{"id":27495,"date":"2021-12-09T15:51:37","date_gmt":"2021-12-09T20:51:37","guid":{"rendered":"https:\/\/studentwork.prattsi.org\/infovis\/?p=27495"},"modified":"2021-12-09T15:51:40","modified_gmt":"2021-12-09T20:51:40","slug":"police-technology-in-the-us","status":"publish","type":"post","link":"https:\/\/studentwork.prattsi.org\/infovis\/visualization\/police-technology-in-the-us\/","title":{"rendered":"Police technology in the us"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p><em>What is police technology? How have they developed overtime? What surveillance technologies is the law enforcement in the US using?  How can the law enforcement potentially harm vulnerable communities? What surveillance technology is implemented and used by state? <\/em><br><br>These are the following questions I will attempt to answer using <a href=\"https:\/\/www.google.com\/search?q=GEPHI&amp;rlz=1C5CHFA_enUS902US902&amp;oq=GEPHI+&amp;aqs=chrome..69i57j0i512j69i59j0i512j69i60l4.2358j0j7&amp;sourceid=chrome&amp;ie=UTF-8\" data-type=\"URL\" data-id=\"https:\/\/www.google.com\/search?q=GEPHI&amp;rlz=1C5CHFA_enUS902US902&amp;oq=GEPHI+&amp;aqs=chrome..69i57j0i512j69i59j0i512j69i60l4.2358j0j7&amp;sourceid=chrome&amp;ie=UTF-8\">Gephi<\/a> by creating a network analysis graph. <br><\/p>\n\n\n\n<p>After the death of George Floyd on May 25 of 2020, social unrest and protests proliferated all across the US and internationally. My social media feeds were permeating with history, information, updates, violence of police brutality in this country but also it being done globally. As community organizers and grass-root organizations began to share rallies and protests across social media, they also began to alert everyone to turn off their phones and dress discreetly because of drones and cell-site simulators. This was the first moment I consciously knew that I was one of many being targeted by police surveillance. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Process<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Data<\/h3>\n\n\n\n<p>The Electronic Frontier Foundation partnered with University of Nevada&#8217;s Reynolds School of Journalism on <a href=\"https:\/\/atlasofsurveillance.org\/\" data-type=\"URL\" data-id=\"https:\/\/atlasofsurveillance.org\/\">Atlas of Surveillance: Documenting Police Tech in our Communities with Open Source Research<\/a> project. The following features I was most interested were the following: <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<ul class=\"wp-block-list\"><li>City<\/li><li>Country<\/li><li>State<\/li><li>Agency<\/li><li>Type of LEA<\/li><li>Summary<\/li><li>Type of Jurisdiction<\/li><li>Technology <\/li><li>Vendor<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Cleaning<\/h3>\n\n\n\n<p>The original dimensions of the dataset were 26 features by 7,303 observations. I removed all observations where <strong>Agency<\/strong>,<strong> Vendor<\/strong> ,<strong>Technology<\/strong>, <strong>State<\/strong> were undefined. I uploaded my dataset into <a href=\"https:\/\/openrefine.org\/\">OpenRefine<\/a> to update the discrepancies of naming conventions to make sure they all coincided. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Preparing<\/h3>\n\n\n\n<p>My initial goal was to use the features laid out above, but I experienced difficulty when setting my edge table in Gephi. Somehow, it duplicated my <strong>target<\/strong> column onto the nodes<strong> Id<\/strong> column, creating an insurmountable number of null values when beginning to graph. Because of this, I used the following video <a href=\"https:\/\/www.youtube.com\/watch?v=OYrzMhT0Kag&amp;t=313s\" data-type=\"URL\" data-id=\"https:\/\/www.youtube.com\/watch?v=OYrzMhT0Kag&amp;t=313s\">Convert Excel CSV into Network<\/a> in order to make my graph more understandable to me<br><br><span style=\"text-decoration: underline\">Edge Table<\/span><br><em>Target<\/em> being <strong>Technology<\/strong> <br><em>Source<\/em> being the <strong>State<\/strong> <br><em>Type<\/em> being <strong>Undirected<\/strong> <br>Weight <br><br><br><span style=\"text-decoration: underline\">Nodes Table<\/span><br><em>Id<\/em> &amp; <em>Label<\/em> were <strong>State<\/strong> and <strong>Technology<\/strong><br><em>Frequency<\/em> <br><em>Type<\/em>: <strong>Source<\/strong> or <strong>Target<\/strong><br><br><br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Visualization<\/h3>\n\n\n\n<p>As the following visualization points out, the surveillance technologies registered in the dataset are as follows:<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\"><li>Body worn cameras <\/li><li>Automated license plate readers <\/li><li>Camera Registry <\/li><li>Cell-site simulator<\/li><li>Ring\/Neighborhood partnership<\/li><li>Drones<\/li><li>Face recognition<\/li><li>Video analytics<\/li><li>Real-time crime center<\/li><li>Gunshot detection<\/li><li>Predictive policing <\/li><\/ul>\n<\/div><\/div>\n\n\n\n<p>The network analysis shows the relationship between the above surveillance technologies with states in the U.S. I found it interesting takeaways were Puerto Rico and the US Virgin Islands are only utilizing gunshot detection surveillance. Florida has the highest use of facial recognition technology, Tennessee has a strong use of predictive policing technologies. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"1024\" src=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8-585x1024.png?resize=585%2C1024&#038;ssl=1\" alt=\"\" class=\"wp-image-27498\" srcset=\"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=585%2C1024&amp;ssl=1 585w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=171%2C300&amp;ssl=1 171w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=768%2C1344&amp;ssl=1 768w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=878%2C1536&amp;ssl=1 878w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=1170%2C2048&amp;ssl=1 1170w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=800%2C1400&amp;ssl=1 800w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?resize=103%2C180&amp;ssl=1 103w, https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/Artboard-1%402x-8.png?w=1680 1680w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-vimeo wp-block-embed-vimeo\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-wrapper\"><iframe loading=\"lazy\" title=\"network-analysis-us-surveillance\" src=\"https:\/\/player.vimeo.com\/video\/650943159?dnt=1&amp;app_id=122963\" width=\"840\" height=\"643\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Further Readings<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"http:\/\/Taylor, Derrick Bryson. \u201cGeorge Floyd Protests: A Timeline.\u201d The New York Times, The New York Times, 30 May 2020, https:\/\/www.nytimes.com\/article\/george-floyd-protests-timeline.html\">George Floyd Protests<\/a><\/li><\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview What is police technology? How have they developed overtime? What surveillance technologies is the law enforcement in the US using? How can the law enforcement potentially harm vulnerable communities? What surveillance technology is implemented and used by state? These are the following questions I will attempt to answer using Gephi by creating a network&hellip;<\/p>\n","protected":false},"author":3905,"featured_media":27496,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[1667],"class_list":["post-27495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-visualization"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/studentwork.prattsi.org\/infovis\/wp-content\/uploads\/sites\/3\/2021\/11\/us-surveillance-network-analysis.png?fit=1154%2C2016&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paBdcV-79t","_links":{"self":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/27495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/users\/3905"}],"replies":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/comments?post=27495"}],"version-history":[{"count":3,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/27495\/revisions"}],"predecessor-version":[{"id":28196,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/posts\/27495\/revisions\/28196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/media\/27496"}],"wp:attachment":[{"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/media?parent=27495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/categories?post=27495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/tags?post=27495"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/infovis\/wp-json\/wp\/v2\/coauthors?post=27495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}