Connecting the Dots: Data Mining and Predictive Analytics in Law Enforcement and Intelligence Analysis
|
|
|
- Hester Reed
- 9 years ago
- Views:
Transcription
1 Connecting the Dots: Data Mining and Predictive Analytics in Law Enforcement and Intelligence Analysis Colleen McCue, Ph.D., Program Manager, Crime Analysis Unit,and Colonel Andre' Parker, Chief of Police, Richmond Police Department, Richmond, Virginia Law enforcement organizations are challenged by a staggering increase in data on a daily basis. In fact, it has been estimated that the amount of data in the world doubles every 20 months. Every transaction, every event, every blip of electricity has the potential to generate data. The events of September 11, 2001, have only served to increase the flood of data while underscoring the critical importance of timely and complete exploitation of law enforcement data resources. The changing face of the war on terrorism and the challenge to connect the dots faces all law enforcement professionals, including those in the local arena. Data mining tools, which were once reserved for large federal agencies and research centers, are now available to enhance decision making and analysis in the state and local law enforcement arena. Used extensively in the business community, the newer data mining tools do not require huge IT budgets, specialized personnel, or advanced training in statistics. Rather, these products are highly intuitive, relatively easy-to-use, PC-based, and very accessible to the law enforcement community. The Richmond, Virginia, Police Department is using data mining and predictive analytics for a variety of law enforcement and intelligence applications, including tactical crime analysis, risk and threat assessment, behavioral analysis of violent crime, and proactive deployment strategies. Data Mining Overview Data mining has been used successfully in the business world for years. For example, cell phone providers use "churn" models that predict the likelihood that certain customers will switch service providers, online retailers model buying habits in an effort to identify and suggest additional purchases, and grocery stores display ready-to-eat mashed potatoes in the meat section to remind you to buy side dishes to go with your pot roast. The same approach that lenders use to prequalify potential loan applicants can be used to assess the risk for escalation in a series of burglaries, while the models used to classify shopping patterns and purchasing decisions can be used to identify the motive in a homicide or predict the next incident in a crime series. Data mining encompasses the process of discovering hidden patterns and relationships in large amounts of information. This also allows us to make accurate and reliable predictions of future events, based on the identification and characterization of these patterns and trends in historical data. Data mining helps solve a common problem: the more information, the more difficult and time-consuming it is to effectively analyze and draw meaning from the data. By using a clear
2 process and powerful analytic technologies, data mining quickly and thoroughly explores mountains of data, helping us identify the valuable or actionable nuggets of information. Data mining can be used in law enforcement to discover new patterns or confirm suspected patterns or trends. One of the strengths of data mining, as opposed to more traditional statistical methods, is that it is not necessary to know exactly what you are looking for before you start. Data mining uses powerful analytic tools to quickly and thoroughly explore mountains of data and pull out the valuable, usable information. The primary use of data mining is to find something new in the data-to discover a new piece of information that no one knew previously. This is sometimes referred to as the bottom-up or data-driven approach because you start with the data and then build theories based on discovered patterns or trends. This approach tends to rely more on methods derived from computer science research, such as neural networks and genetic algorithms, as well as visualization techniques like link charts or graphs. On the other hand, confirmation starts with an idea about a possible relationship (a hypothesis) and seeks to verify or refute the hypothesis based on the data. This application is strongly related to traditional statistical approaches, with an emphasis on hypothesis testing and model building. This is sometimes referred to as top-down or theory-driven data analysis because you start with a hypothesis and then check the data to determine whether it is consistent with the hypothesis. The discovery and confirmation approaches are complementary and are often applied in alternating sequence. Discovery methods can be used to detect new patterns or relationships, while confirmation methods can be used to make sure that the new patterns identified are reliable. As you build the knowledge base by adding new information, new questions arise, and these new questions lead to new avenues of exploration and discovery. Perhaps the most important required skill for data mining is domain knowledge, which simply means that you know your field and are in the position to evaluate the value or validity of the results. For example, we could find a strong relationship between icy roads and car wrecks, but it would have little value in policing because it is such an obvious relationship. On the other hand, identifying a relationship between cold weather and auto thefts associated with people preheating their vehicles could allow us to proactively deploy patrol units to residential neighborhoods and perhaps even deter auto thefts when the temperature dips below a certain level. One of the biggest challenges in using data mining and predictive analytics in law enforcement is that most, if not all, data encountered was never intended to be analyzed. Therefore, significant challenges associated with data form, content, reliability, and validity must be constantly evaluated and addressed. One common example of this issue can be found in police calls for service or dispatch data. It is not uncommon for multiple callers to report the same incident of shots fired. To get an accurate representation of illegal firearms use in the community, however, these duplicate calls should be identified and deleted. The dispatch of multiple units to the same incident, on the other hand, might seem redundant; however, any analysis of patrol deployment and workload will require the retention of this duplication in order to get an accurate representation of resource allocation.
