UK Police Fail To Take Digital Advantage

Giving evidence to the Home Affairs Committee’s policing for the future inquiry, Hurd said technology enables the police to work in a smarter and more efficient way, but the country’s forces appear far from ready to embrace it.

“Policing is a human business, the most important assets are human, but I think the biggest opportunity in British policing lies in technology,” he told the committee. “It has changed almost every industry we know. It is changing what criminals are able to do.

“The police, with the best will in the world – and they are the first to admit it – are not where they need to be in taking advantage of the digital opportunity.”

UK police forces have been criticised for failing to take advantage of digital systems, and the use of technology across policing in general remains poor. 

Asked by one of the MPs on the committee, Douglas Ross, if he would agree that progress in both technology and in the country’s 43 police forces speaking to each other has been too slow, Hurd said there is definitely a challenge around “an historic approach to procurement, with insufficient understanding of what they were buying and insufficient collaboration and best practice in how it is bought”.

The UK’s 43 police forces mostly tend to work in silos, said Hurd, which “can’t be part of the future” if UK policing is to embrace the opportunities technology brings to transform services. However, there has been an improvement in recent years, he added.

Hurd said the police service now understands the need for change and is working towards it, despite a current system with “terrible amounts of duplication”, systems that don’t talk to each other and “evidence sent to courts on CDs”.

In 2016, the UK National Police Chiefs’ Council (NPCC) set out its vision for policing in 2025, aiming to improve data-sharing, integrate IT functions, improve digital intelligence and make digital interactions easier.

“Collectively, we are trying to drag police technology from a place that feels terribly out of date into the modern age, but there is a will to do that,” said Hurd.

“There needs to be a plan around it and evidence that the police system buys into the plan and will implement it, and then there will be a resource requirement attached to that, which we intend to take to the comprehensive spending review.”

Also giving evidence to the committee was chief inspector of constabulary Thomas Winsor, who has heavily criticised the country’s police forces for their failure to adopt technology.

In a report in April 2017, Winsor said public safety was being “imperilled” by a lack of functional and interoperable police IT. 

He told the committee that having forces talk to each other is key. “It is not a question of taking an existing system and preserving it – it is a question of taking a fragmented landscape and building it into a single system,” he said.

“What it does not do in any way, nor could it, is require the creation of a single police force. But it does require the 43 police forces and the 43 police and crime commissioners, because they hold the budget, to collaborate and create a system of perfect, affordable interoperability of all ICT systems.”

Hurd added that although there is no mandate for police forces to ensure interoperability when they buy new IT systems, they will be encouraged to do so.

He said the police inspectorate has “devised an instrument” called the Network Code, which is aimed at establishing common operating procedures and practices. Although the inspectorate has no power to require this of the police forces, Winsor said he is confident that “when the police forces see the elegance and beauty of the system that we present to them, they will be eager to sign up to it”.

Computer Weekly:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence

« Russian Military Spy Software Is On Home Routers
Threat Posed By Satellite Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Kintek Group

Kintek Group

Kintek Group provides cybersecurity and managed services to protect organizations from threats that exist inside and outside their networks.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.