The Dilemma Of Predictive Policing

Predictive policing, the use of computer models to identify either areas or people at greater risk of being involved in a serious crime, is yielding results for police. But how authorities respond to information gathered using this method is at least as important as the predictions themselves.

This intervention identified people to be at high risk based on how many times they had been arrested with those who later became homicide victims or arrested with others who, in turn, were arrested with future homicide victims.

There has been little guidance for US Police authorities about what theyshould do with those 'suspects' on the predictive profiling (CPD) list other than “take action.” Police commanders have reported making attempts to reach out to list members, but how and with what level of effort varied widely. As one reviewer put it, just handing out a list of those at higher risk probably should produce little effect, and that's exactly what we found in our evaluation.

What is needed instead is a well-defined intervention based on previous programs that were successful in reducing violence. A core intervention should be customizable and should include privacy and civil rights protections. The focus should be on working with those at risk to reduce future crime and victimization, not “suppression.” It should distinguish between those who are high threats to their communities and those who are just at high risk of becoming a victim. Agencies also should make specific long-term commitments to the intervention, including devoting sufficient resources, developing training procedures and committing to evaluation and improvement over time.

Importantly, the CPD reports changed police use lists. The main change is the use of an intervention called “custom notification” with some members of the list. These are visits during which the list member and/or their families are told they are at risk of being a party to violence and why. They are informed of social services they can use if they wish to make a life change and warned that they will be targeted for increased prosecution if they engage in criminal activity.

The custom notification approach is based on a line of similar programs with evidence showing they have been effective in reducing violence, though we have not evaluated this new CPD intervention. The CPD also reports major improvements to the predictive model, with those at risk now identified primarily by past criminal and victimization history, not co-arrests.

The biggest issue for those agencies considering predictive policing is not the statistical model or tool used to make forecasts. Getting predictions that are somewhat reasonable in identifying where or who is at greater risk of crime is fairly easy. Instead, agencies should be most concerned about what they plan to do as a result.

Rand
 

 

« The Self-Fulfilling Prophecy Of Intelligent Automation
Lawyers Beware: A Robot Will Take Your Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CyberDefenses

CyberDefenses

CyberDefenses services combine best-in-class cybersecurity oversight, managed services and training to help our clients truly address their cybersecurity challenges.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Credible Digital Security Pvt. Ltd. (CDSPL)

Credible Digital Security Pvt. Ltd. (CDSPL)

CDSPL is an innovative Cyber Security Services Company in India. We are committed to offering cyber security solutions for important sectors such as energy and utilities, healthcare, and more.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.