Predictive Policing Technology Arrests

RB9735.figure1.gif

A substitute to HUMINT local knowledge? 

Recently British police officers took to the streets of Medway UK armed with maps and data supplied by the predictive policing system, which analyses data to identify areas where crime and anti-social behaviour are most likely to occur. Predictive Policing was introduced to Kent Police UK in December 2011. It is an intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur. Predictive policing was rolled out countywide in April 2013.

The patrol recently resulted in a suspected stolen motorcycle being recovered from the Luton area, a woman being arrested on suspicion of robbery and another suspected stolen motorcycle being found on fire, this has now been sent for forensic examination. One person was given a nuisance vehicle warning after found to be using a motorcycle in an anti-social way. If they are caught again, police will have the power to seize their vehicle.
In addition to this a Chatham UK ‘off licence’ was found to be breaching their licence conditions by selling super strength alcohol and another shop was found to be selling non-duty paid alcohol. Both shops will now have their licences reviewed.

Predictive Policing uses modern technology alongside officers on the beat, who police what they see and are able to engage with communities. The patrol was successful in doing that and was able to demonstrate to other agencies how we are making the best of every available resource to us to maximise the policing presence whilst being successful in deterring crime.

The Bellingham Police Department, near Seattle in the US, wants to adopt software to help officers predict where crimes are most likely to occur. Chief Cliff Cook says the city could use a Department of Justice grant to purchase the “predictive policing” software, which he says will allow the department to better serve the community. The department has asked residents to comment on the proposal at a City Council meeting.

The software analyzes data sets on crime types, place and time, which can help departments be more effective in deploying officers to deter crime rather than respond to it. Departments around the country use such programs.
The department said it has chosen software developed by Bair Analytics because it offers a free public access component that allows residents to receive alerts and view interactive maps of recent crimes.

Predictive policing often uses advanced analytics and includes the systematic review and analysis of data and information using automated methods. Through the use of exploratory graphics in combination with advanced statistics, machine learning tools, and artificial intelligence, critical pieces of information can be identified and extracted from large repositories of data. By probing data in this manner, it is possible to prove or disprove hypotheses while discovering new or previously unknown information. 

In particular, unique or valuable relationships, trends, patterns, sequences, and affinities in the data can be identified and used proactively to categorize or anticipate additional actions or information. 

Simply stated, advanced analytics includes the use and exploitation of mathematical techniques and processes that can be used to confirm things that we already know or think that we know, as well as discover new or previously unknown patterns, trends, and relationships in the data.
Kent Police: http://bit.ly/1DSoqlZ
Seattle Times: http://bit.ly/1N7cHTQ
Privacy SOS: http://bit.ly/1KllKu4

 

« U.S Elections and the Coming Cyber Wars
Hackers Target Internet Address Bug to Disrupt Sites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.