Feeds

Scientists flee Home Office after adviser sacking

Nutt up or shut up

High performance access to file storage

The Home Office faces mass resignations by its consulting scientists after its clumsy gagging attempt on top drug adviser David Nutt.

Home Secretary Alan Johnson sacked Nutt on Friday apparently for disagreeing with government policy, which has effectively ignored the advice of the Advisory Council on the Misuse of Drugs, which Professor Nutt chaired.

Two members of the council - Marion Walker and Dr Les King, formerly head of the Drugs Intelligence Unit in the Forensic Science Service - have already quit. King told the BBC that Nutt was being denied freedom of expression.

He said the affair brought into question why experts should continue to give advice which was "completely ignored". He said there was a risk the council would effectively collapse.

The affair has raised the issue of government arrogance in how it treats its scientific advisers and refuses to follow evidence-based policy.

Nutt's comment that horse riding was more dangerous than taking ecstasy was rejected by Johnson as a "political rather than a scientific point".

In its original report the ACMD found that horse riding caused acute harm to a person once in 350 episodes while ecstasy caused acute harm once in 10,000 episodes - which sounds to us like maths, not politics.

Jacqui Smith opted to ignore the committee's findings on ecstasy earlier this year. She also listened carefully to the committee's views on the classification of cannabis, and acted accordingly.

The Home Office said Nutt's comments undermined the role of the council and its scientific independence.

The statement said: "We fully support the work of the ACMD and remain committed to considering the independent advice and evidence it and other advisory bodies provide to the Government. However the clear role of the chair of the ACMD is to provide independent scientific advice and not to lobby for changes in policy."®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.