SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Time period is even shorter and you are

    often just waiting for a new hit to see if
    your predictions were correct
    Predictive purpose

    Geographic area defined by crime

    series, trend, cluster, pattern or spree you
    may be following
Predict the next date, time, DOW of

    the next offense in a series
    Predict the probable location for the

    next offenses in a series
    Identify additional suspect and

    Investigative Lead Information from
    databases for assigned units
    Limit potential offender data

    obtained in the step above, using
    Journey to Crime Analysis or another
    method
Midpoint

    Weighted averaging

    Other

    ◦ Correlated walk analysis in Crime Stat
    Not important to get the exact

    minute
    Stick with the best probability no

    matter which method you use
Standard Deviation Rectangles

    Standard Deviation Ellipses

    Convex Hull Polygon

    Distance between hits buffer

    Distance from mean center buffer

    Animated path

    Correlated walk analysis (Crime Stat)

    Victimology (what targets is this offender

    hitting?)
Steve Gottlieb

    Take the mean of X and the Mean of Y to find

    the center of occurrence
    Calculate the standard deviation of X & Y and

    create at least the lower left and upper right
    corners points to draw a box around
Crime Stat III and Spatial Statistics
 Tools that come with Arc Map 9x
         both can do this
Take the mean of X and the Mean of Y to find

    the center of occurrence
    Calculate the standard deviation of X & Y.

    Find the theta angle of rotation and a few

    other statistics and create ellipses.
Crime Stat III and Spatial Statistics
 Tools that come with Arc Map 9x
         both can do this
Calculate the distances between each hit in

    the series in sequence of occurrence
    Calculate the mean and standard deviation

    distance
    Draw one or more buffers around the last

    hit in the series you know about using the
    mean and/or the mean plus/minus the
    standard deviation distance, etc.
So far no tool in ArcMap 9x
To do this – Manual Process
This is the same idea as the last hit

    buffer, except the distances are calculated
    from the mean center of all the hits to each
    hit
    Mean and standard deviation calculated

    Buffer(s) drawn around the mean center

So far no tool in ArcMap 9x
To do this – Manual Process
Create a line theme between each hit in

    sequence
    Flash each line to see patterns in the travel

    behavior of the suspect
    Create a polygon theme which depicts our

    best guess on which direction the offender
    will travel based on watching the path
    animation (if possible)
So far no tool in ArcMap 9x
To do this – Well….there is the animation
        utility and Crime Stat III…
This Crime Stat II routine attempts to

    calculate the location of a next hit in a
    crime series based on statistical calculations
    of time, distance and bearing
    The analyst can choose between using the

    mean, median, or regression for each of the
    three variables; time, distance, and bearing.
    The ideal situation would be that the CWA

    routine accurately pinpoints the location
    where the next hit in a series will be
If your offender is hitting only

    convenience stores, why not put all
    the convenience stores on the map
    which are within your SD rectangles
    or ellipses and list them in your
    prediction as potential targets?
    You can greatly reduce the number

    of officer involved in “stake outs” by
    using the victim data available to you
    in your crime series.
Whatever the excuse, do it anyway and

    make the time
    You will learn and help others to learn

    right along with you
    It can only increase the professionalism in

    this profession
THE COMMON PROBLEM
In this example from an actual series,
 there are about 56 stores of the type
 the suspect is hitting within the 95%
              rectangle.
SAME PROBLEM WITH THE ELLIPSES
Standard Deviation (SD) Rectangles


    SD Ellipses (Crime Stat II or CA TOOLS Extension)


    Minimum convex Hull polygon (CA Tools)


    Crime Path analysis - Directionality

    ◦ Correlated Walk Analysis (Crime Stat II)
    ◦ Circular Point Statistics (Animal Movement Extension )
    ◦ Visual observation of movement between hits (Animal
      Movement or CA Tools)
    Census and Land use geography


    Target (victimization) analysis

    ◦ Repeats and type of establishment
    Average distance between hits analysis


    Average distance from mean center to hits


    Intuitive logic based on experience

If one method works well, a

    combination of methods may work
    better
    No single method is any better than

    another when a large geographic area
    is covered by the suspect
    Typical spatial models provide an

    operationally limited product when
    used by themselves in some cases
    An analysts intuition and experience

    are valuable resources when making
    predictions
Total of 24 Series Analyzed (2 burglary, 15 robbery

    series, 7 Test series with very observable path)
    54.2% had an observable pattern in the path

    animation, and another 25% was a “maybe.” (7 were
    test series)
    54% of the predicted “next hits” were within the one

    standard deviation rectangle
    91.7% of the predicted “next hits” were within the

    two standard deviation rectangle
    71% of the predicted “next hits” were within the one

    standard deviation ellipse
    95.8% of the predicted “next hits” were within the

    two standard deviation ellipse
50% of the predicted “next hits” fell within the

    average distance between hits buffer from the last
    hit
    ◦ 83.3% fell in the mean + two standard deviations buffer
    83% of the predicted “next hits” fell within the

    convex Hull polygon area
    Other spatial statistical elements scored at about the

    same level
11 robberies, 1 murder


    Consistent target selection (video stores)


    Observable travel pattern to targets


    2 cities involved (Karen Kontak and me)


    Red Saturn seen in several robberies


    Large geographic area (40-65 square miles)


    Vague suspect description


    JTC data to calibrate CrimeStat


    Person databases available to query


    NEW: Just plead guilty, got 17 years, no

    parole possible
Very large

    prediction areas
    27 potential

    “next” targets
    Not operationally

    useful to
    investigators
         (they laughed)
Layering of

    Data Elements
    to get an
    overall score
    for each “grid.”
    A compilation

    of methods
    and processes
    that work well
    together and
    are already
    being used by
    crime analysts
    individually
SD Ellipses and Rectangles


    Convex Hull Polygon


    Crime Path Observations and calculations


    Distance From Last Hit Analysis and mean

    center calculations
    Where Are My Targets Located? Or


    What Kind of Targets Are They?


    Any Stores Have Repeat Victimization

    Problems?
    Direction or Bearing Analysis (Circular Point

    Stats or Correlated Walk Analysis)
    Anything Else You Feel May Be Important

No target analysis completed
             yet,
however the probability area is
already significantly reduced!
    (from 27 stores to 14)
Target analysis completed
  more reduction on probable
target area (from 14 stores to 2)
JTC analysis reduced
 possible offenders in a
Red Saturn from 355 to
 54, which were further
reduced to 8 individuals
by investigators and the
     crime analyst.

The suspect had a felony
    warrant and was
  arrested. Evidence
   found at his house
   linking him to the
robberies and homicide.
Other Elements You Can Use



     CrimeStat II’s Correlated Walk Routine

Animal Movement-Circular Point Stats




   Observation of Crime Path Travel
Create a Bulletin or Product for the Investigators
  Data
 Range
Analyzed
                                                 Next Location
                                                  Prediction

                                     Next
                                day, hour, dat
               M.O.             e, and day of
            Summarized              week
                                  prediction




                Suspect, Vehi
                  cle, and
                  Weapon
                Summarized
List Possible
Target Stores




      List All     List Possible
                   Suspects, FI’
   Events in The
      Series          s, Etc...
Journey to Crime Analysis
Map created Using Crime
          Stat II




   A Who Created This, and
     Who to Contact Note


 Where in the heck is this
document if I ever want to
      find it again!
Fundamentalsof Crime Mapping Tactical Analysis Concepts

Weitere ähnliche Inhalte

Was ist angesagt?

PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tellArchit Sharma
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionAPNIC
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechJonathan D'Cruz
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSameer Darekar
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python CloudTechnologies
 
kyung_kim_pura
kyung_kim_purakyung_kim_pura
kyung_kim_puraPeter Kim
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoMatthew Gulino
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataValerii Klymchuk
 

Was ist angesagt? (20)

Crime analysis
Crime analysisCrime analysis
Crime analysis
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
Application of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence IntelligenceApplication of GIS in Criminology and Defence Intelligence
Application of GIS in Criminology and Defence Intelligence
 
Predictive policing computational thinking show and tell
Predictive policing computational thinking show and tellPredictive policing computational thinking show and tell
Predictive policing computational thinking show and tell
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia Tech
 
San Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contestSan Francisco Crime Analysis Classification Kaggle contest
San Francisco Crime Analysis Classification Kaggle contest
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
kyung_kim_pura
kyung_kim_purakyung_kim_pura
kyung_kim_pura
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
report
reportreport
report
 
Predicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - GulinoPredicting Terrorist Attacks In Afghanistan - Gulino
Predicting Terrorist Attacks In Afghanistan - Gulino
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Crime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation DataCrime Analysis based on Historical and Transportation Data
Crime Analysis based on Historical and Transportation Data
 

Andere mochten auch

Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 
Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6Osokop
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisNeil Ryan
 
Thesis Final Draft
Thesis Final DraftThesis Final Draft
Thesis Final Draftjoycemi_la
 

Andere mochten auch (9)

Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6Fundamentalsof Crime Mapping 6
Fundamentalsof Crime Mapping 6
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Story Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime AnalysisStory Tellers: Hartford Crime Analysis
Story Tellers: Hartford Crime Analysis
 
Thesis Final Draft
Thesis Final DraftThesis Final Draft
Thesis Final Draft
 

Ähnlich wie Fundamentalsof Crime Mapping Tactical Analysis Concepts

Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Osokop
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Palash Mehar
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detectionShantanuDeosthale
 
2016 urisa track: ring pattern of older adult population in urban areas by y...
2016 urisa track:  ring pattern of older adult population in urban areas by y...2016 urisa track:  ring pattern of older adult population in urban areas by y...
2016 urisa track: ring pattern of older adult population in urban areas by y...GIS in the Rockies
 
Anomaly Detection - Catch me if you can
Anomaly Detection - Catch me if you canAnomaly Detection - Catch me if you can
Anomaly Detection - Catch me if you canYousef Fadila
 
The fundamental problem of Forensic Statistics
The fundamental problem of Forensic StatisticsThe fundamental problem of Forensic Statistics
The fundamental problem of Forensic StatisticsGiulia Cereda
 
Forecasting Space-Time Events - Strata + Hadoop World 2015 San Jose
Forecasting Space-Time Events - Strata + Hadoop World 2015 San JoseForecasting Space-Time Events - Strata + Hadoop World 2015 San Jose
Forecasting Space-Time Events - Strata + Hadoop World 2015 San JoseAzavea
 
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Jonathan Stray
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoStuti Deshpande
 
Publication - The feasibility of gaze tracking for “mind reading” during search
Publication - The feasibility of gaze tracking for “mind reading” during searchPublication - The feasibility of gaze tracking for “mind reading” during search
Publication - The feasibility of gaze tracking for “mind reading” during searchA. LE
 
Applied Statistics for Part-II
Applied Statistics for Part-IIApplied Statistics for Part-II
Applied Statistics for Part-IIMuteeullah
 
Towards Similarity Models in Police Photo Lineup Assembling Tasks
Towards Similarity Models in Police Photo Lineup Assembling TasksTowards Similarity Models in Police Photo Lineup Assembling Tasks
Towards Similarity Models in Police Photo Lineup Assembling TasksLadislav Peska
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsTahoe Silicon Mountain
 
Anomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsAnomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsManojit Nandi
 
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load Forecasting
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load ForecastingCrime Risk Forecasting: Near Repeat Pattern Analysis & Load Forecasting
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load ForecastingAzavea
 

Ähnlich wie Fundamentalsof Crime Mapping Tactical Analysis Concepts (20)

Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching Crime Scene Documentation_Sketching
Crime Scene Documentation_Sketching
 
POINT_INTERVAL_estimates.ppt
POINT_INTERVAL_estimates.pptPOINT_INTERVAL_estimates.ppt
POINT_INTERVAL_estimates.ppt
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UC
 
Outlier analysis and anomaly detection
Outlier analysis and anomaly detectionOutlier analysis and anomaly detection
Outlier analysis and anomaly detection
 
PyGotham 2016
PyGotham 2016PyGotham 2016
PyGotham 2016
 
2016 urisa track: ring pattern of older adult population in urban areas by y...
2016 urisa track:  ring pattern of older adult population in urban areas by y...2016 urisa track:  ring pattern of older adult population in urban areas by y...
2016 urisa track: ring pattern of older adult population in urban areas by y...
 
Anomaly Detection - Catch me if you can
Anomaly Detection - Catch me if you canAnomaly Detection - Catch me if you can
Anomaly Detection - Catch me if you can
 
The fundamental problem of Forensic Statistics
The fundamental problem of Forensic StatisticsThe fundamental problem of Forensic Statistics
The fundamental problem of Forensic Statistics
 
Forecasting Space-Time Events - Strata + Hadoop World 2015 San Jose
Forecasting Space-Time Events - Strata + Hadoop World 2015 San JoseForecasting Space-Time Events - Strata + Hadoop World 2015 San Jose
Forecasting Space-Time Events - Strata + Hadoop World 2015 San Jose
 
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
Frontiers of Computational Journalism week 1 - Introduction and High Dimensio...
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
 
Publication - The feasibility of gaze tracking for “mind reading” during search
Publication - The feasibility of gaze tracking for “mind reading” during searchPublication - The feasibility of gaze tracking for “mind reading” during search
Publication - The feasibility of gaze tracking for “mind reading” during search
 
Applied Statistics for Part-II
Applied Statistics for Part-IIApplied Statistics for Part-II
Applied Statistics for Part-II
 
Freq distribution
Freq distributionFreq distribution
Freq distribution
 
Towards Similarity Models in Police Photo Lineup Assembling Tasks
Towards Similarity Models in Police Photo Lineup Assembling TasksTowards Similarity Models in Police Photo Lineup Assembling Tasks
Towards Similarity Models in Police Photo Lineup Assembling Tasks
 
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown WorldsSelf-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
Self-Flying Drones: On a Mission to Navigate Dark, Dangerous and Unknown Worlds
 
Anomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsAnomaly Detection for Real-World Systems
Anomaly Detection for Real-World Systems
 
Assessing Normality
Assessing NormalityAssessing Normality
Assessing Normality
 
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load Forecasting
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load ForecastingCrime Risk Forecasting: Near Repeat Pattern Analysis & Load Forecasting
Crime Risk Forecasting: Near Repeat Pattern Analysis & Load Forecasting
 

Mehr von Osokop

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingOsokop
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesOsokop
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Osokop
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Osokop
 
Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5Osokop
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Osokop
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Osokop
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Osokop
 

Mehr von Osokop (8)

Fundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping GeocodingFundamentalsof Crime Mapping Geocoding
Fundamentalsof Crime Mapping Geocoding
 
Fundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis TablesFundamentalsof Crime Mapping Arc Gis Tables
Fundamentalsof Crime Mapping Arc Gis Tables
 
Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8Fundamentalsof Crime Mapping 8
Fundamentalsof Crime Mapping 8
 
Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7Fundamentalsof Crime Mapping 7
Fundamentalsof Crime Mapping 7
 
Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5Fundamentalsof Crime Mapping 5
Fundamentalsof Crime Mapping 5
 
Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4Fundamentalsof Crime Mapping 4
Fundamentalsof Crime Mapping 4
 
Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3Fundamentalsof Crime Mapping 3
Fundamentalsof Crime Mapping 3
 
Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2Fundamentalsof Crime Mapping 2
Fundamentalsof Crime Mapping 2
 

Fundamentalsof Crime Mapping Tactical Analysis Concepts

  • 1.
  • 2. Time period is even shorter and you are  often just waiting for a new hit to see if your predictions were correct Predictive purpose  Geographic area defined by crime  series, trend, cluster, pattern or spree you may be following
  • 3. Predict the next date, time, DOW of  the next offense in a series Predict the probable location for the  next offenses in a series Identify additional suspect and  Investigative Lead Information from databases for assigned units Limit potential offender data  obtained in the step above, using Journey to Crime Analysis or another method
  • 4. Midpoint  Weighted averaging  Other  ◦ Correlated walk analysis in Crime Stat Not important to get the exact  minute Stick with the best probability no  matter which method you use
  • 5. Standard Deviation Rectangles  Standard Deviation Ellipses  Convex Hull Polygon  Distance between hits buffer  Distance from mean center buffer  Animated path  Correlated walk analysis (Crime Stat)  Victimology (what targets is this offender  hitting?)
  • 6. Steve Gottlieb  Take the mean of X and the Mean of Y to find  the center of occurrence Calculate the standard deviation of X & Y and  create at least the lower left and upper right corners points to draw a box around
  • 7. Crime Stat III and Spatial Statistics Tools that come with Arc Map 9x both can do this
  • 8. Take the mean of X and the Mean of Y to find  the center of occurrence Calculate the standard deviation of X & Y.  Find the theta angle of rotation and a few  other statistics and create ellipses.
  • 9. Crime Stat III and Spatial Statistics Tools that come with Arc Map 9x both can do this
  • 10. Calculate the distances between each hit in  the series in sequence of occurrence Calculate the mean and standard deviation  distance Draw one or more buffers around the last  hit in the series you know about using the mean and/or the mean plus/minus the standard deviation distance, etc.
  • 11. So far no tool in ArcMap 9x To do this – Manual Process
  • 12. This is the same idea as the last hit  buffer, except the distances are calculated from the mean center of all the hits to each hit Mean and standard deviation calculated  Buffer(s) drawn around the mean center 
  • 13. So far no tool in ArcMap 9x To do this – Manual Process
  • 14. Create a line theme between each hit in  sequence Flash each line to see patterns in the travel  behavior of the suspect Create a polygon theme which depicts our  best guess on which direction the offender will travel based on watching the path animation (if possible)
  • 15. So far no tool in ArcMap 9x To do this – Well….there is the animation utility and Crime Stat III…
  • 16. This Crime Stat II routine attempts to  calculate the location of a next hit in a crime series based on statistical calculations of time, distance and bearing The analyst can choose between using the  mean, median, or regression for each of the three variables; time, distance, and bearing. The ideal situation would be that the CWA  routine accurately pinpoints the location where the next hit in a series will be
  • 17. If your offender is hitting only  convenience stores, why not put all the convenience stores on the map which are within your SD rectangles or ellipses and list them in your prediction as potential targets? You can greatly reduce the number  of officer involved in “stake outs” by using the victim data available to you in your crime series.
  • 18.
  • 19. Whatever the excuse, do it anyway and  make the time You will learn and help others to learn  right along with you It can only increase the professionalism in  this profession
  • 20. THE COMMON PROBLEM In this example from an actual series, there are about 56 stores of the type the suspect is hitting within the 95% rectangle.
  • 21. SAME PROBLEM WITH THE ELLIPSES
  • 22. Standard Deviation (SD) Rectangles  SD Ellipses (Crime Stat II or CA TOOLS Extension)  Minimum convex Hull polygon (CA Tools)  Crime Path analysis - Directionality  ◦ Correlated Walk Analysis (Crime Stat II) ◦ Circular Point Statistics (Animal Movement Extension ) ◦ Visual observation of movement between hits (Animal Movement or CA Tools) Census and Land use geography  Target (victimization) analysis  ◦ Repeats and type of establishment Average distance between hits analysis  Average distance from mean center to hits  Intuitive logic based on experience 
  • 23. If one method works well, a  combination of methods may work better No single method is any better than  another when a large geographic area is covered by the suspect Typical spatial models provide an  operationally limited product when used by themselves in some cases An analysts intuition and experience  are valuable resources when making predictions
  • 24.
  • 25. Total of 24 Series Analyzed (2 burglary, 15 robbery  series, 7 Test series with very observable path) 54.2% had an observable pattern in the path  animation, and another 25% was a “maybe.” (7 were test series) 54% of the predicted “next hits” were within the one  standard deviation rectangle 91.7% of the predicted “next hits” were within the  two standard deviation rectangle 71% of the predicted “next hits” were within the one  standard deviation ellipse 95.8% of the predicted “next hits” were within the  two standard deviation ellipse
  • 26. 50% of the predicted “next hits” fell within the  average distance between hits buffer from the last hit ◦ 83.3% fell in the mean + two standard deviations buffer 83% of the predicted “next hits” fell within the  convex Hull polygon area Other spatial statistical elements scored at about the  same level
  • 27. 11 robberies, 1 murder  Consistent target selection (video stores)  Observable travel pattern to targets  2 cities involved (Karen Kontak and me)  Red Saturn seen in several robberies  Large geographic area (40-65 square miles)  Vague suspect description  JTC data to calibrate CrimeStat  Person databases available to query  NEW: Just plead guilty, got 17 years, no  parole possible
  • 28. Very large  prediction areas 27 potential  “next” targets Not operationally  useful to investigators (they laughed)
  • 29. Layering of  Data Elements to get an overall score for each “grid.” A compilation  of methods and processes that work well together and are already being used by crime analysts individually
  • 30. SD Ellipses and Rectangles  Convex Hull Polygon  Crime Path Observations and calculations  Distance From Last Hit Analysis and mean  center calculations Where Are My Targets Located? Or  What Kind of Targets Are They?  Any Stores Have Repeat Victimization  Problems? Direction or Bearing Analysis (Circular Point  Stats or Correlated Walk Analysis) Anything Else You Feel May Be Important 
  • 31. No target analysis completed yet, however the probability area is already significantly reduced! (from 27 stores to 14)
  • 32. Target analysis completed more reduction on probable target area (from 14 stores to 2)
  • 33. JTC analysis reduced possible offenders in a Red Saturn from 355 to 54, which were further reduced to 8 individuals by investigators and the crime analyst. The suspect had a felony warrant and was arrested. Evidence found at his house linking him to the robberies and homicide.
  • 34. Other Elements You Can Use CrimeStat II’s Correlated Walk Routine Animal Movement-Circular Point Stats Observation of Crime Path Travel
  • 35.
  • 36. Create a Bulletin or Product for the Investigators Data Range Analyzed Next Location Prediction Next day, hour, dat M.O. e, and day of Summarized week prediction Suspect, Vehi cle, and Weapon Summarized
  • 37. List Possible Target Stores List All List Possible Suspects, FI’ Events in The Series s, Etc...
  • 38. Journey to Crime Analysis Map created Using Crime Stat II A Who Created This, and Who to Contact Note Where in the heck is this document if I ever want to find it again!