London Police Hampered By Encryption

In her first major speech on counter-terrorism, the London Metropolitan Police Commissioner, Cressida Dick, also disclosed that six plots have been foiled in the last four months

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said recently.

Commissioner Cressida Dick (pictured) also warned of a rising threat from “large numbers of apparently volatile individuals, some determined to die”.

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said yesterday.

In her first major speech on counter-terrorism, the Metropolitan Police Commissioner also disclosed that six plots have been foiled in the last four months.

The Scotland Yard chief’s remarks on encryption underline the challenge for the Government as it seeks to clamp down on online “safe spaces” where terrorists and other serious criminals can communicate without detection.

Scrutiny has focused on so-called end-to-end encryption, which is built in to messaging services such as WhatsApp and means that messages are encoded in such a way that only the sending and receiving devices can read them.

Police and MI5 are running more than 500 investigations into 3,000 individuals assessed as posing the greatest threat.

There are a further 20,000 former subjects of interest whose risk remains subject to review.

Sun:

You Might Also Read:

London Terrorist Attack Is A Wake-Up Call For Social Media:

Police Can’t Reduce Cybecrime:

Predicting Crime From Open Source Data:

 

« TalkTalk Still Feeling The Effects Of Cyber Attack
88% Feel Vulnerable To Data Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.