3 The data culling, management, and descriptive analysis features offered by commercially available data mining packages are extremely valuable to crime and intelligence analysts, frequently offering the first accurate view of some data previously unapproachable. Again, domain expertise is absolutely essential to ensure that the results are accurate, reliable, and of value to the organization. Finally, data mining tools can enable analysts to merge and analyze data resources that do not traditionally coexist in the same environment. This type of value added analysis is a huge asset and allows the analyst to see and describe the big picture in related incidents or data resources, providing a more complete view of events or activities. One area that has been particularly helpful in our experience has been the combined analysis of weapon recovery data and violent crimes information. At the Richmond Police Department we selected the SPSS Incorporated data mining workbench Clementine, but there are a number of other data mining tools available to law enforcement organizations. We have used Clementine in a variety of analytical applications, including the examples outlined below. Deployment The largest portion of most police budgets is devoted to personnel costs. With decreasing fiscal resources and expanded purview related to the war on terrorism police personnel are increasingly being asked to do more with less. Moreover, issues related to recruitment, retention, and military activation are further stretching these already limited personnel resources. The ability to effectively deploy patrol personnel when and where they are likely to be needed can help us better use this increasingly limited resource while enhancing public safety, the ultimate goal of policing. The challenge to police managers and command staff is to make smarter deployment decisions in an effort to ensure that their personnel resources are available when and where they are needed, while minimizing resource deployment when the demand is low. A quick analysis of the problem reveals that time of day frequently is associated with police workload. For example, many more citizen complaints requiring police assistance are received at seven o'clock in the evening than at four o'clock in the morning. Further analysis of the data suggests that the nature of the calls also differs at different time of the day: officers might spend more time handling domestic issues in the evening, while alarm calls could account for a large percentage of calls during the midnight shift. These different types of calls also require differing amounts of time to clear. Again, a domestic complaint would likely require a greater amount of time, perhaps even additional police units, while an alarm call might take only a few minutes to clear. Day of week also might come into play, particularly in communities with active nightclubs or bars. We also have noted seasonal differences. For example, as the weather gets colder and people heat up their vehicles the number of vehicles stolen with keys increases. A similar trend can be anticipated in the warmer months as citizens leave their cars running in an effort to keep them cool. Changing drug patterns, trends, and prices also can have an impact on related crimes like
4 burglaries, armed robberies, and prostitution as users require increasing economic resources to supply their drug habit. A thorough evaluation of all the variables likely to affect patrol personnel workload directly is complicated, requiring differential weighting of multiple factors under varying circumstances and conditions. This comprehensive analysis of citizen-initiated demand quickly became very complex, far exceeding the analytical capacity of the human brain or even traditional, computerbased methodologies. Moreover, we have considered only the factors that we would expect to affect police calls for service. Frequently, it is the factors that we do not anticipate that can wreak havoc on even the most thoughtful deployment plans. Again, the discovery process associated with data mining affords police managers and command staff the opportunity to identify unusual or subtle patterns in very large datasets not readily apparent without the advanced methodologies incorporated in data mining and predictive analytics. These tools now give us the opportunity to analyze police calls for service data at a level previously unavailable to the law enforcement community and develop accurate and reliable models that significantly enhance patrol deployment decisions. Risk-Based Deployment Deployment of patrol units generally is linked to citizen-initiated calls or the anticipation of complaints. Like many other departments, the Richmond Police Department uses specialized tactical units that are proactively deployed to areas associated with specific challenges or issues, particularly illegal narcotics or violent crime. One underlying assumption in the use of these tactical units is that they be placed in or near a location where it is likely that they will be needed so that they can respond rapidly when called. Through our involvement with Project Safe Neighborhoods, we have developed the concept of risk-based deployment.1 Traditional approaches identify locations associated with an increased frequency of crime. Using data mining and predictive analytics, however, we have developed models predicting areas at greater risk for violent crime. Specifically, we have evaluated robbery-related aggravated assaults and developed models of those armed robberies associated with an increased likelihood for an aggravated assault. Our findings have allowed us to identify subtle distinctions between areas associated with an increased number of armed robberies, as compared to those associated with an increased risk for escalation into an aggravated assault. Moreover, the areas associated with increased risk also were somewhat smaller, facilitating a more concentrated deployment of the tactical units in the areas of greatest need. This information has been deployed in maps, which have been used to proactively deploy tactical units in the anticipation of an increased likelihood of violent crime.
5 Tactical Crime Analysis Traditional tactical crime analysis generally involves creating a model that represents a crime or series of crimes, which can then be used to link cases, identify and apprehend suspects, and prevent future crimes. With tactical crime analysis, crimes or series of crimes can be characterized, linked, and even anticipated based on time of day, day of week, location, modus operandi, or many other variables. Data mining tools can greatly enhance traditional methods by providing automated searches of extremely large datasets in search of subtle relationships, actionable patterns, and trends. These tools, when applied to tactical crime analysis, can be used to review large amounts of information and incorporate a vast array of variables, far beyond what a single analyst or analytical team or task force can accurately review. It also does this work in a timely fashion, which is critical to identifying and apprehending suspects before they can commit additional crimes. Predictive analytics offers the added benefit of selectively weighting factors most likely to predict future events. In high profile cases or series, data mining tools also can be used to search large tip databases effectively; again, a task beyond the capacity of a single analyst or even a team of analysts or task force. Behavioral Analysis of Violent Crime Data mining also can be used to analyze and model violent crime. Behavior, even extremely violent or seemingly unusual criminal behavior, frequently can be modeled, anticipated, and even predicted, something that criminal investigative analysis or profiling exploits extremely well. With data mining, we can discover relationships that might not be obvious or might be new to us. For example, using data mining we were able to discover a relationship between property crimes and stranger rapes.2 Through automated searches of large correctional databases we found that a prior property crime was a better predictor of a stranger rape than a prior sex offense. In fact, several high-profile sexually violent predators including Timothy Spencer, the first case where DNA evidence was used at trial, and Derrick Todd Lee, who was linked recently to a series of rape murders in Louisiana, had prior histories of burglary; and additional review of the sex offender literature supports this finding. Similarly, characterizing normal can be very important in identifying suspicious or unusual behavior. In our experience, deviations from normal patterns of offending may indicate the potential for serious escalation. For example, most burglaries are economically motivated crimes. The successful burglar generally selects an unoccupied dwelling, which decreases the likelihood of detection and apprehension, and takes something that holds monetary value (such as a TV or electronics).
6 Upon further examination of the property crimes committed by some stranger rapists, we noted that many of their burglaries differed in that they seemed to preferentially target occupied dwellings and frequently stole property with little value, if they stole anything at all. Using this type of anomaly detection, we can identify unusual or suspicious incidents that are worthy of additional investigation and have been able to successfully identify cases associated with an increased risk for escalation based on subtle deviations from normal. Therefore, another type of risk-based deployment includes situations where we believe that a certain type of incident or series has the potential for escalation based on our prior experience or the development of models. Ultimately, this gives us the opportunity to proactively deploy resources in an effort to prevent further escalation. Another type of violent crime that the Richmond Police Department has controlled some success with is drug-related violence. Associated with increases in community violence, drug-related violence frequently presents challenges to investigators in that witnesses might be difficult to find, unreliable, or reluctant, and there often is no readily identifiable relationship between the victim and perpetrator. As such, drug-related violence has been associated with decreased solvability and can greatly reduce overall clearance rates. Rapid development of a motive, however, can facilitate suspect identification and apprehension before a case grows cold. In some of our earliest work in this area, we were able to successfully model drug-related homicides using advanced statistical techniques and classify murders based on their motive.3 This preliminary work confirmed our ability to accurately and reliably model violent crime, and gave us some insight into the types of offenders likely to be involved in drug-related violence. Subsequent work in this area has been confined to information likely to emerge early in an investigation in an effort to assist in the identification of a motive and increase the pace of an investigation. Risk and Threat Assessment The ability to identify and characterize events or attributes associated with an increased threat level or risk gives agencies an analytical "crystal ball" to use for deployment, crime prevention, special operations, threat assessment, and forecasting. The Richmond Police Department has used data mining and predictive analytics to identify and characterize crime patterns and events associated with an increased risk of escalation associated with armed robberies and certain property crimes. These tools represent a powerful tool for examining other potentially risky or threatening situations that law enforcement professionals encounter regularly including repeat domestic complaints, stalking, and other potentially volatile situations. Predictive analytics also can be used internally to examine policing issues such as the use of force and police pursuits in an effort to identify potential training needs or policy change.
