Innovative Solutions. Superior Training. Accelerated Performance.

Safe Passage Security Training Blog

Advancing Technology at the Hands of Terrorists

Posted by Vicki Tran on Thursday, December 10, 2015 at 12:00 PM

Find me on:

Technology is Available at the Palm of Our HandsNo one can deny that technology has evolved immensely in a short amount of time. Today’s technologies allow us to do things that weren’t possible years ago. 3D printers, encrypted phones, and drones are examples of how technology has advanced.

Despite the best intentions, there will still be those who will use new technology with bad intentions. Because technology is widespread and readily available for global consumption, it is often difficult to control who uses it. So when powerful technology gets in the wrong hands, it could spell disaster.

 

26/11 2008 Mumbai Terror Attacks

Taj Mahal Hotel Where 26/11 Attacks Took PlaceLet’s go back in time to the Mumbai attacks of 2008, also known as 26/11 after the date in which the attacks began. Although it was only seven years ago, it is a prime example of how a militant group used technology to aid in their attacks at a railway station, café, cinema, hospital, religious center, and two hotels.

Strategizing in advance, they used Google Earth’s satellite imagery to familiarize themselves with the area and synchronize their assaults. Armed with weaponry in one hand and a mobile phone in the other, ten assailants carried out the attacks while leaders in a remote location assisted via mobile phone and VoIP.

Live media coverage on TV allowed those in the isolated area to direct the attacks and warn of approaching law enforcement. “Throw one or two grenades. There may be a navy outside.” Communication between leaders and assailants enabled them to instantly research the names of hostages, verify what they looked like, find out their profession, and determine if they needed to be killed.

 

Advancing Technology

The Mumbai attacks were well-coordinated. They were sophisticated. They showed us how technology can be used in the wrong way to terrorize a community. Now, today’s technology is even more advanced than it was seven years ago. Things such as mobile apps for private chat messaging, social networking sites, and file sharing websites can be exploited.

Small 3D Printer TechnologyThe 3D printer was once a far away dream, but now it can create amazing things from a 3D-printed car part to a 3D-printed prosthetic hand for young girl. However some people have used 3D printing technology to design and print homemade weapons. Blueprints and videos for working 3D-printed guns were briefly made available online and open to the public. Anyone with access to a 3D printer could have produced these weapons at home.

There are mobile phones such as the Blackphone 2 and CryptoPhone designed to keep hackers and spies from tracing or stealing your personal info. They come with no bloatware or ties to cell phone carriers, voice encryption, secure messaging, and more. In fact, the Blackphone’s manual has already been posted anonymously online and shared widely on ISIS forums and Twitter accounts.

The rise of UAVs and drones also has its drawbacks. They are openly available for purchase and currently, no international rules or protocols exist to actively protect aviation airspace from drones. This has some concerned that terrorists will use drones to release improvised explosive devices (IED) or fire guns into a crowd.

 

Summary

These new technologies have opened up a world of possibilities. The positive value provided greatly outweighs any negatives arising from potential misuse. We cannot live in fear of technology although we can acknowledge this growing trend among terrorists and find ways to block or limit access to these new technologies.

What are some ways in which technology can be restricted? Let us know your ideas below.

Topics: Trends, General Security, Security Threats