Is Predictive Policing The Future?

As big data transforms industries ranging from retailing to health care, it’s also becoming a more important tool for police departments, which are turning to data and analysis in an effort to boost their effectiveness.

Known as predictive policing, the practice involves analyzing data on the time, location and nature of past crimes, along with things such as geography and the weather, to gain insight into where and when future crime is most likely to occur and try to deter it before it happens.

Jennifer Bachner, director of the master of science in government analytics program at Johns Hopkins University, says giving police the ability to make data-driven decisions will help reduce biases that result in unfair discrimination, resulting in better relations between police and the communities they serve. Jennifer Lynch, senior staff attorney at the Electronic Frontier Foundation, says predictive policing is flawed and will only serve to focus more law-enforcement surveillance on communities that are already over-policed.

In an era of tight budgets, police departments across the country are being asked to do more with less. They must protect the public, but often have to do it with limited personnel, equipment and training resources.

To address this problem, law-enforcement agencies increasingly are turning to data and analytics to improve their ability to fight crime without substantial increases in operating costs. Known as predictive policing, these technologies and techniques empower police officers to take a more proactive approach to both preventing crime and solving open cases.

Predictive policing involves crunching data on past crimes, along with information such as the weather, the time of day and the presence of escape routes, to forecast where and when future crime is most likely to occur. In cities such as Santa Cruz, Calif., officers have access to maps outlining “hot spots,” or geographic areas most vulnerable to crime at a future point in time, and they are encouraged to use the information along with their knowledge of the community to decide where to allocate the most resources on a given shift.

The theory isn’t complicated—being in the right place at the right time deters crime, and the approach has proved effective, particularly in places such as Santa Cruz, where the population is dispersed over a large area.

Some in law enforcement say predictive policing is particularly helpful when it comes to identifying and halting repeat criminals.

The Baltimore County Police Department says it used predictive methods to halt a string of convenience-store robberies. Police had information about the locations of the robberies and a suspected model of car used by the elusive offender, but no obvious next target. By plotting the robbed locations on a map and employing an iterative algorithm, police identified a suspected point of origin. 

Police then analyzed the streets that would likely have been used to reach the crime locations and detected one specific street that the offender had likely used frequently (and would probably use again) to travel to crime scenes. Officers staked out that street, rather than patrolling numerous convenience stores, and were able to apprehend the suspect.

Some critics say that because not all crime is reported, predictive models based on past crime data might miss future crimes that don’t fit historical patterns. But today’s predictive models aren’t based solely on past crime data—they also take into account some of the same things potential criminals do when planning crimes, such as geographic information.

To achieve positive results with predictive policing, some upfront costs are required: Law-enforcement agencies must make an initial investment not only in software, but also in training officers to understand the proper scope and limitations of data-driven policing.

The use of data, like the use of any tool, leaves openings for misuse, but police departments can take steps to protect civil liberties. There is a big difference, for example, between predicting where crime is most likely to occur and developing lists of potential future offenders without probable cause, a practice that certainly raises serious ethical and legal concerns.

Policy makers also must grapple with the proper scope of data collection, retention and use and be able to explain to the community how data is being used to enhance public safety. That is why departments that adopt predictive-policing programs must at the same time re-emphasize their commitment to community policing. Officers won’t achieve substantial reductions in crime by holing up in patrol cars, generating real-time hot-spot maps. Effective policing still requires that officers build trust with the communities they serve.

With proper implementation, monitoring and transparency, the trend toward evidence-based policing should ultimately enhance the relationship between communities and police officers. That’s because data-driven decision-making is a step away from decisions based on biases that can result in unfair discrimination. Predictive models grounded in relevant data, including everything from past crime to the weather, limit the influence of prejudice or profiling by officers.

The stakes are high, but predictive policing offers an opportunity to make significant advances toward a safer and more just society.
WSJ: http://on.wsj.com/1SFpRs6

« Global Cyber Alliance To Tackle The Biggest Risks
Implementing EU Privacy Laws Requires 28,000 New Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

ThoughtSol

ThoughtSol

Thoughtsol help brands grow through Digital Transformation enabling them to leverage the power of IT for an all-embracing impact on their businesses.