Cyberterrorism: The Next Threat From Islamic State

Earlier this year the attacks in London and Manchester catapulted terrorism back into the mainstream for many UK citizens.

History demonstrates that terrorism, like any other entity, is constantly evolving, with earlier groups such as the IRA and Basque separatists ETA notorious for their breadth of tactics.

Scholars agree that prior to its recent territorial setbacks, including ejection from Mosul, one of the reasons Islamic State (IS)  had managed to successfully preside over such a vast swathe of land was because of its unique blend of a combination of guerrilla, infantry and organised crime tactics.

As IS loose territory in the Middle East we have seen an upsurge in IS attacks focusing on softer and less protected targets in the West, such bars and bridges.

The flexibility the organisation has demonstrated in the past suggest it is unlikely to ignore cyber for long and several prominent terrorism authorities argue “It is no longer a matter of if cyberterror will emerge, but when”.  States have demonstrated that they can bring down power stations (Stuxnet in Iran or BlackEnergy in Ukraine), so non-state actors have a template to follow.

Given both the significant funds still available to IS even now, and the ease by which hacking tools are available to purchase on the dark web, a combination of cybercrime and jihadism is a likely future threat.

If, for example, the motivations behind the WannaCry NHS ransomware attack had been clearly ideological rather than financial, then the consequences could have been a lot worse.

Hypothetically, if an IS supporter modified off-the-shelf hacking tools in an attempt to take down the national grid or gain access to computers at Heathrow airport, the consequences could be dire.

That's before we entertain the possibility that the wealth the group enjoys could easily be channelled into a state sponsored hacking collective similar to that purported to be orchestrated by the Chinese and Russian governments.

While there has only been one confirmed cyber-terrorism case, another case involving a Trojan infecting computers at a Madrid airport in 2008 outlines the potential impact – the resulting crash saw a hundred and fifty-four injuries –  although there was no evidence of terrorist involvement.

While this should not be overstated, it is not inconceivable that the two major threats of our time could come together.

The combination of increased reliance on technology, allied with the increase in cyber-criminals' capabilities, will give terrorists the motivation and capacity to carry out a new vector of attack capable of producing mass casualties without requiring the perpetrator to leave their home.

With a world almost totally reliant on computers the potential damage caused by hackers is limitless, combine this with the ideological fanaticism showed by groups such as IS and you have an issue that cannot be ignored.

Given that the government is struggling to get to grips with surges in both terrorist attacks and cyber-crime, it is undeniable there is some serious thinking to be done at governmental level to ensure that, should IS exploit the available technology, the UK isn't left paralysed by tech savvy jihadis.

Solving one of these mammoth issues would be difficult enough, but getting to grips with both may prove the challenge of our time. With no end in sight for either, the Government must get to work.

SC Magazine:

You Might Also Read:

Cyber Caliphate's Scorecard:

Flight Ban On Laptops 'sparked by IS threat':

 

« Why We Need a Transatlantic Charter for Data Security and Mobility
Microsoft Cloud Earnings Beat Expectations »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

Southern Cyber

Southern Cyber

At Southern Cyber, our mission is to deliver world-class information security solutions that align businesses with leading security frameworks and compliance standards.