The Dilemma Of Predictive Policing

Predictive policing, the use of computer models to identify either areas or people at greater risk of being involved in a serious crime, is yielding results for police. But how authorities respond to information gathered using this method is at least as important as the predictions themselves.

This intervention identified people to be at high risk based on how many times they had been arrested with those who later became homicide victims or arrested with others who, in turn, were arrested with future homicide victims.

There has been little guidance for US Police authorities about what theyshould do with those 'suspects' on the predictive profiling (CPD) list other than “take action.” Police commanders have reported making attempts to reach out to list members, but how and with what level of effort varied widely. As one reviewer put it, just handing out a list of those at higher risk probably should produce little effect, and that's exactly what we found in our evaluation.

What is needed instead is a well-defined intervention based on previous programs that were successful in reducing violence. A core intervention should be customizable and should include privacy and civil rights protections. The focus should be on working with those at risk to reduce future crime and victimization, not “suppression.” It should distinguish between those who are high threats to their communities and those who are just at high risk of becoming a victim. Agencies also should make specific long-term commitments to the intervention, including devoting sufficient resources, developing training procedures and committing to evaluation and improvement over time.

Importantly, the CPD reports changed police use lists. The main change is the use of an intervention called “custom notification” with some members of the list. These are visits during which the list member and/or their families are told they are at risk of being a party to violence and why. They are informed of social services they can use if they wish to make a life change and warned that they will be targeted for increased prosecution if they engage in criminal activity.

The custom notification approach is based on a line of similar programs with evidence showing they have been effective in reducing violence, though we have not evaluated this new CPD intervention. The CPD also reports major improvements to the predictive model, with those at risk now identified primarily by past criminal and victimization history, not co-arrests.

The biggest issue for those agencies considering predictive policing is not the statistical model or tool used to make forecasts. Getting predictions that are somewhat reasonable in identifying where or who is at greater risk of crime is fairly easy. Instead, agencies should be most concerned about what they plan to do as a result.

Rand
 

 

« The Self-Fulfilling Prophecy Of Intelligent Automation
Lawyers Beware: A Robot Will Take Your Job »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.