Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

It is obviously disconcerting to see how terrorists can use technology in a myriad of ways, from recruitment and communication to actually launching attacks. Then again it should come as little surprise given the ways legitimate' armies leverage tech to cause serious damage.

However, despite Inspire's claims, according to Western media, the UPS and FedEx attacks were unsuccessful.

Is it therefore fair to say anti-terrorist bodies are matching the extremists?

"Especially in the United States, they seem to have the resources that others are still hoping for," Hypponen added.

"It does seem they are up to par."

But complacency is a dangerous thing and one organisations and governments would do well to avoid. Thankfully, the coaltion Government seems to be listening, particularly when it comes to cyber terrorism threats.

In October 2010, upon publishing a report entitled "A Strong Britain in an Age of Uncertainty: The National Security Strategy,", cyber crime was ranked as one of the biggest threats this nation faces, alongside terrorism, chemical attacks and natural disasters. As such, the government pledged to invest hundreds of millions of pounds to help fight the battle against the baddies.

"[We are] more vulnerable because we are one of the most open societies in a world that is more networked than ever before," Prime Minister David Cameron and Deputy Prime Minister Nick Clegg, said in a joint statement released with the report.

"Geographically Britain is an island but economically and politically it is a vital link in the global network. That openness brings great opportunities but also vulnerabilities."

In addition to the 500 million funding, the coalition suggested that industry and government should unite to tackle such threats.

"Businesses and Government will need to work much more closely together to strengthen our defence against cyber attacks and to prepare for the worst, so that if it happens, we are able to recover rapidly and keep Britain moving," the leaders' statement continued.

Regardless of what side is using it, technology evidently can empower those seeking to bring harm to others. That said, technology can also save lives as well as threaten them.

Tech can be a beautiful thing, but at the same time cause cataclysmic damage on an almost unimaginable scale.

As IT-savvy users, aware of the power tech has to help us do our jobs, we should be alert for anything that looks out of place. Similarly, organisations should ensure they have the right back-ups and protections in place, should the unthinkable happen.

Click here to read our Business of IT feature guiding you through what you from need to do to create an effective business continuity plan.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Most Popular

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate
Mobile Phones

Huawei Mate 40 Pro 5G review: A tragically brilliant Mate

26 Nov 2020
What is phishing?
phishing

What is phishing?

25 Nov 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020