Each scenario used in the The Bomb Tech experience is based on one or more real-world terrorist events. Each device used during the scenarios functions just like a real IED, but the explosives have been removed and replaced with a simulator to let participants know if they did something that would have caused a real device to function. Examples of scenarios are included below, but these constantly evolve depending on customer needs and real-world events.
The Escape Route
Your team has been trapped for several hours in your office building after terrorists stormed the building and took a number of other co-workers hostage. During the time that you and your team were hiding, the terrorists boobytrapped the hallways, stairwells, and and exits. Because your team went undetected, you decide to try to escape. Looking around the storage room where you were hiding, you find a bag of hand-tools, a role of wire, nails, tape, and other items that you think might be of use in making your escape. Your task is to work your way out of the building, neutralizing boobytraps as you encounter them. You must also work quietly, as not to alert the terrorists of your presence, and mark your cleared path out, so SWAT and other first responders can re-enter to save your remaining co-workers.
The Holiday Party Boat
During the holiday season, your organization decides to reward it's employees with a chartered party-boat cruise. Spirits are high, and the cruise is going well until the ship's captain receives a desperate radio call from shore, stating that several bomb, in 55 gallon drums, have been secreted away on the boat, and that the bomber is demanding a rather large ransom to reveal how to disarm the devices. Of course the bomber says the devices are boobytrapped and can't be moved, and are set with a timer to explode at a predetermined time if the ransom is not paid. Because the US government does not negotiate with terrorists, the ships captain is told that your company will not be allowed to pay the ransom, so options for dealing with the devices are limited. You and your team volunteer to defuze the devices, and working in teams of two, set out to render safe the bombs. You have hand-tools available, as well as some power-tools. You also have enough radio headsets to communicate between teams, to talk through procedures, and let each team know what triggers are being encountered.
Save the Boss
Your team has been called to meet the security manager in a room down the hall from the CEO's office. You are informed that a recently-fired, now former employee, stormed the CEO's office armed with a gun. At gun-point, he made the CEO put on a suicide-vest, strapped her/him to the chair, and injected her/him with what appears to be a powerful sedative. After arming the suicide vest, the gunman killed himself, leaving the CEO strapped to the chair wearing the suicide vest. Because your team has had some experience with other types of IEDs, your team is being tasked with rendering safe the suicide vest, and ensuring the safety of the CEO. The two team members working on the device have access to two bomb suits, hand tools, and a video link and communications equipment to consult with the rest of your response team.
Bringing Down the House
After a team lunch function at a local eatery, you and your team are approaching the main entrance to your building when a commercial van pulls up, and a man jumps out, running to a waiting car, and speeds off. Knowing that this is highly unusual, you approach the van, immediately noticing the strong smell of fuel, but don't see anything leaking from the van. You suspicions aroused, you tell your team to go a safe distance from the van, and call security. Upon calling security, you are informed that earlier in the day a bomb threat had been made, but the security team assumed it was a hoax. You you know that if this van is full of explosives, that it would destroy your entire building, and kill hundreds of people. Your task is now to inspect the vehicle to determine if the van is indeed a bomb, and take the appropriate actions to render safe the device, and any boobytraps encountered.