CJ 425 Crime Mapping Unit 6 Seminar “Patterns”. Outline Repeat Incidents Tactical Analysis – Definition – Information Used 7 types of Patterns Inductive/Deductive.

Slides:



Advertisements
Similar presentations
2014 Annual Policing Plan – Q1 Results Edmonton Police Service Presented to the Edmonton Police Commission May 22,
Advertisements

Problem-Oriented Policing CRITIC. Introduction Problem-oriented policing (POP) is an approach that seeks to – Determine the underlying complex mechanisms.
Chapter 3 Physical Evidence.
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Take out your notes – we are going to lecture on Ch. 2.  Be sure to turn in your Ch. 2 HW! While you are waiting, respond to the following: 1. What is.
1 MODEL ACADEMIC CURRICULUM MODULE 12 Responding to Targets/Victims.
INTRODUCTION TO INVESTIGATION Mr. Cappello Sir Robert Borden High School Specialist High Skills Major Program.
Police Technology Chapter Twelve
Chapter 17 Methodology – Physical Database Design for Relational Databases Transparencies © Pearson Education Limited 1995, 2005.
Introduction to Investigation
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Safer College Campuses and Communities Through the Use of Geospatial Information Technology George Roedl and Gregory Elmes West Virginia University.
Crime Analysis with Crime Mapping Chapter 10: Identifying Useful and Meaningful Patterns Prepared by: Dr. Rachel Boba (August 2008)
Systems analysis and design, 6th edition Dennis, wixom, and roth
Lecture 9 Methodology – Physical Database Design for Relational Databases.
Statistics Chapter 9. Statistics Statistics, the collection, tabulation, analysis, interpretation, and presentation of numerical data, provide a viable.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
A.C.E.S. A Systematic Case Investigation Concept John Harvey Deputy Director, Ogden Police Department.
CJ 425 Crime Mapping Unit 4 Seminar “Data”. Next week Sunday 2/6 Mid term week – No Seminar Midterm Essay Exam Access and examine the Burglary to Motor.
STALKING. Basics of Stalking  Harassing, threatening, or menacing behavior  Is the behavior repeated conduct?  If suspect feels fear – take it seriously.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
FUNDAMENTAL STATISTIC
 DATA STRUCTURE DATA STRUCTURE  DATA STRUCTURE OPERATIONS DATA STRUCTURE OPERATIONS  BIG-O NOTATION BIG-O NOTATION  TYPES OF DATA STRUCTURE TYPES.
Geoprofiling and other geo-spatial methods against metal theft CONFIDENTIAL SNCF London, September 15th, 2015.
© Pearson Education Limited, Chapter 13 Physical Database Design – Step 4 (Choose File Organizations and Indexes) Transparencies.
GIS ANALYSIS IN PUBLIC SAFETY Denise Stuckey GIS Production Manager The Schneider Corporation.
1 REPORT WRITING Learning Domain INVESTIGATIVE REPORT Definition: Definition: Written _____________ prepared by a peace officer, in detail, of an.
BUSINESS ANALYTICS AND DATA VISUALIZATION
AJ – 58 Community and Human Relations Chapter 8 – Problem-Solving and Community Policing.
Criminology 102 Seminar 2. Collecting Data on Crime UCR-collected by FBI from around 17,000 police departments. The best most widely known source of crime.
CRIME SCENE. Defining a Crime Scene The only thing consistent about crime scenes is their inconsistency.
CJ210: Unit 3 Obtaining Information. Follow Up: Unit 2 Mishandling of evidence; intentional and mistake Consequences Criminal charges & disciplinary action.
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
Crime Scene Processing.  Any questions before we begin about anything?  Unit 2 Seminar -Chain of Custody -Modus Operandi (MO) -Criminal Profiling -Importance.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
31/08/ /08/2011 Richmond Crime Assessment. 31/08/2011 Tactical Problem – Shed Burglary & Bike Theft Inference – Unknown offender/s are continuing.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
FBI Method of Profiling Violent Serial Offenders
Criminal Profiling. Psychological Profiling Involves investigating the offender’s BehaviorMotivesBackground As a guide for what direction the Investigation.
Efficient Data Compression in Location Based Services Yuni Xia, Yicheng Tu, Mikhail Atallah, Sunil Prabhakar.
1 Book Cover Here Chapter 12 CRIME ANALYSIS AND COMING ATTRACTIONS IN THE INVESTIGATOR’S TOOLBOX Criminal Investigation: A Method for Reconstructing the.
Microsoft Access Database Creation and Management.
Introduction to Data Mining by Yen-Hsien Lee Department of Information Management College of Management National Sun Yat-Sen University March 4, 2003.
2 Methods used to identify materials found at the scene of a crime.
Lean Six Sigma: Process Improvement Tools and Techniques Donna C. Summers © 2011 Pearson Higher Education, Upper Saddle River, NJ All Rights Reserved.
Scenario Project: Investigative Plan
CJ 102 Unit 2. Primary Sources of Crime Data Uniform Crime Reports (UCR) National Incident-Based Reporting System (NIBRS) National Crime Victimization.
U.S. JUSTICE Defining & Classifying Crime & Criminals.
CJ 102 Criminology. Chapter Two: The Nature and Extent of Crime.
Welcome/Housekeeping Turn on Speakers Phone Numbers Tech Support (2) (3) (open 24/7) Tim – (8:00 AM – 9 PM ET) Unit weeks.
Information Resources Criminal Investigation CJUS 201 Part 12.
Data Mining – Introduction (contd…) Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
June 21, *Data is current through 6/15/16.
Chapter 12 Robbery Hess Introduction Robbery has plagued the human race throughout history Robbery is one of the three most violent crimes against.
CJA 334 Week 5 Individual Research Article Analysis To purchase this material click below link Week-5-Individual-Research-Article-Analysis.
M I S S I O N S T A T E M E N T THE PRIMARY MISSION OF THE SIUE POLICE DEPARTMENT IS TO PROVIDE FOR THE SAFETY AND SECURITY OF ALL MEMBERS OF THE SIUE.
Criminal Investigations
INVESTIGATION PROCESS AND TECHNIQUE
Methodology – Physical Database Design for Relational Databases
Actuaries Climate Index™
Finding a Pattern.
Criminal Investigation
Forensic Psychology and Serial Killers:
Environmental Criminology
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Tactical Crime Analysis
Unit 3: Physical Evidence
Presentation transcript:

