Feeds

New York mulls terrorist cell phone jamming

Not as simple as it sounds

Beginner's guide to SSL certificates

New York Police officials are studying whether it's possible to disrupt cell phone communications among terrorists during an attack on the city following reports that gunmen in Mumbai used hand-held devices during a deadly rampage in November.

Police Commissioner Raymond Kelly discussed the possible tactic in Washington on Thursday during a hearing before the Senate Committee on Homeland Security and Governmental Affairs. He said plans are still in the "discussion stage," and that any final plan would have to balance a variety of complex issues.

"Law enforcement needs to find ways to disrupt cell phones and other communications" during attacks, he said, according to The New York Times. "Our communications and technology people are looking for ways to disrupt cell phone and hand-held devices in a pinpointed way."

Among the prickly concerns officials are grappling with is the need for emergency personnel and civilians to make emergency calls during such a crisis. Law enforcement might also benefit from monitoring the communications of terrorists during an attack.

The police department's study comes two months after Islamic militants armed with automatic rifles and grenades besieged Mumbai for three days, killing 165 people and wounding 304. They used hand-held devices to coordinate attacks, order the killing of specific hostages and adjust tactics while their attack were under way.

Electronic jamming of cell phones is certainly possible, but it can usually be carried out only by blocking communications for a wide geographic area. That means the blocking of cell phone calls during an attack would also prevent large numbers of law-abiding citizens from communicating during a moment of crisis.

It would also do little to prevent the use of satellite phones. ®

Remote control for virtualized desktops

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.