Holly Waite, Izabela Nowacka, William Zell Acknowledgements Ocean’s 14 would sincerely like to thank Professor John Radke and our GSIs for teaching GEOG.

Slides:



Advertisements
Similar presentations
A34 Corridor Strategy Strategic Route Improvements 25 th November 2004 working together with.
Advertisements

A group of four prisoners were held captive by the enemy and each prisoner was to be shot each day through the week. As natural disasters were common in.
Justin Prokopick, Marijana Vidackovic, Zaid Kharouba, and Boris Gusev
Safe Driving Rules and Regulations
Police Operations Patrol Function Categories  Crime prevention - pro-active deterrence  Law Enforcement - reactive deterrence  Order Maintenance -
US&R Planning. US&R Planning Issues Establish authority and responsibility Assess vulnerability and hazards Identify resources Coordination of response.
ArcLogistics Routing Software for Special Needs, Maintenance and Delivery.
Lecture 8 ISM- © 2010 Houman Younessi Information Systems Spring 2011 Convener: Houman Younessi
Spectrum of Prevention: A Model for Planning Public Health Interventions Traumatic Brain Injury Prevention Helmet Use and Bicycle Safety.
Abstract The SEPTA Regional Rail system serves as an important network for the Philadelphia region, moving many commuters during the peak hours on suburb-to-city.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Grid-based Map Analysis Techniques and Modeling Workshop Part 1 – Maps as Data Part 2– Surface Modeling Part 3 – Spatial Data Mining Part 4 – Spatial.
Lesson 18 Edification.
Delaware State Driver’s Education Study Guide. Drivers have trouble seeing motorcycles in traffic. Why?
BIO Az DPS Assignments Masters from Northern Arizona University
Consumer Packaged Goods Manufacturing Industry Team: Aymaras Pan American Advanced Studies Institute Simulation and Optimization of Globalized Physical.
An “optimal” controller in Soft Walls is one which always pushes away from the no-fly zone. To blend the control in gradually, we would like to increase.
Week 21GEOG2750 – Earth Observation and GIS of the Physical Environment1 Lecture 17 Terrain modelling: applications Outline – introduction – access modelling.
CS 128/ES Lecture 12b1 Spatial Analysis (3D)
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
Grid-based GIS Modeling Nigel Trodd Modified from Berry JK, GIS Modeling, presented at Grid-based Map Analysis Techniques and Modeling Workshop,
19 th Advanced Summer School in Regional Science Combining Vectors and Rasters in ArcGIS.
CE Introduction to Surveying and Geographic Information Systems Donald J. Leone, Ph.D., P.E. eLearning Version Lecture 4.
GIS Introduction What is GIS?. Geographic Information Systems A database system in which the organizing principle is explicitly SPATIAL.
OPTIMIZING THE SOLID WASTE COLLECTION SYSTEM OF ACSS USING LINEAR PROGRAMMING & GIS Mohammed Abdi Ali Term Project Fall 2000 CE 394 GIS for Water Resources.
Chapter 7 Administration of the Fire Department
POLICING IN SCOTLAND. Policing in Scotland Aim: Identify the key roles played by the police in Scotland. Success Criteria: You can identify the four key.
1 ACCESS to QUALITY CULTURAL, RECREATIONAL, EDUCATIONAL and LEISURE OPPORTUNITIES Collaboratively encourages and supports opportunities to focus on the.
Community Planning Event for North and West 1 Output from workshop held on Tuesday 9 th February 2010 at John Clare Primary School, Helpston.
Speed = Distance Time Distance = Speed x Time Time = Distance Speed 1.Find the distance travelled if going at 40mph for 2 hours 2.Find the average speed.
Traffic Enforcement And Management System Malam-Team is Israel's largest systems integration organization, One of the most exciting solutions offered by.
Earthquakes By: Haley Z..
PAPAL VISIT 2015 CITIZEN ADVISORY LOWER PROVIDENCE TOWNSHIP.
Understanding and Interpreting maps
Monday’s Warm Up. Objective By the end of today’s lesson, you will be able to solve an equation for a particular letter, given that the equation contains.
Joint Venture in construction company in West Bank.
DTM establishment around Nausori Airport. Siu Pouvalu, s GS 350 Projects in Geospatial Science University of the South Pacific, SOPAC & Airports.
Spatial Analysis.
Chapter 4 & 5: GIS Database & Vector Analysis. Chapter Four: GIS Database 2.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
Load up your worksheets – Unit 2: Employment in the Uniformed Public Services Law and Accountability Document.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Gator Watch Watch, Report, Protect! Together for a Safe Campus.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada QUANTITATIVE MODELS FOR PERFORMANCE AND COST OF COMMAND,
A better Gauteng is in the making The Gauteng Aggravated Robbery Strategy Institute for Security Studies 8 October 2009.
Teaching Kids To Help Design Out Crime National Crime Prevention Council 2006.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
26 June 2006Institute of Transportation Engineers District 6 Annual Meeting Intelligent Transportation Systems Lab Christopher M. Monsere Research Assistant.
1) What is your name and what is your occupation? I interviewed Charro Benteau. Her occupation was photography.
Conclusion BACKGROUND Since the basis of this analysis is not based on the skill of the offender, but rather, an inherent dependence on environmental and.
By Nick Duffy and James Murphy Flow Chart Conclusion The red circle on the final composite suitability map above indicates the location of, what we found.
EMLYN A. RICKETTS, ESQ. Criminal Procedure: The Investigative Phase.
Mark M Hood Jr Geography C188: University of California, Berkeley Acknowledgements Source – Cal Atlas, SF GIS, DataSF,Google and Yahoo (for locations of.
History of Fredericton Police Force. How long the business has been operating Established on June 27 th, 1851 Making it the Second Oldest Municipal Police.
Mapping of Traffic Conditions at Downtown Thessaloniki with the Help of GPS Technology P. D. Savvaidis and K. Lakakis Aristotle University of Thessaloniki,
Projection WGS_1984_UTM_Zone_10N Conclusion Based on our analysis, the best location for the new Burrito MaMa should be on the corner of San Pablo Ave.
Managing ITS Assets using GIS in Silicon-Valley City of San Jose, CA Kenneth Salvail, P.E. ITE District 6 Annual Meeting July 2007, Portland Oregon.
Sidewalk Strategic Plan City of Peterborough, Ontario.
Mohammed Alzaaq MS GIS Program University of Redlands.
Oil Pipeline Optimal Route
Members Cliff Walden- Manager Ty Wolosin- Assistant Manager
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security Fang et al.
Driving in City Traffic
War of the Republic of California
Routing and Logistics with TransCAD
Shortlisting Applications
Shortlisting Applications
Solar Trees in San Francisco
Erasmus Intensive Program
Edinburgh Napier University
Presentation transcript:

Holly Waite, Izabela Nowacka, William Zell Acknowledgements Ocean’s 14 would sincerely like to thank Professor John Radke and our GSIs for teaching GEOG 188C and helping us in our goal of ridding DC of its extra money. Additionally, the DC GIS Clearinghouse (dcatlas.dcgis.dc.gov) and the DC GIS Open Data Site (opendata.dc.gov) was extremely helpful in providing a wealth of high quality and resolution data, those fools. Conclusion From our GIS modeling, we have found the most effective way to pull of a DC bank heist. Using three modeling techniques, we present the optimal bank to rob, best escape route, and safest pickup location. This set of modeling techniques will be useful for bank heists in other cities, and we hope to provide the professional criminal community with the technology and analysis that will enable more efficient, safe, and profitable ventures in the present and future. Aim We have been tasked with finding the best way to escape from the heist. First, we located the perfect bank based on a suitability analysis, including law enforcement and population attributes. Next, we decided the place to meet with a helicopter extraction team using a surface analysis of the DC area. After finding the start and end for the escape route, we then found the best possible route between the two sites for a successful bank heist. All of this was done within the boundary of the city to avoid crossing state lines until the last possible moment. Introduction Our 3 person GIS team have been hired by Ocean's 11 for their upcoming heist in Ocean’s 14. To help them in their goal of conducting a bank heist in the District of Columbia, our team's expert GIS skills will successfully aid them in the crime of the century. Security in Washington DC is first-rate and requires strategic planning and critical analysis for success. 2. Helicopter Rendezvous--Surface Analysis: For the meeting point for helicopter extraction inside the DC boundary, we weighted multiple surface factors and combined them based on the constraints given by our employers. From spot elevation, we created a raster to make an aspect map, with positive weight given to western-facing slopes, and viewshed, with positive weight given to visibility from the Washington Monument, and then combined with a four kilometer distance buffer from the center of the city. Results Ocean’s 14: The DC Bank Heist Methods 1.Bank Site--Vector Suitability Analysis: To find the perfect bank, we made an opportunity layer consisting of data that would be to our benefit. This included nearby access to highway/interstate in case an emergency flee situation was required, locations within the "No Fly Zone" to prevent entrapment by law enforcement, and areas of high population density where police force resources are strained. For the constraints map, police stations were located to ensure a minimal distance from the banks. Together, this data gave us the best possible location to conduct the heist. When overlain by bank location data, we were able to find the perfect bank for the job. Established location of start and end points Set analysis time to 3:00 am on a Tuesday Ran Network Analysis Added restriction points: traffic cameras and police stations Created Street Network for Washington DC Set Projection to State Plane Maryland FIPS The Best Route between the two In order to successfully escape from Washington DC with stolen money, we need to efficiently use each minute following the robbery. Since average response time for the police is 2-15 minutes, and taking into account the fact that Swat team in the capital is just minutes away, our best option is to commit the crime at 3am on a Tuesday. To find the best route, we created a street network from DC street database. When running Network Analysis, we included important points to avoid such as police stations, red light cameras, and speeding cameras. The best route found would take 9 minutes to complete according to the speed limit. However, avoiding restrictions included in the analysis lets us travel well above the speed limit and safely arrive at t he destination point within 5 minutes. It is still not enough time, we would get caught twice before escaping.