Remember how, in the wake of the horrific terrorist attacks on Brussels last month, authorities all over the world declared that the world was critically endangered by cryptography, insisting that crazy, far-reaching crypto-bans were necessary to prevent another attack?
Not so much.
The terrorists who attacked Brussels didn't use crypto. They kept their s00p3r s33kr1t plans in a plaintext folder labelled "TARGET."
Of course, now it's being reported that a laptop seized from one of the suicide bombers in Brussels shows little attempt to actually hide plans of attacks. In fact, it showed that attack plans were kept in an unencrypted folder titled "Target." And the only attempt to "hide" it was that the computer had been thrown in the trash.
The bomber referred to striking Britain, the La Defense business district in Paris, and the ultra-conservative Catholic organisation, Civitas, in a folder titled “Target,” written in English, according to the source.
The laptop was found in the trash by police in Brussels shortly after the suicide bombings on March 22 that killed 32 people at the city’s airport and on a Metro train.
Brussels Terrorist Laptop Included Details Of Planned Attack In Unencrypted Folder Titled 'Target'
• Search warrant executed by FBI at Calabasas home of YouTube star Jake Paul on Wednesday • Judge has sealed the search-warrant affidavit • No info on nature of FBI investigation, or individual served The Southern California home of YouTube star Jake Paul was raided today in a large FBI operation that included a SWAT […]
“Dzhokhar will spend his remaining days locked up in prison, with the only matter remaining being whether he will die by execution,”
The document says “Defendant Shall Not Attend Protests.” In Portland, getting out of jail now means relinquishing constitutionally protected rights. “This is what it looks like when you’re released from jail on federal charges…on the condition that you stop showing up to protest,” writes Dara Lind at ProPublica. A dozen protesters facing federal charges are […]
After years of hearing a steady drumbeat about the necessity of surfing the web under the protection of a VPN, even the most technophobic among us are starting to come around. But even knowing the dangers one can face from cybercrooks phishing for information from unsuspecting victims online, those last holdouts still have some fears. […]
You may not realize it, but some of the biggest films in movie history have been edited using the same tools some of you use to cut your video of vacationing at Disney World. Giant movies from Oscar favorites The Social Network and Gone Girl to blockbusters like Avatar, Deadpool, and last year’s Terminator: Dark […]
Now that the initial furor and shortages have subsided, it’s probably not a bad time to start considering your long-term cleaning and disinfecting plans. Sure, that might seem anywhere from overly cautious to outright ridiculous, but the threat of COVID-19 appears poised to be present for a while and the need for quick travel clean-up […]