Predictive policing models risk codifying systemic biases into law enforcement operations.

— by

The Algorithmic Badge: How Predictive Policing Risks Codifying Systemic Bias

Introduction

For decades, law enforcement agencies have sought a “force multiplier”—a way to do more with less. Enter predictive policing: the use of mathematical, predictive, and analytical techniques in law enforcement to identify potential criminal activity. By leveraging machine learning models to analyze historical crime data, departments aim to allocate patrols to “hot spots” before incidents occur.

However, beneath the veneer of neutral data science lies a profound and troubling reality. Because these algorithms rely on historical arrest data, they often inherit the biases embedded in past policing practices. When these historical shadows are treated as objective “future probabilities,” law enforcement risks creating a self-fulfilling prophecy, effectively automating and accelerating systemic inequality under the guise of technological efficiency.

Key Concepts

To understand the danger of predictive policing, we must first distinguish between crime data and arrest data. Most predictive algorithms do not track actual criminal activity; they track police activity. If a department disproportionately patrols certain neighborhoods, they will naturally record more arrests in those areas. The software then identifies these neighborhoods as “high risk,” sending more officers back to those same areas. This creates a feedback loop known as the “algorithmic feedback loop.”

Proxy Variables: Algorithms often use variables that act as proxies for race or socioeconomic status. Even if an algorithm is explicitly programmed not to see “race,” it may use zip codes, income levels, or educational background data. Because American residential history is deeply tied to segregation, these proxy variables allow models to achieve racially skewed results without ever explicitly processing racial data.

Predictive Policing Models: These generally fall into two categories: place-based (predicting where crime will occur, such as the now-retired PredPol) and person-based (predicting who is most likely to commit or be a victim of crime, such as the Chicago Police Department’s Strategic Subject List).

Step-by-Step Guide to Evaluating Predictive Systems

If you are a policy researcher, local official, or concerned citizen, use this framework to evaluate whether a predictive policing system is serving the public interest or endangering civil liberties:

  1. Audit the Input Data: Demand transparency regarding what data sources are being fed into the model. Are these datasets based on 911 calls (which reflect community reports) or officer-initiated stops (which reflect officer bias)?
  2. Assess the “Black Box” Problem: Determine if the algorithm is proprietary. If the developer refuses to allow outside researchers to view the source code or the logic behind the “risk scores,” the system fails the test of public accountability.
  3. Measure the Feedback Loop: Analyze the model’s impact over time. Does the deployment of police based on the model lead to an increase in actual public safety, or simply an increase in low-level arrests for offenses like drug possession or loitering in those specific areas?
  4. Define Success Metrics: Shift the focus from “arrest volume” to “harm reduction.” If a model increases arrest rates without decreasing violent crime rates, it is not an effective public safety tool.
  5. Implement Human-in-the-Loop Oversight: Ensure that the model only produces “suggestions” rather than “directives.” There must be a clear human review process where officers are trained to identify algorithmic bias before taking action based on a predictive lead.

Examples and Case Studies

The PredPol/Geolitica Experience: For years, the software formerly known as PredPol was used by major departments across the U.S. Independent researchers from the Human Rights Data Analysis Group eventually demonstrated that the software frequently sent officers to neighborhoods with large minority populations, regardless of actual violent crime trends. The reliance on historical arrest data meant the software simply mapped the history of over-policing, leading to the product’s eventual shift in market position and increased public scrutiny.

The Chicago Strategic Subject List (SSL): Chicago’s attempt to identify individuals at high risk of being involved in gun violence provides a cautionary tale. The program identified thousands of people as “high risk,” but an audit by the RAND Corporation found that the list did not successfully reduce homicide rates. Instead, it labeled thousands of individuals as targets for potential surveillance, creating a “scarlet letter” effect that hindered community trust and cooperation without a measurable impact on safety.

“Technology is not a neutral arbiter; it is a mirror reflecting the data we provide it. If our history is biased, our predictions will be prejudice masked in math.”

Common Mistakes in Implementation

  • Treating Algorithms as Infallible: Law enforcement leadership often frames software results as “objective truth” to avoid liability for deployment decisions. This creates a psychological bias among officers to trust the screen more than their own judgment or community engagement.
  • Ignoring Data Decay: Crime patterns change rapidly. Models built on five- or ten-year-old data often fail to account for current sociological shifts, neighborhood gentrification, or changes in local infrastructure, rendering the predictions obsolete or harmful.
  • Lack of Public Consultation: Many departments adopt these tools through private procurement processes without informing the communities being targeted. This lack of transparency alienates residents and erodes the legitimacy of law enforcement.
  • Over-reliance on Low-Level Offense Data: Many models count “nuisance” crimes or minor drug violations with the same weight as violent felonies. This leads to the hyper-policing of marginalized communities for non-violent behavior, failing to address core public safety concerns.

Advanced Tips for Reform

For those looking to influence policy or improve internal operations, consider these deeper strategies:

Adopt “Algorithmic Impact Assessments”: Before any software is purchased, require an independent impact assessment that explicitly models the disparate impact on protected classes. If the model cannot demonstrate that it will not produce a biased outcome, it should not be authorized for use.

Focus on “Risk Terrain Modeling” (RTM): Unlike standard predictive policing, RTM focuses on environmental factors—such as abandoned buildings, poor lighting, or high-traffic areas—rather than individual demographics or historical arrest patterns. This shifts the focus from “policing people” to “improving environments,” which is generally more effective and less discriminatory.

Mandate Public Disclosure: Communities have a right to know if they are being monitored by an algorithm. Legislation should require agencies to publish annual reports detailing how these tools are being used, what the intended outcomes are, and a transparent review of the results compared to the goals.

Conclusion

Predictive policing represents a technological pivot in how we conceive of law enforcement. By attempting to anticipate crime, we have unwittingly created a system that prioritizes historical patterns over current realities. The risk is not merely that these systems are “wrong”—it is that they are “right” according to the biased standards of our past.

To ensure that these tools enhance safety rather than exacerbate inequality, we must shift our perspective. We must view algorithms not as final authorities, but as limited, fallible, and potentially dangerous instruments. True public safety is not found in a line of code that marks a neighborhood as “high risk.” It is found in transparency, community engagement, and the honest acknowledgment that math can never replace the human duty to treat every citizen with equal regard under the law.

Newsletter

Our latest updates in your e-mail.


Leave a Reply

Your email address will not be published. Required fields are marked *