Manchester Bomb Pics Leaked and Published

Police investigating the Manchester Arena bomb attack have stopped sharing information with the US after leaks to the media, the BBC understands. 

UK officials were outraged when photos appearing to show debris from the attack appeared in the New York Times.

Extraordinary details about the bomb used in the Manchester atrocity have been published in the New York Times, almost all of it forensic evidence gathered by the British police at the scene.

A series of photographs of the remains of the bomb, the detonator and what appeared to be a rucksack were leaked. The preliminary investigation by the police is extremely detailed, down to the belief that the killer, Salman Abedi, held the small detonator in his left hand.

Suspicion on who leaked it to the US-based reporter rested on US officials, who have been feeding a series of details about the Manchester bombing to American journalists.

Leaking such inside information from the investigation will add to tensions between the US and UK over the extent to which much of the investigation is being leaked by authorities in America.

The latest revelations came hours after the home secretary, Amber Rudd, expressed irritation with the US and expressed hope that the leaks would stop.

“The British police have been very clear that they want to control the flow of information in order to protect operational integrity, the element of surprise. So it is irritating if it gets released from other sources and I have been very clear with our friends that should not happen again,” the home secretary said.

Although her language was mild, it is rare for a UK politician to issue such a rebuke to the Americans.

Rudd called the US secretary of homeland security, John Kelly, on Tuesday May 23rd to ask for the leaks to stop. UK officials were stunned and angry on Wednesday when the crime scene photographs appeared in the New York Times. 

The photographs suggest the bomb was relatively sophisticated, requiring a degree of expertise. It contained a powerful explosive in a lightweight metal container. The pictures indicate it was carried in a blue rucksack made by the Karrimor outdoor company.

Such was the power of the blast that nuts and screws packed round the bomb penetrated doors and walls. Abedi stood in the middle of a crowd. The upper part of his body was thrown towards the entrance to the arena.

It was not a crudely made bomb, as among the evidence recovered was a Yuasa 12-volt, 2.1 amp lead-acid battery, which is more expensive than normal over-the-counter ones. The detonator appeared to have a small circuit board soldered inside one end.

There seemed to have been several options for detonating it, such as a simple manual switch or possibly remotely by a radio signal.

The latest disclosures come on top of a series of leaks from US officials about the British investigation, including the naming of the killer.

The leak of the British information, as well as demonstrating a lack of respect for a US ally at an emotional time, will have hindered the investigation, where it is deemed essential to control the release of details.

UK counter-terrorism specialists said they needed to keep secret the name of any perpetrator or suspect for at least 36 hours to ensure there was an element of surprise in approaching relatives, friends and others.

The home secretary reflected the frustration and dismay of the UK security services in a series of interviews on Wednesday May 24th.


Adding to the sense of anger in the UK were further leaks from an NBC reporter who quoted US intelligence officials providing other details about the killer.

The reporter Richard Engel of NBC tweeted details not released by the UK. Engel said US intelligence officers told him family members of the killer, Salman Abedi, had warned UK security officials about him and had described him as dangerous.

The intelligence community has long been uncomfortable about revelations from its recent past made in books and articles, but the release of details of a live investigation on the scale of those by the US and France is a relatively new phenomenon.

It comes on top of Donald Trump’s release of intelligence to Russia that had been passed on by Israel, which had obtained it from an Arab country.

American officials in Washington briefed US journalists early on Tuesday 23rd May about the number of dead, confirming that it was a suicide bombing and, hours later, the name of the killer. The UK had not been planning to release the name so early.

The UK’s reluctance to identify the assailant was evident because it took hours after his name was circulating in the US media before Greater Manchester police confirmed it.

One of the basic tenets of intelligence sharing is that other agencies do not disclose it. The problem is that those intelligence agencies, whether American or French, pass it up to their presidents, prime ministers and departmental ministers. In the past, that secrecy was respected.

After the leaks, it could be tempting for UK police and intelligence services to stop sharing sensitive information, although Britain relies heavily on the US sharing its intelligence and benefits from intelligence, especially on counter-terrorism, from European colleagues such as France and Germany.

Adding to the impression of western security services as uncoordinated and amateurish, the French interior minister, Gérard Collomb, then told French television on Wednesday that Abedi had been in Libya and possibly Syria, information UK police had not disclosed.

The top Democrat on the House intelligence committee, Adam Schiff, said he did not know the source but insisted it was not from Congress, as members and their staffs had not been briefed.

Schiff, who is a driving force behind the congressional investigation into the Trump campaign’s links with Russia, said: “We should have been very careful and respectful of the British investigation and the timing which the British felt was in their investigative interests in releasing that. That should have been their discretion not ours. If that is something we did, I think that’s a real problem.”

BBC:     Guardian:     

You Might Also Read: 

Social Media Reaction To The London Terror Attack:

Facial Recognition Might Stop the Next Brussels:

 

« Mini Robots Support Soldiers
Robot Police Officer Goes On duty in Dubai »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.