Predictive Policing Technology Arrests

RB9735.figure1.gif

A substitute to HUMINT local knowledge? 

Recently British police officers took to the streets of Medway UK armed with maps and data supplied by the predictive policing system, which analyses data to identify areas where crime and anti-social behaviour are most likely to occur. Predictive Policing was introduced to Kent Police UK in December 2011. It is an intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur. Predictive policing was rolled out countywide in April 2013.

The patrol recently resulted in a suspected stolen motorcycle being recovered from the Luton area, a woman being arrested on suspicion of robbery and another suspected stolen motorcycle being found on fire, this has now been sent for forensic examination. One person was given a nuisance vehicle warning after found to be using a motorcycle in an anti-social way. If they are caught again, police will have the power to seize their vehicle.
In addition to this a Chatham UK ‘off licence’ was found to be breaching their licence conditions by selling super strength alcohol and another shop was found to be selling non-duty paid alcohol. Both shops will now have their licences reviewed.

Predictive Policing uses modern technology alongside officers on the beat, who police what they see and are able to engage with communities. The patrol was successful in doing that and was able to demonstrate to other agencies how we are making the best of every available resource to us to maximise the policing presence whilst being successful in deterring crime.

The Bellingham Police Department, near Seattle in the US, wants to adopt software to help officers predict where crimes are most likely to occur. Chief Cliff Cook says the city could use a Department of Justice grant to purchase the “predictive policing” software, which he says will allow the department to better serve the community. The department has asked residents to comment on the proposal at a City Council meeting.

The software analyzes data sets on crime types, place and time, which can help departments be more effective in deploying officers to deter crime rather than respond to it. Departments around the country use such programs.
The department said it has chosen software developed by Bair Analytics because it offers a free public access component that allows residents to receive alerts and view interactive maps of recent crimes.

Predictive policing often uses advanced analytics and includes the systematic review and analysis of data and information using automated methods. Through the use of exploratory graphics in combination with advanced statistics, machine learning tools, and artificial intelligence, critical pieces of information can be identified and extracted from large repositories of data. By probing data in this manner, it is possible to prove or disprove hypotheses while discovering new or previously unknown information. 

In particular, unique or valuable relationships, trends, patterns, sequences, and affinities in the data can be identified and used proactively to categorize or anticipate additional actions or information. 

Simply stated, advanced analytics includes the use and exploitation of mathematical techniques and processes that can be used to confirm things that we already know or think that we know, as well as discover new or previously unknown patterns, trends, and relationships in the data.
Kent Police: http://bit.ly/1DSoqlZ
Seattle Times: http://bit.ly/1N7cHTQ
Privacy SOS: http://bit.ly/1KllKu4

 

« U.S Elections and the Coming Cyber Wars
Hackers Target Internet Address Bug to Disrupt Sites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.