recommended reading

Can technology predict gun crime? ATF hopes so.

Matt York/AP

The Bureau of Alcohol, Tobacco, Firearms and Explosives is shopping for crime forecasting technology to predict where gun violence may occur so that ATF can intercede before it happens.

The Justice Department on Thursday issued a solicitation for a system "designed to accurately identify the risk of personal and property crimes" covering 200 locations throughout the United States, United Kingdom and Canada.

Software will display color-coded crime risk maps with interactive features for locations that are identified as high risk, according to the work description. The technology will interpret the current and changing demographics of communities to produce trend analyses. It will be able to generate online reports for an unlimited number of users at government agencies and businesses.

"It's a step forward for ATF," said Paul Wormeli, executive director emeritus at the Integrated Justice Information Systems Institute. "I'm delighted to see that they're thinking about how they can do this better." State and local police already are using geolocational information to perform some of the same kinds of predictive analyses described in the solicitation, he noted.

Wormeli expected the technology one day could augment forecasts with smartphone text messages, video and other observations from witnesses and good Samaritans out in the field. "We spend a lot of money getting officers to the scene of an incident," but dispatchers using "citizens as sensors" can save officers trips by collecting video from people at the scene of a crime, he said.

One of the big movements in law enforcement is place-based policing, often called "proximity-based policing," rather than person-based policing, Wormeli said.

In 2004, according to Justice officials, ATF and local police cracked down on "areas infested with gang and narcotic activity" in Las Vegas by comparing several location-based data sets: geographic areas where firearms were recovered; the records of Las Vegas' three biggest, licensed firearms dealers; and local police statistics on the addresses of homicides, robberies and related violent gang activity. Once authorities had narrowed in on the crime hot spots, they embedded informants to find the kingpins.

Essentially, authorities were using the criminal history of locations to predict where offenders would strike next and nab them before anyone got hurt. As a result of the effort, "154 guns and 58 of the worst-of-the-worst criminals were arrested," stated a 2006 Justice report. One investigation contributed to the "discovery of 15 homemade machine guns following the controlled purchase of four from the suspect." Separately, an interstate murder-for-hire plot was uncovered, leading to federal charges against a man who had several pipe bombs in his house.

In June 2011, Justice announced that analytical software paved the way for seven new arrests, 18 arrests on outstanding warrants and an assault rifle seizure -- during one week in northern Ohio. The enforcement activity was part of the kickoff of an initiative called V-GRIP, or Violence Gun Reduction and Interdiction Program, aimed at taking illegal firearms off the streets. State, local and federal officials shared intelligence and used crime-mapping software and other technology to target specific neighborhood crime hot spots.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.