Improvised Explosive Devices (IED): A Humanitarian Mine Action Perspective

by Robert Keeley - view pdf

Readers of this Journal need no schooling in the acceleration of the use of improvised explosive devices (IED) over the last 20 years. However, what has become obvious in the last few years is the degree to which the spheres of counter-IED (C-IED) and humanitarian mine action (HMA) now overlap. Danish Demining Group (DDG), for example, recently calculated that an estimated 67 percent of the countries where DDG is present also have an IED problem. In countries such as Afghanistan, IEDs are now the major cause of explosive-related casualties among the general population, the very constituents nongovernment organizations (NGO) and HMA sectors support. This raises questions of whether or not an NGO engaged in C-IED efforts can be classically impartial in circumstances where these IEDs are active. This is a significant difference for a sector primarily focused on dealing with the legacies of conflict that are explosive remnants of war (ERW). Yet, while undertaking a series of risk assessments to help identify an appropriate approach for an NGO active in HMA, it became clear that there was a need for better common terminology in order for HMA actors to identify the appropriate response. The aim of this article is to outline how this thought process evolved in DDG in order to set the ground for subsequent discussion of these risk- analysis processes. 

What is an IED? 

The name says it all. An IED is an explosive device that is made in an improvised manner. British parliamentarians currently define an IED as:

A device placed or fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or incendiary chemicals and designed to destroy, incapacitate, harass, or distract.1

Figure 1. How IED terms overlap.
Figure courtesy of the author.
Figure 1. How IED terms overlap.
Figure courtesy of the author.

This term hides a multiplicity of variations: it might be a device based on a recycled item of unexploded ordnance (UXO), or built around a repurposed item of abandoned explosive ordnance (AXO) found in an unsecured or raided ammunition stockpile. It might also be built from scratch from homemade explosives (HME). However, the common factor amongst these variations is that these constructions are improvised as opposed to factory-made, standardized weapons used for their intended purpose. In summary, the term IED is about how the weapon is made.

What is the difference between an IED, a booby trap, or an improvised mine? Not much, in some cases. A booby trap is defined as follows:

An explosive or non-explosive device, or other material, deliberately placed to cause casualties when an apparently harmless object is disturbed or a normally safe act is performed.2

One can immediately see how easily these two terms overlap. It is possible to set up an IED to produce such a situation. Yet the term booby trap can also apply to non-explosive traps (e.g., punji sticks in Vietnam) and a command-detonated IED is not necessarily linked to the person carrying out an apparently harmless act. If the term IED is about how the device is made, the term booby trap describes how the device is set up to function.

Thirdly, one must consider how improvised or artisanal mines fit into this taxonomy. The 1997 Anti-Personnel Mine Ban Convention (APMBC) defined a mine as:

any munition placed under, on or near the ground or other surface area and designed to be detonated or exploded by the presence, proximity or contact of a person or vehicle.3

Here we see another overlap. Mines are commonly factory-built, but it is quite possible to make a victim-operated IED. The mine definition is about how the device is initiated.

One could easily spend time wrestling with these definitions. Take any particular device: which one of these categories does it fit into? In many cases, a given device can fit in two, sometimes even three, categories at once. Because these terms developed from different historical roots, they overlap and describe different attributes of the device: the way it is constructed, the way it is set up, and the way it is initiated (Figure 1). If the terms aren’t used correctly, there is a risk of over- reporting the problem. Secondly, because of their improvised nature, IEDs often require different training and equipment for counteractions; if the problem is misunderstood, the balance of training and other resources will also be wrong.


Security incidents are all enemy action (i.e. enemy-initiated direct fire and indirect fire i.e. mortar, rocket and artillery, surface-to-air fire, and explosive hazard) events to include executed attacks (i.e. IED explosion, mine strike) and potential or attempted attacks (i.e. IEDs, mines found & cleared, premature IED detonations, IED turn-ins) which are not included.

Security incidents do not include friendly action incidents such as direct fire and indirect fire that are initiated by friendly forces. Enemy-initiated attacks are all enemy action (i.e. enemy-initiated direct fire, indirect fire, surface-to-air fire) and explosive hazard events to include executed attacks only (i.e. IED explosions and mine strikes). Potential or attempted attacks (i.e. IEDs/mines found & cleared, premature IED detonations, IED turn-ins) are not included.

