Feeds

Suburban woman accused of using net to recruit terrorists

Feds cuff JihadJane

Using blade systems to cut costs and sharpen efficiencies

A suburban Pennsylvania woman who went by the online alias JihadJane used the internet to recruit Islamic terrorists and to plot the assassination of a Swedish cartoonist who depicted the Prophet Mohammed, according to a federal indictment unsealed Tuesday.

Colleen R LaRose was charged with conspiracy to provide material support to terrorists, conspiracy to kill in a foreign country and related charges, according to an indictment filed in US District Court in Pennsylvania. She has been detained since October, but the charges were only made public on Tuesday, following the arrests of others.

According to prosecutors, LaRose began a series on online correspondences with unindicted co-conspirators after posting a comment on YouTube under the alias JihadJane that stated she was "desperate to do something somehow to help" Muslim people who were suffering. She said her blond hair and blue eyes were assets that would allow her to "blend in with many people".

One conspirator directed LaRose to travel to Sweden, hunt down a resident there and to kill him, the indictment claims. Her answer: "I will make this my goal till i achieve it or die trying."

The identity of the Swedish resident was not revealed in court documents, but numerous published reports, citing people familiar with the investigation, said it was Lars Vilks, a cartoonist who ignited outrage in the Muslim world after depicting Muhammed with the body of a dog.

LaRose, also known as Fatima LaRose, allegedly corresponded with at least five conspirators to recruit men and women with the ability to travel in the US and Europe. In March 2009, she agreed to live in Sweden and marry one of the conspirators so he could live in Europe.

If convicted, LaRose faces a maximum sentence of life in prison and a fine of $1m. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.