Skip to main content

2018 | OriginalPaper | Buchkapitel

An Investigator’s Christmas Carol: Past, Present, and Future Law Enforcement Agency Data Mining Practices

verfasst von : James A. Sherer, Nichole L. Sterling, Laszlo Burger, Meribeth Banaschik, Amie Taal

Erschienen in: Cyber Criminology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Law enforcement agencies (LEA) and internal investigators rely heavily on non-LEA structured and unstructured data sources for the surveillance, detection, investigation, and prosecution of criminal matters. Modern LEA practices use data and algorithms to investigate crimes, to predict criminal behavior, and to catch potential perpetrators by mining data through the practice of predictive policing. However, LEA may need to modify their current and future data mining practices if the availability of data or the methods of analysis are constrained. This article addresses the history, current practices, and potential future uses associated with LEA data mining. It also examines existing privacy concerns and new data protection regulations that impact the collection and retention of source data, and it discusses the LEA access to and use of data sources and algorithmic approaches. It further considers Artificial Intelligence-aided tools and methodologies; analyzes whether a lack of human interaction outweighs the privacy concerns associated with the collected data; and considers whether big data collections are permeated with biased past practices such that predictive algorithms (and their performance) are undermined.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
E. V. Ravve, “MOMEMI: Modern Methods of Data Mining,” ICCGI2017, November 2016.
 
2
R. J. Roiger, “Data Mining: A Tutorial-Based Primer,” CRC Press, 2017.
 
3
A. K. A. de Medeiros, W. M. P van der Aalst, and A. J. M. M. Weijters, “Workflow Mining: Current Status and Future Directions,” OTM Confederated International Conferences – On the Move to Meaningful Internet Systems, Springer Berlin Heidelberg, 2003.
 
4
M. Moore, “The Realities of Machine Learning Systems,” Software Dev. Times, April 2017.
 
5
P. De Hert and S. Gutwirth, “Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power,” Privacy and the Crim. L., 61–104, 2006.
 
6
C. G. Tredoux, “Statistical Inference on Measures of Lineup Fairness,” Law and Human Behav. 22.2: 217, 1988.
 
7
K. M. Curtin, K. Hayslett-McCall, and F. Qiu, “Determining Optimal Police Patrol Areas with Maximal Covering and Backup Covering Location Models,” Networks and Spatial Econ. 10.1: 125–145, 2010.
 
8
R. Innes, “Remediation and Self-Reporting in Optimal Law Enforcement,” J. of Public Econ. 72.3: 379–393, 1999.
 
9
C. Fray, “Narrative in Police Communication: The Art of Influence and Communication For The Modern Police Organization,” Illinois State University ReD: Res. and eData, Theses and Dissertations 753, 2017.
 
10
A. B. Poulin, “The Investigation Narrative: An Argument for Limiting Prosecution Evidence,” 101 Iowa L. Rev. 683, 2016.
 
11
A. Hoots, “The Importance of Quality Report Writing in Law Enforcement,” Sch. of L. Enforcement Supervision, Undated.
 
12
Id.
 
13
K. A. Taipale, “Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data,” Colum. Sci. and Tech. L. Rev., vol. 5, p. 22, 2003.
 
14
A. Hoots, “The Importance of Quality Report Writing in Law Enforcement,” Sch. of L. Enforcement Supervision, Undated.
 
15
National Institute of Justice, “Predictive Policing,” June 9, 2014.
 
16
Id.
 
17
C. Fray, “Narrative in Police Communication: The Art of Influence and Communication for the Modern Police Organization,” Illinois State University ReD: Research and eData, Theses and Dissertations 753, 2017.
 
18
K. M. Curtin, K. Hayslett-McCall, and F. Qiu, “Determining Optimal Police Patrol Areas with Maximal Covering and Backup Covering Location Models,” Networks and Spatial Econ. 10.1: 125–145, 2010.
 
19
E. B. Larson, “Building Trust in the Power of ‘Big Data’ Research to Serve the Public Good,” Viewpoint, JAMA 309(23):2443–2444, 2013.
 
20
H. Chen, W. Chung, J. J. Xu, G. Wang, Y. Qin, and M. Chau, “Crime Data Mining: A General Framework and Some Examples,” Computer 37.4: 50–56, 2004.
 
