Is it realistic for a terrorist to leave his phone number behind in the call list?

Is it realistic for a terrorist to leave his phone number behind in the call list? - Black Rotary Phone

In Source Code, it is shown that by redialing a number from the same phone that was connected to the bomb, Capt. found the guy finally who set up the bomb.

But is it realistic for a terrorist to leave any loose (major actually) end like this in such planning?

This gives birth to two questions. What was the necessity for the terrorist to call the number? And if it was called for checking the connection purpose, should not the terrorist have deleted it?

I think it is a major plot-hole in the movie and catching of the terrorist should have been done in another way.



Best Answer

Like default locale says, the phone would explode along with the bomb; So nobody would ever get to see it/recall the last number. Removing the last number should only be done if the bomber fears to be discovered. As the bomber has successfully bombed before and nobody on the train (without time travel capacities) can even begin to expect something, he doesn't expect someone to find his bomb.

You have to place yourself in the bomber's place. If you assume the bomb to fail, then you could just as well abort the mission. There's also a million other more important things to worry about (getting the components, building the bomb, smuggling it on the train, installing it, other bombings,...). Why not use a better/more reliable stand alone system (other than GSM) to trigger the bomb. Nobody would be able to trace that. Why not use a more basic phone with no memory at all? Why did he call the phone in the first place?

Just one of the many design choices you have to make while building a bomb and it doesn't seem too important compared to major issues (I would worry about hiding my explosives).

EDIT : Just thought of another explanation. If you want the bomb to explode only when receiving a call from a specific number, then you have to store that number in the cell phone. If you don't, it might blow when a telemarketer calls for an advanced subscription plan.




Pictures about "Is it realistic for a terrorist to leave his phone number behind in the call list?"

Is it realistic for a terrorist to leave his phone number behind in the call list? - Happy ethnic male in formal suit standing in modern hallway while holding suitcase in hand and talking on mobile phone
Is it realistic for a terrorist to leave his phone number behind in the call list? - Stylish woman with wireless handset near van
Is it realistic for a terrorist to leave his phone number behind in the call list? - Full length of young female in vintage outfit dialing number on wireless handset while standing near minivan



What are the 8 phases of terrorism?

8 Signs of Terrorism
  • Surveillance. Terrorists will likely observe a chosen target during the planning phase of an operation. ...
  • Inquiries. ...
  • Tests of Security. ...
  • Fundraising. ...
  • Acquiring Supplies. ...
  • Suspicious/Out-Of-Place Behavior. ...
  • Dry Runs. ...
  • Deploying Assets/Getting Into Position.


How do terrorists select their targets?

TARGET SELECTION BY TERRORISM IS DETERMINED BY THE GROUP'S CHARACTERISTICS AND MOTIVATION: GOAL, TYPE OF CONFLICT, ORIENTATION, SOURCE OF POWER, CHANCE OF SUCCESS, AND OPPOSITION TO THE GROUP.

What is one strategy the United States is using in an attempt to keep terrorists from entering the country Brainly?

What is one strategy the United States is using to keep terrorists from entering the country? It has required people entering along the Mexican and Canadian borders to surrender their phones. It has prohibited nighttime crossings by closing checkpoints along the Mexican and Canadian borders.

What characteristics do global and regional terrorist groups share regardless of their various goals?

What characteristics do global and regional terrorist groups share, regardless of their various goals? All terrorist groups use violence and attempt to spread fear in order to achieve their goals.



Meet the terrorists who scare Al-Qaeda




Sources: Stack Exchange - This article follows the attribution requirements of Stack Exchange and is licensed under CC BY-SA 3.0.

Images: Pixabay, Gustavo Fring, Victoria Art, Victoria Art