The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. A new Report, Data-Driven Policing and Public Value, by The Police Foundation explains how the UK police are operating under considerable stress with reduced budgets, changing crime and a lack of new policing skills.

Direct funding from UK central government has reduced by over 30% in the last decade yet the pressure on policing has significantly intensified in the same period. 

There has been a shift towards dealing with complex areas
of crime such as domestic violence and child sexual exploitation and abuse, which require a different skill set and are more resource intensive to investigate. We have seen a rise in demand for the police to respond to non-crime incidents such as mental health crises and missing persons. 

A huge amount of crime is also either moving online
or is being cyber-enabled. Around half of all crime affecting individual victims in England and Wales is now cybercrime or fraud, much of which is now cyber- enabled. 
The Internet has created new types of computer misuse which has allowed criminals new ways to find targets for fraud to sexual abuse.

The Report explains how new technologies are affecting policing such as the Internet of Things, Blockchain, 5G networks and the growing use by criminals of encryption. The future trends suggest that by 2020 over 30 billion devices and that by 2025 this could rise to over 75 Billion allowing criminals a massive area of potential attack. Hacker can steal people’s data and get to their money and take control of Internet devices.

The Report focuses on suggestions and ideas to make future policing more data and IT driven everything from body worn cameras to uses of data analytics. 

All this requires more training and money for policing’s future but the effects would be a far more effective police force for the future changes to the digital environment. 

The Report can be read at: Police Foundation

You Might Also Read:

AI Tools Can Help Police Fight Crime:

 

« Identity Management Fundamentals
British Politicians Need To Better Understand Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.