The Future Of Policing In The Digital Age

We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and this digital revolution is not going to slow up but will increase in its revolutionary capacity.

So far, the biggest challenges have revolved around technology, laws, and cost, but still, over the past year, there has been a major push toward making this process more approachable and globally-impactful.

In the UK the police force’s use and understanding of the cyber/digital age came under scrutiny with a conference that took place at RUSI (Royal United Service Institute) in Whitehall on the 21st June.

By having such a police focused cyber meeting in the first place is a very good overall sign that the UK police want to stay on the moment and to understand their current and future cyber/digital requirements. And this positive indicator is a valid indication of the digital progress being made in the UK’s police. They link with the different intelligence services and practices both in government and in the private sectors better than most other national police forces.

However, what also became apparent, and to the delegates apparently something they were unaware of, is that within most of the UK police force there is still a real lack of coordination and inter-force digital information sharing. 

We now live in an integrating and cross communicative society where access to social media and information has become a global activity and yet the UK police force still is situated in the old industrial age structure with 43 different forces policing most of the UK – only Scotland has an integrated police force. 

The rest of the UK has not learnt the lessons of digital integration that suggest that the management and the 43 individual police forces should not only electronically integrate, but also the higher level of management should be reduced and combined. The old Dixon of Dock Green understanding, going back to the 1950s, is often still considered to be at least partially relevant. Yet we now live in a world where information and the global criminal element means that law breaking can take place in the EU or Asia and yet the crime happens in Australia, the US or UK or all three places or of course criminals from the West attack subjects in the East. 

The lack of real understanding on a force by force level concerning digital analysis and the required training and effective outcomes have only been partially implemented into around 9 of the 43 forces and even in the nine forces the levels of understanding differ and the equipment is often not up to the required levels. 

The understanding exits within the UK police force but the need to co-ordinate and integrate the 43 forces has yet to be really engaged with as the senior police management understandable don’t want to move into the new Digital Age, co-ordinate and management-merge as they would be in fear of losing their jobs.

For more information and analysis please contact: Cyber Security Intelligence 

« False Flags: The Kremlin’s Hidden Hand
ISIS, The Pentagon & The Lone Wolf Syndrome »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Cyber Eagle

Cyber Eagle

Cyber Eagle is a sovereign-grade cybersecurity firm specializing in autonomous AI-powered defense systems for critical infrastructure protection.

Deep Algorithms Solutions

Deep Algorithms Solutions

Deep Algorithms Solutions is a pioneering behavioral cybersecurity and AI startup combating sophisticated cyber fraud.