CJ 425 Crime Mapping Unit 6 Seminar “Patterns”

Outline Repeat Incidents Tactical Analysis – Definition – Information Used 7 types of Patterns Inductive/Deductive Logic Methodologies

Repeat Incidents Two or more incidents that are similar in nature and have happened at the same place (typically) or by the same person. Multiple calls for service Larry Sherman (1980) 3% of locations

Tactical Analysis Definition: The study of recent criminal incidents and potential criminal activity through the examination of characteristics such as how, when, and where the activity has occurred to assist in pattern development, investigative lead and suspect identification, and case clearance.

Tactical Analysis Information Used – How, when, where, what 4 Main Types of Information 1. Modus Operandi 2. Person’s Involved 3. Vehicles Involved 4. Field Contacts

Patterns Patterns involve two or more crimes or more serious incidents that seem to be related by: victim, offender, location, or property that typically occur over days, weeks, or months.

Crime Patterns 7 Patterns – Series – Spree – Repeat Victim – Repeat Offender – Hot Spot – Hot Target – Hot Product

Series A run of similar crimes committed by the same individual(s) against one or various victims or targets Usually over a period of time.

Spree A run of crime activity characterized by such high frequency that the activity appears almost continuous. Example: thefts from 7 vehicles in a parking lot over a 1-hour period.

Repeat Victim Specific individuals who have been repeatedly victimized A group of individuals who share similar characteristics and have been victimized over a short period of time.

Repeat Offender Individuals or types of individuals who commit multiple crimes over long or short periods of time.

Hot Spot – A specific location or small area that suffers from a large amount of crime. Clustered – locations group together in one or more smaller clusters Dispersed – Locations are spread throughout the hot spot but are more concentrated than incidents in other areas

Hot Target A type of place that is frequently victimized. Common hot targets include beauty salons, schools, and convenience stores

Hot Product A specific type of property that is repeatedly victimized or a consumer item that is particularly attractive to thieves.

2 Approaches Deductive Logic – General to Specific Inductive Logic – Specific to General

Methodologies (linking of cases) Ad hoc linking – by memory Query Method – an iterative process in which the analyst manipulates, searches, and sorts characteristics using a database matrix Trend Hunter – a process in which various characteristics are weighted and the weights summed up for each case.

Conclusion 1.Use common sense 2.Use logical approaches 3.Be systematic 4.Use Information 5.Triangulation 6.Be Patience and accept failure