UK Police Give Cybercrime Warning

Thousands of cyber-crime victims could face delays in police support as resources come under pressure. Criminals are plotting how to "hijack" vulnerable Internet-enabled devices such as home security cameras or televisions and more crime needs digital forensic analysis.

This is affecting police forces but, in particular Northern Ireland Police, will be reviewed here, as they are an example to all. The Police Service of Northern Ireland (PSNI) has warned its operation responding to the growth in online wrongdoing could be limited by the financial climate ahead, with civil servants planning for widespread cuts.

David Crozier, from Queen's University's Centre for Secure Information Technologies (CSIT) in Belfast, said: "If their cyber-crime budget is cut they don't have the resource to go out and carry out that digital forensics work and you get this back-up of work.

"Bags and bags of hard drives or whatever sitting on shelves waiting to be analysed to help detect who carried out a particular crime."

Although a sizeable chunk of the PSNI's budget is protected, civil servants have outlined scenarios based on real-term cuts to parts of Stormont's operations running public services, worth 0.9% next year and 2.3% in 2019/20. For police that could mean "less capacity" to address serious and organised crime, to provide local neighbourhood policing or to respond to the growth in child sexual exploitation and cyber-crime. 

Mr Crozier is head of strategic partnerships at a major research hub into cyber security based in Belfast's Titanic Quarter.
He said: "The problem with cyber-crime is it is really easy to scale up the amount of activity. 

"You might have maybe tens of victims of an ordinary criminal but with cyber-crime it is so easy to target many thousands of individuals, or millions of individuals, that actually the scale or the number of victims is significant and that is why it is such an expensive crime to police and detect and gather evidence. 
"Where you then get the digital forensics which might show there are potentially 20,000 victims here, any cut in the budget at all means that there are potentially thousands of victims that are not having police resources there to help them."

The PSNI said: "The Department of Finance has laid out three scenarios as part of a budget preparation exercise.
"PSNI has been asked to scenario plan a range of cuts, what these would mean to the organisation whilst always keeping the community at the heart of our decision-making, doing our best to protect the front line, and keeping people safe. "This work is ongoing and will continue until an agreed budget is in place."

Belfast Telegraph

You Might Also Read: 

British Police Lose Phone & Web Search Powers:

British Police’s First Cyber Dogs:

 

 

« British Police Continue A Secret Snowden Investigation
Russia's Experimental Hybrid War With Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Barracuda Networks

Barracuda Networks

Barracuda provides a range of solutions covering network security, data storage, protection and disaster recovery.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.