombing incidents and C-IED efforts in the U.S. and
overseas, including Iraq and Afghanistan, and closely align with the U.S. Government’s policy for countering IEDs
worldwide. Detailed information provided for each of these goals include discussions of why each is important and best
practices to assist stakeholders to implement them.
As with other types of threats and hazards, engagement with the whole community is one of the best ways to reduce risk.
A study of terrorism in the United States revealed that the most common types of observable “pre-operational” indicators
across hundreds of incidents were stated threats, the discovery of weapons, and the acquisition or storage of materials
such as explosives. 30 The Bomb-Making Materials Awareness Program (BMAP) is an outreach initiative that promotes
13
Counter-IED Concepts, Common Goals, and Available Assistance
private sector point-of-sale awareness and suspicious activity reporting to prevent misuse of explosive precursor chemical
IED components. BMAP creates prevention opportunities by establishing a network of vigilant stakeholders. The role of
whole community members—especially the public, education and faith-based stakeholders, and private sector
businesses—is critical because they may be in the best position to actually observe these indicators of radicalization or
criminal activity.
The Nationwide Suspicious Activity Reporting Initiative (NSI) is the collaborative effort between the Federal Government
and state, local, tribal, and territorial (SLTT) law enforcement stakeholders to establish national capacity for gathering,
documenting, processing, analyzing, and sharing suspicious activity report (SAR) information. Awareness-raising efforts
like DHS’s “If You See Something, Say Something ™” initiative are frequently used to bring awareness and educate
members of the public on how to be engaged. The NSI, in collaboration with local authorities, makes guidance and online
training available to whole community stakeholders so that they can contribute to IED risk management at this stage
effectively and appropriately.
The C-IED goals at this stage focus on detecting and reporting suspicious activity, including:
• Example: Intelligence and law enforcement personnel share information that may uncover plots as bombers interact
with terrorist and criminal organizations while selecting a target. (aligns with Goal 1)
• Example: Security personnel, as well as the public, may help detect IED plots during the planning and resources stage
by identifying suspicious activity. (aligns with Goals 2 and 3)
• Example: Routine law enforcement activities may detect and prevent imminent bomb threats and stop a bomber
from emplacing a device. (aligns with Goal 1)
• Example: The public or security personnel may observe suspicious activity, such as someone leaving an unattended
bag at a site, and notify authorities. (aligns with Goal 2)
• Example: Maximizing standoff distance using bollards and checkpoints and implementing protective measures
prevents bombers from delivering weapons to specific areas and helps minimize casualties and damage. (aligns with
Goal 4)
• Example: Screening and detection protocols deter threats and help identify them before they reach their target
destination. (aligns with Goal 5)
• Example: Law enforcement and intelligence information sharing after an IED incident can help disrupt future attacks
and capture suspects. (aligns with Goal 1)
• Example: A coordinated emergency response effort reduces the impact of an IED incident by effectively deploying
and integrating resources from across the community. (aligns with Goals 7 and 8)
14
Counter-IED Concepts, Common Goals, and Available Assistance
• Example: An effective medical response minimizes potential injuries from an IED blast. (aligns with Goal 9)
• Example: Rapidly returning a community to pre-attack status minimizes the long-term effects of an IED attack as well
as the psychological and economic impacts. (aligns with Goal 10)
Goal 1: Use and share risk information to guide IED-related physical security,
law enforcement, and emergency response activities
Preparedness • Prevention
Mission Areas:
• Protection
Why Is It Important?
It is valuable to understand the context of past and potential IED use in order to determine which aspect of the problem
to address. How have IED incidents occurred in the past? What is the current threat? What are the likelihood and
consequences of different incidents? Understanding the situation is essential to determining which C-IED goals and
preparedness core capabilities are relevant to your needs. Coordination between local, state, tribal, territorial, and
Federal stakeholders, as well as the private sector and non-governmental organizations, is critical because it provides an
opportunity to share information, expertise, and limited resources.
15
Counter-IED Concepts, Common Goals, and Available Assistance
• Establish public-private relationships to share IED-related information. These relationships provide communities
with a forum for IED-related information sharing. Public sector entities provide information on potential threats and
trends in IED-related activity. Private sector stakeholders inform counterparts on observed suspicious IED-related
activity as highlighted in Goals 2 and 3.
https://tripwire.dhs.gov
Why Is It Important?
Law enforcement efforts have disrupted the vast majority of terrorist plots in the U.S. since September 11, 2001. 31 In
many of these cases, community tips, SARs, and routine law enforcement activities provided the initial information
needed to identify those plots. Suspicious activity reports may also disrupt imminent attacks by helping to locate
associated persons or networks, preserving life, and minimizing destruction. 32 An observant community can help protect
against IED threats, and public awareness efforts should educate the whole community, to include individuals,
16
Counter-IED Concepts, Common Goals, and Available Assistance
communities, NGOs, private sector entities, and local, state, tribal, and territorial stakeholders. Recent IED-related plots
disrupted because of community tips include:
17
Counter-IED Concepts, Common Goals, and Available Assistance
Figure 10: Potential Indicators of IED Construction—laboratory equipment, liquid and/or powder
chemicals, measuring tools and scales, refrigeration or ice baths, and filtration tools.
Property of DHS
• Increase awareness of indicators of IED emplacement and potential use. Identifying emplaced IEDs provides a final
opportunity to disrupt plots, and the whole community should consider educating its members about indicators of
these imminent IED threats. Public awareness campaigns may be useful in typically high-risk areas, such as
government facilities and transportation nodes. Appendix B outlines products that may assist planners with conveying
this type of information to specific community groups. Table 3 lists imminent IED incident indicators, with additional
information provided in Goal 5 on screening and detection.
Table 3: Potential Indicators of Imminent IED Use
Property of DHS
Unattended bags
Unattended bags may indicate an IED threat.
18
Counter-IED Concepts, Common Goals, and Available Assistance
• Ensure that suspicious activity awareness campaigns include what to look for and how to report. Public
identification of IED indicators is only useful if they report information to the appropriate authorities. Improvised
explosive device indicator awareness campaigns and training aids should include detailed information on how to
report activity to law enforcement or public safety officials. The most effective way to do this is to link educational
efforts with existing SAR campaigns, including the If You See
Something, Say Something™ campaign 35.
Case Study: 2007 Fort Dix Plot
• Alert the public and high-risk stakeholders during periods of
Authorities disrupted a plot to attack Fort
heightened alert to motivate SAR. By messaging the public where
Dix Army base after an electronics store
and when they are most at risk, authorities ensure that the public
clerk provided a tip to police. The clerk
is vigilant in identifying and reporting suspicious activity. This
reported that two men dropped off a
information may be useful for preventing incidents and protecting
video tape for conversion to a DVD, which
people and sites. Many stadiums, transit systems, and
contained video of them shooting guns
entertainment facilities already use public address announcements
and shouting in Arabic.
and signage for this purpose nationwide.
• Report IED-related suspicious activity consistent with NSI
guidance and standards. Terrorist and criminal plots may go undetected if authorities do not share suspicious activity
information with one another. The NSI is the collaborative effort between the Federal Government and SLTT law
enforcement stakeholders to establish capacity for gathering, documenting, processing, analyzing, and sharing SAR
information in communities across America in order to prevent terrorism and other related criminal activity. The NSI
provides detailed guidance and training resources to assist jurisdictions with establishing SAR-related capability based
on national standards. The guidance covers an array of issues and best practices, from community outreach
approaches, to training, to privacy concerns.
19
Counter-IED Concepts, Common Goals, and Available Assistance
Why Is It Important?
The U.S. closely regulates commerce in the professional-grade high
Case Study: Texas Interdiction
explosives used in mining and blasting work, such as dynamite and
blasting caps, 36 and the Federal Government determines access for In February 2011, both a chemical and a
users of military-grade explosives. A bomb-maker must either steal shipping company reported a suspicious $435
these materials or obtain them on the black market. 37 Instead, most order of the chemical phenol by Khalid
IEDs in the U.S. contain low explosive materials (such as black and Aldawsari. The shipping company, a recipient
smokeless powders used in firearms and fireworks) that are of training materials on IED precursor chemical
available commercially but not regulated in the same way as high awareness, contacted both local police and the
explosives. Some IEDs contain explosives manufactured entirely FBI with a suspicion that the customer did not
from precursor chemicals. Homemade explosives (HMEs) use order the chemicals for normal use. A
explosive precursor chemicals found in many common, subsequent investigation revealed that
commercially available household items, with instructions for Aldawsari had been researching targets in the
manufacturing available in books or online. This enables bombers Dallas, Texas, area, including the home of
without technical experience to make HMEs by following simple former President George W. Bush, and that
recipes. Individuals and businesses that use, store, sell, and phenol was the last ingredient necessary for
transport all types of explosives and explosive precursor chemicals him to produce an explosive charge for an IED.
for legitimate purposes should safely secure them in order to
prevent the construction of IEDs. Examples of recent thefts of
explosives and attempted purchase of explosive precursors include:
• In 2009, Najibullah Zazi purchased large quantities of hydrogen peroxide from beauty supply stores in order to
manufacture explosives to bomb the New York City subway system; 38
• In 2013, a serviceman was arrested after attempting to sell a 1.25-pound block of military plastic explosive that he
had stolen during an on-base drill; 39 and
• In 2014, the theft of 285 pounds of commercial high explosives, including ammonium nitrate-fuel oil (ANFO),
explosive boosters, and dynamite from an explosives storage facility by forced entry. 40
identify potential misuse of explosive powders. Training should include local and Federal points of contact for
reporting purposes as well as indicators of suspicious purchases; Goal 1 includes example indicators. Explosives thefts
and losses occur in communities of all sizes, with material typically tied to ammunition and fireworks distributors and
retailers, construction sites, mining operations, demolition companies, public and private storage facilities, and during
transportation. Figure 11 shows examples of commercial explosives and blasting articles. Over a five-year period from
2009 to 2013, the ATF received reports of 124 thefts of explosive materials. Training and reporting capabilities should
be consistent with NSI guidance and standards.
• Increase awareness of the potential for diversion of explosive precursor chemicals. A range of businesses,
households, and individuals sell, transport, use, or store legitimate items that contain explosive precursor chemicals.
Table 4 lists the most common explosive precursor chemicals that individuals may observe within their community.
Public awareness campaigns that target community members who most often use these precursor chemicals may
help prevent the diversion of these materials for use in IEDs.
Table 4: Common Explosive Precursors and their Uses
Property of DHS
21
Counter-IED Concepts, Common Goals, and Available Assistance
• Train employees to secure explosive precursor chemicals and identify and report suspicious use or purchase.
Planners should work with private sector stakeholders and employees to ensure that adequate training is available.
Training should provide a list of explosive precursor chemicals that are present at a site or facility, guidance on how to
secure the materials against theft or misuse, possible indicators of suspicious activity, techniques for engaging
suspicious customers, and clear instructions for contacting authorities. This training may be part of a larger program
that addresses chemical safety. Because explosive precursor chemicals often have legitimate uses, training should
focus on suspicious or unusual buying patterns, such as the purchase of multiple precursor chemicals, large quantities
of these materials, or purchase for unusual uses. Training and reporting capabilities should be consistent with NSI
guidance and standards. Appendix B contains links to a number of government and industry resources for securing
chemicals, such as the DHS-DOJ BMAP.
22
Counter-IED Concepts, Common Goals, and Available Assistance
• Increase awareness of the risks and penalties associated with the manufacture of HMEs. Making HMEs from
precursor chemicals is a dangerous activity that has killed and injured individuals. 41 In some states, it is also a crime to
make explosives without first obtaining a permit. The penalties for making explosives vary depending on the state,
and Federal felony penalties apply to manufacturing destructive devices and transferring explosives to or from an
individual who does not have a license or permit. Increasing awareness of these penalties through targeted
campaigns may deter individuals from using precursor chemicals to make explosives. Contact local or state law
enforcement for laws that pertain to your area. Example laws related to the manufacture of explosives include:
• Possession of materials with the intent to make an explosive without a valid permit is a felony in California,
punishable by two to four years imprisonment; 42
• Manufacture of any explosive material without first obtaining a permit from the state fire marshal is a felony in
West Virginia, punishable by up to 10 years in prison and a $5,000 fine. 43
Why Is It Important?
Site-specific protective measures prevent bombers from accessing intended target sites and protect people and assets
should attacks occur. These measures may also deter potential bombers from considering attacks against protected sites
because of the challenges that they present. Recent examples of how these types of measures prevented IED incidents or
minimized the impact of attacks include:
23
Counter-IED Concepts, Common Goals, and Available Assistance
Figure 13: Level of Protection vs. Standoff Distance and Explosive Weight
Property of DHS
24
Counter-IED Concepts, Common Goals, and Available Assistance
• Ensure sites provide a layered defense. A defense that relies on multiple consecutive layers of protective measures
around an asset, illustrated in Figure 14, mitigates manmade threats, including use of IEDs. Layers are mutually inde-
pendent and designed to reduce the effectiveness of an attack by forcing attackers to penetrate and overcome each
security layer.
• Incorporate blast-resistant features and materials into new
and existing sites. In situations where sufficient standoff
distance or layered defense is not achievable, structural
hardening and use of blast-resistant features and materials is
particularly important. Appendix B provides resources for
selecting and incorporating blast-resistant features.
• Develop plans for deploying temporary protective
measures. High- or elevated-risk sites may consider
deploying assets to extend standoff distance or screen for
explosives and IEDs, further described in Goal 5. Additional
temporary protective measures include maximizing standoff
and layering defense by adding temporary outer, middle, or
inner security perimeters to address vehicle, personnel, and
item access. Figure 14: Layered Defense Diagram
Property of DHS
Why Is It Important?
Screening and detection methods help facility operators and security stakeholders prevent IEDs and IED components from
entering sites and facilities and locate emplaced IED threats. For these methods to be effective, operators must use them
in appropriate situations. For example, metal detectors may detect batteries and other metallic components in some
bombs, but will be ineffective against nonmetallic IED threats and explosives. Screening and detection methods may deter
would-be bombers from planning attacks because of perceived challenges associated with protected sites. Examples of
screening and detection successes include:
• In 1972, a canine team detected a bomb on board a flight at John F. Kennedy International Airport after receiving an
anonymous bomb threat; 46
• X-ray screening detected a mail bomb, which was defused, at a courthouse in Chicago in 1995; 47 and
25
Counter-IED Concepts, Common Goals, and Available Assistance
• In 2013, after an alarm in checked baggage, TSA officers found a 3.2-ounce flask of black powder, 22 feet of fuse, and
miscellaneous ammunition in a passenger’s bag. 48
26
Counter-IED Concepts, Common Goals, and Available Assistance
so it is important that security personnel are aware of their responsibilities for the full range of scenarios that they
may encounter.
• Ensure vehicles being screened do not impede the flow of other traffic;
Manual screening • Have vehicle operators open all large holding spaces for easy inspection; and
tips for vehicle • Identify type of required screening ahead of time, as that distinction will identify
checkpoints 50 how the screening needs to be accomplished (e.g., guarding against use of a
VBIED and/or smuggling of a “placed” IED by car or foot traffic).
27
Counter-IED Concepts, Common Goals, and Available Assistance
Security planners assess that there are unacceptable risks posed from VBIEDs before
Assess threats
and during the game, PBIEDs during the game, and emplaced IEDs inside the stadium.
Security can close streets immediately adjacent to stadium, limiting vehicle access to
Screening
the site. However, some vehicles require direct access for pre-game deliveries. Over a
requirements
two-hour span before kickoff, approximately 30,000 people will enter the stadium.
Employ wide-area search of the stadium before securing the site the day before the
game. Use vehicle checkpoints at the north and south entrance of the stadium to
Screening
screen delivery vehicles entering the stadium. Employ 30-40 screening checkpoints for
strategy
people entering the stadium. Maintain mass search capability during the game as
needed.
28
Counter-IED Concepts, Common Goals, and Available Assistance
• Wide-area search: Two EDC teams search the stadium the night before the game.
• Mass search: Two EDC teams provide mass search as needed.
• Vehicle checkpoints: Undercarriage mirrors at two vehicle checkpoints
Select detection accommodate the 30 trucks that need to make deliveries in the five hours before
methods and the game.
technologies
• People checkpoints: 40 screeners use magnetometers to screen four people per
minute.
• Mail screening: The U.S. Postal Inspection Service (USPIS) provides screening for
explosive threats using X-ray and trace explosive detection.
• Develop screening and detection protocols. Screening and detection protocols provide systematic instructions for
anyone involved with the screening process, covering the full range of operational needs and constraints, including:
• Description of each component of the screening strategy and the methods and technologies used;
• Guidelines for activating security procedures when threats are detected and dealing with people associated with
threats; and
• Information on how to contact security personnel in the event of detection.
Goal 6: Take immediate safety precautions for bomb threats, suspicious items,
and IEDs
Preparedness • Prevention
Mission Areas:
• Protection
• Response
Preparedness • Planning
Core Capabilities:
• Operational Coordination
• Screening, Search, and Detection
29
Counter-IED Concepts, Common Goals, and Available Assistance
Why Is It Important?
Bomb threats and IEDs are criminal acts with immediate public safety implications. Managed improperly, a bomb threat
or potential IED sighting can cause stress, panic, and associated risks like stampedes. Likewise, a suspicious item may or
may not be an IED. It is imperative to understand how to determine if something is suspicious and take appropriate safety
precautions.
Schools, government facilities, businesses, and other community organizations may receive bomb threats. The
overwhelming majority of these threats do not involve actual devices, yet they are responsible for substantial disruptions
in activities. These disruptions, and the associated emergency response, cost millions of dollars each year. Of the more
than 1,000 bomb threats in the nation each year, recent examples include:
• A bomb threat near downtown Honolulu required the evacuation of the Federal building and a state courthouse in
2013; 51
• In 2014, a North Carolina teen called in 20 bomb threats in 40 days to four schools, a hospital, several fast food
restaurants, a gas station, and a major retail store; 52 and
• A note found in the restroom of a Michigan manufacturer indicated a bomb threat, leading to an evacuation of 900
employees in 2014. 53
Knowing how to effectively react to a bomb threat will increase safety, minimize potential disruptions, and assist law
enforcement. Response protocols help maintain calm during a stressful situation and enhance decision-making by facility
owners or operators. For example, bomb threats are often received via telephone, email, or mail by a receptionist or front
office employee. Having a quick-reference guide available nearby can help them record vital information and assist
authorities to make risk management decisions, such as whether to evacuate, search for suspicious items, etc.
If a suspicious item is found, safety protocols should be automatically employed and a bomb squad dispatched to
diagnose the threat. People should be evacuated from the
surrounding area and a perimeter secured to reduce risk until the
Bomb threat response plan considerations:
situation is resolved. The most important risk management factor
for IEDs is distance from the potential threat. • Planning and preparation
• Building an Emergency Toolkit
What You Can Do
• What to do when receiving a bomb threat
• Develop facility-specific bomb threat response plans.
Schools, financial institutions, faith-based organizations, • Threat assessment
malls, and entertainment facilities are among the facilities • Staff response, including searches
that receive the most bomb threats. In 2013, schools were
• Identification of suspicious items
the target of half of all bomb threats in the U.S.. 54 Bomb
threats have to be taken seriously and demand an organized • Lockdown and evacuation considerations
response, which may require a physical search of a site, an • Coordination with arriving police and
evacuation, or both, depending on the assessed risk. Bomb emergency services
threat response plans instruct individuals and organizations
on how to perform these actions with an emphasis on safety
and minimizing disruption to normal activities. The actions typically occur before law enforcement or public safety
personnel reach the site.
