Is Predictive Policing The Future?

As big data transforms industries ranging from retailing to health care, it’s also becoming a more important tool for police departments, which are turning to data and analysis in an effort to boost their effectiveness.

Known as predictive policing, the practice involves analyzing data on the time, location and nature of past crimes, along with things such as geography and the weather, to gain insight into where and when future crime is most likely to occur and try to deter it before it happens.

Jennifer Bachner, director of the master of science in government analytics program at Johns Hopkins University, says giving police the ability to make data-driven decisions will help reduce biases that result in unfair discrimination, resulting in better relations between police and the communities they serve. Jennifer Lynch, senior staff attorney at the Electronic Frontier Foundation, says predictive policing is flawed and will only serve to focus more law-enforcement surveillance on communities that are already over-policed.

In an era of tight budgets, police departments across the country are being asked to do more with less. They must protect the public, but often have to do it with limited personnel, equipment and training resources.

To address this problem, law-enforcement agencies increasingly are turning to data and analytics to improve their ability to fight crime without substantial increases in operating costs. Known as predictive policing, these technologies and techniques empower police officers to take a more proactive approach to both preventing crime and solving open cases.

Predictive policing involves crunching data on past crimes, along with information such as the weather, the time of day and the presence of escape routes, to forecast where and when future crime is most likely to occur. In cities such as Santa Cruz, Calif., officers have access to maps outlining “hot spots,” or geographic areas most vulnerable to crime at a future point in time, and they are encouraged to use the information along with their knowledge of the community to decide where to allocate the most resources on a given shift.

The theory isn’t complicated—being in the right place at the right time deters crime, and the approach has proved effective, particularly in places such as Santa Cruz, where the population is dispersed over a large area.

Some in law enforcement say predictive policing is particularly helpful when it comes to identifying and halting repeat criminals.

The Baltimore County Police Department says it used predictive methods to halt a string of convenience-store robberies. Police had information about the locations of the robberies and a suspected model of car used by the elusive offender, but no obvious next target. By plotting the robbed locations on a map and employing an iterative algorithm, police identified a suspected point of origin. 

Police then analyzed the streets that would likely have been used to reach the crime locations and detected one specific street that the offender had likely used frequently (and would probably use again) to travel to crime scenes. Officers staked out that street, rather than patrolling numerous convenience stores, and were able to apprehend the suspect.

Some critics say that because not all crime is reported, predictive models based on past crime data might miss future crimes that don’t fit historical patterns. But today’s predictive models aren’t based solely on past crime data—they also take into account some of the same things potential criminals do when planning crimes, such as geographic information.

To achieve positive results with predictive policing, some upfront costs are required: Law-enforcement agencies must make an initial investment not only in software, but also in training officers to understand the proper scope and limitations of data-driven policing.

The use of data, like the use of any tool, leaves openings for misuse, but police departments can take steps to protect civil liberties. There is a big difference, for example, between predicting where crime is most likely to occur and developing lists of potential future offenders without probable cause, a practice that certainly raises serious ethical and legal concerns.

Policy makers also must grapple with the proper scope of data collection, retention and use and be able to explain to the community how data is being used to enhance public safety. That is why departments that adopt predictive-policing programs must at the same time re-emphasize their commitment to community policing. Officers won’t achieve substantial reductions in crime by holing up in patrol cars, generating real-time hot-spot maps. Effective policing still requires that officers build trust with the communities they serve.

With proper implementation, monitoring and transparency, the trend toward evidence-based policing should ultimately enhance the relationship between communities and police officers. That’s because data-driven decision-making is a step away from decisions based on biases that can result in unfair discrimination. Predictive models grounded in relevant data, including everything from past crime to the weather, limit the influence of prejudice or profiling by officers.

The stakes are high, but predictive policing offers an opportunity to make significant advances toward a safer and more just society.
WSJ: http://on.wsj.com/1SFpRs6

« Global Cyber Alliance To Tackle The Biggest Risks
Implementing EU Privacy Laws Requires 28,000 New Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

S4x Events

S4x Events

S4x are the most advanced and largest ICS cyber security events in the world.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.