Feeds

Download al Qaeda manuals from the DoJ, go to prison?

In the UK it's all down to your motivation

Top 5 reasons to deploy VMware with Tegile

University faculty and students have subsequently responded with great alarm, viewing it as an attack on academic freedoms. However, the protest was complicated by the intervention of an unnamed university official acting as spokesman, who explained to the press that there was "no reasonable rationale" for the clerk to have the manual. According to THES, "the edited version of the al-Qaeda handbook was 'not legitimate research material' in the university'’s view."

Many others differed, arguing it is obviously politically and socially relevant material to study. Indeed it is, not only as a collection of terror methods, some of them collected from the American neo-Nazi and survivalist right, but also as a book which has been cited in courts and used by authorities to publicly shape opinion in the war on terror. For example, in 2007 the US government attempted to use it to burnish its case against convicted terrorist Jose Padilla. It was declared inadmissible in that instance, although Padilla was eventually sent over, anyway.

Since the manual has been widely cited and distributed by the mainstream media, too, one could devote an entire scholarly essay to its socio-political utility in framing the nature of the adversary. And, as a matter of fact, Associated Press reported on May 28 that Sabir was using it in "writing on the American approach to al-Qaeda in Iraq."

This story is made more complicated as readers begin to understand that anyone deported to a country like Algeria, fitted with a jacket now defining them as an owner of the manual, has their life completely uprooted. Daubed with a black mark by it, they're set up as a potential target for arrest, subsequent interrogation and all that menacingly entails.

Bootnote: For the purpose of understanding the trail of the Manchester manual, it is proper to include its position on US government servers. Keep in mind that if you are in the United Kingdom and you're the wrong person, downloading it to your computer incurs a significant legal exposure from which bad things may transpire. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.</p

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
NATO declares WAR on Google Glass, mounts attack alongside MPAA
Yes, the National Association of Theater Owners is quite upset
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.