UK Police Fail To Take Digital Advantage

Giving evidence to the Home Affairs Committee’s policing for the future inquiry, Hurd said technology enables the police to work in a smarter and more efficient way, but the country’s forces appear far from ready to embrace it.

“Policing is a human business, the most important assets are human, but I think the biggest opportunity in British policing lies in technology,” he told the committee. “It has changed almost every industry we know. It is changing what criminals are able to do.

“The police, with the best will in the world – and they are the first to admit it – are not where they need to be in taking advantage of the digital opportunity.”

UK police forces have been criticised for failing to take advantage of digital systems, and the use of technology across policing in general remains poor. 

Asked by one of the MPs on the committee, Douglas Ross, if he would agree that progress in both technology and in the country’s 43 police forces speaking to each other has been too slow, Hurd said there is definitely a challenge around “an historic approach to procurement, with insufficient understanding of what they were buying and insufficient collaboration and best practice in how it is bought”.

The UK’s 43 police forces mostly tend to work in silos, said Hurd, which “can’t be part of the future” if UK policing is to embrace the opportunities technology brings to transform services. However, there has been an improvement in recent years, he added.

Hurd said the police service now understands the need for change and is working towards it, despite a current system with “terrible amounts of duplication”, systems that don’t talk to each other and “evidence sent to courts on CDs”.

In 2016, the UK National Police Chiefs’ Council (NPCC) set out its vision for policing in 2025, aiming to improve data-sharing, integrate IT functions, improve digital intelligence and make digital interactions easier.

“Collectively, we are trying to drag police technology from a place that feels terribly out of date into the modern age, but there is a will to do that,” said Hurd.

“There needs to be a plan around it and evidence that the police system buys into the plan and will implement it, and then there will be a resource requirement attached to that, which we intend to take to the comprehensive spending review.”

Also giving evidence to the committee was chief inspector of constabulary Thomas Winsor, who has heavily criticised the country’s police forces for their failure to adopt technology.

In a report in April 2017, Winsor said public safety was being “imperilled” by a lack of functional and interoperable police IT. 

He told the committee that having forces talk to each other is key. “It is not a question of taking an existing system and preserving it – it is a question of taking a fragmented landscape and building it into a single system,” he said.

“What it does not do in any way, nor could it, is require the creation of a single police force. But it does require the 43 police forces and the 43 police and crime commissioners, because they hold the budget, to collaborate and create a system of perfect, affordable interoperability of all ICT systems.”

Hurd added that although there is no mandate for police forces to ensure interoperability when they buy new IT systems, they will be encouraged to do so.

He said the police inspectorate has “devised an instrument” called the Network Code, which is aimed at establishing common operating procedures and practices. Although the inspectorate has no power to require this of the police forces, Winsor said he is confident that “when the police forces see the elegance and beauty of the system that we present to them, they will be eager to sign up to it”.

Computer Weekly:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence

« Russian Military Spy Software Is On Home Routers
Threat Posed By Satellite Systems »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.