UK Police 'Skim the Surface' of Cybercrime

maxresdefault.jpg

Police are just "skimming the surface" in their efforts to tackle cybercrime, according to Britain's most senior policeman.
He warned police faced operational challenges combating child abuse images on the Internet in the face of budget cuts and demands from other areas of policing.
"I think we're only skimming the surface," he said. "A lot of it is about stealing money and scamming, sometimes it's about stealing an idea from a business… In the Met we've created a squad of about 300 officers, and within the next year probably another 200, so 500 altogether.
"When there are hundreds of thousands of horrible images of children online and we're trying to track down all these people, it has proved a logistical problem.
"It's incredibly important but there are other important things too; terrorism and murder investigations, the pubs will turn out tonight and there will be fights; there will be armed robberies and anti-social behaviour. 
"There is less money spent on policing so there have to be hard decisions made by society and the police. It's a massive challenge but we make reasonable decisions based upon what the threat is"

On the issue of terrorism Sir Bernard warned it was "entirely possible" there would be attack in Britain in the near future.
A poll for First News revealed more than 80% of UK children are worried about a terrorist attack taking place following the attacks in Tunisia. 
"On average, we've been arresting one person a day, throughout the United Kingdom, for terrorist offences. That's a third more than in the previous year."
His answer led another reader to ask whether it was true that phone calls and emails are monitored by the police.
Sir Bernard stressed that, under the law, such monitoring can only take place if "people are either suspected of getting involved in serious crime, or someone's life is at risk".
Sir Bernard, who became Met Commissioner after the London riots four years ago, also said his force needed to become more representative of the diverse city.
"We're trying our best to get more people who look and feel like London into (the Met). I want more people from minorities to join the police," he said.

He also conceded that stops and searches on some members of the community were disproportionate and "some members of society were stopped more than others".
Although the number of stop-searches has been reduced by two-thirds over the past three years, Sir Bernard warned there may be a "targeted" increase in the practice, as the force tries to deal with rising levels of knife crime in the capital.
Sky:http://http://bit.ly/1gjrDRg

 

« Security Warning To Airlines of New Cyber Attacks
Data Scientist: The Sexiest Job of the 21st Century »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.