Women Suspected To Attempt Next Terror Attack

Europe is preparing for its next Islamic State-inspired terror attack to be carried out by a female assassin after a string of arrests of radicalised young girls and women.

Fears of a new wave of female recruits have been growing in France since authorities made several arrests of women who had pledged allegiance to the globally known terror organization. According to the Paris prosecutor’s office two young women from the city of Nice were arrested in September, for suspected ties to the ISIS militant Rachid Kassim. The teenagers, aged 17 and 19, were being groomed to carry out an attack on “specific targets” in France in retaliation for the recent death of the Islamic State’s spokesman Abu Muhammad al-Adnani, a source close to the investigation said.

The pair used their mobiles via the Telegram encrypted messaging system, which is a cloud based instant messaging system, to communicate with Kassim, who is suspected of having participated in several attacks or attempted attacks in France. Security experts have warned that authorities often turn a blind eye to women jihadis because they are not deemed to be a high risk. Writing in a report entitled Studies in Conflict and Terrorism: Countering Female Terrorism, Dr Karla Cunningham said female terrorism was “rarely acknowledged” because officials “fail to anticipate the emergency and range of female militant actors”.

According to express.co.uk, the French teenagers admitted considering the attack, before abandoning the idea. At least four other teenagers, all suspected of having plotted to kill in the name of the Islamic State, were arrested in about 10 days in early September by the General Directorate for Internal Security, a French intelligence agency, which spotted the suspects on social networks. All were in contact via Telegram with Kassim, who is currently located in the Syrian-Iraqi region, according to police sources.

US researchers recently found that female terrorists do a better job than men at maintaining networks and communicating with fellow operatives. Figures released by the UK government show that female terror arrests are on the rise in the UK. A record number of suspected female terrorists were detained by British police last year, amounting to 14 per cent of all arrests on terrorism charges.

I-HLS:

 

« Cybersecurity Is Just A Lot Of Trouble For The General Public
Overwhelming Cyber Attacks On Healthcare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.