Big Data Surveillance: the Case of Policing

Total Page:16

File Type:pdf, Size:1020Kb

Big Data Surveillance: the Case of Policing ASRXXX10.1177/0003122417725865American Sociological ReviewBrayne 7258652017 American Sociological Review 2017, Vol. 82(5) 977 –1008 Big Data Surveillance: The © American Sociological Association 2017 https://doi.org/10.1177/0003122417725865DOI: 10.1177/0003122417725865 Case of Policing journals.sagepub.com/home/asr Sarah Braynea Abstract This article examines the intersection of two structural developments: the growth of surveillance and the rise of “big data.” Drawing on observations and interviews conducted within the Los Angeles Police Department, I offer an empirical account of how the adoption of big data analytics does—and does not—transform police surveillance practices. I argue that the adoption of big data analytics facilitates amplifications of prior surveillance practices and fundamental transformations in surveillance activities. First, discretionary assessments of risk are supplemented and quantified using risk scores. Second, data are used for predictive, rather than reactive or explanatory, purposes. Third, the proliferation of automatic alert systems makes it possible to systematically surveil an unprecedentedly large number of people. Fourth, the threshold for inclusion in law enforcement databases is lower, now including individuals who have not had direct police contact. Fifth, previously separate data systems are merged, facilitating the spread of surveillance into a wide range of institutions. Based on these findings, I develop a theoretical model of big data surveillance that can be applied to institutional domains beyond the criminal justice system. Finally, I highlight the social consequences of big data surveillance for law and social inequality. Keywords police, big data, inequality, crime, law In the past decade, two major structural devel- subject of contentious debate in policy, media, opments intersected: the proliferation of sur- legal, regulatory, and academic circles. How- veillance in everyday life and the rise of “big ever, discourse on the topic is largely specula- data.” Emblematic of the expansion of sur- tive, focusing on the possibilities, good and veillance (Lyon 2003; Marx 2016; Rule 2007) bad, of new forms of data-based surveillance. is the rapid growth of the criminal justice The technological capacities for surveillance system since 1972 (Carson 2015; Garland far outpace empirical research on the new 2001; Wakefield and Uggen 2010; Western data landscape. Consequently, we actually 2006). At the same time, facilitated by the know very little about how big data is used in mass digitization of information, there has been a rise in the computational analysis of massive and diverse datasets, known as “big aThe University of Texas at Austin data.” Big data analytics have been taken up in a wide range of fields, including finance, Corresponding Author: Sarah Brayne, Assistant Professor, Department of health, social science, sports, marketing, Sociology, The University of Texas at Austin, 305 security, and criminal justice. The use of big E. 23rd St., A1700, Austin, TX 78712-1086 data in police surveillance activities is the Email: [email protected] 978 American Sociological Review 82(5) surveillance activities and to what conse- into relational systems and include data origi- quence. nally collected in other, non-criminal-justice This article provides a case study of a large institutions. These shifts made possible by big urban police department—the Los Angeles data have implications for inequality, law, and Police Department (LAPD)—to investigate organizational practice in a range of institu- the relationship between big data analytics and tional domains. surveillance. In particular, it asks whether and how the adoption of big data analytics trans- forms police surveillance practices. Moreover, THE INTENSIFicatiON OF it investigates implications of new surveillance SURVEILLANCE practices not only for policing, but also for law, Surveillance is ubiquitous in modern societies social inequality, and research on big data sur- (Giddens 1990; Lyon 1994, 2003, 2006, 2015; veillance in other institutions. On the one hand, Marx 1974, 2002, 2016; Rule 1974). The big data analytics may be a rationalizing force, practice of surveillance involves the collec- with potential to reduce bias, increase effi- tion, recording, and classification of informa- ciency, and improve prediction accuracy. On tion about people, processes, and institutions the other hand, use of predictive analytics has (Foucault 1977; Haggerty and Ericson 2000; the potential to technologically reify bias and Lyon 2003; Marx 2016). A wide range of deepen existing patterns of inequality. scholars highlight the growing pervasiveness To shed light on the social dimensions of of surveillance, referring to the emergence of surveillance in the age of big data, I draw on “mass surveillance” (Rule 1974) and “surveil- original interview and observational data col- lance societies” (Lyon 1994). Although it has lected during fieldwork over the course of two received more attention in recent decades, and a half years with the LAPD. As an agency surveillance as a practice is not new. Processes at the forefront of data analytics, the Depart- of surveillance can be traced back to at least ment serves as a strategic site for