Feeds

UK tagging for 'terror plotters' goes live on freed suspects

Here's a restriction we prepared earlier...

  • alert
  • submit to reddit

Security for virtualized datacentres

The UK's 'tagging for terror suspects' programme began yesterday with the release on bail of one of the Belmarsh detainees. A further eight inmates are expected to be released today, although the legislation under which they are being bailed currently expires at midnight on Sunday.

Parliament is today locked in a titanic struggle over what happens next. The Prevention of Terrorism Bill, which would introduce a control order regime for these and other suspects, is the Government's preferred option, but it - backed by its House of Commons majority - is hanging tough over House of Lords attempts to amend the legislation, and to impose an expiry date, or sunset clause on it. The Bill went back and forth between the Commons and the Lords overnight, with the Commons overturning the Lords amendments, and on each occasion the Lords putting them back. Technically, the Thursday Parliamentary sitting this battle is taking place in could continue until Sunday, and this morning neither side showed any sign of being willing to back down.

The bailed suspects are unlikely to be released come Sunday, however. The Home Secretary has the power to renew the legislation under which they're being held for a further 40 days; this legislation has been ruled illegal by the Law Lords (hence the claimed need for the Prevention of Terrorism Bill), but that ruling does not stop its being extended. The Bill itself may still go through in some form after a compromise, but the main battle now seems to be for electoral advantage, with Tony Blair taking every opportunity to portray the Tory opposition as being 'soft on terror.'

The bail conditions for the Belmarsh detainees follow the control order blueprint set down in the stalled Bill. They are subject to home curfew, 24 hour tagging, bans on use of mobile phones and of computers that can connect to the Internet. They need to inform the monitoring service whenever they wish to enter or leave their homes, and they must allow their homes to be searched.

Conditions of this sort were placed on one former Belmarsh inmate late last year, but this rather larger test of the imposition of movement and communications restrictions via technology takes us into uncharted territory. These are, as the Government and sundry policemen continue to tell us, 'dangerous men who should not walk free' (but should not be charged with any offence either), so the new, untried systems need to be able to provide an equivalent to an indeterminate period in the slammer. As The Register has noted in the past (possibly recklessly, considering what counts as 'supporting terrorism' these days), tagging systems are not 100 per cent reliable, and can be fooled in a number of ways by any subject who actively wishes to subvert them. And how, incidentally, does one stop somebody using a mobile phone? We suspect somebody hasn't thought this one through.

The current subjects are sufficiently few for monitoring to be intense, in theory, and - presumably - for the security forces to use old-fashioned methods like tailing as backup, but that's not going to be the case if the Government ever gets itself into the position of rounding up the "hundreds" who, Tony Blair told us last week, are in the UK plotting attacks. This it might be able to do if it eventually gets the powers it wants from Parliament, either in the Prevention of Terrorism Bill or in subsequent legislation.

The Regulatory Impact Statement for the Prevention of Terrorism Bill envisages using private contractors to monitor subjects, which might strike you as an odd thing to do in relation to potential mad bombers. It is not, however, surprising; the Home Office itself does not have any in-house capability to run tagging systems, and the tagging pilots it has been running (for, er, lower risk offenders) have been conducted in conjunction with private security companies. Which, as Parliament slugs it out over precisely what happens after midnight on Sunday, presents us with the interesting prospect, if Tony Blair eventually gets his way, of control orders imposed without charges or trial, and enforced by the private sector. In the past week spokesmen for Downing Street have indicated that the control order regime could be applied to Irish republican suspects and animal rights activists. The forthcoming G8 summit in Gleneagles also looks a likely venue for the deployment of its battery of anti-terror legislation. ®

Related Stories:

ID scheme to bite dust in pre-election terror rush?
Restrict freedom to preserve liberty: cunning Home Office plan
Guilty! New Labour could arrest self under new terror law
Blunkett's satellite tagging: the tripe behind the hype

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.