Feeds

Lego terrorist threatens democracy

Religious leaders slam 'Toy Taliban'

Eight steps to building an HP BladeSystem

Religious leaders have united to express their dismay at a custom range of Lego figures - including a "Toy Taliban" armed to the teeth with C96 broomhandle Mauser pistol, AK Assault Rifle and M67 frag grenades.

BrickArms' Toy taliban figureThe offending terrorist - made by US firm BrickArms and punted for £9.50 to impressionable UK kiddies here - didn't much impress Mohammed Shaffiq, of Muslim organisation The Ramadhan Foundation, who slammed the toy as “absolutely disgusting”.

He told the Sun: “It is glorifying terrorism - the makers should be ashamed. We should be coming together to unite against terrorism, but how is that possible when children are playing with toys like this?”

Parents who feel uneasy about their kids reenacting exciting moments in recent Afghan history might consider buying their offspring an SS major instead - a snip at just eight quid.

Or maybe not. As Edie Friedman, director of the Jewish Council for Racial Equality, explained: “These distasteful toys are something we could all well do without, especially when there is so much tension around.”

Lego today issued a statement which reads: "LEGO® UK is not associated with the toys being sold by BrickArms, which have been customised without LEGO UK’s knowledge or permission.

"BrickArms is not licensed by LEGO UK to customise LEGO figures and has no links to the LEGO brand. LEGO UK is committed to developing toys which enrich childhood by encouraging imaginative and creative play - and does not endorse products that do not fit with this philosophy." ®

Bootnote

For something less controversial, try the rather good miniature James Bond.

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.