Can AI Be Used To Fight Crime?

Companies and law enforcement around the globe are experimenting with the use of artificial intelligence (AI) to predict, prevent, and detect crime. The idea behind using AI to fight crime is based on the idea that many types of crime are predictable, it just requires sorting through massive amounts of data to detect a pattern.  By Bill Hess.

The use of artificial intelligence hasn’t quite reached the point where a computer will provide a daily list of the exact time and locations of crimes that will take place during the next 24 hours. However, AI can offer substantial insight into reducing and preventing crime.

Detecting Crime
In recent years, technology has been developed by multiple firms allowing police departments to place both microphones and camera in areas around their city to identify crimes in progress.

ShotSpotter
ShotSpotter uses acoustic sensors and cameras located in specific sites around a city to detect the location of gunfire events. The system, which is currently in use in over 90 cities in the United States and one South African city, can alert authorities in real-time about the types of gunfire and the location, often within 10 feet of the shooting location. 

Multiple microphones pick up the sound of gunfire, and the system’s machine learning algorithm triangulates the location of the shot(s) by comparing various bits of data, such as when each sensor detected the shot, the noise level of the shot, and whether an echo was heard.

The system then displays a red circle on a map where the shot was detected, the time of the shot(s), and the number of shots fired. Location coordinates and other pertinent information can be sent to officers. Users can also view video footage from cameras that might be pointed in the direction of the shooting.

Hikvision
Chinese security camera maker Hikvision has created surveillance cameras that use an onboard chip to run deep neural networks right on the camera. This allows scanning for license plate numbers, running facial recognition software to scan for missing persons or criminals, and also the detection of suspicious packages or unattended bags in public areas.

The Hikvision system is currently in use in London in both Hammersmith and Fulham Burroughs. A 2013 case study by the company claims the system has been able to detect and warn police of an estimated 80% of possible threats. The company also claims there was a 65% drop in crime following an installation in Sea Point, South Africa. 

Predicting Crimes
Artificial intelligence is being used to attempt to predict crimes before they happen. While this use of artificial intelligence will need to be carefully monitored to prevent issues like racial profiling, the possibilities for the technology are significant.

Cloud Walk Technology
Cloud Walk Technology is working to predict if an individual will commit a crime before it takes place. The Chinese facial recognition company is using facial recognition and gait analysis to detect unusual movements or suspicious changes in an individual’s actions. For example, a person who is walking back and forth in a particular area may be casing the area for a future burglary or other property-related crime.

Currently, Cloud Walk is working on the technology but hasn’t installed the system in any cities or other areas.

Predpol
Technology developed by big-data firm Predpol attempts to predict the time and location of crimes by analyzing data from past crimes. The system is currently in use in Los Angeles and other U.S. cities.

The firm’s algorithm is based on the belief that certain types of crimes tend to centralize in certain times and areas. For example, in a single area with multiple burglaries in the past, it could be forecasted that more break-ins could take place in the surrounding areas. 

The system can display possible hotspots on a map, which would indicate to police heavier patrols might be justified in that area. Tacoma, Washington saw a 22% drop in residential burglaries in the two years following the adoption of the Predpol system. 

Searching for Missing Children
Well-known chip maker Intel has furnished the National Center for Missing and Exploited Children (NCMEC), with technology specifically designed to help find missing children.

Intel scientists have worked to modernize the organization’s infrastructure to help it to sort through the over 8.2 million tips that have come into the agency via text, email, phone, and other ways. 

The system uses AI to organize and prioritize tips and other information and to display connections between faces, or to flag images submitted to the organization. The system debuted in mid-2017, so, unfortunately, statistics on what type of results the new system have yielded are not available.

In Closing
As you can see, while Artificial intelligence isn’t quite advanced enough to tell police the exact place and time that a crime will take place, AI is sophisticated enough to offer law enforcement the tools it can use to solve previous crimes while also aiding in the prevention of crimes yet to take place.

Bill Hess is founder of Pixel Privacy.

Whether it be one of our in-depth guides or our expertly crafted “how-to” articles, Pixel Privacy can show you how to stay safe online. We believe everyone has the power to keep their data secure, no matter what your level of tech expertise is and our site will show you how. 

« Companies Are Dropping The Term ‘Blockchain’ Due To Hype
Why The Public Directory Of Domain Names Is About To Vanish »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.