How do improvised explosive devices work?
Two IEDs were detonated in the marathon attacks. An expert explains how they can lead us back to the bomb makers
By Larry GreenemeierTopics: Scientific American, Boston Marathon, Boston Bombings, CNN, AJ Clark, Technology News, News, Politics News
Blood and debris are seen on the sidewalk along Boylston Street a day after two explosions hit the Boston Marathon in Boston, Massachusetts April 16, 2013. (Credit: Reuters/Jessica Rinaldi)
The bombing near the finish line of the 117th Boston Marathon on Monday killed two and injured more than 100 people on site. Now comes the search for who planted and detonated the explosives, and the motive.
The first bomb was detonated at about 2:45 P.M. local time near one of the many classic storefronts lining the marathon’s home stretch. The second explosive followed within minutes about 50 to 100 yards away. Law enforcement later found and dismantled at least two more explosive devices, according to various news reports.
Improvised explosive devices (IEDs) such as those used to attack the marathon are sometimes triggered remotely by cell phones. The Associated Press initially reported that law enforcement had the cell network in the vicinity of the finish line shut down after the incident, but later reports contradicted this, indicating that problems receiving a signal were due to the volume of cell phone users on the network.
Federal authorities classified the bombings as a terrorist attack as of Monday evening and indicated that both of the detonated bombs were small and did not contain C-4 or other high-grade explosives, CNN reported. Explosive devices have their own signatures, even those that have been pulverized by the force of their detonation.
Scientific American spoke with AJ Clark, a former military intelligence analyst with deployments to Iraq and Guantanamo Bay, Cuba, about how IEDs work, how they are used and how they can be used to find those behind such an attack.
[An edited transcript of the interview follows.]
Reports indicate that IEDs were responsible Monday’s attack on bystanders at the Boston Marathon. Most people have heard the term“IED” in relation to combat in Afghanistan and Iraq, but what, exactly, is an IED?
Most improved explosive devices include the following components: a cheap cell phone, electrical wire, a fuse, batteries (AA or 9-volt), electrical tape and a thyristor (a solid-state semiconductor device). This last piece provides the option of letting you wire into the positive and negative diodes of the speaker on the cell phone board.
Two common ways to complete the circuit between these components is to use the vibrating mechanism on the cell phone or the speaker—this could be either the speaker used to make your phone a speaker phone, or the speaker that you put up to your ear during a normal conversation. We found that the speaker phone has more power going to it and was more commonly used. When the phone is called, it activates the ringer, which makes the connection between those two components and kicks off the signal to detonate the explosive.
The typical makeup when you find these things will be based on the contents that the bomb maker had at their disposal and what it is they are trying to do. Over in Iraq, we had a lot of what are called explosively formed penetrators, where whole IED is designed to explode up under a vehicle to create the greatest destruction possible. In something that is meant to detonate in a crowd of people, a bomb maker would pack into the IED whatever they had at their disposal—such as nails or ball bearings.
How are IEDs different in a war zone, as opposed to something that is used in a city or other civilian area?
You wrap the fragments around some type of explosive or ordinance. In a warzone you have lots of access to ordinance. Here you probably would probably try to find an explosive for blasting, say dynamite or C-4. Generally speaking a person wouldn’t use fertilizer in this situation, the way they did during the Oklahoma City bombing, because you need a lot of fertilizer—enough to fill a 5-gallon bucket or larger drum—to generate a decent-sized explosion. In a situation like this, you’re going to look for a something denser that you could put in a small location and then attach your cellular trigger to it.
How are these explosives detonated remotely?
The concept is, I need to create the signal between my positive and negative circuit and then set off my fuse. The problem with a timed fuse is that it doesn’t necessarily happen when they want it to.
How do cell phones change this?
The distance someone can be from the blast area is much greater. Generally speaking someone is in a crowd when they use these. Cell phones are also more reliable than other methods of detonating explosives. Within about 30 minutes, someone can buy a $10 phone and be able to set off the device.
What can an examination of the detonated device tell investigators?
We can look and see the method of operations or the signature that the bomb maker had in terms of how they set up the fuse and what type of material they used. That’s our best way of tracking down who is responsible.
How badly are these bombs damaged during a detonation (such that it’s difficult to analyze the pieces for criminal evidence)?
It varies, but you’ll find remnants, wires for example. You might even find a scrap like a red piece of tape that looks the kind of tape used at another bomb site. They’ll also see the complexity of how the bomb was put together. That’s really important too. Some bomb makers will also use other pieces of technology, like using a thyristor instead of connecting directly to the battery. A thyristor acts as a switch when an electrical signal is sent to it. That’s directly connected to the positive and negative diodes in the cell phone. Where you’ll get a real break is if a second or third bomb is found before detonation and the bomb squad is able to dismantle them and analyze how they were built.
Early reports out of Boston were that law enforcement had the cell network in the area around the finish line shut down (although the mobile service providers disputed that they had shut down their networks). Regardless, why would law enforcement want to cut off cell service?
In shutting down cell service, you block the ability to create that circuit and ignite that fuse. In the military we would use jamming devices on our trucks, sometimes seven or eight of them on a single vehicle. Some of them work, some don’t. If law enforcement in Boston did shut down the service it could have been because they found other, undetonated IEDs that were equipped with cell phones.
Related Stories
More Related Stories
-
Send her your sexts
-
Hacker steals sensitive infrastructure data from U.S. military
-
Text messaging down across the U.S.
-
Dutch police may get right to hack into computers
-
America hates science
-
Google Earth as art
-
Police, politicians push for increased surveillance post-Boston
-
Media companies reap benefits of higher network fees
-
Facebook is blowing it
-
IBM makes world's tiniest movie
-
Twitter vs. the New York Times: Who wins?
