Feeds

Thai insurgents move to keyless-entry bombs

Cellphone devices blocked by security forces

Internet Security Threat Report 2014

Insurgents in southern Thailand have begun using keyless-entry systems from cars to trigger bomb explosions after authorities took to blocking mobile-phone signals.

The Bangkok Post reports that Thai police found a Daihatsu RF key near a blast site in Yala on April 13. It is thought the bomber dropped it while fleeing the scene. The key had apparently been modified so its signal covered a longer distance.

Police believe that insurgents may have obtained up to 40 of the devices, and have distributed photographs to southern stations.

According to the Post, "militants who have in the past used mobile phones to set off bombs are being forced to change their detonation methods as security forces continue to block mobile phone signals while carrying out security missions," suggesting that Thai security forces routinely jam or otherwise block mobile-phone frequencies as they go about their business.

The Thai government seems to be claiming this shift in insurgent tactics as a success for the authorities, though it might well be seen the other way round.

Similar electronic-warfare battles are now being fought between Coalition forces and their enemies in Iraq, and in former times by Northern-Irish republicans and British forces.

Heavy-handed active jamming, apparently favoured by the Thais, has seldom been used on the UK mainland. It causes massive disruption to civilian communications, and in any case the emergency services frequently need to make use of mobile comms themselves. There is also some risk of triggering a device by one's own jamming signal, though this mainly affects older and more basic devices.

And the Thai forces are finding out the same thing that the British army did long ago: that as soon as you block one signal the enemy will think of something else. The Provisional IRA in their day would often wire up a bomb to a speed-trap detector, for instance, and then trigger it from a distance using a radar gun. Other ploys used by various organisations have included hospital beeper systems, remote controls from toys, light sensors set off using camera flashes etc. As consumer wireless technology continues to proliferate, the options for the bomber will widen. WIMAX, anyone?

This is a struggle which won't end any time soon. ®

Lewis Page is a former bomb-disposal officer.

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.