What problems does this approach to crime fighting pose

Assignment Help Basic Computer Science
Reference no: EM131398014

New York City Embraces Data-Driven Crime Fighting

Nowhere have declining crime rates been as dramatic as in New York City. In 2013, Manhattan had the lowest number of shootings, burglaries, and murders since the city began keeping formal records in the early 1960s. Crimes during 2014 were also historically low. Why is this happening? Experts point to a number of factors, including demographic trends, the proliferation of surveillance cameras, and increased incarceration rates. However, New York City would also argue it is because of its proactive crime prevention program along with district attorney and police force willingness to deploy information technology aggressively. Cyrus Vance, Jr., New York County's district attorney, is vigorously mining more crime-fighting information from the data collected by the city to drive crime rates even lower. He believes that New York could get crime rates to zero-if one looked harder at the data. There has been a revolution in the use of big data for retailing and sports (think baseball and Moneyball) as well as for police work. New York City has been at the forefront in using data intensively for crime fighting, and other cities have replicated its CompStat crime-mapping program. CompStat features a comprehensive, citywide database that records all reported crimes or complaints, arrests, and summonses in each of the city's 76 precincts, including their time and location. The CompStat system analyzes the data and produces a weekly report on crime complaint and arrest activity at the precinct, patrol borough, and citywide levels. CompStat data can be displayed on maps showing crime and arrest locations, crime hot spots, and other relevant information to help precinct commanders and NYPD's senior leadership quickly identify patterns and trends and develop a targeted strategy for fighting crime, such as dispatching more foot patrols to highcrime neighborhoods. Vance and his team think much more can be done with data to stop crime. While dealing with more than 105,000 cases per year in Manhattan, New York's assistant district attorneys did not have enough information to make fine-grained decisions about charges, bail, pleas, or sentences. They couldn't separate minor delinquents from serious offenders quickly. In 2010, Vance's team created a Crime Strategies Unit (CSU) to identify and address crime issues and target priority offenders for aggressive prosecution. Rather than information being left on thousands of legal pads in the offices of hundreds of assistant district attorneys, CSU gathers and maps crime data for Manhattan's 22 precincts to depict criminal activity visually, based on multiple identifiers such as gang affiliation and type of crime. Police commanders supply a list of each precinct's 25 worst offenders, which is added to a searchable database that now includes more than 9000 chronic offenders. A large percentage are recidivists who have been repeatedly convicted of grand larceny, active gang members, and other priority targets. These are the people law enforcement wants to know about if they are arrested. This database is used for an Arrest Alert System. When someone considered a priority defendant is picked up (even on a minor charge or parole violation) or arrested in another borough of the city, any interested prosecutor, parole officer, or police intelligence officer is automatically sent a detailed email. The system can use the database to send arrest alerts for a particular defendant, a particular gang, or a particular neighborhood or housing project, and the database can be sorted to highlight patterns of crime ranging from bicycle theft to homicide. The alert system helps assistant district attorneys ensure that charging decisions, bail applications, and sentencing recommendations address that defendant's impact on criminal activity in the community. The information CSU gathers and disseminats through the arrest alert system differentiates among those for whom incarceration is an imperative from a community-safety standpoint and those defendants for whom alternatives to incarceration are appropriate and will not negatively affect overall community safety. If someone leaves a gang, goes to prison for a long time, moves out of the city or New York state, or dies, the data in the Arrest Alert System are edited accordingly. In speeches praising intelligence-driven prosecution, Vance often cites the example of a 270- pound scam artist who for over a decade made a living by bumping into pedestrians in the Times Square area and demanding money, claiming they had broken his glasses. He had been convicted 19 times but only for a misdemeanor charge and never served more than 5 months in jail. When the CSU flagged him after his arrest in July 2010, he was convicted of felony robbery and sentenced to 3½ to 7 years in prison. Information the CSU developed helped Vance's Violent Criminal Enterprises Unit break up the most violent of Manhattan's 30 gangs. Since 2011, 17 gangs have been dismantled. According to New York's chief assistant district attorney, Karen Friedman Agnifilo, murders dropped from 70 in 2010 to 29 in 2013 because the DA's office and police now had the information to identify the people driving crime in Manhattan and to move these people off the streets and behind bars. There's another side to this story, however. When prosecutors begin to compile databases for data-driven crime fighting, one needs to ask what people have been selected for inclusion in these databases, what are the selection criteria, and how harmful is this practice? Could the criminal justice databases include people who really shouldn't be there and nevertheless are targets for police scrutiny? According to Steven Zeidman, director of the criminal-defense clinic at the City University of New York (CUNY) School of Law, the answer is yes. More than one thousand people are arrested in New York City each day. An overwhelming and disproportionate number are people of color arrested for minor offenses such as riding a bicycle on the sidewalk or jaywalking. Zeidman recalled a time when he was in court with a teenager arrested for jaywalking. The arresting officer said he had stopped the young man because he was wearing a red shirt that was known to be a gang color. The young man was not a gang member, but he's probably in the database.

Case Study Question

1. What are the benefits of data-driven prosecution for crime fighters and the general public?

2. What problems does this approach to crime fighting pose?

3. What people, organization, and technology issues should be considered when setting up information systems for intelligence-driven prosecution?

Reference no: EM131398014

Questions Cloud

Example of a genetically modified organism : Describe one specific example of a genetically modified organism (GMO).  This may be a plant or an animal and may currently be on the market, was on the market in the past, or is under development.
Name and describe the three major capabilities of a dbms : Define a database management system (DBMS), describe how it works, and explain how it benefits organizations.
Provide a clear and concise summary of the given article : Provide a clear and concise summary of the article, including the major points and conclusions. How the cited work relates to your above explanation AND how it relates specifically to the content of the assigned module/week.
What were three ways states and societies attempted : European society was in a state of upheaval and searching for order after coming out of the Age of Religious Wars. Based on Lualdi's sources, what were three ways states and societies attempted to create order in this disorderly time? How successf..
What problems does this approach to crime fighting pose : What people, organization, and technology issues should be considered when setting up information systems for intelligence-driven prosecution?
Name the 7 major groups of microbes : 1. Name the 7 major groups of microbes. Name one organism that belongs to each group. Do they cause diseases? 2. How do the major groups of microbes differ in terms of their cell wall structure? Rank them based on their relative sizes.
Nanopore sequencing hold real promise : Please no plagiarism and cite your sources and references .Have we reached the limit of DNA sequencing technology? Or do completely new techniques like Nanopore sequencing hold real promise?
What were the moral implications of american imperialism : Identify the countries or areas where the United States engaged in imperialistic actions during the period from about 1870 to 1914.Discuss why each area was important to American empire building (political, economic, and social). Explain America's ..
Why was data management so problematic at ari : Describe ARI's earlier capabilities for data analysis and reporting and their impact on the business.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd