SlideShare une entreprise Scribd logo
1  sur  30
Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter TwelveChapter Twelve
Crime AnalysisCrime Analysis
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Learning ObjectivesLearning Objectives
 Understand the definition of crimeUnderstand the definition of crime
analysis and underpinning theoriesanalysis and underpinning theories
 Understand the applications of crimeUnderstand the applications of crime
analysisanalysis
 Be exposed to how crime analysis canBe exposed to how crime analysis can
be used to solve community problemsbe used to solve community problems
and advanced crime mapping topicsand advanced crime mapping topics
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IntroductionIntroduction
Without the component of criminalWithout the component of criminal
investigations, neither the Communityinvestigations, neither the Community
Policing nor Problem-OrientedPolicing nor Problem-Oriented
Policing models have value.Policing models have value.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IntroductionIntroduction
At the core, the functionsAt the core, the functions
of state and local lawof state and local law
enforcement remain:enforcement remain:
 PreventionPrevention
 Investigation, andInvestigation, and
 ApprehensionApprehension
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
and Community-Oriented Policingand Community-Oriented Policing
 Problem solving is a criticalProblem solving is a critical
component of the COP model.component of the COP model.
 An essential part of problemAn essential part of problem
solving is an examination ofsolving is an examination of
incidents, their relationships toincidents, their relationships to
each other, and their relationshipseach other, and their relationships
to underlying problems.to underlying problems.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
 One of the ways police officers useOne of the ways police officers use
their expertise in problem solving istheir expertise in problem solving is
through the analysis of crime.through the analysis of crime.
 Crime analysis starts with crimeCrime analysis starts with crime
mapping.mapping.
 A crime may be the result of a varietyA crime may be the result of a variety
of other factors.of other factors.
Crime AnalysisCrime Analysis
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
Crime mapping is about:Crime mapping is about:
 Problem solvingProblem solving
 The identification ofThe identification of
the problemthe problem
 Using the informationUsing the information
gained from analysisgained from analysis
to mitigate theto mitigate the
problemproblem
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Scanning-Analysis-Response-Scanning-Analysis-Response-
AssessmentAssessment::
One of the most prevalent problem-solvingOne of the most prevalent problem-solving
methodologies used by policemethodologies used by police
departmentsdepartments
S A R AS A R A
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
What Are the BenefitsWhat Are the Benefits
of Crime Analysis?of Crime Analysis?
 The ability to show relationshipsThe ability to show relationships
between crime and casual factors.between crime and casual factors.
 Promotes information integrationPromotes information integration
and cooperation among differentand cooperation among different
police agencies and otherpolice agencies and other
government agenciesgovernment agencies
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
 A COP enhancer because they canA COP enhancer because they can
assist in the establishment ofassist in the establishment of
partnerships with other non-lawpartnerships with other non-law
enforcement agencies.enforcement agencies.
 Can enhance communication withinCan enhance communication within
and without the police department.and without the police department.
Crime Analysis and COPCrime Analysis and COP
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
These relationship factors may be:These relationship factors may be:
 SpatialSpatial in nature (resulting from itsin nature (resulting from its
proximity to a location).proximity to a location).
 TemporalTemporal – Having to do with a– Having to do with a
certain time periodcertain time period
Time, Space and CrimeTime, Space and Crime
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
DisplacementDisplacement
 Crime analysis information is used toCrime analysis information is used to
deploy more officers in an area that isdeploy more officers in an area that is
experiencing a higher crime rate.experiencing a higher crime rate.
 The deployment of more officersThe deployment of more officers
stops the crime form occurring therestops the crime form occurring there
and then – It is displaced.and then – It is displaced.
 DisplacementDisplacement can be spatial orcan be spatial or
temporal.temporal.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
IncapacitationIncapacitation
 Most crime is committed by a veryMost crime is committed by a very
small percentage of a community.small percentage of a community.
 The police should be targeting theirThe police should be targeting their
efforts on those individualsefforts on those individuals
 If an offender is arrested instead ofIf an offender is arrested instead of
being displaced,being displaced, incapacitationincapacitation
occurs.occurs.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Serial CrimesSerial Crimes
 Multiple crimes committed by anMultiple crimes committed by an
offender or group of offenders, whichoffender or group of offenders, which
occur over a period of time.occur over a period of time.
 Crime analysis is moving towards theCrime analysis is moving towards the
identification of serial crimes and theidentification of serial crimes and the
targeting of serial offenderstargeting of serial offenders
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Rational Choice, Situational CrimeRational Choice, Situational Crime
Prevention, and Crime AnalysisPrevention, and Crime Analysis
Situational CrimeSituational Crime
Prevention isPrevention is
based on two things:based on two things:
 OffenderOffender
opportunityopportunity andand
 Rational ChoiceRational Choice
TheoryTheory
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Offenders choose to commit crimesOffenders choose to commit crimes
when:when:
 The opportunity is rightThe opportunity is right
 They have enough information thatThey have enough information that
the value of the crime is more thanthe value of the crime is more than
the risk of punishment (risk vs. value)the risk of punishment (risk vs. value)
Offender opportunityOffender opportunity
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Routine Activity TheoryRoutine Activity Theory
Three parts to thisThree parts to this
theory:theory:
 An offenderAn offender
 A victimA victim
 The absence of anThe absence of an
interfering orinterfering or
restraining force –restraining force –
something that adds tosomething that adds to
the risk of detection.the risk of detection.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Basic RequirementsThe Basic Requirements
for Crime Analysisfor Crime Analysis
 You cannot conduct modernYou cannot conduct modern
crime analysis without mappingcrime analysis without mapping
capabilitiescapabilities
 You cannot conduct geographicYou cannot conduct geographic
and statistical analysis withoutand statistical analysis without
minimal hardware and softwareminimal hardware and software
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
At minimum you need . . .At minimum you need . . .
 A laptop or desktopA laptop or desktop
computer withcomputer with
sufficient speedsufficient speed
 Hard disk storage toHard disk storage to
accommodate youraccommodate your
data and functionsdata and functions
 A high-quality printerA high-quality printer
that can handle colorthat can handle color
maps and workload.maps and workload.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Where does the data come from?Where does the data come from?
Two types of data needed:Two types of data needed:
 Mapping dataMapping data – general data– general data
about your communityabout your community
 Crime dataCrime data – specific data about– specific data about
criminal occurrences in yourcriminal occurrences in your
communitycommunity
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Analysis of a CrimeThe Analysis of a Crime
Crime analysis begins withCrime analysis begins with
statistical analysisstatistical analysis. Mapping is. Mapping is
critical to crime analysis, but itcritical to crime analysis, but it
is not the starting point.is not the starting point.
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Mean numberMean number
the averagethe average
Burglaries 2003/4Burglaries 2003/4
JanJan 8282
FebFeb 7878
MarMar 7575
AprilApril 7474
MayMay 7575
JuneJune 8080
JulyJuly 7272
AugAug 7575
SeptSept 7878
OctOct 8080
NovNov 110110
DecDec 114114
993993
993 / 12 = 82993 / 12 = 82
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
The Analysis of a CrimeThe Analysis of a Crime
 Begins with look at average occurrencesBegins with look at average occurrences
as compared to another period.as compared to another period.
 This can indicate a rise in crime.This can indicate a rise in crime.
 After initial statistical analysis thatAfter initial statistical analysis that
indicates a rise, the search for patternsindicates a rise, the search for patterns
begins.begins.
 A search for patterns – time, date, method ofA search for patterns – time, date, method of
operation, etc, can lead to potential solutionsoperation, etc, can lead to potential solutions
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Hot SpotsHot Spots
 An area that traditionally has aAn area that traditionally has a
lot of crime orlot of crime or
 An area with an unusualAn area with an unusual
increase in crimeincrease in crime
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
ForecastingForecasting
 The use ofThe use of
mathematical modelsmathematical models
to predict the nextto predict the next
likely occurrencelikely occurrence
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
ForecastingForecasting
 Attempting to predictAttempting to predict
future events by usingfuture events by using
past events as apast events as a
guide.guide.
 TemporalTemporal analysis isanalysis is
the most common typethe most common type
of forecastingof forecasting
 SpatialSpatial analysis is lessanalysis is less
commoncommon
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Crime AnalysisCrime Analysis
and Problemsand Problems
 A problem is a cluster of incidents.A problem is a cluster of incidents.
 The relationship of the problem toThe relationship of the problem to
space and time may provide informationspace and time may provide information
about the solution.about the solution.
 Perhaps causation like driving under thePerhaps causation like driving under the
influence arrests and the location ofinfluence arrests and the location of
locations that sell alcoholic beverageslocations that sell alcoholic beverages
 Perhaps causation like the presence of anPerhaps causation like the presence of an
active offenderactive offender
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Geographic ProfilingGeographic Profiling
 Used with serial crimes (typically theUsed with serial crimes (typically the
most serious crimes)most serious crimes)
 Used to determine offender’sUsed to determine offender’s
geographic attributes (where theygeographic attributes (where they
might live, work, and socialize).might live, work, and socialize).
Copyright protected 2005: Hi Tech Criminal Justice, Raymo
Takes the attributes of time, space,Takes the attributes of time, space,
behavior, target, and offender andbehavior, target, and offender and
analyzes their spatial and temporalanalyzes their spatial and temporal
information in order to determine aninformation in order to determine an
offender’soffender’s activity spaceactivity space (the hunting(the hunting
area).area).
Geographic ProfilingGeographic Profiling
Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to theGo to the Student ResourcesStudent Resources
page atpage at
www.hitechcj.comwww.hitechcj.com

