Flight Ban On Laptops 'sparked by IS threat'

Britain will join the US in placing new restrictions on inbound flights from the Middle East, a reflection on how just about anything with power can be turned into an explosive.

Last February, a Somali man boarded a Daallo Airlines flight in Mogadishu, Somalia’s capital. Twenty minutes after the flight took off, the unassuming laptop in his carry-on bag detonated, blowing a hole in the side of the plane. 

The bomber was killed, and two others were injured. But if the aircraft had reached cruising altitude, the bomb would have ignited the plane’s fuel tank and caused a second, potentially catastrophic blast.

The Daallo explosion was one of a handful of terrorist attacks that the Department of Homeland Security cited to help explain why it introduced new rules for some passengers flying to the US with electronics. Starting recently, travelers on US-bound flights from 10 airports in the Middle East and North Africa will be required to check all electronic items larger than a smartphone.

A senior US administration official told reporters that the indefinite electronics ban was a response to continuing threats against civil aviation, but wouldn’t elaborate on the specific nature or the timing of the threat. 

Adam Schiff, the ranking member of the House Intelligence Committee, said in a statement that the ban was “necessary and proportional to the threat,” and that terrorists continue to come up with “creative ways to try and outsmart detection methods.”

The ban could be focused on simply separating items like laptop-bombs from passengers who would need to access them in order to set them off.

Electronics Has Made Smuggling Bombs Easier

This aircraft cabin ban on large electronic devices was prompted by intelligence suggesting a terror threat to US-bound flights.

The so-called Islamic State group (IS) has been working on ways to smuggle explosives on to planes by hiding them in electronics. The tip-off was judged by the US to be "substantiated" and "credible".

Inbound flights on nine airlines operating out of 10 airports in eight countries are subject to the US Department of Homeland Security ban.

Phones and medical devices are not affected.

US Secretary of State Rex Tillerson hosted a two-day meeting of ministers and senior officials from 68 nations to discuss the threat from IS. The Washington talks is the first full meeting of the coalition since December 2014.

This will be a chance for the Trump administration to put its stamp on the global battle against the Islamic State group, and for the reticent secretary of state to put his stamp on a foreign policy issue that the president has identified as a priority. The State Department says the meeting aims to accelerate efforts to defeat IS in its remaining strongholds in the Iraqi city of Mosul and the Syrian city of Raqqa.

On the campaign trail Mr Trump claimed to have a secret plan to obliterate the group. But his Pentagon has largely stuck with Barack Obama's strategy of supporting local ground forces, albeit with increased US military participation as the assault on Raqqa nears. 

Coalition members will also discuss how to stabilise and govern the cities after the conflict; and they're looking to see if Washington remains committed to a longer term effort to secure the region.

Eric Swalwell, a Democratic member of the House Intelligence Committee, told ABC News there was "a new aviation threat".

"We know that our adversaries, terrorist groups in the United States and outside the United States, seek to bring down a US-bound airliner. That's one of their highest value targets. And we're doing everything we can right now to prevent that from happening."

BBC:            DefenseOne:   

Why Hasn't MH370 Been Found?:

Four Threats To Aviation Security – and Four Responses:

 

 

« Tomorrow's Smart Cities Will Be Data Driven
A Quick Tour Of Cybercrime’s Underground »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.