Taliban hackers phone UK soldiers families

Discussion in 'Current Affairs, News and Analysis' started by Skynet, Aug 22, 2007.

Welcome to the Army Rumour Service, ARRSE

The UK's largest and busiest UNofficial military website.

The heart of the site is the forum area, including:

  1. Taliban hackers phone UK soldiers' families
    August 22, 2007 03:53pm

    TALIBAN extremists are reportedly phoning the families of troops fighting in Afghanistan and telling them their loved ones are dead.

    Afghan insurgents have been using mobile phone-hacking technology to extract phone numbers to target the families of British troops, The Sun newspaper reported today.

    According to The Sun, a Taliban fanatic called the wife of an Royal Air Force officer and told her: “You’ll never see your husband alive again – we have just killed him.”

    After calling the RAF, she was told that her husband was safe and well.

    As a result of opposition forces using advanced technology to monitor calls made on mobile phones, British servicemen have been banned from using their phones.

    “We assume these days that every conversation over mobile phones is being heard by our enemies,” a senior officer said.

    “They have some pretty powerful friends and allies, who are giving them some very sophisticated help. They will use that information in any way they can to damage us, whether it is physically or mentally.”

    The Ministry of Defence said families of troops in Iraq had also suffered from “nuisance calls” in the past year.
  2. Bolocks.

  3. Not as difficult as it would seem. The dialled number is sent as a packet in clear on the telephony network. Anyone with access to the GSM network routing the call would see these numbers.
  4. ViroBono

    ViroBono LE Moderator

    DIN 2007DIN03-006 is hardly advanced technology.
  5. Correct. It's not being pulled out of the ether. GSM hacking on the fly , is still a holy grail for hackers and phreakers.

    The weak link remains the GSM exchange, and routing calls through an Afghan or Pakistani exchange is a major potential security risk.

    Using Afghan Sim cards, while cheap as chips, is probably lunacy.

    Then of course, thanks to Banks, Mortgage and loan companies, there is all the information held by Indian and Pakistani call centres , which is being sold off as numerous sources report.

    This topic came up some time ago on Arrse Bravo, I think we were talking about one of the Ericsson? "GSM station in a box" solutions , which could be set up in no time at all, was secure and didn't use the local countries network.

    Personally , for a quick and dirty secure solution, (Without taking anything away from your offer) I'd broadband it out via Skype. The new generation of mobile phones can run the software needed, and with a big enough pipe , you'll get calls out for free, less the cost of the existing BB connection. It would certainly negate the need for time restricted calls.
  6. :D :D :D :D :D :D

    new keyboard please!
  7. It's a GSM network in a box yes but certainly not at Ericsson prices. It's been deployed in several theatres already for secret squirrel types but I am now able to offer it with an interconnect to a UK Network provider using Sigtran going nowhere near any unsecure exchanges. Just as flexible as the Skype option but with the ability for the lads to use their own phones and SIM cards. The call rate could also be sorted to provide a rate acceptable to the usage. The equipment costs are negligable due to the amount of calls. Deployable with days, rather then weeks and months.
  8. TheIronDuke

    TheIronDuke LE Book Reviewer

    *Edit* Sorry. Had a blond moment. Daft question.
  9. Bravo, check PM's please?
  10. Done. Will make the call. Many thanks.
  11. Is this a known common OPSEC/PERSEC problem or is this more to do with MoD controlling communication?
  12. Bit of both I would assume???
  13. More of the latter I would say, especially since the last DIN.

    The Americans have had a ban on insecure mobile comms and cameraphones for some time.