London Terrorist Attack Is A Wake-Up Call For Social Media

The attack perpetrated in Westminster by Khalid Masood must be a “wake-up call” for technology giants over their efforts to tackle terrorist content online, the acting head of Scotland Yard has warned.

Craig Mackey delivered a stark message to platforms which have come under fire for hosting extremist material, calling on them to grasp what it means to “put your own house in order”.

According to belfasttelegraph.co.uk, Facebook, Google and Twitter are among firms that have repeatedly faced calls to do more to detect and remove jihadist and other extreme videos and web pages.

Appearing at the London Assembly’s Police and Crime Committee, Mackey, the acting commissioner of the Metropolitan Police, said: “If you are going to have ethical statements and talk about operating in an ethical way it actually has to mean something.”

The debate flared up after it emerged that information on how to mount an attack was easily accessible online.

A furor over security services’ access to terrorists’ communications erupted following reports that Khalid Masood’s phone connected with encrypted messaging service WhatsApp just before the attack.

Mr Mackey said investigators are examining an “enormous” volume of digital information, including some in “secure applications”. He said: “We work hard with the industry to highlight some of the challenges of these very secure applications.

“It’s a challenge when you are dealing with companies that are global by their very nature because they don’t always operate under the same legal framework as us.”

WhatsApp has said it is “co-operating with law enforcement as they continue their investigations”.

Detectives believe Masood acted alone in executing the attack but are continuing to investigate whether anyone else was involved in any way.

I-HLS

You Might Also Read:

WhatsApp U-turn On Privacy Gets EU Challenge:

Zello Protest App Blocked in Russia:

Security & Encryption After Edward Snowden:

ISIS Just Can’t Resist Social Media:

Is There A Truly Secure Messaging App?:

 

« Stop Data Breaches, Start With Databases
Safeguard Data When Employees Leave »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Lutech

Lutech

Lutech is an Italian ICT engineering and services company. Business solution areas include cyber security.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.