The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and this digital revolution is not going to slow up but will increase in its revolutionary capacity.

So far, the biggest challenges have revolved around technology, laws, and cost, but still, over the past year, there has been a major push toward making this process more approachable and globally-impactful.

In the UK the police force’s use and understanding of the cyber/digital age came under scrutiny with a conference that took place at RUSI (Royal United Service Institute) in Whitehall on the 21st June.

By having such a police focused cyber meeting in the first place is a very good overall sign that the UK police want to stay on the moment and to understand their current and future cyber/digital requirements. And this positive indicator is a valid indication of the digital progress being made in the UK’s police. They link with the different intelligence services and practices both in government and in the private sectors better than most other national police forces.

However, what also became apparent, and to the delegates apparently something they were unaware of, is that within most of the UK police force there is still a real lack of coordination and inter-force digital information sharing. 

We now live in an integrating and cross communicative society where access to social media and information has become a global activity and yet the UK police force still is situated in the old industrial age structure with 43 different forces policing most of the UK – only Scotland has an integrated police force. 

The rest of the UK has not learnt the lessons of digital integration that suggest that the management and the 43 individual police forces should not only electronically integrate, but also the higher level of management should be reduced and combined. The old Dixon of Dock Green understanding, going back to the 1950s, is often still considered to be at least partially relevant. Yet we now live in a world where information and the global criminal element means that law breaking can take place in the EU or Asia and yet the crime happens in Australia, the US or UK or all three places or of course criminals from the West attack subjects in the East. 

The lack of real understanding on a force by force level concerning digital analysis and the required training and effective outcomes have only been partially implemented into around 9 of the 43 forces and even in the nine forces the levels of understanding differ and the equipment is often not up to the required levels. 

The understanding exits within the UK police force but the need to co-ordinate and integrate the 43 forces has yet to be really engaged with as the senior police management understandable don’t want to move into the new Digital Age, co-ordinate and management-merge as they would be in fear of losing their jobs.

For more information and analysis please contact: Cyber Security Intelligence 

« False Flags: The Kremlin’s Hidden Hand
ISIS, The Pentagon & The Lone Wolf Syndrome »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.