Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Skip to content

ULA's measure the capability elements of personnel, equipment, and training required for effective prevention, protection, and response to Improvised Explosive Device (IED) threats. This integrated information provides a snapshot of unit, local, state, regional, and National Counter-IED (C-IED) preparedness that informs decision-makers on policy decisions, resource allocation for capability enhancement, and crisis management.

Please log in to continue

Welcome to National Unit Level Assessment Database (ULA)


SUNSET OF NCCAD ULA WEBPAGE - OBP is restructuring the NCCAD ULA and transitioning it to the C - IED Capability Assessment Program. Consolidating elements from these two assessment programs supports Executive Orders and Departmental Guidance. As result, this webpage will not be accessible after 30SEP2025. If you require access to specific data, please reach out to OBPoperations@cisa.dhs.gov

If you have any operational questions, please reach out to the OBP Operations. More details will be sent through our Mass Email function. If you have technical questions, please reach out to the TOC – TOC@cisa.dhs.gov


You are about to access a Department of Homeland Security computer system. This computer system and data therein are property of the U.S. Government and provided for official U.S. Government information and use. There is no expectation of privacy when you use this computer system. The use of a password or any other security measure does not establish an expectation of privacy. By using this system, you consent to the terms set forth in this notice. You may not process classified national security information on this computer system. Access to this system is restricted to authorized users only. Unauthorized access, use, or modification of this system or of data contained herein, or in transit to/from this system, may constitute a violation of section 1030 of title 18 of the U.S. Code and other criminal laws. Anyone who accesses a Federal computer system without authorization or exceeds access authority, or obtains, alters, damages, destroys, or discloses information, or prevents authorized use of information on the computer system, may be subject to penalties, fines or imprisonment. This computer system and any related equipment is subject to monitoring for administrative oversight, law enforcement, criminal investigative purposes, inquiries into alleged wrongdoing or misuse, and to ensure proper performance of applicable security features and procedures. DHS may conduct monitoring activities without further notice. Use of this system constitutes consent to monitoring for these purposes and implies understanding of these terms and conditions.