TOP-SECRET – FBI Bomb Data Center Bulletin: The Bomb Threat Challenge


FBI Bomb Data Center General Information Bulletin 2012-1

  • 13 pages
  • September 2012


As we enter an era in which the administration of law enforcement becomes more complicated, greater challenges are thrust not only upon police officials, but also upon the community at large. The bomb threat is one such challenge. The bomber has a distinct advantage over other criminals because he can pick his time and place from afar, and use the bomb threat as a weapon to achieve his criminal objectives. This bulletin has been prepared in order to provide law enforcement and public safety agencies with a working base from which to establish their own bomb threat response capability; and to enable these same agencies, when called upon by potential bomb or bomb threat targets in the business community, to offer assistance in developing guidelines for a bomb threat response plan.

In developing a bomb threat response plan, there are four general areas of consideration: (1) Planning and Preparation, (2) Receiving a Threat, (3) Evacuation, and (4) Search. Information presented under each of these four topics will assist in the preparation of an effective bomb threat plan. Suggested methods described in this bulletin will apply in most cases; however, specific requirements will be unique for each facility and will need to be worked out on an individual basis. Once the function of the organization, size of the facility, number of personnel, location and relation to other establishments, and available resources are evaluated; a comprehensive bomb threat plan can be formulated.

Words used in conjunction with this phase include organization, liaison, coordination, and control. Only with a properly organized plan will those affected by a bomb threat know how, when, and in what order to proceed.
Liaison should be maintained between appropriate public safety agencies and facilities likely to be subject to bomb threats or bombings; and also between public safety agencies and military Explosive Ordnance Disposal (EOD) teams charged with responding to bombing incidents.

Through such contact, it will be possible to determine what technical and training services might be needed by potential bomb threat targets. Note that while some public safety agencies may provide considerable aid in bomb threat situations, most public and private facilities must plan and carryout the major portion of the plan, including internal control and decision making. Both liaison and coordination are factors which a bomb threat plan must take into consideration, especially when neighboring establishments or businesses may share the same building. Proper coordination will assure smooth handling of the bomb threat with the least amount of inconvenience to all concerned. Control is especially important during evacuation and search efforts, and effective security will lessen the risk of an actual explosive device ever being planted.


In preparation for the eventuality of a telephone bomb threat, all personnel who handle incoming calls to a potential target facility should be supplied with a bomb threat checklist as shown in Figure 1. When a bomb threat is received, it may be advisable for the person receiving the call to give a prearranged signal. For instance, the signal can be as simple as holding up a red card. This would allow monitoring of the call by more than one person, and it would enable someone else to attempt to record and/or trace the telephone call.

Tape recording the call can reduce the chance or error in recording information provided in the bomb threat. It may serve as evidence valuable to the investigation and assist in evaluating the authenticity of the bomb threat.
Since local jurisdictions may have statutes restricting this sort of recording, the proper officials should be contacted prior to installation and use of such equipment. If a continuous recording setup is not deemed economically practical, a system which could be activated upon receipt of a threat call might be considered feasible. A local telephone company representative can provide information regarding specific services available. Regardless of whether the bomb threat call is to be recorded and/or monitored, the person handling it should remain calm and concentrate on the exact wording of the message, and any other details which could prove valuable in evaluating the threat.

In those instances when a bomb threat has been electronically recorded, voice identification techniques may be employed. While the courts and the scientific community are divided over the reliability of “voice printing” as evidence, it can serve as an investigative tool. Upon request, the FBI will perform audio examinations, for the purpose of investigative leads only, for any law enforcement agency. Departments interested in this service may contact their local FBI Field Office for further assistance.

Although comprising a smaller percentage of bomb threats, the written threat must be evaluated as carefully as one received over the telephone or the Internet. Written bomb threats often provide excellent document-type evidence. Once a written threat is recognized, further handling should be avoided in order to preserve fingerprints, handwriting, typewriting, postmarks, and other markings for appropriate forensic examination. This may be accomplished by immediately placing each item (i.e., threat documents, mail envelope, etc.) in separate protective see through covers, allowing further review of the pertinent information without needless handling. In order to effectively trace such a bomb threat and identify its writer, it is imperative to save all evidentiary items connected with the threat.

Regardless of how the bomb threat is received (e.g., e-mail, telephone, written), the subsequent investigation is potentially an involved and complex one requiring a substantial degree of investigative competency in order to bring the case to a successful conclusion. Cognizant of this, and of the fact that useful evidence regarding the threat seldom proceeds past the bomb threat stage, the efficient accumulation and preservation of evidence cannot be over stressed.

After a bomb threat has been received, the next step is to immediately notify the people responsible for carrying out the bomb threat response plan. During the planning phase, it is important to prepare a list setting forth those individuals and agencies to be notified in the event of a bomb threat. In addition to those people mentioned previously, the police department, fire department, FBI and other Federal public assistance agencies, medical facilities, neighboring businesses, employee union representatives, and local utility companies are among those whose emergency contact information should be included on such a list.

The bomb threat must now be evaluated for its potential authenticity. Factors involved in such an evaluation are formidable, and any subsequent decision is often based on little reliable information. During this decision making process, until proven otherwise, each threat should be treated as though it involved an actual explosive device; even though bomb threats in which an IED is present comprise a small percentage.

Video – Confirmed – Ukraine ex-policeman jailed for murder of journalist Gongadze
 A former Ukrainian police officer has been jailed for life for the murder of a campaigning journalist Georgiy Gongadze in 2000.

General Oleksiy Pukach implied in court that others, including ex-President Leonid Kuchma, were equally guilty.

A case against the former leader was dismissed two years ago.

Gongadze wrote about political corruption and crime.

The discovery of the 31-year-old’s headless body sparked a wave of public anger which eventually led to the “Orange Revolution”.

His widow’s lawyer said she intended to appeal, arguing that the court has failed to determine the motives for the killing.

Find us on:

SECRET – Iranian Hackers Target US-UK Joint Operations

Iranian Hackers Target US-UK Joint Operations


A sends:

Source :

An observer we trust has let us know that in an underground Iranian hacker and reverse engineering forum, one article shows some guys have been up to no good against US-UK Joint Operations and hacked into the Waves as well as the C4I system.

Ironically, there is a link and quote from [link added by Cryptome] regarding IRGC’s drones flying over US carriers and put both conclusions together in a way that reader, indirectly, understands that military SATCOMS and JTRS terrestrial (say military VHF) are not safe for US-UK and to our understanding they could easily use these capabilities to grab scores from catastrophic events. The fact Iran is still talking to 5+1 in addition to these efforts, to the best of our analysis, are Iranian Deterrence.

PI-Restricted U.S. Army Training for Reconnaissance Troop and Below in Urban Operations


TC 90-5 Training for Reconnaissance Troop and Below in Urban Operations

  • 116 pages
  • Distribution authorized to U.S. government agencies and their contractors only to protect technical or operational information that is for official government use.
  • February 2010
  • 5.09 MB


Because the operational environment (OE) requires Army forces to operate in urban areas, commanders must have accurate information on the complex human elements, infrastructure, and physical terrain that make up the urban environment. The limits on imagery and electronic reconnaissance and surveillance (R&S) capabilities place a premium on human-based visual reconnaissance. Reconnaissance troops and platoons must be trained to gather and analyze the necessary information and provide it to their commanders and higher headquarters. This chapter discusses definitions, training strategy, prerequisite training, individual task training, and collective task training designed to prepare reconnaissance units at troop level and below for operations in urban terrain.


1-25. The following sample tasks are listed in TC 7-98-1:

  • Conduct cordon and search operations, including site exploitation (SE).
  • Conduct roadblock/checkpoint operations.
  • Conduct civil disturbance operations.
  • Secure civilians during operations.
  • Process detainees and enemy prisoners of war (EPW).

1-26. See FM 3-06.11 for a review of additional tasks related to stability operations and civil support operations. These include, but are not limited to, the following:

  • Conduct area security, including presence patrols.
  • Conduct convoy escort.
  • Conduct route clearance operations.


3-60. The likelihood of civil disturbances during urban operations is high. Handled poorly, the reaction to a civil disturbance can quickly escalate out of control, with potential long-term negative effects for mission accomplishment. Conversely, a well-handled situation will lead to an enhanced view of the reconnaissance platoon’s discipline and professionalism and potentially could result in fewer such incidents in the future.


3-61. Table 3-9 lists the supporting tasks that must be accomplished as part of controlling civilian movement and disturbances.


3-62. A possible TTP description for this task is covered by procedures known by the acronym of IDAM:

  • Isolate.
  • Dominate.
  • Maintain common situational awareness (SA).
  • Employ multidimensional/multiecheloned actions.

