Flight Ban On Laptops 'sparked by IS threat'

Britain will join the US in placing new restrictions on inbound flights from the Middle East, a reflection on how just about anything with power can be turned into an explosive.

Last February, a Somali man boarded a Daallo Airlines flight in Mogadishu, Somalia’s capital. Twenty minutes after the flight took off, the unassuming laptop in his carry-on bag detonated, blowing a hole in the side of the plane. 

The bomber was killed, and two others were injured. But if the aircraft had reached cruising altitude, the bomb would have ignited the plane’s fuel tank and caused a second, potentially catastrophic blast.

The Daallo explosion was one of a handful of terrorist attacks that the Department of Homeland Security cited to help explain why it introduced new rules for some passengers flying to the US with electronics. Starting recently, travelers on US-bound flights from 10 airports in the Middle East and North Africa will be required to check all electronic items larger than a smartphone.

A senior US administration official told reporters that the indefinite electronics ban was a response to continuing threats against civil aviation, but wouldn’t elaborate on the specific nature or the timing of the threat. 

Adam Schiff, the ranking member of the House Intelligence Committee, said in a statement that the ban was “necessary and proportional to the threat,” and that terrorists continue to come up with “creative ways to try and outsmart detection methods.”

The ban could be focused on simply separating items like laptop-bombs from passengers who would need to access them in order to set them off.

Electronics Has Made Smuggling Bombs Easier

This aircraft cabin ban on large electronic devices was prompted by intelligence suggesting a terror threat to US-bound flights.

The so-called Islamic State group (IS) has been working on ways to smuggle explosives on to planes by hiding them in electronics. The tip-off was judged by the US to be "substantiated" and "credible".

Inbound flights on nine airlines operating out of 10 airports in eight countries are subject to the US Department of Homeland Security ban.

Phones and medical devices are not affected.

US Secretary of State Rex Tillerson hosted a two-day meeting of ministers and senior officials from 68 nations to discuss the threat from IS. The Washington talks is the first full meeting of the coalition since December 2014.

This will be a chance for the Trump administration to put its stamp on the global battle against the Islamic State group, and for the reticent secretary of state to put his stamp on a foreign policy issue that the president has identified as a priority. The State Department says the meeting aims to accelerate efforts to defeat IS in its remaining strongholds in the Iraqi city of Mosul and the Syrian city of Raqqa.

On the campaign trail Mr Trump claimed to have a secret plan to obliterate the group. But his Pentagon has largely stuck with Barack Obama's strategy of supporting local ground forces, albeit with increased US military participation as the assault on Raqqa nears. 

Coalition members will also discuss how to stabilise and govern the cities after the conflict; and they're looking to see if Washington remains committed to a longer term effort to secure the region.

Eric Swalwell, a Democratic member of the House Intelligence Committee, told ABC News there was "a new aviation threat".

"We know that our adversaries, terrorist groups in the United States and outside the United States, seek to bring down a US-bound airliner. That's one of their highest value targets. And we're doing everything we can right now to prevent that from happening."

BBC:            DefenseOne:   

Why Hasn't MH370 Been Found?:

Four Threats To Aviation Security – and Four Responses:

 

 

« Tomorrow's Smart Cities Will Be Data Driven
A Quick Tour Of Cybercrime’s Underground »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator

CorkBIC International Security Accelerator invests in early stage disruptive companies in the security industry including, Cybersecurity, Internet of Things (IOT), Blockchain and AI.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.