Feeds

Download al Qaeda manuals from the DoJ, go to prison?

In the UK it's all down to your motivation

Reducing the cost and complexity of web vulnerability management

University faculty and students have subsequently responded with great alarm, viewing it as an attack on academic freedoms. However, the protest was complicated by the intervention of an unnamed university official acting as spokesman, who explained to the press that there was "no reasonable rationale" for the clerk to have the manual. According to THES, "the edited version of the al-Qaeda handbook was 'not legitimate research material' in the university'’s view."

Many others differed, arguing it is obviously politically and socially relevant material to study. Indeed it is, not only as a collection of terror methods, some of them collected from the American neo-Nazi and survivalist right, but also as a book which has been cited in courts and used by authorities to publicly shape opinion in the war on terror. For example, in 2007 the US government attempted to use it to burnish its case against convicted terrorist Jose Padilla. It was declared inadmissible in that instance, although Padilla was eventually sent over, anyway.

Since the manual has been widely cited and distributed by the mainstream media, too, one could devote an entire scholarly essay to its socio-political utility in framing the nature of the adversary. And, as a matter of fact, Associated Press reported on May 28 that Sabir was using it in "writing on the American approach to al-Qaeda in Iraq."

This story is made more complicated as readers begin to understand that anyone deported to a country like Algeria, fitted with a jacket now defining them as an owner of the manual, has their life completely uprooted. Daubed with a black mark by it, they're set up as a potential target for arrest, subsequent interrogation and all that menacingly entails.

Bootnote: For the purpose of understanding the trail of the Manchester manual, it is proper to include its position on US government servers. Keep in mind that if you are in the United Kingdom and you're the wrong person, downloading it to your computer incurs a significant legal exposure from which bad things may transpire. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.</p

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.