Manchester Bomb Pics Leaked and Published

Police investigating the Manchester Arena bomb attack have stopped sharing information with the US after leaks to the media, the BBC understands. 

UK officials were outraged when photos appearing to show debris from the attack appeared in the New York Times.

Extraordinary details about the bomb used in the Manchester atrocity have been published in the New York Times, almost all of it forensic evidence gathered by the British police at the scene.

A series of photographs of the remains of the bomb, the detonator and what appeared to be a rucksack were leaked. The preliminary investigation by the police is extremely detailed, down to the belief that the killer, Salman Abedi, held the small detonator in his left hand.

Suspicion on who leaked it to the US-based reporter rested on US officials, who have been feeding a series of details about the Manchester bombing to American journalists.

Leaking such inside information from the investigation will add to tensions between the US and UK over the extent to which much of the investigation is being leaked by authorities in America.

The latest revelations came hours after the home secretary, Amber Rudd, expressed irritation with the US and expressed hope that the leaks would stop.

“The British police have been very clear that they want to control the flow of information in order to protect operational integrity, the element of surprise. So it is irritating if it gets released from other sources and I have been very clear with our friends that should not happen again,” the home secretary said.

Although her language was mild, it is rare for a UK politician to issue such a rebuke to the Americans.

Rudd called the US secretary of homeland security, John Kelly, on Tuesday May 23rd to ask for the leaks to stop. UK officials were stunned and angry on Wednesday when the crime scene photographs appeared in the New York Times. 

The photographs suggest the bomb was relatively sophisticated, requiring a degree of expertise. It contained a powerful explosive in a lightweight metal container. The pictures indicate it was carried in a blue rucksack made by the Karrimor outdoor company.

Such was the power of the blast that nuts and screws packed round the bomb penetrated doors and walls. Abedi stood in the middle of a crowd. The upper part of his body was thrown towards the entrance to the arena.

It was not a crudely made bomb, as among the evidence recovered was a Yuasa 12-volt, 2.1 amp lead-acid battery, which is more expensive than normal over-the-counter ones. The detonator appeared to have a small circuit board soldered inside one end.

There seemed to have been several options for detonating it, such as a simple manual switch or possibly remotely by a radio signal.

The latest disclosures come on top of a series of leaks from US officials about the British investigation, including the naming of the killer.

The leak of the British information, as well as demonstrating a lack of respect for a US ally at an emotional time, will have hindered the investigation, where it is deemed essential to control the release of details.

UK counter-terrorism specialists said they needed to keep secret the name of any perpetrator or suspect for at least 36 hours to ensure there was an element of surprise in approaching relatives, friends and others.

The home secretary reflected the frustration and dismay of the UK security services in a series of interviews on Wednesday May 24th.


Adding to the sense of anger in the UK were further leaks from an NBC reporter who quoted US intelligence officials providing other details about the killer.

The reporter Richard Engel of NBC tweeted details not released by the UK. Engel said US intelligence officers told him family members of the killer, Salman Abedi, had warned UK security officials about him and had described him as dangerous.

The intelligence community has long been uncomfortable about revelations from its recent past made in books and articles, but the release of details of a live investigation on the scale of those by the US and France is a relatively new phenomenon.

It comes on top of Donald Trump’s release of intelligence to Russia that had been passed on by Israel, which had obtained it from an Arab country.

American officials in Washington briefed US journalists early on Tuesday 23rd May about the number of dead, confirming that it was a suicide bombing and, hours later, the name of the killer. The UK had not been planning to release the name so early.

The UK’s reluctance to identify the assailant was evident because it took hours after his name was circulating in the US media before Greater Manchester police confirmed it.

One of the basic tenets of intelligence sharing is that other agencies do not disclose it. The problem is that those intelligence agencies, whether American or French, pass it up to their presidents, prime ministers and departmental ministers. In the past, that secrecy was respected.

After the leaks, it could be tempting for UK police and intelligence services to stop sharing sensitive information, although Britain relies heavily on the US sharing its intelligence and benefits from intelligence, especially on counter-terrorism, from European colleagues such as France and Germany.

Adding to the impression of western security services as uncoordinated and amateurish, the French interior minister, Gérard Collomb, then told French television on Wednesday that Abedi had been in Libya and possibly Syria, information UK police had not disclosed.

The top Democrat on the House intelligence committee, Adam Schiff, said he did not know the source but insisted it was not from Congress, as members and their staffs had not been briefed.

Schiff, who is a driving force behind the congressional investigation into the Trump campaign’s links with Russia, said: “We should have been very careful and respectful of the British investigation and the timing which the British felt was in their investigative interests in releasing that. That should have been their discretion not ours. If that is something we did, I think that’s a real problem.”

BBC:     Guardian:     

You Might Also Read: 

Social Media Reaction To The London Terror Attack:

Facial Recognition Might Stop the Next Brussels:

 

« Mini Robots Support Soldiers
Robot Police Officer Goes On duty in Dubai »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.