Predictive Policing Technology Arrests

RB9735.figure1.gif

A substitute to HUMINT local knowledge? 

Recently British police officers took to the streets of Medway UK armed with maps and data supplied by the predictive policing system, which analyses data to identify areas where crime and anti-social behaviour are most likely to occur. Predictive Policing was introduced to Kent Police UK in December 2011. It is an intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur. Predictive policing was rolled out countywide in April 2013.

The patrol recently resulted in a suspected stolen motorcycle being recovered from the Luton area, a woman being arrested on suspicion of robbery and another suspected stolen motorcycle being found on fire, this has now been sent for forensic examination. One person was given a nuisance vehicle warning after found to be using a motorcycle in an anti-social way. If they are caught again, police will have the power to seize their vehicle.
In addition to this a Chatham UK ‘off licence’ was found to be breaching their licence conditions by selling super strength alcohol and another shop was found to be selling non-duty paid alcohol. Both shops will now have their licences reviewed.

Predictive Policing uses modern technology alongside officers on the beat, who police what they see and are able to engage with communities. The patrol was successful in doing that and was able to demonstrate to other agencies how we are making the best of every available resource to us to maximise the policing presence whilst being successful in deterring crime.

The Bellingham Police Department, near Seattle in the US, wants to adopt software to help officers predict where crimes are most likely to occur. Chief Cliff Cook says the city could use a Department of Justice grant to purchase the “predictive policing” software, which he says will allow the department to better serve the community. The department has asked residents to comment on the proposal at a City Council meeting.

The software analyzes data sets on crime types, place and time, which can help departments be more effective in deploying officers to deter crime rather than respond to it. Departments around the country use such programs.
The department said it has chosen software developed by Bair Analytics because it offers a free public access component that allows residents to receive alerts and view interactive maps of recent crimes.

Predictive policing often uses advanced analytics and includes the systematic review and analysis of data and information using automated methods. Through the use of exploratory graphics in combination with advanced statistics, machine learning tools, and artificial intelligence, critical pieces of information can be identified and extracted from large repositories of data. By probing data in this manner, it is possible to prove or disprove hypotheses while discovering new or previously unknown information. 

In particular, unique or valuable relationships, trends, patterns, sequences, and affinities in the data can be identified and used proactively to categorize or anticipate additional actions or information. 

Simply stated, advanced analytics includes the use and exploitation of mathematical techniques and processes that can be used to confirm things that we already know or think that we know, as well as discover new or previously unknown patterns, trends, and relationships in the data.
Kent Police: http://bit.ly/1DSoqlZ
Seattle Times: http://bit.ly/1N7cHTQ
Privacy SOS: http://bit.ly/1KllKu4

 

« U.S Elections and the Coming Cyber Wars
Hackers Target Internet Address Bug to Disrupt Sites »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.