A New Database Seeks to Catalog—and Hold Accountable—Police Officers Across the U.S.

Pacific Standard spoke with Camille Fassett, a researcher with Lucy Parsons Labs, about the OpenOversight program—a public database indexing law enforcement officers by name, photo, incidents, and more.
Arvind Dilawar,
A police officer in Bakersfield, California.

A police officer in Bakersfield, California. OpenOversight, which is creating a database of police officers and officer incidents, has apparently struck a nerve with some officers.

(Photo: David McNew/Getty Images)

OpenOversight is deceptively simple. Anyone trying to identify a police officer can log on to the website, select the police department or federal agency, enter as much or as little of the officer’s last name and badge number as they remember, choose the officer’s rank if they know it, and enter the approximate race, gender, and age. That query searches a database of law enforcement, producing not only names, badge numbers, and identifying features, but photos and incidents too: Officer Jason D. Van Dyke of the Chicago Police Department, badge number 9465, shot and killed Laquan McDonald in October of 2014; Officer Nicole M. Rhodes of the Oakland Police Department, badge number 736, shot and killed Demouria Hogg in June of 2015; Officer Sean Aranas of the University of California Police Department, badge number 76, allegedly extorted a hot dog vendor in September of 2017.

The project isn’t perfect. Of the 684,200 patrol officers in the United States, only 12,900 have been added to OpenOversight. Some of those profiles are limited to names, badge numbers, and ranks, and just 5 percent include photos. Only five police departments—Berkeley, Chicago, New York, Oakland, and the University of California—are included, along with two federal agencies—Customs and Border Protection, and Immigration and Customs Enforcement. And, as can be seen from the examples above, only high-profile incidents are currently catalogued.

Yet OpenOversight appears to have struck a nerve. Shortly after launching in 2016, the project became the target of spammers at the encouragement of an anonymous police blog. The president of the Chicago Fraternal Order of Police has also repeatedly claimed that it endangers police officers by making them identifiable.

But accountability is exactly what Lucy Parsons Labs, the non-profit organization behind OpenOversight, hopes to achieve with this project. Pacific Standard spoke with Camille Fassett, a researcher with Lucy Parsons Labs, about OpenOversight’s reception and its future.

section-break

What was the genesis of OpenOversight?

Back in 2016, someone that Lucy Parsons Labs knew in Chicago was assaulted by a police officer. She didn’t get his name or badge number, and for big police departments like Chicago, which has over 12,000 members, this information is critical for identifying officers; in a four-year period, approximately 4,000 complaints were tossed out due to investigators being unable to identify an officer.

She said something that really stuck with us: She said that she would recognize his face if she ever saw him again. So initially OpenOversight was developed to be a digital gallery of photos of police officers. That way, if someone wanted to identify an officer, they could input whatever they remembered, like race and sex and approximate age, and get back a list of possible faces.

https://openoversight.lucyparsonslabs.com/

Arvind Dilawar, , Pacific Standard, “A New Database Seeks to Catalog—and Hold Accountable—Police Officers Across the U.S.”, https://psmag.com/news/new-database-seeks-to-index-police-officers
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s