U.S. tracks terrorists by phone



It's a cat-and-mouse-game over the airwaves.
CHRISTIAN SCIENCE MONITOR
WASHINGTON -- An ordinary-looking grid map of Riyadh adorns one wall of a command-and-control center deep inside a government building in Saudi Arabia's capital.
The map is higher-tech than it appears at first glance. Tiny embedded lights flash red when certain cell phones -- those belonging to suspected terrorists -- initiate or receive a call. Teams of officials from Saudi Arabia, the FBI, the CIA and the U.S. Treasury Department decide instantly whether simply to watch and listen to the suspected terrorist -- or to send in screaming police cars to nab him.
Halted plots
So far, officials say, this technology -- and others -- has enabled them to interrupt several terror plots and nab dozens of suspected terrorists. Certainly it hasn't served as a panacea, as the attacks on foreign workers in Saudi Arabia's oil-worker compounds last weekend show. At least 22 people, including one American, were killed when terrorists stormed a compound where foreign oil workers lived. One terrorist was captured, while three others escaped using hostages as shields.
It doesn't take long for terrorists to figure out how authorities are tracing them and then change methods. Still, the technology has proved helpful in rolling up cells in Europe, the Middle East, Southeast Asia and America.
"Today, gumshoe is really a lot more electronics," said Peter Crooks, a retired FBI agent who specialized in counterterrorism. "They have some pretty sophisticated equipment."
Chipping away
Cooperating officials in many countries have been quietly chipping away at terror cells over the past several months. Recent progress includes:
UJapan arrested five foreigners with suspected ties to Al-Qaida on May 26. Pakistan had detained four others May 24.
UThe Saudi government killed five suspected militants in the Buraida area May 21.
UOn May 6, the Philippines arrested an alleged cell leader with Jemaah Islamiyah, a Southeast Asian group tied to Al-Qaida.
USpanish police arrested a Moroccan April 27, and said it was seeking five others for roles in the March 11 Madrid train bombings. So far, 19 have been detained for their roles in those bombings.
USouth Africa deported five Al-Qaida members April 9. Government officials there say the moves led to the detentions of several others in Jordan.
UJordan foiled what it called the most serious attempt yet to overthrow its government on April 9. Four terrorists were killed and three detained after they attempted to use chemical weapons and truck bombs against several government targets, including the prime minister's office and the U.S. Embassy there.
They catch on
Terrorists, of course, catch on to the new tracking procedures and seek safer ways to communicate. Osama bin Laden, for example, stopped using satellite phones because he found out -- with the delivery of a guided missile -- that the United States was tracking his position via the satellite.
But terrorists found a new system that enabled them to use phones that were difficult, if not impossible, to track.
SIM cards, for Subscriber Identity Model, were developed to create a universal -- and cheaper -- cell-phone system. Under the old approach, a resident from, say, Britain would be charged at a local rate when making cell-phone calls in England. But if he were to travel to Germany, he would be charged long distance rates. Under the new system, he can buy a German SIM card -- which contains a fingernail-sized computer chip -- and make the same calls at local rates.
The information on pricing, minutes and local telephone numbers is encoded in the chip. But since there is no need for a local record of the purchaser's name and credit information, as there is when setting up a land line or a traditional cell-phone account, it makes it easier for people to use phones undetected.
"What we're seeing is that people who want to remain invisible to law enforcement are doing things like this in order to evade interceptions," said a telecommunications engineer who's helped develop ways to track cell-phone users. Still, he adds, "this doesn't make you immune from interceptions."
Database
After years of tracking terrorists, investigators have amassed a large database of land-line and traditional cell-phone numbers they are watching (or listening to). All it takes is a call from one of those numbers to a phone with a SIM card to discover who's using the undetectable phone.