3-63. The first step entails isolating, in time and space, the trouble spot from outside influence or interaction. Unit tactical operation centers in the theater must develop TTP that “isolate” riots or demonstrations to keep them from becoming larger and potentially more violent. The idea is to close access into and out of the demonstration location (Figure 3-13). Once access is closed, rioters tend to tire within hours, and the demonstration dies down, eventually resulting in a peaceful conclusion. Figure 3-14 provides a technique for positioning several tiers of checkpoints and tactical control points, given the mission to isolate a riot. Controlling major road networks into and out of the demonstration area also serves to enhance trafficability if the riot escalates.

3-64. Units dominate the situation through force presence and control of information resources. They can demonstrate an overwhelming show of force at command posts (CP) and dispatch helicopters to conduct overflights above demonstrations and massing civilian mobs. In addition, use of appropriate air assets can give commanders a bird’s-eye view of events, providing real-time updates on the situation and ensuring that units know the “ground truth” at all times. This knowledge gives commanders a decisive advantage both in negotiations with potentially hostile elements and in tactical maneuvers.

3-65. The following factors apply for the platoon in attempting to dominate the situation:

  • Although units can dominate a civil disturbance using nonlethal munitions, it is important to consider force protection issues. In addition, if aviation assets are available, reconnaissance or utility helicopters can provide a show of force. Attack helicopters should be used in anoverwatch or reserve position.
  • Forces may need to detain group leaders or instigators to dominate a civil disturbance. An instigator is identified as a person who is “prodding” others to commit disruptive acts or who is orchestrating the group. Often, an instigator carries a bullhorn or hand-held radio.
  • The smallest unit that can employ the “snatch-and-grab” technique is a platoon. Before a platoon deploys to quell a riot, identify a four-person snatch-and-grab team, two to secure the individual and two to provide security. It is imperative that each member of the snatch-and-grab team wears the Kevlar helmet with face shield and flak vest, but the team should not bring weapons or load-bearing equipment with them into the crowd. See Figure 3-15 for an illustration of the snatch-and-grab team.
  • In accordance with Executive Order 11850, the President of the United States must approve the use of the riot control agency (RCA). The U.S. policy is to employ RCAs in limited circumstances, though never as a method of warfare. Commanders should be conscious that use of RCAs might pose a risk of escalation or public panic if it creates the erroneous perception that a chemical weapon is being used.
  • Another element that is crucial for successful civil disturbance operations is the use of combat camera personnel. Document events to hold personnel, factions, and gangs or groups accountable. To ensure that the right message is being presented, control the information environment through the synchronized efforts of information engagement assets, with support from the staff judge advocate (SJA) and civil affairs (CA) offices.

3-66. Commanders and leaders maintain SA through timely, accurate, and complete multisource reporting. They can receive reports from a broad spectrum of sources. Unit CPs, air assets, and close liaison with HN police, NGOs, PVOs, and other civilian agencies all contribute to an accurate assessment of any situation. In addition, UAS, such as the Predator and Pioneer, are effective in observing large sectors of an AO. Analyze the reports produced and relay them to each unit involved in the operation.

3-67. As part of the IDAM procedures, multidimensional/multiechelon actions may entail the following considerations:

  • Policy and legal considerations.
  • ROE.
  • Standards of conduct.
  • High visibility of civil disturbance operations with the media, including leaders who must interact with the media.
  • Crowd dynamics.
  • Communication skills for leaders who must manage aggressive and violent behavior of individuals and crowds.
  • Use of electronic warfare to monitor and control belligerent communications.
  • Tactics.
  • Lethal overwatch.
  • Search and seizure techniques.
  • Apprehension and detention.
  • Neutralization of special threats.
  • Recovery team tactics.
  • Cordon operations to isolate potential areas of disturbance.


5-33. The smallest organizational PSYOP element is the tactical PSYOP team (TPT), consisting of three Soldiers. In high-intensity conflict, the TPT normally provides PSYOP support to a squadron. During counterinsurgency (COIN) and stability operations, planning and execution are primarily conducted at the troop level because the troop is the element that most often directly engages the local government, populace, and adversary groups. Operating in the troop AO allows TPTs to develop rapport with the target audience. This rapport is critical to the accomplishment of the troop’s mission. The TPT chief, usually a SSG or SGT, is the PSYOP planner for the troop commander. He also coordinates with the tactical PSYOP detachment (TPD) at the squadron level for additional support to meet the troop commander’s requirements. PSYOP planning considerations include the following:

  • The most effective methods for increasing acceptance of friendly forces in occupied territory.
  • The most effective methods of undermining the will of the threat to resist.
  • The impact of PSYOP on the civilian population, friendly government, and law enforcement agencies in the area.
  • Clearly identified, specific PSYOP target group(s).
  • Undermining the credibility of threat leadership and whether or not it will bring about the desired behavioral change.