From 2013 to 2023, the United States has seen a 62% increase in the use of Improvised Explosive Devices (IEDs), according to data from the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). Over the same time, unexploded IED recoveries rose by 37%, highlighting a steadily growing domestic threat that remains under-recognized across many industries and sectors.
As of June 2025, there have been an estimated 307 IED-related incidents this year alone—the majority politically motivated—and 598 unexploded devices have been recovered. These statistics are based on media sources, as the ATF and FBI typically delay the release of official data by approximately two years after the close of the reporting period.
Arizona ranks among the top 15 states for IED activity, while California holds the #1 spot, largely due to political unrest and environmental extremism.
Who Is Behind the Increase?
The surge in IED use is being driven by a diverse and alarming range of actors:
- Foreign terrorist organizations
- Domestic extremist groups
- Radicalized lone individuals
- Politically, socially, or religiously aggrieved persons
These groups are increasingly turning to IEDs, firearms, and bladed weapons to advance agendas spanning politics, religion, economics, and environmental activism.
Understanding the “Pathway of Targeted Violence”
Created by Frederick Calhoun and Steve Weston, the Pathway of Targeted Violence outlines six progressive stages that individuals typically follow when moving from grievance to violent action:
- Grievance – A perceived injustice, humiliation, or personal loss.
- Ideation – Fantasizing about violence as a means of justice or revenge.
- Research & Planning – Gathering intelligence on targets, tactics, and tools.
- Preparation – Acquiring weapons or explosives, rehearsing actions, and finalizing logistics.
- Probing or Breach – Conducting dry runs or testing physical security.
- Implementation – Executing the planned attack.
Key Takeaways:
- The process is not always linear; individuals can move forward or backward along the pathway.
- Early detection and intervention at any stage can prevent violence.
- Recognizing behavioral indicators is critical for pre-attack disruption.
Impact on Corporations, Political Organizations, and Places of Worship
IEDs pose a significant risk to organizations such as corporate headquarters, political offices, and houses of worship. Assessing vulnerability through the CARVER methodology—originally developed by the Office of Strategic Services (OSS) and still used by security and special operations forces—can help identify risks.
CARVER Framework:
- Criticality – How vital is the asset or individual to the organization?
- Accessibility – How easily can the target be reached or approached?
- Recuperability – How quickly can operations resume after an attack?
- Vulnerability – How susceptible is the target to successful attack?
- Effect – What would be the operational, financial, or psychological impact?
- Recognizability – How easily can the target be identified and located?
Examples of Vulnerabilities:
- Are C-suite executives or faith leaders easily recognized in public/media?
- Are facilities lacking Crime Prevention Through Environmental Design (CPTED)?
- Are security site surveys being conducted and updated frequently enough?
The Reality of IED Threats
IEDs are indiscriminate weapons, capable of inflicting widespread damage on intended targets and innocent bystanders alike. Their construction is increasingly simplified by online tutorials, open-source materials, and extremist propaganda, making them highly accessible to a variety of threat actors.
IEDs are:
- Inexpensive to build
- Concealable in everyday environments
- Highly effective in confined areas like lobbies, entrances, and parking garages
These devices are commonly command-detonated—via cell phones, radios, or timers—often placed at choke points to maximize casualties and ensure target contact.
Notable 2025 Incidents (External Links):
- Tesla Truck Explosion – Trump Las Vegas Hotel (NPR)
- FBI Statement on New Orleans Attack
- IEDs Found at Tesla Dealership – Texas (ABC News)
- Student Charged in Firebombing – Kansas City Tesla (DOJ/NYP)
- Bomb Near California Reproductive Facility Kills Mayor (Reuters)
- ICE Raids and LA Protests Escalate (ABC)
- Eight NYPD Vehicles Burned in Brooklyn (ABC 7 NY)
The Need for Specialized Training
Security personnel—whether in-house or contracted—must be trained beyond static classroom PowerPoints. Organizations need realistic, hands-on training that reflects the complexity and unpredictability of IED threats.
Essential Training Elements:
- IED component identification
- Understanding triggering mechanisms (timers, command, victim-operated)
- Search protocols and SOPs
- Use of detection and mitigation equipment
- Live training exercises with simulated or inert devices
Our Solution:
Threat Mitigation – Risk Control Group offers a 2-Day IED Familiarization & Recognition Course that includes:
- 25% classroom instruction
- 75% practical, scenario-based training
- Use of real-world equipment
- Live-fire simulations to build confidence and tactical proficiency
For More Information:
Contact Threat Mitigation – Risk Control Group
Learn how we can support your organization with advanced protective training and readiness solutions.