Big Data And Policing

In recent years, big data technology has revolutionised many domains, including the retail, healthcare and transportation sectors. However, the use of big data technology for policing has so far been limited, particularly in the UK.

This is despite the police collecting a vast amount of digital data on a daily basis and ther is a lack of research exploring the potential uses of big data analytics for UK policing.

Primary research in the form of interviews with 25 serving police officers and staff, as well as experts from the technology sector and academia, has provided new insights into the limitations of the police’s current use of data and the police’s priorities for expanding these capabilities.

The research has identified a number of fundamental limitations in the police’s current use of data. In particular the fragmentation of databases and software applications is a significant impediment to the efficiency of police forces, as police data is managed across multiple separate systems that are not mutually compatible.

Moreover, in the majority of cases, the analysis of digital data is almost entirely manual, despite software being available to automate much of this process.

In addition, police forces do not have access to advanced analytical tools to trawl and analyse unstructured data, such as images and video, and for this reason are unable to take full advantage of the UK’s wide-reaching surveillance capabilities.

Among the numerous ways in which big data technology could be applied to UK policing, four are identified as key priorities.

  • First, predictive crime mapping could be used to identify areas where crime is most likely to occur, allowing limited resources to be targeted most efficiently.
  • Second, predictive analytics could also be used to identify the risks associated with particular individuals. This includes identifying individuals who are at increased risk of reoffending, as well as those at risk of going missing or becoming the victims of crime.
  • Third, advanced analytics could enable the police to harness the full potential of data collected through visual surveillance, such as CCTV images and automatic number plate recognition (ANPR) data.
  • Fourth, big data technology could be applied to open-source data, such as that collected from social media, to gain a richer understanding of specific crime problems, which would ultimately inform the development of preventive policing strategies.

There are at present a number of practical and organisational barriers to implementing these technologies.

Most significantly, the lack of coordinated development of technology across UK policing is highly problematic for big data, which relies on effective nationwide data sharing and collaboration.

Financial cuts in recent years have also severely hindered technological development, as the majority of police IT budgets is spent supporting existing legacy systems, with little funding available to invest in new technology. Finally, there are significant legal and ethical constraints governing the police’s use of data, although these are not a main focus of this report.

These barriers are by no means insurmountable, and it is expected that, in the coming years, advances in the police’s use of technology will enable the successful development of big data policing tools.

It is imperative that such development is informed according to specifically identified requirements and priorities, and this report identifies several areas of particular interest that warrant further investigation.

Despite the budget cuts of the kind imposed since 2010, it is crucial to invest in new technology, as the costs of the initial investment will be more than recuperated by the efficiency savings made in the long term.

RUSI

You Might Also Read: 

Big Data In The Service of Police:

Using Big Data To Improve Customer Experience & Results:

 

« South Korean Banks Brace For Electro-Magnetic Pulse
Three Ways The IoT Can Drive Business Value »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SecuPedia

SecuPedia

SecuPedia is a wiki-type platform that collects and provides the entire knowledge of security and IT security.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

RKH Specialty

RKH Specialty

RKH Specialty, part of the Hyperion Insurance Group, is a provider of specialty insurance services including Cyber Risk cover.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.