MI5 In The Clear Over Terror Attacks

An official government review will clear MI5 and the police of making serious mistakes that allowed terrorists to strike Britain in four attacks this year.  The inquiries,  overseen by an independent barrister, will make series of recommendations including devising algorithm to spot terrorists. 

But the reviews will also make a series of recommendations to minimise the chances of missing future attackers, including a new computer algorithm to detect behaviour that could indicate involvement in terrorism.

The internal inquiries were set up in the wake of the atrocities and have been carried out by MI5 and the police themselves, overseen by a barrister.

The reviews have found information was received by MI5 about the Manchester attacker, Salman Abedi, which could have been given a higher priority. But that conclusion is reached with the benefit of hindsight, sources say, and nothing in the reviews demonstrates that clear chances were missed to stop any of the attacks that killed 36 people.

Some may see the notion of MI5 and the police investigating themselves as unsatisfactory; parliament’s Intelligence and Security Committee (ISC) has been unable to investigate because the prime minister failed, until last week, to establish it after the May 2017 election.

The reviews into the four atrocities between March and June in Westminster, Manchester, London Bridge and Finsbury Park where terrorists beat Britain’s defences were overseen by a barrister, to provide assurance to the government that the inquiries were thorough.

No individuals are criticised in the reports, and that includes MI5 director-general Andrew Parker. Some media reports had claimed the inquiries into the attack would be so damning that his job might be in jeopardy.

Among a series of recommendations are improvements in:

Intelligence handling.
• The collaboration between MI5, which leads on counter-terrorism intelligence, and the police, which carries out enforcement action such as the detention of suspects.
• How closely the two organisations work together.
• The handling and potentially increased sharing of data with other parties, to put in place better preventive measures.

This is understood to mean better use of data analytics to go through the digital life of current and former suspects, on their smartphones and other devices, for clues indicating they may be more involved in terrorism than previously thought. Security officials will develop a new algorithm to scour the list of 20,000 former suspects, who are classed as posing little danger, to spot signs they may be re-engaging in terrorism, and then alert intelligence officers.

Those on the list of former suspects currently have little or no resources spent on them. It is claimed that Khalid Masood, who attacked Westminster in March, Salman Abedi, who bombed Manchester in the May, and Khuram Butt, who attacked London Bridge in June, had previously come to the attention of counter-terrorism officials. The two terrorists who murdered Lee Rigby in 2013 were also in the pool of former “subjects of interest”. Britain’s counter-terrorism system currently actively investigates 3,000 people.

The new algorithm is hoped to lessen the chance anything will be missed. It will inform decisions made by human case officers and analysts, not replace them.

The independent monitoring of the police and MI5 reviews has been carried out by David Anderson, the former independent reviewer of counter-terrorism legislation. One security source said his role was to make sure that MI5 and the police counter-terrorism network “were not marking their own homework”. Anderson’s “assurance” role followed a request by the government’s National Security Council. He submitted his report to the home secretary on 2 November, and a public version is expected to be released in the last week of this month or in early December.

MI5 and the police counter-terrorism network carried out two internal inquiries. Each organisation carried out a post-attack review to see if errors were made, whether different decisions could have been taken, and how the available intelligence was handled. 

The second part looked at how to improve their operations, especially given the view among counter-terrorism officials that the level of attack plotting and supporting activity is at an all-time high, the result of a shift, not a temporary spike.
The ISC is expected to receive both Anderson’s public and private report.

While the part of the reviews assessing if counter-terrorism officials made mistakes may attract more attention, the bigger focus among MI5, police and government is on retooling Britain’s efforts to cope with an increased threat from potential violent jihadists and a growing extreme rightwing terrorist threat. 

New figures showed investigators have taken 300,000 items of terrorist propaganda off the Internet since 2010, but the rate is slowing down, in part because technology companies have stepped up their efforts after years of pleading by the government, law enforcement and security service.

Police are trying to reverse a 7% cut in funding they get from the government to catch terrorists, while money has already been earmarked for MI5 to grow its staff by 25% to reach 5,000 people. 

Those decisions were made before this year’s attacks and before analysts assessed the terrorist threat had reached a new level of seriousness.

The reviews make no demands for controversial new laws or to shift the balance between human rights and security. There are no findings for a return of the stronger control orders which were scrapped by the Conservative-led coalition government and replaced by the terrorism prevention and investigation measures, seen by some in counter-terrorism as weaker and sucking up resources. 

Nor are there any findings supporting an extension to pre-charge detention. Sources say police and MI5 accept that the UK already has a strong set of laws after decades first combating Irish republican and then Islamist terrorism. Police have said they want longer sentences for those involved in terrorist propaganda, amid predictions that Islamic State will increasingly spread its message virtually, as it loses territory.

It is not known if the MI5 and police reviews into the attacks or their recommendations to boost their efforts will be published in any form, though some of their findings may be guessable from the public version of Anderson’s report.

Guardian

You Might Also Read:

Terrorism, A Sea Change In Tactics:         London Terrorist Attack Is A Wake-Up Call For Social Media:

M15 Issues A Threat Warning:                  A Major UK Cyber Attack Will Happen Soon:

 

« A Response Solution to Cyber Attacks
The New GDPR Rules Focus On Consumer Protection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.