Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer has warned that social media firms are putting lives at risk by refusing to co-operate with investigations into terrorist activity. Metropolitan Police Assistant Commissioner Mark Rowley said some companies were designing products in such a way that they are useless to police conducting covert surveillance operations.

Companies are adopting a strategy of refusing to provide detectives with online data of terrorist suspects and some inform suspects they are under police surveillance, he claimed.

In a speech at the Royal United Services Institute, Mr Rowley said advances in technology were creating surveillance "blind spots" making it harder to arrest suspects.
"We've had terrorist cases in that last year where digital surveillance gaps have meant that as the plot has developed we've been unsighted on exact details of what they're planning," he said.
"Criminals and terrorists are better educated and informed as to where our blind spots are and they are therefore better able to operate safely.
"Some social media companies refuse to assist and for some this is part of their strategy…they design their products in full recognition they'll be unable to help us. Some simply undermine us by adopting a policy that if they supply data to us they'll tell the subject they've done that. That's not desperately helpful to covert operations."

Mr Rowley warned that the use of encryption by cybercriminals is increasingly posing a challenge for police investigations.
"We've had occasions where we've had to prolong dangerous operations and delay arrests until we can confidently obtain evidence because encryption has been slowing our progress," he said.
"That delay makes us all very nervous. If we jump too early without enough evidence we have people in custody for few days and they're back on the streets better informed of what we know about them. If we run it too late and the consequences are potentially awful."

Mr Rowley added that social media was an "immature business sector" and that the way some companies behave would not be tolerated in other sectors.
Sky: http://bit.ly/1WIsnPC

 

« UK Police Ignore Most Cyber Crime
Reinventing CIA for the Big Data Era »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

Concentric AI

Concentric AI

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

DefensX

DefensX

DefensX turns your go-to browser into a secure digital workspace paired with robust Web Data Loss Protection and AI Data Protection.