[osint] Militants and the Latest Mobile Phone Technology

MARQUEZ Thierry marquezthierry at yahoo.fr
Wed Dec 8 14:13:17 PST 2004



Militants and the Latest Mobile Phone Technology
Dec 08, 2004 1843 GMT

Norwegian police said Dec. 8 they want to stop the sale of cell phone cards
that allow the caller to remain anonymous. Their fear is that criminals
will exploit these cards to avoid detection. This concern, which has been
raised by law enforcement agencies elsewhere, could -- and should -- be
extended to terrorists.

Cell phones used in the planning and execution of attacks pose a serious
obstacle to the security and counterterrorism forces charged with
disrupting militant activities. These phones allow militants to communicate
with one another while in the field, in real time and over long distances
using cheap and readily available technology. Couple those advantages with
the latest technology -- camera phones -- and law enforcement faces a
walking, talking terrorist workshop.

On the other hand, a phone is another link in the militant chain,
presenting the opportunity for law enforcement to detect -- and thwart --
an attack before it takes place. Technology does allows security and law
enforcement agencies to determine who places a phone call or sends an SMS
text message, and to track the call to its source. This kind of evidence
has been presented in a number of criminal cases around the world, most
recently in October in a U.S. case involving a fake kidnapping in
Massachusetts.

Then again, there are ways to avoid detection.

Savvy criminals, including militants, can evade detection in a number of
ways, especially if they are operating in a developing country where
security agencies might lack the necessary tracking technology or where the
mobile phone industry is much less regulated. However, even in developed
countries, there are easy and relatively inexpensive ways to get around law
enforcement.

The cheapest and most effective method is through the use of multiple
Subscriber Identity Modules (SIM) cards -- the digital fingerprint of a
mobile phone. Authorities can track a cell phone user by tracking the SIM
card -- even if the user has not made a call. In order to avoid detection,
a savvy militant will use the SIM card only once -- to decrease the number
of chances for detection and association -- and then toss it away.
High-ranking Hamas officials allegedly use this tactic to avoid
identification and targeting by Israeli authorities. Indian authorities
warned earlier this year that militants in the Kashmir region were using
pre-paid phones (presumably with different SIM cards) to coordinate and
plan operations.

This tactic is a relatively new development -- conceived by the always
innovative criminal mind in response to law enforcement successes in
tracking suspected militants through their phones. For example, a
multinational mobile phone sting operation was integral in the capture of
suspected Sept. 11 mastermind Khalid Sheikh Mohammed.

Furthermore, mobile phones also have become almost standard equipment in
the construction of remotely detonated bombs, as they make inexpensive and
fairly reliable triggers. The March 11 Madrid train bombers used this
method to trigger their bombs -- though Spanish authorities later
successfully tracked the bombers via one of the cell phone-triggered bombs
that failed to detonate.

Cell phones used in preoperational surveillance also can present a serious
challenge to law enforcement, largely because of their now-ubiquitous
nature. In other words, a person -- criminal or not -- talking on a cell
phone outside of a building or a landmark raises no alarm bells. A cell
phone with instantaneous picture transmission can be an even better
terrorist tool.

Based on the creativity already demonstrated by some militants in the use
of cell phones -- an SMS message instructed a jailed Abu Sayyaf member to
escape from an Indonesian prison in 2003 -- new methods of evading
detection using mobile technology are likely to emerge. The development of
technology to allow users to use the same phone to call from around the
world, while changing its SIM cards, possibly is the next step.





[Non-text portions of this message have been removed]






------------------------ Yahoo! Groups Sponsor --------------------~-->
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/TySplB/TM
--------------------------------------------------------------------~->

--------------------------
Want to discuss this topic?  Head on over to our discussion list,
discuss-osint at yahoogroups.com.
--------------------------
Brooks Isoldi, editor
bisoldi at intellnet.org

http://www.intellnet.org

  Post message: osint at yahoogroups.com
  Subscribe:    osint-subscribe at yahoogroups.com
  Unsubscribe:  osint-unsubscribe at yahoogroups.com


*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> To unsubscribe from this group, send an email to:
    osint-unsubscribe at yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





More information about the cypherpunks-legacy mailing list