Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Physical Security
  4. Bombing Prevention
  5. Bomb Threats
Share:
Blue background design

Bomb Threats

Gain insight into how to plan for, assess, and respond to bomb threats at your facility. 

Bombing Prevention

  • Bomb Threats
  • Suspicious Activity and Items
  • IED Awareness
  • Protective Measures
  • Planning and Preparedness

What to do: Bomb Threats

Understanding Bomb Threats

Bomb threats involve any communication that indicates the presence of, or intent to detonate an explosive device. While these threats can be connected to actual acts of violence in which explosives are used, they are increasingly used as a tactic to disrupt, distract, or harass locations or organizations. The operational, financial, and psychological impacts that bomb threats can have on a location, an organization, an event, a community, and personnel can be dangerous and costly, even if no explosive device is present. 

The primary reason for employing bomb threats when no explosive device is present is to disrupt, distract, and harass. Perpetrators generally want to disrupt normal operations and threats of violence that generate panic can be an effective method. Once in a state of anxiety, an organization is at much higher risk for personal injury, property damage, and operational disruption. The most common targets of bomb threats include schools, government facilities, commercial businesses, healthcare facilities, and faith-based organizations. Bomb threats also have cascading impacts on communities by placing strains on first responders and emergency management activities, draining public resources. Bomb threats are mostly received via phone, but are also made in person or via: email, social media, written note, or other means. Every bomb threat is unique and should be handled in the context of the facility or environment in which it occurs.

Read more
Planning for Bomb Threats

Planning and preparing for bomb threats may not influence the number of threats received but will significantly reduce the psychological and emotional stress and lessen the financial impact by shortening the duration of the threat response. Having a Bomb Threat Management (BTM) Plan may ensure that your organization is better prepared in the event of a bomb threat, while also reducing risk should an actual explosive device be involved. The four primary goals of a BTM Plan are to: 1) mitigate vulnerabilities to bombing incidents, 2) make informed decisions during bomb threat assessments, 3) deter potential perpetrators of bombing incidents, and 4) minimize the consequences of a potential attack or threat on personnel and property. A proactive BTM Plan, in combination with training and exercising that plan, will allow stakeholders to manage threats more effectively. Additional information on roles, responsibilities, and what to do during an incident can be found in the Bomb Threat Guide.

Read more
Receiving Bomb Threats

Bomb threats are mostly received via phone, but are also made in person or via: email, social media, written note, or other means.

  • If you receive a phoned threat:
    • Remain calm & do not hang up, keep the caller on the line for as long as possible
    • If possible, signal other staff members to listen & notify Site Decision Maker(s) 
    • If the phone has a display, copy the number and/or letters on the display
    • Write down the exact wording of the threat
    • Record the call, if possible
    • Fill out the Bomb Threat Checklist immediately
  • If you receive a social media or email threat:
    • Do not turn off or log out of the account
    • Leave the message open on the device
    • Take a screenshot, or copy the message and subject line
    • Note the date and time
    • Notify the organization Site Decision Maker(s)
  • If you receive a written threat:
    • Handle the document as little as possible
    • Note date, time, and location the document was found
    • Secure the document and do not alter the item in any way
    • Notify the organization Site Decision Maker(s)
Read more
Assessing Bomb Threats

A crucial component of bomb threat management is the ability to assess the risk level of the threat. Because most threats prove to be false, a Decision Maker must be able to determine how serious a threat should be taken. All threats should be carefully assessed. One must consider the facts and context to conclude whether there is a possible threat. While it is difficult to decide on authenticity, consideration should be given to the following contributing factors:

  • Level of realism
  • Plausibility
  • Directness
  • Amount of time between threat notification and reported timing of the event
  • Exact wording of the threat (e.g., descriptions that show knowledge of the site location or employees and repetitive or motivating statements)
  • Prior acts or threats against this or similar facilities
  • Current events regarding this or similar facilities
  • Individuals or actions at the site
  • Accessibility of the site
  • Occupants of the site
  • Danger in evacuation areas

Different threat levels correspond to different courses of action. These actions may include monitoring the situation, lockdown and search, or evacuations as determined during the evaluation. For example:

  • Minimal threat: Assess the threat and discount it based on experience (e.g., the caller has made multiple baseless threats and threat does not contain new or specific details).
  • Low threat: Assess and determine that the threat of an existing device is low and lock down the site location to ensure no suspicious items enter the site location. If a suspicious item is discovered, the threat is elevated, and an evacuation may be needed.
  • Moderate threat: Assess the threat, determine the realistic potential of a suspicious device, lockdown the site location and conduct a full or partial search for a device. If a suspicious item is discovered, the threat is elevated, and an evacuation may be needed.
  • High threat: Assess that the threat is specific/realistic and conduct a partial or full evacuation of the site location.
Read more
Reporting Bomb Threats

Retain all information regarding the incident (such as usernames, email addresses, websites, phone numbers, or names of platforms, etc.) and report it to local law enforcement. 

