The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and this digital revolution is not going to slow up but will increase in its revolutionary capacity.

So far, the biggest challenges have revolved around technology, laws, and cost, but still, over the past year, there has been a major push toward making this process more approachable and globally-impactful.

In the UK the police force’s use and understanding of the cyber/digital age came under scrutiny with a conference that took place at RUSI (Royal United Service Institute) in Whitehall on the 21st June.

By having such a police focused cyber meeting in the first place is a very good overall sign that the UK police want to stay on the moment and to understand their current and future cyber/digital requirements. And this positive indicator is a valid indication of the digital progress being made in the UK’s police. They link with the different intelligence services and practices both in government and in the private sectors better than most other national police forces.

However, what also became apparent, and to the delegates apparently something they were unaware of, is that within most of the UK police force there is still a real lack of coordination and inter-force digital information sharing. 

We now live in an integrating and cross communicative society where access to social media and information has become a global activity and yet the UK police force still is situated in the old industrial age structure with 43 different forces policing most of the UK – only Scotland has an integrated police force. 

The rest of the UK has not learnt the lessons of digital integration that suggest that the management and the 43 individual police forces should not only electronically integrate, but also the higher level of management should be reduced and combined. The old Dixon of Dock Green understanding, going back to the 1950s, is often still considered to be at least partially relevant. Yet we now live in a world where information and the global criminal element means that law breaking can take place in the EU or Asia and yet the crime happens in Australia, the US or UK or all three places or of course criminals from the West attack subjects in the East. 

The lack of real understanding on a force by force level concerning digital analysis and the required training and effective outcomes have only been partially implemented into around 9 of the 43 forces and even in the nine forces the levels of understanding differ and the equipment is often not up to the required levels. 

The understanding exits within the UK police force but the need to co-ordinate and integrate the 43 forces has yet to be really engaged with as the senior police management understandable don’t want to move into the new Digital Age, co-ordinate and management-merge as they would be in fear of losing their jobs.

For more information and analysis please contact: Cyber Security Intelligence 

« False Flags: The Kremlin’s Hidden Hand
ISIS, The Pentagon & The Lone Wolf Syndrome »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.