The Dilemma Of Predictive Policing

Predictive policing, the use of computer models to identify either areas or people at greater risk of being involved in a serious crime, is yielding results for police. But how authorities respond to information gathered using this method is at least as important as the predictions themselves.

This intervention identified people to be at high risk based on how many times they had been arrested with those who later became homicide victims or arrested with others who, in turn, were arrested with future homicide victims.

There has been little guidance for US Police authorities about what theyshould do with those 'suspects' on the predictive profiling (CPD) list other than “take action.” Police commanders have reported making attempts to reach out to list members, but how and with what level of effort varied widely. As one reviewer put it, just handing out a list of those at higher risk probably should produce little effect, and that's exactly what we found in our evaluation.

What is needed instead is a well-defined intervention based on previous programs that were successful in reducing violence. A core intervention should be customizable and should include privacy and civil rights protections. The focus should be on working with those at risk to reduce future crime and victimization, not “suppression.” It should distinguish between those who are high threats to their communities and those who are just at high risk of becoming a victim. Agencies also should make specific long-term commitments to the intervention, including devoting sufficient resources, developing training procedures and committing to evaluation and improvement over time.

Importantly, the CPD reports changed police use lists. The main change is the use of an intervention called “custom notification” with some members of the list. These are visits during which the list member and/or their families are told they are at risk of being a party to violence and why. They are informed of social services they can use if they wish to make a life change and warned that they will be targeted for increased prosecution if they engage in criminal activity.

The custom notification approach is based on a line of similar programs with evidence showing they have been effective in reducing violence, though we have not evaluated this new CPD intervention. The CPD also reports major improvements to the predictive model, with those at risk now identified primarily by past criminal and victimization history, not co-arrests.

The biggest issue for those agencies considering predictive policing is not the statistical model or tool used to make forecasts. Getting predictions that are somewhat reasonable in identifying where or who is at greater risk of crime is fairly easy. Instead, agencies should be most concerned about what they plan to do as a result.

Rand
 

 

« The Self-Fulfilling Prophecy Of Intelligent Automation
Lawyers Beware: A Robot Will Take Your Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.