Big Data In The Service of Police

With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices, according to sociology research at The University of Texas at Austin.

The question is how adopting big data analytics both amplifies and transforms police surveillance practices, as asked by UT Austin sociologist Sarah Brayne’s research, published in the American Sociological Review.

“On one hand, I think it has the potential to reduce some problematic inequities in policing, such as the un-particularised suspicion of racial minorities,” “But I think as it’s currently implemented, there can be a few negative consequences for equality, and it can lead to a lot more marginalisation and distrust.”

Brayne interviewed and observed 75 police officers and civilian employees of the Los Angeles Police Department, a pioneer in data analytic policing, to identify key ways law enforcement has implemented in-house and privately purchased data on individuals to assess criminal risks, predict crime and surveil communities.

“This trend began in the wake of 9/11, which was viewed as this information-sharing failure in the intelligence community,” Brayne said.

“So, the feds are now giving a lot more money to local police departments in order to collect all types of new data because they’re viewed as the frontline on the war on terror.”

According to news.utexas.edu, perhaps the most transformative aspect of big data on policing is the amount of information police are able to access on individuals, both suspect and not, Brayne found.

Police have implemented dragnet surveillance tools, such as police cars equipped with license plate readers to photograph and track patterns of travel of every car in their path.

And obtaining information that previously would have required a search warrant is now easier with sourced data from private data brokers, who buy personal information from businesses with whom individuals have interacted.

Brayne also found that big data can help send real-time alerts to police about specific individuals such as where they are, based on license plate tracking, enabling law enforcement to surveil an unprecedented number of people at once.

Although technology allows police to surveil entire communities more easily, Brayne found that data is not always as objective as it suggests. In terms of individual policing, big data aims to supplement officers’ discretion with algorithm-based, quantified criminal risk assessments.

Likewise, police have implemented predictive policing strategies that pinpoint locations where crime is most likely to occur.

“I think it’s really important to emphasise that a lot of data integration and predictive algorithms are originally deployed for improving service delivery, being more efficient and reducing crime and focusing resources on people who are committing crimes,” Brayne said.

“The police are not arresting people based on pre-crime data. But big data helps building up this corpus of information on individuals that I think disproportionally benefits those in positions of social advantage and disadvantages those who are already in positions of structural disadvantage.”

I-HLS

You Might Also Read: 

US Police Real-Time Mapping Of Terrorist Attacks:

Fighting Digital Crime: Evolving Police Methods:

 

« Russia Plans To Shut Facebook For Its Election
Why Do IT Projects Often Fail? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

TerraEagle

TerraEagle

Terraeagle is a boutique cyber security services company providing tailor-made solutions. Our core competency is in SOCaaS, MDRaaS & and Incident Response Retainer Services.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.