Feeds

Bus-spotting paedo terror bust: Shock CCTV image

Rights? You don't have any rights

Seven Steps to Software Security

Our recent piece on the terrorist paedophile bus-spotter driven off the UK's streets by public and police hostility prompted a certain amount of speculation as to what exactly are your rights when you whip off the lens cap.

The answer? You don't have any rights, as this shock CCTV image proves:

Our artist's impression of how the bus-spotting terrorist bust may have looked

Yup, this particular omniboligist made the mistake of taking too close an interest in a "sensitive" vintage Routemaster and in his enthusiasm to get the money shot strayed within 20 yards of a defenceless kiddie while wielding a highly suspect telephoto lens.

Mercifully, the Met has moved with lightning speed to supress the threat to national security, with armed officers offering the perp the choice of deleting the images from his SD card, or facing arrest, detention and eventual half-hearted apology under the Prevention of Terrorism Act.

However, while fully occupied with defending the realm, the Met's finest have failed to notice that a Staffordshire bull terrier is "sharing" cheese and onion crisps with the aforementioned nipper while the devil dog's owner - down from Leeds for the day to attend the "ASBO of the Year" awards - is using the opportunity to steal the cops' car radio in the belief that it contains a magic chip offering free Sky TV.

Officers are also completely oblivious to the presence of Boris Johnson, seen here with an official from Tory Party Central Office bearing a chest of gold acquired from the smouldering rubble of Tariq Aziz's Baghdad residence in "morally ambiguous" circumstances.

The female firearms operative on the right, meanwhile, is about to enjoy a ride in an ambulance after being hit by a Volvo S70 packed to the gunwales with a record-breaking 12 passengers.

And finally, the whole scene is played out to a backdrop of Optimus Prime - fresh from his destruction of Croydon - who's been chasing the Volvo for 20 miles in the hope there might be room for one more in the back and the driver can drop him off at his Tottenham bedsit. ®

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.