Cyber-Survivability™ Risks Up | “Terrorists Can Access Weapons of Mass Destruction via Dark Web” says UN Disarmament Affairs Chief.

The Dark Web

The dark web was highlighted in particular as the primary enabler of easing access to WMDs. Terrorist groups can now trade and collaborate over the dark web and make illegal dealings without being noticed by authorities.

Dark web, as you may be aware, is a part of cyberspace that is (kind of) undetected. it has allowed heightened privacy to its users. This means that terrorists along with other types of criminals can carry on their activities with complete anonymity.

Furthermore, Nakamitsu stated that although the technology of providing privacy to authorities who engage in legal activities involving WMDs is beneficial, it, however, still poses threats and hence there needs to be a balance between how much security authorities are willing to compromise in order to prevent proliferation.

Increased Survivability Threats to Nations and Businesses

A senior MLi Group Survivability & Security Expert said: “this adds an unprecedented new risk to national sovereignty and corporate security’s threat landscape that remains unmitigated under existing models of cyber security strategies and solutions.”

the expert added, “both governments and organizations worldwide will have their effective competitiveness seriously at new risk. Some may not be able to sustain or survive the damage and losses of such an attack/compromise.

The expert concluded, “it is possible that MLi’s Survivability Strategies, Solution and services ‘may’ help. A no obligation Private and confidential briefing may determine if we can or cannot.

Click here to request your no obligation Top Decision maker Geo-Poli-Cyber Survivability Confidential Briefing

Other technologies

Among the various technologies considered to be dangerous, 3D printing, and drones were seen as another major threat concerning enabling terrorists to easily access the means to develop WMDs, if not the weapons themselves.

That is, 3D printers have already been used for creating weapons such as guns. Essentially, the technology is being used to develop parts for specific weapons that are hard to get otherwise.

Likewise, drones can potentially be used to deliver such parts or weapons themselves without being intercepted.

Are these technologies that bad?

3D printing, unmanned aerial vehicles along with online tools that allow for greater privacy were acknowledged by Nakamitsu, as useful technologies that are incidental to globalization.

However, what she is concerned about is the fact that such technologies should be kept away from the hands of criminals.

As such, her take is to work with security agencies worldwide to restrict the proliferation of WMDs.

And although she says that terrorists still need to overcome a number of barriers to make use of technologies to access WMDs effectively, she is, however, concerned that technological advances are making the path toward WMDs much easier.

As such Nakamitsu believes that governments worldwide need to collaborate more and work not only with security agencies but also with organizations that develop such information-sharing technologies.

Doors to international dialogues need to be open if proper measures are to be implemented.

Source: UN News Center
Terrorist’s illustration: SaurinSlais/Deviantar

What Are
& Risks?

What Are Geo-Poli-Cyber™ (GPCyber™) Warfare, Risks & Threats?

Geo-Poli-Cyber™ warfare has spread worldwide in recent years and is impacting everyone without exception through cyber attacks that are political, ideological, terrorist, extremist, ‘religious’ and/or geo-politically motivated. They are perpetrated by political and extremist groups, national security agencies and/or their proxies, and lone wolves.

Cyber security strategies and solutions that are followed like gospel have failed and will continue to fail to mitigate, defend and protect national sovereignty and corporate security from Geo-Poli-Cyber™ attacks on unprecedented scales and with devastating political, social, and financial consequences.
More Sinister and Destructive Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude and require different and upscaled risk mitigation strategies and solutions.

Why Do Existing Strategies & Solution keep failing?

MLi Group chairman Khaled Fattal created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPCyber™) back in 2012 because of seismic game-changing events he had observed years before. Fattal believed that these events and trends will cause …

Click to read more

Survivability News Latest