SlideShare una empresa de Scribd logo
1 de 30
Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter TwelveChapter Twelve
Crime AnalysisCrime Analysis
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Learning ObjectivesLearning Objectives
 Understand the definition of crimeUnderstand the definition of crime
analysis and underpinning theoriesanalysis and underpinning theories
 Understand the applications of crimeUnderstand the applications of crime
analysisanalysis
 Be exposed to how crime analysis canBe exposed to how crime analysis can
be used to solve community problemsbe used to solve community problems
and advanced crime mapping topicsand advanced crime mapping topics
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IntroductionIntroduction
Without the component of criminalWithout the component of criminal
investigations, neither the Communityinvestigations, neither the Community
Policing nor Problem-OrientedPolicing nor Problem-Oriented
Policing models have value.Policing models have value.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IntroductionIntroduction
At the core, the functionsAt the core, the functions
of state and local lawof state and local law
enforcement remain:enforcement remain:
 PreventionPrevention
 Investigation, andInvestigation, and
 ApprehensionApprehension
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
and Community-Oriented Policingand Community-Oriented Policing
 Problem solving is a criticalProblem solving is a critical
component of the COP model.component of the COP model.
 An essential part of problemAn essential part of problem
solving is an examination ofsolving is an examination of
incidents, their relationships toincidents, their relationships to
each other, and their relationshipseach other, and their relationships
to underlying problems.to underlying problems.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
 One of the ways police officers useOne of the ways police officers use
their expertise in problem solving istheir expertise in problem solving is
through the analysis of crime.through the analysis of crime.
 Crime analysis starts with crimeCrime analysis starts with crime
mapping.mapping.
 A crime may be the result of a varietyA crime may be the result of a variety
of other factors.of other factors.
Crime AnalysisCrime Analysis
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
Crime mapping is about:Crime mapping is about:
 Problem solvingProblem solving
 The identification ofThe identification of
the problemthe problem
 Using the informationUsing the information
gained from analysisgained from analysis
to mitigate theto mitigate the
problemproblem
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Scanning-Analysis-Response-Scanning-Analysis-Response-
AssessmentAssessment::
One of the most prevalent problem-solvingOne of the most prevalent problem-solving
methodologies used by policemethodologies used by police
departmentsdepartments
S A R AS A R A
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
What Are the BenefitsWhat Are the Benefits
of Crime Analysis?of Crime Analysis?
 The ability to show relationshipsThe ability to show relationships
between crime and casual factors.between crime and casual factors.
 Promotes information integrationPromotes information integration
and cooperation among differentand cooperation among different
police agencies and otherpolice agencies and other
government agenciesgovernment agencies
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
 A COP enhancer because they canA COP enhancer because they can
assist in the establishment ofassist in the establishment of
partnerships with other non-lawpartnerships with other non-law
enforcement agencies.enforcement agencies.
 Can enhance communication withinCan enhance communication within
and without the police department.and without the police department.
Crime Analysis and COPCrime Analysis and COP
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
These relationship factors may be:These relationship factors may be:
 SpatialSpatial in nature (resulting from itsin nature (resulting from its
proximity to a location).proximity to a location).
 TemporalTemporal – Having to do with a– Having to do with a
certain time periodcertain time period
Time, Space and CrimeTime, Space and Crime
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
DisplacementDisplacement
 Crime analysis information is used toCrime analysis information is used to
deploy more officers in an area that isdeploy more officers in an area that is
experiencing a higher crime rate.experiencing a higher crime rate.
 The deployment of more officersThe deployment of more officers
stops the crime form occurring therestops the crime form occurring there
and then – It is displaced.and then – It is displaced.
 DisplacementDisplacement can be spatial orcan be spatial or
temporal.temporal.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IncapacitationIncapacitation
 Most crime is committed by a veryMost crime is committed by a very
small percentage of a community.small percentage of a community.
 The police should be targeting theirThe police should be targeting their
efforts on those individualsefforts on those individuals
 If an offender is arrested instead ofIf an offender is arrested instead of
being displaced,being displaced, incapacitationincapacitation
occurs.occurs.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Serial CrimesSerial Crimes
 Multiple crimes committed by anMultiple crimes committed by an
offender or group of offenders, whichoffender or group of offenders, which
occur over a period of time.occur over a period of time.
 Crime analysis is moving towards theCrime analysis is moving towards the
identification of serial crimes and theidentification of serial crimes and the
targeting of serial offenderstargeting of serial offenders
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Rational Choice, Situational CrimeRational Choice, Situational Crime
Prevention, and Crime AnalysisPrevention, and Crime Analysis
Situational CrimeSituational Crime
Prevention isPrevention is
