Feeds

Pants bombs vs America: The infernal conflict

Why the nether regions are not a good place to pack explosives

SANS - Survey on application security programs

It was reckoned a chemical fuse had been used for detonation.

Another story from multiple sources told of a man in Somalia who had tried to board a plane in Mogadishu with a syringe, a bag of explosive and a liquid. Occurring in November, it had apparently been ignored in the US. But the confluence of stories points to underwear bomb plans being deployed around the Horn of Africa prior to the Detroit incident. And not only did they not work well, news of them was also around.

"PETN is the explosive core of Primacord, where it develops a velocity rate of 21,000 feet per second," reads one informal vendor paper, Analysis of Odors from Explosives using an Electronic Nose.

"Detonating cord is insensitive to friction and ordinary shock, but may be exploded by rifle fire. It also detonates sympathetically with the detonation of an adjacent high explosive."

This seems to cast some light on why underwear bomb chemical fuses aren't the select choice in improvised detonation. Having said all this, the possibility exists that it will work some day.

For example, there are pages and pages of rickety chemistry experiments in books like The Poor Man's James Bond, with variations on the use of sulphuric acid, chlorates, perchlorates and other inflammables, suitable for some time of chemical incendiary. There are still more pages on how to make a variety of improvised chemical fuses using small quantities of white phosphorus (although this would be a tricky handle), permanganate, powdered aluminium and sulphur. All this was originally taken from US Army manuals and copied around the world many times.

Where can one hide such materials now that the cat is out of the bag with regards to underwear? Folds of fat on an obese person?

In the paranoid atmosphere of oversurveillance, it doesn't take much work to imagine a classified memo at the Dept of Homeland Security or the TSA warning to be on the lookout for the bizarre-looking terrorists masquerading as ostomate patients, even though such people are generally not young men.

"A urostomy or colostomy bag and its tubing could give cover for small amounts of PETN and chemical fusing," it might go. "Such things have the additional value of being designed to prevent unseemly leaks and odors although not designed for compounds more active than those produced by the human body."

This writer remains a bit skeptical of the rectum as a good hiding place. Too damp, and making it too easy to intoxicate, fatally debilitate or cramp the mule during delivery. Money in the 'plan', a la Papillon is one thing. Incendiary compounds are quite another.

However, the dilemma is clear.

Human error being always guaranteed, on both sides, no amount of technology - whole body scanners, electric noses, bomb-sniffing machines and expanded computerized watch lists (particularly in the hands of the US, where laymen have been conditioned to view them as magic wands) - can wholly stop men with improvised chemistry experiments in their private places. Yet no public official, under risk of being fired, can speak of this obvious thing.

In fact, one might theorize there's a practical limit achieved in which the complexity inherent in the accumulation of security systems and data and the limiting human capital required to operate and sift it erases any theoretical benefits and gains beyond a certain point. And that's a place on the graph we are already past. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.