Feeds

Renewing the mythology of the London ricin cell

Not worth a tin full of beans

Designing a Defense for Mobile Applications

Analysis A significant and noticeable part of the US and European academy of terrorism studies is like a shark. If it stops swimming forward, it dies. This has two consequences: a drive to publish or perish which, in turn, motivates it to creep onto past battlefields, assessing which bodies can be ignored for the sake of renewing mythologies; or new terror analyses that purport to show Byzantine networks and capabilities.

As an example from the dog days of summer, we consider an article entitled "The London Ricin Cell," written by Glen Segell of London for the August edition of Strategic Insights, succinctly self-described as "a bi-monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California."

"The London Ricin Cell" rewrites most of what is now commonly accepted about the case of Kamel Bourgass in favour of a more soberly stated (by dint of its academic structure) reiteration of the sensational al Qaeda poison team legend as writ large in pieces such as the Daily Mirror's "It's Here" skull-and-crossbones cover story in January of 2003.

Lost from this analysis, too, are a pair of important hard facts: that only a trivial number of castor beans - 22, virtually all of them in a jewellery tin - were discovered; and that an initial positive reading for ricin in the flat was a false one. Because of a combination of bureaucratic bumbling, obfuscation and UK gag orders, these findings were not revealed until 2005.

While claims about a ricin network that stretched from London to Iraq and al Qaeda hideouts in Afghanistan were washed away by the jury trial, UK government sources simply repeated them for news coverage at the conclusion of the case.

As a senior fellow for GlobalSecurity.Org, I had contributed some relevant materials and information on ricin recipes to Duncan Campbell, a forensic scientist who was providing expert work for the defense. This gave me access to court evidence - the poison formulas of Bourgass, among other information - and as a consequence I was able to publish on the trial in the US before the British press were permitted to go forward with the story.

The result was that many American and British journalists consulted what was published at GlobalSecurity and either phoned or e-mailed with questions. While this was happening it became apparent the UK government was spinning the result of the ricin trial. It was a determined and seemingly very well-orchestrated campaign and it met with some success.

Nick Fielding, a Times of London security correspondent had been in e-mail contact with me and explained that a bigwig from the Met's counter-terror team had been around to see the newspaper's higher-ups with its version of events. As a consequence there was little appetite for a story which ran counter to prosecution tellings.

The results were atrocious. In the United States, those few news organizations which devoted time to the ricin trial simply cast the impression that a jury had gone renegade, setting free terrorists who were a threat. A favorite quote, one emitted during the trial by prosecutor Nigel Sweeney, was often repeated. The notes of Kamel Bourgass, said Sweeney, "[Were] no playtime recipes ... These are recipes that experts give credence to and experiments show work."

In fact, they were quite the opposite and to prove it, we subsequently published the court's translated copies on the web with explanations of their provenance and meaning.

For "The London Ricin Cell" article, all the hysterical and subsequently unfounded speculation delivered by Colin Powell at the UN Security Council and later in statements from Bush administration mouthpiece Ari Fleischer and Joint Chief General Richard B. Myers on ricin floating between Iraq, London and Europe is republished, fundamentally without noting there was no substance to attach to it.

This is done as part of a larger argument that makes the case for the alleged ricin ring as an example of a "WMD proliferation network" connected with organized crime and "warlordism".

The Strategic Insights article writes that: "To sustain that the London Ricin Cell was a WMD proliferation network" it was allegedly determined that the ricin recipe was the same as a recipe of found in Afghanistan, among many other places.

In fact, the recipe was not the same. To understand this one must know that ricin recipes found in jihadi literature descend from two American sources - Kurt Saxon in a pamphlet called "The Weaponeer" in 1984, later in his "The Poor Man's James Bond, Vol. 3," in 1988, and Maxwell Hutchkinson's "The Poisoner's Handbook," also published in 1988. I furnished copies of these materials to Campbell and, by definition, the British court.

Application security programs and practises

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.