Isil using lone wolf attackers in Europe as smoke screen for larger plots, judge warns


Abdelhamid-Abaaoud_3503581b

Isil is flooding Europe with low-level, unsophisticated attack plans to swamp intelligence agencies while larger atrocities are secretly plotted, a senior counter-terrorism judge has warned.

 

The terror group has had Europe in its sights for up to four years, it is feared, and sent dozens of jihadists back to carry out lone-wolf attacks.

 

“It served to put all of our agencies on edge. Just like a smoke screen, it allowed them to calmly prepare,” said Marc Trevidic, who retired as France’s chief counter-terrorism judge last year.

http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/12206550/Isil-using-lone-wolf-attackers-in-Europe-as-smoke-screen-for-larger-plots-judge-warns.html

 

 

BRUSSELS ATTACK: OPERATION GLADIO EVENT TO FINALIZE SURVEILLANCE STATE


gladio-brussels

Both men were convicted criminals. Ibrahim was sentenced to nine years in prison for opening fire on police with a Kalashnikov rifle during an armed robbery on a stockbroker and Khalid was sentenced to five years probation for carjackings. Khalid was in possession of a Kalashnikov at the time of his arrest.

Najim Laachraoui, named as the third attacker, was the subject of a manhunt in connection with the Paris attack last November. Laachraoui was named as an accomplice of Paris attacker Salah Abdeslam, who was arrested in the Molenbeek district of Brussels earlier this week. Abdeslam hid in plain sight for months.

http://www.infowars.com/brussels-attack-operation-gladio-event-to-finalize-surveillance-state/

FBI: Attacker’s phone possibly accessible without Apple help


Apple vs. U.S.

In a stunning reversal on Monday, federal prosecutors asked a judge to halt a much-anticipated hearing on their efforts to force Apple to unlock the phone. The FBI may have found another way, and Apple’s cooperation may no longer be needed, according to court papers filed late Monday, less than 24 hours before Tuesday’s hearing.

“An outside party” came forward over the weekend and showed the FBI a possible method to access the data on Syed Rizwan Farook’s encrypted phone, according to the filing.

“Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone,” the filing said. “If the method is viable, it should eliminate the need for the assistance from Apple.”

http://www.chicagotribune.com/bluesky/technology/ct-apple-fbi-encryption-debate-20160321-story.html

FBI: ATTACKER’S PHONE POSSIBLY ACCESSIBLE WITHOUT APPLE HELP


iphone3

In a stunning reversal on Monday, federal prosecutors asked a judge to halt a much-anticipated hearing on their efforts to force Apple to unlock the phone. The FBI may have found another way, and Apple’s cooperation may no longer be needed, according to court papers filed late Monday, less than 24 hours before Tuesday’s hearing.

“An outside party” came forward over the weekend and showed the FBI a possible method to access the data on Syed Rizwan Farook’s encrypted phone, according to the filing.

http://www.infowars.com/fbi-attackers-phone-possibly-accessible-without-apple-help/

FREED HOSTAGE: MALI ATTACKERS SPEAK ENGLISH


alex-jones-mali-raddison

It is assumed the terrorists who stormed the hotel and killed at least three people and took another 100 hostage are African or possibly Arab jihadists.

They reportedly shouted “Allah Akbar” before opening fire on guards.

Guests at the hotel said the terrorists freed those who could recite from the Koran.

It is not clear why terrorists in a former French colony in Africa would speak English.

Freed Hostage: Mali Attackers Speak English

4 million government personnel files lost in latest hack, Chinese attackers suspected


chinahack-640x0 

News sources like Washington Post are reporting that the attack was Chinese in origin, although that’s coming from unidentified government sources. It’s not too hard to believe, however, considering that this would be the second major breach of data by Chinese hackers in the last year.

Even greater increased security measures are being put into place to prevent any further theft of data. Remote access for network administrators has been restricted, connections were audited to ensure that only in-use, up to date connections are allowed, and more intense anti-malware software has been distributed across the network.

Read more: http://www.digitaltrends.com/computing/federal-government-personnel-records-stolen-in-suspected-chinese-hack/#ixzz3jek0S66e
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook