Flight Ban On Laptops 'sparked by IS threat'

Britain will join the US in placing new restrictions on inbound flights from the Middle East, a reflection on how just about anything with power can be turned into an explosive.

Last February, a Somali man boarded a Daallo Airlines flight in Mogadishu, Somalia’s capital. Twenty minutes after the flight took off, the unassuming laptop in his carry-on bag detonated, blowing a hole in the side of the plane. 

The bomber was killed, and two others were injured. But if the aircraft had reached cruising altitude, the bomb would have ignited the plane’s fuel tank and caused a second, potentially catastrophic blast.

The Daallo explosion was one of a handful of terrorist attacks that the Department of Homeland Security cited to help explain why it introduced new rules for some passengers flying to the US with electronics. Starting recently, travelers on US-bound flights from 10 airports in the Middle East and North Africa will be required to check all electronic items larger than a smartphone.

A senior US administration official told reporters that the indefinite electronics ban was a response to continuing threats against civil aviation, but wouldn’t elaborate on the specific nature or the timing of the threat. 

Adam Schiff, the ranking member of the House Intelligence Committee, said in a statement that the ban was “necessary and proportional to the threat,” and that terrorists continue to come up with “creative ways to try and outsmart detection methods.”

The ban could be focused on simply separating items like laptop-bombs from passengers who would need to access them in order to set them off.

Electronics Has Made Smuggling Bombs Easier

This aircraft cabin ban on large electronic devices was prompted by intelligence suggesting a terror threat to US-bound flights.

The so-called Islamic State group (IS) has been working on ways to smuggle explosives on to planes by hiding them in electronics. The tip-off was judged by the US to be "substantiated" and "credible".

Inbound flights on nine airlines operating out of 10 airports in eight countries are subject to the US Department of Homeland Security ban.

Phones and medical devices are not affected.

US Secretary of State Rex Tillerson hosted a two-day meeting of ministers and senior officials from 68 nations to discuss the threat from IS. The Washington talks is the first full meeting of the coalition since December 2014.

This will be a chance for the Trump administration to put its stamp on the global battle against the Islamic State group, and for the reticent secretary of state to put his stamp on a foreign policy issue that the president has identified as a priority. The State Department says the meeting aims to accelerate efforts to defeat IS in its remaining strongholds in the Iraqi city of Mosul and the Syrian city of Raqqa.

On the campaign trail Mr Trump claimed to have a secret plan to obliterate the group. But his Pentagon has largely stuck with Barack Obama's strategy of supporting local ground forces, albeit with increased US military participation as the assault on Raqqa nears. 

Coalition members will also discuss how to stabilise and govern the cities after the conflict; and they're looking to see if Washington remains committed to a longer term effort to secure the region.

Eric Swalwell, a Democratic member of the House Intelligence Committee, told ABC News there was "a new aviation threat".

"We know that our adversaries, terrorist groups in the United States and outside the United States, seek to bring down a US-bound airliner. That's one of their highest value targets. And we're doing everything we can right now to prevent that from happening."

BBC:            DefenseOne:   

Why Hasn't MH370 Been Found?:

Four Threats To Aviation Security – and Four Responses:

 

 

« Tomorrow's Smart Cities Will Be Data Driven
A Quick Tour Of Cybercrime’s Underground »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.