understand- the sixteenth century, during the appearance of ing the interplay between technology, law, and the nation-state (Marx 2016), through the social relations. I provide one of the first on- transatlantic slave trade (Browne 2015), the-ground accounts of how the growing suite bureaucratization, rationalization, and modern of big data systems and predictive analytics management in the nineteenth and twentieth are used for surveillance within an organiza- centuries (Braverman 1974; Rule 1974; Weber tion, unpacking how in some cases, the adop- 1978), and as an axiomatic accompaniment to tion of big data analytics is associated with risk management practices in the twentieth mere amplifications in prior practices, but that century (Ericson and Haggerty 1997). The in others, it is associated with fundamental attacks on September 11th, 2001, further transformations in surveillance activities. I stimulated and legitimated the expansion of argue there are five key ways in which the surveillance. Widely viewed as a case of infor- adoption of big data analytics is associated mation sharing failure in the intelligence com- with shifts in practice to varying degrees: (1) munity, 9/11 encouraged an alignment of discretionary assessments of risk are supple- actors with vested interests in enhancing sur- mented and quantified using risk scores; (2) veillance operations (Ball and Webster 2007; data are increasingly used for predictive, Lyon 2015), spurred an infusion of tax dollars rather than reactive or explanatory, purposes; for development of new surveillance sensors (3) the proliferation of automated alerts makes and data mining programs to produce strategic it possible to systematically surveil an unprec- intelligence (Gandy 2002), and accelerated edentedly large number of people; (4) datasets the convergence of previously separate sur- now include information on individuals who veillance systems into a “surveillant assem- have not had any direct police contact; and (5) blage” (Deleuze and Guattari 1987; Haggerty previously separate data systems are merged and Ericson 2000). Brayne 979 Surveillance scholars have documented a remote, low visibility or invisible, involun- quantitative increase in surveillance, arguing tary, automated, preemptive, and embedded that surveillance is one of the major institu- into routine activity (Marx 2002, 2016). In tional dimensions of modern societies (Ball fact, new forms of systematic surveillance and Webster 2007; Giddens 1990; Lyon 1994, have become quotidian to the point that it is 2003; Marx 1988, 2016). Although surveil- now an unavoidable feature of everyday life lance is growing in all areas of society, its (Ball and Webster 2007; Lyon 2003; Marx penetration is unevenly distributed (Fiske 2016). Consider the extent to which surveil- 1998). Some individuals, groups, areas, and lance is a requisite of participating in today’s institutions are surveilled more than others, world (Ball and Webster 2007): to use a bank, and different populations are surveilled for send an e-mail, obtain medical care, make a different purposes (Lyon 2003). On the one phone call, travel on a highway, or conduct an hand, there is a deepening of surveillance of Internet search, individuals leave digital “at-risk” groups, such as parolees and indi- traces that are recorded and saved (see also viduals on public assistance (Gilliom 2001; Foucault 1977; Haggerty and Ericson 2000; Gustafson 2011; Soss, Fording, and Schram Lyon 2003). 2011), who can increasingly be tracked across Technologically mediated surveillance has institutional boundaries. On the other hand, become routine organizational practice in a emerging “dragnet” surveillance practices— wide range of public and private domains. It meaning those that collect data on everyone, is a tool of general governance (Lyon 2003), rather than merely individuals under suspi- a basic prerogative of individuals in all sorts cion—result in increased monitoring of of private and public institutions, and a tool to groups “previously exempt from routine sur- accomplish “goals that meet particular inter- veillance” (Haggerty and Ericson 2000:606; ests” (Ericson and Haggerty 2006:22). Sur- see also Angwin 2014; Lyon 2015). Surveil- veillance scholars have accordingly extended
Recommended publications
  • Introduction to Victimology and Victims' Rights Van Der Aa, Suzan
    Tilburg University Introduction to victimology and victims' rights van der Aa, Suzan Published in: Strengthening judicial cooperation to protect victims of crime Publication date: 2014 Document Version Early version, also known as pre-print Link to publication in Tilburg University Research Portal Citation for published version (APA): van der Aa, S. (2014). Introduction to victimology and victims' rights. In Strengthening judicial cooperation to protect victims of crime: Handbook (pp. 6-12). Superior Council of Magistracy of Romania. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 04. okt. 2021 This publication has been produced with the financial support of the Specific Programme Criminal Justice of the European Union. The contents of this publication are the sole responsibility of the
    [Show full text]
  • Articles on Crimes Against Humanity
