Page 29 - Cyber Warnings
P. 29
using the cars and they could occupy some object making the capture outside and leaving some
guys inside to watch after the hostages.
It’s obvious that that part of the City would get evacuated and the terrorists would insist to the
authorities to negotiate with them seeking the group’s demands being followed. They would
probably make many threats suggesting that they would make harm to their hostages.
This situation would attract the attention of the Special Forces team which got trained to resolve
such a scenario.
We would not try to make many advices to those professionals, but rather to make some
suggestions that they could take advantage of the modern technologies and gather as much
information as possible before they make a decision to take any move.
The requirement to this sort of operation is to everything gets obtained as secured as possible.
Some of our suggestions would also be to the Rescue Special Forces team to try to control the
guys outside from the roofs of the opposite facilities and somehow try to enter that space from the
uncovered accesses.
In conclusions, before anyone makes a move and decides to try to rescue the hostages either
through the negotiation or more probable to this scenario – some armed operation, it’s crucially
important to get everything well-prepared and monitored through communication, internet or any
other lines as well as the microphones being the parts of that group’s emerging devices.
Some recommendations would suggest to do the scanning of the phone, web, utility networks being
correlated to that certain location within the urban area.
About The Author
Since Milica Djekic graduated at the Department of Control Engineering
at University of Belgrade, Serbia, she’s been an engineer with a
passion for cryptography, cyber security, and wireless systems. Milica
is a researcher from Subotica, Serbia.
She also serves as a Reviewer at the Journal of Computer Sciences
and Applications and the International Journal of Cyber Security and
Digital Forensics.
She writes for American and Asia-Pacific security magazines. She is a volunteer with the American
corner of Subotica as well as a lecturer with the local engineering society.
29 Cyber Warnings E-Magazine – January 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide