Big Data And Policing

In recent years, big data technology has revolutionised many domains, including the retail, healthcare and transportation sectors. However, the use of big data technology for policing has so far been limited, particularly in the UK.

This is despite the police collecting a vast amount of digital data on a daily basis and ther is a lack of research exploring the potential uses of big data analytics for UK policing.

Primary research in the form of interviews with 25 serving police officers and staff, as well as experts from the technology sector and academia, has provided new insights into the limitations of the police’s current use of data and the police’s priorities for expanding these capabilities.

The research has identified a number of fundamental limitations in the police’s current use of data. In particular the fragmentation of databases and software applications is a significant impediment to the efficiency of police forces, as police data is managed across multiple separate systems that are not mutually compatible.

Moreover, in the majority of cases, the analysis of digital data is almost entirely manual, despite software being available to automate much of this process.

In addition, police forces do not have access to advanced analytical tools to trawl and analyse unstructured data, such as images and video, and for this reason are unable to take full advantage of the UK’s wide-reaching surveillance capabilities.

Among the numerous ways in which big data technology could be applied to UK policing, four are identified as key priorities.

  • First, predictive crime mapping could be used to identify areas where crime is most likely to occur, allowing limited resources to be targeted most efficiently.
  • Second, predictive analytics could also be used to identify the risks associated with particular individuals. This includes identifying individuals who are at increased risk of reoffending, as well as those at risk of going missing or becoming the victims of crime.
  • Third, advanced analytics could enable the police to harness the full potential of data collected through visual surveillance, such as CCTV images and automatic number plate recognition (ANPR) data.
  • Fourth, big data technology could be applied to open-source data, such as that collected from social media, to gain a richer understanding of specific crime problems, which would ultimately inform the development of preventive policing strategies.

There are at present a number of practical and organisational barriers to implementing these technologies.

Most significantly, the lack of coordinated development of technology across UK policing is highly problematic for big data, which relies on effective nationwide data sharing and collaboration.

Financial cuts in recent years have also severely hindered technological development, as the majority of police IT budgets is spent supporting existing legacy systems, with little funding available to invest in new technology. Finally, there are significant legal and ethical constraints governing the police’s use of data, although these are not a main focus of this report.

These barriers are by no means insurmountable, and it is expected that, in the coming years, advances in the police’s use of technology will enable the successful development of big data policing tools.

It is imperative that such development is informed according to specifically identified requirements and priorities, and this report identifies several areas of particular interest that warrant further investigation.

Despite the budget cuts of the kind imposed since 2010, it is crucial to invest in new technology, as the costs of the initial investment will be more than recuperated by the efficiency savings made in the long term.

RUSI

You Might Also Read: 

Big Data In The Service of Police:

Using Big Data To Improve Customer Experience & Results:

 

« South Korean Banks Brace For Electro-Magnetic Pulse
Three Ways The IoT Can Drive Business Value »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

Silverse

Silverse

At Silverse, we specialize in building a comprehensive cybersecurity journey, anchored by our extensive experience, industry expertise, and an ecosystem of trusted partners.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Cyber Intell Solution (CIS)

Cyber Intell Solution (CIS)

Cyber Intell Solution provide expert consulting, specialized products, and tailored operational services to governmental and corporate industry worldwide.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

Sphinx

Sphinx

Sphinx provide advanced security consulting services and cyber solutions to federal and private industry.