Feedback
Tech

Here’s Why Facebook and Google Can’t Protect You from Terrorists

The efforts of tech companies to disrupt online terror planning have been criticized after attacks in the U.K., but one analyst says there is little they can do.

"Encryption is used to secure all our conversations online. Strong encryption enables us to do commerce and do business and communicate in a very, very secure way," security consultant Brian Honan told CNBC Monday. He said that asking tech companies to provide security services with special access to online communication can't be done.

"It is not possible mathematically and technically to create a back door or golden key that can only be used by law enforcement to bypass that encryption. What you are doing is weakening the strong property of encryption," said the CEO of BH Consulting.

Related: Latest Attack Renews Debate on Extremists' Use of Social Media

The U.K. Prime Minister Theresa May and her Home Secretary Amber Rudd have both asked big internet firms to do more in the fight on terror. In her speech Sunday, May called for wider regulation on companies operating in the sector.

"We cannot allow this ideology the safe space it needs to breed. Yet that is precisely what the internet and the big companies that provide internet-based services provide," said May.

In response, online tech giants claim they are doing all they can. Google said it shared "the government's commitment to ensuring terrorists do not have a voice online." Facebook pledged to make itself a "hostile environment" for terrorists.

Related: Facebook Hires 3,000 More Screeners to Monitor Harmful Content

Facebook's Policy Director Simon Milner wrote: "Using a combination of technology and human review, we work aggressively to remove terrorist content from our platform as soon as we become aware of it."

"If we become aware of an emergency involving imminent harm to someone's safety, we notify law enforcement," said Milner on Sunday.

BH Consulting's Honan explained that tech companies also face wading through "vast amounts" of data in order to identify what might constitute a threat.

"First, you have to look at whether the material crosses a boundary between free speech and democratic speech into radicalization material," he said.

"And then there needs to be clear guidelines that these companies need to be able to follow on that."

Honan said relationships between the likes of Facebook or Apple and the security services would also have to improve.

"There has to be a greater basis for cooperation between private firms whose ultimate goal is to make a profit and those charged with protecting us," he added.