Feeds

Police detain Tariq Aziz's cigar case

Boris Johnson relieved of the spoils of war

Seven Steps to Software Security

London mayor Boris Johnson has been forcibly relieved of a cigar case formerly belonging to Tariq Aziz under the Iraq (UN Sanctions) Order 2003 which demands that "anyone possessing Iraqi cultural property must give it to the police", as the BBC puts it.

Johnson apparently found the case in the rubble of Aziz's bombed-out Baghdad house while visiting Iraq as a hack in 2003. Writing in the Telegraph, he recounted: "As I stared at the remains of his home, I saw utter destruction - surely the looters had left nothing of value? And there, just by my toe, protruding from beneath a piece of dusty plywood, was the cigar case.

"Actually, it was only the bottom half of a cigar case, in thick red leather and coarsely stitched. But I immediately saw its importance. If this was the cigar case of Tariq Aziz, think of the scenes it had witnessed."

The blond Tory bombshell claims he "subsequently received a letter from Mr Aziz offering the case as a gift", a defence which evidently didn't impress the "Labour stooges" who, having learned of the booty in an article Johnson wrote about it, demanded police action.

Cops duly informed Johnson to hand over the offending item for detention pending "further enquiries". The mayor obliged, and yesterday "deposited the case into custody". He said: "I briefly toyed with making a fuss, and pointing out how utterly selfish and stupid it was of Labour to waste police time on this kind of thing."

Johnson added: "Just when the police are trying to focus on beating knife crime and making the streets safe, they are told they must lavish money and manpower on a preposterous investigation that will do nothing for the security of the public."

And for good measure, having demanded to know why Tony Blair had not been "brought to book" over the Iraq war, Johnson concluded: "I am informed by my friends in the Metropolitan Police that I am shortly to become the one and only Western politician to be brought to justice for crimes committed in Iraq."

A police spokesman explained: "The Met works very closely with a number of countries, including Iraq, to recover items that are considered culturally significant. In order to establish the origin and potential significance of the item, such items must be submitted to police custody for further examination."

The 2003 UN order is enforced unless the owner of an item "can prove they were not aware that the property was illegally removed from Iraq". Johnson descibed the circumstances surrounding his acquisition of the cigar case as "so morally ambiguous that I cannot quite think of it as theft". ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.