Feeds

How just thinking about terrorism became illegal

What's on your hard drive could mean hard time

The Power of One Infographic

"A proposal to scan suspect hard drives causes unease in [Germany]," read a recent frontpage story in the Los Angeles Times. Positioned boldly above the fold, the reporter and editors recognized the potential keen interest in anything having to do with the implementation of snooping in "My Documents".

In the United Kingdom it's no longer surprising to find that in the absence of significant physical evidence, documents, weblinks and cached pages found on suspects' hard disks are enough to send them over on terror charges.

In the conviction of Scottish student Mohammed Atif Siddique, a source recently informs that publicized terror writings on the man's computer existed as links on pages - never mounted on the web - pointing to copies of jihadi materials published on the scholarly site, Project for the Research of Islamist Movements.

The reader can immediately intuit that having a link or links somewhere in your system, no matter where they point, and being Muslim when the police arrive at the door, can be enough to get you in deep trouble.

It was not always exactly like this. During the sweep which netted the alleged ricin cell, one young man was arrested with a copy of the ricin recipe downloaded from the Temple of the Screaming Electron, which is where Google will take you if you punch in "how to make ricin" and then click the "I'm Feeling Lucky" tab. He was subsequently released.

Times have changed. Now, conviction for possession of a terror-enabling script would be more likely.

For the expansion of German law enforcement spying, the scanning for jihadi documents and plans through Trojan horse programs, the Los Angeles paper posited through statements of authorities, that the computer was a precise window on the soul.

Are these your documents, Sir?

"The laptops of one of the suspects in a bungled bombing [from 2006] contained plans, sketches and maps - a virtual road map to an attack that could have killed dozens," stated the newspaper. "What if law enforcement had been able to secretly scan the contents of the computer before the attack was carried out?"

The terrorists bungled their bomb-making. Nothing exploded. They were caught, making the argument a poor one.

However, the fear-monger - one who makes any manner of surveillance sound reasonable - is always waiting with the ultimate trump.

"A terrorist attack with nuclear weapons is certain," reported the Times, citing a statement by German Interior Minister Wolfgang Schaeuble. "The question is no longer whether an attack could be carried out by terrorists, but when."

Boost IT visibility and business value

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.