Home Enterprise Cloud The Connected Cop is coming, enabled by data analytics

The Connected Cop is coming, enabled by data analytics

Victoria Police has leveraged SAS to bring together disparate data and paint its picture of the future "connected cop".

At SAS' Analytics Insights 2017 on Thursday, Mark Rollo and Dallas Reilly of Victoria Police described the work being done to modernise information management within the organisation.

Central to all Victoria Police information is case management, but this historically has data spread across a rich variety of sources – geospatial, digital data, visual analytics, in-car video, body-worn cameras, number-plate recognition, mobile technologies, Police Assistance Line and Online Reporting, among others.

"Information is the lifeblood of policing," the speakers said. "Quality and actionable intelligence is critical."

In partnership with SAS, Victoria Police has successfully achieved a single view of all this data, connecting and linking and presenting information in one place, regardless of the origin. The system is named BlueConnect, representing its importance in connecting the police to the community.

With BlueConnect in place, the Victoria Police now has information more readily available. Police on the ground can respond to incidents, arriving at a location far more prepared with information while police performing intelligence work can more swiftly analyse trends and seek to predict events of concern.

BlueConnect is not the end result, but merely the first big milestone on the journey to what Dallas Reilly termed "the connected cop".

Reilly portrayed a vision of the future of policing where a patrol learns of an event. The police officers respond, their phone plotting a course to the location. An officer turns on the car siren which, in turn, activates recording on the in-car camera and officer body-worn cameras for evidence.

Enroute, the officers are informed about the situation, the location, the occupants, prior offences, potential weapon threats, and more data. The officers attend to the situation, and if a taser must be deployed this too captures video for evidence.

The officers defuse the situation, speak to victims and witnesses while continuing to capture video on their body cameras. The officers return to base, their equipment uploading and synchronising video files, vehicle and other machine data, and all the other items gathered. They can process the offender swiftly, and return to the street, with a previous vast manual workload of paperwork being handled automatically.

More formally, Victoria Police refer to this as integration; the integrated officer, the integrated patrol, and the integrated vehicle.

The SAS' Analytics Insights keynote was delivered by R "Ray" Wang from Constellation Research on the need for AI-driven smart-services, followed by SAS' Kimberly Nevala on how to identify good AI project opportunities – including the very true statement, "A $2 billion idea which does not get implemented is a $0 idea."

The Black Dog Institute also spoke about the work they are performing with the assistance of SAS in using data analytics to transform mental health services and reduce suicide. SAS supports the institute in its "Data for good" programme.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

 

Popular News

 

Telecommunications