based on two things:based on two things:
 OffenderOffender
opportunityopportunity andand
 Rational ChoiceRational Choice
TheoryTheory
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Offenders choose to commit crimesOffenders choose to commit crimes
when:when:
 The opportunity is rightThe opportunity is right
 They have enough information thatThey have enough information that
the value of the crime is more thanthe value of the crime is more than
the risk of punishment (risk vs. value)the risk of punishment (risk vs. value)
Offender opportunityOffender opportunity
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Routine Activity TheoryRoutine Activity Theory
Three parts to thisThree parts to this
theory:theory:
 An offenderAn offender
 A victimA victim
 The absence of anThe absence of an
interfering orinterfering or
restraining force –restraining force –
something that adds tosomething that adds to
the risk of detection.the risk of detection.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Basic RequirementsThe Basic Requirements
for Crime Analysisfor Crime Analysis
 You cannot conduct modernYou cannot conduct modern
crime analysis without mappingcrime analysis without mapping
capabilitiescapabilities
 You cannot conduct geographicYou cannot conduct geographic
and statistical analysis withoutand statistical analysis without
minimal hardware and softwareminimal hardware and software
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
At minimum you need . . .At minimum you need . . .
 A laptop or desktopA laptop or desktop
computer withcomputer with
sufficient speedsufficient speed
 Hard disk storage toHard disk storage to
accommodate youraccommodate your
data and functionsdata and functions
 A high-quality printerA high-quality printer
that can handle colorthat can handle color
maps and workload.maps and workload.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Where does the data come from?Where does the data come from?
Two types of data needed:Two types of data needed:
 Mapping dataMapping data – general data– general data
about your communityabout your community
 Crime dataCrime data – specific data about– specific data about
criminal occurrences in yourcriminal occurrences in your
communitycommunity
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Analysis of a CrimeThe Analysis of a Crime
Crime analysis begins withCrime analysis begins with
statistical analysisstatistical analysis. Mapping is. Mapping is
critical to crime analysis, but itcritical to crime analysis, but it
is not the starting point.is not the starting point.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Mean numberMean number
the averagethe average
Burglaries 2003/4Burglaries 2003/4
JanJan 8282
FebFeb 7878
MarMar 7575
AprilApril 7474
MayMay 7575
JuneJune 8080
JulyJuly 7272
AugAug 7575
SeptSept 7878
OctOct 8080
NovNov 110110
DecDec 114114
993993
993 / 12 = 82993 / 12 = 82
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Analysis of a CrimeThe Analysis of a Crime
 Begins with look at average occurrencesBegins with look at average occurrences
as compared to another period.as compared to another period.
 This can indicate a rise in crime.This can indicate a rise in crime.
 After initial statistical analysis thatAfter initial statistical analysis that
indicates a rise, the search for patternsindicates a rise, the search for patterns
begins.begins.
 A search for patterns – time, date, method ofA search for patterns – time, date, method of
operation, etc, can lead to potential solutionsoperation, etc, can lead to potential solutions
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Hot SpotsHot Spots
 An area that traditionally has aAn area that traditionally has a
lot of crime orlot of crime or
 An area with an unusualAn area with an unusual
increase in crimeincrease in crime
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
ForecastingForecasting
 The use ofThe use of
mathematical modelsmathematical models
to predict the nextto predict the next
likely occurrencelikely occurrence
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
ForecastingForecasting
 Attempting to predictAttempting to predict
future events by usingfuture events by using
past events as apast events as a
guide.guide.
 TemporalTemporal analysis isanalysis is
the most common typethe most common type
of forecastingof forecasting
 SpatialSpatial analysis is lessanalysis is less
commoncommon
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
and Problemsand Problems
 A problem is a cluster of incidents.A problem is a cluster of incidents.
 The relationship of the problem toThe relationship of the problem to
space and time may provide informationspace and time may provide information
about the solution.about the solution.
 Perhaps causation like driving under thePerhaps causation like driving under the
influence arrests and the location ofinfluence arrests and the location of
locations that sell alcoholic beverageslocations that sell alcoholic beverages
 Perhaps causation like the presence of anPerhaps causation like the presence of an
active offenderactive offender
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Geographic ProfilingGeographic Profiling
 Used with serial crimes (typically theUsed with serial crimes (typically the
most serious crimes)most serious crimes)
 Used to determine offender’sUsed to determine offender’s
geographic attributes (where theygeographic attributes (where they
might live, work, and socialize).might live, work, and socialize).
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Takes the attributes of time, space,Takes the attributes of time, space,
behavior, target, and offender andbehavior, target, and offender and
analyzes their spatial and temporalanalyzes their spatial and temporal
information in order to determine aninformation in order to determine an
offender’soffender’s activity spaceactivity space (the hunting(the hunting
area).area).
Geographic ProfilingGeographic Profiling
Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to theGo to the Student ResourcesStudent Resources
page atpage at
www.hitechcj.comwww.hitechcj.com

