MI5 In The Clear Over Terror Attacks

An official government review will clear MI5 and the police of making serious mistakes that allowed terrorists to strike Britain in four attacks this year.  The inquiries,  overseen by an independent barrister, will make series of recommendations including devising algorithm to spot terrorists. 

But the reviews will also make a series of recommendations to minimise the chances of missing future attackers, including a new computer algorithm to detect behaviour that could indicate involvement in terrorism.

The internal inquiries were set up in the wake of the atrocities and have been carried out by MI5 and the police themselves, overseen by a barrister.

The reviews have found information was received by MI5 about the Manchester attacker, Salman Abedi, which could have been given a higher priority. But that conclusion is reached with the benefit of hindsight, sources say, and nothing in the reviews demonstrates that clear chances were missed to stop any of the attacks that killed 36 people.

Some may see the notion of MI5 and the police investigating themselves as unsatisfactory; parliament’s Intelligence and Security Committee (ISC) has been unable to investigate because the prime minister failed, until last week, to establish it after the May 2017 election.

The reviews into the four atrocities between March and June in Westminster, Manchester, London Bridge and Finsbury Park where terrorists beat Britain’s defences were overseen by a barrister, to provide assurance to the government that the inquiries were thorough.

No individuals are criticised in the reports, and that includes MI5 director-general Andrew Parker. Some media reports had claimed the inquiries into the attack would be so damning that his job might be in jeopardy.

Among a series of recommendations are improvements in:

Intelligence handling.
• The collaboration between MI5, which leads on counter-terrorism intelligence, and the police, which carries out enforcement action such as the detention of suspects.
• How closely the two organisations work together.
• The handling and potentially increased sharing of data with other parties, to put in place better preventive measures.

This is understood to mean better use of data analytics to go through the digital life of current and former suspects, on their smartphones and other devices, for clues indicating they may be more involved in terrorism than previously thought. Security officials will develop a new algorithm to scour the list of 20,000 former suspects, who are classed as posing little danger, to spot signs they may be re-engaging in terrorism, and then alert intelligence officers.

Those on the list of former suspects currently have little or no resources spent on them. It is claimed that Khalid Masood, who attacked Westminster in March, Salman Abedi, who bombed Manchester in the May, and Khuram Butt, who attacked London Bridge in June, had previously come to the attention of counter-terrorism officials. The two terrorists who murdered Lee Rigby in 2013 were also in the pool of former “subjects of interest”. Britain’s counter-terrorism system currently actively investigates 3,000 people.

The new algorithm is hoped to lessen the chance anything will be missed. It will inform decisions made by human case officers and analysts, not replace them.

The independent monitoring of the police and MI5 reviews has been carried out by David Anderson, the former independent reviewer of counter-terrorism legislation. One security source said his role was to make sure that MI5 and the police counter-terrorism network “were not marking their own homework”. Anderson’s “assurance” role followed a request by the government’s National Security Council. He submitted his report to the home secretary on 2 November, and a public version is expected to be released in the last week of this month or in early December.

MI5 and the police counter-terrorism network carried out two internal inquiries. Each organisation carried out a post-attack review to see if errors were made, whether different decisions could have been taken, and how the available intelligence was handled. 

The second part looked at how to improve their operations, especially given the view among counter-terrorism officials that the level of attack plotting and supporting activity is at an all-time high, the result of a shift, not a temporary spike.
The ISC is expected to receive both Anderson’s public and private report.

While the part of the reviews assessing if counter-terrorism officials made mistakes may attract more attention, the bigger focus among MI5, police and government is on retooling Britain’s efforts to cope with an increased threat from potential violent jihadists and a growing extreme rightwing terrorist threat. 

New figures showed investigators have taken 300,000 items of terrorist propaganda off the Internet since 2010, but the rate is slowing down, in part because technology companies have stepped up their efforts after years of pleading by the government, law enforcement and security service.

Police are trying to reverse a 7% cut in funding they get from the government to catch terrorists, while money has already been earmarked for MI5 to grow its staff by 25% to reach 5,000 people. 

Those decisions were made before this year’s attacks and before analysts assessed the terrorist threat had reached a new level of seriousness.

The reviews make no demands for controversial new laws or to shift the balance between human rights and security. There are no findings for a return of the stronger control orders which were scrapped by the Conservative-led coalition government and replaced by the terrorism prevention and investigation measures, seen by some in counter-terrorism as weaker and sucking up resources. 

Nor are there any findings supporting an extension to pre-charge detention. Sources say police and MI5 accept that the UK already has a strong set of laws after decades first combating Irish republican and then Islamist terrorism. Police have said they want longer sentences for those involved in terrorist propaganda, amid predictions that Islamic State will increasingly spread its message virtually, as it loses territory.

It is not known if the MI5 and police reviews into the attacks or their recommendations to boost their efforts will be published in any form, though some of their findings may be guessable from the public version of Anderson’s report.

Guardian

You Might Also Read:

Terrorism, A Sea Change In Tactics:         London Terrorist Attack Is A Wake-Up Call For Social Media:

M15 Issues A Threat Warning:                  A Major UK Cyber Attack Will Happen Soon:

 

« A Response Solution to Cyber Attacks
The New GDPR Rules Focus On Consumer Protection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Securadin

Securadin

Securadin - Defending Your Data Security. We will assist you in learning how to maintain the confidentiality, integrity, and availability of your organization's assets.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.