Feeds

Techies top cops' terror profile

Allo allo allo - is that an RS-232 cable, sah?

The Power of One Infographic

If you think that the police's profiling of terror suspects is something that only happens to other people - think again. Today's panicky Plod doesn't seem to be very discriminating at all. And you could be next.

Techie David Mery has published an account of being arrested, and having his computers confiscated, because he happened to be wearing a rucksack on the London Underground the day after the 27/7 bombings. Or as phone blogger Russell Beattie put it -

"My pal David Mery got arrested in London last Thursday for being a geek"

Mery's account of his ordeal appeared in The Guardian yesterday, and the newspaper published his story verbatim. You can read it here.

For nerds everywhere, it's a chilling read. The Frenchman works as a developer liaison at software company and he's lived in London for 15 years. But his "profile" is one that fits many Register readers.

As Mery himself puts it, "Techies and terrorist behavioural profiles are the same".

Mery dug out the police's own training guide for identifying potential suicide bombers, and found this -

Behavior. Does the individual act oddly, appear fearful, or use mannerisms that do not fit in? Examples include repeatedly circling an area on foot or in a car, pacing back and forth in front of a venue, glancing left and right while walking slowly, fidgeting with something under his or her clothes, exhibiting an unwillingness to make eye contact, mumbling (prayer), or repeatedly checking a watch or cell phone. [...]

Appearance. Is the clothing, grooming, gender, or age of an individual out of place within the context of the environment? Examples include someone wearing a heavy coat or jacket in warm weather [...]

Equipment. Does a briefcase, duffle bag, or backpack seem extra heavy or have protrusions or visible wires? When the individual sits down, is he or she overly protective of this item or preoccupied with it? [...]’

I think that describes many of us. If applied to Silicon Valley, the US economy would be paralyzed at a stroke. And Bill Gates would be calling a lawyer.

London's jumpy police said that their suspicions were aroused because Mery was wearing a thick coat. The jacket, insisted a constable, was "too warm for the season". A similar justification was used for the fatal shooting of a Brazilian.

But only the day before, temperatures had hit a 25-year low.

"Could it have been instead that the weather was too cold for the season?", asks Mery.

A fact that only London's finest failed to notice.

We're perhaps blessed that the Met chose the wrong suspect, and chanced upon a former professional journalist looking at his phone. In the 1990s David Mery edited the extraordinary, now sadly defunct programmer's journal EXE, a tiny publication which married geek curiosity to literate wit, and was the home for many years to Verity Stob - the poet laureate of computer programming. Mery and his predecessor Robert Schifreen created a publication with an appreciation way beyond its circulation figures, and such wonders live long in the memory of anyone who's worked in publishing.

But what about the less well connected?

As David himself remarked about his ordeal - "at least I'm still alive". ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.