Feeds

Anger over laptops for UK terror inmates

'Dangerous waste' complain prison staff

Intelligent flash storage arrays

Terror suspects housed in Britain's top secret Belmarsh prison have been given laptops in order to allow them to review legal papers. Overstretched prison officers describe the issue of £1,000 laptops to 28 inmates as a "dangerous waste of money", The Daily Mirror reports.

The PCs have been supplied without internet access, but security staff still fear resourceful suspects in the south London jail might use them for subversive purposes. "The prisoners could easily make CD-ROMs, which could be handed to visitors, and orchestrate criminal activity from the inside. Inmates are incredibly resourceful. It wouldn't surprise me if they eventually managed to get the internet on their laptops," an anonymous source told the Mirror.

Prisoners, including man a accused of attempted bombings on London's transport system on 21 July 2005, and radical muslim cleric Abu Hamza, who was jailed for seven years last month following his conviction for incitement to murder and race hate crimes, enjoy private use of the laptops in their cells. Inmates suspected or convicted of terror offences are housed in a special high-security unit at Belmarsh, which staff told the Mirror is around a third understaffed.

The Prison Service said it is obliged to supply the computers. "Under Prison Service Orders, prison inmates must have access to adequate facilities to prepare their legal cases. Much of the information provided by the Crown Prosecution Service relating to their cases is stored in electronic format. Prisoners must be able to read this evidence," a Prison Service spokesman told The Daily Mirror. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.