Low-tech Coppers in the UK

British police are looking rather blue these days. Their budget may be cut by as much as 25-40%. Crime as reported by the UK government has until recently been claimed to have fallen, although new National Statistics Crime reporting shows an increase and likewise officers’ workload has increased. 

According to the Metropolitan Police some four-fifths of calls that they take are not to do with crime but require close attention even so. And those offences that have increased in frequency, such as domestic violence, need particularly careful handling. But whereas many forces around the world make better use of technology, the Britain police lag a way behind.
One problem is that police computers are so out of date. Each year the police waste £221m ($342m) because they cannot access systems and records once they step outside the station, according to a study by the Centre for Economic and Business Research, a think-tank. 

A review of London’s Metropolitan Police described a mishmash of 750 computer systems, “wired together over the last 40 years”. One core operating process, it found, was based on “a 1970s baggage handling system”. Police could get better deals on new technology as well. In September Theresa May, the home secretary, said that savings from better procurement methods might be worth as much as £75m a year.

There is an even bigger hitch, says Tim Newburn of the London School of Economics: that the 43 forces of England and Wales are bad at sharing data with each other. It has been 12 years since an inquiry into the murder of two schoolgirls recommended that the forces improve their co-operation, but since then most have barely begun to do so.
Between 2007 and 2009 Surrey police found that they could not get hold of Metropolitan Police intelligence, which damaged an investigation into sexual abuse by Jimmy Savile, a television personality. Reports in February suggested that Welsh police had failed to catch a triple-murderer because his criminal record was held by another force. America does better, says Martin Innes at Cardiff University, probably because it has to: the country has many small police forces that have needed to learn to share information.

Britain has also been slow to take up new software that crunches crime data in order to predict where offences might happen. These are designed to save police time and money, as patrols can be targeted more precisely. Some are fairly old: one piece of software that narrows down suspects by spotting patterns in criminal activity was first developed in 1997. LexisNexis, the company that owns it, says areas where it has been tried out have seen a 46% reduction in crime. Nearly 500 police districts in America are now using it.

Even when Britain’s police forces use these tools, they do not use them well. In 2013 Kent started using crime-prediction software from an American company called Predpol. The company’s website boasts that between 2013 and 2014 crime went down by around 10% in two precincts in Atlanta which were using Predpol technology, but went up or stayed flat in four precincts that were not. 

Yet in 2013-14 crime in Kent went up by 11%. The trouble, according to the chief constable, was that the police were not going where Predpol told them to go. Lawrence Sherman, at Cambridge University, says that police forces could be using GPS to check that officers are going to the right areas. 

There are some signs of change. South Yorkshire and Humberside police, along with Cambridgeshire Constabulary, are making their technology more mobile. Each force now expects that this will save its officers around a quarter of a million hours a year. The College of Policing recently trained 5,000 officers in retrieving intelligence from digital sources. Better late than never.
Economist: http://econ.st/1jKfiXv

« How the Threat Landscape Will Change By 2020
State-sponsored Cyberspies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Valeo Nertworks

Valeo Nertworks

Valeo Nertworks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.