If a suspicious item is discovered or the threat is elevated, it should be treated as an emergency by contacting 9-1-1.

Read more

Download For More Information

Featured

Training icon for Virtual-Instructor-Led Training course
CUSTOMIZABLE | VIRTUAL/ONLINE

Bomb Threat Assessment for Decision Makers Course (AWR-945)

Introduces the participant to types of threats, the threat assessment process, and the implementation of a bomb threat management plan.
Register
Video Icon
VIDEO

Bomb Threat Awareness for College Students Video

Aims to mitigate the impact of bomb threats received by colleges and universities on a student population by showing them the importance of following directions and security procedures.
One Page Icon
PUBLICATION

Bomb Threat Checklist

Provides instructions on how to respond to a bomb threat and a comprehensive list of information that will assist law enforcement in a bomb threat investigation.
Additional Translations Available
Download File (PDF, 305.72 KB)
Book Icon
PUBLICATION

Bomb Threat Guide

Provides awareness and guidance in preparing for and reacting to a bomb threat. It assists decision makers with assessment of received bomb threats, providing response guidance to save lives and protect critical infrastructure.
Download File (PDF, 7.86 MB)

Training

Access training courses that address how to plan for, assess, and respond to bombing threats.

For more information about the Office for Bombing Prevention (OBP) Training Program and the types of courses we offer, visit the OBP Training page. 

Learn More

View All Bomb Threat Training
Training icon for Virtual-Instructor-Led Training course

Bomb Threat Assessment for Decision Makers Course (AWR-945)

CUSTOMIZABLE | VIRTUAL/ONLINE
Introduces the participant to types of threats, the threat assessment process, and the implementation of a bomb threat management plan.
Register
Training icon for in-person training course

Bomb Threat Management Planning Course (MGT-451)

CUSTOMIZABLE | IN-PERSON
Provides participants foundational knowledge of the DHS risk management process and bomb threat management planning. It gives participants the opportunity to apply this knowledge to develop a bomb threat management plan.
Request Training
Training icon for Independent Study Training course

Bomb Threat Preparedness and Response Course (AWR-903)

INDEPENDENT STUDY | VIRTUAL/ONLINE
Provides participants with interactive exercises and case histories of what happened during bombing incidents to familiarize participants with the steps necessary to prepare for and respond to a bomb threat.
Register
Training icon for in-person training course

IED Search Procedures Course (PER-339)

CUSTOMIZABLE | IN-PERSON
Introduces participants to basic, low-risk search protocols. It provides participants with information to create a facility or special event search plan and allows them to preform IED searches of a facility, an area, and a route.
Request Training
View All Bomb Threat Training

Products

Leverage these products to respond to active or potential bomb threats at your facility. 

View All Bomb Threat Products
Video Icon

Critical Resources for Handling Bomb Threats Video

VIDEO
The Critical Resources for Handling Bomb Threats video provides a wide range of free tools and tips to help members of the public and others effectively respond to bomb threats. 
Multiple Page Icon

DHS-DOJ Bomb Threat Guidance Quad-Fold

PUBLICATION
Developed with the FBI, the DHS-DOJ Bomb Threat Guidance Quad Fold is a quick reference guide that provides site decision-makers with pre-threat preparation, threat assessment considerations, staff response guidelines, and evacuation and shelter-in-place considerations.
Download File (PDF, 1001.14 KB)
One Page Icon

DHS-DOJ Bomb Threat Stand-Off Card

PUBLICATION
Developed in partnership with the FBI, the DHS-DOJ Bomb Threat Stand-Off Card is a quick reference guide providing recommended evacuation and shelter-in-place distances for various types and sizes of IEDs.
Download File (PDF, 349.13 KB)
Video Icon

What to Do: Bomb Searches Video

VIDEO
Describes basic bomb search procedures to use once the determination has been made that a search is warranted, and authorities have been notified and demonstrates in detail, the room, route, and area search techniques that can be applied to any type of facility.
View All Bomb Threat Products

Tools/Services

Leverage these tools and services to identify potentials threats and threat mitigation at your facility.

An illustration that says TRIPwire

Technical Resource for Incident Prevention (TRIPwire) Portal

SERVICE
TRIPwire is DHS' online, collaborative information-sharing and resource portal for bomb squads, emergency responders, military personnel, government officials, intelligence analysts, private sector security professionals, and critical infrastructure owners and operators.

Contact

To report suspicious activity, call 9-1-1 or contact local law enforcement.

For additional information about OBP resources, please contact your local Protective Security Advisor (PSA) or OBP directly at OBP@cisa.dhs.gov.

Informed, alert communities play a critical role in keeping our nation safe. Everyone has a responsibility to protect our nation—"If You See Something, Say Something."

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback