Cyber139- Protect, Prevent Cybercrime
  • Home
  • About
  • CYBER INCIDENT RECOVERY
  • Prevention
  • Protection
  • News
  • Contact

Category: Electronic Tracking

ISIS suspect Salah Abdeslam cornered by pizza delivery

March 22, 2016 By Cyber SecurityNo Comments

It appears as though Salah Abdeslam was found by a combination of security forces’ metadata research and a support network that couldn’t cook.

It appears as though Salah Abdeslam was found by a combination of security forces' metadata research and a support network that couldn't cook.Salah went missing after he wimped out of “martyrdom,” ditching his suicide vest and calling friends to come pick him up and take him home. The car was stopped by the French, but their names weren’t available to the police yet.

Clearly, security forces are not sharing counterterrorism information fast enough to handle modern operations. A slow moving target like the Soviets, or even al Qaeda, allows for a more relaxed approach. ISIS’ operational tempo and behavior is too fast and haphazard.

The Molenbeek area where Salah had been hiding is riddled with radical support networks and sympathizers. He was able to rely on his friends and other support networks. Police targeted elements of these support networks, and eventually discovered a link to Salah himself.

Belgian and French police, who had worked intensively together since November 13, carried out a midday check on what they thought was a defunct terrorist safe house. The utility bills hadn’t been paid in months, officials said, leading police to assume the apartment in the Forest district of southern Brussels stood empty. The six person team didn’t expect to meet resistance and brought no police backup or special forces support.

When the police opened the door, they were shot at with a Kalashnikov and “a riot gun,” according to the Belgian authorities. Four officers were wounded, including a French policewoman. Heavily armed police pursued suspects across the rooftops. One gunman was killed. Two fled the scene, evading capture even though police had sealed off the area.

The “defunct” safe house had a glass with Salah’s fingerprint. Police developed a number of leads and ended up monitoring a house in the Molenbeek area.

Staking out the house, the police became convinced that a larger group of people was there after a woman who seemed to live there ordered several pizzas, according to two security officials.

Just like the raid on el Chapo Guzman was triggered by a large food order, it seems Salah’s capture was based on too many pizzas. Maybe fugitives might want to consider cooking at home, rather than ordering delivery.

It seems that significant parts of the manhunt were enabled by recovering and analyzing mobile phones used by the various suspects.

Aside from the fingerprint found, earlier raids on suspected terrorist hideouts brought other important leads, according to officials. Electronic devices confiscated in earlier raids helped authorities track Abdeslam down, said a Belgian source.

Once a suspect’s mobile number and sim card have been identified, investigators can then serve a court order on telecoms operators to track the number and card down to the nearest phone tower.

The location information generated by the mobile devices (phones and possibly tablets) enabled security forces to track not only individuals, but to map out their networks via e.g. co-location. Mobile phones, even when encrypted and even when using encrypted communications tools, still provide a rich source of intelligence information to security forces.

Modern connected society is a huge data source for the intelligence analyst. Social connections are mapped out via online social networks such as Facebook, but also via the mobility of personal tracking devices such as mobile phones. An underground operative, such as Salah, can avoid using mobiles and computers, but the various elements of his above ground support network are as reliant on modern tools as anyone else.

The problem for underground operatives is that they are reliant on support networks. Support networks for clandestine organizations are almost always based on social networks. Modern society makes support networks an open book for anyone with access to the data (social apps, telco records, etc) and the analytic tools to parse that data (eg Palintir, analysts notebook, etc).

From: https://medium.com/@thegrugq/man-hunting-the-sport-of-security-forces-373d167a3066#.h3otbr3gj

Cyber Security, Cyber Security Force, Data Security, Electronic Tracking, Metadata Research, Social Connections, Uncategorized

24/7 HELPLINE – 03333 393 139

CONTACT CYBER 139 FOR INSTANT HELP - PLEASE RING US NOW ON 03333 393 139 BEFORE YOU SWITCH ANYTHING OFF!

PASSED PDSC DIGITAL ASSESSMENT

PASSED PDSC DIGITAL ASSESSMENTDemonstrated that we have implemented measures that are appropriate to own level of risk. Applicants are assessed by certified cyber security professionals through BSI.

Gloucestershire Safer Cyber Forum member

Cyber 139- Accredited by Gloucestershire Constabulary as part of their Gloucestershire Safer Cyber Forum
We are accredited by Gloucestershire Constabulary as part of the Gloucestershire Safer Cyber Forum.

