Electronic Weapons: Hand Signals Can Save Your Life

Archives

May 3, 2007: In Iraq and Afghanistan, the enemy knows that their communications can be overheard, but are willing to risk that. Operating without wireless commo (cell and satellite phones, or walkie talkies) is seen as more dangerous. Knowing this, the terrorists resort to some pretty effective countermeasures. The most common on is using code words. They know that the enemy has to rely on translators, which will slow them down in attempts to translate the code words.

Some of the older Taliban and al Qaeda operators were exposed to communications security training when the Soviet Union still existed (and regularly sent Arabs and Afghans to these schools). They caution the younger fighters to be careful with codes. The old guys know about traffic analysis, and techniques for quickly breaking simple codes. The old guys are right, and the young guys are regularly getting stung by Western communications intelligence teams.

The traffic analysis identifies the various users, and the time and location when they broadcast. Small teams of intel operatives will operate equipment in hostile territory, or leave untended devices that monitor traffic, and report back to a central station. Computers and software have gotten much more powerful in the last few decades. Collect enough information on who has said what, when via cell phone or walkie talkie, and you know a lot about the users (where they are, what they've done, and what they can do next).

The old timers were right about cracking the codes. There's now software what can take spoken Arabic and translate it, and put it in a database, apply some powerful algorithms, and crack the code. But these tools are not available everywhere, or all the time. So the chatter on terrorist web sites is mixed as to the existence of such kafir (non-Moslem) magic and, if it does exist, how powerful it is. But the magic is out there, and there's never enough of it. The codes are not always cracked in time, and the traffic analysis sometimes comes up with something too fuzzy to be useable. But when it does work, the terrorists would be better off sending scribbled notes, or using hand signals.

 


Article Archive

Electronic Weapons: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close