week 5: public safety
DESCRIPTION
Slides for week 5 of the course Technology in the Public Sector, Northwestern University, Summer 2012TRANSCRIPT
![Page 1: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/1.jpg)
technology in the public sector
week 5: public safety and criminal justice IT
Northwestern University MPPA 490
Summer 2012 - Greg Wass
1
![Page 2: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/2.jpg)
Criminal justice functions
• Police
• Judicial
• Corrections
Major technology issues
1. Need more data sharing across jurisdictions and functions – “The system of ‘need to
know’ should be replaced by a system of ‘need to share.’” The 9/11 Commission Report
2. How to use modern data science for predictive policing
3. Extending community policing via mobile apps
Policy questions
• How do we prevent crimes before they happen?
• Where should we spend/invest public funds?
2
![Page 3: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/3.jpg)
1. Need more data sharing across jurisdictions and functions
3
![Page 4: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/4.jpg)
The big picture
1. Case flow and decision points from crime (police) to trial (judicial) to incarceration (corrections) to reentry (social services)
2. Interaction among multiple agencies and levels of government
4
![Page 5: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/5.jpg)
5
![Page 6: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/6.jpg)
6
![Page 7: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/7.jpg)
Data sharing standards: JXDM and NIEM
• “The Global Justice Extensible Markup Language (XML) Data Model (Global JXDM) and Global Justice XML Data Dictionary (Global JXDD) are the result of an effort by the justice and public safety communities to produce a set of common, well-defined data elements to be used for data transmissions.”
• “Perhaps the most widely recognized and important standard of the day is the National Information Exchange Model (NIEM). ...NIEM is seen by many in the justice information-sharing community as the key standard and foundation for exchanging information across multiple domains and disciplines.”
Source: “Global Justice XML Data Model,” U.S. Department of Justice; Government Technology’s Digital Communities 7
![Page 8: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/8.jpg)
2. How to use modern data science for predictive policing
8
![Page 9: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/9.jpg)
Predictive policing…
…is a multi-disciplinary, law enforcement-based strategy that brings together
• advanced technologies
• criminological theory
• predictive analysis
• tactical operations
…that ultimately lead to results and outcomes of • crime reduction (and crime prevention)
• management efficiency
• safer communities
Source: Dr. Craig Ushida, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 9
![Page 10: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/10.jpg)
Predictive policing (cont’d)
• Universities and technology companies
– Developing computer programs based on private sector models of forecasting consumer behavior
• Police agencies
– Use computer analysis of information (crimes, environment, intelligence)
– Predict and prevent crime
• The idea
– Improve situational awareness (tactically /strategically) to create strategies to police more efficiently and effectively
Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 10
![Page 11: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/11.jpg)
How does it work in real life?
With situational awareness and anticipation of human behavior, police can identify and develop strategies to prevent criminal activity
– By repeat offenders
– On repeat victims
– By locations or types of targets
Police use their limited resources – To work proactively
– Using effective strategies to prevent the activity
BUT - The effectiveness of the strategies must be measurable – Reduced crime
– Higher arrest rates for serious/stranger offenses
– Broader social and justice outcomes and impacts
Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 11
![Page 12: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/12.jpg)
Predictive Policing: A Model
Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012 12
![Page 13: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/13.jpg)
What questions can predictive policing answer?
13
![Page 14: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/14.jpg)
A “blended theory” of crime
• Criminals and victims follow common life patterns; where those patterns overlap can lead to crimes
– Geographic and temporal features influence the where and when of those patterns
• Criminals make rational decisions using factors such as area & target suitability, risk of getting caught, etc.
• Can ID many of these patterns and factors; can steer criminals’ decisions through interventions
• Best fits ―”stranger offenses” like robberies, burglaries, and thefts – less so vice and relationship violence
14
![Page 15: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/15.jpg)
Some prediction methods
15 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 16: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/16.jpg)
Hot spot analysis / crime mapping
16 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 17: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/17.jpg)
Regression analysis
17 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 18: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/18.jpg)
Possible pitfalls
18 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
Goal is to be as accurate as possible in predicting purse snatchings…e.g., do 99%+ of future purse snatchings (green triangles), land in hot spots (red and yellow areas)
![Page 19: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/19.jpg)
Is the data complete and correct?
19 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 20: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/20.jpg)
Is the result actionable?
20 Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 21: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/21.jpg)
Civil liberties / privacy concerns
Civil liberties scholars: – Have concerns over privacy and civil rights issues
– Question how the police can use technology and knowledge to better fight crime without eroding civil liberties
– Note that it must be constitutional
– Encourage involvement of community advocates and leaders fromthe beginning to help alleviate concerns of privacy rights violations
• History has shown that serious legal consequences follow when appropriate consideration is not given to privacy rights
• Transparency, auditing and due diligence are critical
Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 21
![Page 22: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/22.jpg)
Civil liberties / privacy concerns (cont’d)
• Supreme Court has ruled that standards for what constitutes reasonable suspicion are relaxed in high crime areas (i.e., “hot spots”)
– What constitutes a high crime area is a completely open question
• Issue minor in comparison to civil and privacy rights issues raised by profiling (i.e., “hot people”)
– What do we do with a prediction of re-offending that, while much better than chance (~80% accurate), is still far from definitive?
22
Source: Rand Corporation, National Institute of Justice, and National Law Enforcement and Corrections Technology Center, 2012
![Page 23: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/23.jpg)
What practitioners say
Many crime analysts are already practicing predictive policing – Marginal improvements can be made and are areas of opportunity
– There is a demonstrated gap between crime analysts and management
– Often, analyst recommendations do not make it to the street-level cop
Departments need officers / staff that – Cares and places value on data and information
– Are trained (at their level) how to respond to the data/information
There is a need for better data sharing and interoperability
There is a need to incorporate nontraditional data, like demographics and building foreclosures for more sophisticated analysis
Crime Analyst potential is relatively untapped and undervalued
Source: Susan C. Smith, National Governors Association Cybercrime and Forensic Sciences Executive Policy Forum, June 2011 23
![Page 24: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/24.jpg)
3. Extending community policing via mobile apps
24
![Page 25: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/25.jpg)
City of Boston mobile apps
Source: Public Technology Institute 25
![Page 26: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/26.jpg)
Map / List / Add Photo / Track Detail Source: Public Technology Institute
26
![Page 27: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/27.jpg)
City of San Francisco Spot Crime AppTM
Source: Public Technology Institute 27
![Page 28: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/28.jpg)
Miami-Dade County self-service apps
Source: Public Technology Institute 28
![Page 29: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/29.jpg)
Source: Public Technology Institute 29
![Page 30: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/30.jpg)
Chicago Clear Map
Source: Public Technology Institute 30
![Page 31: Week 5: Public safety](https://reader033.vdocuments.net/reader033/viewer/2022060110/555a462dd8b42a83368b53bc/html5/thumbnails/31.jpg)
Other topics
• Fusion centers “A fusion center is an effective and efficient mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by analyzing data from a variety of sources.”
• GIS integration “GIS in the mobile environment provides field personnel with the ability to capture new information, geocode it, and send it back so that incident command can visualize incident progress. As such, it is strategically important that GIS become an integral part of any common operating picture IT infrastructure.”
Sources: U.S. Department of Justice; ESRI 31