The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and this digital revolution is not going to slow up but will increase in its revolutionary capacity.

So far, the biggest challenges have revolved around technology, laws, and cost, but still, over the past year, there has been a major push toward making this process more approachable and globally-impactful.

In the UK the police force’s use and understanding of the cyber/digital age came under scrutiny with a conference that took place at RUSI (Royal United Service Institute) in Whitehall on the 21st June.

By having such a police focused cyber meeting in the first place is a very good overall sign that the UK police want to stay on the moment and to understand their current and future cyber/digital requirements. And this positive indicator is a valid indication of the digital progress being made in the UK’s police. They link with the different intelligence services and practices both in government and in the private sectors better than most other national police forces.

However, what also became apparent, and to the delegates apparently something they were unaware of, is that within most of the UK police force there is still a real lack of coordination and inter-force digital information sharing. 

We now live in an integrating and cross communicative society where access to social media and information has become a global activity and yet the UK police force still is situated in the old industrial age structure with 43 different forces policing most of the UK – only Scotland has an integrated police force. 

The rest of the UK has not learnt the lessons of digital integration that suggest that the management and the 43 individual police forces should not only electronically integrate, but also the higher level of management should be reduced and combined. The old Dixon of Dock Green understanding, going back to the 1950s, is often still considered to be at least partially relevant. Yet we now live in a world where information and the global criminal element means that law breaking can take place in the EU or Asia and yet the crime happens in Australia, the US or UK or all three places or of course criminals from the West attack subjects in the East. 

The lack of real understanding on a force by force level concerning digital analysis and the required training and effective outcomes have only been partially implemented into around 9 of the 43 forces and even in the nine forces the levels of understanding differ and the equipment is often not up to the required levels. 

The understanding exits within the UK police force but the need to co-ordinate and integrate the 43 forces has yet to be really engaged with as the senior police management understandable don’t want to move into the new Digital Age, co-ordinate and management-merge as they would be in fear of losing their jobs.

For more information and analysis please contact: Cyber Security Intelligence 

« False Flags: The Kremlin’s Hidden Hand
ISIS, The Pentagon & The Lone Wolf Syndrome »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.