London Terrorist Attack Is A Wake-Up Call For Social Media

The attack perpetrated in Westminster by Khalid Masood must be a “wake-up call” for technology giants over their efforts to tackle terrorist content online, the acting head of Scotland Yard has warned.

Craig Mackey delivered a stark message to platforms which have come under fire for hosting extremist material, calling on them to grasp what it means to “put your own house in order”.

According to belfasttelegraph.co.uk, Facebook, Google and Twitter are among firms that have repeatedly faced calls to do more to detect and remove jihadist and other extreme videos and web pages.

Appearing at the London Assembly’s Police and Crime Committee, Mackey, the acting commissioner of the Metropolitan Police, said: “If you are going to have ethical statements and talk about operating in an ethical way it actually has to mean something.”

The debate flared up after it emerged that information on how to mount an attack was easily accessible online.

A furor over security services’ access to terrorists’ communications erupted following reports that Khalid Masood’s phone connected with encrypted messaging service WhatsApp just before the attack.

Mr Mackey said investigators are examining an “enormous” volume of digital information, including some in “secure applications”. He said: “We work hard with the industry to highlight some of the challenges of these very secure applications.

“It’s a challenge when you are dealing with companies that are global by their very nature because they don’t always operate under the same legal framework as us.”

WhatsApp has said it is “co-operating with law enforcement as they continue their investigations”.

Detectives believe Masood acted alone in executing the attack but are continuing to investigate whether anyone else was involved in any way.

I-HLS

You Might Also Read:

WhatsApp U-turn On Privacy Gets EU Challenge:

Zello Protest App Blocked in Russia:

Security & Encryption After Edward Snowden:

ISIS Just Can’t Resist Social Media:

Is There A Truly Secure Messaging App?:

 

« Stop Data Breaches, Start With Databases
Safeguard Data When Employees Leave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.