Feeds

Suicide bum-blast bombing startles Saudi prince

Fundamentalist fundament mentalist strikes

High performance access to file storage

Anal-ysis It has emerged that a fanatical al-Qaeda suicide terrorist attempted to kill a Saudi interior minister last month by concealing a bomb up his bottom (the terrorist's, not the minister's). The strategy backfired, so to speak, as the bum-bomber's own body muffled the deadly arse-blast and his target escaped with only minor injuries.

Reports of the attack, in which fundamentalist fundament mentalist Abdullah Hassan Tali' al-Asiri - aka Abul-Khair - attempted to assassinate Saudi Prince Mohammed bin Nayef, broke last month. However, media including Al-Arabiya TV and the Sun have now further newsened-up the story by revealing details of al-Asiri's method of smuggling the explosives through the Prince's security.

It appears that al-Asiri gained access to the Prince by surrendering to Saudi forces near the Yemeni border, saying he wanted to give himself up but insisting that he must do so face to face with bin Nayef personally. The Prince's guards apparently failed to detect that the 23-year-old fanatic had stuffed an unspecified amount of TNT and a firing system of some type up his arse, which he detonated once in the room where bin Nayef was receiving visitors in Jeddah.

Reportedly the Prince - who appropriately in this context is deputy interior minister for security - sustained only a minor injury to his hand during the presumably extremely messy explosion which followed. Other people present in the room were also largely unharmed, with the deceased buttock-bomb operative the only casualty.

"He surprised me by blowing himself up," the Saudi bigwig reportedly told al-Arabiya, in a masterpiece of understated commentary.

We here on the Reg bomb-disposal desk would suggest that the failed operation tends to illustrate the generally poor skills of al-Qaeda terrorists. You don't have to be an explosives expert to know that a human body can stifle a grenade explosion very effectively, after all. Even a mercilessly trained operative of exceptional capacities would probably struggle to deliver a payload a lot bigger than a grenade using al-Asiri's eyewatering poo-chute portage method.

Of course we can only speculate regarding the firing system furnished by the back-alley bomb makers who stood behind the young terrorist. An internal mechanical timer device would perhaps be simplest, though there could be a risk of sharp-eared guards noticing a ticking sound coming from one's arse with such a method. Electrical firing circuits are much more common in terrorist devices, though the need to carry a fairly substantial battery internally would place even heavier demands on the kami-khazi operative as he prepared for his mission.

In the interests of good taste we aren't even going to get into possible methods of providing a manual firing switch, use of external power sources such as wall sockets or light fittings once in the target room etc etc.

We would note though that in order to deploy a charge actually capable of working from within an enemy within you'd need to fill up quite a lot of the body. This is theoretically possible - a gutsy bomber could conceivably quaff huge quantities of liquid main-charge explosives and then perhaps swallow a detonating device.

It still seems pretty unfeasible, however. The Tang part of current liquid mixes wouldn't be too much of problem, but the peroxide concentrate would be likely to finish the belly-bomber off before it even exploded - or anyway cause one or another kind of inadvertent payload-jettison unpleasantness. Then there'd be the risk that stomach acids would render the charge ineffective, or make it explode early etc.

Bottom line on this threat? Nothing to get anyone's bowels in an uproar. Move along: nothing you even want to see here... ®

Lewis Page was a improvised-device disposal operator tasked in support of the UK mainland police from 2001-2004. Fortunately for him the internal threat at that time was minimal.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.