Feeds

The War on Terror's professional witness

Evan Kohlmann does the rounds

Secure remote control for conventional and virtual desktops

Analysis The recent conviction of Mohammed Atif Siddique on terror charges highlighted the role of globetrotting professional witness Evan Kohlmann. Defenders in the US and UK have come to recognize him as a figure brought in to furnish opinions which are only of use to prosecutions in the frightening of juries. Kohlmann was also tapped by New Scotland Yard and the Crown in the well known case which resulted in the recent conviction of al-Qaeda's super-cyber 007, Younis Tsouli.

For the past couple of years, Kohlmann has been reasonably ubiquitous in US news reports on terrorism. By example, after the alleged London ricin gang was found not to be an al-Qaeda gang by jury, Kohlmann told Newsweek magazine, "These are dangerous people who are followers of [Hook] Hamza."

Donald Findlay QC, defending for Siddique, said at trial: "Instead of being brought from the US to be put in the witness box, [Kohlmann] should have been put in the dock." This was in apparent reference to Kohlmann's website, Globalterroralert, which had digital video collected from the web "such as the beheading of a US hostage", which was "[the] most horrific ever shown to a jury" according to The Scotsman newspaper.

Paradoxically, Siddique was sent over for possessing digital materials collected from the web and associated in court as preparations for martyrdom in the cause of global terror. He was also convicted on charges of "setting up websites with links to terrorist publications which showed how to use weapons and make bombs".

It's worth pointing out the obvious in that depending on your point of view, websites of anyone explaining the details of terror cases and/or publishing accompanying terror documents can fit this rather loose categorisation. It's a catch-all that would seem to guarantee conviction for any Muslim found to have even the most penny-ante collections of jihadi fulmination from the web on the computer in the bedroom.

In terror cases such as Siddique's, as well as others, the strategy is to have the prosecution or professional witness recite fearsome quotations from documents gathered off the internet and owned by those in the dock. One source familiar with the practice but who must remain anonymous commented earlier in the year, rather perceptively, that writing about "murdering and pillaging [those] who don't share your faith is the scheme of some old villains". And such villains include authors of the Old Testament as well as the Koran.

In Kohlmann's hot wash-up on the Siddique trial he dubs Siddique's digital collection an "encyclopedia of terrorist knowledge". Then follows a blizzard of names, none connected with Siddique, but authors writing about jihad whose works have been distributed throughout the net and that were found in Siddique's possession.

However, it does not appear to stand apart from the standard jihadi cant one has become accustomed to reading in newspapers.

“Martyrdom or self-sacrifice operations are those performed by one or more people, against enemies far exceeding them in numbers and equipment, with prior knowledge that the operations will almost inevitably lead to death," begins one unexceptional excerpt. A partial transcript from a jihadi video is also furnished. "We ask Allah to create severe pain and damage amongst the ranks of the Americans, the infidels, and those who ally with them... by Allah, nothing will elevate [Islam], nothing will bring it honor except for Jihad in the Path of Allah... Allahu Akbar! Allahu Akbar!" - conveys the general gist of it.

Build a business case: developing custom apps

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Govt control? Hah! It's IMPOSSIBLE to have a successful command economy
Even Moore's Law can't help the architects of statism now
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
New voting rules leave innocent Brits at risk of SPAM TSUNAMI
Read the paperwork very carefully - or fall victim to marketing shysters
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.