Open Source Data Reveals Police Blunders

A blogger in New York has used public data to prove that the New York Police Department (NYPD) ticketed thousands of cars that were actually parked legally.

Ben Wellington made the discovery after officers kept ticketing his own car, parked on a pavement ramp on the street where he lives.

"It was a surprising find," Mr. Drivers have been allowed to park in some of these spaces since 2009.The NYPD wrote to Wellington to confirm his findings and sent a message to officers clarifying the rules.

To discover the extent of the problem, Wellington examined data published through New York City's Open Data portal, which includes information on the most common parking places in the city where tickets are issued to cars on pedestrian ramps.

He then checked some of the locations via Google Street View to ensure that the ramps were not connected to a crosswalk - in which case the ticket would have been justified. At one spot in Brooklyn, $48,000 (£33,000) had been issued in erroneous fines over a two and a half year, period.

Wellington detailed several examples on his blog, I Quant NY, including three more spaces at each of which more than $40,000 (£27,500) in fines had been given out over the same period.

"It was a surprising find," Mr. Wellington told the BBC. "What I was actually most surprised by was the response from the police department who basically said, 'yep, that's all true' - that's an unusual thing to happen when working with public data."

In a statement, the NYPD said: "Mr. Wellington's analysis identified errors the department made in issuing parking summonses. "It appears to be a misunderstanding by officers on patrol of a recent, abstruse change in the parking rules." We appreciate Mr. Wellington bringing this anomaly to our attention." It added that while traffic agents had been trained following the adoption of new rules in 2009, officers had not. A message has now been sent to all officers updating them on pedestrian ramp regulations.

To allow others a means of quickly checking which pedestrian ramp parking spaces are most frequently ticketed, Wellington has plotted the 1,000 most common locations on an interactive map.

"I think all those spots got eight or more tickets in the last two-and-a-half years," said Mr. Wellington. "The list of five or more tickets had about 2,000 spots."

Mr. Wellington has used open data in the past to challenge ticketing decisions in the city. He said he hopes his latest success will help to empower fellow citizens. "I see it as a sign of what the future of government could look like as more data gets out and more citizens have the ability to look through that data and make recommendations for how cities could run better," he said.

Mr. Wellington added that he plans to do a follow-up analysis six months or a year from now, to check whether the number of erroneously issued tickets at pedestrian ramps has fallen.

Open Cities

Use of public data in cities around the world has increased in recent years. The Future Spaces Foundation think tank, based in London, recently reported on how much transport data had been made openly available in various cities around the world.

For example, there are now more than 460 apps powered by Transport for London data while, in Singapore, commuters are able to access information on the current levels of standing room and seating available on public transport.

The city's Land Transport Authority app also includes data on the availability of parking spaces near to a passenger's destination.

BBC: http://bbc.in/1rYYikT

« Achieving Holistic Cybersecurity
First Shots Of A New Cyber War »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.