30
Counter-IED Concepts, Common Goals, and Available Assistance
• Apply the H.O.T. principles to determine if an item is suspicious (potential IED) or not: Not all unattended items are
suspicious. Indicators can relate to: what the item looks like; where it is; when it was found/placed; who placed or
reported it; and why it came to your attention (5Ws). Consider suspicious any items that are H.O.T.: Hidden,
Obviously suspicious, or not Typical for the environment.
Searching Interiors
If the searchers find a suspicious item, they should apply the R.A.I.N.S. principles and follow
instructions. If no guidance is provided, calmly evacuate the area.
• Apply the R.A.I.N.S. principles to take immediate safety actions upon identifying a suspicious item (potential IED).
Ad hoc procedures for reacting to a suspicious item made in the heat of the moment are rarely good ones. Once you
identify an item as suspicious, react as if it is an IED until determined otherwise by a public safety bomb squad (PSBS).
Remember:
• Recognize (based on H.O.T. and/or P.I.E.S.)
• Avoid (do NOT touch or move the item)
• Isolate (from people, through a combination of distance, cover, cordoning, and/or evacuation as the situation
warrants)
• Notify (a site decision-maker at the facility or law enforcement)
• Suspect (the potential risk of secondary IEDs in the vicinity)
• Employ distance and cover to maximize personnel safety. Improvised explosive device detonations produce blast
pressure waves and can throw fragmentation, shrapnel, and debris that can be lethal. Distance is the best way to
reduce the risk posed by blast waves, but distance alone cannot protect against projectiles. The velocity of blast
fragmentation, shrapnel, and debris can greatly exceed bullets and defeat common protective equipment (e.g.,
turnout gear, crash helmets, ballistics vests, and ballistic helmets). On-scene personnel should seek distance and
dense cover between the suspicious item or IED, such as masonry walls or heavy vehicles. Materials can also be
thrown upward; overhead cover is best.
31
Counter-IED Concepts, Common Goals, and Available Assistance
• Secure incident perimeters. Law enforcement should establish a secure perimeter at incident sites to create standoff
distance between individuals and potential explosive threats. Perimeters also ensure effective medical and
investigative response. Table 8 provides example distances for reference. Consider implementing protocols to
positively identify personnel and inspect packages and vehicles.
Table 8: Example Evacuation Distances
Property of DHS
Moving van or water truck 860 feet 861-5099 feet +5100 feet
• Use personal protective equipment (PPE). Emergency services personnel (law enforcement, fire, and emergency
medical services) responding to IED incidents who have PPE such as ballistics vest, helmets, or turnout gear should
don it prior to entering the secure hot zone perimeter (inside the mandatory evacuation distance).
• Increase awareness of the penalties associated with making false bomb threats. Making a false bomb threat is a
Federal offense punishable by up to 10 years in prison, 55 although the state level may deal with many false bomb
offenses. Informing individuals about the penalties associated with these crimes through targeted awareness
campaigns may deter them from making false bomb threats. Planners should consult state and local law enforcement
to determine the penalties specific to their area and post notices in schools, workplaces, and other sites. Example
penalties for making false bomb threats include:
• In Florida, false reports of planting bombs are second-degree felonies with the possibility of 15 years in prison; 56
• In Alabama, terrorist threats that cause the disruption of school activities are Class C felonies punishable by up to
10 years in prison; 57 and
• In Michigan, posting a threat through an electronic medium with the intent to terrorize, intimidate, or threaten is
a felony carrying a penalty of up to two years in prison. 58
32
Counter-IED Concepts, Common Goals, and Available Assistance
Why Is It Important?
Incidents in which the presence of a suspicious item, emplaced IED, or IED
detonation has already occured require a coordinated response effort
across a broad range of capabilities, including law enforcement personnel,
fire and emergency medical services personnel, government administrators,
and other responders. Effectively securing the area, communicating,
protecting individuals, and investigating the incident requires close
coordination and advance planning because various response disciplines
will be operating simultaneously in a high-risk environment. Recent
examples of this type of coordination include:
Figure 17: 2013 Boston Marathon Bombing
• Police evacuated the apartment building of the accused 2012 Aurora Property of DHS
theater shooter after finding multiple IEDs located in his apartment.
Law enforcement cordoned off the area while bomb technicians deactivated the devices; 59 and
• In 2013, reports of explosives at Harvard University led police to evacuate four buildings on campus. Massachusetts
State Police, Cambridge Police, Harvard Police, Boston Police, and Transit Police departments, along with the FBI and
bomb squad officials, coordinated the law enforcement response to the incident. 60
The nature of multi-discipline incident response, in which the threat of IEDs is present, raises difficult questions. Should
life-saving activities be paused until the presence of a potential, but unconfirmed IED is definitively confirmed? If there is
a confirmed IED, should other responders wait until bomb technicians render the IED safe, even if it appears small or far
away? If the decision is made to proceed with life-saving law enforcement and emergency medical activities despite
potential risk, how can the risk be reduced? Incidents in which IEDs pose a threat impose unique challenges to Incident
Commanders. New guidance on the integration of response disciplines within the National Incident Management System
(NIMS) and Incident Command System (ICS) is available based on lessons learned from incidents like Boston and San
Bernardino.
33
Counter-IED Concepts, Common Goals, and Available Assistance
• Consider pre-deployment of Joint Hazardous Materials Assessment Teams (JHAT)/Joint Hazardous Explosive
Response Teams (JHERT). A JHAT/JHERT (sometimes called Hazard Interdiction Teams) is a highly mobile team of
technical responders from multiple disciplines (such as Bomb Technicians, Hazardous Materials Technicians, etc.) pre-
deployed at special events that can quickly and discreetly assess a reported threat (such as a bomb threat or
suspicious item) and coordinate response actions with the Incident Commander and/or BMC as the situation dictates.
• Increase awareness of secondary attacks and associated Case Study: Sandy Springs, Georgia (1997)
security measures. Remember the R.A.I.N.S. principles.
Eric Rudolph carried out a double bombing in
Bombers may detonate, or threaten to detonate, a
Atlanta, Georgia, in 1997. Rudolph’s first IED
secondary IED to target first responders and crowds that
exploded at the back of a professional
arrive at the scene or concentrate at evacuation points,
building. The second IED exploded in the
hospitals, and police stations. Individuals participating in
parking lot one hour later, as medical
response efforts may be particularly vulnerable to this type
personnel, firefighters, police, and other first
of attack because they are assisting victims or investigating
responders worked to secure the scene and
the incident. Instruct first responders, medical personnel,
evacuate the area.
and anyone at the scene of an IED incident not to disturb
suspicious items and to immediately report them to law
enforcement.
34
Counter-IED Concepts, Common Goals, and Available Assistance
• Plan to adjust security posture at high-risk locations during and following IED incidents. Public safety officials and
facility operators, in concert with law enforcement, should consider elevating the security posture at high-risk
locations during and following an IED incident. This is important because individual IED incidents may be part of a
larger plot.
• Provide a coordinated response to complex attacks (attacks including multiple weapons, such as IEDs and firearms).
These types of attacks have the potential to exploit security vulnerabilities, as seen with the recent attacks in Norway
and Mumbai. 61 Responders to mass-shooting events should be aware of the potential for IED use.
• Provide the public with information following an IED incident. Effective response to IED threats and incidents
requires an informed public. Individuals become less fearful if they receive information on the incident and ongoing
response efforts. Instructions from community leaders also help safeguard the public, prevent interference with the
official response, and increase awareness of the need to report suspicious activities.
• Consider forensic evidence preservation at IED incident sites. First responders should be aware that response efforts
may contaminate forensic evidence and should attempt to minimize disturbance of the IED incident site. Appendix B
contains resources that instruct responders on best practices for preserving IED incident sites.
35
Counter-IED Concepts, Common Goals, and Available Assistance
Goal 8: Request Public Safety Bomb Squad assets to diagnose suspicious items
and render-safe IEDs
Preparedness • Prevention
Mission Areas:
• Response
Why Is It Important?
Improvised explosive device incidents involving a suspected device require a bomb squad response and capability to
diagnose and “render-safe” viable devices, but not every jurisdiction may have the capability or capacity to have their
own PSBS. In some cases, the scale of an IED incident may also overwhelm a jurisdiction’s PSBS capabilities. In these cases,
jurisdictions may need to share the bomb squad capabilities of a neighboring jurisdiction. A successful bomb squad
response to an IED incident requires each PSBS to work effectively with other first responders, including police, fire, and
emergency medical personnel, as well as other bomb squads. Goal 7 provides more information on integrated emergency
response capabilities. Examples of successful render-safe operations include:
• In 2010, a bomb squad evacuated an area in Escondido, California, and closed down a local interstate while they
ignited a controlled fire to burn down a home where a man was discovered creating and storing a large amount of
HMEs; 62 and
• In 2010, police blocked off parts of Times Square after someone left a suspicious item in the area. The NYPD deployed
a robot to X-ray the device, and members of the bomb squad suited up before ultimately clearing the package. 63
36
Counter-IED Concepts, Common Goals, and Available Assistance
Why Is It Important?
Improvised explosive device incidents may require a rapid, specialized, medical response to deal with the effects of
overpressure- and shrapnel-related injuries that are often associated with these weapons. Overpressure may severely
damage the ears, lungs, and other gas-filled cavities within the body
and cause blunt-force trauma injuries. Shrapnel from the device, or
glass from shattered windows, may also produce serious lacerations
and puncture wounds. Examples of IED-specific medical response
include:
37
Counter-IED Concepts, Common Goals, and Available Assistance
• In the aftermath of the 2004 Madrid train bombings, response personnel distributed 966 patients across 15 public
community hospitals. This included the transport of more than 270 patients to the facility closest to the bombing
within three hours. 64
38
Counter-IED Concepts, Common Goals, and Available Assistance
Goal 10: Reduce the psychological and economic impacts of IED incidents
Preparedness • Mitigation
Mission Areas: • Recovery
Why Is It Important?
