Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

One feature we came across spoke specifically about how the UPS and FedEx attempts were set up.

Talking about the connection between the mobile device, revealed to be a Nokia, and the printer cartridge, the article read: "We removed the circuit board from the mobile and attached it next to a circuit board of the printer so if passed through a scanner the mobile circuit board would blend in with the circuit boards of the printer and even if opened it would not be recognised as a mobile."

Propaganda?

The same article mocked British efforts at preventing attacks, in particular intimating other technologies will be used in future strikes.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"The British Government said that if a toner weighs more than 500 grams it won't be allowed to board a plane," it read.

"Who is the genius who came up with this suggestion? Do you think that we have nothing to send but printers?"

Given the publication is pushing propaganda and it's questionable just how effective such methods would be against the most up-to-date equipment, it would be easy to dismiss some of the threats. The reality is, the possibilities are very worrying indeed.

One startling claim made in the same edition suggested the aforementioned bombs had actually exploded, rather than found in the UK and UAE. The writers even went as far to say the operation, and the technology that went with it, had succeeded.

They also revealed the cost of the attack, whether it was foiled or not, amounted to $4,200 (2,625). The money was spent on two Nokia mobiles for $150 each and two HP printers for $600 in total. The rest went on shipping, transportation and other "miscellaneous expenses." It appears even on a tight budget, anyone wanting to cause some damage won't need to spend big the downside of low prices of today's technology.

Time also appeared to be of little consequence in this operation, with just three months required from start to finish, according to Inspire writers. Expertise, it seems, is not in short supply either.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/security/bugs/354180/google-to-offer-15m-to-anyone-that-can-break-a-pixel-4
bugs

Google to offer $1.5m to anyone that can break a Pixel 4

22 Nov 2019
Visit/public-cloud/34850/salesforce-takes-aws-relationship-to-the-next-level
News

Salesforce takes AWS relationship to the next level

19 Nov 2019