IED events comprise explosive hazard events, both executed (i.e. IED explosion/mine strike) and potential IED/mine attacks (i.e. IEDs/mines found & cleared, premature IED detonations, IED turn-ins).

A complex attack is an attack conducted by multiple hostile elements which employ at least two distinct classes of weapon systems (i.e. indirect fire and direct fire, IED, and surface-to-air fire) against one or more targets.

Figure 2. NATO weapons definitions from Afghanistan. Note that this does include reference to “legacy” incidents from explosive remnants of war.
Figure courtesy of UNMAS.


Moreover, there have been efforts to adjust the definition of booby trap to only cover factory-built devices. From the author’s perspective, this attempt to square the definition circle is not helpful. The terms describe different attributes, and trying to make them fit a convenient perspective could simply add further confusion.4 Perhaps a booby trap is not a separate type of weapon but merely another method of deployment.

How do IEDs fit into the spectrum of explosive incidents? In situations of counterinsurgency, asymmetric warfare, or internal security, the civilian population, civil power, humanitarian actors, and security forces face a range of different explosive threats, of which IEDs are only part of the spectrum. NATO’s early work in Afghanistan helps to untangle the range of these threats.5

Figure 3. Description of IEDs.
Figure courtesy of the author.
Figure 3. Description of IEDs.
Figure courtesy of the author.

Figure 3 helps clarify a number of points. First, current security incidents (case 2) can stand alongside incidents from legacy weapons (case 1). In fact, these legacy weapons led to the establishment of the HMA sector. Second, current and active security incidents can involve a range of weapons that are not IEDs, including direct fire, indirect fire from factory- built mortars, surface-to-air missile (SAM) attacks on civil aircraft, or placement of factory-built anti-tank mines—all of which are significant but not IED incidents. It should also be noted that, for clarity, the diagram does not include the range of criminal weapon uses that might be included under a wider definition of armed violence (case 3) such as armed robbery, inter-communal disputes, or even domestic violence.

How Do We Describe Different IEDs?

During the 20th century, simpler terms were in use such as letter bombs, parcel bombs, unattended bags, and car bombs. These terms were not precise but counter-IED personnel knew what they meant. In recent years, there has been a significant proliferation of terms (particularly involving acronyms) intended to make our vocabulary more exact. However, this article argues that the opposite was achieved. We now have vehicle-born IEDs (VBIED), victim-operated IEDs (VOIED), command wire detonated IEDs (CWIED), suicide vehicle-borne IEDs (SVBIED), improvised rocket-assisted munitions (IRAM), etc. While it is comparatively easy to learn what these acronyms mean, perhaps they obscure what is actually needed for a fuller analysis.

These terms describe one or both of two main attributes of IEDs: the nature of the containment and the means of initiation. Thus a VBIED can be command detonated by wire (CWIED) or remote control (RCIED), it could be detonated on a timer, victim-operated (VOIED) or be operated by a suicide bomber (SVBIED). So, which one of these is it?6

Currently, organizations tend to use a reporting form with a list of boxes for each of these terms and ask reporting officers to select one. This fails the rule of lists, which requires a list to be both mutually exclusive and collectively exhaustive.7 One-dimensional lists simply cannot consider something with two variable attributes without significantly more letters. Yet an IED in a car initiated by a command wire could be reported by a peacekeeping contingent as a VBIED while another unit records an identical device as a CWIED. There are two implications. The security forces will be unable to correctly analyze the threat and design the appropriate response if the dataset is incomplete. Additionally, it will be harder to design appropriate risk education from the humanitarian perspective if both attributes are not clearly understood.

Risk is a precise mathematical term that considers both the probability of a particular incident occurring and the severity of its outcome. The containment of an IED and its size speaks directly to the severity of the potential outcome. A Unabomber-style letter bomb can potentially hurt one or two people: a van full of ammonium nitrate can bring down an entire federal building in Oklahoma, whereas the means of initiation speaks to the probability of the incidence.

Furthermore, good risk education processes discuss and suggest safe behavior. In order to do this, it is critical that the people designing the risk education programs have a good understanding of the typical means of initiation used in order to provide advice on indicators, safe behavior, and containment.8

As a result, a matrix is the suggested means of describing and recording IED incidents, rather than a simple list of terms (Figure 4).

Figure 4. DDG IED classification matrix.
Figure courtesy of the author.
Figure 4. DDG IED classification matrix.
Figure courtesy of the author.

Implications for Humanitarian Actors

There is clearly an overlap of IED, booby trap, and mine definitions. The terms are not interchangeable. The C-IED and HMA practitioners stand to benefit from recognizing this, as they set the basis for the rest of the taxonomy. Moreover, IEDs are only one part of a series of explosive and weapon-related hazards that might be faced in a particular country, including legacy ERW, attacks using factory-made weapons, and weapons used in other incidents of armed violence that are not terrorist or insurgency related. Classification of IED incidents, both in terms of containment and means of initiation, is important. By understanding the problem in terms of C-IED efforts, the community can appropriately target risk education messages with safe behavior.

As previously stated, while IEDs can consist of legacy weapons, they are unlike ERW (in the context of HMA) in that they are often active. While some countries may have fields of legacy improvised mines such as Sri Lanka, these are still the exception rather than the rule. The entire HMA sector is based on the assumption that when a conflict is over, the population will be united in wanting ERW removed. In an active conflict, clearance of active IEDs by HMA actors may be seen as a hostile act. While it may be possible for commercial civilian operators to deal with this, it is difficult for NGO actors to take a similar position. NGO personnel must already deal with the dilemma that they cannot be truly impartial, and an NGO that clears active IEDs is effectively taking part in the wider counterinsurgency. The security implications for the staff of that NGO are significant. Yet, some donors are asking NGOs to undertake IED disposal (IEDD); thus a wider understanding and discussion of the issues are critical for everyone’s clarity of purpose.

DDG has already looked at creating a more detailed risk analysis for organizations wishing to undertake IED risk education. Furthermore, DDG is working to understand the steps needed for a humanitarian organization considering whether or not to undertake IEDD as humanitarian action: both of which might merit further discussions in later papers. c

The original article first appeared in the Counter-IED Report, autumn 2016 edition. It has been edited for The Journal.


 

Biography

Robert Keeley Dr. Robert Keeley
Chief Technical Advisor
Danish Demining Group

Dr. Robert Keeley is a former British Army bomb disposal officer who has worked in humanitarian mine action since 1991. His work has taken him to many countries including Afghanistan, Bosnia, Cambodia Croatia, Kuwait, Libya, Mali, Nigeria, Somalia, and Yemen. His work has encompassed a wide range of mine action and explosive ordnance disposal activities, including design and provision of mine risk education projects and victim assistance. Between 2002 and 2006, he researched and completed a Ph.D. in Applied Environmental Economics at Imperial College, London. His thesis was entitled “The Economics of Landmine Clearance.” Since 2014 he has been the chief technical advisor for Danish Demining Group.

 

Endnotes

  1. British All Party Parliamentary Group on Explosive Weapons, 2015.
  2. International Mine Action Standards (IMAS) 04.10.
  3. 1997 Anti-Personnel Mine Ban Convention (“Ottawa Convention”). http://bit.ly/2kHbzf0.
  4. There are anecdotes of people using the overlap of these terms to justify the engagement of individuals (or military units) in ‘booby trap’ clearance when the people in question are not trained or normally expected to work to deal with IEDs.
  5. Jacobson, C. “ISAF Violence Statistics and Analysis Media Brief, Sept. 29, 2011.” NATO OTAN Afghanistan Resolute Support, 29 September 2011.
  6. In which case it might also be considered both a mine and a booby trap (see previous endnote).
  7. Together, these are known as the ‘MECE Principle.’ See Kahn, George. “Mutually Exclusive and Collectively Exhaustive: Survey Tips.” The Research Bunker, 27 April 2010. Accessed 20 January 2017. http://bit.ly/2cUDXGi.
  8. Such as to be aware of people wearing big coats in hot weather or leaving bags unattended in airports, etc.