Enhancing Intelligence-Led Policing: Law Enforcement’s Big Data Revolution

  • Ian Stanier


This chapter offers an overview of primary Big Data sets ‘owned’ by or formally accessible to UK law enforcement. It examines, through the lens of practitioners, how Big Data is utilised in mitigating identified or anticipated harm to individuals and communities. It outlines accompanying oversight and governance arrangements. The chapter explores key organisational, technological, ethical, and cultural challenges faced by law enforcement seeking to exploit Big Data when discharging legal responsibilities in safeguarding communities, reducing crime, and addressing anti-social behaviour. This chapter concludes that Big Data is critical for enhanced public safety but that optimal use is hampered by inadequate staff skills, technological dysfunctionality, organisational risk aversion to information, and an absence of engagement and effort with the public.


Big Data Intelligence-led policing Data management Law enforcement Oversight bodies Intelligence gathering Intelligence agencies Policing 


  1. Accenture. (2013). Preparing police services for the future.Google Scholar
  2. Bartlett, J., Miller, C., Crump, J., & Middleton, L. (2013). Policing in an information age. London: DEMOS.Google Scholar
  3. Bichard, M. (2004). The Bichard inquiry report: A public inquiry report on child protection procedures in Humberside Police and Cambridgeshire Constabulary, particularly the effectiveness of relevant intelligence-based record keeping, vetting practices since 1995 and information sharing with other agencies. London: HMSO.Google Scholar
  4. Boyd, D., & Crawford, K. (2012). Critical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication, & Society, 15(5), 662–679. Retrieved June 7, 2015, from
  5. College of Policing. (2015). Leadership review: Interim report, Appendix 2.Google Scholar
  6. Council Decision 2007/533/JHA.Google Scholar
  7. Etzioni, A. (1999). The limits of privacy. New York: Basic Books.Google Scholar
  8. European Commission. (2011, June). Eurobarometer 359 attitudes on data protection and electronic identity in the European Union Report. Google Scholar
  9. European Commission Migration and Home Affairs Schengen Information System. (2015). Retrieved June 30, 2015, from
  10. European Commission Press release. (2013, April 9). Questions and answers: Schengen Information System (SISII). Retrieved June 9, 2015, from
  11. Haggerty, K. D. (2012). Surveillance, crime and the police. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies. New York: Routledge Abingdon Oxon.Google Scholar
  12. Hickey, H. (2015). Police oracle ‘Huge backlog of criminal record checks’. Retrieved April 8, 2015, from
  13. HMIC. (2011). The rules of engagement: Report into the August 2011 disorder.Google Scholar
  14. HMIC. (2013). “Mistakes were made” HMIC’s review into the allegations and intelligence material concerning Jimmy Savile between 1964 and 2012 (HMIC 978-1-78246-111-1).Google Scholar
  15. HMIC. (2014a, October). Inspection of undercover policing in England and Wales.Google Scholar
  16. HMIC. (2014b, June). Strategic policing requirement: An inspection of how police forces in England and Wales deal with threats of a large-scale incident (including criminal attack).Google Scholar
  17. HMIC. (2014c, November). State of policing: The annual assessment of policing in England and Wales 2013/14. London: HMIC.Google Scholar
  18. HMIC. (2015a, March). Rape monitoring groups: Digests and data 2013/14.Google Scholar
  19. HMIC. (2015b, March). An inspection of the National Crime Agency. Google Scholar
  20. HMIC. (2015c, July). In harm’s way: The role of the police in keeping children safe.Google Scholar
  21. HMIC. (2015d, July). Building the picture: An inspection of police information management (HMIC 978-1-78246-817-2).Google Scholar
  22. Home Office. (2013). National DND Database Strategy Board Annual Report 2012–2013.Google Scholar
  23. Home Office. (2014, March 31). Police workforce numbers, England and Wales.Google Scholar
  24. House of Commons Science and Technology Committee. (2014). Responsible use of Data 2014 Fourth report of Session 2014-2015 (HC 245). London: The Stationary Office.Google Scholar
  25. Independent Chief Inspector of Borders and Immigration. (2013). Exporting the border? An inspection of e-borders, October 2012–March 2013.Google Scholar
  26. Ipsos MORI. (2014, May). Privacy and personal data: Poll conducted by Ipsos MORI for the Joseph Rowntree Reform Trust, Ipsos MORI/Joseph Rowntree Reform Trust Limited.Google Scholar
  27. Kitchin, R. (2014). The data revolution: Big data, open data, data infrastructures and their consequences. London: Sage.Google Scholar
  28. Olesker, A. (2012). Big Data solutions for law enforcement. CLO Labs.Google Scholar
  29. Omand, D., Bartlett, J., & Miller, C. (2012). #Intelligence. London: Demos.Google Scholar
  30. Posner, R. (2006). Not a suicide pact: The constitution in a time of national emergency. New York: Oxford University Press.Google Scholar
  31. Regulation (EC) No. 1986/2006.Google Scholar
  32. Regulation (EC) No. 1987/2006.Google Scholar
  33. S and Marper v UK. (2008). App No. 30562/04.Google Scholar
  34. Sciencewise Expert Resource Centre. (2014, April). Big data: Public views on the collection, sharing and use of personal data by governments and companies (Version 1).Google Scholar
  35. Sheptycki, J. (2004). Organizational pathologies in police intelligence systems: Some contributions to the lexicon of intelligence-led policing. European Journal of Criminology Volume, 1(3), 307–332.CrossRefGoogle Scholar
  36. Stanier, I. (2013). Contemporary organisational pathologies in police information sharing: New contributions to Sheptycki’s lexicon of intelligence led policing. Unpublished Doctorate.Google Scholar
  37. Weinfass, I. (2015). Police oracle ‘GMP to review 11,000 firearms licences’. Retrieved April 24, 2015, from,000-firearms-licences_87971

Copyright information

© The Editor(s) (if applicable) and The Author(s) 2016

Authors and Affiliations

  • Ian Stanier
    • 1
  1. 1.Associate LecturerUniversity of Portsmouth, Institute of Criminal Justice StudiesPortsmouthUK

Personalised recommendations