oracle openworld 2015: argentine ministry of security - policing in the age of social networking...
TRANSCRIPT
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Argentine Ministry of Security – Policing in the Age of Social Networking
Hong-Eng Koh Mauricio IdiartGlobal Lead, Justice & Public Safety Chief Information OfficerGlobal Industry Solutions Group Ministerio de Seguridad de la NaciónOracle Corporation Argentina @he_koh
Presented with
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Safe Harbor StatementThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
3
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 4
Community Policing“The Police are the Public and the Public are the Police”
Sir Robert Peel1788 – 1850
Photos credit: Internet
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 5
Community Policing“The Police are the Public and the Public are the Police”
• A good relationship and trust between the public and the police• Working together to prevent crime and disorder• Police efficiency: it’s the absence of crime and disorder, not the visible
evidence of police action in dealing with them
Japan “Koban”
SingaporeNeighbourhood
Police PostPhotos credit: Internet
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 6
Fast Forward to 21st Century• Problem-oriented policing– Focus on rigorous and effective methods to solve problems,
including methodology, tools and data
• Intelligence-led policing– Integrated crime and criminal analysis, profiling of serious
offenders, supported by an informed command structure
• Predictive policing (PredPol)– Predicting crime or disorder before it happens, or when it is
about to be committed
Photos credit: Internet
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 7
Data is Important, But …• Over dependence on past crime
and criminal data has the underlying assumption that the method (modus operandi), cause and reason of crime and disorder do not change• But we are in the tsunami of social
networking, crowd-sourcing, instant gratification, citizen journalism, people power, etc.
Why BlackBerry Messenger was rioters' communication method of choice
7 Dec 2011
“Everyone in edmonton enfield wood green everywhere in north link up at enfield town station at 4 o clock sharp!!!!”
“Ah, who wants to buy rioting kits? Gloves, masks, petrol bombs: £5”Crime-Sourcing
Panic Seizes India as a Region’s Strife Radiates
17 Aug 2012
Angry protests spread over anti-Islam video
14 Sep 2012
Herding Effect
Man Attacks NYC Police With Hatchet; Authorities Probe Possible Terror Ties
Social-Enabled Terrorism ?
“Helicopters, big military will be useless on their own soil. They will not be able to defeat our people if we use guerilla warfare. Attack their weak flanks…”
Suspect’s posting:
23 Oct 2014
Cyber Bullying
Social Media’s Role in Ya’an Earthquake Aftermath is Revealing
22 Apr 2013 New Witness Behavior
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 13
Social-Enabled PolicingCommunity Policing in the Age of Social Networking
Singapore Community Policing
Return On Relationship (ROR)Photos credit: Internet
16 Apr: Boston Police confirming explosion at marathon finish line with injuries.
Boston Police looking for video of the finish line
BPD asking for tips
Family members looking for info relative to individuals injured during the incident are encouraged to call (617) 635-4500.
Boston Police looking for video of the finish line
17 Apr: Airlines and hotels are waiving cancellation & trip change fees for people traveling to Boston.
19 Apr: Do you recognize these individuals? Contact 1-800-CALL-FBI (1-800-225-5324)
20 Apr: CAPTURED!!! The hunt is over. The search is done. The terror is over. And justice has won. Suspect in custody.
Photos credit: Internet
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 15
IACP’s 2015 Survey: Use of Social Media byLaw Enforcement• 96.4% of agencies use social media• Most common use of social media is for criminal investigations at 88.7%• Most frequently used social media platforms are Facebook (94.2%), Twitter
(71.2%), and YouTube (40.0%)• 73.9% of agencies not currently using are considering its adoption• 77.8% of agencies have a social media policy• 85.5% of agencies report that social media has helped solve crimes• 83.5% of agencies state that social media has improved police-community
relations in their jurisdictionhttp://www.theiacp.org/portals/0/documents/pdfs/2015SocialMediaSurveyResults.pdf
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 16
Social-Enabled PolicingSupports the prevention, detection and solving of crime and disorder
Social-Enabled Policing
Community
Intelligence-led PredictiveSocial Networking
Crowd Sourcing People Power
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 17
Social-Enabled Policing“The Police are the Public and the Public are the Police” in the Physical & Cyber Worlds
Social-Enabled Policing
Listen
Social Networking
Crowd Sourcing People Power
Analyze
Understand EngageCommunicate Participate
ActAssure
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 18
Social-Enabled PolicingKey Considerations
1. Which Social Networks and How?
2. Am I Big Data Ready?
3. How Can I Meet the People’s Demands?
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 19
Oracle Social Relationship Management (SRM)• Advanced Latent Semantic Analysis (LSA) technology• 700+ million messages daily• Deeper & more precise data• Routing & auto-categorization• Custom topics & indicators• Global languages & data
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Argentine Ministry of SecurityOur Mission
Our Ministry’s mission is to assist the President's Office and the Chief of Staff, concerning all matters related to internal security, preservation of freedom, life and estate of the citizens, their rights and guarantees in a context of full respect of the institutions of our democratic system.
20
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Argentine Ministry of SecurityIT role on a Ministry of Security
21
• Our mission is to provide information technology, communications tools and applications to help Federal Security Forces in their daily operations and investigations
• We try to optimize efficiency on the use of security resources (police cars, agents, firefighters, etc.)
• We provide reliable data on time, to support the decision making processes
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Social Relationship Management ProjectSocial Networks Usage in Argentina
22
Any Social Network
Facebook Google+ Twitter LinkedIn0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Own an account Used in the past month
Figures represent percentage of Internet usersCredit: We Are Social @wearesocial.sg / GlobalWebIndex, Jan 2014
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Social Relationship Management ProjectGrowth in Social Networks Usage
23
• With millions of users, social media networks are the place where people, companies and even criminals / suspects express themselves.
• Traditional Crime Investigation processes need to take into consideration this interactions.
• Social media networks are indeed a new place to find crime evidence.
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
December 2013Crime Orchestration on Social Networks
24
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
December 2013Crime Orchestration on Social Networks
25
• Riots that took place in Argentina on December 2013 were mostly organized on Social Networks
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Social Relationship Management ProjectCrime Orchestration on Social Networks
26
• We started deep listening and analyzing with Oracle SRM this crime orchestrations over the social networks the first week of December 2013.
• This allowed us to produce a contingency plan to address this incidents.
• Dissuasive police operations helped to avoid the creation of other riot initiatives and contain the situation.
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Configuring a channel
listening criteria and /or
keywords
Application of semantic filters
to adjust search results
Control panel with statistical and
demographic information
Social media posts access directly from
graphics
Listening and Analyzing Social Media
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 28
Argentine Ministry of Security IT Applications with Oracle Technology
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Argentine Ministry of Security IT applications (Oracle)
Police - Patrolling Control Apps
SLA Management Relevant Event Monitoring Detailed Timeline Review
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Emergency Care Applications
Heatmap OverviewReal-Time Dashboards Georeferenced Resources
Argentine Ministry of Security IT applications (Oracle)
Copyright © 2015 Oracle and/or its affiliates. All rights reserved.
Reports, pattern analysis, BI and statistics:• Cloud data is analyzed with
structured and unstructured data• Crime patterns and Federal
Forces interventions are analyzed• Prevention plans are
represented over crime maps
Argentine Ministry of Security Data Analysis – Crime Maps (Oracle)
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 32
Phase 1: Infrastructure
Force by Force approachTechnological LevelingPrivate Cloud Service Platform
Phase 2: Applications/Business Rules
Single point of viewMinistry approach
Phase 3: Dashboards/BI/Pattern Analysis/Decission Making Assistance
Technology integration, cloud data processing, crime prevention.
ExadataExalogicSuperCluster - SPARCExalytics
+ Custom Apps
Argentine Ministry of Security Oracle Footprint
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 33
Thank You!
[email protected] [email protected]
@he_koh
linkedin.com/in/hekoh linkedin.com/in/mauricioidiart
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. 34