Manchester Bomb Pics Leaked and Published

Police investigating the Manchester Arena bomb attack have stopped sharing information with the US after leaks to the media, the BBC understands. 

UK officials were outraged when photos appearing to show debris from the attack appeared in the New York Times.

Extraordinary details about the bomb used in the Manchester atrocity have been published in the New York Times, almost all of it forensic evidence gathered by the British police at the scene.

A series of photographs of the remains of the bomb, the detonator and what appeared to be a rucksack were leaked. The preliminary investigation by the police is extremely detailed, down to the belief that the killer, Salman Abedi, held the small detonator in his left hand.

Suspicion on who leaked it to the US-based reporter rested on US officials, who have been feeding a series of details about the Manchester bombing to American journalists.

Leaking such inside information from the investigation will add to tensions between the US and UK over the extent to which much of the investigation is being leaked by authorities in America.

The latest revelations came hours after the home secretary, Amber Rudd, expressed irritation with the US and expressed hope that the leaks would stop.

“The British police have been very clear that they want to control the flow of information in order to protect operational integrity, the element of surprise. So it is irritating if it gets released from other sources and I have been very clear with our friends that should not happen again,” the home secretary said.

Although her language was mild, it is rare for a UK politician to issue such a rebuke to the Americans.

Rudd called the US secretary of homeland security, John Kelly, on Tuesday May 23rd to ask for the leaks to stop. UK officials were stunned and angry on Wednesday when the crime scene photographs appeared in the New York Times. 

The photographs suggest the bomb was relatively sophisticated, requiring a degree of expertise. It contained a powerful explosive in a lightweight metal container. The pictures indicate it was carried in a blue rucksack made by the Karrimor outdoor company.

Such was the power of the blast that nuts and screws packed round the bomb penetrated doors and walls. Abedi stood in the middle of a crowd. The upper part of his body was thrown towards the entrance to the arena.

It was not a crudely made bomb, as among the evidence recovered was a Yuasa 12-volt, 2.1 amp lead-acid battery, which is more expensive than normal over-the-counter ones. The detonator appeared to have a small circuit board soldered inside one end.

There seemed to have been several options for detonating it, such as a simple manual switch or possibly remotely by a radio signal.

The latest disclosures come on top of a series of leaks from US officials about the British investigation, including the naming of the killer.

The leak of the British information, as well as demonstrating a lack of respect for a US ally at an emotional time, will have hindered the investigation, where it is deemed essential to control the release of details.

UK counter-terrorism specialists said they needed to keep secret the name of any perpetrator or suspect for at least 36 hours to ensure there was an element of surprise in approaching relatives, friends and others.

The home secretary reflected the frustration and dismay of the UK security services in a series of interviews on Wednesday May 24th.


Adding to the sense of anger in the UK were further leaks from an NBC reporter who quoted US intelligence officials providing other details about the killer.

The reporter Richard Engel of NBC tweeted details not released by the UK. Engel said US intelligence officers told him family members of the killer, Salman Abedi, had warned UK security officials about him and had described him as dangerous.

The intelligence community has long been uncomfortable about revelations from its recent past made in books and articles, but the release of details of a live investigation on the scale of those by the US and France is a relatively new phenomenon.

It comes on top of Donald Trump’s release of intelligence to Russia that had been passed on by Israel, which had obtained it from an Arab country.

American officials in Washington briefed US journalists early on Tuesday 23rd May about the number of dead, confirming that it was a suicide bombing and, hours later, the name of the killer. The UK had not been planning to release the name so early.

The UK’s reluctance to identify the assailant was evident because it took hours after his name was circulating in the US media before Greater Manchester police confirmed it.

One of the basic tenets of intelligence sharing is that other agencies do not disclose it. The problem is that those intelligence agencies, whether American or French, pass it up to their presidents, prime ministers and departmental ministers. In the past, that secrecy was respected.

After the leaks, it could be tempting for UK police and intelligence services to stop sharing sensitive information, although Britain relies heavily on the US sharing its intelligence and benefits from intelligence, especially on counter-terrorism, from European colleagues such as France and Germany.

Adding to the impression of western security services as uncoordinated and amateurish, the French interior minister, Gérard Collomb, then told French television on Wednesday that Abedi had been in Libya and possibly Syria, information UK police had not disclosed.

The top Democrat on the House intelligence committee, Adam Schiff, said he did not know the source but insisted it was not from Congress, as members and their staffs had not been briefed.

Schiff, who is a driving force behind the congressional investigation into the Trump campaign’s links with Russia, said: “We should have been very careful and respectful of the British investigation and the timing which the British felt was in their investigative interests in releasing that. That should have been their discretion not ours. If that is something we did, I think that’s a real problem.”

BBC:     Guardian:     

You Might Also Read: 

Social Media Reaction To The London Terror Attack:

Facial Recognition Might Stop the Next Brussels:

 

« Mini Robots Support Soldiers
Robot Police Officer Goes On duty in Dubai »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.

Bluecyber Insurance

Bluecyber Insurance

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses.