Law-enforcement technologyBattle-tested technologies no employed by the police

Published 25 February 2013

Technologies employed in the wars in Iraq and Afghanistan are now hitting local streets across the United States, changing how local law enforcement investigates crimes by focusing on where crimes are most likely to happen instead of where a crime has taken place.

Technologies employed in the wars in Iraq and Afghanistan are now hitting local streets across the United States, changing how local law enforcement investigates crimes by focusing on where crimes are most likely to happen instead of where a crime has taken place.

The Washington Post reportsthat one such technology  is  “geospatial predictive analytics.” This new program has helped police in Virginia catch copper thieves and a strangler in Philadelphia. The program also helped officers deploy police across the Washington region during the mysterious shootings of military installations in 2010.

“We were able to use the information in a good way to save taxpayers money rather than haphazardly throwing things against the wall and seeing if it sticks,” Virginia State Police Capt. Steven W. Lambert of the Virginia Fusion Centertold the Washington Post.

The center coordinates statewide investigations, including the five shootings at military buildings.

Yonathan Melaku was arrested and charged in 2011 with the shootings as he attempted another shooting at the Arlington National Cemetery, but police were expecting him there after using the technology to analyze his sightlines, access points, and escape routes.

The case, led by the FBI, ended with Melaku pleading guilty to the shootings, and in January he was sentenced to twenty-five years in prison.

The technology originally was developed using satellite imaging and other data in order to help U.S. troops anticipate where explosives were buried in Iraq and Afghanistan. In addition to the geospatial predictive analytics, high-speed license plate readers, mobile fingerprint devices, and facial recognition software are all currently being used by local law enforcement.

The same predictive technology helped  Virginia State Police catch copper thieves at Dominion Virginia Powerfacilities. One of the key predictors generated by the program about which site would be hit next was how close metal dealers were to the power facilities.

Virginia State Policeare now employing the same technology to search for an arsonist who has been blamed for forty-eight fires since November.

The same technology was also used by New Jersey’s Regional Operations Intelligence Centerto track a serial strangler in Philadelphia, who killed three women. Antonio Rodriguez was linked to the crimes through DNA and was convicted of murder last summer.

All three people were caught as a result of their habits being figured out about them.

“People are creatures of habit,” Colleen McCue of DigitalGlobe, the private company that developed the technology and worked with law enforcement on the Melaku case told the Post. “It’s not a coincidence that in the grocery store your favorite cereal is at eye level.”

Researchers in California started a group called PredPol, in order to help a police department in Santa Cruz predict crime.

“In the last decade, we had a 30 percent increase in calls for service and a 20 percent decline in staff,” Zach Friend, the department’s crime analyst at the time, who is now a member of the county’s board of supervisors told the Post. “We knew we weren’t going to get more cops on the street.”

When officers begin their shifts, they are handed a map detailing which crimes may occur that day , including burglaries, car break-ins, thefts, and other crimes within an identified zone. In the first six months of the program, burglaries declined 19 percent.

 

Get the latest news from Homeland Security News Wire.

Feed Preview
4/27/17
Cybersecurity
Enable IntenseDebate Comments: 
Enable IntenseDebate Comments

A new machine-learning-based security solution being developed at the IBM Cyber Security Center of Excellence at BGU could help businesses detect phishing sites up to 250 percent faster than other methods.

4/27/17
Drones
Enable IntenseDebate Comments: 
Enable IntenseDebate Comments

Small unmanned aerial vehicles (UAVs) and other robots have become increasingly affordable, capable, and available to both the U.S. military and adversaries alike. Enabling UAVs and similar assets to perform useful tasks under human supervision — that is, carrying out swarm tactics in concert with human teammates — holds tremendous promise to extend the advantages U.S. soldiers have in field operations.

4/27/17
Anthrax
Enable IntenseDebate Comments: 
Enable IntenseDebate Comments

A team of international researchers has found that a strain of anthrax-causing bacterium thought to have been viable eighty years after a thwarted First World War espionage attack, was, in reality, a much younger standard laboratory strain. The team speculates that the mix-up was due to commonplace laboratory contamination.

4/27/17
Infrastructure protection
Enable IntenseDebate Comments: 
Enable IntenseDebate Comments

When you suffer a fall, an on-the-field collision or some other traumatic blow, the first thing the doctor will do is take an X-ray, CT scan, or MRI to determine if anything has been damaged internally. Researchers at the National Institute of Standards and Technology (NIST) are using the same principle, but in a more powerful form, to detect corrosion, the primary danger threatening the health of the steel framework within the nation’s bridges, roads and other aging physical infrastructure.