21
M. Hu, “Big Data Blacklisting,” Fla. L. Rev. 67:5, 2016.
 
22
Europol, “Data Protection at Europol,” March 21, 2018.
 
23
Article 14 of Council Decision of 6 April 2009 establishing the European Police Office (Europol) (2009/371/JHA).
 
24
D. Meinicke, “Big Data und Data Mining: Automatisierte Strafverfolgung als neue Wunderwaffe der Verbrechensbekämpfung,” Kommunikation und Recht, p. 377, 2015.
 
25
See Council Decision of 6 April 2009 establishing the European Police Office (Europol) (2009/371/JHA), in particular Article 10.
 
26
For a structured introduction of the European Criminal Authorities’ cooperation see (Sieber, Satzger, and von Heintschel – Heinegg, Europäisches Strafrecht, [European Criminal Law], Teil 4: Zusammenarbeit in Strafsachen [Part 4. Cooperation in Criminal Cases] and 11. Kapitel: Datenverkehr und Datenschutz im Rahmen der polizeilichen und justiziellen Zusammenarbeit [Data exchange and data protection in the framework of the cooperation of police and judiciary] Rn. 5–19.
 
27
E. B. Larson, “Building Trust in the Power of ‘Big Data’ Research to Serve the Public Good,” Viewpoint, JAMA 309(23): 2443–44, 2013.
 
28
F. Bignami commented on proportionality as a privacy safeguard in her assessment of the European Union’s now defunct Data Retention Directive; a provision she saw as “designed to prohibit data mining—hi-tech fishing expeditions.” F. Bignami, “Privacy and Law Enforcement in the European Union: The Data Retention Directive,” Chi. J. Int’l L., vol. 8, pp. 233–55, 252, 2011.
 
29
For instance, the right not to be subject to automated decision making, including profiling, is part of the European Union’s General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which takes effect on May 25, 2018. The limits of this right have been discussed by S. Wachter, B. Mittelstadt, and L. Floridi, “Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation,” Int’l Data Privacy L., June 2017.
 
30
W. L. Perry, B. McInnis, C. C. Price, S. C. Smith, and J. S. Hollywood, “Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations,” Santa Monica, CA: RAND Corp., 2013, pp. 15–16.
 
31
A. Nordrum, “Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated,” IEEE Spectrum, Aug. 18, 2016.
 
32
M. B. Short, M. R. D’Orsogna, P. J. Brantingham, and G. E. Tita, “Measuring and Modeling Repeat and Near-Repeat Burglary Effects,” J. of Quantitative Criminology, 2009.
 
33
United Nations Office on Drugs and Crime, Criminal Intelligence Manual for Analysts, 2011.
 
34
A. B. Poulin, “The Investigation Narrative: An Argument for Limiting Prosecution Evidence,” 101 Iowa L. Rev. 683, 2016.
 
35
E. B. Larson, “Building Trust in the Power of ‘Big Data’ Research to Serve the Public Good,” Viewpoint, JAMA 309(23): 2443–2444, 2013.
 
36
S. Smith, “Big Data. Predictive Analytics. Forecasting.” Regis U. Criminology Resource Center, Undated.
 
37
See C. R. Shaw and H. D. McKay, “Juvenile Delinquency in Urban Areas,” 1931 (correlating physical status, economic status, and population composition with delinquency rates); see also K. Miller, “Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm,” J. Tech. of L. and Pol’y, vol. 19, p. 106, 2014; and M. Curtin, K. Hayslett-McCall, and F. Qiu, “Determining Optimal Police Patrol Areas with Maximal Covering and Backup Covering Location Models,” Networks and Spatial Econ. 10.1: 125–145, 2010.
 
38
K. Miller, “Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm,” J. Tech. of L. and Pol’y, vol. 19, p. 106, 2014.
 
39
W. L. Perry, B. McInnis, C. C. Price, S. C. Smith, and J. S. Hollywood, “Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations,” Santa Monica, CA: RAND Corp., 2013, p. 2.
 
40
Miller also notes that “these enhanced cataloging powers have coincided with an increasing willingness by law enforcement agencies to conduct – and courts to condone – widespread, total surveillance of citizens in the name of national security.” K. Miller, “Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm,” J. Tech. of L. and Pol’y, vol. 19, p. 106, 2014.
 
41
A. Taal, J. Le, and J. Sherer, “A Consideration of eDiscovery Technologies for Internal Investigations,” IGS3, CCIS 534:59–73, 2015.
 
42
By the early 1990s, data mining was seen as a sub-process within Knowledge Discovery in Databases (KDD), and the 1990s saw a significant increase in the interest in data mining generally with the establishment of a number of regular conferences. See F. Coenen, “Data Mining: Past, Present, and Future,” The Knowledge Engineering Rev., vol. 26(1), 2011.
 
