Big Data And Policing

In recent years, big data technology has revolutionised many domains, including the retail, healthcare and transportation sectors. However, the use of big data technology for policing has so far been limited, particularly in the UK.

This is despite the police collecting a vast amount of digital data on a daily basis and ther is a lack of research exploring the potential uses of big data analytics for UK policing.

Primary research in the form of interviews with 25 serving police officers and staff, as well as experts from the technology sector and academia, has provided new insights into the limitations of the police’s current use of data and the police’s priorities for expanding these capabilities.

The research has identified a number of fundamental limitations in the police’s current use of data. In particular the fragmentation of databases and software applications is a significant impediment to the efficiency of police forces, as police data is managed across multiple separate systems that are not mutually compatible.

Moreover, in the majority of cases, the analysis of digital data is almost entirely manual, despite software being available to automate much of this process.

In addition, police forces do not have access to advanced analytical tools to trawl and analyse unstructured data, such as images and video, and for this reason are unable to take full advantage of the UK’s wide-reaching surveillance capabilities.

Among the numerous ways in which big data technology could be applied to UK policing, four are identified as key priorities.

  • First, predictive crime mapping could be used to identify areas where crime is most likely to occur, allowing limited resources to be targeted most efficiently.
  • Second, predictive analytics could also be used to identify the risks associated with particular individuals. This includes identifying individuals who are at increased risk of reoffending, as well as those at risk of going missing or becoming the victims of crime.
  • Third, advanced analytics could enable the police to harness the full potential of data collected through visual surveillance, such as CCTV images and automatic number plate recognition (ANPR) data.
  • Fourth, big data technology could be applied to open-source data, such as that collected from social media, to gain a richer understanding of specific crime problems, which would ultimately inform the development of preventive policing strategies.

There are at present a number of practical and organisational barriers to implementing these technologies.

Most significantly, the lack of coordinated development of technology across UK policing is highly problematic for big data, which relies on effective nationwide data sharing and collaboration.

Financial cuts in recent years have also severely hindered technological development, as the majority of police IT budgets is spent supporting existing legacy systems, with little funding available to invest in new technology. Finally, there are significant legal and ethical constraints governing the police’s use of data, although these are not a main focus of this report.

These barriers are by no means insurmountable, and it is expected that, in the coming years, advances in the police’s use of technology will enable the successful development of big data policing tools.

It is imperative that such development is informed according to specifically identified requirements and priorities, and this report identifies several areas of particular interest that warrant further investigation.

Despite the budget cuts of the kind imposed since 2010, it is crucial to invest in new technology, as the costs of the initial investment will be more than recuperated by the efficiency savings made in the long term.

RUSI

You Might Also Read: 

Big Data In The Service of Police:

Using Big Data To Improve Customer Experience & Results:

 

« South Korean Banks Brace For Electro-Magnetic Pulse
Three Ways The IoT Can Drive Business Value »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

Veriato

Veriato

Veriato develops intelligent solutions that provide companies with visibility into the human behaviors and activities occurring within their network, making them more secure and productive.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.