Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Skip to content

ULA assessments measure the capability elements of personnel, equipment, and training required for effective prevention, protection, and response to Improvised Explosive Device (IED) threats. This integrated information provides a snapshot of unit, local, state, regional, and national Counter-IED (C-IED) preparedness that informs decision-makers on policy decisions, resource allocation for capability enhancement, and crisis management.

Please log in to continue

Welcome to National Counter-Improvised Explosive Device Capabilities Analysis Database (NCCAD)


Enter your email address and password below. Then, click "Login" button to access your account. For account questions, comments or assistance please contact the CISA Technology Operations Center at TOC@mail.cisa.dhs.gov. A member of the NCCAD Team will contact you.

Forgot password?

You are about to access a Department of Homeland Security computer system. This computer system and data therein are property of the U.S. Government and provided for official U.S. Government information and use. There is no expectation of privacy when you use this computer system. The use of a password or any other security measure does not establish an expectation of privacy. By using this system, you consent to the terms set forth in this notice. You may not process classified national security information on this computer system. Access to this system is restricted to authorized users only. Unauthorized access, use, or modification of this system or of data contained herein, or in transit to/from this system, may constitute a violation of section 1030 of title 18 of the U.S. Code and other criminal laws. Anyone who accesses a Federal computer system without authorization or exceeds access authority, or obtains, alters, damages, destroys, or discloses information, or prevents authorized use of information on the computer system, may be subject to penalties, fines or imprisonment. This computer system and any related equipment is subject to monitoring for administrative oversight, law enforcement, criminal investigative purposes, inquiries into alleged wrongdoing or misuse, and to ensure proper performance of applicable security features and procedures. DHS may conduct monitoring activities without further notice. Use of this system constitutes consent to monitoring for these purposes and implies understanding of these terms and conditions.