Feeds

Police confirm cybercrime budget cut

Hello, hello, goodbye

Protecting users from Firesheep and other Sidejacking attacks with SSL

The Metropolitan Police have confirmed their budget for battling cybercrime nationally has been slashed by the Home Office.

The Register revealed on Friday that central government funding for the Police Central eCrime Unit (PCeU) had been quietly cut by 30 per cent.

A spokeswoman for the Met said the PCeU had been targeted as part of the coalition government's initial £6bn batch of cuts, announced on 24 May.

"It has been confirmed that the Police Central e-crime Unit (PCeU) will not receive the planned £1m uplift in funding from the Home Office next year," she said.

According to original spending plans, the PCeU was due to receive £3.5m from the Home Office next year.

"Funding will remain at the same level as for 2009/10," said the Met.

Along with other senior officers, Janet Williams, the Met deputy assistant commissioner in charge of PCeU and national cybercrime policing policy through ACPO, argued that the unit was underfunded when it was set up and called for expansion. The deep cut less than two years into its operations means it will not reach even its originally planned capability.

"The planned uplift in funding was to improve our ACPO national mainstream law enforcement capability, as well as providing essential training and crucial IT infrastructure within the PCeU," said the Met's spokeswoman.

"Without this additional funding the growth of our capability will be restricted, however we remain committed to our existing work in this area at current funding levels."

The Met will also divert some of its own funds to the unit to make up some - but nowhere near all - of the shortfall.

Cuts are expected across policing following the Budget next week, but the fact that the fight against the multibillion-pound cybercrime industry was sacrificed to the very first swing of the axe will be interpreted to mean that despite successes - and pre-election rhetoric - the issue is still viewed as a low priority in Whitehall. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.