MI5 In The Clear Over Terror Attacks

An official government review will clear MI5 and the police of making serious mistakes that allowed terrorists to strike Britain in four attacks this year.  The inquiries,  overseen by an independent barrister, will make series of recommendations including devising algorithm to spot terrorists. 

But the reviews will also make a series of recommendations to minimise the chances of missing future attackers, including a new computer algorithm to detect behaviour that could indicate involvement in terrorism.

The internal inquiries were set up in the wake of the atrocities and have been carried out by MI5 and the police themselves, overseen by a barrister.

The reviews have found information was received by MI5 about the Manchester attacker, Salman Abedi, which could have been given a higher priority. But that conclusion is reached with the benefit of hindsight, sources say, and nothing in the reviews demonstrates that clear chances were missed to stop any of the attacks that killed 36 people.

Some may see the notion of MI5 and the police investigating themselves as unsatisfactory; parliament’s Intelligence and Security Committee (ISC) has been unable to investigate because the prime minister failed, until last week, to establish it after the May 2017 election.

The reviews into the four atrocities between March and June in Westminster, Manchester, London Bridge and Finsbury Park where terrorists beat Britain’s defences were overseen by a barrister, to provide assurance to the government that the inquiries were thorough.

No individuals are criticised in the reports, and that includes MI5 director-general Andrew Parker. Some media reports had claimed the inquiries into the attack would be so damning that his job might be in jeopardy.

Among a series of recommendations are improvements in:

Intelligence handling.
• The collaboration between MI5, which leads on counter-terrorism intelligence, and the police, which carries out enforcement action such as the detention of suspects.
• How closely the two organisations work together.
• The handling and potentially increased sharing of data with other parties, to put in place better preventive measures.

This is understood to mean better use of data analytics to go through the digital life of current and former suspects, on their smartphones and other devices, for clues indicating they may be more involved in terrorism than previously thought. Security officials will develop a new algorithm to scour the list of 20,000 former suspects, who are classed as posing little danger, to spot signs they may be re-engaging in terrorism, and then alert intelligence officers.

Those on the list of former suspects currently have little or no resources spent on them. It is claimed that Khalid Masood, who attacked Westminster in March, Salman Abedi, who bombed Manchester in the May, and Khuram Butt, who attacked London Bridge in June, had previously come to the attention of counter-terrorism officials. The two terrorists who murdered Lee Rigby in 2013 were also in the pool of former “subjects of interest”. Britain’s counter-terrorism system currently actively investigates 3,000 people.

The new algorithm is hoped to lessen the chance anything will be missed. It will inform decisions made by human case officers and analysts, not replace them.

The independent monitoring of the police and MI5 reviews has been carried out by David Anderson, the former independent reviewer of counter-terrorism legislation. One security source said his role was to make sure that MI5 and the police counter-terrorism network “were not marking their own homework”. Anderson’s “assurance” role followed a request by the government’s National Security Council. He submitted his report to the home secretary on 2 November, and a public version is expected to be released in the last week of this month or in early December.

MI5 and the police counter-terrorism network carried out two internal inquiries. Each organisation carried out a post-attack review to see if errors were made, whether different decisions could have been taken, and how the available intelligence was handled. 

The second part looked at how to improve their operations, especially given the view among counter-terrorism officials that the level of attack plotting and supporting activity is at an all-time high, the result of a shift, not a temporary spike.
The ISC is expected to receive both Anderson’s public and private report.

While the part of the reviews assessing if counter-terrorism officials made mistakes may attract more attention, the bigger focus among MI5, police and government is on retooling Britain’s efforts to cope with an increased threat from potential violent jihadists and a growing extreme rightwing terrorist threat. 

New figures showed investigators have taken 300,000 items of terrorist propaganda off the Internet since 2010, but the rate is slowing down, in part because technology companies have stepped up their efforts after years of pleading by the government, law enforcement and security service.

Police are trying to reverse a 7% cut in funding they get from the government to catch terrorists, while money has already been earmarked for MI5 to grow its staff by 25% to reach 5,000 people. 

Those decisions were made before this year’s attacks and before analysts assessed the terrorist threat had reached a new level of seriousness.

The reviews make no demands for controversial new laws or to shift the balance between human rights and security. There are no findings for a return of the stronger control orders which were scrapped by the Conservative-led coalition government and replaced by the terrorism prevention and investigation measures, seen by some in counter-terrorism as weaker and sucking up resources. 

Nor are there any findings supporting an extension to pre-charge detention. Sources say police and MI5 accept that the UK already has a strong set of laws after decades first combating Irish republican and then Islamist terrorism. Police have said they want longer sentences for those involved in terrorist propaganda, amid predictions that Islamic State will increasingly spread its message virtually, as it loses territory.

It is not known if the MI5 and police reviews into the attacks or their recommendations to boost their efforts will be published in any form, though some of their findings may be guessable from the public version of Anderson’s report.

Guardian

You Might Also Read:

Terrorism, A Sea Change In Tactics:         London Terrorist Attack Is A Wake-Up Call For Social Media:

M15 Issues A Threat Warning:                  A Major UK Cyber Attack Will Happen Soon:

 

« A Response Solution to Cyber Attacks
The New GDPR Rules Focus On Consumer Protection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.