Feeds

Drp yr WMDs now plse! – debunking Iraqi text psyops

No carrier

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

As we already noted on Monday, Pentagon-inspired leaks suggesting that the US will send bogus SMS text messages to Iraq's generals defy any plausibility, but that hasn't stopped the media here from repeating them incredulously.

"Imagine Iraqi commanders getting misleading text messages on their cell phones," burbled AP, in a story that's subsequently been reprinted - thanks to the trickle-down media pyramid - in regional papers.

Baghdad has only just taken delivery of a new GSM phone system from a Chinese supplier. Kurdtel operates a GSM network in the 900Mhz band that works only within a 50km radius of one town in the autonomous Northern region. Autonomous because of the absence of Iraqi commanders, of course.

It isn't clear if the 1800Mhz system, which has capacity for 100,000 subscribers, is yet live. (You can read details of the UN tender here [Google PDF translation].)

GSM is in theory encrypts transmissions, but the encryption isn't very highly regarded.

How much more effective it would be, we humbly suggest, if the Iraqi generals were subscribed to any one of the US cellular networks. Then, after several days of random billing, tariff slamming, incomprehensible contracts and dropped calls, the Iraqi communications infrastructure would be on its knees.

So all in all, then, another junk story emanating from official Washington sources. But the media here loves them, because they're as easy as copying out a press release.

Of 414 network TV news stories on Iraq between September and February, all but 34
originated
from the White House, Pentagon or State Department. And reporters who indulge in their traditional duty of raising hell find themselves ostracized. So it's much easier to bed down for what promises to be a ratings spectacular, and provide more war porn for the armchair warbloggers.

But war or no war, telecoms vendors are anticipating growth in the region:-

"Current players on the technocrat level inside Iraq are keen to maintain their positions and prove indispensable to whatever new regime emerges. Thus many of the present executives of the Iraqi Public Telecommunications Company (IPTC) will make a compelling case for holding onto their jobs, and are likely to seek out ties with multinational companies as soon as circumstances permit," we're advised.

New regime - same as the Old One? ®

Related Stories

Panic Attack! Mobile terrorist alert service
The US M1A2 Abrams, and war as a video game
Do it with spanners - how the Iraq cyber attack will work

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.