Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

One feature we came across spoke specifically about how the UPS and FedEx attempts were set up.

Talking about the connection between the mobile device, revealed to be a Nokia, and the printer cartridge, the article read: "We removed the circuit board from the mobile and attached it next to a circuit board of the printer so if passed through a scanner the mobile circuit board would blend in with the circuit boards of the printer and even if opened it would not be recognised as a mobile."

Propaganda?

The same article mocked British efforts at preventing attacks, in particular intimating other technologies will be used in future strikes.

"The British Government said that if a toner weighs more than 500 grams it won't be allowed to board a plane," it read.

"Who is the genius who came up with this suggestion? Do you think that we have nothing to send but printers?"

Given the publication is pushing propaganda and it's questionable just how effective such methods would be against the most up-to-date equipment, it would be easy to dismiss some of the threats. The reality is, the possibilities are very worrying indeed.

One startling claim made in the same edition suggested the aforementioned bombs had actually exploded, rather than found in the UK and UAE. The writers even went as far to say the operation, and the technology that went with it, had succeeded.

They also revealed the cost of the attack, whether it was foiled or not, amounted to $4,200 (2,625). The money was spent on two Nokia mobiles for $150 each and two HP printers for $600 in total. The rest went on shipping, transportation and other "miscellaneous expenses." It appears even on a tight budget, anyone wanting to cause some damage won't need to spend big the downside of low prices of today's technology.

Time also appeared to be of little consequence in this operation, with just three months required from start to finish, according to Inspire writers. Expertise, it seems, is not in short supply either.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

28 Sep 2020