Big Data In The Service of Police

With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices, according to sociology research at The University of Texas at Austin.

The question is how adopting big data analytics both amplifies and transforms police surveillance practices, as asked by UT Austin sociologist Sarah Brayne’s research, published in the American Sociological Review.

“On one hand, I think it has the potential to reduce some problematic inequities in policing, such as the un-particularised suspicion of racial minorities,” “But I think as it’s currently implemented, there can be a few negative consequences for equality, and it can lead to a lot more marginalisation and distrust.”

Brayne interviewed and observed 75 police officers and civilian employees of the Los Angeles Police Department, a pioneer in data analytic policing, to identify key ways law enforcement has implemented in-house and privately purchased data on individuals to assess criminal risks, predict crime and surveil communities.

“This trend began in the wake of 9/11, which was viewed as this information-sharing failure in the intelligence community,” Brayne said.

“So, the feds are now giving a lot more money to local police departments in order to collect all types of new data because they’re viewed as the frontline on the war on terror.”

According to news.utexas.edu, perhaps the most transformative aspect of big data on policing is the amount of information police are able to access on individuals, both suspect and not, Brayne found.

Police have implemented dragnet surveillance tools, such as police cars equipped with license plate readers to photograph and track patterns of travel of every car in their path.

And obtaining information that previously would have required a search warrant is now easier with sourced data from private data brokers, who buy personal information from businesses with whom individuals have interacted.

Brayne also found that big data can help send real-time alerts to police about specific individuals such as where they are, based on license plate tracking, enabling law enforcement to surveil an unprecedented number of people at once.

Although technology allows police to surveil entire communities more easily, Brayne found that data is not always as objective as it suggests. In terms of individual policing, big data aims to supplement officers’ discretion with algorithm-based, quantified criminal risk assessments.

Likewise, police have implemented predictive policing strategies that pinpoint locations where crime is most likely to occur.

“I think it’s really important to emphasise that a lot of data integration and predictive algorithms are originally deployed for improving service delivery, being more efficient and reducing crime and focusing resources on people who are committing crimes,” Brayne said.

“The police are not arresting people based on pre-crime data. But big data helps building up this corpus of information on individuals that I think disproportionally benefits those in positions of social advantage and disadvantages those who are already in positions of structural disadvantage.”

I-HLS

You Might Also Read: 

US Police Real-Time Mapping Of Terrorist Attacks:

Fighting Digital Crime: Evolving Police Methods:

 

« Russia Plans To Shut Facebook For Its Election
Why Do IT Projects Often Fail? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.

Start-Up Chile (SUP)

Start-Up Chile (SUP)

Start-Up Chile is a business accelerator program created by the Chilean Government for high-potential tech entrepreneurs.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.