{"id":57738,"date":"2015-11-24T00:00:00","date_gmt":"2015-11-23T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/digital-warfare-terrorism-of-the-future-part-3\/"},"modified":"2021-03-29T14:38:07","modified_gmt":"2021-03-29T12:38:07","slug":"digital-warfare-terrorism-of-the-future-part-3","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/","title":{"rendered":"Digital warfare \u2013 terrorism of the future &#8211; part 3"},"content":{"rendered":"<p>Digitally active <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/keynote\/the-future-of-cybercrime-and-terrorism\/\">terrorists are prepared for the future<\/a>. It is no secret that IS is very well organised, digitally and otherwise. It\u2019s very knowledgeable when it comes to the latest developments and is therefore able to cause so much digital damage that our physical world can get into serious trouble. Firstly, it is reasonable to assume that the terrorist of the future already knows about each and every one of the aforementioned technologies. Secondly, I will discuss some \u2018weapons\u2019 that deserve our attention.<\/p>\n<ul class=\"bold-list\">\n<li>Internet of Things hacks<\/li>\n<li>3D printers print arms<\/li>\n<\/ul>\n<h2>Internet of Things hacks<\/h2>\n<p>Pretty much everything will be connected. Cars, houses, factories, streetlights. Data is sent back and forth and devices will start interacting with each other. Already, our garage door opens automatically when we come home. What\u2019s more \u2013 from miles away, I can keep an eye on my Tesla, make it honk and even drop her top! In the future, our coffeemaker will automatically be replaced <em>before<\/em> it breaks and as soon as it starts raining, we\u2019ll see more self-driving buses in the city. In the new world, smart fridges will order the right foods at exactly the right time.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-31452 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/terrorisme-internet-of-things-2.jpg\" alt=\"Blue graph with icons and Internet of Things text\" width=\"801\" height=\"400\"><\/p>\n<p>The Internet of Things makes our lives easier and more efficient, but the developments are also worrying. Via the IoT, aeroplanes are in contact with, amongst others, satellites. A hacker has already shown us how easy it is to manipulate an aeroplane\u2019s satellite data so that its course can be altered. The device that he needed for this only cost 1,000 euro. Factories as well as (nuclear) power plants can also become targets. In 2010, <a href=\"http:\/\/www.foxnews.com\/tech\/2010\/09\/23\/stuxnet-cyberattack-targeting-irans-nuclear-plant.html\" target=\"_blank\" rel=\"noopener noreferrer\">a nuclear plant was shut down by a cyber attack<\/a>. Another cyber attack caused an explosion at a German steel plant. In 2014, Japan experienced nearly 1,300 cyber attacks &#8211; a 200% increase compared to the year before. Manufacturers like Siemens and General Electric are scratching their heads \u2013 worrying about how they can protect their connected systems. Unfortunately, there is no real solution yet. In 2020, we\u2019ll see a world where over 50 million devices are connected. A world where the terrorist of the future will feel quite at home as a simple hack can cause a catastrophe.<\/p>\n<h2>3D printers print weapons<\/h2>\n<p>We can print almost anything on small and smart 3D printers these days; homes, cars, buildings and more. Soon, we\u2019ll be printing food and even limbs. Bio-printers are already capable of printing live cells \u2013 in other words, organs. The terrorist of the future no longer needs to smuggle weapons across borders. Via an iTunes-type database he\u2019ll be able to find all the products he needs to build the weapon for the attack he has in mind; from nano-weapon to laser-rocket. In the future, everything will be printed and assembled on the spot.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-31454 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/terrorisme-3d-print-wapen-1.jpg\" alt=\"Laptop with 3D printer and blue plastic gun\" width=\"801\" height=\"400\"><\/p>\n<h2>Conclusion: headache and irritation<\/h2>\n<p>Thinking about this gives me a serious headache. I&#8217;m annoyed by it. As a trend watcher and futurist, I also work with Dutch and foreign security services and without going into too much detail, I would like to share a few conclusions with you.<\/p>\n<h3>Tardiness and bureaucracy<\/h3>\n<p>The tardiness of politics, defence and other security services is distinctive. It plays into the hands of terrorists. A nice metaphor: Within a matter of weeks, an IS terrorist can purchase drones and have them ready for a terrorist attack. While the first attacks are perpetrated, government departments are still discussing the feasibility of using drone technology. We are not agile and flexible. Current organisations no longer meet the requirements of the future.<\/p>\n<h3>Chinese walls<\/h3>\n<p>In the Netherlands but also in the rest of Europe, we see huge Chinese walls between the defence forces. There is no sharing of information, there\u2019s no collaboration. There are walls between army, air force, police and intelligence services. Internationally, there is virtually no cooperation when it comes to acceleration of organisational or technological developments. To add insult to injury, the different ranks also cause problems in the organisations managed by the military. A petty-officer who is more clued up about technology can \u2018tell an officer off\u2019, which is often not appreciated by the officer.<\/p>\n<h3>Defence staff members are frustrated<\/h3>\n<p>Even more frustrating is the wall being built by the government. A general who knows what he\u2019s talking about isn\u2019t heard by the officials, Secretaries of State and Ministers who are tasked with our country\u2019s security. National government has no idea how to deal with the exponential changes that technology is bringing to the armed forces.<\/p>\n<h3>Small group, big future<\/h3>\n<p>The group of people tasked with the future of our safety and security is so small, you hardly notice them. But it\u2019s the future that determines how safety and security will take shape in the coming years. While the small, almost invisible groups are busy enriching each other, we\u2019re only just beginning to see the first steps towards open innovation. Why not allow European or Dutch citizens or specialists to contribute ideas instead of trying to figure everything out on your own? If we use all of our collective intelligence simultaneously, the results will be a hundred times better.<\/p>\n<h3>Defence is unable to do it<\/h3>\n<p>Our current defence organisations are not designed for change. They are designed to do the same things day in and day out. It\u2019s no problem to finalise current issues with this organisation, but it is unable to help us to move ahead quickly. To achieve this we need to add \u2018future labs\u2019 to the existing organisation &#8211; with the right culture, people, networks and mindset. This is not just applicable to the military and police, but also to ministries and embassies. The old way no longer works. IS terrorists are more flexible. They study the problem and within a short period of time they develop an organisation, hire the best specialists and \u2018solve the problem\u2019. In a world where the development of technology is almost faster than the speed of light, this method is the most effective.<\/p>\n<h3>There is no hope in the short term<\/h3>\n<p>In May this year, a decision was made for the implementation of a special European task force to address this problem. Currently, Member States operate separately from each other \u2013 which results in miscommunication and disconnect. The objective for this task force is to monitor critically important messages on digital platforms and pass these on to investigative organisations. A kind of NSA, but in European context.&nbsp;Other European countries take different measures for preventing and dealing with terrorist activity but those measures aren\u2019t all that effective. France, for instance, registers more information about Arab prisoners than other countries do and Belgium can legally tap and freeze funds. Germany, like the Netherlands, can confiscate passports and the UK monitors Internet and mobile data. Spain periodically carries out extensive border checks.<\/p>\n<h2>We need a new mindset<\/h2>\n<p>Several countries have announced security budget increases. Apparently we need to wait for bombings and casualties to increase these budgets. We have however been aware of these threats for years and making more money available is not the solution. It&#8217;s about mindset and an understanding of the fact that the new world has new talents and new rules. We need to understand that we have to break with the old order to get something better in return. I want to do everything possible to get this into the minds of decision makers and policy makers and I would like this article to be a first step. Who is in?<\/p>\n<p>See also:&nbsp;<a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/\">Digital warfare \u2013 terrorism of the future &#8211; part 1<\/a><\/p>\n<p>See also:&nbsp;<a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-2\/\">Digital warfare \u2013 terrorism of the future &#8211; part 2<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digitally active terrorists are prepared for the future. It is no secret that IS is very well organised, digitally and otherwise. It\u2019s very knowledgeable when it comes to the latest developments and is therefore able to cause so much digital damage that our physical world can get into serious trouble. Firstly, it is reasonable to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":44606,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4230,4237],"article-type":[],"trends":[],"class_list":["post-57738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-government","tag-terrorism"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"Digitally Active Terrorists Are Prepared For The Future. &amp;#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"Digitally Active Terrorists Are Prepared For The Future. &amp;#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-23T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-29T12:38:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"Digital warfare \u2013 terrorism of the future &#8211; part 3\",\"datePublished\":\"2015-11-23T22:00:00+00:00\",\"dateModified\":\"2021-03-29T12:38:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/\"},\"wordCount\":1281,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Toekomst-van-terror-management-1.jpg\",\"keywords\":[\"Government\",\"Terrorism\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/\",\"name\":\"Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Toekomst-van-terror-management-1.jpg\",\"datePublished\":\"2015-11-23T22:00:00+00:00\",\"dateModified\":\"2021-03-29T12:38:07+00:00\",\"description\":\"Digitally Active Terrorists Are Prepared For The Future. &#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Toekomst-van-terror-management-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Toekomst-van-terror-management-1.jpg\",\"width\":800,\"height\":526,\"caption\":\"Dark world map with explosions and man with balaclava\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital warfare \u2013 terrorism of the future &#8211; part 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog","description":"Digitally Active Terrorists Are Prepared For The Future. &#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/","og_locale":"en_US","og_type":"article","og_title":"Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog","og_description":"Digitally Active Terrorists Are Prepared For The Future. &#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2015-11-23T22:00:00+00:00","article_modified_time":"2021-03-29T12:38:07+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"Digital warfare \u2013 terrorism of the future &#8211; part 3","datePublished":"2015-11-23T22:00:00+00:00","dateModified":"2021-03-29T12:38:07+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/"},"wordCount":1281,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg","keywords":["Government","Terrorism"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/","name":"Digital warfare \u2013 terrorism of the future - part 3 - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg","datePublished":"2015-11-23T22:00:00+00:00","dateModified":"2021-03-29T12:38:07+00:00","description":"Digitally Active Terrorists Are Prepared For The Future. &#x2705 Read More On How IoT And 3D Printing Can Help Us In The Fight Against Terrorism. (Part III).","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/Toekomst-van-terror-management-1.jpg","width":800,"height":526,"caption":"Dark world map with explosions and man with balaclava"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Digital warfare \u2013 terrorism of the future &#8211; part 3"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=57738"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57738\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/44606"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=57738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=57738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=57738"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=57738"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=57738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}