Feeds

How just thinking about terrorism became illegal

What's on your hard drive could mean hard time

Secure remote control for conventional and virtual desktops

The dull reality is that most people and terrorists are not obviously devilishly accomplished at mass murder. An attack with a nuclear weapon can be imagined some future dark day, but it is not certain. Jihadists are banged up on possession of tracts from the Anarchist's Cookbook, excerpts from a variety of poison and explosives handbook translations with origins in the lunatic fringe of American publishing, and other materials much less stirring than detailed plots to detonate a nuclear weapon in a nation's capital.

The counter-terror response of proactively scanning home computers on the sly is disproportionate to the nature of the threat.

A large number of jihadi documents have been distributed widely on the world wide web – not only by terror groups, but by academics, journalists, and others. As such, they are not just of interest to terrorists. They also, rather obviously, arouse intense curiosity in a broader populace.

Cut and paste terror

DD blog has put a number online, including one with an identifier in signifying its previous owner as the Los Angeles Times newspaper. It's a portion of the Manchester manual and it was sent in 2005 by a Times reporter who wanted an explanation of its nature and an evaluation of the capability it did or did not confer. He was told it was part of the Manchester manual, originally recovered in England, now commonly called the al Qaeda manual by the US Department of Justice, and that the Times's portion of it granted little or no capability. Why someone from the newspaper had taken the original and neatly retyped it into Word format was a mystery.

Since being put online along with other similar documents, it has been downloaded many, many times, now existing on hard disks around the world. One ventures to say most of the people who have taken the time to download it are not terrorists or jihadists making plans.

While a typical counter-terror man might consider every instance of downloading from DD blog centered on the search strings "how to make poisons" or "how to make a bomb," from Karachi or Islamabad, as evidence of a lurking terrorist, we cannot be sure that this is so. And we are reasonably sure it is not so with the vast majority of such international requests.

However, if one faintly concedes that surreptitiously scanning hard disks for such things is a good idea, then one must also realize that a fragment of the Manchester manual, and many other things, are designated in court as roadmaps for terror attacks. They look bad, decidedly grim if the prosecution is pursuing a case of nipping homegrown terror in the bud. For the purposes of prosecuting terror on the basis of virtual evidence, a presumption is that no one but a terrorist owns such documents. The leveraging and applying of such beliefs is a way toward putting people in jail in the absence of malign physical evidence.

If you have such things on your PC, would you mind if a government counter-terror agency scanned for them, notating the results to an indelible secret file in the security bureaucracy?

The Los Angeles Times reported the Chaos Computer Club "has pledged to find and publish the first [German] government Trojan", and cited a lawyer saying: "If a person can be punished only because of what [authorities] suppose he has in his mind... then we have crossed an important line."

Currently, the pusillanimous belief - that the terror threat merits all steps to prevent it - appears to be the winning game. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.

Internet Security Threat Report 2014

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.