Feeds

Trouser-bomb clown attacks - how much should we laugh?

Reg investigates case of the undertotally-pants bomber

Beginner's guide to SSL certificates

OMG - why aren't we all already dead?

Even if a security miracle occurs and the option of sneaking a bomb onto planes is somehow removed, there still exists the option of shooting planes down. Shoulder-launched homing missiles can be had in some parts of the world. From those same parts of the world, huge tides of illegal immigrants and drugs routinely move into Western nations despite all our governments' efforts to stop them. It would not be hard to move small packages like "double-digit" (SA-14, -16, maybe even -18 if available) anti-aircraft missiles along the same routes.

So, assuming a well-funded, numerous, committed, competent terrorist enemy without scruples and with a broad base of support from which to draw numerous recruits, airliner attacks can't practically be prevented. Planes should be exploding every day, really: if not planes then trains, another situation where blast effects can be magnified. If neither should suit, a few men with automatic weapons can bring a city grinding to a halt fairly easily, as the residents of Mumbai will tell you.

But the truth of the matter is that there is no such enemy out there. Funds are occasionally available, true; the 9/11 plotters were quite well-backed, and even if a terrorist group has no access to oil or gas revenues there may be the option of dealing in heroin as the Taliban do. (Note that all of these sources of money ultimately come from us.)

But people who are willing to kill innocents en masse as a primary goal are fairly rare birds. In Afghanistan you can easily hire large numbers of men for quite small sums of money to do fantastically dangerous things like taking on the British and American armed forces in open combat; some will even cover their own expenses, and a fair few will happily mount a suicide strike against Western troops. In general, just like the Western troops themselves in many instances, these fighting men are quite willing to accept a lot of collateral damage to local people as a cost of doing their main business.

But an awful lot of them would no more intentionally blow up an airliner, nightclub or train full of peaceful folk, would no more open fire into a crowd of unarmed civilians, than a Western soldier would. The likelihood of such squeamishness goes up markedly when you're recruiting outside the unruly and often aggrieved warrior tribesmen of central Asia, as you'll probably have to do for operations against the West.

Assembling a team of committed, loyal mass-murderers is actually very difficult, then, as such people are rare and hard to find. In fact, as we've pointed out in these pages before, the average size of potential terror cells operating in the UK and known to MI5 is ten members. This strongly suggests that five people or so is the upper safe limit before there's a strong chance of a cell having an informer in its midst or among its acquaintance.

It's just about possible then that one might assemble a loyal team of five or a few more and manage to remain, if not off the security services' radar altogether - it normally turns out that successful terrorists were on file somewhere - then far enough down their list to give you some time before you get put under surveillance.

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.