The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. A new Report, Data-Driven Policing and Public Value, by The Police Foundation explains how the UK police are operating under considerable stress with reduced budgets, changing crime and a lack of new policing skills.

Direct funding from UK central government has reduced by over 30% in the last decade yet the pressure on policing has significantly intensified in the same period. 

There has been a shift towards dealing with complex areas
of crime such as domestic violence and child sexual exploitation and abuse, which require a different skill set and are more resource intensive to investigate. We have seen a rise in demand for the police to respond to non-crime incidents such as mental health crises and missing persons. 

A huge amount of crime is also either moving online
or is being cyber-enabled. Around half of all crime affecting individual victims in England and Wales is now cybercrime or fraud, much of which is now cyber- enabled. 
The Internet has created new types of computer misuse which has allowed criminals new ways to find targets for fraud to sexual abuse.

The Report explains how new technologies are affecting policing such as the Internet of Things, Blockchain, 5G networks and the growing use by criminals of encryption. The future trends suggest that by 2020 over 30 billion devices and that by 2025 this could rise to over 75 Billion allowing criminals a massive area of potential attack. Hacker can steal people’s data and get to their money and take control of Internet devices.

The Report focuses on suggestions and ideas to make future policing more data and IT driven everything from body worn cameras to uses of data analytics. 

All this requires more training and money for policing’s future but the effects would be a far more effective police force for the future changes to the digital environment. 

The Report can be read at: Police Foundation

You Might Also Read:

AI Tools Can Help Police Fight Crime:

 

« Identity Management Fundamentals
British Politicians Need To Better Understand Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.