Big Data In The Service of Police

With access to more personal data than ever before, police have the power to solve crimes more quickly, but in practice, the influx of information tends to amplify existing practices, according to sociology research at The University of Texas at Austin.

The question is how adopting big data analytics both amplifies and transforms police surveillance practices, as asked by UT Austin sociologist Sarah Brayne’s research, published in the American Sociological Review.

“On one hand, I think it has the potential to reduce some problematic inequities in policing, such as the un-particularised suspicion of racial minorities,” “But I think as it’s currently implemented, there can be a few negative consequences for equality, and it can lead to a lot more marginalisation and distrust.”

Brayne interviewed and observed 75 police officers and civilian employees of the Los Angeles Police Department, a pioneer in data analytic policing, to identify key ways law enforcement has implemented in-house and privately purchased data on individuals to assess criminal risks, predict crime and surveil communities.

“This trend began in the wake of 9/11, which was viewed as this information-sharing failure in the intelligence community,” Brayne said.

“So, the feds are now giving a lot more money to local police departments in order to collect all types of new data because they’re viewed as the frontline on the war on terror.”

According to news.utexas.edu, perhaps the most transformative aspect of big data on policing is the amount of information police are able to access on individuals, both suspect and not, Brayne found.

Police have implemented dragnet surveillance tools, such as police cars equipped with license plate readers to photograph and track patterns of travel of every car in their path.

And obtaining information that previously would have required a search warrant is now easier with sourced data from private data brokers, who buy personal information from businesses with whom individuals have interacted.

Brayne also found that big data can help send real-time alerts to police about specific individuals such as where they are, based on license plate tracking, enabling law enforcement to surveil an unprecedented number of people at once.

Although technology allows police to surveil entire communities more easily, Brayne found that data is not always as objective as it suggests. In terms of individual policing, big data aims to supplement officers’ discretion with algorithm-based, quantified criminal risk assessments.

Likewise, police have implemented predictive policing strategies that pinpoint locations where crime is most likely to occur.

“I think it’s really important to emphasise that a lot of data integration and predictive algorithms are originally deployed for improving service delivery, being more efficient and reducing crime and focusing resources on people who are committing crimes,” Brayne said.

“The police are not arresting people based on pre-crime data. But big data helps building up this corpus of information on individuals that I think disproportionally benefits those in positions of social advantage and disadvantages those who are already in positions of structural disadvantage.”

I-HLS

You Might Also Read: 

US Police Real-Time Mapping Of Terrorist Attacks:

Fighting Digital Crime: Evolving Police Methods:

 

« Russia Plans To Shut Facebook For Its Election
Why Do IT Projects Often Fail? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

Polymer Solutions

Polymer Solutions

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

VMware

VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Claratti

Claratti

Clarrati are a team of innovators. Industry leaders in the cloud computing, remote working, and work-from-home space. We partner with you to empower your business for the future.