Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

It is obviously disconcerting to see how terrorists can use technology in a myriad of ways, from recruitment and communication to actually launching attacks. Then again it should come as little surprise given the ways legitimate' armies leverage tech to cause serious damage.

However, despite Inspire's claims, according to Western media, the UPS and FedEx attacks were unsuccessful.

Is it therefore fair to say anti-terrorist bodies are matching the extremists?

"Especially in the United States, they seem to have the resources that others are still hoping for," Hypponen added.

Advertisement - Article continues below

"It does seem they are up to par."

But complacency is a dangerous thing and one organisations and governments would do well to avoid. Thankfully, the coaltion Government seems to be listening, particularly when it comes to cyber terrorism threats.

In October 2010, upon publishing a report entitled "A Strong Britain in an Age of Uncertainty: The National Security Strategy,", cyber crime was ranked as one of the biggest threats this nation faces, alongside terrorism, chemical attacks and natural disasters. As such, the government pledged to invest hundreds of millions of pounds to help fight the battle against the baddies.

"[We are] more vulnerable because we are one of the most open societies in a world that is more networked than ever before," Prime Minister David Cameron and Deputy Prime Minister Nick Clegg, said in a joint statement released with the report.

"Geographically Britain is an island but economically and politically it is a vital link in the global network. That openness brings great opportunities but also vulnerabilities."

In addition to the 500 million funding, the coalition suggested that industry and government should unite to tackle such threats.

"Businesses and Government will need to work much more closely together to strengthen our defence against cyber attacks and to prepare for the worst, so that if it happens, we are able to recover rapidly and keep Britain moving," the leaders' statement continued.

Regardless of what side is using it, technology evidently can empower those seeking to bring harm to others. That said, technology can also save lives as well as threaten them.

Tech can be a beautiful thing, but at the same time cause cataclysmic damage on an almost unimaginable scale.

As IT-savvy users, aware of the power tech has to help us do our jobs, we should be alert for anything that looks out of place. Similarly, organisations should ensure they have the right back-ups and protections in place, should the unthinkable happen.

Advertisement - Article continues below

Click here to read our Business of IT feature guiding you through what you from need to do to create an effective business continuity plan.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019