Jamaica Gleaner

JARISTOTLE’S JOTTINGS Byting crime bit by bit

-

AS CRIME and violence continue to plague the nation, the interests of individual­s, sectors, and political parties have to give way to the collective good of us all. Just as how we are one Jamaica and singing One Love when Team Jamaica mines gold at the Olympics, we must unite to protect our people against those who want to impose their vile will upon us.

Regardless of the crime, there should be no doubt in anyone’s mind that there will be a certainty of arrest, conviction, and severe sanctions. To this end, there are countless technology­based crime management tools which, if used prudently, improve that certainty.

PROS AND CONS

From a business perspectiv­e, technologi­cal factors pertain to innovation­s in technology that may affect the operations of the industry and the market. We live in a technologi­cally advanced world where criminals are far more sophistica­ted than the common thief of yester year. Modern criminals rely heavily on technology to facilitate their activities, and every technologi­cal convenienc­e is a potential tool which can be used against us. Electronic banking, encr ypted electronic communicat­ions, social media services, the ‘dark web’, and the like are readily exploited by criminals, especially given the anonymity with which they can operate within this veiled realm. Law enforcemen­t agencies must likewise exploit technology to disrupt the criminals’ ability to operate at will.

However, there are some impor tant issues to be considered when implementi­ng technologi­cal solutions in any organisati­on. The first is the capacity of the users, and the adage ‘garbage in, garbage out’ (GIGO) is very relevant. Secondly, if the users are not committed, then GIGO will dominate. The human factor must never be ignored.

COMMON-SENSE APPLICATIO­NS

Kudos to the current nationalle­vel usage of technology in managing crime: the ‘Stay Alert’ app; closed-circuit television (CC T V ) surveillan­ce of public spaces (Jamaica Eye); and other ‘e-policing’ solutions are steps in the right direction. There are countless tech solutions that can be applied to the overall crime management effor t. Careful assessment is necessary to put the threats in context and identify viable solutions and potential drawbacks as a means of ensuring that we have the right suite of applicatio­ns at our disposal. This will not only lend to improved efficienci­es, but will also reduce the scope for corruption — assuming there is capacity and commitment.

Not all applicatio­ns need to be high-end systems. For instance, we have a problem with payments for traffic tickets. Logic would suggest that we automate the entire process such that driver’s licences are electronic cards akin to credit cards and the soon-to-be National ID System (NIDS) cards .

The police only need a portable device akin to a pointof-sale machine to swipe an offender’s driver’s licence, NIDS card, and fingerprin­t. With all their pertinent data on the official system, that offender is readily flagged until they have satisfacto­rily honoured their obligation­s to the taxman.

Furthermor­e, with electronic disseminat­ion of data on persons of interest throughout the government system, wanted persons, tax dodgers, and the like can be readily identified. No more hiding in plain sight. Within the courts, utilising relevant tech solutions to more accurately and efficientl­y record proceeding­s facilitate­s real-time transcript­s and speedier delivery of judgements.

CHECKS AND BALANCES

Machines and tech systems are merely tools that must be operated by humans; if the operators normally benefit from an absence of such technology, it is foolhardy to think that they will embrace the new approach.

A major facilitato­r of corruption is the discretion­ary powers of public officials such as the police, customs officers, and persons with approval and licensing authority. The mandatory use of technologi­cal applicatio­ns diminishes that power. Resistance, sabotage, and circumvent­ion must be anticipate­d, and proper systems of checks and balances must be integral to every tech programme.

CAPACITY

Investing in technology without similar investment in user capacity is a recipe for disaster. Having the right aptitude, knowledge, and skill is one thing; personal integrity is even more important, as this determines the ultimate effectiven­ess of the respective initiative­s. Checks and balances, particular­ly continuous security vetting, must be a priority requiremen­t for enlistment into such programmes.

Costly, yes, but tech solutions are viable investment­s, in that they provide such significan­t enhancemen­ts of capabiliti­es that operating success can increase almost immediatel­y. Credible deterrence through capacity-building of this nature is far more sustainabl­e than bang-bang approaches which have yet to reap the levels of success we need in the fight against criminalit­y.

Byte crime one bit at a time.

‘Modern criminals rely heavily on technology to facilitate their activities, and every technologi­cal convenienc­e is a potential tool which can be used against us.’

 ?? PHOTO BY CARL GILCHRIST ?? A CCTV camera in the Ocho Rios town centre.
PHOTO BY CARL GILCHRIST A CCTV camera in the Ocho Rios town centre.
 ?? PHOTO BY NORMAN GRINDLEY ?? This damaged CCTV camera, with its glass covering missing, was installed in the Corporate Area as one of the Jamaica Constabula­ry Force’s crimefight­ing measures.
PHOTO BY NORMAN GRINDLEY This damaged CCTV camera, with its glass covering missing, was installed in the Corporate Area as one of the Jamaica Constabula­ry Force’s crimefight­ing measures.

Newspapers in English

Newspapers from Jamaica