Big Data In The Service of Police

With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices, according to sociology research at The University of Texas at Austin.

The question is how adopting big data analytics both amplifies and transforms police surveillance practices, as asked by UT Austin sociologist Sarah Brayne’s research, published in the American Sociological Review.

“On one hand, I think it has the potential to reduce some problematic inequities in policing, such as the un-particularised suspicion of racial minorities,” “But I think as it’s currently implemented, there can be a few negative consequences for equality, and it can lead to a lot more marginalisation and distrust.”

Brayne interviewed and observed 75 police officers and civilian employees of the Los Angeles Police Department, a pioneer in data analytic policing, to identify key ways law enforcement has implemented in-house and privately purchased data on individuals to assess criminal risks, predict crime and surveil communities.

“This trend began in the wake of 9/11, which was viewed as this information-sharing failure in the intelligence community,” Brayne said.

“So, the feds are now giving a lot more money to local police departments in order to collect all types of new data because they’re viewed as the frontline on the war on terror.”

According to news.utexas.edu, perhaps the most transformative aspect of big data on policing is the amount of information police are able to access on individuals, both suspect and not, Brayne found.

Police have implemented dragnet surveillance tools, such as police cars equipped with license plate readers to photograph and track patterns of travel of every car in their path.

And obtaining information that previously would have required a search warrant is now easier with sourced data from private data brokers, who buy personal information from businesses with whom individuals have interacted.

Brayne also found that big data can help send real-time alerts to police about specific individuals such as where they are, based on license plate tracking, enabling law enforcement to surveil an unprecedented number of people at once.

Although technology allows police to surveil entire communities more easily, Brayne found that data is not always as objective as it suggests. In terms of individual policing, big data aims to supplement officers’ discretion with algorithm-based, quantified criminal risk assessments.

Likewise, police have implemented predictive policing strategies that pinpoint locations where crime is most likely to occur.

“I think it’s really important to emphasise that a lot of data integration and predictive algorithms are originally deployed for improving service delivery, being more efficient and reducing crime and focusing resources on people who are committing crimes,” Brayne said.

“The police are not arresting people based on pre-crime data. But big data helps building up this corpus of information on individuals that I think disproportionally benefits those in positions of social advantage and disadvantages those who are already in positions of structural disadvantage.”

I-HLS

You Might Also Read: 

US Police Real-Time Mapping Of Terrorist Attacks:

Fighting Digital Crime: Evolving Police Methods:

 

« Russia Plans To Shut Facebook For Its Election
Why Do IT Projects Often Fail? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.