The world witnessed today for the first time a communication device turning into a bomb. It was announced that 9 people, including a child, lost their lives and approximately 2800 people were injured, 200 of them seriously, as a result of the explosions caused by the detonation of communication devices used by Hezbollah elements in Lebanon. The official Lebanese news agency NNA announced that "an unprecedented hostile security incident occurred in the southern suburbs of Beirut and many regions of Lebanon" due to Israel's infiltration into the "pager" communication devices. Prof. Dr. Ali Murat Kırık, a faculty member at Marmara University, made striking statements about Israel's cyber attack in an interview with Haberler.com. Kırık emphasized that the simultaneous explosion of the communication devices of Hezbollah members in Lebanon revealed a new dimension of terrorist attacks and stated the following: "CAN HAVE DISASTROUS CONSEQUENCES"The explosion of communication devices may have been caused by their remote controllability. It is known that these types of devices can be triggered by digital signals. If the devices have security vulnerabilities in terms of software or hardware, hackers or enemy elements can cause them to explode by exploiting these weaknesses. The fact that civilians and a girl lost their lives in the incident shows how disastrous the consequences of such attacks can be. "TERRORIST ORGANIZATIONS CAN MODIFY THESE DEVICES"Explosives may have been placed inside the communication devices, which allows them to be remotely triggered and detonated. These types of devices can be modified in various ways, especially by terrorist organizations. For example, small explosive devices or detonation mechanisms can be added to the device. The explosives placed inside the device can be simultaneously detonated by remote signals. This method allows attackers to control their targets and cause large-scale damage at the same time. Small, inconspicuous electronic devices like communication devices can be preferred by terrorists because they are generally seen as ordinary communication tools and can go unnoticed in security checks. This allows attacks to be carried out in a more planned and effective manner. "DOMESTIC SOFTWARE MAKES A DIFFERENCE FOR CIVILIAN TECHNOLOGIES AS WELL"The development of domestic software by Turkish defense industry companies such as ASELSAN, HAVELSAN, and Baykar is of great importance in the face of such threats. The use of domestic software allows the creation of more resilient systems against external attacks by minimizing security vulnerabilities. This situation makes a big difference not only in the military field but also in civilian technologies. Foreign-dependent software can be manipulated by third parties or may contain malicious software components. It should not be forgotten that such risks always exist in smart devices. Even small and innocent-looking devices like communication devices can pose serious threats if security measures are not taken. Domestic software and strict security protocols are of critical importance in reducing these risks. Therefore, both individuals and states need to prioritize security in the use of technology.
|