Big Data In The Service of Police

With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices, according to sociology research at The University of Texas at Austin.

The question is how adopting big data analytics both amplifies and transforms police surveillance practices, as asked by UT Austin sociologist Sarah Brayne’s research, published in the American Sociological Review.

“On one hand, I think it has the potential to reduce some problematic inequities in policing, such as the un-particularised suspicion of racial minorities,” “But I think as it’s currently implemented, there can be a few negative consequences for equality, and it can lead to a lot more marginalisation and distrust.”

Brayne interviewed and observed 75 police officers and civilian employees of the Los Angeles Police Department, a pioneer in data analytic policing, to identify key ways law enforcement has implemented in-house and privately purchased data on individuals to assess criminal risks, predict crime and surveil communities.

“This trend began in the wake of 9/11, which was viewed as this information-sharing failure in the intelligence community,” Brayne said.

“So, the feds are now giving a lot more money to local police departments in order to collect all types of new data because they’re viewed as the frontline on the war on terror.”

According to news.utexas.edu, perhaps the most transformative aspect of big data on policing is the amount of information police are able to access on individuals, both suspect and not, Brayne found.

Police have implemented dragnet surveillance tools, such as police cars equipped with license plate readers to photograph and track patterns of travel of every car in their path.

And obtaining information that previously would have required a search warrant is now easier with sourced data from private data brokers, who buy personal information from businesses with whom individuals have interacted.

Brayne also found that big data can help send real-time alerts to police about specific individuals such as where they are, based on license plate tracking, enabling law enforcement to surveil an unprecedented number of people at once.

Although technology allows police to surveil entire communities more easily, Brayne found that data is not always as objective as it suggests. In terms of individual policing, big data aims to supplement officers’ discretion with algorithm-based, quantified criminal risk assessments.

Likewise, police have implemented predictive policing strategies that pinpoint locations where crime is most likely to occur.

“I think it’s really important to emphasise that a lot of data integration and predictive algorithms are originally deployed for improving service delivery, being more efficient and reducing crime and focusing resources on people who are committing crimes,” Brayne said.

“The police are not arresting people based on pre-crime data. But big data helps building up this corpus of information on individuals that I think disproportionally benefits those in positions of social advantage and disadvantages those who are already in positions of structural disadvantage.”

I-HLS

You Might Also Read: 

US Police Real-Time Mapping Of Terrorist Attacks:

Fighting Digital Crime: Evolving Police Methods:

 

« Russia Plans To Shut Facebook For Its Election
Why Do IT Projects Often Fail? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.