IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Terrorists, technology and fighting back

We investigate how extremists are using technology in their attempts to spread terror and threaten businesses.

Obviously IT PRO couldn't speak to anyone directly involved in an extremist group, but who better to talk to about how adept such people are with technology than F-Secure's Mikko Hypponen, an IT security pro who has worked with law enforcement in the past.

First off, terrorists employ the same technologies most people use on a daily basis, from email to web forums, Hyponnen said.

"The stereotype of a Taliban terrorist riding on a camel completely ignorant of modern technology doesn't really hold. That's not what we're talking about," he continued.

"These are educated people who are capable of using the internet for communication."

Indeed, a report from Wired doing the rounds two years ago suggested that US intelligence was concerned by terrorist use of Twitter.

A supposed army intelligence report looked into ways terrorists could use technologies including the micro-blogging service, GPS and photo swapping sites. With GPS, the document warned the technology could be used for "marksmanship, border crossings, and in concealment of supplies."

In a somewhat eerie premonition of what was to come, the document listed a number of scenarios, one of which included a mobile phone being used as an explosive device.

As technology continues to progress at a rapid rate, so will extremists' use of it. This something we all need to be aware of as both consumers and business users. And companies need to be particularly mindful so they have the necessary protection measures and policies in place.

"Especially in the year of Stuxnet, this is something that worries us," Hyponnen said.

"Creating Stuxnet from scratch is way beyond the resources and skills of any terror group at the moment, but the binary is available and it can be modified. It's much easier to modify Stuxnet than it is to build it from scratch."

The likelihood is, Stuxnet copycats will rear their ugly heads soon enough, both from nation states and terror groups, according to Hyponnen.

If terrorists manage to get their hands on technology as sophisticated as Stuxnet, there is reason for their enemies to be anxious, at the very least.

Featured Resources

The 3D skills report

Add 3D skills to your creative toolkits and play a sizeable role in the digital future

Free Download

The increasing need for environmental intelligence solutions

How sustainability has become a major business priority and is continuing to grow in importance

Free Download

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

Solve global challenges with machine learning

Tackling our word's hardest problems with ML

Free Download

Recommended

How we test printers and scanners
peripherals

How we test printers and scanners

18 Nov 2022
The best cheap printers in 2022
peripherals

The best cheap printers in 2022

16 Nov 2022
Best all-in-one printers 2022
Hardware

Best all-in-one printers 2022

13 Oct 2022
How to reduce printing costs and paper waste
Hardware

How to reduce printing costs and paper waste

10 Oct 2022

Most Popular

Windows 10 users locked out of devices by unskippable Microsoft 365 advert
bugs

Windows 10 users locked out of devices by unskippable Microsoft 365 advert

3 Feb 2023
Why energy efficient technology is key to a sustainable business
Sponsored

Why energy efficient technology is key to a sustainable business

16 Jan 2023
What's powering Britain’s fibre broadband boom?
Network & Internet

What's powering Britain’s fibre broadband boom?

3 Feb 2023