Feeds

Letter bombs: an expert writes

Reg UXB man delivers the facts

Using blade systems to cut costs and sharpen efficiencies

People and groups of this kind very seldom have access to proper manufactured explosives, which is another comforting factor when dealing with postals. A victim can still be badly hurt (blindings and severe burns aren't uncommon: letter-bombers are still violent criminals) but it does mean that protective gear can be very effective.

Pleasingly, it also means that a bomb-disposal operator may be able to get permission for a manual render-safe procedure: that is, he may be allowed to cut into the package and actually snip a wire in true movie-hero style, rather than going for the safer, more prosaic remote disruptor shot. This will permit him to become an insufferably smug bore in bomb-disposal bars for the rest of his life.

For all these reasons, most bomb-disposal ops pretty much live for the day when they may encounter a live postal device. The rest of us normally have a rather different viewpoint, but on the whole there's no great need to worry about letter bombs – even if your job does involve opening mail for someone unpopular.

Nearly every postal has a visible giveaway of some kind (the MI5 guidance is perfectly OK, though in classic British government style the relevant webpage seems to be down right now. However, a pdf booklet with a section on postals is still available).

If you've got the least doubt, don't open it, it's as simple as that. Very few things that come by post are so critical they can't wait for a bit. An X-ray will soon let you know if there's a problem. If your organisation is too stingy to spring for an X-ray scanner, don't fret: just put the suspect package to one side, call the cops and carry on working. Someone will eventually come round and X-ray your suspect pile for you, though you'll probably have to wait a while in the UK just at the moment.

The only cases where you might not want to be in the room with a dodgy package is if it was brought by a courier service with guaranteed delivery timings, or dropped off by hand, or if you've opened it. In that case, get everyone well away from it and keep them away, and call the cops – making clear that the thing isn't an unopened postal. You should get quicker service that way.

A lot of people feel a mysterious urge to put suspect items in buckets of water; don't do that, it doesn't help. If the courier guys arrive well ahead of their guaranteed deadline, you can make a judgement call whether you want to put the delivery somewhere more convenient before you cordon it off. There might be a place nearby where a smallish explosion wouldn't be that big a deal.

In the end, though, you've got to keep these things in perspective. Even if you're a mail-opener by trade, should you die today, chances are it'll be a traffic accident or a heart attack that gets you, not a letter-bomb. You'd probably improve your life expectancy more drinking red wine than you would swotting up on the MI5 advice, and it'd be a lot more fun too. ®

Lewis Page spent several years as a military bomb-disposal operator tasked in support of the UK police. He attended more than 200 incidents, a number of which involved actual explosives – though sadly, never a postal. Other highlights of his service included commando training with the Royal Marines, and the opportunity to render safe bona-fide "weapons of mass destruction". Disappointingly, these WMDs were discovered in Wales rather than any sunnier clime. On leaving the service he wrote a book, Lions, Donkeys and Dinosaurs: Waste and Blundering in the British Armed Forces, which was so successful that it is now almost impossible to obtain, though a paperback is forthcoming. Page can be found on the web at www.lewispage.co.uk.

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.