An Improvised Explosive Device (IED) attack is the use of a "homemade" bomb and/or destructive device to destroy, incapacitate, harass, or distract. IEDs are used by criminals, vandals, terrorists, suicide bombers, and insurgents. Because they are improvised, IEDs can come in many forms, ranging from a small pipe bomb to a sophisticated device capable of causing massive damage and loss of life. IEDs can be carried or delivered in a vehicle; carried, placed, or thrown by a person; delivered in a package; or concealed on the roadside. The goal is to tamper, remove and or destroy an organization’s facilities or assets.
IED contains 12 profiles to describe this threat.
All threats contain different profiles which describe their attributes. These attributes represent different types of attackers or threats. When Quill recommends measures, we compare the efficacy of these measures to the profiles of these threats to determine the reduction to risk achieved by implementation.
All threat profiles are comprised as a combination of these six attributes with one the following descriptors.
|Attacker||Insider, Outsider, Invitee|
|Goal||Destroy, Tamper, Remove|
|Evasion||Try, Evade, Do Not Evade|
|Presence||Preparation, On Site, Remote|
|Equipment||Common, Specialized, No Equipment|
|Vehicle||Present, Essential, No Vehicle|