Bomb threats on flights are not to be taken lightly. Public safety is paramount and every threat should be considered real unless the suspect/s is/are identified and the authorities can confirm that the threat has been neutralised.
This was emphasised by UAE-based security and technology experts after a string of hoax bomb threats over the past three days.
“Any bomb threat may cause fear, panic, confusion, scepticism, chaos and disruption, among other psychological effects for passengers. It may trigger an excessive response, such as evacuating an airport terminal building or diverting an aircraft to land in the first available airport. The cost is exponential for airlines – every hour of disruption could cost an airline anywhere from $20,000 to $200,000,” Dubai-based IT security expert Rayad Kamal Ayub told .
“These actions may not be commensurate with the actual threat and entail huge financial costs, such as scheduling nightmares for airlines and airports, and disruption to hundreds or thousands of travellers,” he noted.
“But public interest must always prevail and every threat should be considered real unless the suspect is identified and the authorities can confirm the threat has been neutralised,” he underscored.
More than 10 bomb threats targeted Indian carriers on Monday and Tuesday. Many of them were posted on social media by unverified users, whose accounts were already suspended, Indian authorities noted.
Irene Corpuz, founding partner and board member of Women in Cybersecurity Middle East, said: “Any bomb threat can be terrifying for passenger. But they must cooperate with airline crew and security agencies.”
“Threats are concerning but passengers should not be paralysed by too much worrying,” she added, assuring: “Authorities will treat any bomb threat as serious, unless proven otherwise.”
“The social media accounts of those who have posted the bomb threats have already been suspended. That's one action done, and investigations will continue,” Corpuz added, noting: “Authorities will use IP (internet protocol) tracking, metadata analysis, and collaborate with social media platforms, as well as international agencies.”
“The public on the other hand,” Corpuz advised, “must only look at legitimate sources to get further updates on the situation. They must always verify other sources and must be aware of deepfake, where AI (artificial intelligence) is used to replicate voices and even faces to make hoaxes or scams more realistic and believable.”
“The process of bomb threat assessment is not for the faint-hearted. It requires making a well-grounded decision on a potentially life-threatening scenario within a very limited time frame and, more often than not, with little information,” noted Ayub, who is managing director of Dubai-based Rayad Group.
He added: “Any bomb threat, regardless of its classification, must be communicated to the local authorities in order for them to initiate an investigation. All details, including the decision-making process and the conclusions reached, should be provided to them as well as to the appropriate authorities.”
Ayub also highlighted the importance of selecting and training suitable assessors, along with implementing periodic exercises to test the effectiveness of the bomb threat management plan.
“Organisations that seek to protect both their interests and the wellbeing of the travelling public should understand the vital importance that this role plays in separating the wheat from the chaff, or, in this case, a genuine threat from a hoax,” he added.
Ayub also detailed how to identify the person/s behind the recent bomb threats, noting the process of identification would require painstaking hard work and lots of data analytics, as well as seamless coordination between law enforcement authorities (LEAs) and ISP/TSPs (internet and telecom service providers).
Ayub said the first step is to approach the ISP/TSP to identify the suspect’s IP and internet protocol detail record (IPDR).
“IPDR records would contain multiple users who were assigned a particular IP, so further analysis based on application usage patterns would be required to shortlist the suspect from other users identified,” he explained.
After narrowing down the suspects, authorities must carry out investigation on the suspect/s as per traditional practices.
He noted: “The probability of tracking IPs depends on the complexity of infrastructure used by the suspect. Seasoned criminals would leave no traces when communicating through Tor network (an overlay network for enabling anonymous communication.)
However, approaching CERT (computer emergency response teams) and private CTISP (cyber threat intelligence service providers) with relevant information available could prove effective in investigations,” he added.
Ayub underscored: “We need industry experts and the government to come together to solve these challenges and take the responsible entities to jail.”
You may also like
SC verdict today on pleas challenging validity of Section 6A of Citizenship Act
Trump plans to give tax cuts to billionaires, blow up our deficit: Kamala in first Fox Interview
Tim Walz Assaulted High School Student Matthew Metro In 1997? Video Surfaces
India rebukes Canada PM's no 'hard proof' admission
Ready to fight in all five assembly seats: Assam Congress' Jakir Hussain Sikdar on state's bypolls
'That's A Dangerous Stage For Other Sides': Australia Get Stern 'Virat Kohli' Warning Ahead Of Border-Gavaskar Trophy
Man Utd news: Thomas Tuchel breaks silence as price tag set for Antony transfer
Urgent insurance payment warning as some drivers charged £161 extra
Dubai population set to reach 4 million by 2026, report says
People are only just realising clever truth about famous feature in Apple logo
'Loss of up to $200,000 per hour': How bomb threats impact airlines, passengers
Jon Rahm finally proven right over Greg Norman as LIV Golf CEO being replaced
Concept of Khalistan as artificial as Pakistan was in its infancy: US expert
Fact Check: Photo With Kate Cassidy That Liam Payne Uploaded Before Death Is From 2023
HSSC Result 2024 Date: Haryana HSSC Group C, D Results Today on hssc.gov.in
Kolkata Residents To See Continuous Rains Ahead; What's Behind The Unexpected Showers?
Mumbai customs seize gold worth Rs 1.2 crore, two arrested
Malaysia Airlines Enters Into Strategic Codeshare Partnership With IndiGo
Japan's exports fall for first time in 10 months on China, US slowdown
Kitten nearly euthanized for disability learns to walk after new owner refuses to give up