Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer has warned that social media firms are putting lives at risk by refusing to co-operate with investigations into terrorist activity. Metropolitan Police Assistant Commissioner Mark Rowley said some companies were designing products in such a way that they are useless to police conducting covert surveillance operations.

Companies are adopting a strategy of refusing to provide detectives with online data of terrorist suspects and some inform suspects they are under police surveillance, he claimed.

In a speech at the Royal United Services Institute, Mr Rowley said advances in technology were creating surveillance "blind spots" making it harder to arrest suspects.
"We've had terrorist cases in that last year where digital surveillance gaps have meant that as the plot has developed we've been unsighted on exact details of what they're planning," he said.
"Criminals and terrorists are better educated and informed as to where our blind spots are and they are therefore better able to operate safely.
"Some social media companies refuse to assist and for some this is part of their strategy…they design their products in full recognition they'll be unable to help us. Some simply undermine us by adopting a policy that if they supply data to us they'll tell the subject they've done that. That's not desperately helpful to covert operations."

Mr Rowley warned that the use of encryption by cybercriminals is increasingly posing a challenge for police investigations.
"We've had occasions where we've had to prolong dangerous operations and delay arrests until we can confidently obtain evidence because encryption has been slowing our progress," he said.
"That delay makes us all very nervous. If we jump too early without enough evidence we have people in custody for few days and they're back on the streets better informed of what we know about them. If we run it too late and the consequences are potentially awful."

Mr Rowley added that social media was an "immature business sector" and that the way some companies behave would not be tolerated in other sectors.
Sky: http://bit.ly/1WIsnPC

 

« UK Police Ignore Most Cyber Crime
Reinventing CIA for the Big Data Era »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.