Investigators traced terror suspect through his disposable cell phone
Officials ran the phone number through a 'number of databases' to help identify Shahzad, reports say
Computerworld - Investigators used a telephone number from a disposable cell phone to help locate the Pakistani-American man suspected in the Times Square car bomb attempt, according to reports.
Politico.com and other news outlets reported that an unnamed senior official said the suspect used a disposable phone to arrange the purchase of the 1993 Nissan Pathfinder left Saturday packed with bombs in Times Square.
Investigators "were able to basically get one phone number and by running it through a number of databases, figure out who they thought the guy was," the official told Politico. A spokesman at the U.S. Attorney's Office for the Southern District of New York and two spokesmen for the New York office of the FBI said they could not confirm that report.
The suspect, Faisal Shahzad, was arrested about 11:45 p.m. Monday at John F. Kennedy International Airport, while preparing to board a flight to Dubai, according to a joint statement from the FBI, the New York City Police Department and U.S. Attorney Preet Bharara.
Shahzad, 30, is a U.S. citizen born in Pakistan. He was scheduled to appear late Tuesday in federal court in Manhattan to be presented for formal charges, the FBI's statement said.
Several reports said that e-mails used in the purchase of the Pathfinder had led investigators to make an arrest. But more recent reports based on FBI sources said the disposable cell phone had apparently been used by Shahzad to arrange the purchase of the vehicle, and investigators were able to obtain that phone number and connect it to his name.
The Pathfinder's vehicle identification number had been removed from the dashboard, police discovered after the bombs inside failed to detonate. But a VIN from the bottom of the engine block was discovered, leading police to the registered owner in Connecticut, who had sold the vehicle for $1,800 in cash three weeks ago, with no exchange of paperwork, CNN.com and other sources reported, citing unnamed officials in the investigation.
Prior to the exchange of cash, cell phone calls were made to arrange the purchase, and the cell phone number allegedly used by Shahzad was obtained from the daughter of the Pathfinder's owner, who made the sale after the vehicle was advertised on Craigslist, the Politico report said.
Officials didn't tell Politico how they found Shahzad's name from the disposable cell phone, which was not in his possession at the time of the arrest. When a cell phone is purchased, even a disposable one, a user's name is usually connected in a database to a phone number that was assigned to a wireless carrier. The carrier would keep that database, as well as many authorized cell phone sellers.
A phone could be stolen and used with that assigned number by a third party, so it isn't clear how investigators knew that Shahzad purchased the vehicle or that he equipped it with a bomb and parked it in Times Square.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt's RSS feed. His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts