A world of artificial intelligence and augmented reality provides criminals an avenue to avoid detection by law enforcement and continue an unlawful lifestyle. A lack of essential technical skills, artificial intelligence, and augmented reality capabilities within law enforcement will provide an advantage to criminals within cyber and physical environments. Local, state, and federal law enforcement agencies that solely focus on brick-and-mortar crimes, or crimes committed in the physical sense, will diminish their usefulness within the next decade.
As technology evolves so does crime, and the question is whether state and local police lack capabilities to safely prevent and mitigate crime within their communities. Cold cases, forensic bias, and human error will be history within the next decade. The emergence of 5G connectivity will enable artificial intelligence and augmented reality to enhance law enforcement interaction with their respective community, consequentially resolving crime with evidence-based tactics at unprecedented speed.
First, it is crucial to recognize that police will require technical skills to resolve issues and solve crimes as law enforcement agencies strive to understand malicious cyber activity and the effects on citizens. Identity theft, financial crimes, unlawful access to personal and business software and web-based platforms, and confidential information leakage are only a few of the many cybercriminals targets. Federal law enforcement does not have the capacity or capabilities to prevent nor prohibit cyber criminality at the local level. Therefore, it is the responsibility of a chief of police and staff to ensure police are trained and remain ready in the cyber realm.
Facial recognition technology, also known as FRT, compares multiple images to match a humans face, confirming the identity of a suspect or victim (Service, 2020). Law enforcement agencies need this capability to eliminate errors in human bias and witness manipulation. The images are pulled from a database of mugshots, body camera images, social media photos, and other public information sources within legal capacity (Service, 2020). The storage of biometrics poses security concerns for the server and data privacy, which will be addressed later.
Augmented reality, if used correctly, keeps the officer, residents, and local patrons safe. For example, officers arriving at a patrol scene can utilize AR glasses to obtain information regarding previous criminal history in the area, scan license plates, and even find exits to a building in pursuit of a suspect (Mirkow&Gelles, 2020). Additionally, an officer can identify whether a person has an immediate health condition that needs attention, preparing the officer to perform life-saving procedures with advised medical equipment (Mirkow&Gelles, 2020).
Evidence-based policing is arguably the most revolutionary technology for law enforcement. The technology can provide real-time advisory to law enforcement agencies, giving researchers and computer programmers access to the most significant outcome of different tactics (Mirkow & Gelles, 2020). The theory proves vital at the local and federal levels, including drug raids, border patrol, and even domestic violence disputes (Mirkow & Gelles, 2020). Not only will this capability increase efficiency in crime-solving, but it will also provide an accurate account of the crime with sufficient resolution.
While many technologies await law enforcement utilization, three key opportunities lie in bringing innovative technology into law enforcement. Quality risk management, effective crime prevention, and fostering a positive community-police relationship create a holistic approach to building an effective and accountable police force while preventing and solving criminal activity promptly.
Analysis
Quality Risk Management
According to the Department of Justice (2018), the use of force and pursuit operations rank as the highest-risk activities in law enforcement. Incorporating technology in risk management can minimize physical harm to citizens and officers and property damage by removing human error and potentially extreme lethality. The data collected from technology can also be used in a court of law to determine guilt or innocence. For example, a pursuit operation incorporating an unarmed drone and thermal imaging will assist law enforcement in tracking a suspect regardless of the time of day. Additionally, facial recognition technology with accurate data management can confirm whether the right person is in custody.
The use of force is a controversial and sensitive topic and promotes strain between the police force and the local community. While there is no technology to eliminate human bias, automated tools help reduce the risk of bias during traffic and routine police stops. Emerging technology, such as artificial intelligence, machine learning, and augmented reality, provides evidence-based policing, which provides analytical hypotheses on the location and linkage of suspects with advanced forensic techniques in a fraction of the time it takes for detectives to conclude a solution (Mirkow & Gelles, 2020). The analysis also provides police a buffer between unconscious bias and their duty to the community in crime prevention (Mirkow & Gelles, 2020).
Cloud storage and edge computing can provide real-time data to police patrols to identify whether a vehicle or the driver has previous law violations or warrants without pulling the vehicle over and obtaining identification, an emerging tool known as the Fog-to-Cloud System (Rejiba, Masip-Bruin, Jurnet, Marin-Tordera, & Ren, 2018). A mobile server connected to a secured cloud database providing real-time information on a vehicle and its driver reduces potentially dangerous interaction between citizens and police and reduces the number of resources and amount of time in traffic stops.
Effective Crime Prevention
Over 8 million tips to help locate missing children are provided to a team of approximately 25 people (Mirkow & Gelles, 2020). Sifting and analyzing this information could take decades to find these children, and in most cases that will be too late. Deploying artificial intelligence to analyze this data can exponentially reduce time spent and potentially locate the child to reunite them with their families and hold the perpetrators accountable (Mirkow & Gelles, 2020). Technology such as closed-circuit television, or CCTV, provides a live feed to police stations, which provides first-hand information in place of physical police presence (Mirkow & Gelles, 2020). This technology is implemented in numerous locations globally and already proves a powerful tool in crime prevention. CCTV assisted Indian law enforcement to find nearly 3,000 missing persons in just four days (Mirkow & Gelles, 2020).
Police-Community Relationship
Law enforcement and community relations are a sensitive topic in the 21st century. While there are historical aspects to consider, a way forward requires implementing augmented reality, or AR, to train, assess, and employ police officers research on adult learning theory suggests that hands-on, problem-solving learning approaches foster skills and knowledge that translate back into behavior change (Office of Community Oriented Policing Services, 2018). Statistics have also shown that de-escalation exercises and tactics training significantly reduced the amount of injury and death of police officers and citizens over the past decade (Office of Community Oriented Policing Services, 2018), consequently reducing strained fear relationships within the local community. Augmented reality goggles provide hands-on training with real-world scenarios without exhausting police officers already strained resources in a fraction of the time. The AR toolkit can provide various scenarios, including cultural sensitivity, psychological crisis, and even pursuit operations.
Organizational Challenges
While emerging technology is advantageous to law enforcement, technical and organizational challenges arise with implementation. The first challenge is the technical expertise required to maintain databases and networks of innovative technology. The resources and personnel necessary to maintain such technology consist of a financial budget that some precincts and cities may not afford without government assistance. Secondly, law enforcement will require an in-depth defense of database and network access. Cybersecurity professionals can provide training, access and authentication protocols, and advisory to law enforcement and local government leadership on why and how to protect the infrastructure from common and unprecedented malicious activity. The protection of cloud data is crucial in law enforcement as the justice system relies on the information, leaving little to no room for error in data misconfiguration, privacy breaches, and ransomware.
Cybersecurity Requirements
Privacy
As mentioned before, the duty of the police requires preventing crime and protecting citizens from crime. Privacy and confidentiality breaches brought to public attention by brute force remain among the top cybersecurity threats in the United States. Shortly after the EU passed the General Data Protection Regulation (GDPR), the CEOs of Apple and Microsoft called on the U.S. to pass new privacy laws (Burt, 2019). The technologies mentioned above, facial recognition and augmented reality, retrieve and save sensitive data. Therefore, the security measure must be implemented through the development and deployment phase of police technology to prevent leaks. Considerations in information security are containerized applications, restricted access, and zero-trust security architecture (NIST, 2020).
Data Integrity
As previously mentioned, sensitive data stored in physical or cloud servers pose a higher risk of manipulation, theft, and breaches. If law enforcement and the justice system rely on data to identify, confirm, and prosecute suspects or identify victims, data securitys vitality is critical to operations. Disruption, distortion, and denial of data are the ultimate threats to police investigations and prosecution (Belani, 2020). A robust cloud security strategy can mitigate threats. Furthermore, an emergency response plan and the backup server can eliminate disruption in operations (Belani, 2020).
Artificial Intelligence
Artificial intelligence, employed lawfully, can and will increase productivity and security. Machine learning, a derivative of artificial intelligence, studies the networks packet traffic, detecting malicious packets intrusion. In conjunction with machine learning, AI can build reports and analysis for law enforcement within minutes, reducing the number of staff hours necessary to account for accurate data and analysis. AI/ML can pose a risk to security, as malicious actors utilize this technology to access networks (Belani, 2020). For example, sophisticated criminals can use machine learning to access law enforcement data and manipulate a potential suspects supporting crime violation evidence or remove a victims identity.
References
Belani, G. (2020).5 Cybersecurity Threats to Be Aware of in 2020. Retrieved from IEEE Computer Society : https://www.computer.org/publications/tech-news/trends/5-cybersecurity-threats-to-be-aware-of-in-2020
Burt, C. (2018, September 5).Malware Targeting Biometric Security and Strong Authentication Observed in Brazil Bank Attack . Retrieved from BiometricUpdate :https://www.biometricupdate.com/201809/malware-targeting-biometric-security-and-strong-authentication-observed-in-brazil-bank-attacks
Copple, C., & Copple, J. (2018).Risk Management in Law Enforcement: Discussions on Identifying and Mitigating Risk for Officers, Departments and the Public. Washington DC: Office of Community Oriented Policing Services. Retrieved from https://cops.usdoj.gov/RIC/Publications/cops-w0865-pub.pdf
Mirkow, A., & Gelles, M. (2020).Deloitte. Retrieved from The Future of Policing :https://www2.deloitte.com/us/en/pages/public-sector/articles/future-of-policing-and-law-enforcement-technology-innovations.html
NIST. (2020).SP 800-207 (Second Draft) Zero Trust Architecture.doi:10.6028/NIST.SP.800-207
Office of Community Oriented Policing Services. (2018).Risk Management in Law Enforcement.Department of Justice , Washington DC . Retrieved fromhttps://cops.usdoj.gov/RIC/Publications/cops-w0865-pub.pdf
Rejiba , Z., Masip-Bruin, X., Jurnet, A., Marin-Tordera , E., & Ren, G.-J. (2018). F2C-Aware: Enabling Discovery in Wi-Fi Powered Fog-to-Cloud (F2C) Systems.2018 6th IEEEInternation Conference on Mobile CLoud Computing, Services, and Engineering (MobileCloud)(pp. 113-116). Bamberg: IEEE. doi:10.1109/MobileCloud.2018.00025
Service, T. N. (2020, September 25).Congressional Research Service Report: Facial Recognition Technology & Law Enforcement: Select Constitutional Considerations..Retrieved from Targeted News Service :https://advance-lexis-com.proxy.library.georgetown.edu/document/?pdmfid=1516831&crid=1dd17cda-596d-4235-aa9a-67fc8a26e065&pddocfullpath=%2Fshared%2Fdocument%2Fnews%2Furn%3AcontentItem%3A60XN-HD91-JC11-13K6-00000-00&pdcontentcomponentid=299219&pdteaserkey=
(Visited 219 times, 109 visits today)
Here is the original post:
From High-Speed Pursuit to High-Speed Connection: Emerging Technology in Law Enforcement - HSToday
- Setting up a Virtual Server on Ninefold - Video [Last Updated On: February 26th, 2012] [Originally Added On: February 26th, 2012]
- ScaleXtreme Automates Cloud-Based Patch Management For Virtual, Physical Servers [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Secure Cloud Computing Software manages IT resources. [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Dell unveils new servers, says not a PC company [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Wyse to Launch Client Infrastructure Management Software as a Service, Enabling Simple and Secure Management of Any ... [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- As the App Culture Builds, Dell Accelerates its Shift to Services with New Line of Servers, Flash Capabilities [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Terraria - Cloud In A Ballon - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Ethernet Alliance Interoperability Demo Showcases High-Speed Cloud Connections [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- RSA and Zscaler Teaming Up to Deliver Trusted Access for Cloud Computing [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- [NEC Report from MWC2012] NEC-Cloud-Marketplace - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- IBM SmartCloud Virtualized Server Recovery - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- BeyondTrust Launches PowerBroker Servers Windows Edition [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- Ericsson joins OpenStack cloud infrastructure community [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- ScaleXtreme Cloud-Based Patch Management Open for New Customers [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- RootAxcess - Getting Started - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- How to Create a Terraria Server 1.1.2 (All Links Provided) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Dell #1 in Hyperscale Servers (Steve Cumings) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Managing SAP on Power Systems with Cloud technologies delivers superior IT economics - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- AMD Acquires Cloud Server Maker SeaMicro for $334M USD [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Web Host 1&1 Provides More Flexibility with Dynamic Cloud Server [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Leap Day brings down Microsoft's Azure cloud service [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- RightMobileApps White Label Program - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- bzst server ban #2 - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- “Cloud storage served from an array would cost $2 a gigabyte” [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- More Flexibility with the 1&1 Dynamic Cloud Server [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Hub’s future jobs may be in cloud [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cloud computing growing jobs, says Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- TurnKey Internet Launches WebMatrix, a New Application in Partnership with Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cebit 2012: SAP Cloud Computing Strategy - Introduction - Video [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Dome9 Security Launches Industry's First Free Cloud Security for Unlimited Number of Servers [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Servers Are Refreshed With Intel's New E5 Chips [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Samsung's AllShare Play pushes pictures from phone to cloud and TV [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Google drops the price of Cloud Storage service [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Intel Server Technology: Powering the Cloud to Handle 15 Billion Connected Devices [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Swisscom IT Services Launches Cloud Storage Services Powered by CTERA Networks [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- KineticD Releases Suite of Cloud Backup Offerings for SMBs [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- First Look: Samsung Allshare Play - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Bill The Server Guy Introduces the New Intel XEON e5-2600 (Romley) Server CPU's - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Cisco servers have Intel Xeon E5 inside [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Cisco rolls out UCS servers with Intel Xeon E5 chips [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- From scooters to servers: The best of Launch, Day One [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Computer Basics: What is the Cloud? - Video [Last Updated On: March 9th, 2012] [Originally Added On: March 9th, 2012]
- Could the digital 'cloud' crash? [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Dome9 Security Launches Free Cloud Security For Unlimited Number Of Servers [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Cloud computing 'made in Germany' stirs debate at CeBIT [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- New Key Technology Simplifies Data Encryption in the Cloud [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- Can a private cloud drive energy efficiency in datacentres? [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Porticor's new key technology simplifies data encryption in the cloud [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Borders + Gratehouse Adds Three New Clients in Cloud Sector [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Dell to invest $700 mn in R&D, unveils 12G servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Defiant Kaleidescape To Keep Shipping Movie Servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Data Centre Transformation Master Class 3: Cloud Architecture - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 1/3 - Video #310 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Cloud Computing - 28/02/12 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- SYS-CON.tv @ 9th Cloud Expo | Nand Mulchandani, CEO and Co-Founder of ScaleXtreme - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Oni Launches New Cloud Services for Enterprises Using CA Technologies Cloud Platform [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Advanced Technology - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Infrastructure - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- The Hidden Risk of a Meltdown in the Cloud [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- FireHost Launches Secure Cloud Data Center in Phoenix, Arizona [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Panda Security Launches New Channel Partner Recruitment Campaign: "Security to the Power of the Cloud" [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- NetSTAR, Inc. Announces Safe and Secure Web Browsers for iPhones, iPads, and Android Devices [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Amazon Cloud Powered by 'Almost 500,000 Servers' [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- NetSTAR Announces Secure Web Browsers For iPhones, iPads, And Android Devices [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Be Prepared For When the Cloud Really Fails [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Dr. Cloud explains dinCloud's hosted virtual server solution - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- New estimate pegs Amazon's cloud at nearly half a million servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Amazon’s Web Services Uses 450K Servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Saving File On Internet - Cloud Computing - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 2/3 - Video #311 - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Linux servers keep growing, Windows & Unix keep shrinking [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Cloud Desktop from Compute Blocks - Video [Last Updated On: March 16th, 2012] [Originally Added On: March 16th, 2012]
- Amazon EC2 cloud is made up of almost half-a-million Linux servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- HP trots out new line of “self-sufficient” servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Cloud Web Hosting Reviews - Australian Cloud Hosting Providers - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Using Porticor to protect data in a snapshot scenario in AWS - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- CDW - Charles Barkley - New Office - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Nearly a Half Million Servers May Power Amazon Cloud [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Morphlabs CEO Winston Damarillo talks about their mCloud Rack - Video [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]
- AMD reaches for the cloud with new server chips [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]