Professional Documents
Culture Documents
- -- ---.,..---- --
. .~-
'--'- -
'6 -
1;:- ". .',
. . '
".~,
.......... "
. ..
:'. '
------/
~-"-;
,\=1
---~-------------------------------------------~--------------
For sale by the Superintendent of Documents, U.S. Government Printing Office
Washington, D.C. 20402 - Price 95 cents
Stock No. 008-020-00613-1
HEADQUARTERS
TRAINING CI RCULAR DEPARTMENT OF THE ARMY
Washington, D.C. 29 Aug 1975
NO. 19-5
BOMB THREATS
Page
PREFACE iv
CHAPTER L INTRODUCTION
Bomb I-I
Bombing I-I
Bomb Threat I-I
Bomb Incident 1-1
Bomb-Incident-Preventive Measures I-I
Bomb-Threat Plan I-I
General 2-1
Physical Security Measures 2-1
PREPLANNING CONSIDERATIONS 2-2
. 00
Ar r\ 5 '\976
'" This training circular supercedes ASUBJSCD 19-32, dated 23 April 1973.
Te 19-5
ii
Te 19-5
GENERAL B·I
SCOPE OF THE PROBLEM B·I
HISTORICAL PERSPECTIVE B·2
MOTIVES OF BOMB INCIDENTS B·g
Nonpolitical B·3
Political B·g
Summary of Bomb Incidents by Motive B·4
Summary of Bomb Incidents by Target B·4
Psychological Aspects B·4
PREREQUISITES FOR BOMBING B·4
Know-How B·4
Access to Explosives B·5
Access to Targets B·5
SUMMARY B·5
iii
TC 19-5
iv
TC 19-5
The purpose of this training circular (TC) is to litilmil_ A bomb is a device capable of
provide doctrine and guidance for training military producing damage to material and injury or death to
personnel who may be called upon to plan for or personnel when detonated or jgnited. Bombs are
respond to a bomb threat. TIlis TC includes- classified as explosive or incendiary. An explosive
bomb causes damage by fragmentation, heat, and
blast wave. The heat produced often causes a
An explanation of the bomb-incident prob- secondary incendiary effect. An incendiary bomb
lem. generates fire-producing heat without a substantial
explosion when ignited.
A discussion of preventive measures to
include physical security measures. hlmnhh]I!.. A bombing occurs when an
explosive bomb de.tonates, or an incendiary bomb
Preplanning cOllsiderations.
ignites.
Guidance for preparing the bomb-threat
plan. Bomb Thr!j:lt. A bomb threat is a message
Information about the threat, how it is delivered by any means, warning or claiming the
received, and necessary reactions. presence of one or more bombs. A bomb threat may,
or may not, specify the location of a bomb; it may,
A description of search and evacuation or may not, include the time for detonation/ignition;
techniques used in locating a bombing and it may, or may not, contain an ultimatum related
device. to the detonation/ignition or concealment of the
bomb.
This TC does not discuss bomb disposal or incident Bomb Incident Any occurrence involving
investigation. the detonation/ignition of a bomb. the discovery of a
Bomb disposal is the responsibility of supporting bomb, or the execution of a bomb threat.
Explosive Ordnance Disposal Detachments. . Bomb.lnddent-Prcventivi;' Me:.a'1ures. Those
Incident investigation is the responsibility of the steps taken to minimize the productign and
Criminal Investigation Division (CID); however, FM placement of bombs and to reduce the disruptive
19-20, Military Police Criminal Investigations, is a effect of bomb threats.
guide for directing, supervising, or conducting Bomb-Threat Plan. A comprehensive plan
military police investigations. which delineates responsibilities and specifIc actions
to be taken when a bomb threat or bombing occurs.
1·1
TC 19-5
'·2
TC 19-5
In the past decade, militant groups, "super" patriots, and will probably continue to plague military and
criminal elements, and scores of others have civil facilities and organizations. (For figures com-
manufactured and used explosives and incendiary piled by the National Bomb Center, see figure B-l.)
devices in their rebellion against "the establishment." For this reason, there is a need for practical
Bomb-incident data reflect that bomb incidents pose knowledge to cope with the violent activities of the
a continuing and ever-present threat to civilian and people who represent segments of unrest in our
military personnel, property, and operations. Lives society. This need has been partially met by various
have been lost, injuries sustained, and millions of law enforcement agencies; yet, it must be remem-
dollars in property damages have resulted from bered that the protection of life and property is a
bombings in the United Stat!;~. Bombing incidents responsibility that cannot be delegated solely to Jaw
have not decreased significantly in the past few years enforcement.
PREVENTIVEMEASURES---------------------------------------------
a. General. There are myriad motives and established, the opportunity to obtain explosives and
teclmiques for bombing; therefore, preventive mea- emplace bombs will be reduced. In addition, an
sures must be specific enough to provIde useful effective bomb-threat plan and a well-rehearsed
guidance in a crisis and, yet, broad enough in scope to procedur(> for handling bomb threats and incidents
cover a variety of contingency situations. The person will reduce the chances of a bomb being successfully
responsible for designing an effective bomb-threat detonated. (Appendix B, para B-5, contains more
plan. must carefully consider the three prerequisites detailed information on prereqUIsites for bombing.)
for a successful bombing- b. Physical Security Measures. PM 19·30 pre-
sents a comprehensive discussion of physical security
:,1hHH~· tu ~rM~~L(~ t~n~J dt·l~Oll;~h.~ ~Hi measures, which may be implemented at the
d~\'ncl~ . discretion of the commander, to limit the vulnerabili-
ty of his organization or facility to a bomb threat.
Such measures include but are not limited to;
,Ippun:lmity to "'ii/plan- 'tIne 11l"dcl' ;it ¥lw
d~?l';~n?1il ~orgef.
having a workable personnel identificatiorl
and control system.
Particular attention must be given to the third having a package and material control
prerequisite, because this is the one area in which a :;ystem.
law enforcing organization has the greatest opportuni- maintaining stringent control of locks and
ty to deter a bomb-incident. If adequate preventive
keys.
measures and phy,sical security precautions are
2-1
TC 19-5
having an adequate perimeter barrier and eliminating places in which to hide a bomb
lighting system. (accumulated trash. discarded materials) by
good housekeeping habits.
locking doors to boiler rooms, basements,
and utility closets when not in use. training employees to report strange people
or packages.
PREPLANNING C O N S I D E R A T I O N S - - - - - - - - - - - - - - - - - - - -
2-2
TC 19-5
dent preventive measures to the extent thaI b. Evacuation. Moving a large number of
bomb-threat plans minimize damage and disruption people under emergency conditions is a hazardous
and aid in apprehending offenders. As a minimum the wldertaking unless ABSOLUTE control is main·
bomb-threat plan should provide guidance for the tained. Thus, particular attention should be given to
activities listed below: planning evacuation procedures. At first thOUght,
immediate and total evacuation would seem to be the
Control of the operation most appropriate response to any bomb threat;
Evacuation however, there are significant economic and safety
factors that may weigh against the evacuation. Even
Search
where evacuation is possible and desirable, the
Finding the bomb or suspected bomb process itself may tlot be as simple as it might appear.
Disposal Chapter 4 contains detailed evacuation procedures.
c. Search.
Detonation and damage control
Control of publicity (1) Who searches? TIle following is quoted
from Headquarters, CONA',C letter, 18 June 1971,
After-action report subject: Search for Explosive Devices: "Except for
the most unusual Circumstances, EOD and military
police will NOT be used to search for reported
In setting up each of these operations, the individual
explosive devices in barracks, community areas,
or group responsible for a particular task should be
buildings, and offices. Rather, such searches ,vilJ be
predesignated, notified, and well-trained nnd reo
conducted by designated individuals famIliar with the
hearsed in actions to be taken, The person preparing
area and its contents. If an unusual item is found,
the bomb·threat plan should ask and answer EOD is to neutralize and evacuate the device for
questions pertinent to each area of operations. disposal. Military police are to be employed around
the threatened area to cont.rol traffic and provide
other regulatory services." Therefore, in the Army,
a. Control of the Operation. the occupants of the building will perform the search
in conjunction with designated search teams.
(1) Who will be in charge of the incident? In
the Army this is a command decision. The (2) What will be searched? Occupants \vill
commander or his predesignated representative is in search their own work areas and rooms. In addition
charge. The representative should be deSignated as the to this, search teams should be assigned to ·s.~arch
Bomb Scene Officer, an.d should have all available public meas, rest rooms, and closets. Keys should be
training in this subject area. available to searchers so that every area can be
searched. A complete search must be malie, since one
(2) Where will the command center be or more bombs could exist.
located? To whom ancl how will the tlll'eat be
reported? This should be decided by each unit so that (3) Wizen is tlte search terminated? After
personnel will know where to report and how to the entire facility has been searched. Remember, thilt
locate the commander or Bomb Scene Officer. the discovery of one device should not necessarily
cause the search to be stopped; there could be more
(3) How wt1l critfcal clecisions be made? than one bomb. This was a tactic frequently used ill
Decisions should be made by the commander or his Saigon. (,hapter 4 contains detailed search techniques
Bomb Scene Officer. and proceduref.
(4) Wllo wUl mall the control cellter? d. Action Required When a Bomb or Suspected
Commander or Bomb Scene Officer, communications Bomb is Found.
personnel, Engineer, or PlO. (1) Any suspected incendiary device or
(5) What reporting system wl1l be in effect bomb should not be touched or handled in any way
to i1lsure that tht: information is promptly trails· by the search unit. The person in charge should
l1utted to the comma1ld center? What alternate contact the military police who will then notify the
commllnicatio11 system will be employed during the nearest military Explosive Ordnance Disposal (EOD)
iltcident? Organizations or individual(s) responsible Detachment.
for these activities must be designated in the (2) EOn personnel will attempt "render
bomb·threat plan. (Radios should not be used sa.feH procedures in accorda.nce with AR 75·15,
because of the possibility of detonating the charge.) Responsibilities a.nd Procedures for EOn.
(6) Who will do the 11ecessary coordinating (3) In the case of an actual bombing, all
with other public al1d private agencies? This person personnel are warned not to tamper with the debris.
should be deSignated and he should have a complete It will be searched by government authorities for
list of names and their telephone numbers. clues and all foreign evidence will be removed for
2-3
TC 19-5
2-4
Ii.
1·
THETHREAT---------------------------------------------------
A bomb threat may be received by any of the enough to trace the call and to obtain further
following ways: information.
(2.) Record, in writing or by recorder, the
exact words of the callet. Attempt to ascertain the
location of the bomb, the type of device. what it
~ t· "~ "1"
looks like, and the expected time of detonation.
3·1,
EVALUATING THE THREAT---------------------------------------------
ACTIVATING THE P L A N - - - - - - - - - - - - - - - - - - - - - - - - -
THE AFTER·ACTION R E P O R T - - - - - - - - - - - - - - - - - - - - -
3-2
Te 19-5
~f?:A1RICC~ T~C~f(~n@u~~
t.~!{)
~~A~~Alin©N ~~©~~©~~~$
SEARCH TECHNIQUES
GENERAL------------------------_______________________________
a. There are many factors to consider before b. The extent of any search will be determined
ordering a search, if you are the commander or Bomb by the number of people available to search and the
Scene Officer. coml11a1tder's evaluation of the threat. Remember,
Will the sr.arch be overt or covert? military police do not order searches, evacuation, or
reentry into a building after an evacuation. These
Will the search be conducted before decisions are all made by the commander or building
evacuation, after evacuation, or without evacuation? supervisor concerned.
Will the search be conducted by supervisors, c. The individual or group of individuals
occupants, or a special team? selected to conduct the search must be given special
How much of the building will be searched? training in systematic search procedures and must be
taught to recognize a bomb or explosive device (EOD
A detailed search of even a medium-size building can will assist in this training). The key to a successful
take from 12 to 24 hours, and moving the furniture search is to be systematic. All searches must proceed
and equipment around will cause considerable in an orderly manner from the starting point
confusion and inconvenience to the occupants. Since throughout the area, \vith each rOOm being marked or
many bombs are activated by some type of watch or sealed after it has been searched.
clock mechanism, the lapse of time between setting
the bomb and receiving the warning usually will leave
considerably less than 12 hours of actual search time
for a bomb.
EQUIPMENT----------------------------~--------------------------
Depending upon their area of responsibility, search teams should be equipped with some of the items of
specialized equipment listed below.
4-1
TC 19-5
SEARCH TECHNIQUES - Q U T S I D E - - - - - - - - - - - - - - - - - - - -
a. Common sense dictates that the search search pattern begins at ground level and close
proceed from the outside to the inside, and from the attention mUSL be given to-
bottom to the top. These principles have resulted
from years of practical experience and reduce the risk Piles ofIeaves or refuse,
of injUf'/ to both the searchers and the occupants. ShrubbelY,
b. All phases of the search may be conducted Entrances,
simultaneously, if a large, trained search team is Manholes,
available. If the search team is to be divided, the Trash cans, and
followIng breakdown of team members has been Parked vehicles (look, only; suspect vehicles
found to be effective: should be searched by EOD personnel).
< :>CARS
_ _ _ _r
4-2
Outside search pattern' Storage area.
\
\
4·3
r==
JJ~ GUTTERS I
II
~lgfi£jl
-
~I
I'ir=:l II~r < DRAINPIPE I
---- --~~---~,- -~------~---~
-~-~-~-.~.--.-----.--------
IWINDOWS glBI
I---------
~ II
Ii
.-
Ie IBr
----
EDGES>
~.
.r
I
-== I
....... DOOR OVERHANG
~
=IP11
AIRCONDITIONER~~"II
- r==
I LIGHT FIXTURES:(>Jl
I-
r== 1EJ/
-lit..
~i %
~\J /i W" ~<SHRUBSI
'-J
,j
b=
I
~~TRASH cA;i........ ,. ~ I
'--i i! ~
I ~---.
.~ .
-I NEWSPAPER STANDI
<---'4.-
~ .\
...,~\ ~<)AANHm;El
~
.. ~ -.II 1A tl'.,
___ . "-lt H .. .....
I
,~\ ;~""u
4-4
TC 19-5
a. Search of the inside will start with the The first sweep of the room includes a chet;k
basement and work toward the top floor. If a of all objects from the floor to waist level including
separate public-area search team is organized, use items built into the wall. This sweep will require the
building custodial personnel on the team because most time and effort because it includes almost all
they are most familiar with the areas to be searched; items of fumiture, and underneath rugs.
for example, reception rooms, lobbies, elevators,
stairs, custodial closets, and rest rooms. As search The second sweep, in most cases, will
teams move throughout the building, each area is include all items from waist to ceiling. Under some
marked as it is searched to avoid duplicating the conditions, false ceiling spaces, heating ducts and
search by other search teams. One method of mdirect lighting fixtures may be left for a third
indicating a "search-completed" area is to tie a piece sweep.
of string or crepe paper across the door openings.
The room search is ended only when the
person in charge is satisfied that an adequate search
b. When conducting a detailed room search:
has been made. Remember the searcher should never
Move into room, stand with eyes closed, and say, "There is flO bomb." He shotlld only say, "No
listen. Frequently, clockwork timing devices can be bomb was found"
detected without special equipment.
Divide the room into equal parts according
to the number of objects to be searched, not the size
of the room.
4·5
-~----
TC 19-5
'I I
D!
~~ 0
D aD Do
•
0
D0
DaDa
0
08
0
D DJJJOID
'0
a 0
I
n
D DO
D
0
DO Do
0 0 '0
[IO[]]
a 0 a Do
0 DO
CDe ~
cCoc
D OOOD 01
'0000
ID tJ
I I
LEGEND:
4·6
TC 19-5
4th SEARCH
CEILING
HOLLOW OR
LIGHT -~----------~~==~==;:{----------------------------1
SUSPENDED
---- CEILING
CLOCK
3rd SEARCH
CHIN TO
CEILING
!02~~S~
_J!!:.E_
2nd SEARCH
HIP TO
CHIN
1st SEARCH
nOOR TO
~HIN
\i
4·7 !I
/i
TC 19-5
EVACUATION PROCEDURES
a. In evacuating any building, people must be above the danger point and immediately below
routed through the most public areas of the should be evacuated first. Also, on the same floor,
building-corridors and stairwells-and these are the evacuate 3 rooms away on all sides.
areas that are most likely to contain an explosive or
incendiary device. d. Before giving the order to evacuate, the
commander should consider the following:
b. Routes of evacuation and priorities for
removing people from a building when a bomb threat
The caller - What did he say? Did the caller
is received. Routes and priorities established will be
sound serious in his threats?
.based on the type of building and the location of
people within'the building. Persons to act as guides to Has this been a recurring thing?
lead the evacuation and to control the people during Are employees excused from work when such
exit must be predesignated and trained. threats are experienced?
Is it possible that this call was precipi-
c. Routes of evacuation and priorities for tated by news reports of other calls?
removing people from a building when a bomb is
found. Routes and priorities established will also Will immediate evacuation of the prem-
depend on the type of building and the location of ises expose personnel to greater danger?
people in relation to the area in which the bomb is What is the size of the building; how
located. In multistory buildings, rooms on floors many people are involved?
OTHERCONSIDERATIONS--------------------------------------------
Some of the questions that must be answered and incident and thoroughly trained. Areas through which
provided for in preparing the bomb-threat plan are: evacuation will proceed should be searched and
cleared before evacuation. These include areas inside
a. Who has the authority to order evacuation? and outside the threatened building. Public areas are
The commander or supervisor of the building the most likely places for a bomb to be located and
concerned. Military police do NOT order evacuation. are the usual avenues of exit. The evacuation team
should be able to control the evacuation and
b. Who makes the decisioll to permit reelltry eliminate panic that could lead to injuries.
into the building fol/owing a search ill which flO
bomb is foulld? The Bomb Scene Officer who is in f. To what area do YOll evacuate the
control of the operation. Military police do NOT occupallts? Occupants should be evacuated to an area
order reentry to a building. at least 300 feet away from the threatened area. It
must be emphasized that the 300-foot figure is a
c. How will evacuation be signalled? Establish a minimum. Greater distances are encouraged, if at all
signal for evacuation and proceed according to the possible. In any case, evacuees should be instructed to
pre-established evacuation plan. take cover and shelter from possible fragmentation.
d. If evacuation is ordered, what procedures g. What are the responsibilities of tlte occu-
}.,.ill be followed? Evacuation teams should be pallts durillg evacuation? The occupants should open
designated to guide the occupants out of the area. all doors and windows. This will reduce the shock
Alternate evacuation routes must be provided, effect of the bomb. Electtical units should be
preferably the same routes used in case of fire. unplugged to reduce chance of detonation and to·
reduce noise for an audio check. Then they should
e. Who will be part of the evacuarion team? proceed calmly, following the orders of the
These people should be designated before the evacuation team.
4-8
l;::t
Te 19-5
A critique of the exercise and summary of the course should follow. This checklist will
assist the instructor in evaluating efforts of the search team during the exercise:
5-1
SEARCH CHECKLIST
Yes No
Were all areas assigned t(, some member of the search team?
5·2
TC 19-5
APPENDIX A
REFERENCES
GENERAL-l------------------------------------------------------··
a. This appendix is intended to provide a guide published or produced. Training supervisors and
to all pertinent pUblished training material, applicable instructors should consult the following publications
training aids, and desirable facilities to be used by (with changes) for current guidance.
individuals responsible for conductlng and supervising
training. Text references and training aids obtainable (1) DA Pamphlet 108-1, Index of Army
from higher headquarters are not required to be Motion Pictures and Related Audio-Visual Aids.
locally available and will not be requisitioned by (2) DA Pamphlet 310·1, Index of Adminis-
units. Additional references and directives may
trative Publications.
augment the references listed below if directed by
higher commands. (3) DA Pamphlet 310·3, Index of Doctrinal,
Training, and Organizational Publications.
b. Some of the reference materials and training
aids listed may be superseded or changed. Other
materials and training aids will be available as they are
TEXTREFERENCES------------------------------------------------
u. Anny Regulations (AR).
A·1
TC 19-5
DESIRABLE FACILITIES.
Blackboard.
Projector, overhead.
A·2
TC 19-5
APPENDIX B
GENERAL--------------------------------------------------------
To conduct a bomb-incident-training program, the bomb incidents and the variety of techniques used.
instructor should first provide some background Oil The first period of instruction should discuss the
the problems created by bomb threats and bombings. magnitude of the problcm currently posed by bomb
Moreover, anyone responsible for implementing incidents, explain some of the reasons for such illegal
appropliate preventive and responsive mcasures must behavior, and identify those conditions that f()st~r
understand the many possible lllotives for planning and facilitate threats and bombings.
