Big Data And Policing

In recent years, big data technology has revolutionised many domains, including the retail, healthcare and transportation sectors. However, the use of big data technology for policing has so far been limited, particularly in the UK.

This is despite the police collecting a vast amount of digital data on a daily basis and ther is a lack of research exploring the potential uses of big data analytics for UK policing.

Primary research in the form of interviews with 25 serving police officers and staff, as well as experts from the technology sector and academia, has provided new insights into the limitations of the police’s current use of data and the police’s priorities for expanding these capabilities.

The research has identified a number of fundamental limitations in the police’s current use of data. In particular the fragmentation of databases and software applications is a significant impediment to the efficiency of police forces, as police data is managed across multiple separate systems that are not mutually compatible.

Moreover, in the majority of cases, the analysis of digital data is almost entirely manual, despite software being available to automate much of this process.

In addition, police forces do not have access to advanced analytical tools to trawl and analyse unstructured data, such as images and video, and for this reason are unable to take full advantage of the UK’s wide-reaching surveillance capabilities.

Among the numerous ways in which big data technology could be applied to UK policing, four are identified as key priorities.

  • First, predictive crime mapping could be used to identify areas where crime is most likely to occur, allowing limited resources to be targeted most efficiently.
  • Second, predictive analytics could also be used to identify the risks associated with particular individuals. This includes identifying individuals who are at increased risk of reoffending, as well as those at risk of going missing or becoming the victims of crime.
  • Third, advanced analytics could enable the police to harness the full potential of data collected through visual surveillance, such as CCTV images and automatic number plate recognition (ANPR) data.
  • Fourth, big data technology could be applied to open-source data, such as that collected from social media, to gain a richer understanding of specific crime problems, which would ultimately inform the development of preventive policing strategies.

There are at present a number of practical and organisational barriers to implementing these technologies.

Most significantly, the lack of coordinated development of technology across UK policing is highly problematic for big data, which relies on effective nationwide data sharing and collaboration.

Financial cuts in recent years have also severely hindered technological development, as the majority of police IT budgets is spent supporting existing legacy systems, with little funding available to invest in new technology. Finally, there are significant legal and ethical constraints governing the police’s use of data, although these are not a main focus of this report.

These barriers are by no means insurmountable, and it is expected that, in the coming years, advances in the police’s use of technology will enable the successful development of big data policing tools.

It is imperative that such development is informed according to specifically identified requirements and priorities, and this report identifies several areas of particular interest that warrant further investigation.

Despite the budget cuts of the kind imposed since 2010, it is crucial to invest in new technology, as the costs of the initial investment will be more than recuperated by the efficiency savings made in the long term.

RUSI

You Might Also Read: 

Big Data In The Service of Police:

Using Big Data To Improve Customer Experience & Results:

 

« South Korean Banks Brace For Electro-Magnetic Pulse
Three Ways The IoT Can Drive Business Value »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.