43
See W. J. Bratton, S. W. Malinowski, “Police Performance Management in Practice: Taking COMPSTAT to the Next Level,” Policing, vol. 2(3), pp. 259–265, 2008.
 
44
M. Hvistendahl, “Can ‘Predictive Policing’ Prevent Crime Before It Happens?” Science, September 28, 2016.
 
45
Bureau of Justice Assistance, “COMPSTAT: Its Origin, Evolution, and Future in Law Enforcement Agencies,” Police Executive Res. Forum, 2013.
 
46
National Institute of Justice, C. Beck, “The LAPD Experiment,” January 6, 2012.
 
47
National Institute of Justice, H. Gunaratne, “Discussion on the Predictive Policing Demonstration Projects and Evaluation,” January 6, 2012.
 
48
Id.
 
49
Id.
 
50
Id.
 
51
National Institute of Justice, Predictive Policing Symposiums, “Privacy and Legal Issues,” January 6, 2012.
 
52
K. Miller, “Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm,” J. Tech. of L. and Pol’y, vol. 19, p. 107, 2014; see also K. Zetter, “How a Crypto ‘Backdoor’ Pitted the Tech World Against the NSA,” WIRED, September 24, 2013.
 
53
N. Berg, “Predicting Crime, LAPD-Style,” The Guardian, June 25, 2014.
 
54
Id.
 
55
J. Jouvenal, “Police are Using Software to Predict Crime. Is It a ‘Holy Grail’ or Biased Against Minorities?,” The Washington Post, November 17, 2016; see also K. Miller, “Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm,” J. Tech. of L. and Pol’y, 19:106, 2014 (arguing that “the move toward predictive policing using automated surveillance, semantic processing, and analytics tools magnifies each technology’s harms to privacy and due process, while further obfuscating the systems’ technological and methodological limitations”).
 
56
Executive Office of the President (Barack H. Obama), “Big Data: Seizing Opportunities, Preserving Values,” May 2014.
 
57
European Data Protection Supervisor, “Meeting the Challenges of Big Data: A Call for Transparency, User Control, Data Protection by Design and Accountability,” European Data Protection Supervisor (EDPS) Opinion 7/2015.
 
58
J. Piskorski, M. Atkinson, J. Belyaeva, V. Zavarella, S. Huttunen, and R. Yangarber, “Real-Time Text Mining in Multilingual News for the Creation of a Pre-Frontier Intelligence Picture,” ACM SIGKDD Workshop on Intelligence and Security Informatics, July 2010.
 
60
E. Goode, “Sending the Police Before There’s a Crime,” N.Y. Times, August 15, 2011; N. Berg, “Predicting Crime, LAPD-Style,” The Guardian, June 25, 2014; J. Jouvenal, “Police are Using Software to Predict Crime. Is it a ‘Holy Grail’ or Biased Against Minorities?” The Washington Post, November 17, 2016; J. Smith, “Crime-Prediction Tool PredPol Amplified Racially Biased Policing, Study Shows,” Mic., October 9, 2016.
 
61
D. Bond-Graham, “All Tomorrow’s Crimes: The Future of Policing Looks a Lot Like Good Branding,” SFWeekly, October 30, 2013.
 
62
J. Jouvenal, “Police Are Using Software to Predict Crime. Is It a ‘Holy Grail’ or Biased Against Minorities?” The Washington Post, November 17, 2016.
 
63
N. Berg, “Predicting Crime, LAPD-Style,” The Guardian, June 25, 2014.
 
64
A. Winston, “Transparency Advocates Win Release of NYPD ‘Predictive Policing’ Documents,” The Intercept, January 27, 2018.
 
66
M. Hu, “Biometric ID Cybersurveillance,” Ind. L.J., vol. 88, pp. 1475–81, 2013.
 
67
J. Lynch, “Face Off: Law Enforcement Use of Face Recognition Technology,” Electronic Frontier Foundation, February 12, 2018.
 
68
C. Garvie, et al., “The Perpetual Line-Up,” Geo. L. Center on Privacy and Tech., October 18, 2016.
 
69
Federal Bureau of Investigation, “Next Generation Identification,”; see also M. Hu, “Biometric ID Cybersurveillance,” Ind. L.J., vol. 88, pp. 1152–53, 2013. Hu calls this “bureaucratized surveillance,” which amounts to the state automating a screen of all interactions with citizens in her opinion.
 
70
Federal Bureau of Investigation, “Next Generation Identification.”
 
71
See U.S. Department of Homeland Security, Privacy Impact Assessment for the Future Attribute Screening Technology (FAST) Project 3, 2008; in the United States, the Federal Agency Data Mining Reporting Act of 2007, 42 U.S.C. § 2000ee-3, requires federal agencies to report on data mining activities.
 
72
S. Melendez, “A New Border Security App Uses AI to Flag Suspicious People in Seconds,” Fast Company, March 6, 2018.
 
74
Fluggastdatengesetz vom 6. Juni 2017 (BGBl. I S. 1484), das durch Artikel 2 des Gesetzes vom 6. Juni 2017 (BGBl. I S. 1484) geändert worden ist [German Act on Flight Passenger Data of 6 June 2017].
 
75
Section 4, para 1–2 of the German Act on Flight Passenger Data.
 
76
T. Rademacher, “Predictive Policing im deutschen Polizeirecht, [Predictive Policing in German Police Laws],” Archiv des öffentlichen Rechts 142 3:366–416; pp. 412–414, 2017.
 
77
Parliament of Australia, “Review of the Identity-Matching Services Bill 2018 and the Australian Passports Amendment (Identity-Matching Services) Bill 2018,” 2018.
 
78
J. Lynch, “Face Off: Law Enforcement Use of Face Recognition Technology,” Electronic Frontier Foundation, February 12, 2018.
 
79
Id.
 
80
T. Singelnstein, “Predictive Policing: Algorithmenbasierte Straftatprognosen zur vorausschauenden Kriminalintervention [Prognosis of Criminal Actions Based on Algorithms for Preventive Criminal Intervention],” NStZ, 1, p. 4, 2018.
 
81
F. Ebert, “Entwicklungen und Tendenzen im Recht der Gefahrenabwehr [Developments and Tendencies in the Law of Mitigating Danger]” LKV – Landes- und Kommunalverwaltung, 10 p. 16, 2017.
 
82
W. L. Perry, B. McInnis, C. C. Price, S. C. Smith, and J. S. Hollywood, “Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations,” Santa Monica, CA: RAND Corp., p. 2, 2013.
 
83
“IBM SPSS Crime Prediction Analytics,” IBM Corp., July 2012.
 
84
E. Goode, “Sending the Police Before There’s a Crime,” N.Y. Times, August 15, 2011.
 
85
C. McCue, Data Mining and Predictive Analytics: Intelligence Gathering and Crime Analysis, 2007.
 
86
Institut Für Musterbasierte Prognosetcknik, “Near Repeat Prediction Method – Predictive Policing made in Germany,” Undated.
 
87
D. Gerstner, “Predictive Policing als Instrument zur Prävention von Wohnungseinbruchdiebstahl [Predictive Policing as an instrument for the prevention of burglaries] in: Forschung Aktuell/research in Brief/50, Max Planck-Institut für ausländisches und internationales Strafrecht Freiburg im Breisgau, p. 37, 2017.
 
88
J. E. Shiffer, “Police’s Growing Arsenal of Technology Watches Criminals and Citizens,” Star Tribune, May 1, 2017.
 
89
M. Moore, “The Realities of Machine Learning Systems,” Software Dev. Times, April 25, 2017.
 
90
J. Kelly, “Cellphone Data Spying: It’s Not Just the NSA,” USA TODAY, December 8, 2013.
 
91
G. Joseph, “Where ICE Already Has Direct Lines to Law-Enforcement Databases with Immigrant Data,” NPR – Code Switch, May 12, 2017.
 
92
J. E. Shiffer, “Police’s Growing Arsenal of Technology Watches Criminals and Citizens,” Star Tribune, May 1, 2017.
 
93
J. Kloppers, “Data Mining for Social Intelligence – Opinion Data as a Monetizable Resource,” Dataconomy, May 12, 2017.
 
94
M. Lewis, D. Yarats, Y. N. Dauphin, D. Parikh, and Dhruv Batra, “Deal or No Deal? End-to-End Learning for Negotiation Dialogues,” arXiv: 1706.05125, Jun. 16, 2017.
 
95
T. Singelnstein, Predictive Policing: Algorithmenbasierte Straftatprognosen zur vorausschauenden Kriminalintervention [Prognosis of criminal actions based on algorhythms for preventive criminal intervention], NStZ, 2018 1, p. 7
 
96
L. Bandoim, “Surprising Ways Researchers Use Social Media to Track Disease,” EmaxHealth – Family Health, May 21, 2017.
 
