Feeds

Taliban demand night-time cell tower shutdown

Anti-Wi-Fi fatwa feared

Designing a Defense for Mobile Applications

Reports out of Afghanistan say that the Taliban have threatened attacks on mobile phone companies unless "signals" are "stopped" at night. Reportedly the hardline Islamic militia believes that cell towers are being used to locate and track Taliban gunmen.

The BBC quotes Taliban spokesman Zabiullah Mujaheed as saying: "If those companies do not stop their signal within three days, the Taleban will target their towers and their offices." Reportedly the demand is for the "signal" to be cut off from 5pm to 3am local time.

The mobile companies have long been thought by the Taliban to be colluding with NATO and Coalition forces operating in Afghanistan, and in fact it would be surprising if they weren't. The Afghan government is heavily dependent on the international troops. Use of the mobile networks for intelligence is an obvious step which is well-nigh certain to have been taken, just as governments have done in every country. And it's well known that masts can be used to locate a phone which is powered up.

What's less clear is why the Taliban have chosen to demand a shutdown of mast signals at night. Even the most paranoid phone-security advisers would normally suggest taking the battery out of one's phone, rather than menacing local cell operators unless they went off the air. (The idea of removing the battery is to guard against someone having modified the phone to switch itself on without the owner's knowledge.)

It could be that the Taliban want to operate their own networks, of course. Micro/pico/femtocell equipment is widely available, and there's said to be a strong tradition in wild and woolly rural Afghanistan of unregulated, private wireless comms. It might be that guerrilla commanders merely want to clear other operators off the spectrum so that they can use it themselves.

Even so, Western military or spook electronic-intelligence units will still be able to intercept, identify, locate and track active mobile phones in an area of interest, even if they are communicating (or meant to be communicating) only with Taliban-controlled cells. The reported threats still don't make a huge amount of sense in terms of the reasons given.

Another possibility is that the Taliban simply want to deny ordinary Afghans phone service at night, perhaps to stop people reporting on militia movements and/or prevent them phoning for help if attacked. Or it might be that the Taliban - the Taliban press office, anyway - simply isn't up on the technical issues.

Or, it just could be that there's an element of good old-fashioned UK-suburban-style technofear mast phobia brewing among the hardcore religious zealots of Central Asia. We may see a fatwa on Wi-Fi in madrassas.

Read less about it from the Beeb here. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.