Feeds

Met staffer arrested over Al Qaeda terror report leak

JTAC report 'passed to newspaper'

The Power of One eBook: Top reasons to choose HP BladeSystem

A civilian member of Metropolitan Police Service staff, Thomas Lund-Lack, was arrested last night in connection with the leaking of information to a reporter.

Lund-Lack is due to appear at Westminster Magistrates Court today, charged with breaches of the Official Secrets Act and misconduct. He is claimed to have passed an intelligence report claiming that Al Qaeda was planning a UK attack on "a par with Hiroshima and Nagasaki" to the Sunday Times.

The Sunday Times ran a story to this effect on 22 April, claiming that it had been passed a report compiled by JTAC (Joint Terrorism Analysis Centre).

Even by the woeful standards of the current generation of terror scares, this story set new standards for implausibility. If this really is the sort of thing JTAC reports say, then we're in deep doo and the spooks have pretty well abandoned all attempts to maintain narrative integrity.

The alleged report was said to claim that Al Qaeda (Sunni, Arab) was "active in Iran" (Shiite, Iranian) and was planning "large scale" terrorist attacks on Britain and other western targets "with the help of supporters in Iran". The Sunday Times makes a passing nod to the infinite implausibility of this double act by saying there is "no evidence of a formal relationship between Al-Qaeda, a Sunni group, and the Shi’ite regime of President Mah-moud Ahmadinejad" but "experts suggest that Iran's leaders may be turning a blind eye to the terrorist organisation's activities."

The reference to Hiroshima and Nagasaki, meanwhile, is alleged to have been made by a member of Al Qaeda in Iraq's network in Kurdish Iran, describing an operation assessed by the report as "most likely to be a large-scale, mass casualty attack against the West". Using, one presumes, radioactive material diverted from a secret Revolutionary Guard smoke detector factory in Iranian Kurdistan.

Lund-Lack's arrest comes in the wake of an attack mounted on leakers by Met terror chief Peter Clarke. In a speech last month, Clarke complained of "a small number...of misguided individuals who betray confidences. Perhaps they look to curry favour with certain journalists, or to squeeze out some short term presentational advantage - I do not know what motivates them".

The particular leak (of information concerning raids that were currently in progress) Clarke had in mind had already been the subject of police complaints two months previously, but it was this second assault that set opposition parties off in search of a scalp.

Clarke's complaints did, however, cause a certain amount of eye-rolling, the Met complaining about leaks being rather like bears bitching about forest sanitary arrangements. Perplexingly, all sorts of information supportive of the Met's position seems to leak out of terror investigations and fall into the hands of reporters, and often quite a lot of it turns out to be entirely wrong (see, for example, the reporting in the immediate aftermaths of the Forest Gate raid and the shooting of Jean Charles de Menezez).

The Met hierarchy seems not to complain about these incidents, nor have there been many complaints about the numerous terror screamers citing leaked documents previously published by, er, the Sunday Times. If Clarke is serious about ending leaks, it seems inescapable that a lot of senior police and security sources are going to have to spend a lot of time helping themselves with their enquiries. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.