Feeds

How just thinking about terrorism became illegal

What's on your hard drive could mean hard time

The Power of One Infographic

The dull reality is that most people and terrorists are not obviously devilishly accomplished at mass murder. An attack with a nuclear weapon can be imagined some future dark day, but it is not certain. Jihadists are banged up on possession of tracts from the Anarchist's Cookbook, excerpts from a variety of poison and explosives handbook translations with origins in the lunatic fringe of American publishing, and other materials much less stirring than detailed plots to detonate a nuclear weapon in a nation's capital.

The counter-terror response of proactively scanning home computers on the sly is disproportionate to the nature of the threat.

A large number of jihadi documents have been distributed widely on the world wide web – not only by terror groups, but by academics, journalists, and others. As such, they are not just of interest to terrorists. They also, rather obviously, arouse intense curiosity in a broader populace.

Cut and paste terror

DD blog has put a number online, including one with an identifier in signifying its previous owner as the Los Angeles Times newspaper. It's a portion of the Manchester manual and it was sent in 2005 by a Times reporter who wanted an explanation of its nature and an evaluation of the capability it did or did not confer. He was told it was part of the Manchester manual, originally recovered in England, now commonly called the al Qaeda manual by the US Department of Justice, and that the Times's portion of it granted little or no capability. Why someone from the newspaper had taken the original and neatly retyped it into Word format was a mystery.

Since being put online along with other similar documents, it has been downloaded many, many times, now existing on hard disks around the world. One ventures to say most of the people who have taken the time to download it are not terrorists or jihadists making plans.

While a typical counter-terror man might consider every instance of downloading from DD blog centered on the search strings "how to make poisons" or "how to make a bomb," from Karachi or Islamabad, as evidence of a lurking terrorist, we cannot be sure that this is so. And we are reasonably sure it is not so with the vast majority of such international requests.

However, if one faintly concedes that surreptitiously scanning hard disks for such things is a good idea, then one must also realize that a fragment of the Manchester manual, and many other things, are designated in court as roadmaps for terror attacks. They look bad, decidedly grim if the prosecution is pursuing a case of nipping homegrown terror in the bud. For the purposes of prosecuting terror on the basis of virtual evidence, a presumption is that no one but a terrorist owns such documents. The leveraging and applying of such beliefs is a way toward putting people in jail in the absence of malign physical evidence.

If you have such things on your PC, would you mind if a government counter-terror agency scanned for them, notating the results to an indelible secret file in the security bureaucracy?

The Los Angeles Times reported the Chaos Computer Club "has pledged to find and publish the first [German] government Trojan", and cited a lawyer saying: "If a person can be punished only because of what [authorities] suppose he has in his mind... then we have crossed an important line."

Currently, the pusillanimous belief - that the terror threat merits all steps to prevent it - appears to be the winning game. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.