Improvised explosive device incidents have significant impacts on individuals and communities. Many existing all hazard
plans and resources will assist in the recovery from IED incidents. However, IED incidents may produce specific
economic and mental health issues. IED incidents also often occur in cities and population centers, which are centers
of business and commercial interests. This means incidents frequently produce economic losses through direct
damage to property or indirect effects on commerce, such as temporary business closures or employee absences.
Individual victims of these incidents and their families may suffer from mental health issues, such as post-traumatic
stress disorder (PTSD), anxiety, and depression. Examples of economic and mental health impacts include:
• The 1995 Oklahoma City bombing damaged more than 300 Recovery in Israel
buildings, raising the cost of that incident over $650 million, 67
and hundreds of mental health professionals participated in the In December 2001, two suicide bombers
associated recovery; 68 and a car bomb detonated on Ben Yehuda
Street in Jerusalem. The attack killed 13
• Decreased tourism following the July 2005 London bombings
people and injured 188 more. Just hours
caused an estimated £300 million ($522.75 million) in lost
after the attacks, shopkeepers had already
revenue; 69 and
swept up shattered glass and reopened
• The English National Health Service (NHS) screened 596 their businesses. A “rapid return to
individuals after the 2005 London bombings, identifying 217 in normalcy” is an important part of the
need of mental health treatment. 70 recovery process in Israel. As a shopper at
the scene noted, “We must just continue
What You Can Do with life. What else can we do?”
• Coordinate between government authorities and impacted
businesses to reduce recovery time. Bombing locations are a crime scene that will need to be processed for evidence
by law enforcement and often have physical damage that prevents normal operations. Depending on the scale of the
incident, these factors may result in business closures.
• Plan to address IED-specific victim assistance and mental health care needs of individuals and communities.
Bombings are intentional crimes that often result in deaths and/or serious injuries. Crime victims, including surviving
family members, benefit from assistance in understanding their rights and the criminal justice process. The FBI’s
Victim Assistance Program, accessible through local FBI Field Offices, provides specialists trained to help victims of
terrorism and violent crime navigate the aftermath of the incident. Similar programs are available at the local and
State levels. More broadly, mental health impacts can affect survivors and first responders and may overwhelm the
capacity of cities in the aftermath of an IED incident. Impacted jurisdictions may require a surge of mental health
39
Counter-IED Concepts, Common Goals, and Available Assistance
professionals from other locations. Consider identifying mutual aid networks of disaster-trained professionals that
can provide assistance in the event of an attack.
• Develop economic resilience plans for people, businesses, and communities. Economic resilience plans include
instruction for dealing with business interruptions and relocations. This may include thorough business continuity of
operations (COOP) planning and insurance that covers property damage and loss of revenue in the event of natural or
manmade disasters.
• Leverage Federal Government disaster assistance resources. www.DisasterAssistance.gov is a clearinghouse of
resources available to those impacted by incidents in which an Emergency Declaration or Major Disaster Declaration
is issued by the President, including terrorism incidents. It includes more than 70 types of assistance available from 17
federal agencies. Many states maintain their own disaster assistance programs, as well.
40
Counter-IED Concepts, Common Goals, and Available Assistance
Planning Considerations
Three levels of planning occur:
• Strategic-level planning sets the context and expectations for operational planning;
• Operational-level planning provides the tasks and resources needed to execute the strategy; and
• Tactical-level planning shows how to apply resources in order to complete the operational tasks within a given
timeframe.
The intent of this chapter is to assist planners in conducting operational-level planning. Operational plans provide
instruction on roles, responsibilities, and actions for the plan’s stakeholders. Typically, this involves coordinating the
activities of responders during an IED incident. It is important for communities, organization, businesses, or facility
owner/operators to develop operational-level planning based on existing capabilities and to revise those plans and any
IED-specific annexes as the strategic-level planning process continues and capabilities change.
41
Counter-IED Concepts, Common Goals, and Available Assistance
• Adjusting the size, composition, and level of effort of the team, depending on the size of the community or
organization that is planning to counter the IED threat.
• Adding appropriate subject matter experts to help identify key operational issues for consideration by the planning
team. For an IED threat assessment, this may include local bomb squad personnel, FBI Special Agent Bomb
Technicians (SABTs), and state homeland security officials.
• Coordinating with stakeholders that have knowledge of needed issues, in the event that representatives of required
disciplines are not available in the community or organization. For example, communities that do not have a standing
bomb squad may consider including state police personnel that have knowledge of regional bomb squad activities.
• Including representatives from the planning area as well as community stakeholders, such as first responders, local
emergency management staff, and others who have roles and responsibilities before, during, and after an IED
incident to the planning team.
The planning team should be small enough to permit close collaboration with first responders and other community
stakeholders, yet large enough to be representative of the planning area. It should also be large enough so that it does
not place an undue burden on any single person.
Table 9 provides a list of recommended participants that planners may wish to include in a planning team, although teams
may vary based on community planning requirements. The planning team is not required to include each of the members
listed, or may include additional members not present on this list.
42
Counter-IED Concepts, Common Goals, and Available Assistance
Local
43
Counter-IED Concepts, Common Goals, and Available Assistance
44
Counter-IED Concepts, Common Goals, and Available Assistance
The planning team defines IED-based scenarios that will stress community capabilities. If the community is part of a state
or jurisdiction that has already performed a THIRA, example scenarios may already exist and should be cross-referenced.
Otherwise, subject matter experts, local emergency managers, fusion centers, and Federal stakeholders may be able to
assist communities with developing and refining realistic scenarios. Impacts from these scenarios should include the
potential for severe injuries and fatalities, facility damage or destruction, and displacement of affected populations or
businesses. If a community has not already identified scenarios through a THIRA or other risk assessment process, it can
use the scenarios provided in Table 10.
Next, the team develops community-specific IED scenarios that include realistic conditions with the most severe
consequences. These scenarios help communities develop realistic capability requirements and prepare for all
possibilities, including mass casualties and significant damage to infrastructure. Consider using the following potential
targets when developing scenarios:
45
Counter-IED Concepts, Common Goals, and Available Assistance
• Government sites, such as courthouses, administrative buildings, schools, and military facilities, including recruiting
stations; and
• Transportation entities, such as mass transit, rail, ports, and aviation.
Use and share risk information to guide IED-related physical security, law enforcement, and
1
emergency response activities.
3 Prevent the acquisition of explosives and explosive precursor chemicals used in IEDs.
4 Implement site-specific protective measures to prevent and minimize the impact of IED incidents.
6 Take immediate safety precautions for bomb threats, suspicious items, and IEDs.
8 Request Public Safety Bomb Squad assets to diagnose suspicious items and render-safe IEDs.
Next, the planning team identifies existing capabilities that are associated with each Goal. For those communities that
follow an all hazards approach to preparedness, it may be useful to identify capabilities that reside within the core
capabilities referenced in Table 12. The highlighted core capabilities are most closely associated with the C-IED Goals in
Table 11. Jurisdictions that complete the THIRA process have already estimated their capabilities in this way. Planners
may draw information from the THIRA to establish a baseline for developing the needed capabilities to fill identified gaps.
46
Counter-IED Concepts, Common Goals, and Available Assistance
Table 12: Primary Core Capabilities for Countering the IED Threat (Highlighted)
Property of DHS
Planning
Operational Coordination
47
Counter-IED Concepts, Common Goals, and Available Assistance
Operational Plan
Communities develop C-IED operational plans and annexes that rely on existing capabilities. Jurisdictions may develop a C-
IED operational plan as an IED annex to an existing EOP. If an IED annex already exists, the planning team should update it
to include the information discovered while completing Steps 1–4, and as capability gaps close due to the strategic-level
planning process. Those jurisdictions without a C-IED operational plan should include its completion as a corrective action
within the strategic plan.
Appendixes D and E contain a checklist that may be useful for planners during the development of operational plans and
IED-specific annexes. Planners may wish to consider:
• A plan is adequate if the plan identifies and addresses critical courses of action effectively; can accomplish the
assigned function; and includes valid and reasonable assumptions.
• A plan is feasible if the jurisdiction can accomplish the assigned critical courses of action by using available resources
within the time contemplated by the plan.
• A plan is acceptable if it meets the requirements driven by a threat or hazard, meets cost and time limitations, and is
consistent with the law.
• The plan should comply with and conform to applicable statute, law, or ordinance because these provide a baseline
that facilitates both planning and execution.
Planning is a continuous process that does not stop upon publication of the plan. Planning teams should establish a
process for reviewing and revising the plan to include new information, insights, and lessons learned identified through
training and exercises, and actual IED-specific incidents. Ultimately, the IED annex should evolve over time to address
changing priorities, reflect updated risk assessments, and incorporate other sources of information that improve or
enhance the document to ensure the annex remains relevant for first responders and the whole community.
48
Counter-IED Concepts, Common Goals, and Available Assistance
There are 56 offices located in major metropolitan areas across the U.S.
where the FBI carries out investigations, assesses local and regional crime
FBI Field Offices
threats, and works closely with stakeholders on cases and operations.
Most Field Offices include an SABT with IED subject matter expertise.
49
Counter-IED Concepts, Common Goals, and Available Assistance
50
Counter-IED Concepts, Common Goals, and Available Assistance
The resource links are valid as of the time of publication, but are subject to change. To ensure access to the most up-to-
date resource listing, along with all SRG C-IED content and related information, visit the dedicated SRG C-IED page
available at https://TRIPwire.DHS.gov.
Goal 1: Use and share risk information to guide IED-related physical security, law enforcement, and emergency
response activities
Serve as focal points within the state and local environment for the
State and Major Urban Area Fusion receipt, analysis, gathering, and sharing of threat-related information
Centers between the federal government and SLTT and private sector
stakeholders.
51
Counter-IED Concepts, Common Goals, and Available Assistance
DOJ Engaging the Private Sector to Bureau of Justice Assistance information on establishing law enforcement-
Promote Homeland Security private sector relationships.
Provides all levels of the law enforcement, criminal justice, and public
FBI Law Enforcement Enterprise
safety sectors with general operational support, online training, and
Portal (LEEP)
electronic communication.