    Draft articles on Prevention and Punishment of Crimes Against Humanity 2019 Adopted by the International Law Commission at its seventy-first session, in 2019, and submitted to the General Assembly as a part of the Commission’s report covering the work of that session (A/74/10). The report will appear in Yearbook of the International Law Commission, 2019, vol. II, Part Two. Copyright © United Nations 2019 Prevention and punishment of crimes against humanity … Mindful that throughout history millions of children, women and men have been victims of crimes that deeply shock the conscience of humanity, Recognizing that crimes against humanity threaten the peace, security and well- being of the world, Recalling the principles of international law embodied in the Charter of the United Nations, Recalling also that the prohibition of crimes against humanity is a peremptory norm of general international law (jus cogens), Affirming that crimes against humanity, which are among the most serious crimes of concern to the international community as a whole, must be prevented in conformity with international law, Determined to put an end to impunity for the perpetrators of these crimes and thus to contribute to the prevention of such crimes, Considering the definition of crimes against humanity set forth in article 7 of the Rome Statute of the International Criminal Court, Recalling that it is the duty of every State to exercise its criminal jurisdiction with respect to crimes against humanity, Considering the rights of victims, witnesses and others in relation to crimes against humanity, as well as the right of alleged offenders to fair treatment, Considering also that, because crimes against humanity must not go unpunished, the effective prosecution of such crimes must be ensured by taking measures at the national level and by enhancing international cooperation, including with respect to extradition and mutual legal assistance, … Article 1 Scope The present draft articles apply to the prevention and punishment of crimes against humanity.
    [Show full text]
  • Four Models of the Criminal Process Kent Roach
    Journal of Criminal Law and Criminology Volume 89 Article 5 Issue 2 Winter Winter 1999 Four Models of the Criminal Process Kent Roach Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Kent Roach, Four Models of the Criminal Process, 89 J. Crim. L. & Criminology 671 (1998-1999) This Criminology is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/99/8902-0671 THM JOURNAL OF QMINAL LAW& CRIMINOLOGY Vol. 89, No. 2 Copyright 0 1999 by Northwestem University. School of Law Psisd in USA. CRIMINOLOGY FOUR MODELS OF THE CRIMINAL PROCESS KENT ROACH* I. INTRODUCTION Ever since Herbert Packer published "Two Models of the Criminal Process" in 1964, much thinking about criminal justice has been influenced by the construction of models. Models pro- vide a useful way to cope with the complexity of the criminal pro- cess. They allow details to be simplified and common themes and trends to be highlighted. "As in the physical and social sciences, [models present] a hypothetical but coherent scheme for testing the evidence" produced by decisions made by thousands of actors in the criminal process every day.2 Unlike the sciences, however, it is not possible or desirable to reduce the discretionary and hu- manistic systems of criminal justice to a single truth.
    [Show full text]
  • Evaluation of the Shreveport Predictive Policing Experiment
    Safety and Justice Program CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY Support RAND Purchase this document Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Safety and Justice Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that ad- dress the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Evaluation of the Shreveport Predictive Policing Experiment Priscillia Hunt, Jessica Saunders, John S.
    [Show full text]
  • I. the Victim-Offender Overlap
    Draft – Please do not distribute or cite without author’s permission VICTIMS AND OFFENDERS CYNTHIA GODSOE, BROOKLYN LAW SCHOOL TABLE OF CONTENTS I. THE VICTIM-OFFENDER OVERLAP .................................................................... A. History of Victimology ................................................................................ B. Theory of V/O Overlap ................................................................................ II. CONTEXTS ...................................................................................................... A. Mutual Liability ........................................................................................... 1. Statutory Rape Between Two (or more) Minors................................ 2. Intimate Partner Violence “Mutual Combat” .................................... B. Double-Sided Coin/Chameleon Conduct ................................................... 1. Prostitution and Trafficking/Sexual Abuse (if Minors) ..................... 2. Sexting and Child Pornography ......................................................... C. A More Worthy Victim/Out-Victimed ........................................................ 1. Maternal Failure to Protect ................................................................ 2. Child Pornography v. Sexual Abuse/CSEC ....................................... D. Missing Victims ........................................................................................... 1. Drug Offenses ...................................................................................
    [Show full text]
  • 'Transnational Criminal Law'?
