London Terrorist Attack Is A Wake-Up Call For Social Media

The attack perpetrated in Westminster by Khalid Masood must be a “wake-up call” for technology giants over their efforts to tackle terrorist content online, the acting head of Scotland Yard has warned.

Craig Mackey delivered a stark message to platforms which have come under fire for hosting extremist material, calling on them to grasp what it means to “put your own house in order”.

According to belfasttelegraph.co.uk, Facebook, Google and Twitter are among firms that have repeatedly faced calls to do more to detect and remove jihadist and other extreme videos and web pages.

Appearing at the London Assembly’s Police and Crime Committee, Mackey, the acting commissioner of the Metropolitan Police, said: “If you are going to have ethical statements and talk about operating in an ethical way it actually has to mean something.”

The debate flared up after it emerged that information on how to mount an attack was easily accessible online.

A furor over security services’ access to terrorists’ communications erupted following reports that Khalid Masood’s phone connected with encrypted messaging service WhatsApp just before the attack.

Mr Mackey said investigators are examining an “enormous” volume of digital information, including some in “secure applications”. He said: “We work hard with the industry to highlight some of the challenges of these very secure applications.

“It’s a challenge when you are dealing with companies that are global by their very nature because they don’t always operate under the same legal framework as us.”

WhatsApp has said it is “co-operating with law enforcement as they continue their investigations”.

Detectives believe Masood acted alone in executing the attack but are continuing to investigate whether anyone else was involved in any way.

I-HLS

You Might Also Read:

WhatsApp U-turn On Privacy Gets EU Challenge:

Zello Protest App Blocked in Russia:

Security & Encryption After Edward Snowden:

ISIS Just Can’t Resist Social Media:

Is There A Truly Secure Messaging App?:

 

« Stop Data Breaches, Start With Databases
Safeguard Data When Employees Leave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.