Feeds

EU plans ban on bomb-making info on websites

Part of imminent 'ambitious counter terrorism package'

Designing a Defense for Mobile Applications

European Union Justice, Freedom (sic) & Security Commissioner Franco Frattini yesterday turned up the volume on terror threats, ahead of the EU's adoption of "an ambitious counter terrorism package" next month. Terrorists, said Frattini, seek new technology, could deploy bioterrorism with devastating effect, and if they got hold of weapons of mass destruction "the consequences would be catastrophic."

Terrorists themselves have so far shown little sign of either a bioterror or nuclear holocaust delivery capability, confining themselves in the main to hopeless poison plots and loopy fantasies involving smoke detectors and similar, but as they say, often while they're saying "the consequences would be catastrophic", "it's only a matter of time before..." So here comes another raft of preventative measures that will allow us to "combat terrorism, while respecting fundamental rights." Which at least in Europe, they say quite a lot as well.

Frattini, who was speaking at the opening of the Security & Defence Agenda conference in Brussels, produced a litany of likely components to the forthcoming preventative package, which will include an EU Action Plan on Enhancing the Security of Explosives, "around 50 measures designed to improve the security of explosives", alongside "other measures [which] take into account the reality of today's technological world - making it criminal to spread information about bomb-making, including through websites."

Criminalisation is here a slight escalation on Frattini's earlier plans to block online bomb-making guides, but is unlikely to make any significant difference to the UK's anti-terror operations. Recent UK terrorism trials have included a high proportion based on charges of sharing or possessing information likely to be of use to terrorists, based on documents (many of doubtful effectiveness and provenance) freely available on the Internet, or in some cases even on Amazon. Frattini's new measures are however likely to spread the British approach, where increasingly guilt is dependent on who you are and why you might be in possession of a particular document, rather than merely on possession of that document, further into EU judicial systems.

Frattini's speech also covered wider access to EU Member States' fingerprint, DNA and vehicle registration databases, more co-ordination to tackle Internet-enabled identity fraud, child abuse and terrorist propaganda, and the vexed matter of the sharing of financial and passenger data with the United States. Frattini claimed, improbably, successful resolutions to both these issues. In the case of SWIFT, the Brussels-based payments processing body which broke privacy rules by passing EU banking data to the US, the body will stop processing EU data in the US," in 2009, while in the case of Passenger Name Records (PNRs), the problem was 'solved' by the EU agreeing their export and planning the construction of its very own version of the US system.

As he called for us to think about "what we have in common [with the US] rather than the differences between our systems" however, Frattini seems not to have got around to mentioning the current state of EU-US negotiations on the Visa Waiver Programme. These, where the EU wants the US to extend the programme to the more recent EU entrants, while the US seems more intent on extending the range of the data it obtains about incoming passengers, seem poised on the brink of collapse. Time for another cave-in from Brussels, perhaps? (full Frattini speech) ®

Application security programs and practises

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.