97
D. A. Broniatowski, M. J. Paul, and M. Dredze, “National and Local Influenza Surveillance through Twitter: An Analysis of the 2012–2013 Influenza Epidemic,” PloSOne, vol. 8.12, 2013.
 
98
S. Yan, “Artificial Intelligence Will Replace Half of All Jobs in the Next Decade, Says Widely Followed Technologist,” CNBC – Tech, April 27, 2017.
 
99
M. Moore, “The Realities of Machine Learning Systems,” Software Dev. Times, April 25, 2015.
 
100
G. Action, “We’re Seeing How Far We Can Push Artificial Intelligence in Asset Management: Man Group’s Lagrange,” CNBC Tech Transformers, May 17, 2017.
 
101
L. Chambers, “How Artificial Intelligence Can Break a Business in Two Minutes,” Rude Baguette, May 4, 2017.
 
102
J. Kloppers, “Data Mining for Social Intelligence – Opinion Data as a Monetizable Resource,” Dataconomy, May 12, 2017.
 
103
L. Chambers, “How Artificial Intelligence Can Break a Business in Two Minutes,” Rude Baguette, May 4, 2017.
 
104
D. Hendrick, “Study Lists 5 Big Data Obstacles and 5 Firms Embracing Analytics,” Claims Journal, April 26, 2017.
 
105
J. Eligon and T. Williams, “Police Program Aims to Pinpoint Those Most Likely to Commit Crimes,” N.Y. Times, September 24, 2015.
 
106
Id.
 
107
O. Tene and J. Polonetsky, “Taming the Golem: Challenges of Ethical Algorithmic Decision Making,” N.C. J. of L. and Tech., June 6, 2017.
 
108
S. Moore, “The Surprisingly Strong Data Behind ‘Sell In May,’” Forbes, April 30, 2017.
 
109
D. Streitfeld, “The Internet Is Broken”: @ev Is Trying to Salvage It,” N.Y. Times, May 20, 2017.
 
110
J. Sherer, “When is a Chair Not a Chair? Big Data Algorithms, Disparate Impact, and Considerations of Modular Programming,” DESI VII Workshop on Using Advanced Data Analysis in eDiscovery and Related Disciplines, 2017.
 
111
Id.
 
112
A. Liptak, “Sent to Prison by a Software Program’s Secret Algorithms,” N.Y. Times, May 1, 2017.
 
113
M. Davey, “Chicago Police Try to Predict Who May Shoot or Be Shot,” N.Y. Times, May 23, 2016.
 
114
P.J. Brantingham, M. Valasik, and G.O. Mohler, “Does Predictive Policing Lead to Biased Arrests? Results from a Randomized Controlled Trial,” DOI, 2018, https://​doi.​org/​10.​1080/​2330443X.​2018.​1438940.
 
115
Id.
 
116
A. Johansson, “5 Lessons Learned from the Predictive Policing Failure in New Orleans,” Venture Beat, March 19, 2018.
 
117
G. Kremplet, I. Zilobaite, D. Brezezinski, E. Hullermeier, M. Last, V. Lemaire, T. Noack, A. Shaker, S. Sievi, M. Spiliopoulou, and J. Stefanowski, “Open Challenges for Data Stream Mining Research,” ACM SIGKDD Explorations Newsletter, vol. 16(1), pp. 1–10, September 25, 2014.
 
118
H. Moore and D. Rober, “AP Twitter Hack Causes Panic on Wall Street and Sends Dow Plunging,” The Guardian, April 23, 2013.
 
119
L. Chambers, “How Artificial Intelligence Can Break a Business in Two Minutes,” Rude Baguette, May 4, 2017.
 
120
M. Moore, “The Realities of Machine Learning Systems,” Software Dev. Times, April 25, 2015.
 
121
N. Feldman, “The Future of Policing is Being Hashed Out in Secret,” Bloomberg, February 28, 2018.
 
122
G. Kremplet, I. Zilobaite, D. Brezezinski, E. Hullermeier, M. Last, V. Lemaire, T. Noack, A. Shaker, S. Sievi, M. Spiliopoulou, and J. Stefanowski, “Open Challenges for Data Stream Mining Research,” ACM SIGKDD Explorations Newsletter, vol. 16(1), pp. 1–10, September 25, 2014.
 
123
M. Kendall, “Palantir Using Big Data to Solve Big Humanitarian Crises,” The Mercury News, October 4, 2016.
 
124
S. J. Mooney, D. J. Westreich, and A. M. El-Sayed, “Epidemiology in the Era of Big Data,” Epidemiology 26(3):390–395, May 2015.
 
125
S. Shah, A. Horne, and J. Capellá, “Good Data Won’t Guarantee Good Decisions,” Harv. Bus. Rev. – Decision Making, April 2012.
 
126
J. Kloppers, “Data Mining for Social Intelligence – Opinion Data as a Monetizable Resource,” Dataconomy, May 12, 2017.
 
127
M. Feldman, S. A. Friedler, J. Moeller, C. Scheideggerand, and S. Venkatasubramanian, “Certifying and Removing Disparate Impact,” BIGDATA Program, July 16, 2015.
 
128
K. Guruswamy, “Data Science – Data Cleansing and Curation,” Teradata - Aster Community, July 15, 2016.
 
129
J. Sherer, “When is a Chair Not a Chair? Big Data Algorithms, Disparate Impact, and Considerations of Modular Programming,” DESI VII Workshop on Using Advanced Data Analysis in eDiscovery and Related Disciplines, 2017.
 
130
C. S. Penn, “Marketers: Master Algorithms Before Diving into Machine Learning,” February 1, 2017.
 
131
M. Hu, “Big Data Blacklisting,” Fla. L. Rev. 67:5, 2016.
 
132
S. Moore, “The Surprisingly Strong Data Behind ‘Sell in May,’” Forbes, April 30, 2017.
 
133
G. Krempl et al., “Open Challenges for Data Stream Mining Research,” ACM SIGKDD Explorations Newsletter, vol. 16(1), pp. 1–10, June 2014.
 
134
A. Maslow, “The Psychology of Science,” Harper & Row, p. 15, 1966.
 
135
D. A. Broniatowski, M. J. Paul, and M. Dredze, “National and Local Influenza Surveillance through Twitter: An Analysis of the 2012–2013 Influenza Epidemic,” PloSOne, vol. 8.12, 2013.
 
136
E. V. Ravve, “MOMEMI: Modern Methods of Data Mining,” ICCGI2017, November 2016.
 
137
G. Action, “We’re Seeing How Far We Can Push Artificial Intelligence in Asset Management: Man Group’s Lagrange,” CNBC Tech Transformers, May 17, 2017.
 
138
A. Liptak, “Sent to Prison by a Software Program’s Secret Algorithms,” N.Y. Times, May 1, 2017.
 
139
M. Smith, “In Wisconsin, a Backlash Against Using Data to Foretell Defendants’ Futures,” N.Y. Times, June 22, 2016.
 
140
A. Taal, J. Le, and J. Sherer, “A Consideration of eDiscovery Technologies for Internal Investigations,” IGS3, CCIS 534:59–73, 2015.
 
141
E. B. Larson, “Building Trust in the Power of ‘Big Data’ Research to Serve the Public Good,” Viewpoint, JAMA 309(23): 2443–2444, 2013.
 
142
Electronic Frontier Foundation, “Big Data in Private Sector and Public Sector Surveillance,” April 8, 2014.
 
143
E. B. Larson, “Building Trust in the Power of ‘Big Data’ Research to Serve the Public Good,” Viewpoint, JAMA 309(23): 2443–2444, 2013.
 
144
Electronic Frontier Foundation, “Big Data in Private Sector and Public Sector Surveillance,” April 8, 2014.
 
145
A. Guthrie Ferguson, “Big Data and Predictive Reasonable Suspicion,” U. Pa. L. Rev., vol. 163, p. 331, 2015.
 
146
Id. at 331–32.
 
147
Id. at 332.
 
148
J. Sherer, J. Le, and A. Taal, “Big Data Discovery, Privacy, and the Application of Differential Privacy Mechanisms,” The Computer and Internet L., 32:7, July 2015.
 
149
A. Narayanan and V. Shmatikov, “Myths and Fallacies of Personally Identifiable Information,” Viewpoints, ACM, 53: 6, 2010.
 
150
M. Hu, “Big Data Blacklisting,” Fla. L. Rev. 67:5, 2016.
 
Metadaten
Titel
An Investigator’s Christmas Carol: Past, Present, and Future Law Enforcement Agency Data Mining Practices
verfasst von
James A. Sherer
Nichole L. Sterling
Laszlo Burger
Meribeth Banaschik
Amie Taal
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-97181-0_12