Feeds

Taliban demand night-time cell tower shutdown

Anti-Wi-Fi fatwa feared

Top 5 reasons to deploy VMware with Tegile

Reports out of Afghanistan say that the Taliban have threatened attacks on mobile phone companies unless "signals" are "stopped" at night. Reportedly the hardline Islamic militia believes that cell towers are being used to locate and track Taliban gunmen.

The BBC quotes Taliban spokesman Zabiullah Mujaheed as saying: "If those companies do not stop their signal within three days, the Taleban will target their towers and their offices." Reportedly the demand is for the "signal" to be cut off from 5pm to 3am local time.

The mobile companies have long been thought by the Taliban to be colluding with NATO and Coalition forces operating in Afghanistan, and in fact it would be surprising if they weren't. The Afghan government is heavily dependent on the international troops. Use of the mobile networks for intelligence is an obvious step which is well-nigh certain to have been taken, just as governments have done in every country. And it's well known that masts can be used to locate a phone which is powered up.

What's less clear is why the Taliban have chosen to demand a shutdown of mast signals at night. Even the most paranoid phone-security advisers would normally suggest taking the battery out of one's phone, rather than menacing local cell operators unless they went off the air. (The idea of removing the battery is to guard against someone having modified the phone to switch itself on without the owner's knowledge.)

It could be that the Taliban want to operate their own networks, of course. Micro/pico/femtocell equipment is widely available, and there's said to be a strong tradition in wild and woolly rural Afghanistan of unregulated, private wireless comms. It might be that guerrilla commanders merely want to clear other operators off the spectrum so that they can use it themselves.

Even so, Western military or spook electronic-intelligence units will still be able to intercept, identify, locate and track active mobile phones in an area of interest, even if they are communicating (or meant to be communicating) only with Taliban-controlled cells. The reported threats still don't make a huge amount of sense in terms of the reasons given.

Another possibility is that the Taliban simply want to deny ordinary Afghans phone service at night, perhaps to stop people reporting on militia movements and/or prevent them phoning for help if attacked. Or it might be that the Taliban - the Taliban press office, anyway - simply isn't up on the technical issues.

Or, it just could be that there's an element of good old-fashioned UK-suburban-style technofear mast phobia brewing among the hardcore religious zealots of Central Asia. We may see a fatwa on Wi-Fi in madrassas.

Read less about it from the Beeb here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.