You are here: Home » International » News » Politics
Business Standard

Why jihadi terrorist leaders are asking accomplices to avoid smartphones

The Islamic State group gunmen and bombers who struck the Bataclan concert hall and other nightlife spots used smartphones extensively

Smartphones  |  Bomb  |  Terrorism

AFP | PTI  |  Paris 

Minor ISIS jihadis executing prisoners. (Photo: Video grab)
File photo minor ISIS jihadis executing prisoners. (Photo: Video grab)

Bombs and guns aside, a can be a powerful weapon in the hands of a terrorist -- but it can also provide intelligence services with the tools to track them down.

Three years ago to the day, the attacks of November 13, 2015 remain one of the best known examples of a large-scale assault that could not have been planned without phones.

The Islamic State group gunmen and bombers who struck the Bataclan concert hall and other nightlife spots used them extensively to coordinate the carnage, said a former French anti-terrorist official, speaking on condition of anonymity.

Just before entering the Bataclan, where they massacred 90 people, the attackers had sent a text message to accomplices in Belgium: "We're going ahead. It's started." But if have been a "game-changer" for jihadists, their use by the world's extremists goes much further back than the attacks.

"As of 2003, in Iraq, home-made bombs started being set off by the sending of an SMS as American convoys drove past. This caught on and was then repeatedly used by Al-Qaeda," the ex-official told AFP.

These days, encrypted apps such as Telegram, Wire and WhatsApp can help jihadists communicate while evading police tracking -- or at least complicate efforts to decode their messages.

For several years IS has published online tutorials in several languages explaining to jihadis how to choose the best software to evade detection in war zones.

For new recruits in developing countries, where are more common than computers, there are different strategies still.

"Phones are no longer phones -- they're computers," said Laurent Heslault, director of strategies at Symantec, a group.

"They are far more powerful than what we had on our desks 10 years ago," he added.

"They have more computing power, more memory and connection capabilities. They are very powerful tools when it comes to communicating."

That has also made it much easier for jihadist groups to recruit new members.

"enable people to reach out for propaganda" with the swipe of a screen, said the retired official.

"Thirty years ago, guys used to exchange videocassettes, then it was CDs. Now it's online and can be looked up at any time." For propaganda-makers, videos of attacks can be filmed and uploaded in the blink of an eye.

"You can film attacks, claim responsibility, use (a phone) to take photos and film reconnaissance operations," the ex-official said.

But the can be an extremist's downfall as well as their best asset.

Intelligence agencies have grown better at using phones to identify suspects, spy on them -- and, in case of capture, lift data for use as evidence in court.

That, in turn, has raised difficult questions for tech giants who promise their users privacy.

Most famously, faced a court showdown with the FBI after agents sought access to the data of the attackers who killed 14 people in San Bernardino, California, in December 2015.

Investigators dropped the case after finding a way into the phone without help from Apple, which argued that helping authorities access a phone would set a dangerous precedent.

Further afield, governments have used phone data extensively to pinpoint extremist suspects.

The French military intervention in Mali, launched in 2013 after jihadists took over the northern half the country, started with air strikes whose targets were chosen based on phone data, the former French official said.

"Today all air strikes focus on telephones," he added.

"Even if you keep changing the SIM card the phone has its own identity and once detected can continue being tracked." And when it comes to police investigations, smartphones sometimes provide more information than their owners.

They might allow investigators to work their way back along an information trail, snare other members of a suspect's network, and track sleeper cells, he added.

"Smartphones make you a target," the expert said.

"Because of this jihadist leaders have learned to keep away from them. For the past few years, there's been a marked return to using human envoys," he added.

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Tue, November 13 2018. 11:00 IST