    MFK-Mendip Job ID: 9924BK--0085-3 3 - 953 Rev: 27-11-2003 PAGE: 1 TIME: 11:20 SIZE: 61,11 Area: JNLS OP: PB ᭧ EJIL 2003 ............................................................................................. ‘Transnational Criminal Law’? Neil Boister* Abstract International criminal law is currently subdivided into international criminal law stricto sensu — the so-called core crimes — and crimes of international concern — the so-called treaty crimes. This article suggests that the latter category can be appropriately relabelled transnational criminal law to find a doctrinal match for the criminological term transnational crime. The article argues that such a relabelling is justified because of the need to focus attention on this relatively neglected system, because of concerns about the process of criminalization of transnational conduct, legitimacy in the development of the system, doctrinal weaknesses, human rights considerations, legitimacy in the control of the system, and enforcement issues. The article argues that the distinction between international criminal law and transnational criminal law is sustainable on four grounds: the direct as opposed to indirect nature of the two systems, the application of absolute universality as opposed to more limited forms of extraterritorial jurisdiction, the protection of international interests and values as opposed to more limited transnational values and interests, and the differently constituted international societies that project these penal norms. Finally, the article argues that the term transnational criminal law is apposite because it is functional and because it points to a legal order that attenuates the distinction between national and international. 1 Introduction The term ‘transnational crime’ is commonly used by criminologists, criminal justice officials and policymakers,1 but its complementary term, ‘transnational criminal law’ (TCL), is unknown to international lawyers.
    [Show full text]
  • Transnational Organized Crime
    IPI Blue Papers Transnational Organized Crime Task Forces on Strengthening Multilateral Security Capacity No. 2 2009 INTERNATIONAL PEACE INSTITUTE Transnational Organized Crime Transnational Organized Crime Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 2 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge of Transnational Organized Crime (TOC). .4 Ideas for Action. .14 I. convene a hIgh-level ConFerenCe on toC aS a ThreaT To SeCurity ii. maP The impacts oF ToC on SeCurity, developmenT, and stability iii. strengThen Crime ThreaT analysis For un PeaCe efforts Iv. develoP straTegic, Investigative, and oPerational ParTnerShips v.
    [Show full text]
  • Guilt, Dangerousness and Liability in the Era of Pre-Crime
    Please cite as: Getoš Kalac, A.M. (2020): Guilt, Dangerousness and Liability in the Era of Pre-Crime – the Role of Criminology? Conference Paper presented at the 2019 biannual conference of the Scientific Association of German, Austrian and Swiss Criminologists (KrimG) in Vienna. Forthcoming in: Neue Kriminologische Schriftenreihe der Kriminologischen Gesellschaft e.V., vol. 118, Mönchengladbach: Forum Verlag Godesberg. Guilt, Dangerousness and Liability in the Era of Pre-Crime – the Role of Criminology? To Adapt, or to Die, that is the Question!1 Anna-Maria Getoš Kalac Abstract: There is no doubt that, in terms of criminal policy, we have been living in an era of pre-crime for quite some time now. Whether we like it or not, times have changed and so has the general position on concepts of (criminal) guilt, dangerousness and liability. Whereas once there was a broad consensus that penal repression, at least in principle, should be executed in a strictly post-crime fashion, nowadays same consensus has been reached on trading freedom (from penal repression) for (promised) security, long before an ‘actual crime’ might even be committed. In this regard the criminalisation of endangerment and risks only nomotechnically solves the issue of ‘actual’ vs. ‘potential’ crimes – in essence it merely creates a normative fiction of pre-crime crimes, whereas in reality ‘actual crimes’ do not exist at all. The starting point of criminalisation has clearly shifted away from the guilt of having committed a crime, to the mere dangerousness of potentially committing a crime, which potential as such is purely hypothetical and beyond the grasp of empirical proof.
    [Show full text]
  • Predictive POLICING the Role of Crime Forecasting in Law Enforcement Operations
    Safety and Justice Program CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY Support RAND Purchase this document Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Safety and Justice Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that ad- dress the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. Safety and Justice Program PREDICTIVE POLICING The Role of Crime Forecasting in Law Enforcement Operations Walter L.
    [Show full text]
  • How Will AI Shape the Future of Law?