-
Apple selling record amount in bonds
-
Online poker goes legit
-
Government preparing to fine tech firms that don't comply with wiretaps
-
The Department of iPhone Security
-
S&P 500 reaches new high
-
Google's new answer to Siri
-
Wikipedia's shame
-
Can we record our inner monologues?
-
Cyberattack suspect to return to Netherlands
-
Dzhokhar Tsarnaev scrubbed online presence before bombings
Featured Slide Shows
The week in 10 pics
close X- Share on Twitter
- Share on Facebook
- Thumbnails
- Fullscreen
- 1 of 11
- Previous
- Next
-
This photo. President Barack Obama has a laugh during the unveiling of the George W. Bush Presidential Center in Dallas, Tx., Thursday. Former first lady Barbara Bush, who candidly admitted this week we've had enough Bushes in the White House, is unamused.
Reuters/Jason Reed -
Rescue workers converge Wednesday in Savar, Bangladesh, where the collapse of a garment building killed more than 300. Factory owners had ignored police orders to vacate the work site the day before.
AP/A.M. Ahad -
Police gather Wednesday at the Massachusetts Institute of Technology to honor campus officer Sean Collier, who was allegedly killed in a shootout with the Boston Marathon bombing suspects last week.
AP/Elise Amendola -
Police tape closes the site of a car bomb that targeted the French embassy in Libya Tuesday. The explosion wounded two French guards and caused extensive damage to Tripoli's upscale al-Andalus neighborhood.
AP/Abdul Majeed Forjani -
Protestors rage outside the residence of Indian Prime Minister Manmohan Singh Sunday following the rape of a 5-year-old girl in New Delhi. The girl was allegedly kidnapped and tortured before being abandoned in a locked room for two days.
AP/Manish Swarup -
Clarksville, Mo., residents sit in a life boat Monday after a Mississippi River flooding, the 13th worst on record.
AP/Jeff Roberson -
Workers pause Wednesday for a memorial service at the site of the West, Tx., fertilizer plant explosion, which killed 14 people and left a crater more than 90 feet wide.
AP/The San Antonio Express-News, Tom Reel -
Aerial footage of the devastation following a 7.0 magnitude earthquake in China's Sichuan province last Saturday. At least 180 people were killed and as many as 11,000 injured in the quake.
AP/Liu Yinghua -
On Wednesday, Hazmat-suited federal authorities search a martial arts studio in Tupelo, Miss., once operated by Everett Dutschke, the newest lead in the increasingly twisty ricin case. Last week, President Barack Obama, Sen. Roger Wicker, R.-Miss., and a Mississippi judge were each sent letters laced with the deadly poison.
AP/Rogelio V. Solis -
The lighting of Freedom Hall at the George W. Bush Presidential Center Thursday is celebrated with (what else but) red, white and blue fireworks.
AP/David J. Phillip -
Recent Slide Shows
-
The week in 10 pics
-
"Arrested Development" character posters
-
Photos of the Boston manhunt
-
Newspaper headlines covering the Boston explosion
-
- Share on Twitter
- Share on Facebook
- Thumbnails
- Fullscreen
- 1 of 11
- Previous
- Next
Related Videos
Salon is proud to feature content from Scientific American, the longest continuously published magazine in the United States and the leading popular source and authority on science, technology and innovation. With a worldwide print and digital audience of more than five million people, fourteen local language editions, and a major new
blog network, Scientific American engages, educates and inspires current and future generations of science-interested citizens and public and private sector leaders.
Most Read
-
71 names so awful New Zealand had to ban them
Kyle Kim, GlobalPost
-
"This could be a career ender for Michele Bachmann"
Alex Seitz-Wald
-
He made me his drug mule
Alix Wall
-
Ted Cruz will never be president
Joan Walsh
-
Claire Messud to Publishers Weekly: "What kind of question is that?"
David Daley
-
Pictures of people who mock me
Haley Morris-Cafiero
-
Is Michael Pollan a sexist pig?
Emily Matchar
-
How conspiracists think
Sander van der Linden, Scientific American
-
Bush cancels Europe trip amid calls for his arrest
Justin Elliott
-
"Star Trek's" Wil Wheaton tells newborn girl why being a nerd "is awesome"
Prachi Gupta
Popular on Reddit
links from salon.com
From Around the Web
Presented by Scribol
-
Rita F. Pierson: WATCH: The Reason Your Elementary School Teacher Matters -
GOP Rep Uses Embarrassing Analogy On Mitt Romney -
John McCain Gets Unexpected Surprise -
Report: North Korea Working Toward Striking U.S. With Nukes - AlaskaDispatch.com: Disgraced Senate Aide Moves from Federal Prison to Federal Fisheries Lobbyist
-
Ken Cuccinelli Once Filed An Amendment To Change Virginia's State Song To The Beatles' "Taxman" -
Masters Of The Universe: Lawmakers Obsess Over Threats From Space -
Commerce Appointment Opens A New White House Rift - Who Said It: Terry McAuliffe Or A Character From "House Of Cards"?
- State Department Unsure Of Status Of Saudi Diplomat In Alleged Trafficking Investigation
-
Jolla swaps out its CEO yet again, this time bringing in a logistics veteran - Vimeo on demand will exclusively distribute new Kristen Bell movie
-
Barnes & Noble integrating Google Play into Nook HD and Nook HD+ tablets -
When a defense contractor gets hacked repeatedly, you know cybersecurity is a problem -
Games meet brains: the new immersive tech of gaming




What People Are Actually Doing On The Internet In 2013
How To Get Alerted The Second "Arrested Development" Shows Up On Netflix
How Chrome's Best Feature Got Killed Before Launch
Checking In On Our #FollowATeens


Comments
3 Comments