Technical Support Working Group Training on IED components to prepare law enforcement personnel to
(TSWG) IED/HME/Drug Awareness execute routine and high-risk search and seizure warrants with the goal of
for Law Enforcement preventing a possible IED-related attack.
TSWG Radiological Dispersal Device Guidance on recognition, evaluation, and initial operational response for a
(RDD) Recognition Guide suspected RDD.
TSWG Radio Controlled Improvised A pictorial representation of RC-IED threats and a series of actions to take
Explosives Card (RC-IED) if encountered.
TSWG Preparation for the Information distributed by the Combatting Terrorism Technical Support
Suicide/Homicide Bomber Training Office (CTTSO) providing awareness level training, operations level
Support Package training, and command level training.
Law Enforcement Intelligence: A A guide directed primarily toward local, state, and tribal law enforcement
Guide for State, Local, and Tribal agencies of all sizes that need to develop or reinvigorate their intelligence
Law Enforcement Agencies function.
52
Counter-IED Concepts, Common Goals, and Available Assistance
56 offices located in major metropolitan areas across the U.S. where the
FBI carries out investigations, assesses local and regional crime threats,
FBI Field Offices
and works closely with stakeholders on cases and operations. Most Field
Offices include an SABT with IED subject matter expertise.
Serve as focal points within the state and local environment for the
State and Major Urban Area Fusion receipt, analysis, gathering, and sharing of threat-related information
Centers between the federal government and SLTT and private sector
stakeholders.
National Consortium for the Study Hosts the Global Terrorism Database, an open-source database including
of Terrorism and Responses to information on terrorist events around the world, including the use of
Terrorism (START) IEDs.
State Department Country Reports Information on terrorist activity around the world, including the use of
on Terrorism IEDs.
53
Counter-IED Concepts, Common Goals, and Available Assistance
DHS IED Counterterrorism Enhances the participant’s understanding of the IED threat, surveillance
Workshop detection methods, and soft target awareness.
Goal 3: Prevent the acquisition of explosives and explosive precursor chemicals used in IEDs
The ATF provides many resources to assist explosives permit holders with safety and regulatory compliance
activities. This includes:
ATF Secure Storage Techniques Storage information for Federal explosives license and permit holders.
54
Counter-IED Concepts, Common Goals, and Available Assistance
ATF Guidance on Regulations for Overview document for fireworks retailers to aid in compliance with
Fireworks Retailers regulatory requirements.
Resources with guidance, standards, regulations, or related information on explosive precursor chemicals include:
TSWG Indicators and Warnings for CTTSO information to allow on-scene personnel to rapidly assess that a
HMEs situation involves the presence of HMEs.
DHS Ammonium Nitrate Security Information on the proposed rule for DHS to regulate the sale and transfer
Statutes and Regulations of ammonium nitrate.
55
Counter-IED Concepts, Common Goals, and Available Assistance
Resources that help with identifying and reporting suspicious activity related to explosive precursors include:
LAPD Indicators of Suspicious Information on identifying suspicious activity related to commerce in bulk
Activity for Bulk Fuel Distributors fuels.
Additional resources that are relevant to explosives safety and security include:
56
Counter-IED Concepts, Common Goals, and Available Assistance
Goal 4: Implement site-specific protective measures to prevent and minimize the impact of IED incidents
Resources that provide information on IED blast effects and include instructions on implementing protective
measures include:
National Institute of Building Information on a wide range of building-related guidance, criteria, and
Sciences (NIBS) Whole Building technology from a “whole buildings” perspective, including guidance on
Design Guide explosive threats.
Interagency Security Committee A list of standards and best practices for physical security related to the
(ISC) protection of buildings and nonmilitary Federal facilities in the U.S.
U.S. General Services Establishes the process that security professionals, designers, and project
Administration (GSA) Site Security and facility managers should follow in designing site security at any
Design Guide Federal project.
57
Counter-IED Concepts, Common Goals, and Available Assistance
NIBS Whole Building Design The fundamentals and basics of glazing hazard mitigation practices for
Guide—Glazing Hazard Mitigation both new and existing buildings.
DHS SAFETY Act Qualified Anti- Lists technologies approved and designated by DHS to provide liability
Terrorism Technologies protections in the event of an act of terrorism.
GSA Window Glazing Analysis GSA-provided information on window glazing to protect people during IED
Response and Design (WINGARD) incidents.
Available from DHS for venues and special events, including stadiums and
DHS Special Event C-IED Training arenas, places of worship, education, malls and shopping centers, large
buildings, hotels, and medical facilities.
Provides the incident commander an interagency team that can assess the
JHERT need for further specialized assets at designated special events. Contact
your local FBI field office for more information.
58
Counter-IED Concepts, Common Goals, and Available Assistance
DHS and Sports Venue Bag Search Guidance and suggestions for developing and implementing bag search
Procedures Guide procedures at public assembly venues hosting major sporting events.
TSWG Vehicle Inspection Guide A 280-page course to train personnel to determine various indicators of
Training Support Package suspected hidden IEDs.
Several resources may help with the selection of specific explosive and anomaly detection methods and
technologies:
59
Counter-IED Concepts, Common Goals, and Available Assistance
DHS SAFETY Act Qualified Anti- Lists technologies approved and designated by DHS to provide liability
Terrorism Technologies protections in the event of an act of terrorism.
Government Accountability Office Reviews the availability of explosives detection technologies and their
(GAO) Report on Explosives ability to help secure the passenger rail environment, and key operational
Detection Technologies to Protect and policy factors that impact the role of explosives detection
Passenger Rail technologies in the passenger rail environment.
TSA Air Cargo Screening A guide for regulated parties to use when procuring screening equipment
Technologies List in accordance with TSA approved security programs.
Goal 6: Take immediate safety precautions for bomb threats, suspicious items, and IEDs
DHS Bomb Threat Checklist A checklist for recording information when receiving a bomb threat.
60
Counter-IED Concepts, Common Goals, and Available Assistance
DHS IED Search Procedures Increases IED awareness on bombing prevention measures and planning
Workshop protocols to detect IEDs by reviewing specific search techniques.
Additional resources provide information on developing response plans for schools, including:
61
Counter-IED Concepts, Common Goals, and Available Assistance
Resources that provide information on on-scene safety, secondary devices, and force protection measures
include:
Guidance from the DHS Office of Health Affairs that translates evidence-
based response strategies from the U.S. military’s vast experience in
First Responder Guidance for
responding to and managing casualties from IED and/or active shooter
Improving Survivability in IED
incidents into the civilian first responder environment. This guidance also
and/or Active Shooter Incidents
incorporates civilian best practices and lessons learned from similar
incidents, both in the U.S. and abroad.
Goal 8: Request Public Safety Bomb Squad assets to diagnose suspicious items and render-safe IEDS
Provides additional training and assistance for PSBS and bomb technicians
FBI SABT Program
in their region. Contact your local FBI Field Office for more information.
62
Counter-IED Concepts, Common Goals, and Available Assistance
Augments the National Guidelines for Bomb Technicians and Model for
Bomb Squad SOPs with recommendations applicable to selection of
FBI Special Technicians Bulletin
acceptable candidates for bomb technician certification. Topics addressed
2013-1: A Guide for Selecting Bomb
include suggested candidate selection processes, establishing a selection
Squad Personnel
committee, and drafting a position announcement. Contact your local FBI
Field Office for more information.
Resources that provide information on emergency and mass casualty care include:
Guidance from the DHS Office of Health Affairs that translates evidence-
based response strategies from the U.S. military’s vast experience in
First Responder Guidance for
responding to and managing casualties from IED and/or active shooter
Improving Survivability in IED
incidents into the civilian first responder environment. This guidance also
and/or Active Shooter Incidents
incorporates civilian best practices and lessons learned from similar
incidents, both in the U.S. and abroad.
Information and insight to assist public policy and health system leaders in
Centers for Disease Control (CDC)
preparing for and responding to a mass casualty event caused by terrorist
Preparedness, Response to Mass
use of explosives (TUE), including leadership in preparing for and
Casualty Event Resulting from
responding to a TUE event, and effective care of patients in the pre-
Terrorist Use of Explosives
hospital and hospital environments during a TUE event.
63
Counter-IED Concepts, Common Goals, and Available Assistance
Committee for Tactical Emergency Guidance on medical management of preventable deaths at or near the
Casualty Care (C-TECC) point of wounding.
64
Counter-IED Concepts, Common Goals, and Available Assistance
FEMA Explosives-Specific
Information designed to prepare the general public in case of a bomb
Emergency Preparedness
threat, suspicious package, or letter.
Information
Resources that provide medical response lessons from the conflicts in Iraq and Afghanistan include:
Resources that provide medical response lessons from the 2013 Boston Marathon bombings include:
After Action Report for the Provides the findings of an after action review of response and recovery
Response to the 2013 Boston activities of public safety, public health, and medical personnel and
Marathon Bombings identifies gaps and best practices.
Resources that provide medical response lessons from the 2005 London bombings include:
65
Counter-IED Concepts, Common Goals, and Available Assistance
Resources that provide medical response lessons from the 2004 Madrid bombings include:
Madrid Explosion Information An overview of the Spanish Red Cross’s efforts to assist the casualties in
Bulletin No. 4 the Madrid train bombing.
Resources that provide medical response lessons from the 1995 Oklahoma City bombing include:
Goal 10: Reduce the psychological and economic impacts of IED incidents
Information on how communities responded to mental health issues in the wake of an IED attack includes:
66
Counter-IED Concepts, Common Goals, and Available Assistance
Promoting Mental Health Following Describes a method for screening and treating large numbers of affected
the London Bombings: A Screen and individuals following an IED attack. Information on how to recover from
Treat Approach the economic and business impacts in the wake of an IED attack includes:
U.S. Department of the Treasury Created a temporary Federal system for shared public and private
Terrorism Risk Insurance Act (TRIA) compensation for certain insured losses resulting from a certified act of
(signed into law in 2002) terror. Consider TRIA when planning for economic resilience.
67
Counter-IED Concepts, Common Goals, and Available Assistance
The MJIEDSP program assists communities with C-IED preparedness by developing and planning for specific scenarios and
identifying capability gaps. The program recommends corrective actions to address identified gaps and enhance IED
preparedness. For more information on the MJIEDSP program, visit https://www.dhs.gov/mjiedsp.
68
Counter-IED Concepts, Common Goals, and Available Assistance
69
Counter-IED Concepts, Common Goals, and Available Assistance
70
Counter-IED Concepts, Common Goals, and Available Assistance
IED Annex
The IED annex augments an EOP with specific information on operations before, during, and after an IED incident. This
section addresses overarching activities. The content in this section provides a solid foundation for planners. The
information in this section should not duplicate information contained in other sections of the base EOP.
Introductory Material
Introductory material can enhance accountability by the plan’s sponsoring authority: the local government, emergency
management agency, police department, or the private sector organization, business, or facility conducing the planning.
Typical introductory material includes:
• Cover Page. The cover page has the title of the annex. It should include a date and identify the government
jurisdiction, organization, or facility covered by the annex.
• Promulgation Document/Signature Page. This document/page is a signed statement formally recognizing and
adopting the annex. It gives both the authority and the responsibility to leadership to perform their tasks before,
during, and after an IED incident, and therefore signed by senior leadership.
• Approval and Implementation Page. The approval and implementation page introduces the annex, outlines its
applicability, and indicates that it supersedes all previous versions of the annex. It should include a delegation of
authority for specific modifications to the annex. It should outline any levels of delegation authority. It should also
include a date and signed by senior leadership.
• Record of Changes. Tracking of each update or change to the annex is crucial for version control. The record of
changes, usually in a table format, contains, at a minimum, a change number, the date of the change, the name of the
person who made the change, and a summary of the change.
• Record of Distribution. The record of distribution, usually in a table format, indicates the title and the name of the
person receiving the annex, the organization to which the recipient belongs, the date of delivery, and the number of
copies delivered. The record of distribution proves that tasked individuals and organizations have acknowledged their
receipt, review, and/or acceptance of the annex.
• Table of Contents. The table of contents is a logically ordered and clearly identified layout of the major sections and
subsections of the plan that will make finding information within the annex easier.
• Purpose. The purpose sets the foundation of the rest of the annex. The annex’s purpose is a general statement of
what the plan should do. A brief synopsis of the annex supports the purpose.
• Scope. The scope details the limits of the IED annex. It clarifies what the annex does and does not accomplish.
71
Counter-IED Concepts, Common Goals, and Available Assistance
• Situation Overview. The situation overview explains why the IED annex is necessary. The situation overview covers a
general discussion of:
• The threat posed by a IED on the jurisdiction or organization;
• The capabilities the jurisdiction or organization has to counter or respond to an IED;
• The legal, political, demographical, and physical conditions of the jurisdiction or organization that affect planning
for an IED; and
• Any planning assumptions the team made to continue the planning process.
Concept of Operations
This section explains in broad terms the decision maker’s intent with regard to countering IEDs. This section provides an
overall impression of how the jurisdiction or organization will prepare for, prevent, protect against, respond to, and
recover from an IED. Describe by phase:
72
Counter-IED Concepts, Common Goals, and Available Assistance
• Describe who has control of equipment, resources, and supplies needed to support the plan.
• Identify critical information requirements by operational phase and what (if any) decision points they are associated;
• Identify the type of information in the successful implementation of the activities that occur during the operational
phases; and
• Provide answers to the following questions for each of the identified types of information:
• What is the source of the information?
• Who analyzes and uses the information?
• How is the information collected and shared?
• What is the format for providing the information to those who will use it?
• When should the information be collected and shared?
Communications
This section describes the communication and coordination protocols used between organizations. The communication
section should:
• Describe the outline for delivering communications support and how the jurisdiction’s or organization’s
communications integrate into larger regional or national emergency operations framework.
• Identify and summarize separate interoperable communications plans.
• Common terms are critical when working with organizations from different entities or from across a region. It is useful
to agree upon and document common terms for clarity during planning and future operations
• Public Affairs Guidance should provide significant details on the jurisdiction’s or organization’s information processes
used during an incident. A coordinated joint approach will ensure timely, accurate, accessible, and consistent
messaging across multiple stakeholders, jurisdictions, and/or disciplines, and minimizes confusion and dispels rumors
quickly. A central clearinghouse will minimize duplication of effort, and will provide one location for public
information users to find the best, reliable, and authoritative information regarding the event or incident.
73
Counter-IED Concepts, Common Goals, and Available Assistance
• Assign responsibility for the overall planning and coordination to a specific position; and
• Provide for a regular cycle of training, evaluating, reviewing, and updating the plan.
74
Counter-IED Concepts, Common Goals, and Available Assistance
Overarching
Prevention
Protection
Mitigation
Response
75
Counter-IED Concepts, Common Goals, and Available Assistance
1. Does the annex identify the requirements of access and functional needs
populations?
Recovery
Overarching
Question 1: Does the annex address all five mission areas?
Countering IEDs requires actions across all five mission areas, and the annex to the EOP should include considerations for
Prevention, Protection, Mitigation, Response, and Recovery.
Successful countering IED efforts include educational/public awareness programs to inform the public of pre-incident
indicators and reporting mechanisms.
Once emergency planners and private sector leaders have completed the planning steps, they should review IED training
programs and materials to pinpoint any weaknesses or gaps. For example, planners should evaluate whether proper
training and resources are available not just for law enforcement, but also for public and private sector employees,
hazardous materials (HAZMAT) and search and rescue teams, and medical personnel to deal with unique elements of an
IED incident.
Every emergency plan should undergo validation. Exercising the plan is the best way to evaluate whether or not it will
work without actually having to respond to a disaster. An exercise program may include activities such as a seminar,
workshop, tabletop exercise, game, drill, functional exercise, or full-scale exercise. Exercises include the development of
after action reports to identify gaps and vulnerabilities.
Jurisdictions should involve senior officials; offices of emergency management; law enforcement; fire departments;
emergency medical services; area bomb squads; SWAT and HAZMAT teams; hospitals and public health departments;
designated incident commanders; local FBI field offices; local ATF field offices; local military facilities; the fusion center;
76
Counter-IED Concepts, Common Goals, and Available Assistance
regional planning stakeholders; public works and transportation departments (including public transit and utility
companies); private sector representatives from major industries and critical infrastructure facilities; and
nongovernmental and volunteer organizations that may be involved in responding to IED events or be the target of IED
events.
Jurisdictions have varying levels of expertise and resources. For instance, the capabilities of a small, rural area without a
bomb squad differ greatly from those of a large urban area with access to several bomb squads and other specialized
response teams. Bomb squad staffing, support, and resources may also vary greatly even in the Nation’s largest cities.
Jurisdictions without specialized resources still need to plan for IED events, determining what resources are available to
them, identifying any needed MOUs or MAAs, or specifying which resources outside the jurisdiction have agreements in
place, and assessing critical infrastructure.
Prevention
Communities should have policies in place detailing the procedures and safety measures for handling each type of
situation.
Bomb-makers must acquire explosive materials or materials to make explosives in order to construct devices. The plan
should address procedures for identifying precursor materials and reporting of suspicious activities related to said
materials.
Protection
Question 1: Does the annex identify critical infrastructure?
IED attacks are most likely to occur in places where they can cause injuries to a large number of people and severe
disruption to community functions. Each jurisdiction needs to identify and prioritize those systems and assets within its
community, whether physical or virtual, that it deems to be most critical to sustain the community and account for their
protection and restoration. Examples of critical infrastructure include schools, government facilities, power plants,
shopping centers, and airports and other transportation nodes.
Planners and private sector leaders should examine the current physical security of buildings, facilities, and critical assets.
Security gaps may identify the need to implement additional physical security measures.
Mitigation
Question 1: Does the annex provide for mitigation efforts?
Mitigation is the effort to reduce loss of life and property by lessening the impact of disasters. Risk analysis provides a
foundation for mitigation activities that reduce risk.
77
Counter-IED Concepts, Common Goals, and Available Assistance
Response
Question 1: Does the annex identify the requirements of access and functional needs populations?
Prior to an IED incident, planners should understand how an IED incident may affect a community’s access and functional
needs, such as a group or individual’s need to access homes or work sites in vicinity of the incident. Some jurisdictions
may need to consider multiple methods of public messaging to alert citizens and keep them informed. Planners should
consider how messaging will reach individuals with special needs or requiring accessible communications and those with
limited English proficiency. Additionally, planners need to consider individuals who may not be able to evacuate
independently due to age, injury, illness, or disability and may need assistance in moving to an evacuation point.
The annex should take into account threat-initiated actions, including time and resource constraints. Private sector/NGO
leaders, emergency managers, and first responders need to implement actions based upon the incident and the
standardized IED threat-rating system.
Pre-determined response policies enable responders to work together to decide on initial courses of action and protocols,
keeping in mind that response activities will be affected by ongoing law enforcement, EMS, or other emergency response
activities (e.g., securing and clearing the area for possible secondary explosive devices, preserving life and evidence).
Injuries resulting from blast and debris-related injuries may require rapid medical response. Planners should consider the
medical aspects of an IED incident, to include the assessment and triage of blast injuries and the distribution of casualties
to hospitals to avoid overwhelming a single facility.
Recovery
Question 1: Does the annex address debris removal?
In order for first and emergency responders to work effectively, debris removal operations may need to occur
immediately to allow vehicles and equipment access to the affected area. Additionally, debris removal operations may
face particular challenges because authorities treat IED incident sites as crime scenes.
Depending on the severity of the IED incident, recovery may be a long-term activity. Planners should consider potential
requirements for long-term assistance.
78
Counter-IED Concepts, Common Goals, and Available Assistance
Endnotes
1
(Country Reports on Terrorism 2016 2017)
2 (The White House: President Barack Obama 2013)
3
(The 2014 Quadrennial Homeland Security Review 2014)
4
(History, Famous Cases & Criminals n.d.)
5(Kennedy, The Real Meaning of Community Service: The Ecomonic and FInancial Impact of the Oklahoma City Bombing
2012)
6
(A Byte Out of History: Terror on Wall Street 2007)
7
(Civil Rights in the '60s Part 2: Retired Investigators Reflect on 16th Street Baptist Church Bombing 2013)
8 (Government Publishing Office 1999)
9 (A Byte Out of History: 1975 terrorism flashback: State Department Bombing 2004)
10
(FBI 100: The Unabomber 2008)
11
(Senate Judiciary Committee Subcommittee on Technology, Terrorism, and Government Information Hearing on
Foreign Terrorists in America: Five Years After the World Trade Center 1998)
12
(New York City Police Department 2009)
(1996 Summer Olympics bombing: Eric Rudolph to Plead Guilty to Serial Bombing Attacks in Atlanta and Birmingham;
13
79
Counter-IED Concepts, Common Goals, and Available Assistance
26
(FBI 100 The Unabomber 2008)
27
(Greenemeier, Self-Worth Shattering: A Single Bomb Blast Can Saddle Soliders with Debilitating Brain Trauma 2012)
28
FEMA 426 Manual, page 3–12 (2011)
29
(FEMA: National Preparedness Goal 2017)
30
(Validation of the Nationwide Suspicious Activity Reporting (SAR) Initiative: Identifying Suspicious Activities from the
Extremist Crime Database and the American Terrorism Study 2015)
31
(Walters 2015)
32
(Hartman 2013)
33
(Apuzzo and Goldman 2010)
34
(Robbins and Wyattthe 2010)
35
(If You See Something, Say Something n.d.)
36
(Federal Explosive Laws and Regulations, ATF 2012: ATF Federal Law and Regulations for Explosives 2012)
37
(AFT: Thefts of Explosives from State and Local Government Storage Facilities are Few but may be Underreported 2005)
38
(Al Qaeda Operative Convicted by Jury in One of the Most Serious Terrorist Threats to the United States Since 9/1 2012)
39
(U.S. Army Solder Charged with Attempting to Sell Stolen C-4 Explosive Material 2013)
40
(ATF Offers $5,000 Reward in Explosives Theft 2014)
41
(Playing With Fire: The Dangers of Improvised Explosives 2009)
42
California Penal Code, Section 18720
43
West Virginia Code §61-3E-3
44
(No Austrialians killed in embassy blast 2004)
45
(New York City Police Department 2009)
46
(Canine program celebrates 35 years of dedicated service; program continues dramatic expansion since 9/11 2007)
47
(Mail bomb defused at Chicago courthouse 1995)
48
TSA confiscated items reference.
49
(Sandia National Laboratory 1998)
50
(Sandia National Laboratory 1998)
51 (Mileka 2013)
52
(Goldstein 2014)
53
(Szerlag 2014)
54 TRIPwire OSINT data
55
(Title 18, U.S.C. 844(e) Penalties n.d.)
56
Florida 790-163
57
Alabama 13A-10-15
80
Counter-IED Concepts, Common Goals, and Available Assistance
58
Michigan 750.411s
59
(Painter 2012)
60
(Herridge 2013)
61
Norway and Mumbai: Statement By Lieutenant General Michael D. Barbero, Director Joint Improvised Explosive Device
Defeat Organization, United States Department of Defense, Before the United States House of Representatives
Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies,
July 12, 2012
62
(Clean up begins at bomb factory house site 2010)
62
(Times Square suspicious package contained only water bottles 2010)
63
(Kennedy, The Real Meaning of Community Service: The Ecomonic and FInancial Impact of the Oklahoma City Bombing
2012)
66 (Centers
for Disease Control and Prevention 2007)
65
(Study: 25% of war deaths medically preventable 2013)
66
(EMS.gov n.d.)
67
(Kennedy, The Real Meaning of Community Service: The Ecomonic and FInancial Impact of the Oklahoma City Bombing
2012)
68
(Pfefferbaum 1996)
69
(Bombs will cost UK tourism £300m 2005)
70
(Journal of Traumatic Stress 2008); (Brewin, et al. 2010)
71
(CPG 101, Developing and Maintaining Emergency Operations Plans, Version 2 2010)
72
(Comprehensive Preparedness Guide 201: Threat and Hazard Ideniication and risk Assessment Guide 2013)
73
(Developing and Maintaining Emergency Operations Plans 2010)
References
2013. The White House: President Barack Obama. February 26. Accessed 2017.
https://obamawhitehouse.archives.gov/blog/2013/02/26/policy-statement-countering-improvised-
explosive-devices-announced.
2005. "1996 Summer Olympics bombing: Eric Rudolph to Plead Guilty to Serial Bombing Attacks in Atlanta and
Birmingham; Will Receive Life Sentences." US Department of Justice Press Release. April 8. Accessed 2017.
2004. "A Byte Out of History: 1975 terrorism flashback: State Department Bombing." Federal Bureau of
Investigation. January 29. Accessed 2017.
https://archives.fbi.gov/archives/news/stories/2004/january/weather_012904.
2007. "A Byte Out of History: Terror on Wall Street." Federal Bureau of Investigation. September 13. Accessed 2017.
https://archives.fbi.gov/archives/news/stories/2007/september/wallstreet_091307.
81
Counter-IED Concepts, Common Goals, and Available Assistance
2005. "AFT: Thefts of Explosives from State and Local Government Storage Facilities are Few but may be
Underreported." U.S. Government Accountability Office. October 31. Accessed 2017.
https://www.gao.gov/products/GAO-06-92.
2012. "Al Qaeda Operative Convicted by Jury in One of the Most Serious Terrorist Threats to the United States Since
9/1." Federal Bureau of Investigation. May 1. Accessed 2017.
https://archives.fbi.gov/archives/newyork/press-releases/2012/al-qaeda-operative-convicted-by-jury-in-
one-of-the-most-serious-terrorist-threats-to-the-united-states-since-9-11.
Apuzzo, Matt, and Adam Goldman. 2010. "Officials: Muslim source turned in terror suspect." NBCNEWS.com.
October 28. Accessed 2017. http://www.nbcnews.com/id/39894024/from/toolbar.
2014. "ATF Offers $5,000 Reward in Explosives Theft." Bureau of Alcohol, Tobacco, Firearms and Explosives. April 4.
Accessed 2017. https://www.atf.gov/news/pr/atf-offers-5000-reward-explosives-theft.
2016. "Boston Marathon Bombings." United States Department of Justice. December 16. Accessed 2017.
https://www.justice.gov/usao-ma/boston-marathon-bombings.
Brewin, C.R., N. Fuchkan, Z. Hunley, M. Robertson, M. Thompson, P. Scragg, P. d"Ardenne, and A. and Ehlers. 2010.
"Outreach and screening following the 2005 London bombings: usage and outcomes." Psychological
Medicine. December. Accessed 2017. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2964043/.
2007. "Canine program celebrates 35 years of dedicated service; program continues dramatic expansion since 9/11."
Transportation Security Administration. March 9. Accessed 2017.
https://www.tsa.gov/news/releases/2007/03/09/canine-program-celebrates-35-years-dedicated-service-
program-continues.
2010. "Clean up begins at bomb factory house site." San Diego County News. December 14. Accessed 2017.
http://www.sandiegocountynews.com/clean-up-begins-at-bomb-factory-house-site/.
Comey, James B., interview by Senate Committee. 2013. Homeland Threats and the FBI’s Response (November 13).
https://www.fbi.gov/news/testimony/homeland-threats-and-the-fbis-response.
2013. "Comprehensive Preparedness Guide 201: Threat and Hazard Ideniication and risk Assessment Guide." Fema.
August 29. Accessed 2017. https://www.fema.gov/media-library/assets/documents/26335.
Counterterrorism Threat Assessment and Warning Unit National Security Division. 1996. "Terrorism in the United
States." Accessed 2017. https://www.fbi.gov/stats-services/publications/terror_96.pdf.
Counterterrorism Threat Assessment and Warning Unit. n.d. "Terrorism in the United States 1996." the Federal
Bureau of Investigation. Accessed 2017. https://www.fbi.gov/stats-services/publications/terror_96.pdf.
2017. "Country Reports on Terrorism 2016." Department of State. July. Accessed 2017.
https://www.state.gov/documents/organization/272488.pdf.
2010. "CPG 101, Developing and Maintaining Emergency Operations Plans, Version 2." Fema. November 1. Accessed
2017. https://www.fema.gov/media-library/assets/documents/25975.
82
Counter-IED Concepts, Common Goals, and Available Assistance
2010. "Developing and Maintaining Emergency Operations Plans." Fema. November. Accessed 2017.
https://www.fema.gov/pdf/about/divisions/npd/CPG_101_V2.pdf.
2008. "FBI 100 The Unabomber." The Federal Bureau of Investigation. April 24. Accessed 2017.
https://archives.fbi.gov/archives/news/stories/2008/april/unabomber_042408.
2008. "FBI 100: The Unabomber." Federal Bureau of Investigation. April 24. Accessed 2017.
https://archives.fbi.gov/archives/news/stories/2008/april/unabomber_042408.
2008. "FBI 100: The Unabomber." Federal Bureau of Investigation. April 24. Accessed 2017.
https://archives.fbi.gov/archives/news/stories/2008/april/unabomber_042408.
Federal Emergency Management Agency. 2011. In FEMA 426, Reference Manual to Mitigate Potential Terrorist
Attacks Against Buildings, 3-12.
2012. "Federal Explosive Laws and Regulations, ATF 2012: ATF Federal Law and Regulations for Explosives." U.S.
Department of Justice. Accessed 2017. https://www.atf.gov/explosives/docs/publication-federal-explosives-
laws-and-regulations-atf-p-54007/download.
