Adam Bannister

Editor, IFSEC Global

Author Bio ▼

Adam Bannister is editor of IFSEC Global. A former managing editor at Dynamis Online Media Group, he has been at the helm of the UK's leading fire and security publication since 2014.
January 8, 2018

Sign up to free email newsletters


“Second to none”: Inner Range improves security and access control for a large college in Stockport


“Alexa, I have a crime to report”: Amazon Echo to become crime-reporting tool

Lancashire Police are exploiting soaring sales of the Amazon Echo to open up a cost-effective channel for crime reporting at a time of budgetary austerity.

The force has announced that people will soon be able to report crime via the smart speaker, which is equipped with voice-operated digital assistant Alexa. Police officers will also issue daily crime bulletins into people’s homes.

They could share information about missing persons, wanted suspects in the area, and the number of officers on duty. Officers themselves could be targeted in their homes with updates on daily crime logs or breaking incidents.

“If we can reduce demand into our call centres via the use of voice recognition or voice-enabled technology and actually give the community the information they need without them needing to ring into police, then that’s massive,” Rob Flanagan, Lancashire Force’s innovation lead, told the College of Policing conference.

However, the force will have to address privacy concerns about reporting crimes anonymously given that crime reports would be stored on Amazon servers.

Like Apple, Amazon has form for not cooperating with police investigations. In January 2017, the retail giant refused to share information stored on its servers requested as part of an Arizona Police murder investigation.

The police aren’t the only cash-strapped public service or organisation that sees AI as a way of maintaining service quality in the face of funding cuts. Enfield Council, for instance, is using IPsoft’s cognitive virtual agent Amelia to guide residents through the complex local planning permission process.

Free Download: The key to mitigating cybersecurity risks

Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today’s security landscape.

This report will help you to see why third parties should adhere to ‘secure by design’ principles and why the necessary convergence of IT and security departments demands a holistic approach.

Download now

Related Topics

Leave a Reply

Be the First to Comment!

Notify of