SlideShare a Scribd company logo
1 of 31
Download to read offline
technology in the public sector
week 5: public safety and criminal
           justice IT
        Northwestern University MPPA 490

            Summer 2012 - Greg Wass




                                           1
Criminal justice functions     Major technology issues

• Police                       1. Need more data sharing
• Judicial                        across jurisdictions and
• Corrections                     functions
                                  – “The system of ‘need to
                                    know’ should be replaced by
                                    a system of ‘need to share.’”
                                    The 9/11 Commission Report
Policy questions
                               2. How to use modern data
• How do we prevent crimes        science for predictive
  before they happen?             policing
• Where should we              3. Extending community
  spend/invest public funds?      policing via mobile apps


                                                                    2
1. Need more data sharing across jurisdictions and
functions




                                                     3
The big picture
1. Case flow and decision points from
   crime (police) to trial (judicial) to
   incarceration (corrections) to reentry
   (social services)
2. Interaction among multiple agencies
   and levels of government


                                            4
5
6
Data sharing standards: JXDM and NIEM
• “The Global Justice Extensible Markup Language (XML) Data
  Model (Global JXDM) and Global Justice XML Data Dictionary
  (Global JXDD) are the result of an effort by the justice and
  public safety communities to produce a set of common, well-
  defined data elements to be used for data transmissions.”

• “Perhaps the most widely recognized and important standard
  of the day is the National Information Exchange Model
  (NIEM). ...NIEM is seen by many in the justice information-
  sharing community as the key standard and foundation for
  exchanging information across multiple domains and
  disciplines.”

Source: “Global Justice XML Data Model,” U.S. Department of Justice; Government Technology’s Digital Communities
                                                                                                                   7
2. How to use modern data science for predictive
policing




                                                   8
Predictive policing…
…is a multi-disciplinary, law enforcement-based strategy that
brings together
       •   advanced technologies
       •   criminological theory
       •   predictive analysis
       •   tactical operations


…that ultimately lead to results and outcomes of
       • crime reduction (and crime prevention)
       • management efficiency
       • safer communities


Source: Dr. Craig Ushida, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011
                                                                                                                              9
Predictive policing (cont’d)
• Universities and technology companies
       – Developing computer programs based on private sector
         models of forecasting consumer behavior
• Police agencies
       – Use computer analysis of information (crimes,
         environment, intelligence)
       – Predict and prevent crime
• The idea
       – Improve situational awareness (tactically /strategically) to
         create strategies to police more efficiently and effectively


Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             10
How does it work in real life?
With situational awareness and anticipation of human behavior,
police can identify and develop strategies to prevent criminal
activity
       – By repeat offenders
       – On repeat victims
       – By locations or types of targets
Police use their limited resources
       – To work proactively
       – Using effective strategies to prevent the activity
BUT - The effectiveness of the strategies must be measurable
       – Reduced crime
       – Higher arrest rates for serious/stranger offenses
       – Broader social and justice outcomes and impacts
Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011
                                                                                                                            11
Predictive
Policing:
A Model




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             12
What questions can predictive policing answer?




                                             13
A “blended theory” of crime
• Criminals and victims follow common life patterns;
  where those patterns overlap can lead to crimes
   – Geographic and temporal features influence the where
     and when of those patterns
• Criminals make rational decisions using factors such
  as area & target suitability, risk of getting caught, etc.
• Can ID many of these patterns and factors; can steer
  criminals’ decisions through interventions
• Best fits ―”stranger offenses” like robberies,
  burglaries, and thefts – less so vice and relationship
  violence
                                                            14
Some prediction methods




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             15
Hot spot analysis / crime mapping




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             16
Regression analysis




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             17
Possible pitfalls

                                                                                                Goal is to be as
                                                                                                accurate as possible
                                                                                                in predicting purse
                                                                                                snatchings…e.g., do
                                                                                                99%+ of future purse
                                                                                                snatchings (green
                                                                                                triangles), land in hot
                                                                                                spots (red and yellow
                                                                                                areas)




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             18
Is the data complete and correct?




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             19
Is the result actionable?




Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             20
Civil liberties / privacy concerns
Civil liberties scholars:
       – Have concerns over privacy and civil rights issues
       – Question how the police can use technology and knowledge to better
         fight crime without eroding civil liberties
       – Note that it must be constitutional
       – Encourage involvement of community advocates and leaders fromthe
         beginning to help alleviate concerns of privacy rights violations
• History has shown that serious legal consequences follow
  when appropriate consideration is not given to privacy rights
• Transparency, auditing and due diligence are critical



Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011
                                                                                                                            21
Civil liberties / privacy concerns (cont’d)

• Supreme Court has ruled that standards for what
  constitutes reasonable suspicion are relaxed in high
  crime areas (i.e., “hot spots”)
       – What constitutes a high crime area is a completely open
         question
• Issue minor in comparison to civil and privacy rights
  issues raised by profiling (i.e., “hot people”)
       – What do we do with a prediction of re-offending that,
         while much better than chance (~80% accurate), is still far
         from definitive?

Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
                                                                                                                             22
What practitioners say
Many crime analysts are already practicing predictive policing
       – Marginal improvements can be made and are areas of opportunity
       – There is a demonstrated gap between crime analysts and management
       – Often, analyst recommendations do not make it to the street-level cop
Departments need officers / staff that
       – Cares and places value on data and information
       – Are trained (at their level) how to respond to the data/information
There is a need for better data sharing and interoperability
There is a need to incorporate nontraditional data, like
demographics and building foreclosures for more sophisticated
analysis
Crime Analyst potential is relatively untapped and undervalued

Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011
                                                                                                                            23
3. Extending community policing via mobile apps




                                                  24
City of Boston mobile apps




Source: Public Technology Institute
                                                     25
Map / List / Add Photo / Track Detail
Source: Public Technology Institute
                                                                              26
City of San Francisco Spot Crime AppTM




Source: Public Technology Institute
                                                      27
Miami-Dade County self-service apps




Source: Public Technology Institute
                                                     28
Source: Public Technology Institute
                                      29
Chicago Clear Map




Source: Public Technology Institute
                                                          30
Other topics
• Fusion centers
       “A fusion center is an effective and efficient mechanism to
       exchange information and intelligence, maximize resources,
       streamline operations, and improve the ability to fight crime
       and terrorism by analyzing data from a variety of sources.”
• GIS integration
       “GIS in the mobile environment provides field personnel with
       the ability to capture new information, geocode it, and send
       it back so that incident command can visualize incident
       progress. As such, it is strategically important that GIS
       become an integral part of any common operating picture IT
       infrastructure.”
Sources: U.S. Department of Justice; ESRI
                                                                   31

More Related Content

Similar to Week 5: Public safety

Predective policingachtergrond
Predective policingachtergrondPredective policingachtergrond
Predective policingachtergrondFrank Smilda
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Technology is advancing at an alarming rate. We now have more method.pdf
Technology is advancing at an alarming rate. We now have more method.pdfTechnology is advancing at an alarming rate. We now have more method.pdf
Technology is advancing at an alarming rate. We now have more method.pdfRahul04August
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxsyreetamacaulay
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxaudeleypearl
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docxkellet1
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
Workware Systems Situational Awareness & Predictive Policing Overview
Workware Systems Situational Awareness & Predictive Policing OverviewWorkware Systems Situational Awareness & Predictive Policing Overview
Workware Systems Situational Awareness & Predictive Policing Overviewdeppster
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documentsZhongLI28
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...REVULN
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Klamberg
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Klamberg
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryCSCJournals
 

Similar to Week 5: Public safety (20)

Predective policingachtergrond
Predective policingachtergrondPredective policingachtergrond
Predective policingachtergrond
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Technology is advancing at an alarming rate. We now have more method.pdf
Technology is advancing at an alarming rate. We now have more method.pdfTechnology is advancing at an alarming rate. We now have more method.pdf
Technology is advancing at an alarming rate. We now have more method.pdf
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Reproduced with permission of the copy.docx
Reproduced with permission of the copy.docxReproduced with permission of the copy.docx
Reproduced with permission of the copy.docx
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Workware Systems Situational Awareness & Predictive Policing Overview
Workware Systems Situational Awareness & Predictive Policing OverviewWorkware Systems Situational Awareness & Predictive Policing Overview
Workware Systems Situational Awareness & Predictive Policing Overview
 
Text mining on criminal documents
Text mining on criminal documentsText mining on criminal documents
Text mining on criminal documents
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 

More from Greg Wass

Budgeting for Results and Paying for Success in State Government 5.6.14
Budgeting for Results and Paying for Success in State Government 5.6.14Budgeting for Results and Paying for Success in State Government 5.6.14
Budgeting for Results and Paying for Success in State Government 5.6.14Greg Wass
 
Demonstrating ROI for Technology Investments 9.30.13
Demonstrating ROI for Technology Investments 9.30.13Demonstrating ROI for Technology Investments 9.30.13
Demonstrating ROI for Technology Investments 9.30.13Greg Wass
 
estonia | eesti
estonia | eestiestonia | eesti
estonia | eestiGreg Wass
 
Illinois budgeting for results update 6.19.13
Illinois budgeting for results update 6.19.13Illinois budgeting for results update 6.19.13
Illinois budgeting for results update 6.19.13Greg Wass
 
Illinois performance reporting system update 4.26.13
Illinois performance reporting system update 4.26.13Illinois performance reporting system update 4.26.13
Illinois performance reporting system update 4.26.13Greg Wass
 
Fast Track Proposal to Budgeting for Results Commission 02 22 13
Fast Track Proposal to Budgeting for Results Commission   02 22 13Fast Track Proposal to Budgeting for Results Commission   02 22 13
Fast Track Proposal to Budgeting for Results Commission 02 22 13Greg Wass
 
Report to Budgeting for Results Commission 01.25.13
Report to Budgeting for Results Commission 01.25.13Report to Budgeting for Results Commission 01.25.13
Report to Budgeting for Results Commission 01.25.13Greg Wass
 
Week 9: IT governance and funding
Week 9: IT governance and fundingWeek 9: IT governance and funding
Week 9: IT governance and fundingGreg Wass
 
Week 8: The digital city
Week 8: The digital cityWeek 8: The digital city
Week 8: The digital cityGreg Wass
 
Week 6: Open data
Week 6: Open dataWeek 6: Open data
Week 6: Open dataGreg Wass
 
Syllabus - Technology in the Public Sector
Syllabus - Technology in the Public SectorSyllabus - Technology in the Public Sector
Syllabus - Technology in the Public SectorGreg Wass
 
Week 1: Social media and government
Week 1: Social media and governmentWeek 1: Social media and government
Week 1: Social media and governmentGreg Wass
 
Week 2: ERP and shared services
Week 2: ERP and shared servicesWeek 2: ERP and shared services
Week 2: ERP and shared servicesGreg Wass
 
The technology of transparency 6.12.12
The technology of transparency 6.12.12The technology of transparency 6.12.12
The technology of transparency 6.12.12Greg Wass
 
Transforming Cook County: Changing the Game with Shared Services and Open Gov...
Transforming Cook County: Changing the Game with Shared Services and Open Gov...Transforming Cook County: Changing the Game with Shared Services and Open Gov...
Transforming Cook County: Changing the Game with Shared Services and Open Gov...Greg Wass
 
Cook County (IL) Open Government Plan
Cook County (IL) Open Government PlanCook County (IL) Open Government Plan
Cook County (IL) Open Government PlanGreg Wass
 
Open government spring 2012 syllabus
Open government spring 2012 syllabusOpen government spring 2012 syllabus
Open government spring 2012 syllabusGreg Wass
 
Innovation in Cook County Government: Digital Government Summit 2011
Innovation in Cook County Government: Digital Government Summit 2011Innovation in Cook County Government: Digital Government Summit 2011
Innovation in Cook County Government: Digital Government Summit 2011Greg Wass
 
Deltek/TechAmerica Chicago Sep 13 2011
Deltek/TechAmerica Chicago Sep 13 2011Deltek/TechAmerica Chicago Sep 13 2011
Deltek/TechAmerica Chicago Sep 13 2011Greg Wass
 
1 themes-paris
1 themes-paris1 themes-paris
1 themes-parisGreg Wass
 

More from Greg Wass (20)

Budgeting for Results and Paying for Success in State Government 5.6.14
Budgeting for Results and Paying for Success in State Government 5.6.14Budgeting for Results and Paying for Success in State Government 5.6.14
Budgeting for Results and Paying for Success in State Government 5.6.14
 
Demonstrating ROI for Technology Investments 9.30.13
Demonstrating ROI for Technology Investments 9.30.13Demonstrating ROI for Technology Investments 9.30.13
Demonstrating ROI for Technology Investments 9.30.13
 
estonia | eesti
estonia | eestiestonia | eesti
estonia | eesti
 
Illinois budgeting for results update 6.19.13
Illinois budgeting for results update 6.19.13Illinois budgeting for results update 6.19.13
Illinois budgeting for results update 6.19.13
 
Illinois performance reporting system update 4.26.13
Illinois performance reporting system update 4.26.13Illinois performance reporting system update 4.26.13
Illinois performance reporting system update 4.26.13
 
Fast Track Proposal to Budgeting for Results Commission 02 22 13
Fast Track Proposal to Budgeting for Results Commission   02 22 13Fast Track Proposal to Budgeting for Results Commission   02 22 13
Fast Track Proposal to Budgeting for Results Commission 02 22 13
 
Report to Budgeting for Results Commission 01.25.13
Report to Budgeting for Results Commission 01.25.13Report to Budgeting for Results Commission 01.25.13
Report to Budgeting for Results Commission 01.25.13
 
Week 9: IT governance and funding
Week 9: IT governance and fundingWeek 9: IT governance and funding
Week 9: IT governance and funding
 
Week 8: The digital city
Week 8: The digital cityWeek 8: The digital city
Week 8: The digital city
 
Week 6: Open data
Week 6: Open dataWeek 6: Open data
Week 6: Open data
 
Syllabus - Technology in the Public Sector
Syllabus - Technology in the Public SectorSyllabus - Technology in the Public Sector
Syllabus - Technology in the Public Sector
 
Week 1: Social media and government
Week 1: Social media and governmentWeek 1: Social media and government
Week 1: Social media and government
 
Week 2: ERP and shared services
Week 2: ERP and shared servicesWeek 2: ERP and shared services
Week 2: ERP and shared services
 
The technology of transparency 6.12.12
The technology of transparency 6.12.12The technology of transparency 6.12.12
The technology of transparency 6.12.12
 
Transforming Cook County: Changing the Game with Shared Services and Open Gov...
Transforming Cook County: Changing the Game with Shared Services and Open Gov...Transforming Cook County: Changing the Game with Shared Services and Open Gov...
Transforming Cook County: Changing the Game with Shared Services and Open Gov...
 
Cook County (IL) Open Government Plan
Cook County (IL) Open Government PlanCook County (IL) Open Government Plan
Cook County (IL) Open Government Plan
 
Open government spring 2012 syllabus
Open government spring 2012 syllabusOpen government spring 2012 syllabus
Open government spring 2012 syllabus
 
Innovation in Cook County Government: Digital Government Summit 2011
Innovation in Cook County Government: Digital Government Summit 2011Innovation in Cook County Government: Digital Government Summit 2011
Innovation in Cook County Government: Digital Government Summit 2011
 
Deltek/TechAmerica Chicago Sep 13 2011
Deltek/TechAmerica Chicago Sep 13 2011Deltek/TechAmerica Chicago Sep 13 2011
Deltek/TechAmerica Chicago Sep 13 2011
 
1 themes-paris
1 themes-paris1 themes-paris
1 themes-paris
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Week 5: Public safety

