Crime Mapping: The Great Equalizer

Crime Mapping: The Great Equalizer

Crime Mapping

One of the most interesting and useful tools that the Cloud has developed is mapping. When the Global Positioning System was developed it was envisioned simply as a tool to assist Military leaders to keep track of assets on the battlefield. Mapping has grown so far beyond this relatively simple use that it would be nearly as hard to do without as cell phones.

Of course there is much more to mapping than peeking at your smart phone to locate the nearest latte’ stand or even watching the cops on TV tracking the bad guys on their tablets. Mapping combined with Big Data is useful in everyday and long term risk management, at the personal and corporate levels.

Risk Management, whether as a formal, corporate process or an daily personal evaluation of the safest route to the grocery store, depends on getting all the useful information you can find and process. Knowledge of the potential for criminal activity in an area is useful information, whether we are allocating law enforcement resources or looking for the best place to park our car on a late night.

We are all familiar with the pre-Cloud concept of crime mapping from watching old detective movies. The detectives are sitting in the station, cigarettes dangling from their mouths, staring at a map tacked to the wall which shows all of the bad guy’s hits. If he stares long enough, the detective will figure out where the crook is going to strike next, and then the cops can be there to nab him.

Using crime mapping as a risk management tool is a similar process, except that we can use the resources of the cloud to do the hours of staring at the map for us. The data that goes into a crime mapping application combines a mapping app with crime data from law enforcement. The law enforcement data is usually part of the public record and available to anyone. Google Maps is the most popular mapping application, although app developers are free to use the application whose interface they are most familiar and comfortable with.

Crime Mapping Apps

Whenever I hear or see a police scanner I think of my old Granddad.

Back in the mid-70’s Granddad got a police scanner which ran all day and night in his bedroom. My grandparents lived on a hill over looking a medium sized city in Oregon. Not a big enough town that there would be constant chatter on the scanner, but enough that when something really exciting happened, Granddad could take his binoculars to the back porch and watch what was going on.

The Crime Mapping Applications available for the general public on mobile devices do not all provide the immediacy that Granddad’s scanner had. The data that the app uses may take minutes or hours to update for the general public. Some of the developers who are building crime mapping are tailoring their services to meet the needs of police departments and other first responders.

crimemapping-cloud

CrimeMapping.com

The Omega Group, developers of CrimeMapping.com Mobile app have also developed FireView, an analysis tool for fire departments to facilitate tracking fire and EMS responses. CrimeView and CrimeView NEARme are leading desktop and mobile analytical tools for law enforcement professionals. The CrimeMapping.com Mobile app allows users to view maps of crime activity near their current location, as well as investigating crime history near homes, businesses and schools. Incidents can be filtered by the time of occurrence and date. The map will show the type of crime with a distinctive icon, and the app allows filtering by the type of crime as well.

RAIDS Online

crime-mapping-cloud

BAIR Analytics has worked with law enforcement agencies around the world for more than 20 years. BAIR stands for Behavioral Analysis & Intelligence Resources, and the company takes a scientific approach to providing public safety, national security and defense industry tools. RAIDS Online is a desktop and mobile tool designed to help law enforcement agencies disseminate crime information quickly to the public they serve. The service combines crime mapping with dashboard analytic tools to enhance public safety. Users are able to filter by date, location, and 27 crime types. Data is displayed with eight layers of limited offense information to protect victim privacy.

Balancing Privacy and Usefulness

One truism of any mapping application is that as more users participate in the service, the better and more accurate the service becomes. Both the Omega Group and BAIR Analytics enjoy the participation of numerous law enforcement agencies in North America and worldwide. Information about an incident may have to go through several administrative layers before the general public gets to see it on their smart phone or tablet. However, if a user discovers that there was a burglary two blocks away from his home within the last few days, he is more likely to pay better attention to the mysterious teenager wandering the neighborhood when he should be in school.

By Peter Knight

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

THE FUTURE OF BIG DATA AND DNS ANALYTICS

THE FUTURE OF BIG DATA AND DNS ANALYTICS

Big Data and DNS Analytics Big Data is revolutionizing the way admins manage their DNS traffic. New management platforms are combining historical data with advanced analytics to inform admins about possible performance degradation in their networks. Not only that, but they also have the ability to suggest ways to optimize network configurations for faster routing.…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…