Renewing the mythology of the London ricin cell

Not worth a tin full of beans


Analysis A significant and noticeable part of the US and European academy of terrorism studies is like a shark. If it stops swimming forward, it dies. This has two consequences: a drive to publish or perish which, in turn, motivates it to creep onto past battlefields, assessing which bodies can be ignored for the sake of renewing mythologies; or new terror analyses that purport to show Byzantine networks and capabilities.

As an example from the dog days of summer, we consider an article entitled "The London Ricin Cell," written by Glen Segell of London for the August edition of Strategic Insights, succinctly self-described as "a bi-monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California."

"The London Ricin Cell" rewrites most of what is now commonly accepted about the case of Kamel Bourgass in favour of a more soberly stated (by dint of its academic structure) reiteration of the sensational al Qaeda poison team legend as writ large in pieces such as the Daily Mirror's "It's Here" skull-and-crossbones cover story in January of 2003.

Lost from this analysis, too, are a pair of important hard facts: that only a trivial number of castor beans - 22, virtually all of them in a jewellery tin - were discovered; and that an initial positive reading for ricin in the flat was a false one. Because of a combination of bureaucratic bumbling, obfuscation and UK gag orders, these findings were not revealed until 2005.

While claims about a ricin network that stretched from London to Iraq and al Qaeda hideouts in Afghanistan were washed away by the jury trial, UK government sources simply repeated them for news coverage at the conclusion of the case.

As a senior fellow for GlobalSecurity.Org, I had contributed some relevant materials and information on ricin recipes to Duncan Campbell, a forensic scientist who was providing expert work for the defense. This gave me access to court evidence - the poison formulas of Bourgass, among other information - and as a consequence I was able to publish on the trial in the US before the British press were permitted to go forward with the story.

The result was that many American and British journalists consulted what was published at GlobalSecurity and either phoned or e-mailed with questions. While this was happening it became apparent the UK government was spinning the result of the ricin trial. It was a determined and seemingly very well-orchestrated campaign and it met with some success.

Nick Fielding, a Times of London security correspondent had been in e-mail contact with me and explained that a bigwig from the Met's counter-terror team had been around to see the newspaper's higher-ups with its version of events. As a consequence there was little appetite for a story which ran counter to prosecution tellings.

The results were atrocious. In the United States, those few news organizations which devoted time to the ricin trial simply cast the impression that a jury had gone renegade, setting free terrorists who were a threat. A favorite quote, one emitted during the trial by prosecutor Nigel Sweeney, was often repeated. The notes of Kamel Bourgass, said Sweeney, "[Were] no playtime recipes ... These are recipes that experts give credence to and experiments show work."

In fact, they were quite the opposite and to prove it, we subsequently published the court's translated copies on the web with explanations of their provenance and meaning.

For "The London Ricin Cell" article, all the hysterical and subsequently unfounded speculation delivered by Colin Powell at the UN Security Council and later in statements from Bush administration mouthpiece Ari Fleischer and Joint Chief General Richard B. Myers on ricin floating between Iraq, London and Europe is republished, fundamentally without noting there was no substance to attach to it.

This is done as part of a larger argument that makes the case for the alleged ricin ring as an example of a "WMD proliferation network" connected with organized crime and "warlordism".

The Strategic Insights article writes that: "To sustain that the London Ricin Cell was a WMD proliferation network" it was allegedly determined that the ricin recipe was the same as a recipe of found in Afghanistan, among many other places.

In fact, the recipe was not the same. To understand this one must know that ricin recipes found in jihadi literature descend from two American sources - Kurt Saxon in a pamphlet called "The Weaponeer" in 1984, later in his "The Poor Man's James Bond, Vol. 3," in 1988, and Maxwell Hutchkinson's "The Poisoner's Handbook," also published in 1988. I furnished copies of these materials to Campbell and, by definition, the British court.


Other stories you might like

  • Intel to sell Massachusetts R&D site, once home to its only New England fab
    End of another era as former DEC facility faces demolition

    As Intel gets ready to build fabs in Arizona and Ohio, the x86 giant is planning to offload a 149-acre historic research and development site in Massachusetts that was once home to the company's only chip manufacturing plant in New England.

    An Intel spokesperson confirmed on Wednesday to The Register it plans to sell the property. The company expects to transfer the site to a new owner, a real-estate developer, next summer, whereupon it'll be torn down completely.

    The site is located at 75 Reed Rd in Hudson, Massachusetts, between Boston and Worcester. It has been home to more than 800 R&D employees, according to Intel. The spokesperson told us the US giant will move its Hudson employees to a facility it's leasing in Harvard, Massachusetts, about 13 miles away.

    Continue reading
  • Start using Modern Auth now for Exchange Online
    Before Microsoft shutters basic logins in a few months

    The US government is pushing federal agencies and private corporations to adopt the Modern Authentication method in Exchange Online before Microsoft starts shutting down Basic Authentication from the first day of October.

    In an advisory [PDF] this week, Uncle Sam's Cybersecurity and Infrastructure Security Agency (CISA) noted that while federal executive civilian branch (FCEB) agencies – which includes such organizations as the Federal Communications Commission, Federal Trade Commission, and such departments as Homeland Security, Justice, Treasury, and State – are required to make the change, all organizations should make the switch from Basic Authentication.

    "Federal agencies should determine their use of Basic Auth and migrate users and applications to Modern Auth," CISA wrote. "After completing the migration to Modern Auth, agencies should block Basic Auth."

    Continue reading
  • Arrogant, subtle, entitled: 'Toxic' open source GitHub discussions examined
    Developer interactions sometimes contain their own kind of poison

    Analysis Toxic discussions on open-source GitHub projects tend to involve entitlement, subtle insults, and arrogance, according to an academic study. That contrasts with the toxic behavior – typically bad language, hate speech, and harassment – found on other corners of the web.

    Whether that seems obvious or not, it's an interesting point to consider because, for one thing, it means technical and non-technical methods to detect and curb toxic behavior on one part of the internet may not therefore work well on GitHub, and if you're involved in communities on the code-hosting giant, you may find this research useful in combating trolls and unacceptable conduct.

    It may also mean systems intended to automatically detect and report toxicity in open-source projects, or at least ones on GitHub, may need to be developed specifically for that task due to their unique nature.

    Continue reading
  • Why Wi-Fi 6 and 6E will connect factories of the future
    Tech body pushes reliability, cost savings of next-gen wireless comms for IIoT – not a typo

    Wi-Fi 6 and 6E are being promoted as technologies for enabling industrial automation and the Industrial Internet of Things (IIoT) thanks to features that provide more reliable communications and reduced costs compared with wired network alternatives, at least according to the Wireless Broadband Alliance (WBA).

    The WBA’s Wi-Fi 6/6E for IIoT working group, led by Cisco, Deutsche Telekom, and Intel, has pulled together ideas on the future of networked devices in factories and written it all up in a “Wi-Fi 6/6E for Industrial IoT: Enabling Wi-Fi Determinism in an IoT World” manifesto.

    The detailed whitepaper makes the case that wireless communications has become the preferred way to network sensors as part of IIoT deployments because it's faster and cheaper than fiber or copper infrastructure. The alliance is a collection of technology companies and service providers that work together on developing standards, coming up with certifications and guidelines, advocating for stuff that they want, and so on.

    Continue reading
  • How can we make the VC world less pale and male, Congress wonders
    'Combating tech bro culture' on the agenda this week for US House committee

    A US congressional hearing on "combating tech bro culture" in the venture capital world is will take place this week, with some of the biggest names in startup funding under the spotlight.

    The House Financial Services Committee's Task Force on Financial Technology is scheduled to meet on Thursday. FSC majority staff said in a memo [PDF] the hearing will focus on how VCs have failed to invest in, say, fintech companies founded by women and people of color. 

    We're told Sallie Krawcheck, CEO and cofounder of Ellevest; Marceau Michel, founder of Black Founders Matter; Abbey Wemimo, cofounder and co-CEO of Esusu; and Maryam Haque, executive director of Venture Forward have at least been invited to speak at the meeting.

    Continue reading
  • DataStax launches streaming data platform with backward support for JMS
    Or move to Apache Pulsar for efficiency gains, says NoSQL vendor

    DataStax, the database company built around open-source wide-column Apache Cassandra, has launched a streaming platform as a service with backwards compatibility for messaging standards JMS, MQ, and Kafka.

    The fully managed messaging and event streaming service, based on open-source Apache Pulsar, is a streaming technology built for the requirements of high-scale, real-time applications.

    But DataStax wanted to help customers get data from their existing messaging platforms, as well as those who migrate to Pulsar, said Chris Latimer, vice president of product management.

    Continue reading
  • Infor to stop developing on-prem software for IBM iSeries
    ERP vendor had promised containerized options, but looks set to focus on the cloud

    ERP vendor Infor is to end development of on-premises and containerized versions of its core product for customers running on IBM iSeries mid-range systems.

    Born from a cross-breeding of ERP stalwarts Baan and Lawson, Infor was developing an on-premises containerized version of M3, dubbed CM3, to help ease migration for IBM hardware customers and offer them options other than lifting and shifting to the cloud.

    Infor said it would continue to run the database component on IBM i (Power and I operating system, formerly known as iSeries) while supporting the application component of the product in a Linux or Windows container on Kubernetes.

    Continue reading

Biting the hand that feeds IT © 1998–2022