Posted by Tyler Wood, Operations Manager at Crime Tech Solutions
This is a very interesting read about the current big data analytics darling, Palantir Technologies. The article from GS Early appears on the Personal Liberty website HERE.
The original article follows…
“I was reading my newsfeeds and I came across a very interesting story about this highly secretive company that is apparently buying up as much Palo Alto, California real estate as it can get its hands on.
But that isn’t even the most interesting thing about them. What piques my interest is how this start-up that just added another $450 million to its funding — it now has about $20 billion in funding — got its money.
The company is called Palantir Technologies. If the name sounds familiar, it’s because it comes from JRR Tolkein’s trilogy of fantasy novels. In The Fellowship of the Ring, Saruman the wizard uses the Palantir of Orthanc, an indestructible sphere of dark crystal, to see into the future and communicate across the world.
That sounds geeky and innocuous enough, no?
But Palantir the company’s biggest clients are the FBI, SEC and the CIA. It is a Big Data company that also has corporate clients, but much of the work — from what anyone can tell — comes from hush-hush projects for the U.S. intelligence community.
This crystal ball of a company sounds less like a quaint fantasy than a key element of the “thought police” in Philip K. Dick’s dark science fiction tale “The Minority Report.”
In “The Minority Report,” the police used computers to predict when and where a crime would occur and apprehend the perpetrator before he actually committed the crime.
The crazy thing is, we’re now living in a world where Big Data makes that possible.
First, let me explain what Big Data is. Basically, now that our lives are completely recorded in various media — traffic cameras, debit card transactions, loyalty cards, phone calls, television shows watched, internet, social media, SMS texts, etc. — computers are powerful enough now to sort through all this data from all these sources and come up with predictive patterns for individuals and groups.
This is a very hot area for retail stores. But it also has enormous implications in a variety of industries; and many of them are helpful.
It is certainly a tool that law enforcement and our intelligence services would find valuable to root out potential terrorists or groups that are planning some terrorist act. It is also useful to find people who are attempting to elude authorities. And being able to get ahead of the some of the more devious players on Wall Street and their illegal trading schemes would be nice.
But you can see where this could be turned on Americans, just as easily as the NSA turned its endeavors on to less than righteous paths.
Palantir is raising eyebrows in the epicenter of digital startups because most companies, once they reach a certain size, move out of Palo Alto and build a campus in some surrounding town.
Not Palantir. It now owns about 10-15 percent of all the available space in Palo Alto, more than 250,000 square feet. It is the fourth most valuable venture backed company in the world.
The irony in the article was, the concern wasn’t about its biggest client or what it’s doing for the CIA, it was the fact that it’s eating up all the available commercial space in Palo Alto and not leaving room for new startups.
My concern is a bit deeper. The CIA could have quietly gone to one of the major Big Data firms like Accenture or IBM and worked with them on whatever it is they needed. But instead they essentially built their own company, where there are much fewer people to throw up roadblocks to the work being done. I have no problem with government using Big Data to protect us; my concern is when intelligence and enforcement agencies have unfettered use of it.
But, there’s no turning back the clock. We are in the Big Data, cybersecurity age and plenty of these companies already exist. Usually their goal is help their clients sell more lavender soap in February or figure out what kind of salad greens a 37-year-old mother of two prefers to buy at 7 p.m. on a Wednesday evening.
On a fundamental level, it’s best to keep your digital footprint light. Make sure you have secure passwords that aren’t just 1234 or your pet’s name. Most browsers have an “incognito” mode that won’t track your browser history. But truth be told, if someone really wants your history, they can get it.
If you’re more serious about hiding your footprints, look into encrypted services like Tor (www.torproject.com) that will protect against traffic analysis (browser history, instant messaging, etc.). It’s free and very good.
Transactions in bitcoins is a way to keep your footprint light in the marketplace.
And if you’re looking to make money on the trend, there are any number of companies that are at the forefront of cybersecurity (Palo Alto Networks, FireEye, Synamtec) and Big Data (Accenture, IBM, Teradata, Oracle).
–GS Early“
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime mapping and predictive policing, and criminal intelligence database management systems.)
Tag Archives: crime analytics
Best Practices – Geospatial Crime Mapping
Posted by Tyler Wood, Operations Manager at Crime Tech Solutions.
Crime mapping technology is a powerful and valuable tool for law enforcement. The ability to represent crime statistics visually – in a meaningful way – is helping police forces across America to analyze, understand, predict, and even prevent crime. It is, however, important to use caution when using such powerful tools, in order to prevent incorrect analyses of crime statistics that may hinder, rather than help, an investigation.
Specifically, there are a few key mistakes which should be avoided when utilizing this sort of predictive technology.
- Obviously, crime reporting should be thorough and detailed. Crime mapping technology takes a great many factors into consideration when developing a visual analysis of a certain area. The more detailed the input is, the more accurate the predictions and visualizations will be.
- Not every crime occurs at a specific street address. Certain crimes, like personal theft, may not be noticed until hours or even days after they occur, making it difficult to define an exact location at which the crime was committed. Analysts should take care to visualize each location in which it could have occurred.
- When developing a crime map of an area, analysts should take care to split the data between daytime and nighttime hours, as many areas have significantly different rates of crime depending on the time of day. If time is not taken into consideration, data can become skewed and law enforcement can develop a warped picture of the area.
- It is also important for analysts to consider other factors that affect crime reporting within a specific area. For example, petty crimes may be reported less often in lower-income neighborhoods. Care should be taken to consider the demographics and socioeconomic standings of the area being mapped in order to provide more context which can help analysts to more accurately predict and prevent crime.
- Combining, where possible, the functionality of link analysis into the crime mapping process brings powerful additional functionality. This ability to link, not only statistical, but entity-specific data is a potential game changer.
The role of crime mapping in the world of law enforcement is gaining popularity. Unfortunately, for many police departments, the cost of a full suite of software from category leader, ESRI is prohibitive. Still, there are options available… notably, CrimeMap Pro from Crime Tech Solutions.
___
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime mapping and predictive policing, and criminal intelligence database management systems.)
What is Crime Analysis?
Posted by Tyler Wood Crime Tech Solutions, your source for investigation software.
The information provided on this page comes primarily from Boba, R. (2008: Pages 3 through 6) Crime Analysis with Crime Mapping. For a full discussion of the crime analysis discipline, refer to the book which can be obtained through www.sagepub.com.
Over the past 20 years, many scholars have developed definitions of crime analysis. Although definitions of crime analysis differ in specifics, they share several common components: all agree that crime analysis supports the mission of the police agency, utilizes systematic methods and information, and provides information to a range of audiences. Thus, the following definition of crime analysis is used as the foundation of this initiative:
Crime analysis is the systematic study of crime and disorder problems as well as other police–related issues—including sociodemographic, spatial, and temporal factors—to assist the police in criminal apprehension, crime and disorder reduction, crime prevention, and evaluation.
Clarification of each aspect of this definition helps to demonstrate the various elements of crime analysis. Generally, to study means to inquire into, investigate, examine closely, and/or scrutinize information. Crime analysis, then, is the focused and systematic examination of crime and disorder problems as well as other police-related issues. Crime analysis is not haphazard or anecdotal; rather, it involves the application of social science data collection procedures, analytical methods, and statistical techniques.
More specifically, crime analysis employs both qualitative and quantitative data and methods. Crime analysts use qualitative data and methods when they examine non-numerical data for the purpose of discovering underlying meanings and patterns of relationships. The qualitative methods specific to crime analysis include field research (such as observing characteristics of locations) and content analysis (such as examining police report narratives). Crime analysts use quantitative data and methods when they conduct statistical analysis of numerical or categorical data. Although much of the work in crime analysis is quantitative, crime analysts use simple statistical methods, such as frequencies, percentages, means, and rates. Typical crime analysis tools include link analysis and crime mapping software.
The central focus of crime analysis is the study of crime (e.g., rape, robbery, and burglary); disorder problems (e.g., noise complaints, burglar alarms, and suspicious activity); and information related to the nature of incidents, offenders, and victims or targets of crime (targets refer to inanimate objects, such as buildings or property). Crime analysts also study other police-related operational issues, such as staffing needs and areas of police service. Even though this discipline is called crime analysis, it actually includes much more than just the examination of crime incidents.
Although many different characteristics of crime and disorder are relevant in crime analysis, the three most important kinds of information that crime analysts use are sociodemographic, spatial, and temporal. Sociodemographic information consists of the personal characteristics of individuals and groups, such as sex, race, income, age, and education. On an individual level, crime analysts use sociodemographic information to search for and identify crime suspects. On a broader level, they use such information to determine the characteristics of groups and how they relate to crime. For example, analysts may use sociodemographic information to answer the question, “Is there a white, male suspect, 30 to 35 years of age, with brown hair and brown eyes, to link to a particular robbery?” or “Can demographic characteristics explain why the people in one group are victimized more often than people in another group in a particular area?”
The spatial nature of crime and other police-related issues is central to understanding the nature of a problem. In recent years, improvements in computer technology and the availability of electronic data have facilitated a larger role for spatial analysis in crime analysis. Visual displays of crime locations (maps) and their relationship to other events and geographic features are essential to understanding the nature of crime and disorder. Recent developments in criminological theory have encouraged crime analysts to focus on geographic patterns of crime, by examining situations in which victims and offenders come together in time and space.
Finally, the temporal nature of crime, disorder, and other police-related issues is a major component of crime analysis. Crime analysts conduct several levels of temporal analysis, including (a) examination of long-term patterns in crime trends over several years, the seasonal nature of crime, and patterns by month; (b) examination of mid-length patterns, such as patterns by day of week and time of day; and (c) examination of short-term patterns, such as patterns by day of the week, time of day, or time between incidents within a particular crime series.
The final part of the crime analysis definition—”to assist the police in criminal apprehension, crime and disorder reduction, crime prevention, and evaluation” generally summarizes the purpose and goals of crime analysis. The primary purpose of crime analysis is to support (i.e., “assist”) the operations of a police department. Without police, crime analysis would not exist as it is defined here.
The first goal of crime analysis is to assist in criminal apprehension, given that this is a fundamental goal of the police. For instance, a detective may be investigating a robbery incident in which the perpetrator used a particular modus operandi (i.e., method of the crime). A crime analyst might assist the detective by searching a database of previous robberies for similar cases.
Another fundamental police goal is to prevent crime through methods other than apprehension. Thus, the second goal of crime analysis is to help identify and analyze crime and disorder problems as well as to develop crime prevention responses for those problems. For example, members of a police department may wish to conduct a residential burglary prevention campaign and would like to target their resources in areas with the largest residential burglary problem. A crime analyst can assist by conducting an analysis of residential burglary to examine how, when, and where the burglaries occurred along with which items were stolen. The analyst can then use this information to develop crime prevention suggestions, (such as closing and locking garage doors) for specific areas.
Many of the problems that police deal with or are asked to solve are not criminal in nature; rather, they are related to quality of life and disorder. Some examples include false burglar alarms, loud noise complaints, traffic control, and neighbor disputes. The third goal of crime analysis stems from the police objective to reduce crime and disorder. Crime analysts can assist police with these efforts by researching and analyzing problems such as suspicious activity, noise complaints, code violations, and trespass warnings. This research can provide officers with information they can use to address these issues before they become more serious criminal problems.
The final goal of crime analysis is to help with the evaluation of police efforts by determining the level of success of programs and initiatives implemented to control and prevent crime and disorder and measuring how effectively police organizations are run. In recent years, local police agencies have become increasingly interested in determining the effectiveness of their crime control and prevention programs and initiatives. For example, an evaluation might be conducted to determine the effectiveness of a two-month burglary surveillance or of a crime prevention program that has sought to implement crime prevention through environmental design (CPTED) principles within several apartment communities. Crime analysts also assist police departments in evaluating internal organizational procedures, such as resource allocation (i.e., how officers are assigned to patrol areas), realignment of geographic boundaries, the forecasting of staffing needs, and the development of performance measures. Police agencies keep such procedures under constant scrutiny in order to ensure that the agencies are running effectively.
In summary, the primary objective of crime analysis is to assist the police in reducing and preventing crime and disorder. Present cutting edge policing strategies, such as hotspots policing, problem-oriented policing, disorder policing, intelligence-led policing, and CompStat management strategies, are centered on directing crime prevention and crime reduction responses based on crime analysis results. Although crime analysis is recognized today as important by both the policing and the academic communities, it is a young discipline and is still being developed. Consequently, it is necessary to provide new and experienced crime analysts with training and assistance that improves their skills and provides them examples of best practices from around the country and the world. http://crimetechsolutions.com
Policing in my hometown (Winnipeg) gets smart
Posted by Douglas Wood, Crime Tech Solutions
As a native Winnipeg boy, this article in the Winnipeg Sun caught my attention…
The government of Manitoba, Canada won’t be making good on its 2011 election pledge to put an extra 50 cops on the streets to combat crime and keep Winnipeg neighborhoods safe.
That may seem odd for a city with the highest violent crime rate in the country. But as policing resources shift away from boots on the ground to more crime-analysis based law enforcement, it’s not more sworn officers the Winnipeg Police Service wants, it’s more resources for so-called smart policing strategies.
“The interest of Winnipeg Police Service is not in officers so much as in crime analysis and smart policing and they have a different approach,” Justice Minister Gord Mackintosh told a legislative committee on Monday. “They do not have an interest in just adding more.” The New Democratic Party promised voters during the last provincial election that it would fund 50 additional officers if re-elected. But four years later, the province has only funded 23 more officers. And there won’t be any new funding for more officers, said Mackintosh.
“The commitment was 50 more officers and we’re now at the equivalent of 23,” said Mackintosh. “The city has requested that the election commitment not be implemented as enunciated during the campaign.” It’s a major shift from years past when provincial parties regularly pledged to put more cops on the street by directly funding the Winnipeg Police Service. The former government was the first to make the promise in 1995 when it promised 40 more police officers for Winnipeg.
The province now directly pays for the salaries and benefits of 172 Winnipeg officers, according to a 2014 report.
And while that funding is expected to continue, the city doesn’t want more money for cops. They want it to help fund other aspects of policing, including more preventative measures, said Mackintosh.
“This is a different approach that is gaining momentum not just here in Winnipeg but in other jurisdictions across the continent,” said Mackintosh. “It’s really about hot spot policing now, it’s about data analysis, looking at the types of offences where they occur, the time of day.” Winnipeg police board chairman Coun. Scott Gillingham confirmed the city isn’t looking for more funding to expand the police complement further. He says police are looking to hire more crime analysts, which can be civilians, not more cops.
“The opportunity and the need would be to focus on preventative measures through things like the smart policing initiative (and) intelligence-led policing,” said Gillingham.
What police also need, though, is more help with the additional workload they’ve taken on as they deal increasingly with mental health patients, Child and Family Services cases and soaring domestic abuse calls.
Police may be moving towards a more data-based approach to law enforcement, but they’ve also become a service of last resort for a growing number of tough social service cases, including tracking down chronic runaway wards of the state on a regular basis.
Which means they’re going to need a lot more support from provincial agencies to pick up some of that slack.
Winnipeg police may not need more boots on the ground. After all, Winnipeg does have the most cops per capita of any Canadian city, and has for some time.
But the province is going to have to figure out how to better manage the social service cases that are landing increasingly at the doorstep of police.
Crime Mapping. More than Law Enforcement?
Posted by Crime Tech Solutions
Geographic information systems aren’t exactly new. Drugstore chain Walgreens has used the technology for close to 15 years for market planning.
More recently, however, the company has endowed that visual information with location-specific data—and published far more broadly, so that store managers and its corporate real estate team can use it for planning.
The system, called WalMap, can be used to visualize local community trends. A spike in flu medication prescriptions could help store managers decide earlier to order more vaccine, preventing shortages. Walgreens sales executives can reference trends in supplier conversations. Plus, the interactive maps can be used by the corporate planning team to determine the best place for a new store, based on community demographics, competitor information, and sales trend information. They can even be viewed on an iPad.
“Ten years, our teams had to print out a map and take it with them. Now they can bring their mobile device, and have access to updated sales, demographics and other targeted information,” said Jillian Elder, director of enterprise location intelligence for Walgreens.
Occasionally the maps serve a higher purpose. Managers in Texas in September were able to help local authorities predict the next targets for a local crime spree. “With some of our visualizations, we were able to put a stop to this,” Elder said.
The resource houses millions of maps available to companies that want to overlay proprietary data with the most up-to-data public information about specific locations. There are literally millions of maps published there. Most internal teams have access to basic information; Elder’s team created a special addition specifically for Walgreens’ real estate, strategy, and mergers and acquisition teams.
As of the latest FAQ information on its corporate web site, Walgreens generated more than $76 billion in sales last year across more than 8,300 locations across the United States and Puerto Rico.
Professor urges increased use of technology in fighting crime
Posted by Crime Tech Solutions
This article originally appeared HERE in Jamaica Observer. It’s an interesting read…
A University of the West Indies (UWI) professor is calling for the increased use of technology by developing countries, including Jamaica, to assist in the fight against crime.
Professor Evan Duggan, who is Dean of the Faculty of Social Sciences, said there have been “amazing advancements” in information and communications technologies (ICT), over the past six decades, which offer great potential for improving security strategies.
The academic, who was addressing a recent National Security Policy Seminar at UWI’s Regional Headquarters, located on the Mona campus, pointed to Kenya as a developing country that has employed the use of inexpensive technology in its crime fighting initiatives.
“Potential applications and innovations have been implemented through the use of powerful but not very expensive technologies that have allowed law enforcers to make enormous leaps in criminal intelligence, crime analysis, emergency response and policing,” he said.
He pointed to the use of a variety of mobile apps for crime prevention and reporting, web facilities, and citizen portals for the reporting of criminal activity.
Professor Duggan said that in order for Jamaica to realise the full benefit of technology in crime fighting, national security stakeholders need to engage local application developers.
“I would enjoin our stakeholders to engage the extremely creative Jamaican application developers, who now produce high quality apps for a variety of mobile and other platforms. I recommend interventions to assist in helping these groups to cohere into a unified force that is more than capable of supplying the applications we need,” he urged.
The UWI Professor pointed to the Mona Geoinformatic Institute as one entity that has been assisting in fighting crime, through analyses of crime data as well as three dimensional (3D) reconstruction of crime scenes; and mapping jurisdictional boundaries for police posts and divisions, as well as the movement of major gangs across the country.
In the meantime, Professor Duggan called for “purposeful activism” in the fight against crime and lawlessness which, he said, are “serious deterrents to economic development and national growth prospects” and could derail the national vision of developed country status by 2030.
“In the current global landscape where security challenges are proliferating across borders and have taken on multifaceted physiognomies, all hands on deck are vital,” he stressed.
“We need to …consolidate pockets of research excellence in this area …to provide the kinds of insight that will lead to more fruitful and productive collaborative engagements that are required to help us better understand the security challenges and threats from crime in order to better inform our national security architecture and direction,” he added.
What is Link / Social Network Analysis?
Posted by Crime Tech Solutions
Some linkage data, such as telephone call detail records, may be simple but voluminous, with uniform node and link types and a great deal of regularity. Other data, such as law enforcement data, may be extremely rich and varied, though sparse, with elements possessing many attributes and confidence values that may change over time.
Various techniques are appropriate for distinct problems. For example, heuristic, localized methods might be appropriate for matching known patterns to a network of financial transactions in a criminal investigation. Efficient global search strategies, on the other hand, might be best for finding centrality or severability in a telephone network.
Link analysis can be broken down into two components—link generation, and utilization of the resulting linkage graph.
Link Generation
Link generation is the process of computing the links, link attributes and node attributes. There are several different ways to define links. The different approaches yield very different linkage graphs. A key aspect in defining a link analysis is deciding which representation to use.
Explicit Links
A link may be created between the nodes corresponding to each pair of entities in a transaction. For example, with a call detail record, a link is created between the originating telephone number and the destination telephone number. This is referred to as an explicit link.
Aggregate Links
A single link may be created from multiple transactions. For example, a single link could represent all telephone calls between two parties, and a link attribute might be the number of calls represented. Thus, several explicit links may be collapsed into a single aggregate link.
Inferred Relationships
Links may also be created between pairs of nodes based on inferred strengths of relationships between them. These are sometimes referred to as soft links, association links, or co-occurrence links. Classes of algorithms for these computations include association rules, Bayesian belief networks and context vectors. For example, a link may be created between any pair of nodes whose context vectors lie within a certain radius of one another. Typically, one attribute of such a link is the strength of the relationship it represents. Time is a key feature that offers an opportunity to uncover linkages that might be missed by more typical data analysis approaches. For example, suppose a temporal analysis of wire transfer records indicates that a transfer from account A to person X at one bank is temporally proximate to a transfer from account B to person Y at another bank. This yields an inferred link between accounts A and B. If other aspects of the accounts or transactions are also suspicious, they may be flagged for additional scrutiny for possible money laundering activity.
A specific instance of inferred relationships is identifying two nodes that may actually correspond to the same physical entity, such as a person or an account. Link analysis includes mechanisms for collapsing these to a single node. Typically, the analyst creates rules or selects parameters specifying in which instances to merge nodes in this fashion.
Utilization
Once a linkage graph, including the link and node attributes, has been defined, it can be browsed, searched or used to create variables as inputs to a decision system.
Visualization
In visualizing linking graphs, each node is represented as an icon, and each link is represented as a line or an arrow between two nodes. The node and link attributes may be displayed next to the items or accessed via mouse actions. Different icon types represent different entity types. Similarly, link attributes determine the link representation (line strength, line color, arrowhead, etc.).
Standard graphs include spoke and wheel, peacock, group, hierarchy and mesh. An analytic component of the visualization is the automatic positioning of the nodes on the screen, i.e., the projection of the graph onto a plane. Different algorithms position the nodes based on the strength of the links between nodes or to agglomerate the nodes into groups of the same kind. Once displayed, the user typically has the ability to move nodes, modify node and link attributes, zoom in, collapse, highlight, hide or delete portions of the graph.
Variable Creation
Link analysis can append new fields to existing records or create entirely new data sets for subsequent modeling stages in a decision system. For example, a new variable for a customer might be the total number of email addresses and credit card numbers linked to that customer.
Search
Link analysis query mechanisms include retrieving nodes and links matching specified criteria, such as node and link attributes, as well as search by example to find more nodes that are similar to the specified example node.
A more complex task is similarity search, also called clustering. Here, the objective is to find groups of similar nodes. These may actually be multiple instances of the same physical entity, such as a single individual using multiple accounts in a similar fashion.
Network Analysis
Network analysis is the search for parts of the linkage graph that play particular roles. It is used to build more robust communication networks and to combat organized crime. This exploration revolves around questions such as:
- Which nodes are key or central to the network?
- Which links can be severed or strengthened to most effectively impede or enhance the operation of the network?
- Can the existence of undetected links or nodes be inferred from the known data?
- Are there similarities in the structure of subparts of the network that can indicate an underlying relationship (e.g., modus operandi)?
- What are the relevant sub-networks within a much larger network?
- What data model and level of aggregation best reveal certain types of links and sub-networks?
- What types of structured groups of entities occur in the data set?
Applications
Link analysis tools such as those provided by Crime Tech Solutions are increasingly used in law enforcement investigations, detecting terrorist threats, fraud detection, detecting money laundering, telecommunications network analysis, classifying web pages, analyzing transportation routes, pharmaceuticals research, epidemiology, detecting nuclear proliferation and a host of other specialized applications. For example, in the case of money laundering, the entities might include people, bank accounts and businesses, and the transactions might include wire transfers, checks and cash deposits. Exploring relationships among these different objects helps expose networks of activity, both legal and illegal.
What is Geospatial Crime Mapping?
Posted by Crime Tech Solutions with information gathered from Wikipedia.
Here’s a fact: Any understanding of where and why crimes occur can help prevent future crimes.
Mapping crime can help law enforcement protect citizens more effectively. Simple maps that display the locations where crimes or concentrations of crimes have occurred can be used to help direct patrols to places they are most needed. Policymakers can use more complex maps to observe trends in criminal activity; such maps can prove invaluable in solving criminal cases. For example, detectives can use maps to better understand the hunting patterns of serial criminals and to hypothesize where these offenders might live.
Products like CrimeMap Pro™ from Crime Tech Solutions are used by analysts in law enforcement agencies to map, visualize, and analyze crime incident patterns. It is a key component of crime analysis and the CompStat policing strategy. Mapping crime, using Geographic Information Systems (GIS), allows crime analysts to identify crime hot spots, along with other trends and patterns.
Crime analysts use crime mapping and analysis to help law enforcement management (e.g. the police chief) to make better decisions, target resources, and formulate strategies, as well as for tactical analysis (e.g. crime forecasting, geographic profiling). New York City does this through the CompStat approach, though that way of thinking deals more with the short term. There are other, related approaches with terms including Information-led policing, Intelligence-led policing, Problem-oriented policing, and Community policing. In some law enforcement agencies, crime analysts work in civilian positions, while in other agencies, crime analysts are sworn officers.
From a research and policy perspective, crime mapping is used to understand patterns of incarceration and recidivism, help target resources and programs, evaluate crime prevention or crime reduction programs (e.g. Project Safe Neighborhoods, Weed & Seed and as proposed in Fixing Broken Windows), and further understanding of causes of crime.
The boom of internet technologies, particularly web-based geographic information system (GIS) technologies, is opening new opportunities for use of crime mapping to support crime prevention. Research indicates that the functions provided in web-based crime mapping are less than in most traditional crime mapping software. In conclusion, existing works of web-based crime mapping focus on supporting community policing rather than analytical functions such as pattern analysis and prediction.
What the heck do Crime Analysts do?
Posted by Crime Tech Solutions – Your source for analytics in the fight against crime and fraud.
NOTE: This great article is property of International Association of Crime Analysts and is posted in it’s original format HERE…
What do Crime Analysts Do?
One: Finding Series, Patterns, Trends, and Hot Spots as They Happen
Crime analysts review all police reports every day with the goal of identifying patterns as they emerge. If a burglar starts targeting drugs stores in your jurisdiction, a crime analyst will let you know on the second incident. If domestic violence becomes a recurring problem in one family, an analyst will catch it. If your city, town, or county faces any emerging problem—youth disorder on a particular street, street robbery hot spots, new trends in fraud and forgery, a pattern of items being stolen from cars—your analyst can identify it and alert you about it as soon as possible.
Analyses of these trends, patterns, and hot spots provide you with the who, what, when, where, how, and why of emerging crime in your community. You can use this information to develop effective tactics and strategies, interceding as soon as possible, preventing victimization, and reducing crime.
Two: Researching and Analyzing Long-Term Problems
Crime analysis isn’t just about immediate patterns and series:analysts also look at the long-term problems that every police department faces. From a park that has been a drug-dealing hot spot for 20 years to a street that has a high number of car accidents to ongoing issues with crime and disorder at budget motels, a crime analyst can take it apart, explore its dimensions, and help the police department come up with long-term solutions.
Three: Providing Information on Demand
How often have you been frustrated getting the information you need from your records management or CAD system? Crime analysts know how to extract data from records systems, ask questions of it, and turn it into useful information. They know how to get data from other sources, and how to work with it. They know how to create charts, maps, graphs, tables, and other visual products.
Whether you need a list of all the incidents of youth violence over five years, or a chart showing trends in OUI arrests, or some statistics on motor vehicle citations, or a map showing an upcoming parade route, or an estimate of how many officers you’ll need in five years if current population trends continue, a trained crime analyst can put it together quickly and clearly.
Four: Developing and Linking Local Intelligence
Since September 11, 2001, we hear a lot about the need for intelligence. But what is it? And what does it have to do with local police departments?
Intelligence describes special information about criminals and criminal organizations: their goals, their activities, their chains of command, how money and goods flow through them, what they’re planning, and so on. Analyzing intelligence data on national and international problems is generally the responsibility of national and international agencies, but local police departments and local analysts play an important role.
First, as information synthesizers, crime analysts often know when local information or intelligence fits with state, national, or international intelligence. If the FBI issues a bulletin stating that terrorists are using forged passports from Belgium, your analyst will know to pay special attention when one of your reports mentions a Belgian passport. If a state agency issues a report on motorcycle gangs, your analyst can integrate that with your own police reports. In the post-September 11 world, you’re bombarded with information from multiple agencies at multiple levels; with a crime analyst, you have someone who can sift through this information and extract what’s relevant to your agency.
Second, your crime analyst can apply criminal intelligence analysis tactics to your local problems. Do you need a link chart showing the relationships between members of a local street gang? Or a carefully-crafted timeline for a court presentation? An analyst is trained in such techniques.
Five: Making Your Department Look Good
A crime analyst makes you and your agency look good to the public and to local government officials. You’re fully informed about a crime pattern before the press calls about it. The analyses, statistics, and charts on your web site and in printed publications convey that you are on top of crime and disorder. And when someone wants some information—whether a town selectman looking for statistics on juvenile liquor parties or a reporter looking for the top accident hot spots—you can provide it completely and quickly.
Crime analysts can also enhance the things you already do. Their desktop publishing skills can breathe new life into your reports, newsletters, and alerts; their graphing and charting skills can spice up your community presentations and budget requests; and their overall analysis and communications skills means that you always have someone on hand to explain crime and disorder—whether in meetings, interviews, or formal presentations—to the members of the community you serve.
IBM Crime Analytics: Missing the mark? CTS Hits the bullseye!
Posted by Crime Tech Solutions – Your source for analytics in the fight against crime and fraud.
September 7, 2015. IBM announced this week a major update to its IBM i2 Safer Planet intelligence portfolio that includes a major overhaul of the widely used Analyst’s Notebook product. The product, which has become increasingly abandoned by its user base over the past five years, is now being positioned as ‘slicker‘ than previous versions.
IBM suggests that the new version scales from one to 1,000 users and can ingest petabytes of information to visualize. (A single petabyte roughly translates to 20,000,000 four-drawer filing cabinets completely filled with text).
That’s a lot of data. Seems to me that analysts are already inundated with data… now they need more?
This all begs the question: “Where is IBM headed with this product?”
The evidence seems to point to the fact that IBM wants this suite of products to compete head-to-head with money-raising machine and media darling Palantir Technologies. If I’m IBM, that makes sense. Palantir has been eating Big Blue’s lunch for a few years now, particularly at the lucrative US Federal market level. Worse yet, for IBM i2, is the recent news of a new competitor with even more powerful technology.
If I’m a crime or fraud analyst, however, I have to view this as IBM moving further and further away from my reality.
The reality? Nobody has ever yelled “Help! I’ve been robbed. Call the petabytes of ‘slick’ data!” No, this tiring ‘big data’ discussion is not really part of the day to day work for the vast majority of analysts. Smart people using appropriate data with intuitive and flexible crime technology solutions… that’s the reality for most of us.
So, as IBM moves their market-leading tool higher and higher into the stratosphere, where does the industry turn for more practical desktop solutions with realistic pricing? For more and more customers around the world, the answer is a crime and fraud link analytics tool from Crime Tech Solutions.
No, it won’t ingest 20,000,000 four-drawer filing cabinets of data, and it’s more ‘efficient‘ than ‘slick‘. Still, the product has been around for decades as a strong competitor to Analysts Notebook, and is well-supported by a network of strategic partners around the world. Importantly, it is the only American made and supported alternative. Period. It’s also, seemingly, the last man standing in the market for efficient and cost-effective tools that can be used by real people doing their real jobs.