Contenu connexe

Tendances

Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Osokop
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python CloudTechnologies
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theoryNihaarikaSaini
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime ScenesDon Caeiro
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationAsadMalik120
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstructionnitin Pandey
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Palash Mehar
 
Community Policing And The Community Powerpoint
Community Policing  And The Community PowerpointCommunity Policing  And The Community Powerpoint
Community Policing And The Community Powerpointjclaytonjr
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechJonathan D'Cruz
 

Tendances (20)

Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theory
 
The polygraph test
The polygraph testThe polygraph test
The polygraph test
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Polygraph test
Polygraph testPolygraph test
Polygraph test
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstruction
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
Interview & Interrogation
Interview & Interrogation Interview & Interrogation
Interview & Interrogation
 
Crime statistics uses
Crime statistics  usesCrime statistics  uses
Crime statistics uses
 
Community Policing And The Community Powerpoint
Community Policing  And The Community PowerpointCommunity Policing  And The Community Powerpoint
Community Policing And The Community Powerpoint
 
Crime Scene
Crime SceneCrime Scene
Crime Scene
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia Tech
 

En vedette

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis Yawen Li
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysisSameer Darekar
 
Null picture forensics using ghiro appliance
Null   picture forensics using ghiro applianceNull   picture forensics using ghiro appliance
Null picture forensics using ghiro applianceinvad3rsam
 
Gep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finGep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finOliver Smith
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010Bruno Mmassy
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Conventions of crime documentaries
Conventions of crime documentariesConventions of crime documentaries
Conventions of crime documentariescloudbouncer
 

En vedette (13)

2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Ch 7
Ch 7Ch 7
Ch 7
 
San Francisco crime analysis
San Francisco crime analysisSan Francisco crime analysis
San Francisco crime analysis
 
Null picture forensics using ghiro appliance
Null   picture forensics using ghiro applianceNull   picture forensics using ghiro appliance
Null picture forensics using ghiro appliance
 
Gep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_finGep oliver smith_preso_0513_fin
Gep oliver smith_preso_0513_fin
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010
 
Application of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence IntelligenceApplication of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence Intelligence
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
Using GIS to Evaluate Agricultural Land Suitability in Hawaii and the Impacts...
 
Chapter02
Chapter02Chapter02
Chapter02
 
Conventions of crime documentaries
Conventions of crime documentariesConventions of crime documentaries
Conventions of crime documentaries
 

Similaire à Crime Analysis

Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxbartholomeocoombs
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
External Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityExternal Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityCarmen Martin
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...SP. Zems Mathias, PhD.
 

Similaire à Crime Analysis (20)

A Brief History of Police Technology
A Brief History of Police TechnologyA Brief History of Police Technology
A Brief History of Police Technology
 
External Systems
External SystemsExternal Systems
External Systems
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Crime
CrimeCrime
Crime
 
Technology in the Street
Technology in the StreetTechnology in the Street
Technology in the Street
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docxChapter 11 Challenges for the futureIntelligence-Led Polici.docx
Chapter 11 Challenges for the futureIntelligence-Led Polici.docx
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
RoboCop World
RoboCop WorldRoboCop World
RoboCop World
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Emerging and Future Technologies
Emerging and Future TechnologiesEmerging and Future Technologies
Emerging and Future Technologies
 
External Mechanisms Of Accountaability
External Mechanisms Of AccountaabilityExternal Mechanisms Of Accountaability
External Mechanisms Of Accountaability
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
 

Plus de Hi Tech Criminal Justice

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Hi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisHi Tech Criminal Justice
 

Plus de Hi Tech Criminal Justice (20)

Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 
You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Wiretaps
WiretapsWiretaps
Wiretaps
 
Technology in Investigations
Technology in InvestigationsTechnology in Investigations
Technology in Investigations
 
Information Exchange
Information ExchangeInformation Exchange
Information Exchange
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 

Dernier

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Crime Analysis

  • 1. Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter TwelveChapter Twelve Crime AnalysisCrime Analysis
  • 2. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Learning ObjectivesLearning Objectives  Understand the definition of crimeUnderstand the definition of crime analysis and underpinning theoriesanalysis and underpinning theories  Understand the applications of crimeUnderstand the applications of crime analysisanalysis  Be exposed to how crime analysis canBe exposed to how crime analysis can be used to solve community problemsbe used to solve community problems and advanced crime mapping topicsand advanced crime mapping topics
  • 3. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IntroductionIntroduction Without the component of criminalWithout the component of criminal investigations, neither the Communityinvestigations, neither the Community Policing nor Problem-OrientedPolicing nor Problem-Oriented Policing models have value.Policing models have value.
  • 4. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IntroductionIntroduction At the core, the functionsAt the core, the functions of state and local lawof state and local law enforcement remain:enforcement remain:  PreventionPrevention  Investigation, andInvestigation, and  ApprehensionApprehension
  • 5. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis and Community-Oriented Policingand Community-Oriented Policing  Problem solving is a criticalProblem solving is a critical component of the COP model.component of the COP model.  An essential part of problemAn essential part of problem solving is an examination ofsolving is an examination of incidents, their relationships toincidents, their relationships to each other, and their relationshipseach other, and their relationships to underlying problems.to underlying problems.
  • 6. Copyright protected 2005: Hi Tech Criminal Justice, Raymo  One of the ways police officers useOne of the ways police officers use their expertise in problem solving istheir expertise in problem solving is through the analysis of crime.through the analysis of crime.  Crime analysis starts with crimeCrime analysis starts with crime mapping.mapping.  A crime may be the result of a varietyA crime may be the result of a variety of other factors.of other factors. Crime AnalysisCrime Analysis
  • 7. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis Crime mapping is about:Crime mapping is about:  Problem solvingProblem solving  The identification ofThe identification of the problemthe problem  Using the informationUsing the information gained from analysisgained from analysis to mitigate theto mitigate the problemproblem
  • 8. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Scanning-Analysis-Response-Scanning-Analysis-Response- AssessmentAssessment:: One of the most prevalent problem-solvingOne of the most prevalent problem-solving methodologies used by policemethodologies used by police departmentsdepartments S A R AS A R A
  • 9. Copyright protected 2005: Hi Tech Criminal Justice, Raymo What Are the BenefitsWhat Are the Benefits of Crime Analysis?of Crime Analysis?  The ability to show relationshipsThe ability to show relationships between crime and casual factors.between crime and casual factors.  Promotes information integrationPromotes information integration and cooperation among differentand cooperation among different police agencies and otherpolice agencies and other government agenciesgovernment agencies
  • 10. Copyright protected 2005: Hi Tech Criminal Justice, Raymo  A COP enhancer because they canA COP enhancer because they can assist in the establishment ofassist in the establishment of partnerships with other non-lawpartnerships with other non-law enforcement agencies.enforcement agencies.  Can enhance communication withinCan enhance communication within and without the police department.and without the police department. Crime Analysis and COPCrime Analysis and COP
  • 11. Copyright protected 2005: Hi Tech Criminal Justice, Raymo These relationship factors may be:These relationship factors may be:  SpatialSpatial in nature (resulting from itsin nature (resulting from its proximity to a location).proximity to a location).  TemporalTemporal – Having to do with a– Having to do with a certain time periodcertain time period Time, Space and CrimeTime, Space and Crime
  • 12. Copyright protected 2005: Hi Tech Criminal Justice, Raymo DisplacementDisplacement  Crime analysis information is used toCrime analysis information is used to deploy more officers in an area that isdeploy more officers in an area that is experiencing a higher crime rate.experiencing a higher crime rate.  The deployment of more officersThe deployment of more officers stops the crime form occurring therestops the crime form occurring there and then – It is displaced.and then – It is displaced.  DisplacementDisplacement can be spatial orcan be spatial or temporal.temporal.
  • 13. Copyright protected 2005: Hi Tech Criminal Justice, Raymo IncapacitationIncapacitation  Most crime is committed by a veryMost crime is committed by a very small percentage of a community.small percentage of a community.  The police should be targeting theirThe police should be targeting their efforts on those individualsefforts on those individuals  If an offender is arrested instead ofIf an offender is arrested instead of being displaced,being displaced, incapacitationincapacitation occurs.occurs.
  • 14. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Serial CrimesSerial Crimes  Multiple crimes committed by anMultiple crimes committed by an offender or group of offenders, whichoffender or group of offenders, which occur over a period of time.occur over a period of time.  Crime analysis is moving towards theCrime analysis is moving towards the identification of serial crimes and theidentification of serial crimes and the targeting of serial offenderstargeting of serial offenders
  • 15. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Rational Choice, Situational CrimeRational Choice, Situational Crime Prevention, and Crime AnalysisPrevention, and Crime Analysis Situational CrimeSituational Crime Prevention isPrevention is based on two things:based on two things:  OffenderOffender opportunityopportunity andand  Rational ChoiceRational Choice TheoryTheory
  • 16. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Offenders choose to commit crimesOffenders choose to commit crimes when:when:  The opportunity is rightThe opportunity is right  They have enough information thatThey have enough information that the value of the crime is more thanthe value of the crime is more than the risk of punishment (risk vs. value)the risk of punishment (risk vs. value) Offender opportunityOffender opportunity
  • 17. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Routine Activity TheoryRoutine Activity Theory Three parts to thisThree parts to this theory:theory:  An offenderAn offender  A victimA victim  The absence of anThe absence of an interfering orinterfering or restraining force –restraining force – something that adds tosomething that adds to the risk of detection.the risk of detection.
  • 18. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Basic RequirementsThe Basic Requirements for Crime Analysisfor Crime Analysis  You cannot conduct modernYou cannot conduct modern crime analysis without mappingcrime analysis without mapping capabilitiescapabilities  You cannot conduct geographicYou cannot conduct geographic and statistical analysis withoutand statistical analysis without minimal hardware and softwareminimal hardware and software
  • 19. Copyright protected 2005: Hi Tech Criminal Justice, Raymo At minimum you need . . .At minimum you need . . .  A laptop or desktopA laptop or desktop computer withcomputer with sufficient speedsufficient speed  Hard disk storage toHard disk storage to accommodate youraccommodate your data and functionsdata and functions  A high-quality printerA high-quality printer that can handle colorthat can handle color maps and workload.maps and workload.
  • 20. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Where does the data come from?Where does the data come from? Two types of data needed:Two types of data needed:  Mapping dataMapping data – general data– general data about your communityabout your community  Crime dataCrime data – specific data about– specific data about criminal occurrences in yourcriminal occurrences in your communitycommunity
  • 21. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Analysis of a CrimeThe Analysis of a Crime Crime analysis begins withCrime analysis begins with statistical analysisstatistical analysis. Mapping is. Mapping is critical to crime analysis, but itcritical to crime analysis, but it is not the starting point.is not the starting point.
  • 22. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Mean numberMean number the averagethe average Burglaries 2003/4Burglaries 2003/4 JanJan 8282 FebFeb 7878 MarMar 7575 AprilApril 7474 MayMay 7575 JuneJune 8080 JulyJuly 7272 AugAug 7575 SeptSept 7878 OctOct 8080 NovNov 110110 DecDec 114114 993993 993 / 12 = 82993 / 12 = 82
  • 23. Copyright protected 2005: Hi Tech Criminal Justice, Raymo The Analysis of a CrimeThe Analysis of a Crime  Begins with look at average occurrencesBegins with look at average occurrences as compared to another period.as compared to another period.  This can indicate a rise in crime.This can indicate a rise in crime.  After initial statistical analysis thatAfter initial statistical analysis that indicates a rise, the search for patternsindicates a rise, the search for patterns begins.begins.  A search for patterns – time, date, method ofA search for patterns – time, date, method of operation, etc, can lead to potential solutionsoperation, etc, can lead to potential solutions
  • 24. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Hot SpotsHot Spots  An area that traditionally has aAn area that traditionally has a lot of crime orlot of crime or  An area with an unusualAn area with an unusual increase in crimeincrease in crime
  • 25. Copyright protected 2005: Hi Tech Criminal Justice, Raymo ForecastingForecasting  The use ofThe use of mathematical modelsmathematical models to predict the nextto predict the next likely occurrencelikely occurrence
  • 26. Copyright protected 2005: Hi Tech Criminal Justice, Raymo ForecastingForecasting  Attempting to predictAttempting to predict future events by usingfuture events by using past events as apast events as a guide.guide.  TemporalTemporal analysis isanalysis is the most common typethe most common type of forecastingof forecasting  SpatialSpatial analysis is lessanalysis is less commoncommon
  • 27. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Crime AnalysisCrime Analysis and Problemsand Problems  A problem is a cluster of incidents.A problem is a cluster of incidents.  The relationship of the problem toThe relationship of the problem to space and time may provide informationspace and time may provide information about the solution.about the solution.  Perhaps causation like driving under thePerhaps causation like driving under the influence arrests and the location ofinfluence arrests and the location of locations that sell alcoholic beverageslocations that sell alcoholic beverages  Perhaps causation like the presence of anPerhaps causation like the presence of an active offenderactive offender
  • 28. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Geographic ProfilingGeographic Profiling  Used with serial crimes (typically theUsed with serial crimes (typically the most serious crimes)most serious crimes)  Used to determine offender’sUsed to determine offender’s geographic attributes (where theygeographic attributes (where they might live, work, and socialize).might live, work, and socialize).
  • 29. Copyright protected 2005: Hi Tech Criminal Justice, Raymo Takes the attributes of time, space,Takes the attributes of time, space, behavior, target, and offender andbehavior, target, and offender and analyzes their spatial and temporalanalyzes their spatial and temporal information in order to determine aninformation in order to determine an offender’soffender’s activity spaceactivity space (the hunting(the hunting area).area). Geographic ProfilingGeographic Profiling
  • 30. Copyright protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Go to theGo to the Student ResourcesStudent Resources page atpage at www.hitechcj.comwww.hitechcj.com