London Police Hampered By Encryption

In her first major speech on counter-terrorism, the London Metropolitan Police Commissioner, Cressida Dick, also disclosed that six plots have been foiled in the last four months

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said recently.

Commissioner Cressida Dick (pictured) also warned of a rising threat from “large numbers of apparently volatile individuals, some determined to die”.

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said yesterday.

In her first major speech on counter-terrorism, the Metropolitan Police Commissioner also disclosed that six plots have been foiled in the last four months.

The Scotland Yard chief’s remarks on encryption underline the challenge for the Government as it seeks to clamp down on online “safe spaces” where terrorists and other serious criminals can communicate without detection.

Scrutiny has focused on so-called end-to-end encryption, which is built in to messaging services such as WhatsApp and means that messages are encoded in such a way that only the sending and receiving devices can read them.

Police and MI5 are running more than 500 investigations into 3,000 individuals assessed as posing the greatest threat.

There are a further 20,000 former subjects of interest whose risk remains subject to review.

Sun:

You Might Also Read:

London Terrorist Attack Is A Wake-Up Call For Social Media:

Police Can’t Reduce Cybecrime:

Predicting Crime From Open Source Data:

 

« TalkTalk Still Feeling The Effects Of Cyber Attack
88% Feel Vulnerable To Data Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.