Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer has warned that social media firms are putting lives at risk by refusing to co-operate with investigations into terrorist activity. Metropolitan Police Assistant Commissioner Mark Rowley said some companies were designing products in such a way that they are useless to police conducting covert surveillance operations.

Companies are adopting a strategy of refusing to provide detectives with online data of terrorist suspects and some inform suspects they are under police surveillance, he claimed.

In a speech at the Royal United Services Institute, Mr Rowley said advances in technology were creating surveillance "blind spots" making it harder to arrest suspects.
"We've had terrorist cases in that last year where digital surveillance gaps have meant that as the plot has developed we've been unsighted on exact details of what they're planning," he said.
"Criminals and terrorists are better educated and informed as to where our blind spots are and they are therefore better able to operate safely.
"Some social media companies refuse to assist and for some this is part of their strategy…they design their products in full recognition they'll be unable to help us. Some simply undermine us by adopting a policy that if they supply data to us they'll tell the subject they've done that. That's not desperately helpful to covert operations."

Mr Rowley warned that the use of encryption by cybercriminals is increasingly posing a challenge for police investigations.
"We've had occasions where we've had to prolong dangerous operations and delay arrests until we can confidently obtain evidence because encryption has been slowing our progress," he said.
"That delay makes us all very nervous. If we jump too early without enough evidence we have people in custody for few days and they're back on the streets better informed of what we know about them. If we run it too late and the consequences are potentially awful."

Mr Rowley added that social media was an "immature business sector" and that the way some companies behave would not be tolerated in other sectors.
Sky: http://bit.ly/1WIsnPC

 

« UK Police Ignore Most Cyber Crime
Reinventing CIA for the Big Data Era »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Fuel Recruitment

Fuel Recruitment

Fuel Recruitment is a specialist recruitment company for the IT, Telecoms, Engineering, Consulting and Marketing industries.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Mnemonica

Mnemonica

Mnemonica specializes in providing data protection system, information security compliance solutions, cloud and managed services.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.