Machine Learning Algorithms & Police Decision-Making

In the UK, the use of machine learning algorithms to support police decision-making is in its infancy, and there is a lack of research examining how the use of an algorithm influences officers’ decision-making in practice. 

Moreover, there is a limited evidence base on the efficacy and efficiency of different systems, their cost-effectiveness, their impact on individual rights and the extent to which they serve valid policing aims. Limited, localised trials should be conducted and comprehensively evaluated to build such an evidence base before moving ahead with large-scale deployment of such tools. 

There is a lack of clear guidance and codes of practice outlining appropriate constraints governing how police forces should trial predictive algorithmic tools. 

This should be addressed as a matter of urgency to enable police forces to trial new technologies in accordance with data protection legislation, respect for human rights and administrative law principles.
While machine learning algorithms are currently being used for limited policing purposes, there is potential for the technology to do much more, and the lack of a regulatory and governance framework for its use is concerning. 
A new regulatory framework is needed, one which establishes minimum standards around issues such as transparency and intelligibility, the potential effects of the incorporation of an algorithm into a decision-making process, and relevant ethical issues. 

A formalised system of scrutiny and oversight, including an inspection role for Her Majesty’s Inspectorate of Constabulary and Fire and Rescue Services, is necessary to ensure adherence to this new framework. There are various issues concerning procurement contracts between the police and private sector suppliers of predictive policing technology. 

It is suggested that all relevant public procurement agreements for machine learning algorithms should explicitly require that it be possible to retroactively deconstruct the algorithm in order to assess which factors influenced the model’s predictions, along with a requirement for the supplier to be able to provide an expert witness who can provide details concerning the algorithm’s operation if needed, for instance in an evidential context. 

The legal and ethical issues concerning the use of machine learning algorithms for policing are complex and highly context-dependent. Machine learning algorithms require constant attention and vigilance to ensure that the predictions they provide are as accurate and as unbiased as possible, and that any irregularities are addressed as soon as they arise. 

For this reason, multi-disciplinary local ethics boards should be established to scrutinise and assess each case of algorithmic implementation for policing. Such boards should consist of a combination of practitioners and academics, and should provide recommendations to individual forces for practice, strategy and policy decisions relating to the use of algorithms. 
A collaborative, multidisciplinary approach is needed to address the complex issues raised by the use of machine learning algorithms for decision-making. 

At the national level, a working group consisting of members from the fields of policing, computer science, law and ethics should be tasked with sharing ‘real-world’ innovations and challenges, examining operational requirements for new algorithms within policing, with a view to setting out the relevant parameters and requirements, and considering the appropriate selection of training and test data. 

Officers may need to be equipped with a new skill set to effectively understand, deploy and interpret algorithmic tools in combination with their professional expertise, and to make assessments of risk using an algorithmically generated forecast. 

It is essential that the officers using the technology are sufficiently trained to do so in a fair and responsible way and are able to act upon algorithmic predictions in a way that maintains their discretion and professional judgement.

RUSI

You Might Also Read:

Smartphones Are Working For Dutch Police:

Digital Shock: Cybercrime & The Future Of Policing. Part 3: (£)

 

« SMEs Risk Costs Of Up To $2.5m Following A Breach
How To Hack the Hackers: The Human Side Of Cybercrime »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

NWN Carousel

NWN Carousel

NWN Carousel delivers AI-powered technology solutions for the modern workplace. From unified communications and intelligent infrastructure to robust cybersecurity.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.

WideField Security

WideField Security

WideField Security a venture backed cybersecurity startup helps enterprise protect their identity attack surface.