The UK Needs Data Driven Policing

Electronic social change is putting significant pressure on policing. A new Report, Data-Driven Policing and Public Value, by The Police Foundation explains how the UK police are operating under considerable stress with reduced budgets, changing crime and a lack of new policing skills.

Direct funding from UK central government has reduced by over 30% in the last decade yet the pressure on policing has significantly intensified in the same period. 

There has been a shift towards dealing with complex areas
of crime such as domestic violence and child sexual exploitation and abuse, which require a different skill set and are more resource intensive to investigate. We have seen a rise in demand for the police to respond to non-crime incidents such as mental health crises and missing persons. 

A huge amount of crime is also either moving online
or is being cyber-enabled. Around half of all crime affecting individual victims in England and Wales is now cybercrime or fraud, much of which is now cyber- enabled. 
The Internet has created new types of computer misuse which has allowed criminals new ways to find targets for fraud to sexual abuse.

The Report explains how new technologies are affecting policing such as the Internet of Things, Blockchain, 5G networks and the growing use by criminals of encryption. The future trends suggest that by 2020 over 30 billion devices and that by 2025 this could rise to over 75 Billion allowing criminals a massive area of potential attack. Hacker can steal people’s data and get to their money and take control of Internet devices.

The Report focuses on suggestions and ideas to make future policing more data and IT driven everything from body worn cameras to uses of data analytics. 

All this requires more training and money for policing’s future but the effects would be a far more effective police force for the future changes to the digital environment. 

The Report can be read at: Police Foundation

You Might Also Read:

AI Tools Can Help Police Fight Crime:

 

« Identity Management Fundamentals
British Politicians Need To Better Understand Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.