Marking, Rendering Inert, and Licensing of Explosive Materials:


Book Description

This book, a response to increased concern by the American public over illegal bombings, examines possible mechanisms for reducing this threat. The committee examined four approaches to reducing the bombing threat: addition of detection markers to explosives for preblast detection, addition of identification taggants to explosives for postblast identification of bombers, possible means of rendering common explosive materials inert, and placement of controls on explosives and their precursors. The book makes several recommendations to reduce the number of criminal bombings in this country.







Containing the Threat from Illegal Bombings


Book Description

In response to the rising concern of the American public over illegal bombings, the Bureau of Alcohol, Tobacco, and Firearms asked the National Research Council to examine possible mechanisms for reducing this threat. The committee examined four approaches to reducing the bombing threat: addition of detection markers to explosives for pre-blast detection, addition of identification taggants to explosives for post-blast identification of bombers, possible means to render common explosive materials inert, and placing controls on explosives and their precursors. The book makes several recommendations to reduce the number of criminal bombings in this country.




Preventing the Illegal Use of Explosive Materials


Book Description




United States Code


Book Description

"The United States Code is the official codification of the general and permanent laws of the United States of America. The Code was first published in 1926, and a new edition of the code has been published every six years since 1934. The 2012 edition of the Code incorporates laws enacted through the One Hundred Twelfth Congress, Second Session, the last of which was signed by the President on January 15, 2013. It does not include laws of the One Hundred Thirteenth Congress, First Session, enacted between January 2, 2013, the date it convened, and January 15, 2013. By statutory authority this edition may be cited "U.S.C. 2012 ed." As adopted in 1926, the Code established prima facie the general and permanent laws of the United States. The underlying statutes reprinted in the Code remained in effect and controlled over the Code in case of any discrepancy. In 1947, Congress began enacting individual titles of the Code into positive law. When a title is enacted into positive law, the underlying statutes are repealed and the title then becomes legal evidence of the law. Currently, 26 of the 51 titles in the Code have been so enacted. These are identified in the table of titles near the beginning of each volume. The Law Revision Counsel of the House of Representatives continues to prepare legislation pursuant to 2 U.S.C. 285b to enact the remainder of the Code, on a title-by-title basis, into positive law. The 2012 edition of the Code was prepared and published under the supervision of Ralph V. Seep, Law Revision Counsel. Grateful acknowledgment is made of the contributions by all who helped in this work, particularly the staffs of the Office of the Law Revision Counsel and the Government Printing Office"--Preface.




Containing the Threat from Illegal Bombings


Book Description

In response to the rising concern of the American public over illegal bombings, the Bureau of Alcohol, Tobacco, and Firearms asked the National Research Council to examine possible mechanisms for reducing this threat. The committee examined four approaches to reducing the bombing threat: addition of detection markers to explosives for pre-blast detection, addition of identification taggants to explosives for post-blast identification of bombers, possible means to render common explosive materials inert, and placing controls on explosives and their precursors. The book makes several recommendations to reduce the number of criminal bombings in this country.







Existing and Potential Standoff Explosives Detection Techniques


Book Description

Existing and Potential Standoff Explosives Detection Techniques examines the scientific techniques currently used as the basis for explosives detection and determines whether other techniques might provide promising research avenues with possible pathways to new detection protocols. This report describe the characteristics of explosives, bombs, and their components that are or might be used to provide a signature for exploitation in detection technology; considers scientific techniques for exploiting these characteristics to detect explosives and explosive devices; discusses the potential for integrating such techniques into detection systems that would have sufficient sensitivity without an unacceptable false-positive rate; and proposes areas for research that might be expected to yield significant advances in practical explosives and bomb detection technology in the near, mid, and long term.




Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals


Book Description

Improvised explosive devices (IEDs) are a type of unconventional explosive weapon that can be deployed in a variety of ways, and can cause loss of life, injury, and property damage in both military and civilian environments. Terrorists, violent extremists, and criminals often choose IEDs because the ingredients, components, and instructions required to make IEDs are highly accessible. In many cases, precursor chemicals enable this criminal use of IEDs because they are used in the manufacture of homemade explosives (HMEs), which are often used as a component of IEDs. Many precursor chemicals are frequently used in industrial manufacturing and may be available as commercial products for personal use. Guides for making HMEs and instructions for constructing IEDs are widely available and can be easily found on the internet. Other countries restrict access to precursor chemicals in an effort to reduce the opportunity for HMEs to be used in IEDs. Although IED attacks have been less frequent in the United States than in other countries, IEDs remain a persistent domestic threat. Restricting access to precursor chemicals might contribute to reducing the threat of IED attacks and in turn prevent potentially devastating bombings, save lives, and reduce financial impacts. Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals prioritizes precursor chemicals that can be used to make HMEs and analyzes the movement of those chemicals through United States commercial supply chains and identifies potential vulnerabilities. This report examines current United States and international regulation of the chemicals, and compares the economic, security, and other tradeoffs among potential control strategies.




Counterterrorist Detection Techniques of Explosives


Book Description

The detection of hidden explosives has become an issue of utmost importance in recent years. While terrorism is not new to the international community, recent terrorist attacks have raised the issue of detection of explosives and have generated a great demand for rapid, sensitive and reliable methods for detecting hidden explosives. Counterterrorist Detection Techniques of Explosives covers recent advances in this area of research including vapor and trace detection techniques (chemiluminescence, mass spectrometry, ion mobility spectrometry, electrochemical methods and micromechanical sensors, such as microcantilevers) and bulk detection techniques (neutron techniques, nuclear quadrupole resonance, x-ray diffraction imaging, millimeter-wave imaging, terahertz imaging and laser techniques). This book will be of interest to any scientists involved in the design and application of security screening technologies including new sensors and detecting devices which will prevent the smuggling of bombs and explosives. * Covers latest advances in vapor and trace detection techniques and bulk detection techniques* Reviews both current techniques and those in advanced stages of development* Techniques that are described in detail, including its principles of operation, as well as its applications in the detection of explosives