Machine Learning Algorithms & Police Decision-Making

In the UK, the use of machine learning algorithms to support police decision-making is in its infancy, and there is a lack of research examining how the use of an algorithm influences officers’ decision-making in practice. 

Moreover, there is a limited evidence base on the efficacy and efficiency of different systems, their cost-effectiveness, their impact on individual rights and the extent to which they serve valid policing aims. Limited, localised trials should be conducted and comprehensively evaluated to build such an evidence base before moving ahead with large-scale deployment of such tools. 

There is a lack of clear guidance and codes of practice outlining appropriate constraints governing how police forces should trial predictive algorithmic tools. 

This should be addressed as a matter of urgency to enable police forces to trial new technologies in accordance with data protection legislation, respect for human rights and administrative law principles.
While machine learning algorithms are currently being used for limited policing purposes, there is potential for the technology to do much more, and the lack of a regulatory and governance framework for its use is concerning. 
A new regulatory framework is needed, one which establishes minimum standards around issues such as transparency and intelligibility, the potential effects of the incorporation of an algorithm into a decision-making process, and relevant ethical issues. 

A formalised system of scrutiny and oversight, including an inspection role for Her Majesty’s Inspectorate of Constabulary and Fire and Rescue Services, is necessary to ensure adherence to this new framework. There are various issues concerning procurement contracts between the police and private sector suppliers of predictive policing technology. 

It is suggested that all relevant public procurement agreements for machine learning algorithms should explicitly require that it be possible to retroactively deconstruct the algorithm in order to assess which factors influenced the model’s predictions, along with a requirement for the supplier to be able to provide an expert witness who can provide details concerning the algorithm’s operation if needed, for instance in an evidential context. 

The legal and ethical issues concerning the use of machine learning algorithms for policing are complex and highly context-dependent. Machine learning algorithms require constant attention and vigilance to ensure that the predictions they provide are as accurate and as unbiased as possible, and that any irregularities are addressed as soon as they arise. 

For this reason, multi-disciplinary local ethics boards should be established to scrutinise and assess each case of algorithmic implementation for policing. Such boards should consist of a combination of practitioners and academics, and should provide recommendations to individual forces for practice, strategy and policy decisions relating to the use of algorithms. 
A collaborative, multidisciplinary approach is needed to address the complex issues raised by the use of machine learning algorithms for decision-making. 

At the national level, a working group consisting of members from the fields of policing, computer science, law and ethics should be tasked with sharing ‘real-world’ innovations and challenges, examining operational requirements for new algorithms within policing, with a view to setting out the relevant parameters and requirements, and considering the appropriate selection of training and test data. 

Officers may need to be equipped with a new skill set to effectively understand, deploy and interpret algorithmic tools in combination with their professional expertise, and to make assessments of risk using an algorithmically generated forecast. 

It is essential that the officers using the technology are sufficiently trained to do so in a fair and responsible way and are able to act upon algorithmic predictions in a way that maintains their discretion and professional judgement.

RUSI

You Might Also Read:

Smartphones Are Working For Dutch Police:

Digital Shock: Cybercrime & The Future Of Policing. Part 3: (£)

 

« SMEs Risk Costs Of Up To $2.5m Following A Breach
How To Hack the Hackers: The Human Side Of Cybercrime »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an