  • 1. technology in the public sector week 5: public safety and criminal justice IT Northwestern University MPPA 490 Summer 2012 - Greg Wass 1
  • 2. Criminal justice functions Major technology issues • Police 1. Need more data sharing • Judicial across jurisdictions and • Corrections functions – “The system of ‘need to know’ should be replaced by a system of ‘need to share.’” The 9/11 Commission Report Policy questions 2. How to use modern data • How do we prevent crimes science for predictive before they happen? policing • Where should we 3. Extending community spend/invest public funds? policing via mobile apps 2
  • 3. 1. Need more data sharing across jurisdictions and functions 3
  • 4. The big picture 1. Case flow and decision points from crime (police) to trial (judicial) to incarceration (corrections) to reentry (social services) 2. Interaction among multiple agencies and levels of government 4
  • 5. 5
  • 6. 6
  • 7. Data sharing standards: JXDM and NIEM • “The Global Justice Extensible Markup Language (XML) Data Model (Global JXDM) and Global Justice XML Data Dictionary (Global JXDD) are the result of an effort by the justice and public safety communities to produce a set of common, well- defined data elements to be used for data transmissions.” • “Perhaps the most widely recognized and important standard of the day is the National Information Exchange Model (NIEM). ...NIEM is seen by many in the justice information- sharing community as the key standard and foundation for exchanging information across multiple domains and disciplines.” Source: “Global Justice XML Data Model,” U.S. Department of Justice; Government Technology’s Digital Communities 7
  • 8. 2. How to use modern data science for predictive policing 8
  • 9. Predictive policing… …is a multi-disciplinary, law enforcement-based strategy that brings together • advanced technologies • criminological theory • predictive analysis • tactical operations …that ultimately lead to results and outcomes of • crime reduction (and crime prevention) • management efficiency • safer communities Source: Dr. Craig Ushida, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 9
  • 10. Predictive policing (cont’d) • Universities and technology companies – Developing computer programs based on private sector models of forecasting consumer behavior • Police agencies – Use computer analysis of information (crimes, environment, intelligence) – Predict and prevent crime • The idea – Improve situational awareness (tactically /strategically) to create strategies to police more efficiently and effectively Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 10
  • 11. How does it work in real life? With situational awareness and anticipation of human behavior, police can identify and develop strategies to prevent criminal activity – By repeat offenders – On repeat victims – By locations or types of targets Police use their limited resources – To work proactively – Using effective strategies to prevent the activity BUT - The effectiveness of the strategies must be measurable – Reduced crime – Higher arrest rates for serious/stranger offenses – Broader social and justice outcomes and impacts Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 11
  • 12. Predictive Policing: A Model Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 12
  • 13. What questions can predictive policing answer? 13
  • 14. A “blended theory” of crime • Criminals and victims follow common life patterns; where those patterns overlap can lead to crimes – Geographic and temporal features influence the where and when of those patterns • Criminals make rational decisions using factors such as area & target suitability, risk of getting caught, etc. • Can ID many of these patterns and factors; can steer criminals’ decisions through interventions • Best fits ―”stranger offenses” like robberies, burglaries, and thefts – less so vice and relationship violence 14
  • 15. Some prediction methods Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 15
  • 16. Hot spot analysis / crime mapping Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 16
  • 17. Regression analysis Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 17
  • 18. Possible pitfalls Goal is to be as accurate as possible in predicting purse snatchings…e.g., do 99%+ of future purse snatchings (green triangles), land in hot spots (red and yellow areas) Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 18
  • 19. Is the data complete and correct? Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 19
  • 20. Is the result actionable? Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 20
  • 21. Civil liberties / privacy concerns Civil liberties scholars: – Have concerns over privacy and civil rights issues – Question how the police can use technology and knowledge to better fight crime without eroding civil liberties – Note that it must be constitutional – Encourage involvement of community advocates and leaders fromthe beginning to help alleviate concerns of privacy rights violations • History has shown that serious legal consequences follow when appropriate consideration is not given to privacy rights • Transparency, auditing and due diligence are critical Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 21
  • 22. Civil liberties / privacy concerns (cont’d) • Supreme Court has ruled that standards for what constitutes reasonable suspicion are relaxed in high crime areas (i.e., “hot spots”) – What constitutes a high crime area is a completely open question • Issue minor in comparison to civil and privacy rights issues raised by profiling (i.e., “hot people”) – What do we do with a prediction of re-offending that, while much better than chance (~80% accurate), is still far from definitive? Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 22
  • 23. What practitioners say Many crime analysts are already practicing predictive policing – Marginal improvements can be made and are areas of opportunity – There is a demonstrated gap between crime analysts and management – Often, analyst recommendations do not make it to the street-level cop Departments need officers / staff that – Cares and places value on data and information – Are trained (at their level) how to respond to the data/information There is a need for better data sharing and interoperability There is a need to incorporate nontraditional data, like demographics and building foreclosures for more sophisticated analysis Crime Analyst potential is relatively untapped and undervalued Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 23
  • 24. 3. Extending community policing via mobile apps 24
  • 25. City of Boston mobile apps Source: Public Technology Institute 25
  • 26. Map / List / Add Photo / Track Detail Source: Public Technology Institute 26
  • 27. City of San Francisco Spot Crime AppTM Source: Public Technology Institute 27
  • 28. Miami-Dade County self-service apps Source: Public Technology Institute 28
  • 30. Chicago Clear Map Source: Public Technology Institute 30
  • 31. Other topics • Fusion centers “A fusion center is an effective and efficient mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by analyzing data from a variety of sources.” • GIS integration “GIS in the mobile environment provides field personnel with the ability to capture new information, geocode it, and send it back so that incident command can visualize incident progress. As such, it is strategically important that GIS become an integral part of any common operating picture IT infrastructure.” Sources: U.S. Department of Justice; ESRI 31