Más contenido relacionado

La actualidad más candente

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Crime against Women.pptx
Crime against Women.pptxCrime against Women.pptx
Crime against Women.pptxAmiGandhi12
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Osokop
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...Daniel Faggella
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionAPNIC
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Layered Voice Analysis - lie detector or more
Layered Voice Analysis - lie detector or moreLayered Voice Analysis - lie detector or more
Layered Voice Analysis - lie detector or moreGuy Van Damme
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification systemAkash Kumar Singh
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningAnavadya Shibu
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 

La actualidad más candente (20)

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime against Women.pptx
Crime against Women.pptxCrime against Women.pptx
Crime against Women.pptx
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Layered Voice Analysis - lie detector or more
Layered Voice Analysis - lie detector or moreLayered Voice Analysis - lie detector or more
Layered Voice Analysis - lie detector or more
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Criminal identification system
Criminal identification systemCriminal identification system
Criminal identification system
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 

Destacado

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis Yawen Li
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysisSameer Darekar
 
Null picture forensics using ghiro appliance
Null   picture forensics using ghiro applianceNull   picture forensics using ghiro appliance
Null picture forensics using ghiro applianceinvad3rsam
 
Gep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finGep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finOliver Smith
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010Bruno Mmassy
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Conventions of crime documentaries
Conventions of crime documentariesConventions of crime documentaries
Conventions of crime documentariescloudbouncer
 

Destacado (12)

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
Ch 7
Ch 7Ch 7
Ch 7
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
Null picture forensics using ghiro appliance
Null   picture forensics using ghiro applianceNull   picture forensics using ghiro appliance
Null picture forensics using ghiro appliance
 
Gep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finGep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_fin
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010
 
Application of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence IntelligenceApplication of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence Intelligence
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
 
Chapter02
Chapter02Chapter02
Chapter02
 
Conventions of crime documentaries
Conventions of crime documentariesConventions of crime documentaries
Conventions of crime documentaries
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 

Similar a Crime Analysis and Community Policing

Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxbartholomeocoombs
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
External Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityExternal Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityCarmen Martin
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...SP. Zems Mathias, PhD.
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime typesIJDKP
 
James Lingerfelt smarter approach to crime reduction
James Lingerfelt   smarter approach to crime reductionJames Lingerfelt   smarter approach to crime reduction
James Lingerfelt smarter approach to crime reductionCityAge
 

Similar a Crime Analysis and Community Policing (20)

A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
External Systems
External SystemsExternal Systems
External Systems
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Crime
CrimeCrime
Crime
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
External Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityExternal Mechanisms Of Accountaability
External Mechanisms Of Accountaability
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime types
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
James Lingerfelt smarter approach to crime reduction
James Lingerfelt   smarter approach to crime reductionJames Lingerfelt   smarter approach to crime reduction
James Lingerfelt smarter approach to crime reduction
 

Más de Hi Tech Criminal Justice

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisHi Tech Criminal Justice
 

Más de Hi Tech Criminal Justice (20)

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
 
Information Exchange
Information ExchangeInformation Exchange
Information Exchange
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 
Networks
NetworksNetworks
Networks
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Crime Analysis and Community Policing

  • 1. Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter TwelveChapter Twelve Crime AnalysisCrime Analysis
  • 2. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Learning ObjectivesLearning Objectives  Understand the definition of crimeUnderstand the definition of crime analysis and underpinning theoriesanalysis and underpinning theories  Understand the applications of crimeUnderstand the applications of crime analysisanalysis  Be exposed to how crime analysis canBe exposed to how crime analysis can be used to solve community problemsbe used to solve community problems and advanced crime mapping topicsand advanced crime mapping topics
  • 3. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IntroductionIntroduction Without the component of criminalWithout the component of criminal investigations, neither the Communityinvestigations, neither the Community Policing nor Problem-OrientedPolicing nor Problem-Oriented Policing models have value.Policing models have value.
  • 4. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IntroductionIntroduction At the core, the functionsAt the core, the functions of state and local lawof state and local law enforcement remain:enforcement remain:  PreventionPrevention  Investigation, andInvestigation, and  ApprehensionApprehension
  • 5. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis and Community-Oriented Policingand Community-Oriented Policing  Problem solving is a criticalProblem solving is a critical component of the COP model.component of the COP model.  An essential part of problemAn essential part of problem solving is an examination ofsolving is an examination of incidents, their relationships toincidents, their relationships to each other, and their relationshipseach other, and their relationships to underlying problems.to underlying problems.
  • 6. Copyright protected 2005: Hi Tech Criminal Justice, Raymo  One of the ways police officers useOne of the ways police officers use their expertise in problem solving istheir expertise in problem solving is through the analysis of crime.through the analysis of crime.  Crime analysis starts with crimeCrime analysis starts with crime mapping.mapping.  A crime may be the result of a varietyA crime may be the result of a variety of other factors.of other factors. Crime AnalysisCrime Analysis
  • 7. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis Crime mapping is about:Crime mapping is about:  Problem solvingProblem solving  The identification ofThe identification of the problemthe problem  Using the informationUsing the information gained from analysisgained from analysis to mitigate theto mitigate the problemproblem
  • 8. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Scanning-Analysis-Response-Scanning-Analysis-Response- AssessmentAssessment:: One of the most prevalent problem-solvingOne of the most prevalent problem-solving methodologies used by policemethodologies used by police departmentsdepartments S A R AS A R A
  • 9. Copyright protected 2005: Hi Tech Criminal Justice, Raymo What Are the BenefitsWhat Are the Benefits of Crime Analysis?of Crime Analysis?  The ability to show relationshipsThe ability to show relationships between crime and casual factors.between crime and casual factors.  Promotes information integrationPromotes information integration and cooperation among differentand cooperation among different police agencies and otherpolice agencies and other government agenciesgovernment agencies
  • 10. Copyright protected 2005: Hi Tech Criminal Justice, Raymo  A COP enhancer because they canA COP enhancer because they can assist in the establishment ofassist in the establishment of partnerships with other non-lawpartnerships with other non-law enforcement agencies.enforcement agencies.  Can enhance communication withinCan enhance communication within and without the police department.and without the police department. Crime Analysis and COPCrime Analysis and COP
  • 11. Copyright protected 2005: Hi Tech Criminal Justice, Raymo These relationship factors may be:These relationship factors may be:  SpatialSpatial in nature (resulting from itsin nature (resulting from its proximity to a location).proximity to a location).  TemporalTemporal – Having to do with a– Having to do with a certain time periodcertain time period Time, Space and CrimeTime, Space and Crime
  • 12. Copyright protected 2005: Hi Tech Criminal Justice, Raymo DisplacementDisplacement  Crime analysis information is used toCrime analysis information is used to deploy more officers in an area that isdeploy more officers in an area that is experiencing a higher crime rate.experiencing a higher crime rate.  The deployment of more officersThe deployment of more officers stops the crime form occurring therestops the crime form occurring there and then – It is displaced.and then – It is displaced.  DisplacementDisplacement can be spatial orcan be spatial or temporal.temporal.
  • 13. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IncapacitationIncapacitation  Most crime is committed by a veryMost crime is committed by a very small percentage of a community.small percentage of a community.  The police should be targeting theirThe police should be targeting their efforts on those individualsefforts on those individuals  If an offender is arrested instead ofIf an offender is arrested instead of being displaced,being displaced, incapacitationincapacitation occurs.occurs.
  • 14. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Serial CrimesSerial Crimes  Multiple crimes committed by anMultiple crimes committed by an offender or group of offenders, whichoffender or group of offenders, which occur over a period of time.occur over a period of time.  Crime analysis is moving towards theCrime analysis is moving towards the identification of serial crimes and theidentification of serial crimes and the targeting of serial offenderstargeting of serial offenders
  • 15. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Rational Choice, Situational CrimeRational Choice, Situational Crime Prevention, and Crime AnalysisPrevention, and Crime Analysis Situational CrimeSituational Crime Prevention isPrevention is based on two things:based on two things:  OffenderOffender opportunityopportunity andand  Rational ChoiceRational Choice TheoryTheory
  • 16. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Offenders choose to commit crimesOffenders choose to commit crimes when:when:  The opportunity is rightThe opportunity is right  They have enough information thatThey have enough information that the value of the crime is more thanthe value of the crime is more than the risk of punishment (risk vs. value)the risk of punishment (risk vs. value) Offender opportunityOffender opportunity
  • 17. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Routine Activity TheoryRoutine Activity Theory Three parts to thisThree parts to this theory:theory:  An offenderAn offender  A victimA victim  The absence of anThe absence of an interfering orinterfering or restraining force –restraining force – something that adds tosomething that adds to the risk of detection.the risk of detection.
  • 18. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Basic RequirementsThe Basic Requirements for Crime Analysisfor Crime Analysis  You cannot conduct modernYou cannot conduct modern crime analysis without mappingcrime analysis without mapping capabilitiescapabilities  You cannot conduct geographicYou cannot conduct geographic and statistical analysis withoutand statistical analysis without minimal hardware and softwareminimal hardware and software
  • 19. Copyright protected 2005: Hi Tech Criminal Justice, Raymo At minimum you need . . .At minimum you need . . .  A laptop or desktopA laptop or desktop computer withcomputer with sufficient speedsufficient speed  Hard disk storage toHard disk storage to accommodate youraccommodate your data and functionsdata and functions  A high-quality printerA high-quality printer that can handle colorthat can handle color maps and workload.maps and workload.
  • 20. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Where does the data come from?Where does the data come from? Two types of data needed:Two types of data needed:  Mapping dataMapping data – general data– general data about your communityabout your community  Crime dataCrime data – specific data about– specific data about criminal occurrences in yourcriminal occurrences in your communitycommunity
  • 21. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Analysis of a CrimeThe Analysis of a Crime Crime analysis begins withCrime analysis begins with statistical analysisstatistical analysis. Mapping is. Mapping is critical to crime analysis, but itcritical to crime analysis, but it is not the starting point.is not the starting point.
  • 22. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Mean numberMean number the averagethe average Burglaries 2003/4Burglaries 2003/4 JanJan 8282 FebFeb 7878 MarMar 7575 AprilApril 7474 MayMay 7575 JuneJune 8080 JulyJuly 7272 AugAug 7575 SeptSept 7878 OctOct 8080 NovNov 110110 DecDec 114114 993993 993 / 12 = 82993 / 12 = 82
  • 23. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Analysis of a CrimeThe Analysis of a Crime  Begins with look at average occurrencesBegins with look at average occurrences as compared to another period.as compared to another period.  This can indicate a rise in crime.This can indicate a rise in crime.  After initial statistical analysis thatAfter initial statistical analysis that indicates a rise, the search for patternsindicates a rise, the search for patterns begins.begins.  A search for patterns – time, date, method ofA search for patterns – time, date, method of operation, etc, can lead to potential solutionsoperation, etc, can lead to potential solutions
  • 24. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Hot SpotsHot Spots  An area that traditionally has aAn area that traditionally has a lot of crime orlot of crime or  An area with an unusualAn area with an unusual increase in crimeincrease in crime
  • 25. Copyright protected 2005: Hi Tech Criminal Justice, Raymo ForecastingForecasting  The use ofThe use of mathematical modelsmathematical models to predict the nextto predict the next likely occurrencelikely occurrence
  • 26. Copyright protected 2005: Hi Tech Criminal Justice, Raymo ForecastingForecasting  Attempting to predictAttempting to predict future events by usingfuture events by using past events as apast events as a guide.guide.  TemporalTemporal analysis isanalysis is the most common typethe most common type of forecastingof forecasting  SpatialSpatial analysis is lessanalysis is less commoncommon
  • 27. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis and Problemsand Problems  A problem is a cluster of incidents.A problem is a cluster of incidents.  The relationship of the problem toThe relationship of the problem to space and time may provide informationspace and time may provide information about the solution.about the solution.  Perhaps causation like driving under thePerhaps causation like driving under the influence arrests and the location ofinfluence arrests and the location of locations that sell alcoholic beverageslocations that sell alcoholic beverages  Perhaps causation like the presence of anPerhaps causation like the presence of an active offenderactive offender
  • 28. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Geographic ProfilingGeographic Profiling  Used with serial crimes (typically theUsed with serial crimes (typically the most serious crimes)most serious crimes)  Used to determine offender’sUsed to determine offender’s geographic attributes (where theygeographic attributes (where they might live, work, and socialize).might live, work, and socialize).
  • 29. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Takes the attributes of time, space,Takes the attributes of time, space, behavior, target, and offender andbehavior, target, and offender and analyzes their spatial and temporalanalyzes their spatial and temporal information in order to determine aninformation in order to determine an offender’soffender’s activity spaceactivity space (the hunting(the hunting area).area). Geographic ProfilingGeographic Profiling
  • 30. Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Go to theGo to the Student ResourcesStudent Resources page atpage at www.hitechcj.comwww.hitechcj.com