7 Officer Safety Data mining and predictive analytics can enhance officer safety as a direct result of the increased understanding of criminals, crime patterns, and trends. Understanding and characterizing how different factors might interact to create unsafe environments for police officers can result in operational changes that increase officer safety. For example, examination of victim risk factors revealed that drug dealers frequently use firearms for defensive purposes while violent offenders tend to use weapons for offensive purposes.4 Additional anecdotal information suggests that selection of specific weapons might be related to need; offenders carrying weapons for defensive purposes prefer reliable weapons that are easily concealed, while other more violent offenders may compromise reliability for a particularly menacing or popular weapon. Information like this can offer police professionals increased situational awareness as they approach and interact with different offender groups, ultimately resulting in enhanced officer safety. Around-the-Clock Crime Analysis As trauma surgeons have noted, violent crime frequently occurs at inconvenient times and during periods of low staffing.5 The same issue faces police managers. Many crimes are committed during evenings and weekends when analytical staffing is low. To wait for analytical personnel costs valuable time and can compromise the solvability of the case. One way to address this challenge has been to deploy the decision rules generated by data mining and predictive analytics directly to the sworn personnel. Using a Web-based tool, police managers, command staff, and other sworn personnel in the Richmond Police Department now are able to enter a small amount of relevant information and receive an analysis in a matter of seconds, regardless of the day or time. As need changes, additional models are prepared and deployed directly to the sworn personnel. Just as criminals know no boundaries, the possibilities for this type of tool are phenomenal, exploiting centralized or shared analytical capacity across geographical and jurisdictional boundaries. Unlike business trends, where predictive variables such as demographic information are not likely to change, crime trends and patterns might change very rapidly and with some frequency in any community. Even seasonal changes or fluctuations in the availability or preference for illegal narcotics can be related to overall changes in crime patterns and trends. Similarly, changes in groups of criminals, reorganization, or even arrests also can affect prevailing crime trends and patterns by removing key players or groups. In fact, rapid identification and apprehension of criminals will likely ensure that the models will change frequently, requiring ongoing analysis and reevaluation of the models. In fact, our experience with the risk-based deployment models developed for armed robbery-related aggravated assaults suggests that they should be refreshed approximately every six months.
8 Summary Intelligent, timely and complete analysis of the thousands of incident reports, crime tips, and other pieces of information that law enforcement professionals confront everyday is critical to fighting crime. The massive volume of data law enforcement organizations work with on a daily basis requires a different approach to analysis. The Richmond Police Department has found data mining and predictive analytics to be the most effective approach to addressing the so-called volume challenge associated with this massive influx of information, and is pioneering the use of these tools in policing.6 The successful exploitation of data mining and predictive analytics in law enforcement and intelligence analysis truly represents a powerful new tool, as well as a significant paradigm shift for the police executive, raising the question, "Why just count crime, when you can predict it?"
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
Making critical connections: predictive analytics in government
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
TEXAS CRIME ANALYSIS 2
2011 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the Uniform Crime Reporting (UCR) program.
Crime in Missouri 2012
Crime in Missouri MISSOURI STATE HIGHWAY PATROL RESEARCH AND DEVELOPEMENT DIVISION STATISTICAL ANALYSIS CENTER FOREWORD This publication is produced by the Missouri State Highway Patrol, Statistical Analysis
Key Crime Analysis Data Sources. Crime
Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged
8 Interpreting Crime Data and Statistics
8 Interpreting Crime Data and Statistics Rachel Boba T he goal of this chapter is to provide knowledge of how to appropriately apply and interpret statistics relevant to crime analysis. This chapter includes
Chapter TEXAS CRIME ANALYSIS
Chapter 2 TEXAS CRIME ANALYSIS 2007 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the
Predictive Analytics Workshop With IBM SPSS Modeler
Predictive Analytics Workshop With IBM SPSS Modeler Introduction What Makes a Smarter City? Objectives Smarter Public Safety with IBM The Power of Predictive Analytics What IBM Strives to Accomplish in
Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014
Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition
Making Critical Connections: Predictive Analytics in Government
Making Critical Connections: Predictive Analytics in Improve strategic and tactical decision-making Highlights: Support data-driven decisions. Reduce fraud, waste and abuse. Allocate resources more effectively.
East Haven Police Department
East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A
Build Stronger Cases with Mobile Device Link Analysis
White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street
THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners
THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners A SUCCESSFUL APPROACH TO REDUCING BURGLARIES TUCSON POLICE DEPARTMENT, 2006 SUMMARY THE PROBLEM: ANALYSIS: RESPONSE: In 2003 and 2004, the
IBM Content Analytics: Rapid insight for crime investigation
IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from
Taking a Bite Out of Crime: 46 Years of Utah Crime Statistics
Taking a Bite Out of Crime: 46 Years of Utah Crime Statistics August 15, 2008 The 2008 Utah Priorities Survey revealed Crime & Security to be the sixth-highest issue of concern for Utah residents. Specifically,
College Safety Offices. www.ecc.edu 716-851-1ECC
College Safety Offices North Campus Spring Student Center Room 5 Phone 85-4 South Campus Building 5 Room 5 Phone 85-6 City Campus Main Building Room Phone 85- For emergencies call 76-7-4545 or 9 www.ecc.edu
Crime in Arkansas 2001
State of Arkansas Mike Huckabee Governor Arkansas Crime Information Center Crime in Arkansas A publication of the Statistical Analysis Center Special Services Division Arkansas Crime Information Center
Crime Mapping and Analysis Using GIS
Crime Mapping and Analysis Using GIS C.P. JOHNSON Geomatics Group, C-DAC, Pune University Campus, Pune 411007 [email protected] 1. Introduction The traditional and age-old system of intelligence and
TENNESSEE BUREAU OF INVESTIGATION 901 R.S. Gass Boulevard Nashville, Tennessee 37216-2639 (615) 744-4000 TDD (615) 744-4001
Bill Haslam Governor TENNESSEE BUREAU OF INVESTIGATION 901 R.S. Gass Boulevard Nashville, Tennessee 37216-2639 (615) 744-4000 TDD (615) 744-4001 Mark Gwyn Director June 22, 2015 Ladies and Gentlemen: The
In 2014, U.S. residents age 12 or older experienced
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Revised September 29, 2015 Criminal Victimization, 2014 Jennifer L. Truman, Ph.D., and Lynn Langton, Ph.D., BJS Statisticians
Home Invasion Safety. Protecting Your Family
Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other
In 2013, U.S. residents age 12 or older experienced
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Revised 9/19/2014 Criminal Victimization, 2013 Jennifer L. Truman, Ph.D., and Lynn Langton, Ph.D., BJS Statisticians In
Moravian College Department of Campus Safety & Police Campus Security Authority Reporting Form. Date of report: Name of campus security authority:
Date of report: Name of campus security authority: Date that incident occurred (mm/dd/yyyy): If multiple incidents were reported or if the date the incident occurred is unknown, please note below: Reporting
1. ABSTRACT PROBLEM SOLVING PROCESS
1. ABSTRACT PROBLEM SOLVING PROCESS SCANNING - Assistant Chief Paul Felice of the Glendale, Arizona Police Department initiated a problem-solving project with the department's Community Action Team (CAT)
CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department
CMPD s Predictive Crime Analytics Implementation Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department CMPD BI Dashboards & Predictive Crime Analytics Agency Background Information Estimated
2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (392354001) User ID: C3923541
2015 Campus Safety and Security Survey Institution: Main Campus (392354001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be
Darien Police Department Quarterly Report
Darien Police Department Quarterly Report Chief Duane J. Lovello 04/02/2013 1 st Quarter 2013 Pride in Excellence Introduction I am pleased to report on the activities of the Darien Police Department for
Riverside Community College District Policy No. 3515 General Institution
Riverside Community College District Policy No. 3515 General Institution BP 3515 REPORTING OF CRIMES Reference: Education Code Section 67380 34 Code of Federal Regulations Section 668.46(b)(7) The Chancellor
Campus Security and Safety Report Madison Center September, 2015
Campus Security and Safety Report Madison Center September, 2015 This information is being provided to all students and employees as part of Upper Iowa University's - Madison Center commitment to safety
TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014
TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 360.01 9/25/2014 9/25/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Criminal Investigations 7/4/2014 REFERENCE RE-EVALUATION DATE CALEA
Pensacola Police Department
Pensacola Police Department Neighborhood Services Division Cadets- $345,200 Central Records- $383,700 Communications Center- $1,569,000 Community Oriented Policing Squad- $1,228,100 Neighborhood Services-
2015 Campus Safety and Security Survey. Screening Questions
2015 Campus Safety and Security Survey Institution: La Sierra University-Ontario Campus of Criminal Justice (117627003) Screening Questions Please answer these questions carefully. The answers you provide