Goldstein, Sasha. 2014. N.C. teen caught after calling in 20 bomb threats to schools, hospital over 40 days: police.
April 8. Accessed 2017. http://www.nydailynews.com/news/crime/n-teen-caught-calling-20-bomb-threats-
police-article-1.1750158.
Government Publishing Office. 1999. "H. Res. 162 Introduced in the House." Government Publishing Office. May 6.
Accessed 2017. http://www.gpo.gov/fdsys/pkg/BILLS-106hres162ih/html/BILLS-106hres162ih.htm.
Greenemeier, Larry. 2012. "Self-Worth Shattering: A Single Bomb Blast Can Saddle Soldiers with Debilitating Brain
Trauma." Scientific American. May 16. Accessed 2017. https://www.scientificamerican.com/article/soldier-
blast-chronic-traumatic-encephalopathy-cte/.
—. 2012. "Self-Worth Shattering: A Single Bomb Blast Can Saddle Soliders with Debilitating Brain Trauma." Scientific
American. May 16. Accessed 2017. https://www.scientificamerican.com/article/soldier-blast-chronic-
traumatic-encephalopathy-cte/.
Hartman, Ben. 2013. "Passengers Escape Bat Yam Bus Shortly Before Bomb Explodes." The Jerusalem Post.
December 22. Accessed 2017. https://www.jpost.com/Defense/Suspicious-object-detonated-by-police-in-
Bat-Yam-causes-explosion-335797.
Herridge, Catherine. 2013. "Harvard University says all buildings clear after unconfirmed reports of explosives." Fox
News U.S. December 16. Accessed 2017. http://www.foxnews.com/us/2013/12/16/harvard-university-
evacuates-buildings-over-reports-explosives.html.
83
Counter-IED Concepts, Common Goals, and Available Assistance
n.d. "History, Famous Cases & Criminals." Federal Bureau of Investigation. https://www.fbi.gov/history/famous-
cases/oklahoma-city-bombing.
2013. "Homeland Threats and the FBI's Response." FBI News. November 14. Accessed 2017.
https://www.fbi.gov/news/testimony/homeland-threats-and-the-fbis-response.
Howard Kunreuther, Erwann Michael-Kerjan. 2014. "TRIA after 2014." Wharton University of Pennsylvania. July 30.
Accessed 2017. http://opim.wharton.upenn.edu/risk/library/TRIA-after-2014_full-
report_WhartonRiskCenter.pdf.
Kennedy, Ann. 2012. "The Real Meaning of Community Service: The Ecomonic and FInancial Impact of the Oklahoma
City Bombing." Oklahoma City National Memorial and Museum. Accessed 2017.
https://oklahomacitynationalmemorial.org/wp-content/uploads/2015/03/okcnm-economic-and-financial-
impact-ocee.pdf.
—. 2012. "The Real Meaning of Community Service: The Econmoic and Financial Impact of the Oklahoma City
Bombing." Oklahoma City National Memorial and Museam. Accessed 2017.
https://oklahomacitynationalmemorial.org/wp-content/uploads/2015/03/okcnm-economic-and-financial-
impact-ocee.pdf.
Kunreuther, Howard, Erwann Michel-Kerjan, Christopher Lewis, Robert Muir-Woor, and Gordon Woo. 2014. "TRIA
After 2014: Examining Risk Sharing Under Current and Alternate Designs." Wharton University of
Pennsylvania. July 30. Accessed 2017. http://opim.wharton.upenn.edu/risk/library/TRIA-after-2014_full-
report_WhartonRiskCenter.pdf.
1995. "Mail bomb defused at Chicago courthouse." Cable News Network (CNN). October 31. Accessed 2017.
http://www.cnn.com/US/9510/chicago_bomb/.
Majority Staff of the Committee on Homeland Security. 2014. "The Road to Boston: Counterterrorism Challenges
and Lessons from the Marathon Bombings." House Homeland Security Committee Report. March. Accessed
2017.
Murphy, Joseph G. 2014. "Study of Certain Insurance Claim Costs Resulting From The Events OccuringBetween April
15-19, 2014 Associated with the Bombings at the 2013 Boston Marathon." Division of Insurance. March.
Accessed 2017. http://www.mass.gov/ocabr/docs/doi/exam-of-response-to-boston-marathon-
bombings.pdf.
Murphy, Joseph G. 2014. "Study of Certain Insurance Claim Costs Resulting from The Events Occuring Between April
15-19, 2013 Associated with the Bombing at The 2013 Boston Marathon." Masachusetts Division of
Insurance. March. Accessed 2017. http://www.mass.gov/ocabr/docs/doi/exam-of-response-to-boston-
marathon-bombings.pdf.
84
Counter-IED Concepts, Common Goals, and Available Assistance
New York City Police Department. 2009. "Engineering Security, Protective Design for High Risk Building." Accessed
2017. https://www1.nyc.gov/assets/nypd/downloads/pdf/nypd_engineeringsecurity.pdf.
—. n.d. "The Threat to Buildings from Explosive Devices." New York City Police Department Downloads. Accessed
2017.
http://www.nyc.gov/html/nypd/downloads/pdf/counterterrorism/engineeringsecurity_010_threat_to_buil
dings_from_exp_dev.pdf.
—. n.d. "The Threat to Buildings From Explosive Devices." The New York City Police Department. Accessed 2017.
http://www.nyc.gov/html/nypd/downloads/pdf/counterterrorism/engineeringsecurity_010_threat_to_buil
dings_from_exp_dev.pdf.
2004. "No Austrialians killed in embassy blast." The Age. September 9. Accessed 2017.
https://www.theage.com.au/articles/2004/09/09/1094530742426.html.
Painter, Kristen L. 2012. "Small blast disables trip wire to 30 IEDs inside Holmes' apartment." The Denver Post. July
21. Accessed 2017. https://www.denverpost.com/2012/07/21/small-blast-disables-trip-wire-to-30-ieds-
inside-holmes-apartment/.
Pfefferbaum, Batty. 1996. American Academy of Experts in Traumatic Stress. Accessed 2017.
http://www.aaets.org/article5.htm.
2009. "Playing With Fire: The Dangers of Improvised Explosives." Federal Bureau of Investigation. December 10.
Accessed 2017. https://archives.fbi.gov/archives/news/stories/2009/december/dangers-of-improvised-
explosives.
Robbins, Liz, and Edward Wyattthe. 2010. "Bomb plot foiled at holiday event in Oregon." Pittsburgh Post-Gazette.
November 28. Accessed 2017. http://www.post-gazette.com/nation/2010/11/28/Bomb-plot-foiled-at-
holiday-event-in-Oregon/stories/201011280213.
Sandia National Laboratory. 1998. "Survey of Commercially Available Explosives Detection Technologies and
Equipment." Survey.
1998. "Senate Judiciary Committee Subcommittee on Technology, Terrorism, and Government Information Hearing
on Foreign Terrorists in America: Five Years After the World Trade Center." Federation of American
Scientists. February 24. Accessed 2017. https://fas.org/irp/congress/1998_hr/s980224c.htm.
2013. "Study: 25% of war deaths medically preventable." Military Times. March 29. Accessed 2017.
https://www.militarytimes.com/2013/03/29/study-25-of-war-deaths-medically-preventable/.
Szerlag, Jon. 2014. "Bomb threat forced evacuation of nearly 900 employees at manufacturing west of Jackson." M
Live. April 1. Accessed 2017.
https://www.mlive.com/news/jackson/index.ssf/2014/04/bomb_threat_forced_evacuation.html.
2014. "The 2014 Quadrennial Homeland Security Review." Department of Homeland Security. Accessed 2017.
http://www.dhs.gov/sites/default/files/publications/2014-qhsr-final-508.pdf.
2010. "Times Square suspicious package contained only water bottled." Washington Post. Washigtonpost.com, May
7.
85
Counter-IED Concepts, Common Goals, and Available Assistance
2010. "Times Square suspicious package contained only water bottles." Washington Post. May 7. Accessed 2017.
http://www.washingtonpost.com/wp-dyn/content/article/2010/05/07/AR2010050703398.html.
n.d. "Title 18, U.S.C. 844(e) Penalties." Government Printing Office. Accessed 2017.
https://www.gpo.gov/fdsys/pkg/USCODE-2011-title18/pdf/USCODE-2011-title18-partI-chap40-sec844.pdf.
2013. "U.S. Army Solder Charged with Attempting to Sell Stolen C-4 Explosive Material." Federal Bureau of
Investivation. December 19. Accessed 2017. https://archives.fbi.gov/archives/sanantonio/press-
releases/2013/u.s.-army-soldier-charged-with-attempting-to-sell-stolen-c-4-explosive-material.
U.S. Department of Justice. 2010. "Umar Farouk Abdulmutallab Indicted for Atempted Bombing of Flight 253 on
Christmas Day." Federal Bureau of Investigation. January 06. Accessed 2017.
https://archives.fbi.gov/archives/detroit/press-releases/2010/de010610.htm.
2010. "Umar Farouk Abdulmutallab Indicted for Attempting Bombign of Flight 253 on Christmas Day." Federal
Bureau of Investigation. January 06. Accessed 2017. https://www.justice.gov/usao-ma/boston-marathon-
bombings.
2015. "Validation of the Nationwide Suspicious Activity Reporting (SAR) Initiative: Identifying Suspicious Activities
from the Extremist Crime Database and the American Terrorism Study." national Consortium for the Study of
Terrorism and Responses to Terrorism. February. Accessed 2017.
https://www.start.umd.edu/pubs/START_ValidationofNationwideSARInitiative_Feb2015.pdf.
Walters, Riley. 2015. "The 75th Terrorist Plot on the United States." The Heritage Foundation. December 8. Accessed
2017. https://www.heritage.org/terrorism/report/the-75th-terrorist-plot-the-united-states.
Wilson, Clay. 2006. "Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures." CRS
Report for Congress. September 25. Accessed 2017. http://www.coherentbabble.com/CRS/CRS-RS2230.pdf.
86