The Dilemma Of Predictive Policing

Predictive policing, the use of computer models to identify either areas or people at greater risk of being involved in a serious crime, is yielding results for police. But how authorities respond to information gathered using this method is at least as important as the predictions themselves.

This intervention identified people to be at high risk based on how many times they had been arrested with those who later became homicide victims or arrested with others who, in turn, were arrested with future homicide victims.

There has been little guidance for US Police authorities about what theyshould do with those 'suspects' on the predictive profiling (CPD) list other than “take action.” Police commanders have reported making attempts to reach out to list members, but how and with what level of effort varied widely. As one reviewer put it, just handing out a list of those at higher risk probably should produce little effect, and that's exactly what we found in our evaluation.

What is needed instead is a well-defined intervention based on previous programs that were successful in reducing violence. A core intervention should be customizable and should include privacy and civil rights protections. The focus should be on working with those at risk to reduce future crime and victimization, not “suppression.” It should distinguish between those who are high threats to their communities and those who are just at high risk of becoming a victim. Agencies also should make specific long-term commitments to the intervention, including devoting sufficient resources, developing training procedures and committing to evaluation and improvement over time.

Importantly, the CPD reports changed police use lists. The main change is the use of an intervention called “custom notification” with some members of the list. These are visits during which the list member and/or their families are told they are at risk of being a party to violence and why. They are informed of social services they can use if they wish to make a life change and warned that they will be targeted for increased prosecution if they engage in criminal activity.

The custom notification approach is based on a line of similar programs with evidence showing they have been effective in reducing violence, though we have not evaluated this new CPD intervention. The CPD also reports major improvements to the predictive model, with those at risk now identified primarily by past criminal and victimization history, not co-arrests.

The biggest issue for those agencies considering predictive policing is not the statistical model or tool used to make forecasts. Getting predictions that are somewhat reasonable in identifying where or who is at greater risk of crime is fairly easy. Instead, agencies should be most concerned about what they plan to do as a result.

Rand
 

 

« The Self-Fulfilling Prophecy Of Intelligent Automation
Lawyers Beware: A Robot Will Take Your Job »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.