UK Police 'Skim the Surface' of Cybercrime

maxresdefault.jpg

Police are just "skimming the surface" in their efforts to tackle cybercrime, according to Britain's most senior policeman.
He warned police faced operational challenges combating child abuse images on the Internet in the face of budget cuts and demands from other areas of policing.
"I think we're only skimming the surface," he said. "A lot of it is about stealing money and scamming, sometimes it's about stealing an idea from a business… In the Met we've created a squad of about 300 officers, and within the next year probably another 200, so 500 altogether.
"When there are hundreds of thousands of horrible images of children online and we're trying to track down all these people, it has proved a logistical problem.
"It's incredibly important but there are other important things too; terrorism and murder investigations, the pubs will turn out tonight and there will be fights; there will be armed robberies and anti-social behaviour. 
"There is less money spent on policing so there have to be hard decisions made by society and the police. It's a massive challenge but we make reasonable decisions based upon what the threat is"

On the issue of terrorism Sir Bernard warned it was "entirely possible" there would be attack in Britain in the near future.
A poll for First News revealed more than 80% of UK children are worried about a terrorist attack taking place following the attacks in Tunisia. 
"On average, we've been arresting one person a day, throughout the United Kingdom, for terrorist offences. That's a third more than in the previous year."
His answer led another reader to ask whether it was true that phone calls and emails are monitored by the police.
Sir Bernard stressed that, under the law, such monitoring can only take place if "people are either suspected of getting involved in serious crime, or someone's life is at risk".
Sir Bernard, who became Met Commissioner after the London riots four years ago, also said his force needed to become more representative of the diverse city.
"We're trying our best to get more people who look and feel like London into (the Met). I want more people from minorities to join the police," he said.

He also conceded that stops and searches on some members of the community were disproportionate and "some members of society were stopped more than others".
Although the number of stop-searches has been reduced by two-thirds over the past three years, Sir Bernard warned there may be a "targeted" increase in the practice, as the force tries to deal with rising levels of knife crime in the capital.
Sky:http://http://bit.ly/1gjrDRg

 

« Security Warning To Airlines of New Cyber Attacks
Data Scientist: The Sexiest Job of the 21st Century »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.