TABLE 8-1
.. BDC REPORT: BOMBINGS BY TYPE OF DEVICE
TYPES OF DEVICE
No No
Detonation Detonation Detonation Detonation
8-1
TC 19-5
d. The number of bomb threats far exceeds the threats to incidents, it is difficult to estimate the
number of times a bomb is either detonated, ignited, damage that will be done by bombings. The NBDC
or discovered. Compiling the total number of threats summaries attribute to bombings 22 deaths and 187
is even more difficult than counting the number of injUlies in 1973,25 deaths and 176 injUlies in 1972.
incidents, since threats are not reported to the press Property damage is listed as $7,261,832 in 1973 and
or police. For example, for a 6-month period (Jan $7,991,815 in 1972 (Table B-2). None of the
thru Jun 1972), the NBDC reports that there were property damage figures adequately reflects the loss
1039 bombing incidents and 11,918 recorded threats. of productivity caused by both bomb threats and
In deciding whether to evacuate a facility upon bombings nor do they reflect cost in manhours to
receipt of a threat, the ratio of threats to actual bomb police, security, and bomb disposal personnel.
incidents is certainly one factor to consider. FM Moreover, there is no way to measure the fear that
19-30 estimates that 5 to lO-percent of the threats people experience when their community or place of
received signal the actual presence of a bomb. work is subjected to an outbreak of bomb threats and
e. While it is feasible to estimate the ratio of bombings.
TABLE B-2
NBDe REPORT: BOMBINGS BY
TYPE OF RESULT
1973 22 187
I $7,261,832
HISTORICAL P E R S P E C T I V E - - - - - - - - - - - - - - - - - - - - - -
a. Bombs have been the traditional weapons of The mail delivery of 36 packages containing bombs to
extremist groups of every political persuasion. Bombs prominent industrialists touched off the Red Scare of
terrorize and precipitate political upheaval. History's 1919. Thirty-three persons were killed and two
most celebrated bomb incident occurred in England hundred injured by the "Wall Street Bomb" of 1930.
in 1605, when a group of conspirators plotted to More recently, three dynamite blasts demolished a
blow up the Parliament while the King and his chief Greenwich Village townhouse in 1970. The town-
ministers were present. Twenty barrels of gunpowder house was appr.rently being used as a bomb fqctory.
wrapped with iron chains were emplaced. The plot In the same month, explosions preceded by tele-
was uncovered before any damage occurred. To this phone warnings occurred in three New York office
day, there is an annual celebration on November 5th buildings. Responsibility for the bombings was
when bonfires and fireworks commemorate the date claimed by a group protesting against the "war
that Parliament escaped destruction C'Guy Fawkes profits" of three corporations occupying the tar-
Day," named after one of the conspirators). get buildings.
b. The United States has a history of famous
bomb incidents. In the Haymarket Square riot of
1886, an anarchist's bomb killed seven policemen.
8-2
TC 19-5
Bomb incidents of historical significance have The pUblic's fear of an unseen menace is a potent
generally been politically motivated. However, it psychological tool. Bombings and threats are also
would be a mistake to overlook the other possible very contagious, and the efforts of one group may be
motives for bomb incidents when devising preventive taken up by other groups or individuals with political
measures and bomb-threat plans. There are two basic or nonpolitical motives. In New York City, for
categories of motives for bomb placement and example, there were about 400 reported bomb
threats: nonpolitical and pC)litica1: threats in the 48-hour period foHowing the war
protest bombing of 3 Manhattan office buildings.
a. Nonpolitical. Bombing has often been Although there were few antiwar bombings in the last
employed as a method for accomplishing homicide, 2 years, Army installations remain a high-visibility
intimidation, harassment, and revenge. Explosions target for politically-motivated bombings and bomb
and fires can be used to put a competitor out of threats.
business, or to strike at management in a labor
c. Summary of Bomb Incidents by Motive. The
dispute. Bombings and threats have been employed to
predominant motives for bombings have only
assist in committing crimes by creating a diversion, or
recently been reflected in compilations of data. Table
by destroying evidence at the crime scene. The use of
B-3 shows the NBDC summary of bombings by
a bomb threat, combined with an ultimatum
motive for 1972 and 1973.
demanding a ransom, reached alarming proportions in
1972 when commercial aircraft were frequent targets
for destruction. A significant number of bomb
incidents has been attributed to malicious destruction
and personal animosity. Many bombings or threats, TABLE 8-3
whether nonpolitical or political, are rooted in the
psychological disorders of the perpetrator. NBDC REPORT:
SUMMARY OF BOMBINGS BY MOTiVE
b. Political.
(1) Some bombings are designed to stop or
impede a government operation; thus. the bombing of BOMBINGS BY TARGET
a government office may have the desired effect of
destroying official records and interrupting opera- 1972 1973
tions. Other bombings are conducted to demonstrate
TARGET Number Percent" Number Percent"
opposition to a political cause for which the bomb
target is a symbol. The bombing, or threat. attracts Residence 573 29 582 30
the publicity that a group might otherwise be unable Commercial bUildings 511 26 461 24
to obtain. Frequently, a bombing serves the dual Vehicles 240 13 226 11
purpose of interfering with an activity and calling Schools 188 10 179 9
attention to political opposition to that activity. The Open areas 113 5 80 4
threat preceding such a bombing is often designed to Military facilities 63 3 28 1
Public safety 60 '3 94 5
prevent personal injUlY, which would alienate 2
Public buildings 34 :i1
potential supporters, and to publicize the perpetra-
tor's views. The actual detonation is necessary to
Other guvernment property 27 "
1 25 1
Teleplllme facilities 27 1 26 1
demonstrate the strength of a group's dedication to Recreation facilities 27 1 33 2
particular views, and its determination to bring about Transportation facilities 24 1 61 3
change by any means. Utilities 21 1 26 1
Pe~sons 17 <1 38 2 "
(2) The most serious form of political Nev:Jspaper facilities <1 2 <1
bombirtgs are those bombings planned as a part of a 100
TOTAL 1962 100 1955
campaign of terror. The aim of such a campaign is to
induce fear in the populace and to make the people • < 1 =less than 11f.
lose faith in their government. A terror campaign may
also be designed to precipitate a crisis, which many
groups feel is a necessary precursor to any significant
change of conditions. The bomb is the ultimate
weapon of terror because it can inflict great damage,
injury, and death at any time in almost any place.
8·3
TC 19-5
(2) Recent radical literature has condemned ST 31-180 Special Forces Handbook
the old tactic of using mass demonstrations to disrupt
government activities, sin(.o this form of conduct
produced only temporary disruption at the price of
high arrests. Bombing and harassing threats are now
advocated as a preferable tactic becausf. these actions
require fewer people and less organization, entail
fewer arrests, and produce much greater damage to
government operations.
8-4
TC 19-5
'""".
(2) Drawing from military and commercial Interstate transport of explosives to cause
publications, extremist groups have distributed their property damage, injury, or death.
own guides. These guides furnish information about Use of explosives to damage any Federal
the manufacture and placement of bombs and buildings.
encourage readers to use this know-how against
targets of political significance. Use or carrying of explosives during the
commission of a felony.
Use of explosives to damage buildings,
(3) Commercially published boo~ are property, or vehicles used in interstate or
another source of know-how. The classic work is foreign commerce.
Lenz's Explosives and Bomb Disposal Guide, which
Making a bomb threat through the use of
was originally written to educate police bomb
an interstate instrument, such as the mail
disposal personnel. The Anarchist Cookbook by or telephone system.
William Powell provides recipes for explosives, the
know-how to make a variety of bombs, fuses, and
booby traps, and guidance as to where these devices
can be placed to do the most harm to many types of
targets. (3) The Control Act of 1970, which is
enforced by the Treasury Department and the
Federal Bureau of Investigation, establishes a
(4) Given our society's commitment to licensing and regulating procedure for the sale,
freedom of speech and the ease with which any possession, and storage of explosives when sufficient
information can be disseminated, an attempt to interstate contacts exist. Tougher laws do interfere
reduce bomb incidents by restricting know-how \vill with the would-be bomber's access to explosives but,
probably not be very successful. remember, explosives can be made at home from
readily obtainable chemicals by following the simple
b. Access to Explosives. instructions set forth in guides like The Anarchist
(1) Much of this material is obtained by Cookbook.
theft. A Senate Permanent Subcommittee study
indicates that between January 1969 and May 1970, c. Access to Targets. Unfortunately, the places
31,370 pounds of explosives, 94,018 blasting caps, where bombs are most effective for achieving the
and 101,540 feet of detonation cord or fuse were bomber's political or nonpolitical motives are usually
stolen_ The above figures do not include theft of the places that are hardest to secure because of
other explosive devices such as 304 M14 anti- regular public access or throughfare. Relatively small
personnel mines, stolen from a test range operated by amounts of explosives can do tremendous amounts of
a private research institute. The most common targets damage, especially, if the explosives are strategically
for these thefts are construction sites. Military placed. It is, therefore, not difficult to camouflage or
installations are another source of explosives. In conceal a bomb.
1969, for example, 11,000 feet of detonation cord
and 16,000 blasting caps were taken from an Army
SUMMARY - - - - - - - - - - -
Corps of Engineers project, and 206 pounds of
explosives, 2,230 feet of fuse and detonation cord,
and 38 blasting caps were stolen from an Air Force Since there are ample motives for bombing, and since
base. those possessing such motives have access to
know-how, explosives, and a variety of targets, the
(2) In some places, explosives can be so problem posed by bombs should not be under-
easily purchased that theft is not necessary. Laws estimated. Indeed, the existence of these conditions
governing the sale and possession of explosives vary in lends credibility to bomb threats. When credibility is
stringency from state to state. Title XI of the high, a bomb threat can disrupt almost as effectively
Organized Crime Control Act of 1970 makes Federal as an actual bomb, while creating far fewer risks for
crimes out of several acts, including: the person who makes the threat.
8-5
- - iC 19-5
APPENDIX C
SAMPLE AFTER-ACTION REPORT
DISPOSITION FORM
RefERENCE OR OFFICE SYMBOl SUBJECT
C-1
Te 19-5
AGXX 4 Ju1 75
SUBJECT: Bomb-Threat Incident/Accident Report
PART II (conti nued).
d. Date; tima of discovery.
e. Was it established that only one bomb existed?
f. Des cd pti on of the devi ce.
PART III: INCIDENT OF BOMB DETONATION
1. NATURE OF INCIDENT.
a. Where bomb exploded.
b. Date and approximate time of explosion.
c. Who reported inci dent/
2. ACTION TAKEN.
a. Hhat members of the search and EOD teams arrived on the scene?
About vlhat time?
b. How were the injured, if any, treated/evacuated?
3. OUTCONE.
a. Extent of property damage, if knDlvn.
b. Was building secured for further investigation?
c. Number of persons killed or injured.
4. ADDITIONAL INFORt~ATION.
C'2
TC 19-5
APPENDIX D
SUGGESTED TRAINiNG SCHEDULE AND LESSON PLANS
FIRST PERIOD
Lesson Outline
Define terms:
Task
Bomb
Understand. the bomb-threat problem.
Bombing
Objective Bomb threat
The student will be able to discuss the increasing Bomb incident
seriousness of bomb threats and bombings to the US Bomb-incident-preventive measures
government and its institutions, the motives for
bombings, and why this course of action is so Bomb-threat plan
attractive to extremist organizations. Explain alld discuss:
NOTE FOR INSTRUCTOR: For text reference, use Historical perspective.
App B of this TC; provide for classroom or other
Scope of the problem to include recent
training area; you will need a blackboard, overhead
increase in bombings.
projector, 16mm projector and screen, and TF
19-1740. Motives for bombings.
Types of targets.
Attraction of bIDmbing to extremist
organizations.
Prerequisites for bombing.
Summalize the lessoll.
D-1
TC 19-5
SECOND PERIOD
Lesson Outline
0-2
TC 19-5
THIRD PERIOD
Lesson Outline
FOURTH PERIOD
Task
Practical exercise and evaluate.
Lesson Outline
Objective
Students will activate a bomb-threat plan and Activate a bomb-threat plan,
perform all assigned fUnctions effectively. with all preassigned and trained individ-
NOTB FOR INSTRUCTOR; For text reference, use uals performing required functions to
Chapters 3 and 4 of this TC and FM 19-30; provide a include search and evacuation procedures
building or room to be searched and packages and preparing an after-action report.
containing simulated bombs. Critique the actiollS.
0-3
Te 19·5
J '
DEPARTMENTOFTHEARMY POSTAGE AND FEES PA'D
US AtotMY AG PUBLICATIONS CENTER DEPARTMENT OF THE ARMY
000314
~800 EASTERN BOULEVARD
BALTIMORE MARYLAND ~1 ~~O
SPECIAL FOURTH CLASS BOOK
OFFICIAL I9USINESS MD _
U.S.MAIL
PENALTY FOR PRIVATE USE S3.00 RATE