UK Police Fail To Take Digital Advantage

Giving evidence to the Home Affairs Committee’s policing for the future inquiry, Hurd said technology enables the police to work in a smarter and more efficient way, but the country’s forces appear far from ready to embrace it.

“Policing is a human business, the most important assets are human, but I think the biggest opportunity in British policing lies in technology,” he told the committee. “It has changed almost every industry we know. It is changing what criminals are able to do.

“The police, with the best will in the world – and they are the first to admit it – are not where they need to be in taking advantage of the digital opportunity.”

UK police forces have been criticised for failing to take advantage of digital systems, and the use of technology across policing in general remains poor. 

Asked by one of the MPs on the committee, Douglas Ross, if he would agree that progress in both technology and in the country’s 43 police forces speaking to each other has been too slow, Hurd said there is definitely a challenge around “an historic approach to procurement, with insufficient understanding of what they were buying and insufficient collaboration and best practice in how it is bought”.

The UK’s 43 police forces mostly tend to work in silos, said Hurd, which “can’t be part of the future” if UK policing is to embrace the opportunities technology brings to transform services. However, there has been an improvement in recent years, he added.

Hurd said the police service now understands the need for change and is working towards it, despite a current system with “terrible amounts of duplication”, systems that don’t talk to each other and “evidence sent to courts on CDs”.

In 2016, the UK National Police Chiefs’ Council (NPCC) set out its vision for policing in 2025, aiming to improve data-sharing, integrate IT functions, improve digital intelligence and make digital interactions easier.

“Collectively, we are trying to drag police technology from a place that feels terribly out of date into the modern age, but there is a will to do that,” said Hurd.

“There needs to be a plan around it and evidence that the police system buys into the plan and will implement it, and then there will be a resource requirement attached to that, which we intend to take to the comprehensive spending review.”

Also giving evidence to the committee was chief inspector of constabulary Thomas Winsor, who has heavily criticised the country’s police forces for their failure to adopt technology.

In a report in April 2017, Winsor said public safety was being “imperilled” by a lack of functional and interoperable police IT. 

He told the committee that having forces talk to each other is key. “It is not a question of taking an existing system and preserving it – it is a question of taking a fragmented landscape and building it into a single system,” he said.

“What it does not do in any way, nor could it, is require the creation of a single police force. But it does require the 43 police forces and the 43 police and crime commissioners, because they hold the budget, to collaborate and create a system of perfect, affordable interoperability of all ICT systems.”

Hurd added that although there is no mandate for police forces to ensure interoperability when they buy new IT systems, they will be encouraged to do so.

He said the police inspectorate has “devised an instrument” called the Network Code, which is aimed at establishing common operating procedures and practices. Although the inspectorate has no power to require this of the police forces, Winsor said he is confident that “when the police forces see the elegance and beauty of the system that we present to them, they will be eager to sign up to it”.

Computer Weekly:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence

« Russian Military Spy Software Is On Home Routers
Threat Posed By Satellite Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.