Plane-spotters recruited in War on Terror

Do you have a licence for those binoculars, sir?

  • alert
  • submit to reddit

Top three mobile application threats

A BBC report provides a treasurable example of how identity-based restrictions on the populace can and will be presented as beneficial. And indeed, how you can be induced vet yourself - first, they came for the plane-spotters, as someone so nearly said.

As you'll see from the BBC report, the police and British Airport Authority have recruited plane-spotters to the war on terror around Heathrow, on the basis that they spend a reasonable amount of time in the area, and are well-placed to notice the presence of "people outside the aviation enthusiast community whose interest in the airport [is] not genuine." The real enthusiasts are being given ID cards and a code of conduct as part of the scheme. Which certainly makes some sense, in that they're in a good position to ID any terrorists who feel the need to go beyond airline schedules, maps and the public viewing platform in their plotting.

But the presentation of the story and the story itself are perhaps two separate things. A little further down you'll note that the Aviation Enthusiasts Security Scheme is being run by aviation enthusiasts' club LAAS International, which developed it "in response to a request from the authorities for a single sponsoring organisation for plane spotters." The £15 card will help airport operators "identify the real, responsible enthusiasts." And indeed will allow people who don't have the card to be identified as suspect, and facilitate the expansion of 'ID required' security zones beyond the perimeter fence of airports. And as Chief Superindentent Savill of the Metropolitan Police tells us, "groups" that could help in similar ways have been targeted, so it's not just the plane spotters.

The LAAS site explains the initial nature of the request. An increase in security at airports meant that enthusiasts "would be moved on from viewing spots and car parks as they were classed as a possible security risk." Seeking to preserve its members' access to airports LAAS then negotiated the ID scheme.

Clearly, there is reason to worry about people around airports who look like they might be checking out possible Stinger launch sites. Or indeed people who look like they might be carrying Stingers, so in that sense it is perfectly legitimate for security services to take an interest in people who are hanging around these areas. But in this particular case we have moved from a position where anyone was perfectly free to while away a couple of hours watching the planes to one where you must demonstrate a legitimate interest and ID in order to be able to do so. And the security services have figured out how to put a positive spin on the change.

Presumably any organisation planning demonstrations in the vicinity of airfields and other military installations in the UK will face no problems in setting up a similar scheme for its membership. ®

Top three mobile application threats

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story


Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.