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Helsingin yliopiston digitaalinen arkisto How Will AI Shape the Future of Law? EDITED BY RIIKKA KOULU & LAURA KONTIAINEN 2019 Acknowledgements The editors and the University of Helsinki Legal Tech Lab would like to thank the authors and interviewees for the time and effort they put into their papers. We would also like to thank the Faculty of Law at University of Helsinki and particularly the continuous kind support of Professor Kimmo Nuotio, the former dean of the faculty and the Lab’s unofficial godfather, for facilitating the Lab’s development and for helping us make the second Legal Tech Conference happen. In addition, we would like to express our gratitude to the conference sponsors, Finnish Bar Association, the Association of Finnish Lawyers, Edita Publishing, Attorneys at Law Fondia and Attorneys at Law Roschier as well as the Legal Design Summit community for their support. It takes a village to raise a conference. Therefore, we would like to thank everyone whose time and commitment has turned the conference and this publication from an idea into reality. Thank you to the attendees, speakers, volunteers and Legal Tech Lab crew members. RIIKKA KOULU & LAURA KONTIAINEN Legal Tech Lab, University of Helsinki 2019 University of Helsinki Legal Tech Lab publications © Authors and Legal Tech Lab ISBN 978-951-51-5476-7 (print) ISBN 978-951-51-5477-4 (PDF) Print Veiters Helsinki 2019 Contents Foreword 009 KIMMO NUOTIO I Digital Transformation of
    [Show full text]
  • EPIC V. ICE Complaint (Palantir) V0.99
    Case 1:17-cv-02684 Document 1 Filed 12/15/17 Page 1 of 11 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Avenue, NW Suite 200 Washington, DC 20009, Plaintiff, v. Civ. Action No. 17-2684 U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT 500 12th Street SW Washington, DC 20536, Defendant. COMPLAINT FOR INJUNCTIVE RELIEF 1. This is an action under the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552, for injunctive and other appropriate relief, seeking the release of agency records requested by the Plaintiff Electronic Privacy Information Center (“EPIC”) from Defendant Immigration and Customs Enforcement (“ICE”), a component of the U.S. Department of Homeland Security (“DHS”). 2. EPIC challenges ICE’s failure to make a timely response to EPIC’s Freedom of Information Act request (“EPIC’s FOIA Request”) for records about ICE’s contracts and other information related to the FALCON systems and the Investigative Case Management (“ICM”) system. 1 Case 1:17-cv-02684 Document 1 Filed 12/15/17 Page 2 of 11 Jurisdiction and Venue 3. This Court has subject matter jurisdiction over this action pursuant to 28 U.S.C. § 1331 and 5 U.S.C. §§ 552, (a)(6)(E)(iii), (a)(4)(B). This Court has personal jurisdiction over Defendant ICE. 4. Venue is proper in this district under 5 U.S.C. § 552(a)(4)(B). Parties 5. Plaintiff EPIC is a nonprofit organization, incorporated in Washington, DC, established in 1994 to focus public attention on emerging privacy and civil liberties issues.
    [Show full text]
  • Establishing Discriminatory Purpose in Algorithmic Risk Assessment
    NOTES BEYOND INTENT: ESTABLISHING DISCRIMINATORY PURPOSE IN ALGORITHMIC RISK ASSESSMENT Equal protection doctrine is bound up in conceptions of intent. Unintended harms from well-meaning persons are, quite simply, nonac- tionable.1 This basic predicate has erected a high bar for plaintiffs ad- vancing equal protection challenges in the criminal justice system. Notably, race-based challenges on equal protection grounds, which sub- ject the state to strict scrutiny review, are nonetheless stymied by the complexities of establishing discriminatory purpose. What’s more, the inability of courts and scholars to coalesce on a specific notion of the term has resulted in gravely inconsistent applications of the doctrine.2 States’ increasing use of algorithmic systems raises longstanding con- cerns regarding prediction in our criminal justice system — how to cat- egorize the dangerousness of an individual, the extent to which past behavior is relevant to future conduct, and the effects of racial dispari- ties.3 Integration of algorithmic systems has been defined by ambiva- lence: while they are touted for their removal of human discretion,4 they also readily promote and amplify inequalities — for example, through their consideration of protected characteristics and their interaction with existing systems tainted by legacies of inequality.5 Furthermore, algo- rithms, especially those incorporating artificial intelligence (AI), may operate in ways that are opaque, unpredictable, or not well understood. ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– 1 See Washington v. Davis, 426 U.S. 229, 239–40 (1976). 2 See Aziz Z. Huq, What Is Discriminatory Intent?, 103 CORNELL L. REV. 1211, 1240–63 (2018) (presenting five definitions from the literature). 3 See Sonia K.
    [Show full text]