Feeds

Suicide bum-blast bombing startles Saudi prince

Fundamentalist fundament mentalist strikes

Securing Web Applications Made Simple and Scalable

Anal-ysis It has emerged that a fanatical al-Qaeda suicide terrorist attempted to kill a Saudi interior minister last month by concealing a bomb up his bottom (the terrorist's, not the minister's). The strategy backfired, so to speak, as the bum-bomber's own body muffled the deadly arse-blast and his target escaped with only minor injuries.

Reports of the attack, in which fundamentalist fundament mentalist Abdullah Hassan Tali' al-Asiri - aka Abul-Khair - attempted to assassinate Saudi Prince Mohammed bin Nayef, broke last month. However, media including Al-Arabiya TV and the Sun have now further newsened-up the story by revealing details of al-Asiri's method of smuggling the explosives through the Prince's security.

It appears that al-Asiri gained access to the Prince by surrendering to Saudi forces near the Yemeni border, saying he wanted to give himself up but insisting that he must do so face to face with bin Nayef personally. The Prince's guards apparently failed to detect that the 23-year-old fanatic had stuffed an unspecified amount of TNT and a firing system of some type up his arse, which he detonated once in the room where bin Nayef was receiving visitors in Jeddah.

Reportedly the Prince - who appropriately in this context is deputy interior minister for security - sustained only a minor injury to his hand during the presumably extremely messy explosion which followed. Other people present in the room were also largely unharmed, with the deceased buttock-bomb operative the only casualty.

"He surprised me by blowing himself up," the Saudi bigwig reportedly told al-Arabiya, in a masterpiece of understated commentary.

We here on the Reg bomb-disposal desk would suggest that the failed operation tends to illustrate the generally poor skills of al-Qaeda terrorists. You don't have to be an explosives expert to know that a human body can stifle a grenade explosion very effectively, after all. Even a mercilessly trained operative of exceptional capacities would probably struggle to deliver a payload a lot bigger than a grenade using al-Asiri's eyewatering poo-chute portage method.

Of course we can only speculate regarding the firing system furnished by the back-alley bomb makers who stood behind the young terrorist. An internal mechanical timer device would perhaps be simplest, though there could be a risk of sharp-eared guards noticing a ticking sound coming from one's arse with such a method. Electrical firing circuits are much more common in terrorist devices, though the need to carry a fairly substantial battery internally would place even heavier demands on the kami-khazi operative as he prepared for his mission.

In the interests of good taste we aren't even going to get into possible methods of providing a manual firing switch, use of external power sources such as wall sockets or light fittings once in the target room etc etc.

We would note though that in order to deploy a charge actually capable of working from within an enemy within you'd need to fill up quite a lot of the body. This is theoretically possible - a gutsy bomber could conceivably quaff huge quantities of liquid main-charge explosives and then perhaps swallow a detonating device.

It still seems pretty unfeasible, however. The Tang part of current liquid mixes wouldn't be too much of problem, but the peroxide concentrate would be likely to finish the belly-bomber off before it even exploded - or anyway cause one or another kind of inadvertent payload-jettison unpleasantness. Then there'd be the risk that stomach acids would render the charge ineffective, or make it explode early etc.

Bottom line on this threat? Nothing to get anyone's bowels in an uproar. Move along: nothing you even want to see here... ®

Lewis Page was a improvised-device disposal operator tasked in support of the UK mainland police from 2001-2004. Fortunately for him the internal threat at that time was minimal.

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.