Standardizing the Collection, Analysis and Dissemination. of Motor Vehicle Theft Intelligence. Sgt Rich Smith. Colorado State Patrol
Standardizing the Collection, Analysis and Dissemination of Motor Vehicle Theft Intelligence By Sgt Rich Smith Colorado State Patrol WHAT WOULD YOU DO? You have a motor vehicle theft suspect in custody
African American Males in the Criminal Justice System
African American Males in the Criminal Justice System Purpose and Background The purpose of this report is to examine the experience of African American males in the criminal justice system. The focus
Arrests in Wisconsin 2010
Wisconsin Office of Justice Assistance 1 S. Pinckney Street, Suite 615 Madison, WI 53703 Scott Walker Governor Arrests in Wisconsin 2010 July 2011 Arrests in Wisconsin 2010 i 07/2011 Wisconsin Statistical
Using a Geographic Information System for Tactical Crime Analysis
CHAPTER Using a Geographic Information System for Tactical Crime Analysis PHILIP CANTER This chapter discusses the uses of a geographic information system (GIs) for tactical crime analysis. A tactical
Social Media Use in Law Enforcement:
Research Crime prevention and investigative activities continue to drive usage. November Background and methodology Overview Social media is increasingly valuable to the way law enforcement professionals
Neighborhood Watch. Casey Police Department
Neighborhood Watch Casey Police Department Neighborhood Watch: History The current system of Neighborhood Watch began developing in the late 1960s as a response to the rape and murder of Kitty Genovese
3 Sources of Information about Crime:
Crime Statistics 3 Sources of Information about Crime: 1-UCR: Uniform Crime Report 2-NCVS: National Crime Victimization Survey 3-SRS: Self-Report Surveys UCR: Crime statistics are collected by branches
Prince William County Police Department 2013 Crime Report
Prince William County Police Department 2013 Crime Report A NATIONALLY ACCREDITED LAW ENFORCEMENT AGENCY -Page intentionally left blank- TABLE OF CONTENTS Overview... 2 At a Glance... 3 Part I Crime...
Montgomery County Crime Report 2014
Montgomery County Crime Report 2014 MESSAGE FROM THE CHIEF 2014 MONTGOMERY COUNTY CRIME REPORT As so often happens, there is good news and bad news regarding the crime rate. When we look at our year-end
SERIAL RAPE: OFFENDER PROFILING
SERIAL RAPE: OFFENDER PROFILING Detective Inspector John Manning New Zealand Police Liaison Officer, Sydney Offender profiling as a viable investigative tool has been graphically illustrated in a number
Mission. Department Description
POLICE Mission To consistently provide effective, professional and dependable law enforcement services to every citizen, visitor and business within the City of Clearwater. Department Description The Police
PROSECUTION DIVISION THE MISSION
PROSECUTION DIVISION THE MISSION Chief Prosecutor Phillip J. Tydingco The Office of the Attorney General, through its Prosecution Division, plays a vital role in Guam s criminal justice system as part
Crime Statistics. The Clery Act requires colleges and universities to publicly publish three years of campus crime statistics.
Crime Statistics The Clery Act requires colleges and universities to publicly publish three years of campus crime statistics. Daytona State College crime statistics have been disclosed in compliance with
The Farmville Police Department
HONOR `` The Farmville Police Department 2015 State of the Department Annual Report 1 Farmville Police Department 2015 Annual Report Table of Contents Chief s Message....3 Agency Accomplishments..4-6 Measureable
Crime Pattern Analysis
Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01
GENERAL ORDER FAIRFAX COUNTY POLICE DEPARTMENT
I. POLICY It is the policy of the Fairfax County Police Department to ensure an organized, well considered response to reports of security alarm activations. A controlled response affords the greatest
Juvenile Offenders Crime Victims Rights Law Enforcement Responsibilities
Juvenile Offenders Crime Victims Rights Law Enforcement Responsibilities Crime Victims Rights when involving a Juvenile Offender are the same as if the offender were an adult in cases of -- felony grade
Hudson Police Department FY 2014 Town Report
Hudson Police Department FY 2014 Town Report Preface: It gives me pleasure to share with the citizens of Hudson, your Police Department s FY 2014 Annual Town Report. The following information will summarize
Crime Statistics in. Crime Statistics in British Columbia, 2014. Table of Contents. Ministry of Justice Police Services Division
Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2014 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime
Department of. Public Safety ANNUAL REPORT. 5800 Old Main Hill Logan, UT 84322 (435) 797-1939 www.usu.edu/usupd
Department of Public Safety 9 ANNUAL REPORT 8 7 6 5 4 58 Old Main Hill Logan, UT 84 (45) 797-99 www.usu.edu/usupd Table of Contents Letter from the Chief of Police. Who We Are.. Patrol, Dispatch, Security....4
Solve your toughest challenges with data mining
IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could
STATISTICA. Financial Institutions. Case Study: Credit Scoring. and
Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT
Council on Postsecondary Education Crime Reporting Guidelines Annual Minger Report KRS 164.9485
Council on Postsecondary Education Crime Reporting Guidelines Annual Minger Report KRS 164.9485 Grouped by Michael Minger Act Crime Categories under KRS 164.948(3) Note: All FBI UCR definitions were quoted
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA The following statistics are provided as part of the requirement under the Student Right- To Know and Campus Security Act, Public Law 101-542,
LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT
LAW-ENFORCEMENT RECORDS and the FREEDOM OF INFORMATION ACT Law-enforcement agencies in Virginia continue to enjoy one of the broadest exemptions for releasing information in all of the states. The Virginia
British Columbia, 2013. Crime Statistics in. Crime Statistics in British Columbia, 2013. Table of Contents
Ministry of Justice Police Services Division Crime Statistics in British Columbia, 2013 Table of Contents Highlights... 1 Table 1: Police-Reported Criminal Code and Drug Offences in BC... 2 Table 2: Crime
ONDCP. Drug Policy Information Clearinghouse FACT SHEET John P. Walters, Director www.whitehousedrugpolicy.gov 1-800-666-3332. Drug-Related Crime
Executive Office of the President Office of National Drug Control Policy ONDCP March 2000 Drug Policy Information Clearinghouse FACT SHEET John P. Walters, Director www.whitehousedrugpolicy.gov 1-800-666-3332
Solve your toughest challenges with data mining
IBM Software Business Analytics IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster 2 Solve your toughest challenges with data mining
Texas Highway Safety Operations Center: Using Data to Combat Crime, Crash, and Traffic Enforcement Issues
Texas Highway Safety Operations Center: Using Data to Combat Crime, Crash, and Traffic Enforcement Issues 2015 Emergency Management Conference San Antonio TEXAS DEPARTMENT OF PUBLIC SAFETY Texas Highway
For the 10-year aggregate period 2003 12, domestic violence
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Special Report APRIL 2014 NCJ 244697 Nonfatal Domestic Violence, 2003 2012 Jennifer L. Truman, Ph.D., and Rachel E. Morgan,
Crime Statistics. Criminal Offenses, Dalton State College: Main Campus- 650 College Drive Dalton, GA 30720
Crime Statistics Criminal Offenses, Dalton State College: Main Campus- 65 College Drive Dalton, GA 372 Type of Offense On-Campus Residential Housing Non-campus Public Property Criminal Homicide Murder/Non-negligent
FY2015/16 Proposed Budget. SECTION 20 Police
20 SECTION 20 Police 187 Police The mission of the Police Department is to work in partnership with the community to protect life and property, solve neighborhood problems, and enhance the quality of life
Dashboards Help Lift the Fog of Crime By Chief Bence Hoyle
Dashboards Help Lift the Fog of Crime By Chief Bence Hoyle May 13, 2011 Carl Von Clausewitz, a Prussian military officer in the 1800s, coined the term "fog of war", which described the state of confusion,
JUVENILES AND THE LAW
JUVENILES AND THE LAW When Are You a Juvenile and When Are You an Adult? The answer to this question is complicated because, under Missouri law, when you are considered an adult and when you are considered
APARTMENT MANAGERS' HOTLINE PRCHiKAM. Abstract. The Colorado Springs Police Department has policed with the Community
98-16 APARTMENT MANAGERS' HOTLINE PRCHiKAM Abstract The Colorado Springs Police Department has policed with the Community Policing Philosophy since the 1970's. Problem Oriented Policing (POP) was incorporated
Law Enforcement Survey on Domestic Violence and Sexual Assault
Rural Crime and Justice Center Minot State University Law Enforcement Survey on Domestic Violence and Sexual Assault April 2013 (Revised) Highlights By Lisa Dooley and Rebecca Ruzicka Departments with
Campus Safety and Security Survey 2015
Campus Safety and Security Survey 2015 Criminal Offenses On campus Total occurrences On campus Criminal offense 2012 a. Murder/Non negligent manslaughter 0 0 0 c. Sex offenses Forcible 3 2 2 f. Aggravated
Fact Sheet: Drug-Related Crime
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics DEPARTMENT OFJUSTICE OFFICEOF JUSTICE PROGRAMS BJA NIJ OJJDP OVC BJS Drugs & Crime Data Fact Sheet: Drug-Related Crime
The Illinois Uniform Crime Reporting Program
INTRODUCTION 1 The Illinois Uniform Crime Reporting Program The Illinois Uniform Crime Reporting (I-UCR) Program was developed in 1971 and implemented on January 1, 1972. The Illinois State Police was
The FBI Uniform Crime Report definition of Part 1 crime also includes arson, but for the purposes of this analysis it has been excluded.
Safety, real or perceived, is one of the most important factors affecting quality of life for residents, businesses or visitors in Baltimore s neighborhoods. Though crime and criminal activity tend to
DELAWARE COUNTY TREATMENT COURT APPLICATION
DELAWARE COUNTY TREATMENT COURT APPLICATION Please read each question carefully before answering. Failure to complete this form accurately will delay the processing of your application. False or misleading
POLICE OFFICER. 4. Work in partnership with the District Attorney s Office to obtain and file criminal complaints on arrested subjects.
POLICE OFFICER Class specifications are intended to present a descriptive list of the range of duties performed by employees in the class. Specifications are not intended to reflect all duties performed
Domestic Assaults by Juvenile Offenders
U.S. Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention J. Robert Flores, Administrator November 2008 Office of Justice Programs Innovation Partnerships
2014 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus (161581001) User ID: C1615811
2014 Campus Safety and Security Survey Institution: Main Campus (161581001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will be
Adult Criminal Justice Case Processing in Washington, DC
Adult Criminal Justice Case Processing in Washington, DC P. Mitchell Downey John Roman, Ph.D. Akiva Liberman, Ph.D. February 2012 1 Criminal Justice Case Processing in Washington, DC P. Mitchell Downey
UC Safety and Reform: Update and Discussion
UC Safety and Reform: Update and Discussion Presentation to Law and Public Safety Committee Cincinnati City Council April 25, 2016 Robin S. Engel, Ph.D. Vice President for Safety and Reform James L. Whalen,
Quick Reference Chart for Determining. Immigration Consequences of Common New York Offenses
Quick Reference Chart for Determining Immigration Consequences of Common New York s Quick Reference Chart for Determining Immigration Consequences of Common New York s A P P E N D I X A For information
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS. Harry S Truman College
SECURITY POLICIES AND CRIME STATISTICS REPORT POLICY STATEMENT ON SECURITY AND CAMPUS ACCESS Harry S Truman College I. MESSAGE FROM THE PRESIDENT DR. REAGAN F. ROMALI Harry S Truman College enrolls more
Auto Theft Tracking Program Bait Car (ATTP)
Auto Theft Tracking Program Bait Car (ATTP) Public Safety Committee December 12, 2011 www.dallaspolice.net David O. Brown Chief Of Police Purpose To familiarize Council members with the ATTP/Bait Car Program
FY2015/16 Approved Budget. SECTION 20 Police
20 SECTION 20 Police 193 Police The mission of the Police Department is to work in partnership with the community to protect life and property, solve neighborhood problems, and enhance the quality of life
FAQ: Crime Reporting and Statistics
Question 1: What is the difference between the Part I and Part II offenses in Uniform Crime Reports (UCR)? Answer 1: Uniform crime reports (UCR) divide offenses into two categories: Part I offenses and
Thirty-six years of Weapon and Serious Violent Offending in Ohio: How Data Can Inform Policy (Final Report)
Thirty-six years of Weapon and Serious Violent Offending in Ohio: How Data Can Inform Policy (Final Report) Deanna L. Wilkinson, Ph.D., Associate Professor The Ohio State University, Department of Human
Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010
Crime Location Crime Type Month Year Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop Theft April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010 Betting Shop
Austin Independent School District Police Department Policy and Procedure Manual
Policy 4.11 Austin Independent School District Police Department Policy and Procedure Manual Domestic Violence I. POLICY (TPCAF 7.08.1) It is the policy of the AISD Police Department to respond to all
2014 Campus Safety and Security Survey. Screening Questions. Institution: Hebrew College (166045001) User ID: C1660451
2014 Campus Safety and Security Survey Institution: Hebrew College (166045001) Screening Questions Please answer these questions carefully. The answers you provide will determine which screens you will
Criminal Victimization in the United States, 2008 Statistical Tables
U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics Criminal Victimization in the United States, 2008 Statistical Tables National Crime Victimization Survey Table of contents
APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York Offenses
APPENDIX A Quick Reference Chart for Determining Key Immigration Consequences of Common New York s For information on the applicability of these consequences to a specific noncitizen, see Chapter 3. For
