Feeds

Download al Qaeda manuals from the DoJ, go to prison?

In the UK it's all down to your motivation

Next gen security for virtualised datacentres

During the London ricin trial, the defense considered the American government's description of it as "the al Qaeda manual" a manufactured title. Nowhere within the document is al Qaeda mentioned and it seems to have originated in the last years of the Islamist resistance of the Soviet occupation in Afghanistan. But from time to time the Manchester manual has been used by the US government to make political points.

In 2006, George W. Bush used it to remind Americans the country was at war against a potent enemy.

"Bin laden and his terrorist allies have made their intentions as clear as Lenin and Hitler before them," the president said to the Military Officers Association of America during a speech which was widely publicized. "The question is `Will we listen? Will we pay attention to what these evil men say?'"

The president cited the Manchester manual, calling it "al Qaeda's" - and a grisly example of the organization's methods, specifically pointing to the chapter entitled "Guideline for Beating and Killing Hostages."

As part of Bush's exposition on terror and why we fight, whitehouse.gov linked to a display page for the manual at the Air University, Maxwell-Gunter Air Force Base in Alabama. This page was a mirror of the John Ashcroft Department of Justice's old placeholder on the book, one which had been taken down although copies of the material still reside on its machine. (These versions were selectively edited by the American government, for example, to remove poison-making recipes thought to be a public menace.)

At Nottingham University, the document has come almost full circle - from Manchester, to Washington, around the US and back to England.

The Times Higher Education Supplement reported on May 22 that Sabir was using the manual "as preparation for a PhD on radical Islamic groups [and] had downloaded an edited version of the al-Qaeda handbook from a US government website... It is understood that [he] sent the 1,500-page document to the staff member... because he had access to a printer." The clerk was also arrested.

Sabir's lawyer told the publication "The two members of the university were treated as though they were part of an al-Qaeda cell."

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.