UK Police Fail To Take Digital Advantage

Giving evidence to the Home Affairs Committee’s policing for the future inquiry, Hurd said technology enables the police to work in a smarter and more efficient way, but the country’s forces appear far from ready to embrace it.

“Policing is a human business, the most important assets are human, but I think the biggest opportunity in British policing lies in technology,” he told the committee. “It has changed almost every industry we know. It is changing what criminals are able to do.

“The police, with the best will in the world – and they are the first to admit it – are not where they need to be in taking advantage of the digital opportunity.”

UK police forces have been criticised for failing to take advantage of digital systems, and the use of technology across policing in general remains poor. 

Asked by one of the MPs on the committee, Douglas Ross, if he would agree that progress in both technology and in the country’s 43 police forces speaking to each other has been too slow, Hurd said there is definitely a challenge around “an historic approach to procurement, with insufficient understanding of what they were buying and insufficient collaboration and best practice in how it is bought”.

The UK’s 43 police forces mostly tend to work in silos, said Hurd, which “can’t be part of the future” if UK policing is to embrace the opportunities technology brings to transform services. However, there has been an improvement in recent years, he added.

Hurd said the police service now understands the need for change and is working towards it, despite a current system with “terrible amounts of duplication”, systems that don’t talk to each other and “evidence sent to courts on CDs”.

In 2016, the UK National Police Chiefs’ Council (NPCC) set out its vision for policing in 2025, aiming to improve data-sharing, integrate IT functions, improve digital intelligence and make digital interactions easier.

“Collectively, we are trying to drag police technology from a place that feels terribly out of date into the modern age, but there is a will to do that,” said Hurd.

“There needs to be a plan around it and evidence that the police system buys into the plan and will implement it, and then there will be a resource requirement attached to that, which we intend to take to the comprehensive spending review.”

Also giving evidence to the committee was chief inspector of constabulary Thomas Winsor, who has heavily criticised the country’s police forces for their failure to adopt technology.

In a report in April 2017, Winsor said public safety was being “imperilled” by a lack of functional and interoperable police IT. 

He told the committee that having forces talk to each other is key. “It is not a question of taking an existing system and preserving it – it is a question of taking a fragmented landscape and building it into a single system,” he said.

“What it does not do in any way, nor could it, is require the creation of a single police force. But it does require the 43 police forces and the 43 police and crime commissioners, because they hold the budget, to collaborate and create a system of perfect, affordable interoperability of all ICT systems.”

Hurd added that although there is no mandate for police forces to ensure interoperability when they buy new IT systems, they will be encouraged to do so.

He said the police inspectorate has “devised an instrument” called the Network Code, which is aimed at establishing common operating procedures and practices. Although the inspectorate has no power to require this of the police forces, Winsor said he is confident that “when the police forces see the elegance and beauty of the system that we present to them, they will be eager to sign up to it”.

Computer Weekly:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence

« Russian Military Spy Software Is On Home Routers
Threat Posed By Satellite Systems »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.