Feeds

Thai insurgents move to keyless-entry bombs

Cellphone devices blocked by security forces

The Essential Guide to IT Transformation

Insurgents in southern Thailand have begun using keyless-entry systems from cars to trigger bomb explosions after authorities took to blocking mobile-phone signals.

The Bangkok Post reports that Thai police found a Daihatsu RF key near a blast site in Yala on April 13. It is thought the bomber dropped it while fleeing the scene. The key had apparently been modified so its signal covered a longer distance.

Police believe that insurgents may have obtained up to 40 of the devices, and have distributed photographs to southern stations.

According to the Post, "militants who have in the past used mobile phones to set off bombs are being forced to change their detonation methods as security forces continue to block mobile phone signals while carrying out security missions," suggesting that Thai security forces routinely jam or otherwise block mobile-phone frequencies as they go about their business.

The Thai government seems to be claiming this shift in insurgent tactics as a success for the authorities, though it might well be seen the other way round.

Similar electronic-warfare battles are now being fought between Coalition forces and their enemies in Iraq, and in former times by Northern-Irish republicans and British forces.

Heavy-handed active jamming, apparently favoured by the Thais, has seldom been used on the UK mainland. It causes massive disruption to civilian communications, and in any case the emergency services frequently need to make use of mobile comms themselves. There is also some risk of triggering a device by one's own jamming signal, though this mainly affects older and more basic devices.

And the Thai forces are finding out the same thing that the British army did long ago: that as soon as you block one signal the enemy will think of something else. The Provisional IRA in their day would often wire up a bomb to a speed-trap detector, for instance, and then trigger it from a distance using a radar gun. Other ploys used by various organisations have included hospital beeper systems, remote controls from toys, light sensors set off using camera flashes etc. As consumer wireless technology continues to proliferate, the options for the bomber will widen. WIMAX, anyone?

This is a struggle which won't end any time soon. ®

Lewis Page is a former bomb-disposal officer.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.