London Police Hampered By Encryption

In her first major speech on counter-terrorism, the London Metropolitan Police Commissioner, Cressida Dick, also disclosed that six plots have been foiled in the last four months

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said recently.

Commissioner Cressida Dick (pictured) also warned of a rising threat from “large numbers of apparently volatile individuals, some determined to die”.

The fight on terrorism is being made tougher by encryption on the web and messaging services, the Met’s chief said yesterday.

In her first major speech on counter-terrorism, the Metropolitan Police Commissioner also disclosed that six plots have been foiled in the last four months.

The Scotland Yard chief’s remarks on encryption underline the challenge for the Government as it seeks to clamp down on online “safe spaces” where terrorists and other serious criminals can communicate without detection.

Scrutiny has focused on so-called end-to-end encryption, which is built in to messaging services such as WhatsApp and means that messages are encoded in such a way that only the sending and receiving devices can read them.

Police and MI5 are running more than 500 investigations into 3,000 individuals assessed as posing the greatest threat.

There are a further 20,000 former subjects of interest whose risk remains subject to review.

Sun:

You Might Also Read:

London Terrorist Attack Is A Wake-Up Call For Social Media:

Police Can’t Reduce Cybecrime:

Predicting Crime From Open Source Data:

 

« TalkTalk Still Feeling The Effects Of Cyber Attack
88% Feel Vulnerable To Data Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Forensic Control

Forensic Control

Forensic Control is an insider threat and risk management firm specialising in computer forensics and behavioural psychology.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.