Recent Posts

  • DNS attacks cost finance firms millions of pounds a year December 6, 2019
  • ICO issues maximum £500,000 fine to Facebook October 3, 2019
  • How Malwarebytes was founded PT2 August 26, 2019
  • How Malwarebytes was founded PT1 August 16, 2019
  • CYBER 139 PASSED PDSC ASSESSMENT July 15, 2019
  • IoT security legislation needed April 3, 2019
  • Nearly half of UK firms hit by cyber phishing attacks March 22, 2019
  • Businesses warned to prepare for cyber security extortion campaigns February 22, 2019
  • Making the UK the safest place to live and work online February 3, 2019
  • Use of Cyber Security Insurance increasing January 31, 2019

Categories

  • Cyber 139
  • Cyber Attack
  • Cyber Attack Planning
  • Cyber Attack Prevention
  • Cyber Attack Protection
  • Cyber Attack Recovery
  • Cyber Attack Recovery Birmingham
  • Cyber Attack Recovery Bristol
  • Cyber Attack Recovery Cardiff
  • Cyber Attack Recovery Cheltenham
  • Cyber Attack Recovery Glos
  • Cyber Attack Recovery London
  • Cyber Attack Recovery Manchester
  • Cyber Attack Recovery Oxford
  • Cyber Attack Recovery Reading
  • Cyber Attack Recovery Worcester
  • Cyber Incident Recovery Services
  • Cyber Prevention Cheltenham
  • Cyber Protection Cheltenham
  • Cyber Safety
  • Cyber Secure
  • Cyber Security
  • Cyber Security Cheltenham
  • Cyber Security Force
  • Cyber Theft
  • Cybercrime
  • Cybercriminals
  • Data Breach Repair
  • Data Protection
  • Data Security
  • DDOS Website Attack
  • Electronic Tracking
  • Email Ransonware
  • Email Security
  • GCHQ
  • GDPR Data Protection
  • Internet Of Things
  • Malware
  • Metadata Research
  • National Cyber Security Centre
  • NCSC
  • Password Protection
  • PDSC Police Digital Security Centre
  • Phishing Attack
  • Ransomware Attack
  • Safe Browser Surfing
  • Small Business Cyber Incident Recovery Birmingham
  • Small Business Cyber Incident Recovery Bristol
  • Small Business Cyber Incident Recovery Cardiff
  • Small Business Cyber Incident Recovery Cheltenham
  • Small Business Cyber Incident Recovery Glos
  • Small Business Cyber Incident Recovery Gloucestershire
  • Small Business Cyber Incident Recovery London
  • Small Business Cyber Incident Recovery Manchester
  • Small Business Cyber Incident Recovery Oxford
  • Small Business Cyber Incident Recovery Reading
  • Small Business Cyber Incident Recovery Worcester
  • Small business cyber prevention Birmingham
  • Small business cyber prevention Bristol
  • Small business cyber prevention London
  • Small business cyber prevention Manchester
  • Small business cyber prevention Reading
  • Small business cyber protection
  • Small business cyber protection Birmingham
  • Small Business Cyber Protection Bristol
  • Small business cyber protection Cardiff
  • Small business cyber protection Cheltenham
  • Small business cyber protection Glos
  • Small business cyber protection Gloucestershire
  • Small business cyber protection London
  • Small business cyber protection Manchester
  • SME Cyber Incident Recovery Birmingham
  • SME Cyber Incident Recovery Bristol
  • SME Cyber Incident Recovery Cardiff
  • SME Cyber Incident Recovery Cheltenham
  • SME Cyber Incident Recovery Glos
  • SME Cyber Incident Recovery Gloucestershire
  • SME Cyber Incident Recovery London
  • SME Cyber Incident Recovery Manchester
  • SME Cyber Incident Recovery Oxford
  • SME Cyber Incident Recovery Swindon
  • SME Cyber Incident Recovery Worcester
  • SME Cyber Prevention Birmingham
  • SME Cyber Prevention Bristol
  • SME Cyber Prevention Glos
  • SME Cyber Protection Birmingham
  • SME Cyber Protection Bristol
  • SME Cyber Protection Glos
  • SME Cyber Security Birmingham
  • SME Cyber Security Bristol
  • SME Cyber Security Cardiff
  • SME Cyber Security Glos
  • SME Cyber Security London
  • SME Cyber Security Manchester
  • SME Cyber Security Oxford
  • SME Cyber Security Reading
  • SME Cyber Security Swindon
  • SME Cyber Security Worcester
  • SME GDPR guide Birmingham
  • SME GDPR guide Bristol
  • SME GDPR guide Cheltenham
  • SME GDPR guide Gloucester
  • SME GDPR guide Oxford
  • SME GDPR guide Swindon
  • SME GDPR guide Worcester
  • Social Connections
  • Uncategorized
  • Virtual CISO Birmingham
  • Virtual CISO Bristol
  • Virtual CISO Cardiff
  • Virtual CISO Cheltenham
  • Virtual CISO Gloucester
  • Virtual CISO London
  • Virtual CISO Manchester
  • Virtual CISO Oxford
  • Virtual CISO Reading
  • Virtual CISO Worcester

Archives

  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015

Search

Web Design by Website Design Cheltenham
Digital Marketing by Dyenamic Solutions
Another winnining site by Business Win
SEO Services by Search Engine Optimisation Services Cheltenham
WordPress Theme | by 2022 © Website Design Cheltenham
 

Loading Comments...
 

You must be logged in to post a comment.