Smartphones are double-edged sword for terrorists

When it comes to police investigations, smartphones sometimes provide more information than their owners.
Friday 07/12/2018
A downfall and an asset. A 2015 file picture shows a police officer watching a CCTV footage of a bomb attack on a smartphone at the entrance of the Lula Institute in Sao Paulo. (Reuters)
A downfall and an asset. A 2015 file picture shows a police officer watching a CCTV footage of a bomb attack on a smartphone at the entrance of the Lula Institute in Sao Paulo. (Reuters)

PARIS - Bombs and guns aside, a smartphone can be a powerful weapon in the hands of terrorists but it can also provide intelligence services with tools to track militants down.

The Paris attacks of November 13, 2015, remain one of the best-known examples of a large-scale assault that could not have been planned without phones.

Islamic State (ISIS) gunmen and bombers who struck the Bataclan concert hall and other nightlife spots used phones extensively to coordinate the carnage, said a former French anti-terrorist official, speaking on condition of anonymity.

Just before entering the Bataclan, where they massacred 90 people, the attackers sent a text message to accomplices in Belgium: “We’re going ahead. It’s started.”

However, if smartphones have been a “game changer” for jihadists, their use by extremists goes much further back than the Paris attacks.

“As of 2003, in Iraq, home-made bombs started being set off by the sending of an SMS (short message service) as American convoys drove past. This caught on and was then repeatedly used by al-Qaeda,” the ex-official said.

These days, encrypted apps such as Telegram, Wire and WhatsApp can help jihadists communicate while evading police tracking — or at least complicate efforts to decode their messages.

ISIS has published online tutorials for years in several languages explaining how to choose the best software to evade detection in war zones. For new recruits in developing countries, where smartphones are more common than computers, there are different strategies still.

“Phones are no longer phones — they’re computers,” said Laurent Heslault, director of security strategies at Symantec, a security group. “They are far more powerful than what we had on our desks 10 years ago.

“They have more computing power, more memory and connection capabilities. They are very powerful tools when it comes to communicating.”

That has also made it much easier for jihadist groups to recruit new members.

Smartphones “enable people to reach out for propaganda” with the swipe of a screen, said the retired official. “Thirty years ago, guys used to exchange video cassettes, then it was CDs. Now it’s online and can be looked up at any time,” he said.

For propagandists, videos of attacks can be filmed and uploaded in the blink of an eye.

“You can film attacks, claim responsibility, use (a phone) to take photos and film reconnaissance operations,” the ex-official said.

The smartphone can be an extremist’s downfall as well as his best asset, however. Intelligence agencies have grown better at using phones to identify suspects, spy on them and, in case of capture, lift data for use as evidence in court.

That has raised difficult questions for tech giants that promise their users privacy. Most famously, Apple faced a court showdown with the FBI after agents sought access to the data of the attackers who killed 14 people in San Bernardino, California, in December 2015.

Investigators dropped the case after finding a way into the phone without help from Apple, which argued that helping authorities access a phone would set a dangerous precedent.

Further afield, governments have used phone data extensively to pinpoint extremist suspects.

The French military intervention in Mali, launched in 2013 after jihadists took over the northern half the country, started with air strikes whose targets were chosen based on phone data, the former French official said.

“Today all air strikes focus on telephones,” he added. “Even if you keep changing the SIM card the phone has its own identity and once detected can continue being tracked.”

When it comes to police investigations, smartphones sometimes provide more information than their owners. They might allow investigators to work their way back along an information trail, snare other members of a suspect’s network and track sleeper cells, he added.

“Smartphones make you a target,” the expert said, “because of this jihadist leaders have learned to keep away from them. For the past few years, there’s been a marked return to using human envoys.”

(AFP)