MI5 In The Clear Over Terror Attacks

An official government review will clear MI5 and the police of making serious mistakes that allowed terrorists to strike Britain in four attacks this year.  The inquiries,  overseen by an independent barrister, will make series of recommendations including devising algorithm to spot terrorists. 

But the reviews will also make a series of recommendations to minimise the chances of missing future attackers, including a new computer algorithm to detect behaviour that could indicate involvement in terrorism.

The internal inquiries were set up in the wake of the atrocities and have been carried out by MI5 and the police themselves, overseen by a barrister.

The reviews have found information was received by MI5 about the Manchester attacker, Salman Abedi, which could have been given a higher priority. But that conclusion is reached with the benefit of hindsight, sources say, and nothing in the reviews demonstrates that clear chances were missed to stop any of the attacks that killed 36 people.

Some may see the notion of MI5 and the police investigating themselves as unsatisfactory; parliament’s Intelligence and Security Committee (ISC) has been unable to investigate because the prime minister failed, until last week, to establish it after the May 2017 election.

The reviews into the four atrocities between March and June in Westminster, Manchester, London Bridge and Finsbury Park where terrorists beat Britain’s defences were overseen by a barrister, to provide assurance to the government that the inquiries were thorough.

No individuals are criticised in the reports, and that includes MI5 director-general Andrew Parker. Some media reports had claimed the inquiries into the attack would be so damning that his job might be in jeopardy.

Among a series of recommendations are improvements in:

Intelligence handling.
• The collaboration between MI5, which leads on counter-terrorism intelligence, and the police, which carries out enforcement action such as the detention of suspects.
• How closely the two organisations work together.
• The handling and potentially increased sharing of data with other parties, to put in place better preventive measures.

This is understood to mean better use of data analytics to go through the digital life of current and former suspects, on their smartphones and other devices, for clues indicating they may be more involved in terrorism than previously thought. Security officials will develop a new algorithm to scour the list of 20,000 former suspects, who are classed as posing little danger, to spot signs they may be re-engaging in terrorism, and then alert intelligence officers.

Those on the list of former suspects currently have little or no resources spent on them. It is claimed that Khalid Masood, who attacked Westminster in March, Salman Abedi, who bombed Manchester in the May, and Khuram Butt, who attacked London Bridge in June, had previously come to the attention of counter-terrorism officials. The two terrorists who murdered Lee Rigby in 2013 were also in the pool of former “subjects of interest”. Britain’s counter-terrorism system currently actively investigates 3,000 people.

The new algorithm is hoped to lessen the chance anything will be missed. It will inform decisions made by human case officers and analysts, not replace them.

The independent monitoring of the police and MI5 reviews has been carried out by David Anderson, the former independent reviewer of counter-terrorism legislation. One security source said his role was to make sure that MI5 and the police counter-terrorism network “were not marking their own homework”. Anderson’s “assurance” role followed a request by the government’s National Security Council. He submitted his report to the home secretary on 2 November, and a public version is expected to be released in the last week of this month or in early December.

MI5 and the police counter-terrorism network carried out two internal inquiries. Each organisation carried out a post-attack review to see if errors were made, whether different decisions could have been taken, and how the available intelligence was handled. 

The second part looked at how to improve their operations, especially given the view among counter-terrorism officials that the level of attack plotting and supporting activity is at an all-time high, the result of a shift, not a temporary spike.
The ISC is expected to receive both Anderson’s public and private report.

While the part of the reviews assessing if counter-terrorism officials made mistakes may attract more attention, the bigger focus among MI5, police and government is on retooling Britain’s efforts to cope with an increased threat from potential violent jihadists and a growing extreme rightwing terrorist threat. 

New figures showed investigators have taken 300,000 items of terrorist propaganda off the Internet since 2010, but the rate is slowing down, in part because technology companies have stepped up their efforts after years of pleading by the government, law enforcement and security service.

Police are trying to reverse a 7% cut in funding they get from the government to catch terrorists, while money has already been earmarked for MI5 to grow its staff by 25% to reach 5,000 people. 

Those decisions were made before this year’s attacks and before analysts assessed the terrorist threat had reached a new level of seriousness.

The reviews make no demands for controversial new laws or to shift the balance between human rights and security. There are no findings for a return of the stronger control orders which were scrapped by the Conservative-led coalition government and replaced by the terrorism prevention and investigation measures, seen by some in counter-terrorism as weaker and sucking up resources. 

Nor are there any findings supporting an extension to pre-charge detention. Sources say police and MI5 accept that the UK already has a strong set of laws after decades first combating Irish republican and then Islamist terrorism. Police have said they want longer sentences for those involved in terrorist propaganda, amid predictions that Islamic State will increasingly spread its message virtually, as it loses territory.

It is not known if the MI5 and police reviews into the attacks or their recommendations to boost their efforts will be published in any form, though some of their findings may be guessable from the public version of Anderson’s report.

Guardian

You Might Also Read:

Terrorism, A Sea Change In Tactics:         London Terrorist Attack Is A Wake-Up Call For Social Media:

M15 Issues A Threat Warning:                  A Major UK Cyber Attack Will Happen Soon:

 

« A Response Solution to Cyber Attacks
The New GDPR Rules Focus On Consumer Protection »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Redington Group

Redington Group

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.