Feeds

City anti-Scientology protestor avoids court summons

Prosecutors define 'threatening, abusive or insulting'

High performance access to file storage

A teenage anti-Scientology protestor who was issued with notice of a court summons by City of London police will not be prosecuted, the Crown Prosecution Service (CPS) has decided.

The boy was slapped with the notice at a demonstration by the Anonymous movement outside Scientology's UK HQ in the heart of London's financial district on 10 May.

Online campaigners were outraged after police said his sign reading "Scientology is not a religion, it's a dangerous cult" was a breach of Section Five of the Public Order Act 1986. City of London officers served notice despite the boy quoting a High Court ruling that branded the sect a cult.

A statement from City of London Police today sheepishly conceded that its officers have some legal boning up to do. It confirmed the case has been dropped, and said: "The CPS review of the case includes advice on what action or behaviour at a demonstration might be considered to be 'threatening, abusive or insulting'. The force's policing of future demonstrations will reflect this advice."

The CPS said: "Our advice is that it is not abusive or insulting and there is no offensiveness (as opposed to criticism), neither in the idea expressed nor in the mode of expression."

The BBC reports that the boy's proud mother called the decision "a victory for free speech".

Protestors who brandished similar slogans to the teenager at a simultaneous protest by Anonymous outside Scientology's Tottenham Court Road location, which was policed by the Met, were not ordered to lay down their placards.

Scientology is a sensitive subject for City of London police. The force's relationship to the organisation has been under close scrutiny since Chief Superintendant Kevin Hurley welcomed it to the square mile in 2006. It later emerged officers had accepted hospitality including tickets to a Tom Cruise film premiere. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.