Feeds

Gadget-buying Taliban 5th column in Blighty - shock!

And, why Maplins is not a terrorist bomb bazaar of DEATH

High performance access to file storage

Maplins: Bomb-making bazaar of MURDER

But that's all a bit of a jump too far, really. Sure, there'll be some Brits - UK passport holders, anyway*** - or people with permission to live here who really do think like that and go out with malice aforethought to buy walkie-talkies, or IR blasters, or laser pens or whatever. But probably not that many.

We ought to remember here that the UK is the leading Western consumer-gadget market with which Pakistan has strong links - thus the leading market for the Taliban to buy in. Being an insurgent group, they mostly need to use the consumer market rather than simply ordering wholesale from OEMs in China. So someone goes on a trip to Blighty and buys a remote control or two, or someone asks a relative or friend living here to send the latest thing from Maplins or Amazon.

The people doing the buying aren't necessarily "Taliban sympathisers", even where the stuff actually does wind up in Taliban hands. Normally it doesn't: normally that remote control really is going to spend its life working Uncle Ahmad's home cinema, the walkie-talkies really are for kids to play with. There are a lot of bombs going off in Helmand, that's true, but compared to the number of gadget fanciers with UK contacts among Pakistan's 172m people it'll be a very small percentage.

It's entirely normal for consumers even here in the West to travel, or use friends overseas as intermediates, in the search for a gadget bargain. Many of us Brits, angered by always getting the dirty end of the market price-splitting stick, have benefited from having a friend able to provide a US shipping and billing address. Even as wealthy westerners, we Brits sometimes find that a given product isn't being shipped to our High Street, and need to look abroad.

This will be even more the case in Pakistan. So there's not normally going to be any need to send an encrypted Skype chat to a terror cell in the Midlands saying "buy half a dozen IR blasters for the greater glory of jihad, brothers," or similar. Just ask your second cousin's kid who's visiting in the school holidays to bring one over. Don't mention the jihad; his dad over in the UK isn't comfortable with that kind of talk.

So there's no justification for divisive headlines on this one. There's no traitorous fifth column of Taliban sympathisers living among us, not one of any significance. Just people travelling back and forth to Pakistan and/or sending gifts there as we've had now for generations. You could have written this same story about Irish traitors back in the old days - people did, in fact.

Even if there really were some group who could usefully and feasibly be rooted out, some trade channel which could be cut off, it wouldn't help our boys and girls out in Helmand. The world market in consumer gadgets isn't going away: the bombers will get their fancy firing circuits from somewhere else. The firing circuits are the easy bit, remember.

So let's all just stay calm, eh? "Keep our nerve," as MI6 now advise. ®

Lewis Page was a bomb-disposal operator tasked in support of the UK mainland police from 2001 to 2004.

Bootnotes

*Though cunning insurgents have sometimes used existing features creatively. Railway tracks have carried a firing signal most of the distance between the observation point and the bomb; telephone or power lines can do this too. Wires can be run along utility conduits, drainage ditches, hedgerows etc. Even so, it's always easier and quicker to use a wireless signal.

**The long wire can form a rectenna, in which powerful airborne radio transmitters - for instance those carried by US or allied electronic warfare aircraft, according to rumour - can generate enough energy to fire the bomb before its owners are ready.

***Personal viewpoint: One who deliberately conspires to kill British troops, as opposed to being involved somehow but unaware of the intent, is no fellow-countryman of mine no matter what it says in his passport. (Certainly in the Northern Irish case, he'd be likely to agree with me.) It's also my personal belief that such passport holders always were extremely rare among the 60m Brits. Since the Ulster ceasefire, even rarer.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.