Crime Mapping: The Great Equalizer

Crime Mapping: The Great Equalizer

Crime Mapping

One of the most interesting and useful tools that the Cloud has developed is mapping. When the Global Positioning System was developed it was envisioned simply as a tool to assist Military leaders to keep track of assets on the battlefield. Mapping has grown so far beyond this relatively simple use that it would be nearly as hard to do without as cell phones.

Of course there is much more to mapping than peeking at your smart phone to locate the nearest latte’ stand or even watching the cops on TV tracking the bad guys on their tablets. Mapping combined with Big Data is useful in everyday and long term risk management, at the personal and corporate levels.

Risk Management, whether as a formal, corporate process or an daily personal evaluation of the safest route to the grocery store, depends on getting all the useful information you can find and process. Knowledge of the potential for criminal activity in an area is useful information, whether we are allocating law enforcement resources or looking for the best place to park our car on a late night.

We are all familiar with the pre-Cloud concept of crime mapping from watching old detective movies. The detectives are sitting in the station, cigarettes dangling from their mouths, staring at a map tacked to the wall which shows all of the bad guy’s hits. If he stares long enough, the detective will figure out where the crook is going to strike next, and then the cops can be there to nab him.

Using crime mapping as a risk management tool is a similar process, except that we can use the resources of the cloud to do the hours of staring at the map for us. The data that goes into a crime mapping application combines a mapping app with crime data from law enforcement. The law enforcement data is usually part of the public record and available to anyone. Google Maps is the most popular mapping application, although app developers are free to use the application whose interface they are most familiar and comfortable with.

Crime Mapping Apps

Whenever I hear or see a police scanner I think of my old Granddad.

Back in the mid-70’s Granddad got a police scanner which ran all day and night in his bedroom. My grandparents lived on a hill over looking a medium sized city in Oregon. Not a big enough town that there would be constant chatter on the scanner, but enough that when something really exciting happened, Granddad could take his binoculars to the back porch and watch what was going on.

The Crime Mapping Applications available for the general public on mobile devices do not all provide the immediacy that Granddad’s scanner had. The data that the app uses may take minutes or hours to update for the general public. Some of the developers who are building crime mapping are tailoring their services to meet the needs of police departments and other first responders.

crimemapping-cloud

CrimeMapping.com

The Omega Group, developers of CrimeMapping.com Mobile app have also developed FireView, an analysis tool for fire departments to facilitate tracking fire and EMS responses. CrimeView and CrimeView NEARme are leading desktop and mobile analytical tools for law enforcement professionals. The CrimeMapping.com Mobile app allows users to view maps of crime activity near their current location, as well as investigating crime history near homes, businesses and schools. Incidents can be filtered by the time of occurrence and date. The map will show the type of crime with a distinctive icon, and the app allows filtering by the type of crime as well.

RAIDS Online

crime-mapping-cloud

BAIR Analytics has worked with law enforcement agencies around the world for more than 20 years. BAIR stands for Behavioral Analysis & Intelligence Resources, and the company takes a scientific approach to providing public safety, national security and defense industry tools. RAIDS Online is a desktop and mobile tool designed to help law enforcement agencies disseminate crime information quickly to the public they serve. The service combines crime mapping with dashboard analytic tools to enhance public safety. Users are able to filter by date, location, and 27 crime types. Data is displayed with eight layers of limited offense information to protect victim privacy.

Balancing Privacy and Usefulness

One truism of any mapping application is that as more users participate in the service, the better and more accurate the service becomes. Both the Omega Group and BAIR Analytics enjoy the participation of numerous law enforcement agencies in North America and worldwide. Information about an incident may have to go through several administrative layers before the general public gets to see it on their smart phone or tablet. However, if a user discovers that there was a burglary two blocks away from his home within the last few days, he is more likely to pay better attention to the mysterious teenager wandering the neighborhood when he should be in school.

By Peter Knight

Sorry, comments are closed for this post.

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

How To Use Big Data And Analytics To Help Consumers

How To Use Big Data And Analytics To Help Consumers

Big Data Analytics Businesses are under increasing pressure to develop data-driven solutions. The competitive advantage gained by a successful strategy can be immense. It can create new opportunities and help businesses to react to different scenarios or sudden changes in the market. But innovation and resilience are not easily achieved, and organizations always face difficult…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Newton’s First Law and Cloud

Newton’s First Law and Cloud

Scaling the Mountain “You’re kidding me, the server went down? What are we supposed to do about launching the new website? We promised our partners that we would go live this weekend. I’ll admit its forty new pages but it’s just a website. How long before it all gets fixed?” I’ll bet you have been to this…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor