Flight Ban On Laptops 'sparked by IS threat'

Britain will join the US in placing new restrictions on inbound flights from the Middle East, a reflection on how just about anything with power can be turned into an explosive.

Last February, a Somali man boarded a Daallo Airlines flight in Mogadishu, Somalia’s capital. Twenty minutes after the flight took off, the unassuming laptop in his carry-on bag detonated, blowing a hole in the side of the plane. 

The bomber was killed, and two others were injured. But if the aircraft had reached cruising altitude, the bomb would have ignited the plane’s fuel tank and caused a second, potentially catastrophic blast.

The Daallo explosion was one of a handful of terrorist attacks that the Department of Homeland Security cited to help explain why it introduced new rules for some passengers flying to the US with electronics. Starting recently, travelers on US-bound flights from 10 airports in the Middle East and North Africa will be required to check all electronic items larger than a smartphone.

A senior US administration official told reporters that the indefinite electronics ban was a response to continuing threats against civil aviation, but wouldn’t elaborate on the specific nature or the timing of the threat. 

Adam Schiff, the ranking member of the House Intelligence Committee, said in a statement that the ban was “necessary and proportional to the threat,” and that terrorists continue to come up with “creative ways to try and outsmart detection methods.”

The ban could be focused on simply separating items like laptop-bombs from passengers who would need to access them in order to set them off.

Electronics Has Made Smuggling Bombs Easier

This aircraft cabin ban on large electronic devices was prompted by intelligence suggesting a terror threat to US-bound flights.

The so-called Islamic State group (IS) has been working on ways to smuggle explosives on to planes by hiding them in electronics. The tip-off was judged by the US to be "substantiated" and "credible".

Inbound flights on nine airlines operating out of 10 airports in eight countries are subject to the US Department of Homeland Security ban.

Phones and medical devices are not affected.

US Secretary of State Rex Tillerson hosted a two-day meeting of ministers and senior officials from 68 nations to discuss the threat from IS. The Washington talks is the first full meeting of the coalition since December 2014.

This will be a chance for the Trump administration to put its stamp on the global battle against the Islamic State group, and for the reticent secretary of state to put his stamp on a foreign policy issue that the president has identified as a priority. The State Department says the meeting aims to accelerate efforts to defeat IS in its remaining strongholds in the Iraqi city of Mosul and the Syrian city of Raqqa.

On the campaign trail Mr Trump claimed to have a secret plan to obliterate the group. But his Pentagon has largely stuck with Barack Obama's strategy of supporting local ground forces, albeit with increased US military participation as the assault on Raqqa nears. 

Coalition members will also discuss how to stabilise and govern the cities after the conflict; and they're looking to see if Washington remains committed to a longer term effort to secure the region.

Eric Swalwell, a Democratic member of the House Intelligence Committee, told ABC News there was "a new aviation threat".

"We know that our adversaries, terrorist groups in the United States and outside the United States, seek to bring down a US-bound airliner. That's one of their highest value targets. And we're doing everything we can right now to prevent that from happening."

BBC:            DefenseOne:   

Why Hasn't MH370 Been Found?:

Four Threats To Aviation Security – and Four Responses:

 

 

« Tomorrow's Smart Cities Will Be Data Driven
A Quick Tour Of Cybercrime’s Underground »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.