London Terrorist Attack Is A Wake-Up Call For Social Media

The attack perpetrated in Westminster by Khalid Masood must be a “wake-up call” for technology giants over their efforts to tackle terrorist content online, the acting head of Scotland Yard has warned.

Craig Mackey delivered a stark message to platforms which have come under fire for hosting extremist material, calling on them to grasp what it means to “put your own house in order”.

According to belfasttelegraph.co.uk, Facebook, Google and Twitter are among firms that have repeatedly faced calls to do more to detect and remove jihadist and other extreme videos and web pages.

Appearing at the London Assembly’s Police and Crime Committee, Mackey, the acting commissioner of the Metropolitan Police, said: “If you are going to have ethical statements and talk about operating in an ethical way it actually has to mean something.”

The debate flared up after it emerged that information on how to mount an attack was easily accessible online.

A furor over security services’ access to terrorists’ communications erupted following reports that Khalid Masood’s phone connected with encrypted messaging service WhatsApp just before the attack.

Mr Mackey said investigators are examining an “enormous” volume of digital information, including some in “secure applications”. He said: “We work hard with the industry to highlight some of the challenges of these very secure applications.

“It’s a challenge when you are dealing with companies that are global by their very nature because they don’t always operate under the same legal framework as us.”

WhatsApp has said it is “co-operating with law enforcement as they continue their investigations”.

Detectives believe Masood acted alone in executing the attack but are continuing to investigate whether anyone else was involved in any way.

I-HLS

You Might Also Read:

WhatsApp U-turn On Privacy Gets EU Challenge:

Zello Protest App Blocked in Russia:

Security & Encryption After Edward Snowden:

ISIS Just Can’t Resist Social Media:

Is There A Truly Secure Messaging App?:

 

« Stop Data Breaches, Start With Databases
Safeguard Data When Employees Leave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.