Digital dangers: The rise of ‘electronic terrorism’ and its implications
Chinese academic Qiao Xinsheng assesses that since “electronic terrorism” could infiltrate an electronic device at any point of the manufacturing and consumer chain, enhanced security and international cooperation is key to preventing more disasters.
The simultaneous mass explosions of electronic devices in Lebanon have resulted in thousands of casualties. This is a typical case of “electronic terrorism” (电子恐怖主义), which uses electronic technology to enhance lethality, thereby acting as both a political and military deterrent.
... it is unimaginable that the military intelligence agencies of some countries would go so far as to install explosives in electronic devices to achieve their political goals, waging a war of electronic terrorism.
Indiscriminate attacks
Due to the uncertainty of the electronic device users, such acts of indiscriminate killing inevitably leads to strong condemnation from the international society. Although most people are aware that there are many opportunities for exploitation in the manufacturing, transportation and consumption of electronic products, it is unimaginable that the military intelligence agencies of some countries would go so far as to install explosives in electronic devices to achieve their political goals, waging a war of electronic terrorism.
Countries are facing new security challenges in the Internet age. Terrorists use the internet to deploy viruses and control critical devices, causing widespread destruction. Some terrorist groups have also enhanced their lethality by placing explosives in critical infrastructure or consumer devices and then detonating them remotely.
Lebanon’s electronic terrorist attack is a reminder that when using electronic devices, we must consider both the safety of the electronic devices themselves, and the potential security risks posed by various software applications.
So far, it is inconclusive whether the explosion of electronic devices in Lebanon was due to tampered components or explosives directly installed in the electronic devices.
However, it is certain that a pager’s battery alone could not have caused such a strong explosion. The most likely scenario is to have had prior knowledge of the procurement process of the electronic devices, and then systematically installing explosives in the devices at a specific transaction stage, before detonating them en masse via a heating device. While this approach maximises the deterrent effect, due to its indiscriminate nature, it is a very typical terrorist crime.
Ensuring safety in China
While enhancing security checks on electronic devices is undoubtedly crucial in preventing terrorist attacks of this nature, electronic devices are ubiquitous. From automobiles to gas water heaters, and from mobile phones to various electronic public facilities, any device could become a tool for terrorists to launch attacks.
Since entering the digital age, people and electronic devices have become inseparable. If these devices themselves lack security features or are exploited by terrorists during installation and usage to install explosives, consumers will be at enormous risk.
China attaches great importance to electronic security efforts. Upon entering the network society, China enacted two important laws — the Cybersecurity Law and the Data Security Law — providing specific regulations for electronic security in the digital era, ranging from network security to data security.
Many underground parking lots in China explicitly prohibit parking electric vehicles (EVs) due to their higher risk of spontaneous combustion.
In real-life situations, however, laws and regulations are one thing, and implementation is another. Security experts have pointed out that some electronic manufacturers already apply a certain level of security on their products, or rather, conform to national standards. But if these devices are misused, they can still pose dangers.
Many underground parking lots in China explicitly prohibit parking electric vehicles (EVs) due to their higher risk of spontaneous combustion. This reflects a proactive approach to safety, even though it may inconvenience EV owners. Relying on technological advancements to enhance the safety standards of electronic products is of utmost significance in safeguarding consumer interests and public benefits.
Multiple layers of dangers and risks
There is a pressing need to enhance the management of electronic device operations. In China, a market access system prohibits unlicensed individuals from operating surveillance equipment. However, privacy violations persist in chain hotels due to advancements in technology, as ordinary electronic devices can be easily modified to spy on others.
The key to addressing this issue is to strengthen operator accountability. If surveillance equipment is found, operators should face legal repercussions. This will incentivise them to implement measures for detecting illicit surveillance devices and better protect consumers’ legal rights.
Enhancing the safety of electronic devices also depends on consumers’ vigilance. Many applications lack built-in security features, and if a downloaded application contains viruses, it could compromise consumer information and be exploited by malicious actors. Terrorist organisations can take advantage of these applications to infiltrate device software, and at an opportune time, deploy viruses that corrupt the electronic devices or directly harm consumer interests.
This is a clear example of the need to heavily emphasise security features in applications for electronic devices. Even if the electronic device is not inherently problematic, the same security concerns exist if there are issues with the software.
A key reason for the mass failure of Iran’s centrifuges in 2009 was the virus embedded in the software applications of electronic devices — when the CIA and Mossad launched a cyber operation using the Stuxnet malware to disrupt Iran’s nuclear programme, targeting centrifuges at Iran’s Natanz facility, causing significant delays. At a critical moment, Iran’s enemies were able to deal a heavy blow to its enriched uranium operations remotely.
This is a clear example of the need to heavily emphasise security features in applications for electronic devices. Even if the electronic device is not inherently problematic, the same security concerns exist if there are issues with the software.
Need for international cooperation
There is an urgent need to enhance international cooperation in strengthening electronic security. To effectively combat terrorism in this area, we need to establish unified standards instead of politicising trade issues under the guise of national security, which can hinder the development of the digital economy.
I suggest that the United Nations establish a dedicated investigative body to conduct a thorough investigation of the electronic terrorist attack in Lebanon and punish the terrorists. Implementing science-based regulations as well as strengthening reviews of safety standards for electronic products would help prevent similar tragedies from happening again.