Feeds

Germans send teen tearaway to Siberia

Boot camp cure for violent youth

Intelligent flash storage arrays

The German authorities have packed off a violent 16-year-old youth to fend for himself in a remote Siberian village in the hope the "intensive educational experience" will cure him of his anti-social tendencies.

The unnamed lad, from the central state of Hesse, was given his marching orders after "behaving violently in school and at home and attacking his mother", the Guardian explains.

While in the "forlorn" hamlet of Sedelnikovo, a good few hours drive from Omsk, he's obliged to chop his own firewood, pump water from the well, and dig his own toilet.

Worse still, he's cut off from friends, family, TV, and the internet, although he does still attend school "under the supervision of a Russian-speaking German assistant".

Stefan Becker, the head of the youth and social department in Giessen, said: "We deliberately sought a region that was particularly lacking in allure. [He] spends most of his time trying to cope with his day to day existence, living in conditions like we had 30 or 40 years ago. If he doesn't chop the wood, his room is cold. If he doesn't fetch water, he can't wash."

The Germans are apparently in the habit in dispatching ne'er-do-wells to foreign lands*, including Greece and Kyrgyzstan, although while some support the boot camp approach to teen delinquency, others are unimpressed.

The Christian Democratic state president of Hesse, Roland Koch, backs boot camps and and favours "warning-shot" arrests for young offenders. The Guardian notes his election speeches have "particularly focused on clamping down on immigrants, said to be responsible for half of all crimes committed by the under-21s".

For others, though, the whole thing smacks more of "a reality TV show than a social welfare programme", as one commentator put it.

Cash, too, may be a factor. The Siberian exile apparently costs €150 a day - roughly a third of the cost of a locally-based punishment. ®

Bootnote

*Anyone who makes any comment whatsoever even lightly suggesting that the Germans have been sending large numbers of ne'er-do-wells to other people's countries for yonks wil be banned from reading El Reg for, let's say, 1,000 years.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.