WA Police use business intelligence to fight crime
- 09 August, 2013 09:52
Western Australia Police have reduced crime through the use of predictive analytics and GPS maps which show crime hotspots in the state.
Speaking at the SAS Forum in Sydney, WA Police's director of strategy and performance, Shaun Hodges, told delegates that by using business intelligence (BI) it has been able to build up a picture of crimes committed over the past five years.
“Assaults peak in summertime because of increased alcohol consumption and more daylight hours,” he said. “That’s OK, but I want to know more. One of the innovations we have looked at is forecasting crime and we’ve worked out that there are about 17,000 crimes a month in Western Australia.”
All of this information is fed into GPS maps of the state. Hodges said that it is now forecasting with relative accuracy where crimes are going to happen.
- Australian Federal Police trial in-car tablets
- The Grill: SAS CEO, Dr Jim Goodnight
- Business intelligence revenues to reach $475.6 million: Gartner
“We started an operation called Operation Safeplace where we took this [map] information, linked up with several government organisations and created a safe place to take children. From there, Mission Australia took them to their homes or into care," he said.
“As a consequence, that heap map shrunk because we were able to affect it."
Hodges added that the police have combined data from other government agencies to identify areas of social disadvantage.
Bus routes and CCTV data have also been overlaid on to the maps.
“If a crime is committed in one area, are there places around it that people can walk to easily? Most crime is opportunistic so you have to try and design out the opportunity.”
WA Police has also used the data to assign patrols to hotspot areas in a bid to increase response times when a crime occurs.
“We have to apply scientific methods to demystify data which will deliver a safer community for people in Western Australia.”
He added that the police analyse social media using text mining.
“Our crime analysts used to spend two hours every day looking at the previous day’s reports. We wrote some code which skims all of the data from the previous night so it now takes 30 seconds.”
In addition, WA Police now sends messages via Twitter or Facebook to people who have organised large parties telling them that the party is been monitored.
According to Hodges, out of control parties have decreased in the state since it started doing this.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
CIOs to Become In-House Brokers -- and That's a Good Thing
The future of computing
10 Hot Hadoop Startups to Watch
The future of computing
How to Switch From iPhone 5S to BlackBerry Z30 (and Why)
Facebook Graph Search POV
A description and analysis of Facebook Social Graph, monetization opportunities and its value to businesses.
IBM X-Force Threat Intelligence
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
The F5 DDoS Protection Reference Architecture part 3 of 3
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.