Feeds

US student planned to ice Chuck Norris

Hit list names man who 'can slam a revolving door'

Intelligent flash storage arrays

A New Jersey high school student has been suspended for allegedly drawing up a hit list which included the names of "three students and a school administrator" and, rather ill-advisedly, roundhouse-kicking death machine Chuck Norris.

According to the Philadephia Inquirer, the unnamed Pennsauken High School 16-year-old was arrested and charged with "making terroristic threats" after a teacher discovered the list. Pennsauken police "found no weapons on the student or in his locker", a school statement explained, and he was subsequently released to his parents.

The suspension was part of a "zero-tolerance" crackdown on bad behaviour in the school on Tuesday, which also saw 14 other ne'er-do-wells out on their ears for a range of offences. A spokeswoman said: "The kids will not be allowed to take control of the building. It's getting to the point where it's an embarrassment."

The hit list teen will remain suspended pending a disciplinary hearing, and may be expelled. ®

Bootnote

Yes, we know what you're thinking. Since Chuck Norris is "an outspoken advocate of building discipline in high schools by teaching students karate", why doesn't Pennsauken High School simply call in the man who "destroyed the periodic table, because he only recognizes the element of surprise" to restore order?

Choosing a cloud hosting partner with confidence

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.