The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and this digital revolution is not going to slow up but will increase in its revolutionary capacity.

So far, the biggest challenges have revolved around technology, laws, and cost, but still, over the past year, there has been a major push toward making this process more approachable and globally-impactful.

In the UK the police force’s use and understanding of the cyber/digital age came under scrutiny with a conference that took place at RUSI (Royal United Service Institute) in Whitehall on the 21st June.

By having such a police focused cyber meeting in the first place is a very good overall sign that the UK police want to stay on the moment and to understand their current and future cyber/digital requirements. And this positive indicator is a valid indication of the digital progress being made in the UK’s police. They link with the different intelligence services and practices both in government and in the private sectors better than most other national police forces.

However, what also became apparent, and to the delegates apparently something they were unaware of, is that within most of the UK police force there is still a real lack of coordination and inter-force digital information sharing. 

We now live in an integrating and cross communicative society where access to social media and information has become a global activity and yet the UK police force still is situated in the old industrial age structure with 43 different forces policing most of the UK – only Scotland has an integrated police force. 

The rest of the UK has not learnt the lessons of digital integration that suggest that the management and the 43 individual police forces should not only electronically integrate, but also the higher level of management should be reduced and combined. The old Dixon of Dock Green understanding, going back to the 1950s, is often still considered to be at least partially relevant. Yet we now live in a world where information and the global criminal element means that law breaking can take place in the EU or Asia and yet the crime happens in Australia, the US or UK or all three places or of course criminals from the West attack subjects in the East. 

The lack of real understanding on a force by force level concerning digital analysis and the required training and effective outcomes have only been partially implemented into around 9 of the 43 forces and even in the nine forces the levels of understanding differ and the equipment is often not up to the required levels. 

The understanding exits within the UK police force but the need to co-ordinate and integrate the 43 forces has yet to be really engaged with as the senior police management understandable don’t want to move into the new Digital Age, co-ordinate and management-merge as they would be in fear of losing their jobs.

For more information and analysis please contact: Cyber Security Intelligence 

« False Flags: The Kremlin’s Hidden Hand
ISIS, The Pentagon & The Lone Wolf Syndrome »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.