Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer has warned that social media firms are putting lives at risk by refusing to co-operate with investigations into terrorist activity. Metropolitan Police Assistant Commissioner Mark Rowley said some companies were designing products in such a way that they are useless to police conducting covert surveillance operations.

Companies are adopting a strategy of refusing to provide detectives with online data of terrorist suspects and some inform suspects they are under police surveillance, he claimed.

In a speech at the Royal United Services Institute, Mr Rowley said advances in technology were creating surveillance "blind spots" making it harder to arrest suspects.
"We've had terrorist cases in that last year where digital surveillance gaps have meant that as the plot has developed we've been unsighted on exact details of what they're planning," he said.
"Criminals and terrorists are better educated and informed as to where our blind spots are and they are therefore better able to operate safely.
"Some social media companies refuse to assist and for some this is part of their strategy…they design their products in full recognition they'll be unable to help us. Some simply undermine us by adopting a policy that if they supply data to us they'll tell the subject they've done that. That's not desperately helpful to covert operations."

Mr Rowley warned that the use of encryption by cybercriminals is increasingly posing a challenge for police investigations.
"We've had occasions where we've had to prolong dangerous operations and delay arrests until we can confidently obtain evidence because encryption has been slowing our progress," he said.
"That delay makes us all very nervous. If we jump too early without enough evidence we have people in custody for few days and they're back on the streets better informed of what we know about them. If we run it too late and the consequences are potentially awful."

Mr Rowley added that social media was an "immature business sector" and that the way some companies behave would not be tolerated in other sectors.
Sky: http://bit.ly/1WIsnPC

 

« UK Police Ignore Most Cyber Crime
Reinventing CIA for the Big Data Era »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.