London Terrorist Attack Is A Wake-Up Call For Social Media

The attack perpetrated in Westminster by Khalid Masood must be a “wake-up call” for technology giants over their efforts to tackle terrorist content online, the acting head of Scotland Yard has warned.

Craig Mackey delivered a stark message to platforms which have come under fire for hosting extremist material, calling on them to grasp what it means to “put your own house in order”.

According to belfasttelegraph.co.uk, Facebook, Google and Twitter are among firms that have repeatedly faced calls to do more to detect and remove jihadist and other extreme videos and web pages.

Appearing at the London Assembly’s Police and Crime Committee, Mackey, the acting commissioner of the Metropolitan Police, said: “If you are going to have ethical statements and talk about operating in an ethical way it actually has to mean something.”

The debate flared up after it emerged that information on how to mount an attack was easily accessible online.

A furor over security services’ access to terrorists’ communications erupted following reports that Khalid Masood’s phone connected with encrypted messaging service WhatsApp just before the attack.

Mr Mackey said investigators are examining an “enormous” volume of digital information, including some in “secure applications”. He said: “We work hard with the industry to highlight some of the challenges of these very secure applications.

“It’s a challenge when you are dealing with companies that are global by their very nature because they don’t always operate under the same legal framework as us.”

WhatsApp has said it is “co-operating with law enforcement as they continue their investigations”.

Detectives believe Masood acted alone in executing the attack but are continuing to investigate whether anyone else was involved in any way.

I-HLS

You Might Also Read:

WhatsApp U-turn On Privacy Gets EU Challenge:

Zello Protest App Blocked in Russia:

Security & Encryption After Edward Snowden:

ISIS Just Can’t Resist Social Media:

Is There A Truly Secure Messaging App?:

 

« Stop Data Breaches, Start With Databases
Safeguard Data When Employees Leave »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.