Feeds

Al Qaeda boss confused phone SIM with cloaking device

Apparently they make you entirely untraceable...

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Al Qaeda's technological expertise is perhaps somewhat less than it's cracked up to be, we note from a New York Times report on events surrounding the arrest of Khalid Shaikh Mohammed in Karachi a year ago. Mohammed, and indeed other Al Qaeda operatives, seems to have used a Swisscom 'anonymous' mobile phone card under the quite weird misapprehension that its insertion in a phone somehow, er, anonymised the phone.

Well, that's the only possible explanation we can see for his reportedly switching handsets frequently, but keeping the same SIM, and an "official" quoted in the NYT says he wasn't alone. "They'd switch phones but use the same cards. The people were stupid enough to use the same cards all of the time. It was a very good thing for us."

Well indeed. In addition Mohammed, who has a degree in engineering from North Carolina Agricultural and Technology University (oh yes he has), even "ordered the cards in bulk" from a company in Geneva.

Fortunately Al Qaeda appears not to read The Register, otherwise they would have noted our observation last year that thinking terrorists would be unlikely to use Swisscom anonymous SIMs because they would effectively be a CIA-magnet: "But if a Swiss pay as you go system turned up in operation in, say, Pakistan, then it is to be expected that alert lights will go off, the phone's location will be tracked, and the security services will move in."

Oddly enough, although it appears there was massive surveillance of Swisscom SIM use, and the NYT piece is pitched as a victory for technology over terror, the key seems to have been good, old-fashioned raids and two people who were sloppy with their phone books.

Mohammed's arrest was the result of a tip-off, and yielded a large stack of phone numbers for people he was in contact with. The presence in Pakistan of a Swisscom SIM that later turned to be one used by Mohammed was discovered after a raid in Germany on a suspect who was also careless with his phone numbers. It would seem that this man's phone book suggested that the Swisscom SIM was a weapon of choice for at least the blockheaded wing of Al Qaeda, which resulted in close monitoring of traffic. This did not yield much in the way of conversation, as they were careful about what they said, but it clearly helped in narrowing down the location of suspects.

The story's coming out now because those involved have now either been rolled up or have figured out they might just have a problem with their phone methodology. And, we suspect, because the authorities feel some positive press might be nice. As for Al Qaeda's technology wing, just cross your fingers they still haven't figured out how to buy an anonymous SIM, how SIMs actually work, and how to stay anonymous while using them. ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.