Government Technology

    Digital Communities
    Industry Members

  • Click sponsor logos for whitepapers, case studies, and best practices.
  • McAfee

Objections to New York City’s Attempts to Prevent Crime and Terrorism



Internet Routes Around US
Mikey G Ottawa. Creative Commons License Attribution-Share Alike 2.0 Generic

Surveillance vs. Privacy

August 13, 2012 By

Did anyone notice what didn’t happen at the Olympics just concluded in London? No terrorist incidents. The Brits have learned from previous attacks and have instituted massive surveillance systems in an attempt to predict and prevent terrorist acts. But such systems collide with privacy and personal freedom. Is there a balance between privacy and surveillance?

Last week, New York City Mayor Michael Bloomberg announced the Domain Awareness System, a sort of one-stop shop for crime and counterterrorism data that’s accessible in real time to New York Police Department officers and other law enforcement personnel. By monitoring surveillance cameras, radiation monitors, license plate readers and more — the NYPD hopes to prevent crime and terrorism.

Almost immediately, privacy advocates decried the system as intrusive and subject to abuse, especially as Microsoft intends to roll it out nationwide and share the profits with New York City.

New York City has a long history of attempting to predict and prevent threats to public safety. In the early 1990s, a “cave cop” named Jack Maple, using only butcher paper and crayons, devised a detailed crime map of subway stations. In a 1999 interview with Government Technology, Maple explained that COMSTAT or COMPSTAT, as it came to be called, was an attempt to predict where crimes would occur, rather than just responding to crimes after the fact. "I called them the charts of the future," said Maple in the 1999 story. "On 55 feet of wall space, I mapped every train station in New York City and every train. Then I used crayons to mark every violent crime, robbery and grand larceny that occurred. I mapped the solved vs. the unsolved."

Mapping was the first step. The next was to use the data to deploy Transit Police where they would be most effective. That was above Maple's pay grade, but William Bratton — hired by the Transit Police to cut crime — took notice of Maple's "charts of the future," and deployed officers based on them. Crime dropped in the subway system, and Bratton took COMPSTAT and Maple with him when he was promoted to head the NYPD. Bratton made officers responsible for offenses committed in their areas, and instituted detailed follow-up sessions where officers were grilled — and sometimes fired — when crime rose.

New York City's success with COMPSTAT led to other cities instituting similar systems. Maple, in the 1999 Government Technology interview, said that while across the country, murder dropped 21 percent, New York City's murder rate dropped 70 percent. Other cities reported similar results in reducing crime, and "predictive analytics" become a major crime-prevention player. Computers replaced the butcher paper and crayons, and other technology — including surveillance cameras, gunshot detection equipment, license plate readers and more —joined the fight.

There’s an obvious difference, however, between COMPSTAT and the Domain Awareness system. COMPSTAT depended on previous patterns and locations of crime to help officers intercede, and that approach should still prove effective for criminal activity. But the attack that brought down the World Trade Center towers was a global first.

So instead of a great number of similar criminal offenses — following a predictable method of operation — terrorists conduct a few one-off horrors, and so prediction is much more difficult, and the consequences exponentially more severe. Terrorists roamed through Mumbai in 2008, for example, killing at random more than 160 people. Anders Breivik last year set off a bomb in Oslo, Norway, then shot young people at a youth camp, killing 77.

With individuals willing to walk into a crowd and blow themselves up or be killed, the game changed, and thus the rest of us are inflicted with distasteful intrusion, from pat-downs to Internet surveillance. Reacting to a terrorist incident after it has happened is too late, especially if the perpetrator is dead as well. The most effective way found so far to detect and prevent such one-off terrorist attacks is to infiltrate, surveil and generally snoop into personal communications. For those who fear we are becoming a police state, blame the terrorists, not the cops. And the Internet — which allows destructive psychos to anonymously search for and recruit the like-minded — is where they communicate, plan, and “share their thoughts and feelings.” So that is by necessity the new prevention/prediction landscape.

An ACLU official said that a civilian agency should monitor the Domain Awareness System to ensure that it is not abused. That’s not a bad idea, as the ability to spy on others is always an attractive lure for the unprincipled as well as those dedicated to public safety. No population should have to trade its freedoms for safety, but a balance must be struck.

At Issue: Is surveillance of personal communications inevitable, and if so, what safeguards should be mandated?


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Digital Cities & Counties Survey: Best Practices Quick Reference Guide
This Best Practices Quick Reference Guide is a compilation of examples from the 2013 Digital Cities and Counties Surveys showcasing the innovative ways local governments are using technological tools to respond to the needs of their communities. It is our hope that by calling attention to just a few examples from cities and counties of all sizes, we will encourage further collaboration and spark additional creativity in local government service delivery.
Wireless Reporting Takes Pain (& Wait) out of Voting
In Michigan and Minnesota counties, wireless voting via the AT&T network has brought speed, efficiency and accuracy to elections - another illustration of how mobility and machine-to-machine (M2M) technology help governments to bring superior services and communication to constituents.
Why Would a City Proclaim Their Data “Open by Default?”
The City of Palo Alto, California, a 2013 Center for Digital Government Digital City Survey winner, has officially proclaimed “open” to be the default setting for all city data. Are they courageous or crazy?
View All