Professional Documents
Culture Documents
Crime and Inteligence Analysis
Crime and Inteligence Analysis
Intelligence
Analysis
An Integrated
Real-Time Approach
Crime and
Intelligence
Analysis
An Integrated
Real-Time Approach
Glenn Grana
Rochester Crime Analysis Center
New York, New York, USA
James Windell
Wayne State University
Detroit, MIchigan, USA
Oakland University
Rochester, Michigan, USA
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Acknowledgments xvii
IntroductIon xix
vii
viii C o n t en t s
chAPter 5 P o l I c e I n v e s t I g At I o n s In the tw e n t y - F I r s t
c e ntu ry 99
Chapter Outline 99
Learning Objectives for Chapter 5 99
Introduction 100
Rules of Procedure in Collecting Evidence 101
Search and Seizure 103
x C o n t en t s
PA r t IV c r I m e A n A lys I s
c h A P t e r 10 h I s t o r y And ty P e s oF c r I m e A n A ly s I s 19 5
Chapter Outline 195
Learning Objectives for Chapter 10 195
Introduction 196
Classification of Crime Analysis 204
Tactical Crime Analysis 205
Goals of Tactical Crime Analysis 206
The Tactical Crime Analyst Working in Real Time 206
Tactical Analysis, Crisis Management, and Negotiation 208
What the Tactical Analyst Needs to Understand 209
Crisis Management Protocol 209
Tactical Analyst Training Is Crucial 210
Hostage/Crisis Negotiator 211
Tactical Analyst in a Crisis Situation 211
Training of the Tactical Crime Analyst 212
Mutual Understanding 213
Case Study 215
Strategic Crime Analysis 216
Goals of Strategic Crime Analysis 217
Administrative Crime Analysis 217
Examples of Administrative Crime Analysis 218
Police Operations Analysis 218
Four Types of Crime Analysis 219
Questions for Discussion 219
C o n t en t s x iii
c h A P t e r 13 s t r At e g I c c r I m e A n A ly s I s 283
Chapter Outline 283
Learning Objectives for Chapter 13 283
Introduction 284
Focus in Strategic Crime Analysis 284
Long-Range Perspective of Strategic Crime Analysis 286
Crime Trends Analyzed by Strategic Crime Analysis 286
Data That Strategic Crime Analysts Examine 287
Qualitative versus Quantitative Research 288
Qualitative Methods 289
Field Research 289
Content Analysis 291
Interviews 291
C o n t en t s xv
Surveys 292
Focus Groups 293
Environmental Assessment 294
After Identifying Crime Trends, Then What? 294
Recommendations for Crime Trend Solutions 295
Using the Problem Analysis Triangle 300
Formulating Hypotheses 302
Final Report 304
Writing and Distributing Reports 308
Final Goal of Crime Analysis 308
Questions for Discussion 309
Important Terms 309
Study Guide Questions 311
References 312
c h A P t e r 14 A d m I n I s t r At I v e c r I m e A n A ly s I s 315
Chapter Outline 315
Learning Objectives for Chapter 14 315
Introduction 316
Why Is It Called Administrative Crime Analysis? 316
Are There Areas of Administrative Crime Analysis That
Have Little to Do with Analysis? 317
What Reports Do Administrative Crime Analysts Present? 317
Administrative Crime Analysis: Low-Priority Analysis? 319
How Administrative Crime Analysts Gather Data 319
Crime Mapping and Administrative Crime Analysis 320
Using the Internet 321
Next Chapter 323
Questions for Discussion 323
Important Terms 323
Study Guide Questions 323
References 324
c h A P t e r 15 P o l I c e o P e r At I o n s c r I m e A n A ly s I s 3 27
Chapter Outline 327
Learning Objectives for Chapter 15 327
Introduction 329
What Techniques and Methods Are Used by Operations
Analysis? 329
What Kinds of Recommendations Do Operations Analysts
Make? 331
Examples of Recommendations 331
Questions for Discussion 334
Important Terms 334
Study Guide Questions 335
References 336
xvi C o n t en t s
PolIcIng 339
Chapter Outline 339
Learning Objectives for Chapter 16 339
Introduction 340
The Need for Crime Analysts 341
What Makes for a Good Crime Analyst? 342
Crime Analyst Qualifications and Job Descriptions 343
Education for Crime Analysts 352
Where to Go for More Information about
Crime Analyst Jobs 353
Technology and the Future of Policing 353
Challenges to Integrating Crime Analysis into Policing 355
Questions for Discussion 356
Important Terms 357
Study Guide Questions 357
References 358
Index 3 61
Acknowledgments
While there are several people who deserve credit and recognition
for their encouragement and support during the research and writing
phases of this book, this book could not have been written without
the years Glenn Grana spent as a Monroe County sheriff’s deputy and
as an undercover narcotics investigator.
It was during his years working in narcotics that he was taught
the craft of gathering, analyzing, and disseminating intelligence.
The most important lessons he learned had to do with taking basic
information and creating actionable intelligence. For most of his years
as a narcotics investigator, intelligence and crime analysis were the
greatest weapons he utilized to help dismantle large-scale narcotic
organizations.
While working as a police advisor in both Afghanistan and Iraq,
Glenn learned the true value of intelligence. It was the intelligence
he and his cohorts were supplied with that helped them to survive
the rigorous training missions. His work in the field of crime and
intelligence analysis continued in earnest when he returned to the
United States and became tactical supervisor for the New York State
Department of Criminal Justice Services Crime Analysis Center in
Rochester, New York. At the Crime Analysis Center, Glenn and his
colleagues broke new ground in the emerging field of tactical real-
time crime and intelligence investigative work.
x vii
x viii AC k n o w l ed g m en t s
In the hit CBS crime show Person of Interest, which debuted in 2011,
the two heroes—one a former Central Intelligence Agency agent and
the other a billionaire technology genius—work together using the
ubiquitous surveillance system in New York City to try to stop violent
crime. It’s referred to by some as a science fiction cop show. But the
use of advanced technology for crime analysis in almost every major
police department in the United States may surpass what’s depicted
on TV crime dramas such as Person of Interest. Real-time crime cen-
ters (RTCCs) are a vital aspect of intelligent policing. Crime analysis
is no longer the stuff of science fiction. It’s real.
In RTCCs, crime analysts analyze data at their disposal and feed
essential and critical information to police officers and detectives who
are on the street working criminal cases. By drawing on millions of
bytes of data and knowing what is critical to pass on to the officers
in the field, the analysts in the RTCC play a major role in solving
crime, preventing terrorism and other criminal acts, and protecting
the safety of both citizens and officers. As a result, crime analysts
now play a powerful and essential role in twenty-first-century polic-
ing. But analysts need to be trained to do their jobs. Their jobs include
• Reviewing all police reports daily with the goal of identifying
patterns.
xix
xx In t r o d u C tI o n
This book is divided into five parts. Part I offers background on crime and
criminal justice. The first three chapters review various fundamentals
x xiv In t r o d u C tI o n
Since this book was written as a textbook for criminal justice instruc-
tors and students, each chapter has the needs of both teachers and
students in mind. Each chapter starts with an outline of the chapter
and a list of objectives for students.
The chapters are written so that students will find the material easy
to follow, with headings that clearly show what will follow. But the
chapter material is organized so that comprehension is easier. Case
studies are included in many chapters to offer real-life examples of
how the principles being taught can be applied.
At the end of each chapter are questions for discussion. These ques-
tions were selected to help students engage in critical thinking and
In t r o d u C tI o n xxv
Chapter Outline
3
4 C rIm e A n d In t el lI g en C e A n A lysIs
where, and why of this potential deadly scenario. But who is respon-
sible to piece together the investigative puzzle?
Clearly, aggressive real-time data mining and rapid dissemination
of intelligence is critical to assist the police as the case continues to
unfold. The answer, as you will learn in this book, is that it is the tacti-
cal crime analyst who is responsible for providing enough information
for a disaster to be averted.
In law enforcement, success can be measured in many different
ways. Often, and particularly in this elementary school crisis, success
may be measured simply in terms of the number of lives saved. Thanks
to the tactical crime analyst working this case in the Rochester, New
York, real-time crime center, the crisis was successfully resolved—and
hundreds of young lives were saved.
But how the tactical crime analyst accomplished this success was
entirely dependent on the process that analyst followed.
As a crime analyst, the success you have on your job rests entirely
on the process that you follow. The most critical stage in this process
is the analytical stage—the stage in which intelligence is gathered.
Then, that intelligence is disseminated to law enforcement. But in this
case only priority intelligence was relayed to the police, who in turned
transmitted that intelligence to officers at the scene.
Analysis has always played a pivotal role in the success of crisis
management incidents. Even as critical pieces of information are dis-
covered during the initial collection and verification process, what can
be lost, at times, are crucial pieces of information that may lead to
a better understanding of the suspect’s mindset, his or her motives,
and—as happened in Rochester, New York—a peaceful resolution.
The use of a real-time crime analyst, one who can rapidly analyze
information and intelligence obtained from multiple data sources
while applying his or her understanding of the theories and practices
that law enforcement practitioners are trained in, can help to create
a unique analytical process. The process that you will learn about in
this book will help to establish—and solidify—the credibility and
importance of the tactical crime analyst working in a real-time crime
environment.
But before tactical crime analysts can contribute to these types
of dynamic investigations, they need to be able to draw upon train-
ing and experience in order to assist them with their critical need for
t he C rIm e P r o b l em 5
Introduction
All of five of these incidents are real. You may have heard about one
or more of them, but probably not all five. Crime happens every day
in this country. Some of it is relatively minor, such as the laptop com-
puter and guitar thefts in Eugene, Oregon. Some of it is major, such
as the shooting deaths of Renisha McBride and Michael Brown, the
Boston Marathon bombing, and the abuse and murder of children in
Mohave Valley, Arizona.
Because we see and hear about crimes on televised news shows and
read about them in our daily newspapers, we are all very much aware
that crime exists. But you may have been the victim of a crime your-
self, or you may know someone who has been a crime victim. And
while you may be fortunate to simply have heard about what has hap-
pened to other people, you may still be very concerned about crime.
You may even have voiced your opinion—in a conversation or on your
own blog—about the “crime problem” in the United States.
In Chapter 2, we will discuss how much crime actually occurs in
this country, but in this chapter, we address this fundamental question:
is there a crime problem in this country?
t he C rIm e P r o b l em 7
This is a question that can be viewed from any one of several perspectives.
First, let’s start by quoting President Lyndon B. Johnson’s opening
remarks from his address to a meeting with a group of U.S. governors
on the problems of crime and law enforcement:
The fact of crime and the fear of crime are common across our land. For
it has an unrelenting pace. It exacts heavy costs in human suffering and
in financial losses to both individuals and communities. It blocks the
achievement of a good life for all our people.
America is not the only country with crime, nor the only one con-
cerned about crime. Every country in the world has crime. They
always have and, perhaps, always will. But because of the pervasive
problem of crime in all societies, every society has had to develop
some kind of system to deal with and manage crime. The history of
mankind demonstrates that when people live together in societies and
communities, there is a need for rules and laws. And those are needed
because inevitably there will be those individuals who will violate the
rules, laws, and norms of society. Because there will always be viola-
tors of the established norms of a community, there must be a system
in place to deal with these offenders.
We know, for instance, that criminal justice systems were in
place several thousand years ago. In the time of Hammurabi, the
ruler of Mesopotamia, in what is modern-day Iraq, about 2100 BC,
Hammurabi enacted a set of laws. This set of laws was called the
Code of Hammurabi, and the laws were carved in rock columns and
preserved in a temple. Hammurabi’s code indicated what behaviors
were violations of laws and the corresponding punishment for break-
ing those laws (Oliver and Hilgenberg, 2006).
A few hundred years later, Athenian law in Athens, Greece, devel-
oped the concept that a “private harm” could also be a harm against
all society (Gargarin, 2002). In the sixth century BC, the Athenians
created a system of “popular courts” in order to ensure that every citi-
zen was granted certain rights and had the ability to appeal decisions
(Shelden, 2001). Then, in 452 AD, the Romans codified their laws
when the Roman Tribune requested that the laws of Rome be codi-
fied and written into 10 tables. Later, two additional tables were added
and these became known as the Roman Twelve Tables. These tables
spell out various types of crimes, such as murder, bribery, sorcery, and
theft. These particular crimes were all punishable by execution, which
could be by crucifixion, drowning, beating to death, burning alive, or
impaling (Farrington, 2000).
Since these early attempts to codify laws, there have been attempts
to inform citizens of the laws and to bring about fair and impar-
tial punishments. Of course, when we look back at the criminal jus-
tice systems of European countries from the Middle Ages until the
t he C rIm e P r o b l em 11
“the criminal can, and does, choose his way of life freely in his quest
for power, control and excitement” (Barger, 1978, p. 1).
Therefore, if you were to subscribe to Yochelson and Samenow’s
theory, then fear of any form of repercussions would play no part in
the decision-making process of why an individual chooses to commit
crime. The probability of being caught and punished is a nonfactor,
as Mel Barger contends in his article “Crime: The Unsolved Problem”
when he writes, “The Criminal, at the time of his lawlessness, is one
of the few happy or contented men to be found among us” (Barger,
1978, p. 1).
When comparing the differing opinions of theorists from Beccaria
to Yochelson and Samenow, and even more recent crime theorists, it
can be argued that when examining what motivates a person to carry
out a criminal act, a pattern of behavior can also be identified. Pattern
recognition is a critical skill set needed by crime and intelligence ana-
lysts in order to be successful when connecting a modus operandi (a
method of operation) to crimes of a similar nature.
As we will discuss in upcoming chapters, the critical thinking and
the investigative skill sets of the crime analyst compared with those
of the typical law enforcement professional may differ somewhat in
approach, but both are based on a theory of what causes people to
commit crimes. For law enforcement, the investigative mindset often is
built upon various criminological theories that focus heavily on exam-
ining the motivations of the offender. The crime and intelligence ana-
lyst, on the other hand, takes the approach of examining the offenders’
behavior. This analytical approach is based partly on the criminal
event perspective—a nontraditional theory as to why people commit
crime, proposed by Vincent Sacco and Leslie Kennedy (2002). These
authors contend that the criminal event perspective is “not a theory
of criminality, but rather a road map to understanding crime” (Sacco
and Kennedy, 2010, p. 799). This perspective will be discussed in more
detail in later chapters.
we are not ready to put forth that theory. However, we can intro-
duce you to the analysis triangle. This triangle will be referred to
throughout this book, and it will serve as one of the main illustra-
tions that suggests a theory for linking crime and criminal behavior
to external factors, and the triangle will be important when discuss-
ing the significance of data mining and connecting critical pieces of
intelligence together (Figure 1.1).
In this analysis triangle, a theory is implicated in the layers of the
triangle. The innermost triangle represents the problem facing the
crime analyst. To begin to analyze the problem, the crime analyst
evaluates and assesses the criminal offender, along with the place
(or location) of the criminal offense and the target or victim of that
offense. The outer triangle indicates that there is also a handler, a
manager, and a guardian in each offense; each plays a role in the crim-
inal event. Also, each has a set of tools with which they facilitate a
criminal offense, prevent a criminal offense, or provide a solution or
intelligence regarding a criminal offense.
If you don’t understand this analysis triangle at this juncture, don’t
worry about it. As you study this book, its importance in crime anal-
ysis will become clearer. However, at this point, it is important to
introduce some critical terms and concepts that will be used through-
out this book.
Ma
ler
nd
na
er
Pla
d
Ha
ger
en
ce
Off
Problem
Target/victim
Guardian
This book is about how crime analysts work and what they need to
know in order to provide critical and vital information to police offi-
cers. Today, technology is advanced enough to allow crime analysts
to process and analyze the data at their disposal and feed essential
and critical information to police officers and detectives who are on
the street working criminal cases. By drawing on millions of bytes of
data and knowing what is critical to pass on to the officers in the field,
the analyst in the real-time crime center plays a major role in solving
crime, preventing terrorism and other criminal acts, and protecting
the safety of both citizens and officers.
As a result, crime analysts now play a powerful and essential role
in twenty-first-century policing. But in order to do this job, a crime
analyst must be properly trained. The job of the crime analyst is not
easy. It takes more than a knowledge of computers to do all that crime
t he C rIm e P r o b l em 15
Perhaps most importantly, the crime analyst has to serve the needs
of the police officers in the field for immediate information and data
that will enable them to respond effectively to various situations,
such as
• Routine domestic violence calls
• Shots fired calls
• Assault, robbery, and burglary-in-progress calls
• Active shooter, SWAT, and hostage situations
It is not just a matter of the crime analyst transmitting raw data
to officers in the field in these kinds of situations. Instead, these
common, but often dangerous situations require a workup from a
tactical crime analyst. A workup is a detailed intelligence product
focusing on individuals, locations, and many other critical factors
that help the responding officer or investigator to be more fully
aware of what he or she is likely to encounter. The skilled tactical
crime analyst can provide an intelligence-based workup that may
include
• Photos
• Social media posts
• Outstanding warrants
• Probation or parole GPS monitoring
• Gang intelligence, which can involve known associates, arrest
history, and prior weapons possession
16 C rIm e A n d In t el lI g en C e A n A lysIs
Important Terms
References
Barger, M. (1978). Crime: The unsolved problem. Available at http://melbarger.
com/Welcome.html.
Crime experts question NOPD stats that paint New Orleans as a safe city
with a murder problem. (2013). The Times-Picayune, May 18. Available
at http://www.nola.com/crime/index.ssf/2013/05/new_orleans_crime_
stats_analys.html.
Farrington, K. (2000). History of Punishment and Torture: A Journey through the
Dark Side of Justice. London: Hamlyn.
Friedman, L. (1993). Crime and Punishment in American History. New York:
Basic Books.
Gargarin, M. (2002). Antiphon the Athenian: Oratory, Law and Justice in the Age
of the Sophists. Austin: University of Texas Press.
Hunter, G. (2015). Detroit less violent in 2014, police data show.
Detroit News, January 4. Available at http://www.detroit-
news.com/stor y/news/local/metro-detroit/2015/01/03/
violent-crimes-decline-detroit/21237927/.
Johnson, L.B. (1966). Statement by the president at a meeting with a group
of governors on problems of crime and law enforcement. September 29.
Available at http://www.presidency.ucsb.edu/ws/?pid=27894.
McCarthy, J. (2015). Most Americans still see crime up over last year. Gallup
Poll. Available at http://www.gallup.com/poll/179546/americans-crime-
last-year.aspx.
National Drug Control Policy. (2014). A drug policy for the 21st century.
Available at https://www.whitehouse.gov/ondcp/drugpolicyreform.
Oliver, W.M., and Hilgenberg, J.F. (2006). A History of Crime and Criminal
Justice in America. Boston: Allyn and Bacon.
President’s Commission on Law Enforcement. (2005). The Challenge of Crime
in a Free Society. University Press of Honolulu, HI: University Press of
the Pacific.
Press Office: City of New York. (2014). De Blasio administration launches
$130 million plan to reduce crime, reduce number of people with
behavioral and mental health issues behind bars. Available at http://
www1.nyc.gov/office-of-the-mayor/news/537-14/de-blasio-
administration-launches-130-million-plan-reduce-crime-reduce-
number-people-with.
t he C rIm e P r o b l em 19
Sacco, V., and Kennedy, L. (2010). The criminal event perspective. In F.T. Cullen
and P. Wilcox (eds.), Encyclopedia of Criminological Theory. Thousand
Oaks, CA: Sage, pp. 799–801.
Shelden, R.G. (2001). Controlling the Dangerous Classes: A Critical Introduction
to the History of Criminal Justice. Boston: Allyn and Bacon.
2
w hat d o w e K now
about C rime ?
Chapter Outline
21
22 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
In this chapter, you will gain a better understanding of the vital role
statistics play in criminology, criminal justice, and crime and intel-
ligence analysis. Data analysis has become an increasingly critical
component in police administration and crime prevention, as well as
in the investigative process. Crime analysts—whether working with
data that are stored and evaluated over time or with data based on
observation and real-time intelligence collection—rely heavily on
examining statistical data. The results of their data analysis are used,
in part, to form conclusions that support the justification for tactical
recommendations made to address issues related to crime.
Such was the case in the summer of 2014, where along the highways
that run through a county located in upstate New York, a “highway
shooter” wreaked havoc over a period of several months. Data analysis
proved to be a key component in the investigative process as crime ana-
lysts studied the data to identify patterns, provide temporal and spatial
information, and create strategic maps, such as shown in Figure 2.1.
The map in Figure 2.1 was created using geographic information
systems (GIS) technology that extrapolated statistical data from police
reports to plot specific points of reference on the map. For the crime
analyst, the intelligence learned from the data that populated the map
helped to identify similarities between shooting incidents, which in
turn helped to identify a pattern that was based on date, time, and loca-
tion, as well as possible points of entry and egress the suspected shooter
may have favored when engaged in shooting at passing automobiles.
Before you are introduced to the analysis process in which an event
goes from suspected criminal incident to a documented event and, even-
tually, to a statistical value analyzed by law enforcement, we will first
review the basic concepts of gathering statistics and the analysis of statis-
tics employed in criminal justice. First, let’s start with a very basic ques-
tion: How do we figure out how much crime takes place in America?
4/20/14, 2139
4/30/14, 1520
5/22/14, 1300
5/23/14, 0815
5/14/14, 2038
4/21/14, 1550
5/20/14, 0920
5/1/14, 0935
2/6/14, 0845
5/20/14, 1630
5/19/14, 0730
5/5/14, 1600
5/23/14, 1041
5/23/14, 1713
5/21/14, 1338
w h At d o w e k n o w A b o u t C rIm e ?
5/1/14, 0650
25
to be both cautious and skeptical, you must ask two questions about
crime statistics:
1. Are crime measurements measuring what they purport to be
measuring?
2. Does the source of crime statistics have something to gain
from the way crime measurements are presented to the public?
By asking these two important questions, you will be less likely to
simply accept the crime statistics you are reviewing at face value. But
where does information about crime come from?
The early UCR Program was managed by the IACP, prior to FBI
involvement, done through a monthly report. The first report, in
January 1930, presented data from 400 cities throughout 43 states,
covering more than 20 million individuals, which was approximately
20% of the total U.S. population at the time. On June 11, 1930,
through IACP lobbying, the U.S. Congress passed legislation enact-
ing a law granting the office of the U.S. attorney general the ability to
“acquire, collect, classify, and preserve identification, criminal identi-
fication, crime, and other records” with the ability to appoint officials
to oversee this duty, including the subordinate members of the Bureau
of Investigation. The attorney general, in turn, designated the FBI to
w h At d o w e k n o w A b o u t C rIm e ? 27
serve as the national clearinghouse for the data collected, and the FBI
assumed responsibility for managing the UCR Program in September
1930. The IACP announced this transfer of responsibility in the July
1930 issue of the IACP crime report. While the IACP discontinued
oversight of the program, it continued to advise the FBI to better the
UCR Program.
Since 1935, the FBI has served as a data clearinghouse, organizing,
collecting, and disseminating information voluntarily submitted by
local, state, federal, and tribal law enforcement agencies. The UCR
Program has remained the primary tool for collection and analysis of
data ever since.
During the decade of the 1980s, a series of national UCR confer-
ences were held with members from the IACP, Department of Justice,
the FBI, and the newly formed BJS. The purpose of these conferences
was to determine necessary revisions to the Uniform Crime Reports,
and then to implement those revisions. The result of these conferences
was the release in May 1985 of the “Blueprint for the Future of the
Uniform Crime Reporting Program.” The report proposed splitting
reported data into two separate categories; one category would be the
8 serious crimes (which later became known as Part I index crimes)
and the other would be 21 less commonly reported crimes (which later
became known as Part II index crimes).
Part I index crimes were composed of reported cases in two catego-
ries: violent and property crimes. The violent crimes were aggravated
assault, forcible rape, murder, and robbery; those classified as property
crimes in Part I were arson, burglary, larceny–theft, and motor vehicle
theft.
Included in Part II were simple assault, curfew offenses and loi-
tering, embezzlement, forgery and counterfeiting, disorderly conduct,
driving under the influence, drug offenses, fraud, gambling, liquor
offenses, offenses against the family, prostitution, public drunken-
ness, runaways, sex offenses, stolen property, vandalism, vagrancy,
and weapons offenses.
The Criminal Justice Information Services (CJIS) committees of
the IACP and the National Sheriffs’ Association (NSA) provide vital
links between local law enforcement and the FBI in the oversight of
the UCR Program. The IACP, representing the thousands of police
departments nationwide, and the NSA, serving sheriffs throughout
28 C rIm e A n d In t el lI g en C e A n A lysIs
Changes in UCR
In June 2004, the CJIS APB approved discontinuing the use of the
crime index in the UCR Program and its publications, and it directed
the FBI to publish a violent crime total and a property crime total. The
CJIS decided that the crime index and the modified crime index (the
number of crime index offenses plus arson) were not true indicators
of the degrees of criminality because they were always driven upward
by the offense with the highest number, typically larceny–theft. The
sheer volume of those offenses overshadowed more serious but less
frequently committed offenses, creating a bias against a jurisdiction
with a high number of larceny–thefts but a low number of other seri-
ous crimes, such as murder and forcible rape.
Other changes over the years in the reporting of crime statistics
through the UCR Program included the FBI beginning to record
arson rates, as part of the UCR Program, in 1979. This report details
arsons of the following property types, such as single-occupancy resi-
dential (houses, townhouses, duplexes, etc.), storage (barns, garages,
warehouses, etc.), industrial and manufacturing, and motor vehicles
(automobiles, trucks, buses, motorcycles, etc.).
The FBI also began collecting data on crimes motivated by gen-
der bias and gender identity bias. This compilation of hate crime sta-
tistics came about in response to the Matthew Shepard and James
w h At d o w e k n o w A b o u t C rIm e ? 29
Byrd, Jr. Hate Crimes Prevention Act of 2009. Also in response to the
Shepard–Byrd Act, the FBI modified its data collection so that report-
ing agencies could indicate whether hate crimes were committed by,
or directed against, juveniles. Therefore, in addition to reporting the
number of individual victims, law enforcement began reporting the
number of victims who were 18 years of age or older and the number
of victims under the age of 18 in 2013.
At the fall 2011 CJIS APB meeting, the APB recommended, and
FBI director Robert Mueller III approved, changing the definition
of rape. Since 1929, the FBI had defined forcible rape as “the carnal
knowledge of a female forcibly and against her will” (U.S. Department
of Justice, 2004, p. 19). Beginning with the 2013 data collection, the
new definition for the violent crime of rape was modified to “penetra-
tion, no matter how slight, of the vagina or anus with any body part or
object, or oral penetration by a sex organ of another person, without
the consent of the victim” (FBI, 2014, p. 1).
In 2013, FBI UCR data were compiled from more than 18,000 law
enforcement agencies, representing more than 98% of the population
in the United States. Although reporting by law enforcement is not
mandated, many states have instituted laws requiring law enforcement
within those states to provide UCR data. The statistics in the UCR
Program are based on arrest reports. These arrest reports are broken
down by the type of crime for cities, counties, states, and regions of
the country. In addition, the FBI collects auxiliary information about
these offenses, such as the time of day of burglaries. The expanded
offense data include trends in both crime volume and crime rate per
100,000 inhabitants. In regard to homicides, the UCR Program col-
lects expanded homicide data, which includes information about
homicide victims and offenders, weapons used, the circumstances
surrounding the offenses, and justifiable homicides.
are defined in the UCR Program as those offenses that involve force
or threat of force.
UCR data are based on police reports. For this reason, the FBI calls
the offenses on which it provides data “crimes known to the police.”
The crimes known to the police, then, become the “official” number of
crimes that the police report to the UCR Program, and that the UCR
Program, in turn, reports to the public. How do police departments
find out about crimes—the crimes known to the police? These data
are based on citizen complaints of crime. For each crime reported, the
police tell the FBI whether someone was arrested for that crime or
whether the crime was cleared for some other reason—for instance,
the death of the main suspect.
For each arrest that occurs, the police report to the FBI the arrest-
ee’s age, gender, and race. When someone is arrested for a crime, that
crime is counted as being “cleared by arrest.” Overall, statistics sug-
gest that the police clear about 20% of all index crimes, although the
clearance rate varies by the type of crime (Barkan and Bryjak, 2004).
32 C rIm e A n d In t el lI g en C e A n A lysIs
The UCR Program provides the official statistics about crime in this
country, and those statistics are provided by more than 18,000 police
agencies. Thus, the Uniform Crime Reports are the best official com-
pilation of crime in this country. On the other hand, while they are a
great resource for researchers, government officials on all levels, and
citizens, they fail to provide a completely accurate picture of crime in
the United States for the following reasons:
• The UCR Program only counts crime reported to the police;
consequently, crime is most certainly underreported.
• The UCR Program counts and classifies crime and some
characteristics of arrestees; still, it does not provide complete
details about offenses.
• The UCR Program relies on the statistics given the FBI by
local and state police departments. This suggests that for vari-
ous reasons (e.g., manpower shortages and political consider-
ations), crime in a particular location might be misrepresented
either intentionally or unintentionally.
• The UCR Program counts only specific violent and property
crimes and does not focus on corporate, occupational, or com-
puter crimes.
What, then, do we know about crime and crime trends from the UCR
Program?
The latest statistics from the UCR Program show that
1. In 2013, an estimated 1,163,146 violent crimes occurred
nationwide, a decrease of 4.4% from the 2012 estimate.
2. When considering 5- and 10-year trends, the 2013 estimated
the violent crime total was 12.3% below the 2009 level and
14.5% below the 2004 level.
w h At d o w e k n o w A b o u t C rIm e ? 33
In 1985, a joint task force of the BJS and the FBI was created to study
and recommend ways to improve the quality of information contained in
the UCR Program (UCR Study Task Force, 1985). This resulted in the
NIBRS, and the first collection of data began in 1991. Under NIBRS,
participating law enforcement authorities provide offense and arrest data
on 22 broad categories of crime covering 46 offenses, while providing
only arrest information on 11 other offenses (Bohm and Haley, 2012).
The advantages of the NIBRS compared with the UCR Program is
that the NIBRS provides more data on each crime, making it possible
to examine crimes in much more detail. It is hoped by the FBI that
eventually the NIBRS will replace the UCR Program as the source of
official FBI crime information. However, not all police departments
have the resources necessary to collect, process, and report the wide
array of data. As of 2009, only 44% of the nation’s law enforcement
agencies were participating in the NIBRS (Masters et al., 2013).
According to the FBI, as of 2007, 6,444 law enforcement agencies
contributed NIBRS data to the UCR Program. This represents just
34 C rIm e A n d In t el lI g en C e A n A lysIs
25% of the U.S. population and 25% of the crime statistics collected
by the FBI. Thus, it seems impractical to make generalizations about
crime nationwide (FBI, 2012).
households that have been in sample for the three-year period. The
sample includes persons living in group quarters, such as dormitories,
rooming houses, and religious group dwellings, and excludes persons
living in military barracks and institutional settings, such as correc-
tional or hospital facilities, and the homeless.
To gather data for the annual report entitled “Crime Victimization
in the United States,” the Bureau of the Census conducts interviews
with a national sample of approximately 160,000 people in 90,000
households. The major focus in the set of questions asked adults (i.e.,
individuals over 12 years of age) is whether they have been victims of
crime within the past six months. When it has been determined that
an individual in the survey has been victimized, further questions are
asked about the victimization.
Although the UCR Program is primarily oriented toward crimi-
nals and their crimes, the NCVS focuses mainly on the victims and
their victimization. The NCVS includes both reported and unre-
ported crimes. By concentrating on victims and learning more about
unreported crimes, the NCVS complements the UCR Program by
giving a more complete picture of the extent of crime in the United
States.
In the survey, household residents are asked whether they have
been a victim in the previous six months of several different kinds of
personal crimes. These crimes include robbery, rape, sexual assault,
aggravated and simple assault, and personal theft, such as pickpock-
eting and purse snatching; the NCVS groups these offenses together
and calls them “personal crimes” (Barkan and Bryjak, 2004). One
household member is also asked whether the family has been victim
to a household burglary, other household theft, or motor vehicle theft;
the NCVS calls these “property crimes.”
If respondents have experienced personal crimes, they are then
asked several questions about the offense, including whether and how
they were threatened or hurt; the time and place of victimization;
whether a weapon was involved and, if so, what type of weapon; how
well they knew the offender before the victimization; and whether
they reported the offense to the police and, if not, why not. When
respondents report a household victimization, they are asked fur-
ther questions about it, including the value of the item(s) stolen and
whether someone was at home at the time the theft occurred.
w h At d o w e k n o w A b o u t C rIm e ? 37
Since the NCVS is a random sample of the entire nation, its results
can be generalized to the rest of the U.S. population. So, for example,
if 1% of the sample reports that their automobile was stolen, we can be
fairly sure that about 1% of all U.S. families have experienced a motor
vehicle theft. This is important because it allows us to estimate the
actual number of victimizations in the United States. It also allows
us to estimate the rate of victimization per 1000 individuals age 12
and older for personal crimes and per 1000 households for property
crimes. For instance, if 1% of households report a stolen car, then we
can say that the rate of car thefts is 10 per 1000 households.
In general, the annual results of the NCVS show that there are many
more crimes that are committed than are reported to the police,
and subsequently to the FBI, for the UCR Program. It is found by
comparing the UCR Program and the NCVS that fewer than half
of violent crimes are reported to the police, fewer than one-third of
personal theft crimes are reported to law enforcement, and fewer than
half of household thefts are reported to the police (Truman, 2010).
38 C rIm e A n d In t el lI g en C e A n A lysIs
Self-Report Data
Self-report surveys are a way to learn more about the “dark figures
of crime”—the individuals that don’t show up in official statistics.
Researchers administering the first self-report survey studies found
that there was an enormous amount of hidden crime in the United
40 C rIm e A n d In t el lI g en C e A n A lysIs
Collection
Collation
Analysis
Dissemination
Feedback
from the data sources just mentioned. The following is a list of the
various systems, along with the strengths and limitations each has in
terms of data collection and storage:
• Computer-aided dispatch
• Records management system
• Geographic data system
Computer-Aided Dispatch
ArcGIS
Most often, in order to properly use data, the crime analyst or intel-
ligence analyst will need to access data from a variety of sources. Too
often, data stored in RMS or CAD were not created to suit the needs
of crime analysis. Therefore, data sets must be used to begin an analy-
sis. The primary data sources for the crime analysis will come from
RMS, CAD, and ArcGIS. And the most commonly sought data
include incident reports, arrest records, calls for service, and accident
reports. The intelligence analyst must be able to connect to the data-
base when he or she needs the information.
This chapter has addressed the basic question related to what we
know about crime. In the chapter, we discussed the processes of crime
collection, how crime is measured, and the utilization of statistics in
order to learn more about crime and examine crime patterns. The
highway shooter investigation mentioned at the beginning of the
chapter is an excellent example of how the processes that involve
the organizing, collecting, and disseminating of information proved
to be relevant—as all of these processes played a critical role in the
investigation.
The intelligence and statistical information used during the GIS
process also played a predominant role in the CompStat meetings that
were held during the span in which the crimes were being committed
and investigated.
The highway shooter case also involved a complex procedure
of crime analysis that relied heavily on the aid of technology. As a
result, the analysis supplied to the investigators included the total
48 C rIm e A n d In t el lI g en C e A n A lysIs
Important Terms
References
Barkan, S.E., and Bryjak, G.J. (2004). Fundamentals of Criminal Justice. Boston:
Pearson Education.
BJS (Bureau of Justice Statistics). (2015). National Criminal Statistics
Exchange. Washington, DC: BJS. Available at http://www.bjs.gov/con-
tent/ncsx.cfm.
Bohm, R.H., and Haley, K.N. (2012). Introduction to Criminal Justice. 7th ed.
New York: McGraw-Hill.
Fagin, J.A. (2007). Criminal Justice (2nd ed.). Boston: Allyn and Bacon.
FBI (Federal Bureau of Investigation). (2010a). Uniform crime reports.
Washington, DC: FBI. Available at http://www.fbi.gov/about-us/
cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/tables/table-
43/10tbl43a.xls.
FBI (Federal Bureau of Investigation). (2010b). Offenses cleared. Uniform
crime reports. Washington, DC: FBI. Available at https://www.fbi.
gov/about-us/cjis/ucr/crime-in-the-u.s/2010/crime-in-the-u.s.-2010/
clearances.
FBI (Federal Bureau of Investigation). (2012). NIBRS general FAQs.
Washington, DC: FBI. Available at https://www.fbi.gov/about-us/cjis/ucr/
nibrs/2012/resources/frequently-asked-questions-about-nibrs-individual-
agency-data/.
FBI (Federal Bureau of Investigation). (2013). Summary Reporting System User
Manual. Washington, DC: FBI.
FBI (Federal Bureau of Investigation). (2014). Frequently asked questions
about the change in the UCR definition of rape. FBI. Available at
https://www.fbi.gov/about-us/cjis/ucr/recent-program-updates/
new-rape-definition-frequently-asked-questions.
FBI (Federal Bureau of Investigation). (2015). Uniform crime reports.
Washington, DC: FBI. Available at https://www.fbi.gov/about-us/cjis/
ucr/ucr.
Huizinga, D., and Elliott, D. (1987). Juvenile offenders: Prevalence, offender
incidence, and arrest rates by race. Crime and Delinquency , 33, 206–223.
Langton, L., and Truman, J.L. (2014). Criminal victimization. NCJ 247648.
Washington, DC: Bureau of Justice Statistics. Available at http://www.
bjs.gov/index.cfm?ty=pbdetail&iid=5111.
Masters, R.E., Way, L.B., Gerstenfeld, P.B., Muscat, B.T., Hooper, M., Dussich,
J.P.J., Pincu, L., and Skrapec, C.A. (2013). CJ: Realities and Challenges.
2nd ed. New York: McGraw-Hill.
NIDA (National Institute on Drug Abuse). (2014). Monitoring the
future. Rockville, MD: NIDA. Available at http://www.dru-
gabuse.gov/related-topics/trends-statistics/infographics/
monitoring-future-2013-survey-results.
President’s Commission on Law Enforcement and the Administration of Justice.
(1967). The challenge of crime in a free society. N. Katzenback, Chairman.
Washington, DC: U.S. Government Printing Office (NCJ #000042).
52 C rIm e A n d In t el lI g en C e A n A lysIs
Rosen, L. (1995). The creation of the Uniform Crime Report: The role of social
science. Social Science History 19(2): 215–238. Available at http://www.
jstor.org/stable/1171511.
Santos, R.B. (2013). Crime Analysis and Crime Mapping (3rd ed.). Thousand
Oaks, CA: Sage.
Sellin, T. (1950). The Uniform Criminal Statistics Act. Journal of Criminal Law
and Criminology 679: 679–700.
Siegel, L.J. (2002). Criminology: The Core. Belmont, CA: Wadsworth.
Thornberry, T.P., and Krone, M.D. (2000). The self-report method for measur-
ing delinquency and crime. In D. Duffee, R.D. Crutchfield, S. Mastrofski,
L. Mazerolle, D. McDowell, and B. Ostrom (eds.), CJ 2000: Innovations
in Measurement and Analysis. Washington, DC: National Institute of
Justice, pp. 33–83.
Truman, J. (2010). Criminal victimization, 2010. NCJ 235508. Washington,
DC: Bureau of Justice Statistics. Available at http://www.bjs.gov/index.
cfm?ty=pbdetail&iid=2224.
UCR Study Task Force. (1985). Blueprint for the future of the Uniform Crime
Reporting Program. Washington, DC: U.S. Department of Justice.
Available at www.ncjrs.gov/pdffiles1/bjs/98348.pdf.
U.S. Department of Justice. (2004). Uniform Crime Report Handbook 2004. FBI.
Washington, DC: U.S. Government Printing Office. Available at https://
www2.fbi.gov/ucr/handbook/ucrhandbook04.pdf.
3
w hat C auses P eoPle
to C ommit C rimes?
Chapter Outline
53
54 C rIm e A n d In t el lI g en C e A n A lysIs
If you are like most people, when you hear of a particularly horrific or
brutal crime, you may ask, “How could someone do something like
that?”
It’s that kind of question that motivates criminologists to study the
reasons why people commit crimes. But beyond that, criminal jus-
tice researchers and theorists have been trying to explain the reasons
criminal violators offend in order to combat crime and develop pro-
grams to reduce or prevent crime.
Early Theories
Classical Theories
Biological Theories
The Positivists
The early positivists, such as Cesare Lombroso, who lived from 1836
to 1909, considered biological attributes to be the real roots of crime.
Lombroso took body measurements of offenders in Italian prisons and
concluded that there were “born criminals.” These born criminals had
distinctive body measurements and skull sizes.
58 C rIm e A n d In t el lI g en C e A n A lysIs
studying more than 3000 convicts, he found that there was a rela-
tionship between crime and a condition he called defective intelli-
gence, which included such traits as feeblemindedness, epilepsy, and
insanity.
Other psychoanalysts who followed Freud or studied with him
were seemingly more interested in criminal behavior than was Freud.
August Aichhorn, for instance, examined many delinquent youth and
concluded that social stress alone could not account for delinquent
or criminal behavior. Aichhorn said there had to be a predisposition
for antisocial acts (Siegel, 2006). Such predisposition, according to
Aichhorn, included impulsivity, a tendency to consider one’s own
needs more important than others’ needs, and a lack of guilt.
More recently, psychologists have linked criminal behavior to a
psychological condition called disruptive behavior disorder (Siegel,
2006). Children and teens can experience either of two forms of dis-
ruptive behavior disorder. One is oppositional defiant disorder, in
which young people show an ongoing pattern of uncooperative, defi-
ant, and hostile behavior toward authority figures. Adolescents with
oppositional defiant disorder may frequently lose their temper, argue
with adults, be easily frustrated and moody, and abuse drugs as a form
of self-medication (Siegel, 2006).
The other form of disruptive behavior disorder is conduct disor-
der, which is a much more serious behavioral and emotional disorder.
Young people who are diagnosed as having a conduct disorder have
difficulty following rules and are usually viewed as being antisocial.
They may be involved in such behaviors as fighting, bullying others,
committing sexual assaults, robbery, and cruelty to animals. Although
it is not precisely known what causes conduct disorders, research has
implicated brain dysfunction, neurotransmitter (the chemicals that
send messages in the brain) irregularities, and genetics (Siegel and
Welsh, 2009).
There has been growing research in recent years to show that there
is a link between mental illness and criminal behavior. That is, when
people have such serious mental illness as schizophrenia, bipolar dis-
order, and severe depression, there appears to be an increased risk
for serious, violent crimes. Studies in recent years have found a posi-
tive relationship between psychotic disorders and criminal violence
(Siegel, 2006).
60 C rIm e A n d In t el lI g en C e A n A lysIs
Sociological Explanations
Is It Nature or Nurture?
that this theory held all people equally responsible for their
criminal behavior. People—the classical school of thought
contended—were all rational, intelligent beings who exer-
cised free will. Yet, this rigid theory failed to take into account
what we all know for a fact: people are different. Some people
are less intelligent, less rational, and sometimes even severely
mentally ill.
This, of course, is why the neoclassical school had an alter-
native theory. That was that while they agreed that people
were rational and made their free will decisions, there were
some individuals who committed crimes because of factors
beyond their control. Age, mental illness, and other factors
could influence the choices people make and affect a person’s
ability to form criminal intent, or mens rea.
One alternative was Ronald Clarke and Derek Cornish’s
rational choice theory. They argued that delinquents and
adult criminal offenders are rational people who make cal-
culated choices about what they are going to do before they
act. Clarke and Cornish contend that offenders collect, pro-
cess, and evaluate information about the crime and make
a decision whether to commit it after they weigh the costs
and benefits of doing so. Offenders, for instance, will decide
where to commit their crime, who or what to target, and
how to carry it out. This theory, in fact, has been confirmed
through research with criminal offenders. Many offenders
do study the potential targets and pick their crime target
after considering the alternative targets. Gang violence
and drug world violence is not necessarily random, but is
often based on choices made to further some goal, such
as to enhance prestige, make a big score, or reduce direct
competition.
2. Routine activities theory: Lawrence Cohen and Marcus Felson
advanced a theory that is somewhat similar to that put for-
ward by Clarke and Cornish. The routine activities theory
examines the crime target, but they argue that three elements
must converge before a crime will be committed:
a. Motivated offenders
b. Suitable targets
w h At C Ause s P eo P l e t o C o m mIt C rIm e s ? 65
Community Policing
Problem-Oriented Policing
While the factors surrounding the basis of the three forms of polic-
ing just discussed focused primarily on attention to a wide range of
issues associated with crime and criminal behavior, problem-oriented
w h At C Ause s P eo P l e t o C o m mIt C rIm e s ? 69
Intelligence-Led Policing
As we go into more detail later in this book, you will see that while
crime analysis is a valuable tool in the day-to-day “statistical” mindset
of law enforcement, intelligence supplies the data from which analysis
is drawn. From the perspective of real-time tactical analysts, data min-
ing from multiple intelligence sources is the main task in obtaining
data and intelligence. As you may have already gathered, throughout
this book the words data and intelligence will carry the same meaning
and be virtually interchangeable. Technically, the word intelligence,
when used as a noun in military or government work, has tradition-
ally referred to information gained from the enemy. However, in this
book and writing from the perspective of the crime analyst, the word
70 C rIm e A n d In t el lI g en C e A n A lysIs
Criminal
environment
Crime and
intelligence Decision-maker
analysis
Important Terms
References
Bureau of Justice Assistance. (1994). Understanding Community Policing. A
Framework for Action. Washington, DC: Bureau of Justice Response Center.
Cole, G.F., and Smith, C.E. (2007). Criminal Justice in America 5th ed. Belmont,
CA: Wadsworth.
Fagin, J.A. (2007). Criminal Justice: A Brief Introduction. Boston: Allyn and
Bacon.
Goldstein, H. (2001). Problem-oriented policing in a nutshell. Presented at the
2001 International Problem-Oriented Policing Conference, San Diego,
December 7.
Guidetti, R., and Martinelli, T. (2009). Intelligence led policing—A
strategic framework. Police Chief Magazine. Available at http://
www.policechiefmagazine.org/magazine/index.cfm?fuseaction
=display&article_id=1918&issue_id=102009.
Karmen, A. (2001). Crime Victims: An Introduction to Victimology 4th ed.
Belmont, CA: Wadsworth.
Masters, R.E., Way, L.B., Gerstenfeld, P.B., Muscat, B.T., Hooper, M., Dussich,
J.P.J., Pincu, L., and Skrapec, C.A. (2013). CJ: Realities and Challenges.
2nd ed. New York: McGraw-Hill.
National Research Council. (2004). Effectiveness of police activity in reducing
crime, disorder and fear. In W. Skogan and K. Frydl (eds.), Fairness
and Effectiveness in Policing: The Evidence. Washington, DC: National
Academies Press, pp. 217–251.
76 C rIm e A n d In t el lI g en C e A n A lysIs
Reid, S.T. (2009). Crime and Criminology. 12th ed. New York: Oxford University
Press.
Samenow, S.E. (1984). Inside the Criminal Mind. New York: Times Books.
Schlesinger, L. (2009). Psychological profiling: Investigative implications from
crime scene analysis. Journal of Psychiatry & Law 37(1), 73–84.
Siegel, L.J. (2006). Criminology. 9th ed. Belmont, CA: Thomson Wadsworth.
Siegel, L.J., and Walsh, B.C. (2009). Juvenile Delinquency: Theory, Practice, and
Law. 10th ed. Belmont, CA: Wadsworth.
Weisburd, D., and Eck, J.E. (2004). What can the police do to reduce crime,
disorder, and fear? Annals of the American Academy of Social and Political
Sciences 593: 42–65.
Wilson, J.Q., and Kelling, G. (1982). Broken windows: The police and neigh-
borhood safety. Atlantic Monthly, March. Available at http://www.
theatlantic.com/magazine/archive/1982/03/broken-windows/304465/.
Part II
l aw
e nForCement—
then and n ow
4
the P oli Ce and l aw
e nForCement— i t ’s
C ome a l on g way
Chapter Outline
79
80 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
The thin blue line, as used in the colloquial sense by those in law
enforcement, represents the fragile boundary that rests between those
who serve in law enforcement and those who do not. It also can be
viewed, by some, as a shaded veil intended to protect the world of
those who are sworn to uphold the law from their many detractors.
What is significant here is that terms such as these, and the infer-
ences that go along with their meanings, illustrate the simple fact that
there is much to be learned from the law enforcement profession and,
t he P o lI C e A n d l Aw en f o r C em en t 81
If the crime represents a violation of a state law, then the local police
respond. We saw this in the James Holmes theater shooting case. The
shootings took place in Aurora, Colorado, and local police officers
from the Aurora Police Department responded and took jurisdiction
t he P o lI C e A n d l Aw en f o r C em en t 83
of the case. However, the FBI later took charge of the investigation
and the Aurora Police Department and the FBI worked together to
gather evidence.
On the other hand, if the crime is a violation of a federal law, then—
as we saw in the Madoff crime and in the Sheldon Silver case—the
federal government responds to the crime.
Joint state and federal investigations can eventually lead to task
forces being formed with the purpose of combining the investiga-
tive resources of both agencies as they work to solve pattern-related
crimes. A case in point is the upstate New York retail store service
desk armed robberies of 2013. As a result of more than 10 daytime
armed robberies from the service desk areas of a national retail store
chain, the Hobbs Act Task Force was formed in New York that
year.
Investigators from local police agencies teamed with members of
the FBI for the purpose of working as a task force responding to—
and investigating—armed robberies that were identified to be pattern
crimes. Pattern crime refers to a series of crimes that follows a certain
pattern. The task force collectively worked on “solvability factors” (key
elements necessary for the successful completion of a criminal inves-
tigation; usually include such factors as eye witnesses, identification of
a suspect, and address of the primary suspect) and investigative leads
that were developed by the task force members and the crime analyst
assigned to the team.
The Hobbs Act Task Force worked to enforce a U.S. federal law
named after Congressman Sam Hobbs. The Hobbs Act was enacted
by the U.S. Congress in 1946 to “prohibit actual or attempted robbery
or extortion affecting interstate or foreign commerce” (Office of the
United States Attorneys, 2015, p. 1). The Hobbs Act specifies that
when a robbery occurs at a location that deals with interstate com-
merce, then the charges levied against the perpetrator, once appre-
hended, increases the mandatory minimum federal sentence if he or
she is found guilty.
In this case investigation, the crime analyst participated in task
force briefings and was involved in data collection and storage, sus-
pect and pattern identification and research, and crime mapping,
as well as the issuing of all bulletins associated with the pattern
crimes.
84 C rIm e A n d In t el lI g en C e A n A lysIs
When the first U.S. Congress met in 1789, it adopted a law called the
U.S. Judiciary Act of 1789. This act established the U.S. federal judi-
ciary. Along with the federal judiciary, the U.S. Marshals Service was
also created by this act. This first law enforcement agency was formed
to be the enforcement arm of the federal courts. However, since no
other mention was made in the Constitution about law enforcement or
the police, it was up to the new country to develop a system of policing.
Since America was colonized by the English, it is no surprise that
early citizens of the fledgling country were people who were familiar
with the systems previously developed in England. The major system
developed in the new country was the constable watch system. The
watch system employed in the cities and urban areas developed in the
middle years of the nineteenth century.
The watch system as it developed in England’s towns and villages
generally meant that men—usually ordinary citizens—would be
responsible for patrolling the streets watching for any kind of criminal
activity. Constables, again, based on the system that had been used
in England prior to the nineteenth century, were mostly supervisors
of watchmen.
In America, Boston developed a watch system as early as 1634
(Bohm and Haley, 2002). Essentially, that was the predominant
policing system in America for the succeeding 200 years. Citizens
were expected to serve as the watch, but some of the citizens could
afford to pay a watch replacement, and as a consequence, often the
worst kind of men ended up protecting the community (Bohm and
Haley, 2002).
Much later, particularly in rural and southern areas of the United
States, the office of sheriff was established and the power of the posse
was used to maintain order and apprehend offenders (Bohm and Haley,
2002). That meant that two forms of law enforcement (in addition to
the U.S. Marshals, who helped bring law and order to the western
frontier) began to evolve. There was the watch in villages, towns, and
cities, and the sheriff in rural areas and counties. Some areas in the
northern parts of the United States often had both systems.
Although England organized its London Metropolitan Police in
1829, America didn’t imitate the English model for several years. The
t he P o lI C e A n d l Aw en f o r C em en t 85
The duties of the first police officers in those early years were very
similar to what the watchmen were doing. But after the Civil War,
city police departments began to establish a unique identity as they
began to wear uniforms, carry nightsticks, and arm themselves with
firearms. However, it can be said that police work was primitive
in the early years. Early police officers, in the nineteenth century,
performed many duties they do not have today, including cleaning
streets, inspecting boilers, caring for the poor and homeless, oper-
ating emergency ambulances, and performing other social services
(Dempsey and Forst, 2010). Following the English tradition, police
officers in the north were not issued firearms, although this changed
by the 1860s.
Another form of early policing was established in what were
becoming the key slave states of the south. These states were Virginia,
North Carolina, and South Carolina. And the form of policing evolv-
ing in these states was the slave patrols (Oliver and Hilgenberg,
2006). Although the slave patrols actually began in the seventeenth
century, they were organized to prevent slaves from escaping from
their owners. As time went on, the slave patrols would develop into
more formal, government-sanctioned entities as they were legislated
into existence (Oliver and Hilgenberg, 2006). For example, the code
of 1705 in Virginia allowed the patrols to check blacks who were not
on plantation property to ensure they had appropriate documentation
and were not escaped slaves.
86 C rIm e A n d In t el lI g en C e A n A lysIs
The slave patrols were often made up of hired hands from planta-
tions, and frequently they treated blacks with suspicion and hostil-
ity. Sometimes, blacks were mistreated, tortured, or even murdered
(Oliver and Hilgenberg, 2006).
Transitional Policing
There was little change in policing from the time of the early forma-
tion of police departments in the 1850s until the 1930s. It was appar-
ent to many that changes were needed because, according to Oliver
and Hilgenberg in A History of Crime and Criminal Justice in America
(2006), the reality of American policing was that the police were cor-
rupt, tied into politics, and very brutal in their approach to dealing
with citizens.
As the country headed into the 1920s and the grand social experi-
ment known as Prohibition created a new series of crimes and law
enforcement challenges, police departments were unable to cope with
the demands brought about by the attempt to ban the manufacture,
distribution, transportation, sale, or consumption of alcohol. However,
the status of police officers did not make their jobs any easier. Police
officers in the 1930s were generally underpaid, poorly trained, and
ill equipped (Oliver and Hilgenberg, 2006). It was a low-status job
often given to political cronies or brutish men without an education
(Walker, 1992). In addition, corruption was rampant. Often, police
officers worked with politicians who themselves worked with gang-
sters, and the whole system ensured that gangsters could make sure
that thirsty Americans could get booze—no matter what the federal
law said.
Many cities, as well as the federal government, were concerned
about the rise in crime and the flourishing bootlegging business.
More than 100 surveys and studies were conducted during the 1920s
to study the police problem, crime, and the criminal justice system
(Oliver and Hilgenberg, 2006).
The most significant of these studies was the one initiated by
President Herbert Hoover in 1929. Named the National Commission
on Law Observance and Enforcement, this commission was under
the direction of George W. Wickersham, the U.S. attorney gen-
eral. In 1931, the National Commission on Law Observance and
t he P o lI C e A n d l Aw en f o r C em en t 87
The assumption is that putting more officers on the street will lead
to reduced crime. This strategy is referred to as preventive patrol.
However, this assumption has been tested to see if it works. The first
such research project was conducted in 1974 and was called the Kansas
City Preventive Patrol Project. Conducted to test the degree to which
preventive patrol affected such things as offense rates and the level of
public fear, the experiment was relatively simple (Walker, 1992).
The southern part of Kansas City, Missouri, was divided into 15
areas. Five of these areas were patrolled in the usual fashion, five oth-
ers featured doubled patrols, and the last five saw patrols eliminated
altogether (no officers were assigned to these five areas and officers
only went into those areas when they were called).
The results? Surprisingly, in the three sections of the city there were
no significant differences in the rate of offending in terms of burglaries,
robberies, auto thefts, larcenies, and vandalisms. Furthermore, citizens
88 C rIm e A n d In t el lI g en C e A n A lysIs
didn’t seem to realize any changes in the patrol patterns, and there
seemed to be no difference in citizen’s fear of crime during the study
(Schmalleger, 2012). This study called into question the wisdom of ran-
dom preventive patrol. However, the Kansas City experiment did usher
in an era of more evidence-based policing in which police practices have
been put to the test to see which are effective and which are not.
surprise me, however, was how little the general public actually
knew about law enforcement and the role of the police officer.
In the early stages of my career, I had the opportunity to serve
as a field training officer (FTO), training new recruits as they
just finished the classroom portion of their police academy train-
ing. During the initial meeting with the newly assigned recruit,
I would hand him or her an organizational chart of our agency. An
organizational chart illustrates the entire organizational structure
of a police department by breaking down each tier, from top-level
management to the precinct patrol level. It also highlights each
specialized unit—including the detective bureau, the mounted
patrol, and narcotics, to name a few.
I would explain to the recruits that they needed to gain a full
understanding of the organizational structure of the agency they
worked for to help them better understand the different aspects
of policing that exist in order to successfully address the needs of
the department and, more importantly, the community that the
department served. For example, an organization as large as the
New York City Police Department (NYPD) serves a population
of more than 8 million people and, as such, needs to ensure it has
the manpower, resources, and equipment needed to properly police
a populace that large. The NYPD is in sharp contrast to a depart-
ment such as the Brockport (New York) Police Department, which
serves a community of approximately 8000 people with 13 full- and
part-time police officers (Brockport Police Department, 2015).
With a larger demographic, such as the metropolitan New York
area, specialized units are needed to address a large number of issues
that result in police action, including such issues as drugs, violence,
and domestic violence. That’s why the NYPD has many more spe-
cialized units (narcotics squad, gang enforcement unit, SWAT, etc.)
that are needed to handle special community concerns.
I always tried to emphasize, both to new recruits and to peo-
ple who were simply curious about what exactly I did as a police
officer, that to understand the various roles that a police officer
performs, you need to understand the needs, and societal issues,
emanating from the community that is being policed.
90 C rIm e A n d In t el lI g en C e A n A lysIs
Patrol Function
Although patrol officers and traffic patrol officers make up the bulk of
policing (Fuller, 2010), the police do a great variety of other things,
all of which may fall under the heading of peacekeeping and order
maintenance. For example, duties in this category include
• Responding to domestic dispute situations
• Controlling crowds at various public events, such as concerts,
baseball games, and parades
• Working vice as an undercover officer
• Dealing with the mentally ill
• Working with juveniles
• Responding to emergencies, such as natural disasters, terror-
ist attacks, and blackouts
Local police agencies and state highway patrols are responsible for
ensuring safety on the streets and highways. In some states, state
police officers patrol freeways, expressways, and interstate highways,
while local police patrol provide traffic enforcement services on lesser
streets and roadways. The major responsibilities of highway patrol
officers are to respond to traffic accidents, set up roadblocks to detect
drunken drivers, and generally enforce traffic laws.
92 C rIm e A n d In t el lI g en C e A n A lysIs
Criminal Investigations
Investigative Process
The Investigator
New York City has shown some of the most dramatic reductions
in crime of all major cities in the United States. One explanation
for the crime decline in New York City that is often cited by city
officials and police administrators there is aggressive police tactics
like those introduced by the city’s former commissioner William J.
Bratton (Dempsey and Forst, 2010). Bratton completely reengineered
the NYPD to make reducing crime its primary objective (Silverman,
1996). The primary idea behind Bratton’s reengineering was a process
known as CompStat.
CompStat
As America and the rest of the world entered the new millennium,
further advances in technology helped police departments go beyond
CompStat and develop new and unique ways to analyze crime and use
information and intelligence in smarter ways. Although police agen-
cies are still plagued by some of the same old problems—such as bru-
tality, racism, and corruption—new approaches to fighting crime have
changed how some police departments are managing crime problems.
Those technological changes in criminal investigations are dis-
cussed Chapter 5.
Important Terms
References
Bayley, D.H. (1994). Police for the Future. New York: Oxford University Press.
Bohm, R.H., and Haley, K.N. (2002). Introduction to Criminal Justice. 3rd ed.
New York: Glencoe/McGraw-Hill.
Brockport Police Department. (2015). Brockport Police Department. Available
at http://brockportpolice.org/.
Dempsey, J.S. (1999). An Introduction to Policing. 2nd ed. Belmont, CA:
Wadsworth Publishing.
Dempsey, J.S., and Forst, L.S. (2010). An Introduction to Policing. 5th ed. Clifton
Park, NY: Delmar.
Dodenhoff, P.C. (1996). LEN salutes its 1996 People of the Year, the NYPD
and its Compstat process: A total re-engineering and strategy-making
that has transformed the nation’s largest police force – as it will law
enforcement in general. Law Enforcement News, December 31, 1–4.
Available at https://www.lib.jjay.cuny.edu/len/96/31dec/html/feature.
html.
Fuller, J.R. (2010). Criminal Justice: Mainstream and Crosscurrents. 2nd ed.
Upper Saddle River, NJ: Prentice Hall.
Fundamentals of criminal investigations. (2015). Clifton Park, NY: Worldwide
Law Enforcement Consulting Group. Available at www.worldwidelawen-
forcement.com.
A history of crime analysis. (2015). Lowell: University of Massachusetts
Lowell. Available at http://faculty.uml.edu/jbyrne/44.203/MACA-
historyofcrimeanalysis.pdf.
98 C rIm e A n d In t el lI g en C e A n A lysIs
Chapter Outline
1. Criminal investigations
2. Development of the detective in America
3. Collecting evidence for use in court
4. Procedural law
5. Rule of law in collecting evidence
6. Search and seizure
7. Search warrants
8. Warrantless searches
9. Interrogation and the Fifth Amendment
10. The crime analyst and the criminal investigator
99
10 0 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be vio-
lated, and no Warrants shall issue, but upon probable cause, supported
10 2 C rIm e A n d In t el lI g en C e A n A lysIs
A police officer can search a suspect if the officer has a search warrant
or if the search is incident to a lawful arrest. But what if the officer
wants to stop and frisk a suspect?
Although it has been common practice over the decades—virtually
since police departments were established—for officers to stop and
frisk suspicious people, it hasn’t always been exactly clear whether
the police actually had the right to stop a suspicious individual and
10 4 C rIm e A n d In t el lI g en C e A n A lysIs
Procedural Law
Rules of Evidence
their job. The rules state that evidence gathered through immoral,
illegal, or unconstitutional means should not be used as evidence in
a trial.
Exclusionary Rule
violated. The Supreme Court ruled that the same standards as in Weeks
v. United States applied to defendants in state courts. That is, illegally
obtained evidence would be inadmissible. As a result, Ms. Mapp’s
conviction was reversed.
However, over the years, the U.S. Supreme Court has authorized a
number of circumstances in which the police can conduct a search or
seizure without a search warrant. The most important of these search
warrant exceptions are
• Search incident to a lawful arrest
• Plain-view searches
• Consent to search
• Exigent circumstances
• Search of automobiles
• Search of persons: stop and frisk
• Public safety exceptions
• Good faith exceptions
When the police are making a lawful arrest, they are entitled to a
search of the person arrested without a search warrant. This right was
articulated by the Supreme Court in the case of Chimel v. United States
(1969). In this case, the court ruled that the police can not only search
the person, but also search the area within the immediate control of
the individual. They cannot extend this search beyond the person’s
reach or to other rooms (Fagin, 2007).
Plain-View Searches
Consent to Search
Exigent Circumstances
Search of an Automobile
If the police have probable cause, they can search an automobile with-
out first obtaining a search warrant. The courts have taken note of the
P o lI C e In v e s tI g AtI o ns In t he 21s t C en t ury 10 9
We have already discussed the pat-down search or the stop and frisk.
This is essentially a warrantless search because, as indicated previ-
ously, it is a limited search, as only the outer clothing of the individual
can be patted down. And the primary purpose of a stop and frisk is to
ensure the safety of the police officer.
Another search that has been authorized by the court as not requiring
a search warrant is when the initial warrant has an error, thus render-
ing it invalid. For example, if during the filling out of a search warrant
the wrong address is entered on the warrant and the police carry out a
search at that incorrect address, evidence found at the wrong address
can be seized. In effect, the court has said that there is no miscon-
duct by the police and it was a good faith mistake on the part of law
enforcement.
Interrogation of Suspects
After an arrest has been made and a search has been carried out,
the police have the authority to question the individual. There is no
place in the Constitution where the word interrogation is mentioned.
However, it is implied in the Fifth Amendment:
You have the right to remain silent. You have the right to an attorney. If
you cannot afford an attorney, one will be provided for you. Any state-
ments made by you can and will be used against you in a court of law.
112 C rIm e A n d In t el lI g en C e A n A lysIs
Never was the need for the intelligence community and law enforce-
ment to form a symbiotic relationship greater than in the aftermath of
the terrorists attacks of September 11, 2001. The many investigative
and intelligence deficiencies identified through the numerous investi-
gations and inquiries into the 9/11 attacks led to several conclusions as
to what may have contributed to the lack of preemptive intelligence at
the state and federal levels of law enforcement. The 9/11 Commission
Report (National Commission on Terrorist Attacks, 2002) suggested
that “although the 1995 National Intelligence Estimate had warned of
a new type of terrorism, many officials continued to think of terrorists
as agents of states, or as domestic criminals, i.e., Timothy McVeigh in
Oklahoma City” (National Commission on Terrorist Attacks, 2002,
p. 126).
On September 12, 2001, the president of the United States, George
W. Bush, gave a speech to the nation. In that speech, President Bush
114 C rIm e A n d In t el lI g en C e A n A lysIs
Figure 5.1 A simplified timeline showing how investigators may track the criminal activity of radical Muslim extremists over a 12-month period.
P o lI C e In v e s tI g AtI o ns In t he 21s t C en t ury 117
Important Terms
References
Albanese, J.S. (2013). Criminal Justice. 5th ed. Upper Saddle River, NJ: Pearson.
Bohm, R.H., and Haley, K.N. (2012). Introduction to Criminal Justice. 7th ed.
New York: Glencoe/McGraw-Hill.
Carroll v. United States. 267 U.S. 132 (1925).
Chalk, P., and Rosenau, W. (2004). Confronting the Enemy Within: Security
Intelligence, the Police, and Counterterrorism in Four Democracies. Santa
Monica, CA: Rand.
Chimel v. United States. 395 U.S. 752 (1969).
Cole, G.F., and Smith, C.E. (2007). The American System of Criminal Justice.
11th ed. Belmont, CA: Thomson Wadsworth.
Dempsey, J.S., and Forst, L.S. (2010). An Introduction to Policing. 5th ed. Clifton
Park, NY: Delmar.
Escobedo v. Illinois. 378 U.S. 438 (1964).
Fagin, J.A. (2012). CJ: 2011. Upper Saddle River, NJ: Pearson Educational.
Fagin, J.A. (2007). Criminal Justice: A Brief Introduction. Boston: Allyn and
Bacon.
Florida v. Bostick. 501 U.S. 429 (1991).
Florida v. Jimeno. 500 U.S. 248 (1991).
Gelber, W.A. (1993). Videotaping interrogations and confessions. Rockville,
MD: National Institute of Justice. Available at https://www.ncjrs.gov/
App/Publications/abstract.aspx?ID=139962.
Hall, K.L., and Ely, J.W. (2009). The Oxford Guide to United States Supreme
Court Decisions. 2nd ed. New York: Oxford University Press.
Harris v. United States. 390 U.S. 234 (1968).
Hess, K.M., and Orthmann, C.H. (2010). Criminal Investigation. 9th ed.
Clifton Park, NY: Delmar Cengage Learning.
12 0 C rIm e A n d In t el lI g en C e A n A lysIs
Chapter Outline
1. Criminal investigations
2. The crime analyst and the criminal investigator
3. Stages of the police intelligence process
4. How investigations are performed
5. Crime analysis
6. Criminal profiling
7. Geographical profiling
8. Time–event charting and link analysis
12 3
12 4 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
Crime: Kidnapping
• The male was of the same race described by the victim’s sister.
• The male lived in the state that the victim’s phone was cur-
rently pinging out of.
* Editor’s note: This fact was crucial to the investigation, and more importantly, to the
data mining that was required.
† Pinging of a cell phone means identifying the location of the cellular tower of the
name or an alias.
12 6 C rIm e A n d In t el lI g en C e A n A lysIs
* Reverse dialing enables the analyst to dial into any cellular device without the
knowledge of the holder of the phone in order to covertly listen to any prerecorded
voice message.
A n In t r o d u C tI o n t o In t el lI g en C e 12 7
question and within the jurisdiction of the police agency that had just
passed along his actual name and date of birth.
Within an hour, the police agency from the adjoining state mobilized
and responded to the rural area where the tactical analyst had identified
the suspect’s possible current address. Upon entry by uniformed officers,
the victim was located inside the house with the male the analyst had
identified. Once in custody, the suspect admitted to luring the underage
victim to his house, against her will via social media, and having sexu-
ally assaulted her once there.
Investigators acknowledged that the tactical analyst was crucial in
the identification of the suspect and in locating the victim before she
was subjected to any further harm. In addition, it was acknowledged
that the leads the tactical analyst rapidly data mined and supplied had
directly contributed to the case leading to a swift conclusion—just 10
hours after the initial 911 call was made*.
* Geographically, the distance to drive from the victim’s residence, where she was
picked up by the suspect, to the suspect’s residence in the adjoining state, was
approximately six hours.
12 8 C rIm e A n d In t el lI g en C e A n A lysIs
Criminal Investigations
Follow-Up Investigation
Evidence
from which inferences can be drawn and include items such as physi-
cal evidence (Weston and Lushbaugh, 2006). Usually, circumstantial
evidence includes weapons, blood, fingerprints, tool marks, docu-
ments, and dust, dirt, or other traces.
Standard operating procedure is for the first patrol officer at the
scene of the crime to detain witnesses and other persons who might
offer help. That officer must obtain adequate information about each
witness or each person who may have information to contribute. That
would mean getting names, addresses, and phone number so detec-
tives can follow up. It also means getting a description of the perpe-
trator from witnesses and securing a more complete description of
the facts of the crime. A canvass of the neighborhood or surrounding
area may be undertaken by the initial officers on the scene or later by
investigators.
Circumstantial evidence may be found at the scene and must be
handled in such a way that the evidence is not compromised or con-
taminated. Any evidence found at the scene should be secured by the
patrol officer or investigator.
But what has been written in this chapter simply serves as an intro-
duction in order to highlight that the tactical crime analyst is part of
an investigative team.
On a daily basis, officers and investigators encounter criminals,
victims, and witnesses, as well as responding to dispatched complain-
ants. Each individual, or location, has a relevant history; for example,
individuals may have previous arrests, gang affiliations, social media
postings, pawn shop activity, and relevant information linking them
to unique crime trends. These data are stored in databases that require
significant time to mine and disseminate. Without immediate access
to this information, police personnel are hard pressed to make the
quick connections and deductions necessary for effective policing.
Real-time crime analysis provides officers in the field with pertinent
information instantaneously.
Real-time crime analysis has proven to be an effective, proactive
or reactive, crime fighting tool that aids in ongoing and follow-up
investigations. In the past, officers returning from the field would
sift through pages and pages of records to find information related
to an investigation. Now, however, real-time crime analysis provides
them with information pertaining to their investigations, and in some
cases, even before they make it to the scene.
A real-time crime center gives the analyst the ability to monitor
computer-aided dispatch (CAD) and work directly off dispatched jobs.
This allows the analyst to begin a preliminary workup on CAD infor-
mation, such as address of incident, vehicle data, and so forth, and pre-
pare a data summary for the responding unit should they call for the
information. In addition, the analyst can have direct communication
with units via police radio, CAD messaging, 911 dispatchers, and tele-
phone. The analyst utilizes multiple source databases, which allow the
analyst to provide relevant information to officers in the field, usually
within a matter of minutes. Real-time analysis is also an effective tool
in the follow-up investigative process by conducting research on—and
providing additional information for—solvability factor deduction.
Success stories, such as the one discussed below, are the best way
to illustrate how the use of a real-time tactical analyst, or any intel-
ligence analyst for that matter, can assist in the swift, successful con-
clusion to criminal investigations.
A n In t r o d u C tI o n t o In t el lI g en C e 13 7
Case: Homicide
The tactical analyst was asked to research the history of a victim who
sustained a gunshot wound to the head. Surveillance video showed the
suspect riding a bicycle as he approached the victim. Holding the gun
in his left hand while wearing a white glove on it, the suspect shot the
victim. The suspect was last seen traveling in a southerly direction.
In addition to any intelligence that would indicate the victim having
a dispute with anyone recently, the analyst was asked by homicide inves-
tigators to look into area gang members as possible suspects, focusing on
any who may be left-handed.
Through the analyst’s research, she was able to locate social media
accounts for multiple gang members who occupied turf in the area of
the homicide. After going through numerous gang members’ accounts,
the analyst located a social media account of a person of interest who
was an active member of the gang who claimed that area as their own.
The social media account, however, was under a moniker and not an
actual name. The analyst noticed that on this social media account page,
the newly developed person of interest had a photo of himself in a pro-
fessional sports uniform, and the photo was tagged with the name of a
local semiprofessional sports team.
The analyst researched the website of the sports team and found the
current roster of players. As it turned out, the person of interest was an
active member. This confirmed to the analyst that the gang member’s
social media account and the team roster belonged to the same individual.
In addition, the team roster listed the individual by his real name and pro-
vided a photo instead of the moniker he used on his social media account.
The analyst now had an actual name to research.
The analyst continued to view multiple photos of the person of inter-
est from the sports team’s website and discovered, in several of the live-
action photos, that the person of interest appeared to be performing
while favoring his left hand.
The analyst then reviewed a surveillance video of the suspect, right
before he shot the victim, and noticed that the glove the suspect was
wearing looked similar to the glove that the person of interest was wear-
ing during the live-action game photos on the semiprofessional sports
team’s website. The analyst also compared the newly identified person
of interest’s social media photos to his photos with the semiprofessional
13 8 C rIm e A n d In t el lI g en C e A n A lysIs
sports team, and noticed that he fit the same muscular build as the sus-
pect in the surveillance video.
In addition, now that the potential suspect was identified, and his
gang affiliation confirmed, the analyst was also able to identify several
potential witnesses through various gang-related intelligence and social
media accounts. These witnesses included
The analyst sent all the intelligence and photos of the person of inter-
est to the investigator.
The homicide investigator advised the analyst that by using her iden-
tification and a photo of the person of interest, he was able to create a
photo array.* As a result of the photo array, the investigator was able to
gain a positive identification of the individual as the person who was the
shooter. The individual was eventually charged with murder.
Success stories like this one not only serve to describe the investi-
gative and analytical process used by the tactical crime analyst, but
also help to clarify any misconception that may exist that the tactical
analyst may lack an investigative mindset.
Confidential Informants
What has not been written about so far, and should be mentioned, is
that informants also provide information to investigators. There are
various kinds of informants that prove of value at times to investiga-
tors. There are those who expect to be paid or to receive some kind of
consideration, or they may cooperate with detectives for other reasons.
* A photo array is a series of six photographs of individuals with similar features, with
one photo being a photo of the suspect; it is used by law enforcement in an attempt
to make an identification of a potential suspect.
A n In t r o d u C tI o n t o In t el lI g en C e 13 9
But there is also the use of databases that allow investigators to close
off some lines of inquiry, encourage the continuance of others, or sug-
gest new lines of investigation (Swanson et al., 2012). There are myr-
iad databases available to the police these days, especially to the crime
analyst or intelligence expert who knows how and when to access
those databases. Available databases are international, national, mul-
tistate, state, or regional.
Among the national databases are the following:
• AEXIS (Arson, Explosives, and Incident System). Run by the
Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF).
This database contains information on arson, bombs, and
misuse of explosives, including incident characteristics that
can be useful in determining patterns, trends, and motives.
• NIBIN (National Integrated Ballistics Information Network).
Also operated by the ATF, this database helps to determine if
firearms are related to other cases.
• NDPIX (National Drug Pointer Index). This database from
the Drug Enforcement Administration (DEA) alerts partici-
pating agencies of investigative targets they have in common.
• NamUs (National Missing and Unidentified Persons System).
Administered by the National Institute of Justice, this data-
base is designed to help track missing persons or identify
human remains.
• NCIC (National Crime Information Center). Maintained
by the Federal Bureau of Investigation (FBI), this database
consists of 19 files, which include the National Sex Offender
Registry, Unidentified Person File, Missing Persons File,
U.S. Secret Service Protective File, Foreign Fugitive File,
Gang File, Supervised Release File, and Identity Theft File.
• In addition to national databases, there are state and local data-
bases that contain information about millions of offenders, as
14 0 C rIm e A n d In t el lI g en C e A n A lysIs
Intelligence Reports
There are any number of reports that an intelligence unit can produce
for a police department. But, among the many kinds of reports that an
intelligence unit could provide for criminal investigators, perhaps the
four most important are criminal profiles, geographic profiles, time–
event charts, and link analysis.
Criminal Profiles
It was Teten’s work with the FBI that advanced the develop-
ment of profiling in the 1970s and led to the establishment of the
FBI’s Behavioral Science Unit (BSU). Since renamed the Behavioral
Research and Instruction Unit (BRIU), it continues to provide ser-
vices to other law enforcement agencies during investigations.
Criminal profiling, by definition, means developing a psychologi-
cal portrait of an unknown offender. While criminal profiling has
come under criticism in the past few years because of a lack of scien-
tific rigor, research continues to play a role in advancing the scientific
base for criminal profiling.
These days, profiling rests, sometimes uneasily, somewhere between
law enforcement and psychology (Winerman, 2004). As a science, it
is still a relatively new field with few boundaries or definitions. Its
practitioners don’t always agree on methodology or even terminology.
The term profiling has caught on among the general public, largely
due to movies like The Silence of the Lambs and TV shows like Profiler.
But the FBI calls its form of profiling “criminal investigative analy-
sis,” one prominent forensic psychologist calls his work “investigative
psychology,” and another calls it “crime action profiling” (Winerman,
2004).
Despite the different names, all of these tactics share a com-
mon goal: to help investigators examine evidence from crime scenes
and victim and witness reports to develop an offender description.
The description can include psychological variables such as per-
sonality traits, psychopathologies, and behavior patterns, as well
as demographic variables such as age, race, or geographic location.
Investigators might use profiling to narrow down a field of suspects or
figure out how to interrogate a suspect already in custody.
“In some ways, [profiling] is really still as much an art as a science,”
says psychologist Harvey Schlossberg, PhD, former director of psycho-
logical services for the New York Police Department (Winerman, 2004,
p. 66). But in recent years, many psychologists—together with crimi-
nologists and law enforcement officials—have begun using psychology’s
statistical and research methods to bring more science into the art.
To date, there is a lack of scientific evidence in support of the
techniques used in criminal profiling, and the proclaimed successes
of criminal profilers. The unscientific basis of profiling calls into
question the validity of the methods it has spawned, and the ways
A n In t r o d u C tI o n t o In t el lI g en C e 14 3
Geographical Profiling
Important Terms
References
Abumere, I. (2015). Criminal profiling. Available at http://www.academia.
edu/2333675/Effectiveness_of_Criminal_Profiling.
Bruce, C.W. (2008). Fundamentals of crime analysis. In S.L. Gwinn, C.W.
Bruce, J.P. Cooper, and S. Hicks (eds.), Exploring Crime Analysis: Readings
on Essential Skills. Overland Park, KS: International Association of Crime
Analysts, pp. 7–32.
European Association of Psychology and the Law. (2011). Fact sheet: Criminal
profiling. Available at http://itssimple.ca/forensicgroup/wp-content/
uploads/Factsheet_Criminal_Profilingbackup.pdf.
Paulsen, D.J. (2006). Connecting the dots: Assessing the accuracy of geographic
profiling software. Policing: An International Journal of Police Strategies and
Management 29(2): 306–334.
Swanson, C.R., Chamelin, N.C., Territo, L., and Taylor, R.W. (2012). Criminal
Investigation. 11th ed. New York: McGraw-Hill.
Weston, P.B., and Lushbaugh, C.A. (2006). Criminal Investigation. 10th ed.
Upper Saddle River, NJ: Pearson Prentice-Hall.
Winerman, L. (2004). Criminal profiling: The reality behind the myth. Monitor
on Psychology 35(7): 66–69.
7
i ntelli g en Ce and the
taCti Cal a nalyst
Chapter Outline
1. Intelligence perspective
2. Case study: A robbery investigation
3. Intelligence process
4. Case study: Assisting in an out-of-state murder investigation
5. Intelligence analyst
6. Intelligence-led policing
7. Case study: Shots fired
8. Intelligence and the terrorist threat
Introduction
A shooting takes place, and the call is made to 911. The 911 operator
immediately creates a “job” card, a computer incident entry unique
14 9
15 0 C rIm e A n d In t el lI g en C e A n A lysIs
Intelligence
Information in process Intelligence out
Intelligence Process
1.
Planning and
direction
2. 5.
Collection Dissemination
3. 4.
Processing Analysis
a close associate of the male, who was initially arrested for the double
murder. The out-of-state investigator sent the analyst a link to a social
media page for the female, hoping that the analyst would be able to
identify her.
In this case, we see the collection of information involved a nick-
name and a social media link on the possible second suspect. However,
the information had yet to been deemed relevant.
The analyst researched both daughters and found one to have a local
arrest history. The analyst also located a police-documented field
interview form (FIF). This is a form in which a police officer docu-
ments street contacts they had during their shifts. The daughter was
listed on the FIF, along with a male cousin of hers. The officer also
documented on the FIF the male cousin’s prior local jail inmate num-
ber. The analyst researched the cousin’s history and found that he had
spent five years in state prison for drug possession, and that he also
had a violent arrest history.
The collected information was analyzed for relevance and converted
into actual intelligence that could be used for investigative purposes.
15 6 C rIm e A n d In t el lI g en C e A n A lysIs
Analyst Responsibilities
Intelligence-Led Policing
The police responded to a shots fired call. Upon arrival, they found
recently spent (fired) 12- gauge shotgun casings located in front
of the home and noticed the front door was wide open. Officers
entered the home to check for victims and found no one inside.
They did find, in plain view, evidence of possible narcotics packag-
ing. Information derived from the scene was written into an FIF
and forwarded to the intelligence center in an attempt to identify
the person(s) associated with the location and to see if the location
posed an actual threat.
Since 9/11 the terrorist threat facing our country has evolved signifi-
cantly in the last ten years, and continues to evolve, so that, in some
ways, the threat facing us is at its most heightened state since those
attacks. This fact requires us to continually adapt our counterterror-
ism techniques to effectively detect, deter, and prevent terrorist acts.
(Department of Homeland Security, 2011, p. 1)
Intelligence: Post-9/11
1. How does the intelligence analyst best make sure that intel-
ligence is actionable?
2. What does the analyst do during the analysis stage of the
five-step intelligence process?
Important Terms
References
Carter, D.L., and Carter, J.G. (2009). Intelligence-led policing: Conceptual
and functional considerations for public policy. Criminal Justice Policy
Review 20(3): 310–325.
Chalk, P., and Rosenau, W. (2004). Confronting “the enemy within” security
intelligence, the police, and counterterrorism in four democracies. Santa
Monica, CA: RAND Corporation. Available at http://www.rand.org/
content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf.
D’Amico, J. (2006). Stopping crime in real time. Police Chief Magazine
73(9): 1.
In t el lI g en C e A n d t he tAC tI C A l A n A lys t 16 5
Chapter Outline
1. Investigation
2. Sources of information and intelligence
3. Interplay between the intelligence analyst and the criminal
investigator
4. Databases
16 7
16 8 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
perspective and ask more probing questions. But from that point on,
the investigator can provide feedback to the analyst and can ask more
pointed questions of the analyst. For instance, the investigator may
want to know
• What other robberies have occurred in the area recently?
• Is there a pattern to the robberies over the past few months
or longer?
• What weapons were used in other robberies in the vicinity?
• Who were the suspects in those recent robberies?
• What are the residence addresses of all previous suspects in
local robberies?
• Do any of those suspects have a record of robbery arrests or
convictions?
• Which known criminals live in the vicinity of this and previ-
ous robberies?
• What photographs are available of previous suspects?
• Do these photographs resemble the description of the
perpetrator(s) in this current robbery?
By obtaining answers to these kinds of questions, the investigator can
determine the next steps in the investigation. He may determine that
interviews should be conducted of previous suspects of local robberies to
check on alibis and movements around the time of the latest crime. In
addition, he may decide to solicit information from other police officers
who work in the vicinity of the robbery or from confidential informants
in the area who may be able to share important information.
Sources of Information
Important Terms
References
Bruce, C.W. (2008). Fundamentals of crime analysis. In S.L. Gwinn, C.W.
Bruce, J.P. Cooper, and S. Hicks (eds.), Exploring Crime Analysis: Readings
on Essential Skills. Overland Park, KS: International Association of Crime
Analysts, pp. 7–32.
Swanson, C.R., Chamelin, N.C., Territo, L., and Taylor, R.W. (2012). Criminal
Investigation. 11th ed. New York: McGraw-Hill.
9
d ata m inin g and
a naly zin g i ntelli g en Ce
Chapter Outline
17 5
17 6 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
What Is Data Mining?
Analytical Systems
On the other hand, and at the same time, IT has been develop-
ing analytical systems. One strategy for extracting meaning from
large amounts of investigative information is the use of data min-
ing applications. Data mining systematically searches information
to identify relationships and patterns. Although data mining has
been used effectively in private industry for a number of years,
law enforcement has trailed in the application of this technol-
ogy. As an interesting comparison, data mining techniques in the
commercial environment have allowed retailers to know more
about purchasing habits than what the police know about crimi-
nal suspects.
To explore the use of data mining within criminal justice, par-
ticularly criminal investigations, data mining software analyzes
18 0 C rIm e A n d In t el lI g en C e A n A lysIs
Statistical
Machine Learning
Machine learning and data mining often employ the same methods
and overlap significantly. Machine learning, by definition, is a type of
artificial intelligence (AI) that provides computers with the ability to
learn without being explicitly programmed. Machine learning focuses
on the development of computer programs that can teach themselves
to grow and change when exposed to new data.
The process of machine learning is similar to that of data min-
ing. Both systems search through data to look for patterns. However,
instead of extracting data for human comprehension—as is the case in
data mining applications—machine learning uses those data to improve
the program’s own understanding. Machine learning programs detect
patterns in data and adjust program actions accordingly. For example,
Facebook’s News Feed changes according to the user’s personal interac-
tions with other users. If a user frequently tags a friend in photos, writes
on his wall, or “likes” his links, the News Feed will show more of that
friend’s activity in the user’s News Feed due to presumed closeness.
Machine learning and data mining can be generally distinguished
as follows:
• Machine learning focuses on prediction, based on known
properties learned from the training data. (The data used
to construct or discover a predictive relationship are called
the training data set. Most approaches that search through
18 2 C rIm e A n d In t el lI g en C e A n A lysIs
Neural Network
Entity Extractions
Clusters
Associations
In data mining, association rules are useful for analyzing and pre-
dicting customer behavior. They play an important part in shop-
ping basket data analysis, product clustering, catalog design, and
store layout. For example, if a grocery store wished to sell more
1-liter bottles of Coke, they could examine transactions by custom-
ers who bought 1-liter bottles of Coke. By data mining associations,
they might discover that customers who bought 1-liter bottles of
Coke often bought 15-ounce bags of Lay’s Classic Potato Chips.
Once this association is understood, the store could send out cou-
pons for Lay’s Classic Potato Chips and offer a sale on potato chips.
They could, then, be relatively certain that the sales of Coke would
increase.
While the use of data mining and association rules has nothing
to do with selling either Coke or potato chips in criminal justice,
the goal of crime data analysis in law enforcement is to identify and
visualize associations among criminal networks. For example, find-
ings that 80% of individuals released from a particular prison were
subsequently involved in automobile thefts within six months of
leaving that prison would be valuable information for the police to
have. Similarly, if a crime analyst determined that there was a strong
dAtA mInIn g A n d A n A ly zIn g In t el lI g en C e 18 7
Sequentials
Summing Up
Important Terms
References
Applegate, L.M., Cash, J.I., and Mills, D.Q. (1988). Information tech-
nology and tomorrow’s manager. Harvard Business Review 66(6):
128–136.
Borhanazad, H. (2014). Artificial neural network, part I. ResearchGate.
Available at http://www.researchgate.net/publication/262936797_
ARTIFICIAL_NEURAL_NETWORK_PART_1.
Chen, H., Chung, W., Xu, J., Wang, G., Chau, M., and Qin, Y. (2003). Crime
data mining: A general framework and some examples. IEEE Computer
37(4): 50–56.
Furnas, A. (2012). Everything you wanted to know about data mining but were
afraid to ask. The Atlantic. Available at http://www.theatlantic.com/tech-
nology/archive/2012/04/everything-you-wanted-to-know-about-data-
mining-but-were-afraid-to-ask/255388/.
Mahar, F. (2003). Role of information technology in transaction processing
system. Information Technology Journal 2: 128–134.
McCue, C., and Parker, A. (2003). Connecting the dots: Data mining and pre-
dictive analytics in law enforcement and intelligence analysis. Police Chief
70(10): 115–119.
Nath, S.V. (2006). Crime pattern detection using data mining. In International
Conference on Web Intelligence and Intelligence Agent Technology Workshops,
Hong Kong, pp. 41–44.
dAtA mInIn g A n d A n A ly zIn g In t el lI g en C e 191
Chapter Outline
19 5
19 6 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
The earliest use of the term crime analysis can be found in the sec-
ond edition of O.W. Wilson’s book Police Administration (1963). In
this book, Wilson, who was the superintendent of the Chicago Police
Department from 1960 to 1971, as well as serving as police chief in
other cities, writes,
Even though the term crime analysis might not have been used prior
to Wilson’s use of it in 1963, it seems likely that the practice of crime
analysis actually goes back to the nineteenth century, although some
criminal justice historians might effectively argue that it dates back to
the beginning of society. While that is debatable, and while it depends
on how you define crime analysis, it seems more certain that August
Vollmer, who has been called “the father of American policing,”
hIs t o ry A n d t y P e s o f C rIm e A n A lysIs 19 7
times, arrest statistics, and clearance rates. For the most part, the
police were simply not held accountable for preventing crime. And
that went against the basic dictum of Sir Robert Peel in 1830 London.
Peel said back then that his police should be responsible not for arrests
so much as for preventing crime (Archbold, 2013). In the 1920s in
Berkeley, California, Chief of Police August Vollmer said the same
thing (Oliver, 2008). But most police departments had forgotten what
was the most fundamental tenet of the two most influential founders
of modern policing—that prevention was a key to effective policing.
Perhaps Bratton remembered what Peel and Vollmer said about the
duties of the police. Maybe not. Anyway, Bratton and his command
staff wanted to change the focus of the NYPD and begin to pay atten-
tion to crime prevention. With that goal in mind, they created and
implemented a new data-driven performance measurement system
they eventually called CompStat. Chief Bratton described the earli-
est version of CompStat as a system to track crime statistics and have
police respond to those statistics. The new focus on crime prevention
and implementation of CompStat represented a major shift for the
NYPD. Instead of dealing with reducing police corruption, which
they had done since the 1970s, now it was time to ask an important
question: How can we reduce crime? There may have been a prevail-
ing belief that in New York City—as well as elsewhere—the police
couldn’t do anything about crime (PERF, 2013). It seemed clear to
Bratton and his commanders that the community wanted the police
to do something about the high crime rate.
The four core components of CompStat were developed by NYPD
deputy commissioner Jack Maple, whom New York Magazine called
“perhaps the most creative cop in history” (Horowitz, 2013). With
the principles of CompStat in place, the NYPD began exploring
methods to gather and share timely intelligence. To start mapping
crime, the department received money from the New York City
Police Foundation for the purchase of mapping materials. However,
because of the huge volume of crime, leaders quickly decided that a
computerized mapping program was required. Jack Maple purchased
a computer from Radio Shack, and the name CompStat was born
(Horowitz, 2013). The NYPD began to make use of their own crime
statistics and track indicators of problems, such as the locations of
crime victims and gun arrests.
202 C rIm e A n d In t el lI g en C e A n A lysIs
products that would provide information and support for the vari-
ous missions of those agencies. Chief among those missions were
running efficient and effective police departments and reducing
crime. These necessarily morphed into crime analysis units or cen-
ters. Usually, crime analysis functions are assigned to one of four
classifications:
1. Tactical crime analysis
2. Strategic crime analysis
3. Administrative crime analysis
4. Police operations analysis
Four goals of tactical crime analysis are (1) linking cases together and
identifying crime patterns and trends as soon as possible, (2) analyz-
ing patterns discovered to identify potential suspects of a crime or
crime pattern, (3) notifying the police department about the existence
of patterns and suspects as soon as possible, and (4) working with the
police agency to develop the best tactics to address the pattern and
clear the case (Boba, 2001).
For five years, Glenn Grana was assigned to the Sheriff’s Hostage
Response Team (HRT) as a hostage negotiator negotiating situations
ranging from suicidal individuals to barricaded gunmen holding hos-
tages. Regardless of the situation, the process of negotiation relied
heavily on the use of intelligence on the subject, situation, or location,
to help him best maneuver the negotiation to a successful resolution.
From a crisis management perspective, whether the analyst is
involved in a hostage situation, an active shooter situation, or some
other crisis, success is measured simply in terms of the life you save.
One of the most critical stages in the crisis management process—
particularly in terms of the success of crisis negotiations and tactical
operational planning—is the analytical stage; the stage in which intel-
ligence is mined, disseminated, prioritized, and eventually relayed to
the lead negotiator or crisis team leader.
By introducing a tactical analyst into the team as a working com-
ponent related to the law enforcements crisis management protocol,
you can create a position that combines the analytical strengths of
the tactical analyst with the negotiating strengths of the crisis nego-
tiator. What is most important here is the tactical analyst’s ability to
rapidly data mine and analyze information obtained from multiple
data sources, while—at the same time—applying their understand-
ing of the theories and practices that law enforcement crisis managers
follow. If successful, it will create an analytical process unique to the
needs of crisis management.
hIs t o ry A n d t y P e s o f C rIm e A n A lysIs 209
Crime analysts are primarily civilians who, unlike their law enforce-
ment partners, have not been trained to multitask during a real-time
crisis. If the decision is made to utilize tactical analysts during a crisis
management situation, training should be made part of the protocol.
Devising a training curriculum that introduces, and incorpo-
rates, the skills of the tactical analyst, and negotiator, into the crisis
hIs t o ry A n d t y P e s o f C rIm e A n A lysIs 211
Hostage/Crisis Negotiator
With any type of cross-training for crime analysts who are assigned
to work in tactical, real-time situations, the goal is to create a hybrid
form of crime analysis, that is, crime analysis that merges the tradi-
tional skills of the crime analyst with the investigative skill set of a
sworn investigator. One way to do this is for crime analysts to work
with their law enforcement partners to create a training course that
mirrors the curriculum of an established investigator’s course.
Using this curriculum as a guide, specific topic instruction (incor-
porating such areas as interviewing and interrogation, rules of evi-
dence, etc.) can be taught to the analyst by a seasoned investigator
with the emphasis on how each specific block of instruction would
directly relate to the tactical analyst’s role.
In New York, for example, most law enforcement agencies follow
a Department of Criminal Justice Services Basic Investigator School
Curriculum, which, over the course of two weeks, is composed of
several different blocks of instruction designed to teach a newly pro-
moted police investigator the tools needed to conduct a proper crimi-
nal investigation.
Here is a sampling of topics and class hours as taught in the Basic
Investigator School Curriculum:
• Case Management/Basic Investigative Techniques and
Canvassing: 3 h
• Interview and Interrogation: 12.5 h
When looking to combine the curriculum for the investigator’s
course with a newly developed training curriculum for the tactical
hIs t o ry A n d t y P e s o f C rIm e A n A lysIs 213
The goal of this type of training is to help analysts gain insight into
the investigative process and develop a better understanding of their
role as they support a criminal investigation.
Mutual Understanding
combine with the resources they utilize with case studies and suc-
cess stories, will show the sworn side the value the analyst brings
to investigations. The goal is to have the investigators come away
with a confident understanding of what the analyst can do, how
the analyst understands the investigative process, and the value he
or she brings to their investigations.
Case Study
The two primary goals of strategic crime analysis are (1) to assist in
the identification and analysis of long-term problems, such as drug
activity or auto theft, and (2) to conduct studies to investigate or eval-
uate relevant responses and procedures.
Concerned with operational strategies that seek solutions to ongo-
ing problems, strategic crime analysis can provide information for
resource allocation purposes, including optimized patrol scheduling
and configuration of patrol zones. Its purpose is to identify crime
activities and patterns, identify community conditions, provide police
service more effectively and efficiently by matching demands for ser-
vice with actual delivery, reduce or eliminate recurring problems, and
assist in community policing or problem-oriented policing.
Examples of strategic crime analysis include crime pattern analysis
(examination of the nature and distribution of crime within an area),
crime control methods analysis (investigation of crime control meth-
ods and techniques to determine their usefulness), and general profile
analysis (identification of the typical characteristics of perpetrators of
certain types of crimes).
operations analyst might try to decide the best way to divide a city
into beats, the optimal allocation of officers per shift, or whether the
agency can justify a request for more police officers.
However, many operations decisions are based on long-term crime
trends within a department’s jurisdiction. For instance, a police
department might wish to identify the appropriate staffing of the
agency given its workload and the community demographics and
crime levels. Or, a police department, recognizing that the city has
had a number of new liquor licenses granted to bars and restaurants,
might desire to deploy more officers later in the evening if there are
more drunk and disorderly complaints or other public nuisance prob-
lems that have become more frequent.
Important Terms
b. 1890
c. 1940
d. 1990
6. The most widely recognized element of CompStat is its
a. Regularly occurring meetings
b. Yearly board meetings
c. Conferences in Hawaii
d. Smoke-filled backroom get-togethers
7. Crime declines in New York City may be attributed to
a. Aggressive stop and frisk policies
b. Concerts in Central Park
c. Introduction of CompStat
d. Mass incarceration
8. The NLECTC’s Crime Mapping and Analysis Program was
started in 1998, and it provides for
a. Scientific and technical support to rural police departments
b. Support for the transfer and adoption of technology into
practice by law enforcement and corrections agencies,
courts, and crime laboratories
c. Distributing military equipment to small police
departments
d. Recruiting crime analysts from Russia
9. The tactical analyst needs to have
a. A basic understanding of financial laws
b. An understanding of managerial principles
c. Experience in crisis management protocol
d. A grasp of the economic forces that drive crime
References
Archbold, C.A. (2013). Policing: A Text/Reader. Thousand Oaks, CA: Sage.
Boba, R. (2001). Introductory guide to crimeanalysis and mapping. Report
to the Office of Community Oriented Policing Services. Cooperative
Agreement 97-CK-WXK-004. Washington, DC: U.S. Government
Printing Office.
Dussault, J. (1999). Jack Maple: Betting onintelligence. Government Technology.
Available at http://www.govtech.com/magazines/gt/Jack-Maple-
Betting-on-Intelligence.html?page=2.
222 C rIm e A n d In t el lI g en C e A n A lysIs
Chapter Outline
1. Introduction
a. Recap what tactical crime analysis is
b. What does tactical crime analysis entail?
i. Identify emerging crime patterns as soon as possible
ii. Analyze carefully any crime patterns
iii. Notify the police department or agency about the
identified pattern
iv. Work with the police department or agency to address
the identified pattern
2. Identify emerging crime patterns
a. Daily review of crime reports
b. Comparison of crime reports with those in the past—last
week, month, year, or three to five years
c. Crime mapping
d. Statistical comparisons
e. Qualitative research
3. Carefully analyze any emerging patterns
a. Identify commonalities of criminal events
i. By searching databases
b. Identify the who, what, when, where, and how factors that
are common
c. Use an inductive model
4. Notify the police department or agency about the existence of
a pattern
a. Predict future criminal events
b. Work with detectives to address the pattern
c. Use spatial and temporal analysis
5. Work with the police department or agency to develop the
best tactics to address the pattern
223
224 C rIm e A n d In t el lI g en C e A n A lysIs
a. Wrap up
b. A few words about the next chapter
Introduction
What are the common shared elements that are necessary to define a
set of crimes as a pattern?
According to Gwinn (2011), there are seven common types of
crime patterns. These types are not mutually exclusive, and some-
times they overlap. Therefore, when a crime analyst is examining a
crime pattern that does not seem to fit neatly in one category, the
analyst should categorize the pattern as the type that appears most
applicable based on the characteristics of the crimes involved and the
nature of the most appropriate potential police response.
The seven primary crime pattern types are as follows:
1. Series: A group of similar crimes thought to be committed
by the same individual or group of individuals acting in con-
cert. An example of a series crime pattern would be five home
invasions in upper-middle-class neighborhoods in a suburban
community. In each, either one person was at home or the
home was empty. The two white males observed by the home
owner or by neighbors were in their 20s, wearing uniforms of
a utility company, and threatening residents with handguns.
They were seen leaving the area in a blue Honda Civic.
2. Spree: A group of similar crimes thought to be carried out
by the same individual or group, but with a high frequency
within a relatively short period of time. The crimes are so
frequent that they appear continuous. For example, a rash of
thefts from automobiles parked on a certain street in a five-
block area occurring during a seven-hour period would be
called a spree. In this spree, all of the cars are broken into
by smashing a driver’s side window, and the offenses all hap-
pen during a period of time from 8:00 p.m. one evening until
3:00 a.m. the next morning.
3. Hot prey: A group of crimes committed by one or more
individuals, involving victims who share similar physical
tAC tI C A l C rIm e A n A lysIs 229
her job to decide which of the seven types of patterns it is, because
this makes the succeeding steps in the tactical crime analysis process
easier.
To identify each type, the analyst must study daily crime reports
and determine which belong to the crime pattern that is her focus. If
she believes it is a crime series, then she may assume that the same
individual or individuals are responsible for each one. By studying the
crime reports of offenses that seem to fit in this series, she may deter-
mine if it is one or more than one individual, and begin to develop a
profile of the likely individual(s) responsible. Also, she can begin to
make predictions about when the next offense is likely to take place.
On the other hand, if the analyst believes it is a hot product pat-
tern, then she must identify the product and learn where that product
is available so she can predict the next target for a burglary of that
product.
By studying crime reports and determining the category of the
crime pattern, the crime analyst will be able to move on to the next
step in the tactical crime analysis sequence.
daytime burglaries, then the young men are either unemployed or work
night shifts. If they are carrying handguns, then they may have recently
purchased or acquired these guns. If they are driving a blue Honda
Civic, then the car may be registered to one of them. Given this begin-
ning formulation, the analyst can begin to query available databases to
try to learn about men in their mid-20s who might live within a several-
mile radius. They could have been recently paroled, so parole databases
can be reviewed. The motor vehicle department or secretary of state
database can be checked for Honda Civics registered to people in the
area. By putting together this kind of intelligence, when the crime ana-
lyst reports about this crime pattern, she can add other information that
will be helpful to detectives who are investigating this series.
Having identified a crime pattern and gathered more data to give the
police as much information as possible, it is then time to send a bul-
letin or report to the police department.
The way crime pattern intelligence is communicated can vary, and
that variety of formats can be related to the pattern that has been dis-
covered by the analyst. Here are three examples of the way an analyst
can report his results:
1. Repeat incident location report: This is a standardized weekly
report to provide more information for various units in the
police department when the analyst has identified repeat inci-
dent complaints at the same location. The report will gener-
ally consist of addresses that meet a particular threshold (e.g.,
a minimum of four calls for service) within a designated time
period (such as over a period of four weeks). Other informa-
tion that may be included in this report might be the dates
of previous calls for service, the time of day for each call, the
type of call, the disposition of the call, the case number, and
the name of the officer(s) that responded.
2. Crime report data variables used for pattern analysis: This report
is more like a request for help than the identification of an
actual crime pattern. The analyst will, in this communication,
have a list of recommended variables to be included in future
232 C rIm e A n d In t el lI g en C e A n A lysIs
While tactical crime analysts may develop their own format for
reports and bulletins, there is software developed to help crime ana-
lysts create a crime analysis bulletin.
For instance, Microsoft MS Access 2000 is such a program. It can
track “customers” that request the bulletins, multiple crime analysts
or bulletin creators, and multiple crime series, trend, spree, clusters,
or patterns as needed by the police department or agency. This bul-
letin maker product was modeled after an MS Excel version that was
developed by the Phoenix Police Department.
Some police units within police departments, such as the Crime
Analysis Unit in the Criminal Investigations Bureau of the Chesapeake
Police Department in Virginia, have developed a series of bulletins
and reports—each with different functions. Since the Crime Analysis
Unit is responsible for providing detailed and timely crime analysis to
all levels of the Chesapeake Police Department, including command
personnel, supervisors, detectives, and patrol officers, information
from the Crime Analysis Unit gets disseminated in different formats.
For instance, “crime bulletins” identify specific crime problems.
“Crime alerts” indicate that crime problems previously identified in
a crime bulletin are continuing or increasing. “Crime leads” detail
information relating to the identification of suspects in criminal cases
or information related to serial crimes committed by the same sus-
pects. In addition, the Crime Analysis Unit puts out specialized crime
studies and statistical reports.
tAC tI C A l C rIm e A n A lysIs 233
It has been pointed out that crime analysts cannot provide action-
able information if they do not have the time, training, or tools
234 C rIm e A n d In t el lI g en C e A n A lysIs
A good first step in orienting the crime analysis unit toward an opera-
tional focus is to make sure crime analysts leave the office sometimes.
Bruce and Ouellette (2008) point out that no good analysis comes
out of an ivory tower or a cloistered computer room. Instead, analysts
must
• Have a true understanding of the nature of crime, criminals,
and the social dynamics of the jurisdiction in which they work
• Know what types of information operational units find
valuable
• Understand what tactics and strategies have a realistic chance
of success
tAC tI C A l C rIm e A n A lysIs 235
In many police departments, the typical and usual response to any iden-
tified crime pattern, crime series, hot spot, crime trend, or crime prob-
lem is the directed patrol (Bruce and Ouellette, 2008). A directed patrol
is focused patrol; that is, patrol resources are concentrated at the times
and in the places with the highest risks of serious crime. The hypothesis
is that the more patrol presence that is concentrated at the hot spots and
“hot times” of criminal activity, the less crime there will be in those
places and times (Sherman and Weisburd, 1995). Unfortunately, in
some agencies it is often the only response. Directed patrols can be
valuable for certain issues and can lead to both suppression of crime and
apprehension of offenders (Bruce and Ouellette, 2008). However, there
is a much larger list of potential responses at an agency’s disposal.
As Bruce and Ouellette (2008) point out, tactical analysis and
the identification of crime patterns require tactical responses—fast,
effective responses that stop a crime pattern or series in its tracks.
Generally, this is accomplished through one of three means:
1. Apprehending offenders
2. Hardening potential targets
3. Suppressing underlying opportunities for crime
236 C rIm e A n d In t el lI g en C e A n A lysIs
Given that a pattern has been identified, the police department lead-
ership should disseminate information throughout several units while
encouraging initiative at the following levels of their organizations:
• Patrols: Patrols should review crime analysis information and
implement what tactics and strategies they can to address a
particular issue. These might include suspect-oriented patrols,
profile interview patrols, directed patrols, talking to infor-
mants, and warning members of the community.
• Investigators: Investigators can group related crimes, priori-
tizing those that are part of a pattern or series, and implement
such effective tactics as surveillance, stakeouts, and controlled
buys.
• Supervisors: Supervisors should plan and direct more
resource-intensive tactics, such as decoys, saturation patrols,
and planned response.
Such policies and procedures place a lot of power into the hands of
analysts, but they can generate resentment within the police depart-
ment if not handled carefully. This suggests another reason for crime
analysts to leave their computer screens behind and get to know offi-
cers in other units.
In other police departments, established groups of officers who are
given assignments by crime analysts spend their shifts intervening in
patterns and problems. These officers are detached from regular patrol so
as not to be distracted from their missions with routine calls. One name
given to these officers is “impact teams.” Another name applied to them
by some police departments is the “split-force model.” This term means
that the department has divided its operations divisions into regular
operations units (that respond to calls) and tactical-action or problem-
solving units. Chief Gary Gemme of the Worcester, Massachusetts,
Police Department instituted such an approach in 2005, and the agen-
cy’s Community Impact Division has since been credited with solving
several crime patterns (Bruce and Ouellette, 2008).
But such models are not limited to large police departments. For
instance, the Redmond, Washington, Police Department created a
ProAct Unit with five officers and a detective. The ProAct Unit was
to specifically intercede in auto-related crime. They use offender intel-
ligence from the crime analysis unit as their “to-do list.”
It might be said that the mother of all formal response development
methods is CompStat. As you have learned already in Chapter 10,
CompStat was established by the New York City Police Department
in the 1990s, and it involves getting all of the decision-makers in the
department in a room on a regular basis, reviewing current activity,
deciding what to do about it, and reviewing success or failure at sub-
sequent meetings. CompStat-style systems go under many alternative
names and acronyms, so much so that Lincoln, Nebraska, chief of
police Tom Casady, with tongue in cheek, suggested OOVOC (Our
Own Version of CompStat) as an umbrella term. Various OOVOC
systems are characterized by how they balance accountability with
problem-solving. The New York style of CompStat features a some-
times harsh view of “accountability,” with precinct commanders
expected—under the threat of demotion or transfer—to know the
details of crime volume, as well as individual crimes, in their areas.
The precinct commanders themselves present the current crime
tAC tI C A l C rIm e A n A lysIs 239
Bair, and Helms have written, “To identify crime patterns, analysts must
be skilled in critical thinking and be able to recognize commonalities
among characteristics of crime incidents” (Boba, 2009, p. 156).
Investigating a crime pattern, while working directly with the investi-
gative team, can be a daunting task considering that the analyst is an inte-
gral part of the decision-making process and his or her analysis will form
the basis of the reasoning behind investigative team decisions. At the
real-time crime center located in Rochester, New York, several analysts
work in specialty fields, such as homicide or robbery, and as a result work
shoulder to shoulder with their law enforcement counterparts on pattern
crimes. The level of input the analysts have with the investigative team is
largely based on the level of confidence the investigative team has in the
analysts and their investigative, analytical, and critical thinking skills.
Investigating pattern crimes, primarily violent crimes such as armed
robberies, relies on quick action and decisive recommendations being
made by both the investigators and the analyst as they attempt to proj-
ect the next event. These recommendations are drawn from the results
of exhaustive analysis of the data that pertain to the crimes.
Pattern Investigation
City PD
1/1/16
123 Street
Town PD
1/5/16
456 Street
Country Sherif f
1/8/16
789 Street
Crime Summary
Commonalities
Incident Details
This portion of the product consists of a chart that details the specifics
of the crime pattern:
• Occurrence date
• Reporting law enforcement agency
• Pattern crimes usually occur in multiple police jurisdictions
and, as such, may have multiple police agencies reporting
them.
• Location type
• Commercial
• Residential
• Location address
• Occurrence time
• Day of the week
tAC tI C A l C rIm e A n A lysIs 24 3
• Suspect description(s)
• Suspect vehicle description(s)
• Brief narrative that highlights MO
• For example, suspect 1 held customers and employees at bay with
a handgun while suspect 2 loaded a black duffel bag with phones
The above aspects of a product are not absolute, in terms of format
or content, but the product should highlight most of these areas for
completeness.
Photos
Map
A map of the crime locations can help the investigative team, analyst
included, with identifying relevance in terms of entry and egress to
and from the crime scene. There may be other factors that may help
to identify why certain actual and geographical locations are being
targeted over others.
Contact Information
Jurisdiction Date Time Dow Location Address Suspect Description Weapon Displayed Vehicle
Albert PD 5/1/2015 2119 Friday Fuel King 1862 Rogers Ave. M-B/-5-10-6’/20-30’s/ Black Handgun N/A
Dark Clothes-Black Bandana
Sheriffs 5/3/2015 100 Sunday Gas King 25 Baxter Street M-B/-5-10-6’/20-30’s/ Black Handgun Red
Dept. Dark Clothes-Black Bandana Staurn
Evertt PD 5/10/2015 300 Sunday Fuel King 100 East Main Street M-B/-5-10-6’/20-30’s/ Handgun Red
Dark Clothes-Black Bandana Staurn
Map:
Town of Albert PD
1862 Rogers Ave. Town of Baker
5/1/15 2119 hRS. 25 Baxter Street
Sheriffs Dept. 5/3/15
0100 Hrs.
City of Evertt PD
100 E. Main St.
5/10/15 0300 Hrs.
Important Terms
References
Boba, R. (2009). Crime Analysis with Crime Mapping. Thousand Oaks, CA:
Sage.
Bruce, C.W., and Ouellette, N.F. (2008). Closing the gap between analysis
and response. Police Chief LXXV(9). Available at http://www.policechief
magazine.org/magazine/index.cfm?fuseaction=display_arch&article
_id=1604&issue_id=92008.
Canter, P.R. (2000). Geographic information systems and crime analysis in
Baltimore County, Maryland. In Weisburd D. and J.T. McEwen (eds.),
Crime Mapping and Crime Prevention. Monsey, NY: Criminal Justice
Press pp. 157–190.
Clarke, R., and Eck, J. (2003). Classifying common police problems: A routine
activities approach. Crime Prevention Studies 16: 7–39.
Goldsmith, V., McGuire, P.G., Mollenkopf, J.H., and Ross, T.A. (ed.). (2000).
Analyzing Crime Patterns. Thousand Oaks, CA: Sage.
Gwinn, S. (ed.). (2011). Crime pattern definitions for tactical analysis. Overland
Park, KS: International Association of Crime Analysts. Available at http://
www.iaca.net/Publications/Whitepapers/iacawp_2011_01_crime_pat-
terns.pdf.
Schick, W. (2004). CompStat in the Los Angeles Police Department. Police
Chief 71(1). Available at http://www.policechiefmagazine.org/magazine/
index.cfm?fuseaction=display_arch&article_id=190&issue_id=12004.
Sherman, L.W., and Weisburd, D. (1995). General deterrent effects of police
patrol in crime “hot spots”: A randomized, controlled trial. Justice
Quarterly 12(4): 625–648.
12
taCti Cal C rime a nalysis
and h ot s P ots P oli Cin g
Chapter Outline
24 9
250 C rIm e A n d In t el lI g en C e A n A lysIs
crime in small places, or “hot spots,” that generate half of all crim-
inal events (Pierce et al., 1988; Sherman et al., 1989; Weisburd
et al., 1992). Even within the most crime-ridden neighborhoods,
crime clusters at a few discrete locations and other areas are rela-
tively crime-free (Sherman et al., 1989). A number of research-
ers have argued that many crime problems could be reduced more
efficiently if police officers focused their attention to these devi-
ant places (Sherman and Weisburd, 1995; Weisburd and Green,
1995). The appeal of focusing limited resources on a small number
of high-activity crime places is straightforward. If we can prevent
crime at these hot spots, then we might be able to reduce total
crime. Hot spots policing has become a very popular way for police
departments to prevent crime. A recent Police Foundation report
found that 7 in 10 departments with more than 100 sworn offi-
cers reported using crime mapping to identify crime hot spots
(Weisburd et al., 2003). A growing body of research evidence sug-
gests that focused police interventions, such as directed patrols,
proactive arrests, and problem-oriented policing, can produce sig-
nificant crime prevention gains at high-crime hot spots (see, e.g.,
Braga, 2002; Eck, 1997, 2002; Skogan and Frydl, 2004; Weisburd
and Eck, 2004). However, critics of place-based interventions
charge that such policing strategies result in displacement—that
is, criminals move to places not protected by police intervention
(e.g., Reppetto, 1976). Given the growing popularity of hot spots
policing, regular systematic reviews of the empirical evidence on
the effects of focused police interventions on crime hot spots are
necessary to assess the value of this approach to crime prevention.
Braga, 2007, p. 4
Introduction
Crime does not occur evenly in either states or cities. Some cities have very
little crime and some have a great deal of crime. But, of course, no city is
crime-free. And because it does not occur in even amounts throughout a
city, it is generally clustered in small areas—hot spots—that account for a
disproportionate amount of crime and disorder. For example,
tAC tI C A l C rIm e A n A lysIs 2 51
Crime theories are critical for useful crime mapping because they aid
in the interpretation of data (Eck, 1998). Crime theories also provide
guidance as to what actions are most appropriate in response to the
identification of hot spots. There are several theories of crime and
252 C rIm e A n d In t el lI g en C e A n A lysIs
While this theory has already been described in this chapter, you
should recall that it suggests that crime occurs when a motivated
offender, a suitable target, and the lack of a capable guardian converge
in the same place at the same time. Criminals choose or find their
targets within the context of their routine activities, such as traveling
to and from work or shopping, and tend not to go too far out of their
way to commit crimes.
The situational crime prevention theory suggests that crime and pub-
lic disorder can be prevented by reducing opportunities for crime. For
example, if crime occurs regularly in a dimly lit alley, public works
could improve lighting and increase police presence in the area.
Among the most important contributors to the theory is Ronald
Clarke. In 1983, he defined the core of the theory and focused his
new approach on the event of the crime, instead of the perpetrator.
The event of the crime, to Clarke, has to do with the immediate
physical and social settings, as well as wider societal arrangements.
Clarke summarizes it as the science and art of decreasing the amount
of opportunities for crime using “measures directed at highly specific
forms of crime that involve the management, design, or manipula-
tion of the immediate environment in a systematic and permanent
way” (Clarke, 1983, 225). This approach relies on the assumptions
that more opportunities lead to more crime, easier ones attract more
offenders, and such an existence of easy opportunities makes a “life
of crime” possible.
Most experienced police officers who have spent any amount of time
working in a city know exactly where the trouble spots are. They know
which neighborhoods are likely to report crimes and at which bars
and taverns fights and public disorders occur.
Before computers came along, police departments stuck pushpins
in maps hung on the wall to better identify where crimes occurred.
But today, because of advancing technology, hot spots can be identi-
fied using
• Maps and GIS
• Statistical tests
beat had the most amount of crime in the past month, an area (poly-
gon) map would be most appropriate.
Hot spots and high-crime areas can therefore be illustrated using
varying levels of geography, such as a specific addresses or inter-
sections, single blocks, clusters of blocks, streets, or neighborhoods
(Eck et al., 2005; Paynich and Hill, 2010). Eck et al. (2005) sug-
gest that analysts begin their exploration of hot spots by plotting
points before examining larger areas of geography, since maps show-
ing hot streets and areas may hide more minute point patterns of
concentration.
Repeat addresses point maps can be useful for a variety of purposes,
such as demonstrating repeat incidents at a single location. However,
using single points to represent multiple incidents at the same location
would be misleading, as it does not distinguish among locations that
have single versus multiple incidents (Chainey and Ratcliffe, 2005;
Boba, 2009). Instead, multiple incidents at a single location (repeat
addresses) can be represented using graduated symbols or colors
(Chainey and Ratcliffe, 2005; Eck et al., 2005; Boba, 2009; Paynich
and Hill, 2010), in which differing symbol colors or sizes represent a
count or range of values. Many times, these multiple locations are at
apartment complexes, shopping complexes, or office buildings. For
example, one would expect a large symbol might exist at an address
for a large shopping mall, as all of the stores and restaurants share the
same address. The analysis would be much better if the analyst could
pinpoint the specific locations within these complexes, which would
also provide better intelligence for further police action.
different kinds of maps crime analysts can generate and the unique
way each depicts hot spots.
Dot Map A dot map can show a particular place, a store or gas sta-
tion, for instance, where crime problems have occurred. The specific
address of the relevant place of a crime occurrence helps to distinguish
between addresses that have had crime problems versus those that
have not. A dot map or a dot distribution map is simply a map that
uses dots or other symbols to represent the presence, quantity, or value
of a phenomenon or thing in a specific area, such as a crime or crime
victimization. In a dot distribution map, the size of the dots may be
scaled in proportion to the intensity of the problem. For example, if
two or more robberies occurred at the same convenience store, the dot
may be larger than the dot depicting a convenience store experiencing
only one robbery.
Line Maps Line maps are used when the hot spots are along
streets. If, for example, robberies and holdups occur in the streets
leading up to a stadium where sports and entertainment events are
held, a dot map would be less relevant than a line map. The crimes
do not occur at the stadium, but along routes leading to and from
the venue. Some of the streets may not have parking, and so few
people would be walking to and from the stadium on those streets.
But knowing which streets have crime and which ones don’t would
be important for the police to know in terms of addressing the
problems.
Ellipse and Choropleth Maps These maps are used when the hot spots
cover broader areas and include neighborhoods. Ellipse and chorop-
leth maps imply that the areas within the designated hot spots share
the same risk level, so a specific street or a certain address within that
district is less relevant (Eck et al., 2005). Ellipses are common in
physics, astronomy, and engineering. For example, the orbit of each
planet in the solar system is an ellipse. One of the earliest crime map-
ping software applications that became widely available to practitio-
ners for crime analysis was Spatial and Temporal Analysis of Crime
(STAC). STAC is not a GIS, but instead acts as an aid to persons
who already have a GIS or desktop mapping capability. STAC is
tAC tI C A l C rIm e A n A lysIs 265
a spatial tool to find and examine hot spot areas within the study
area. In concise terms, this means that STAC first finds the dens-
est concentration of points on the map (hot clusters), and then fits
a “standard deviational ellipse” to each one. The ellipses themselves
indicate through their size and alignment the nature of the underly-
ing crime clusters.
Examples of the use of STAC include a study of how to reduce
incidents in Detroit’s infamous Devil’s Night period (Martin et al.,
1998). An advantage of STAC is that it derives hot spots without rely-
ing on defined boundaries such as census units or police administra-
tive boundaries. However, a limitation is that crime hot spots do not
naturally form into convenient ellipses; thus, STAC hot spots do not
represent the actual spatial distribution of crime and can sometimes
be misleading (Eck et al., 2005).
Choropleth mapping or geographic boundary thematic mapping
is a way of representing spatial distributions of crime events. The
boundary areas that are used for this type of thematic mapping are
usually arbitrarily defined for administrative purposes, since they
can be police beats, census blocks, wards, or districts. Offenses as
points on a map can be aggregated to these geographic unit areas
and are then shaded in accordance with the number of crimes that
fall within them. This map allows for quick determination as to
which areas have a high incidence of crime, and allows further
diagnosis of the problem by “zooming in” on those areas (Eck et
al., 2005). Areas are shaded according to their data values, by either
rate or frequency.
Isoline maps are, by definition, maps with lines that join points of
equal value. Physical geography often uses isoline maps as isobars to
show barometric pressure or isotherms to show temperature, but the
form most likely to be used in crime analysis is the isopleth (equal
crowd), in which data for areas, such as crimes per neighborhood or
population density, are calculated and used as control points to deter-
mine where the isolines will be drawn.
Hot Streets
depict hot streets (Eck et al., 2005). Alternatively, analysts can plot
crime incident locations and match them to street layouts. Another
method to identify hot streets would be to join the points file to the
street segments file of the map (for those unfamiliar with joins, the
process essentially aggregates the count of incidents that occur within
a street segment). If geocoding is based on a street file, there will be
no issues. If geocoding is based on addresses, there will be an issue,
as many points will not overlay the street segments and hence not join
properly. One option is to set the join for an approximate distance
between the point and the street segment. This may cause the points
to be assigned to a street segment that is not part of the actual street
address. Careful review of these results is suggested. Once the points
and street segments are joined, there will be a count of points per
street segment. Analysts can display the hot streets by line width or
color of the street segments. This type of analysis assists in narrowing
the size of a targeted neighborhood or area of your jurisdiction police
district (Gwinn et al., 2008). Finally, recall that this technique is lim-
ited in that the boundaries are argued to be artificial and rarely reflect
actual criminal patterns.
Hot Areas
This approach involves determining the mean center of the series and
drawing rectangles or ellipses around the mean center showing the
areas that represent one or two standard deviations away from the
mean (Boba, 2009). They are drawn to demonstrate clusters of points
that would not be expected from random chance (Paynich and Hill,
2010).
Like choropleth mapping, a limitation to depicting hot spots using
ellipses is that hot spots are rarely depicted accurately with bounded
polygons (Eck et al., 2005; Paynich and Hill, 2010). However they can
be useful for making comparisons of hot spots across time (Paynich
and Hill, 2010). For example, an analyst can be tasked with evalu-
ating the effects of a police operation on a hot spot. As part of his
or her evaluation, the analyst creates standard deviation ellipses with
incident data before and after a police operation. The analyst can then
determine whether there was a reduction or displacement in crime.
‘near’ that cell divided by the area ‘around’ that cell, approximating the
concentration of activity” (Boba, 2009, p. 271). In other words, the cell’s
density value is an estimate and is influenced by incidents found within
the search radius placed on top of the grid cell (Boba, 2009).
Analysts searching for hot spots or high-crime areas can test for clus-
ters of points, lines, or polygons. There are at least two methods to
test for clustering: the nearest-neighbor index (NNI) and the test for
spatial autocorrelation:
1. Nearest-neighbor index: Test that compares the actual dis-
tribution of crime data with a randomly distributed data
set of the same sample size (Eck et al., 2005). For both
the actual and randomly distributed data sets, distances are
calculated between a point and its nearest neighbor. The
process is repeated for all of the points. The average dis-
tance is then calculated for both the actual and randomly
distributed sets. The NNI is the ratio between the average
distance for the actual data set and the random data set.
Overall, the results of the NNI test examine whether points
are closer than expected under spatial randomness (Eck et
al., 2005); one limitation, though, is that this test does not
directly point out where clusters are, but instead answers
272 C rIm e A n d In t el lI g en C e A n A lysIs
et al., 2005, p. 19). Like Moran’s I, the Geary’s C coefficient can also
be tested for significance (Eck et al., 2005). Results indicate positive
or negative spatial autocorrelation (Eck et al., 2005).
Over the past two decades, a series of rigorous evaluations have sug-
gested that police can be effective in addressing crime and disorder
when they focus on small units of geography with high rates of crime.
These areas are typically referred to as hot spots, and policing strate-
gies and tactics focused on these areas are usually referred to as hot
spots policing or place-based policing.
This place-based focus stands in contrast to traditional notions
of policing and crime prevention more generally, which have often
focused primarily on people. Police, of course, have never ignored
geography entirely. Police beats, precincts, and districts determine the
allocation of police resources and dictate how police respond to calls
and patrol the city. With place-based policing, however, the concern
is with much smaller units of geography than the police have typically
focused on. Places here refer to specific locations within the larger
social environments of communities and neighborhoods, such as
addresses, street blocks, or small clusters of addresses or street blocks.
Crime prevention effectiveness is maximized when police focus their
resources on these microunits of geography.
Hot spots policing covers a range of police responses that all share
in common a focus of resources on the locations where crime is highly
concentrated. Just as the definition of hot spots varies across studies
and contexts (from addresses to street segments to clusters of street
segments), so do the specific tactics police use to address high-crime
places. There is not one way to implement hot spots policing. The
approaches can range rather dramatically across interventions (Braga
et al., 2012).
conditions, the potential offenders realize that they will be (1) easily
recognized and (2) not tolerated (Newman, 1972).
In this chapter, we covered hot spots policing from history to iden-
tification to implications of locating where hot spots exist. At this
point, you should have an increased understanding of what hot spots
are, how crime analysts locate and identify hot spots, and the role of
tactical crime analysts in hot spots policing. In Chapter 13, you will
learn more about strategic crime analysis.
1. Could you make a case for the use of place in crime analysis
and the use of hot spots policing as a factor in the reduction of
crime in this country?
2. What is the difference between individual theories of crime
causation and geographic theories of crime causation?
Important Terms
References
Boba, R. (2005). Crime Analysis and Crime Mapping. Thousand Oaks, CA: Sage.
Boba, R. (2009). Crime Analysis with Crime Mapping. Thousand Oaks, CA:
Sage.
Braga, A. (2002). Problem-Oriented Policing and Crime Prevention. Monsey,
NY: Criminal Justice Press.
Braga, A. (2007). The effects of hot spots policing on crime. Campbell Systematic
Reviews. DOI: 10.4073/csr.2007.1.
Braga, A., Papachristos, A., and Hureau, D. (2012). Hot spots policing effects
on crime. Campbell Systematic Reviews 8. DOI: 10.4073/csr.2012.8.
Braga, A.A. (2006). The crime prevention value of hot spots policing. Psicothema
18(3): 630–637.
Brantingham, P.J., and Brantingham, P.L. (1981). Environmental Criminology.
Thousand Oaks, CA: Sage.
Brantingham, P.L., and Brantingham, P.J. (1993). Environment, routine and
situation: Toward a pattern theory of crime. Advances in Criminological
Theory 5: 259–294.
Bursik, R.J., Jr., and Grasmick, H.G. (1993). Neighborhoods and Crime: The
Dimensions of Effective Community Control. New York: Lexington Books.
Chainey, S.P., and Ratcliffe, J.H. (2005). GIS and Crime Mapping. London:
Wiley.
280 C rIm e A n d In t el lI g en C e A n A lysIs
Chainey, S.P., Reid, S., and Stuart, N. (2002). When is a hotspot a hotspot? A
procedure for creating statistically robust hotspot maps of crime. In G.
Higgs (ed.), Innovations in GIS 9 Socio-Economic Applications of Geographic
Information Science, London: Taylor and Francis, pp. 22–36.
Clarke, R.V. (1983). Situational crime prevention: Its theoretical basis and prac-
tical scope. Crime and Justice: An Annual Review of Research 4: 225–256.
Clarke, R.V., (1992). Situational Crime Prevention: Successful Case Studies.
Albany, NY: Harrow and Heston.
Clarke, R.V., and Felson, M. (eds.). (1993). Routine Activity and Rational
Choice. Advances in Criminological Theory. Vol. 5. New Brunswick, NJ:
Transaction Press.
Clarke, R.V., and Weisburd, D. (1990). On the distribution of deviance. In:
D.M. Gottfredson and R.V. Clarke (eds.), Policy and Theory in Criminal
Justice. Aldershot, UK: Avebury.
Cohen, L.E., and Felson, M. (1979). Social change and crime rate trends: A
routine activity approach. American Sociological Review 44: 588–605.
Cornish, D.B., and Clarke, R.V. (eds.). (1986). The Reasoning Criminal: Rational
Choice Perspectives on Offending. New York: Springer-Verlag.
Eck, J.E. (1994). Drug markets and drug places: A case-control study of the
spatial structure of illicit drug dealing. Unpublished Doctoral disserta-
tion, University of Maryland, College Park.
Eck, J.E. (1997). Learning from experience in problem-oriented policing
and situational prevention: The positive functions of weak evaluations
and the negative functions of strong ones. Crime Prevention Studies 14:
93–117.
Eck, J.E. (1998). Preventing crime by controlling drug dealing on private
rental property. Security Journal 11(4): 37–43.
Eck, J.E. (2002). Preventing crime at places. In L.W. Sherman, D. Farrington,
B. Welsh, and D. Layton MacKenzie (eds.), Evidence-Based Crime
Prevention, New York: Routledge, pp. 241–294.
Eck, J.E., Chainey, S.P., Cameron, J.G., Leitner, M., and Wilson, R.E. (2005).
Mapping Crime: Understanding Hot Spots. Washington, DC: National
Institute of Justice. Available at http://www.ojp.usdoj.gov/nij.
Eck, J.E., and Weisburd, D. (1995). Crime places in crime theory. Available
at http://www.popcenter.org/library/crimeprevention/volume_04/01-
eckweisburd.pdf
ESRI. (2009). Spatial autocorrelation (Morans I) (spatial statistics). Available
at http://webhelp.esri.com/arcgisdesktop/9.2/index.cfm?id=1692&pid
=1689&topicname=Spatial%20Autocorrelation%20(Morans%20I)%20
(Spatial%20Statistics).
Felson, M. (1986). Routine activities, social controls, rational decisions, and
criminal outcomes. In D. Cornish and R.V.G. Clarke (eds.), The Reasoning
Criminal. New York: Springer-Verlag.
Felson, M. (1994). Crime and Everyday Life: Insights and Implications for Society.
Thousand Oaks, CA: Pine Forge Press.
tAC tI C A l C rIm e A n A lysIs 2 81
Felson, M., and Clarke, R.V. (1998). Opportunity makes the thief: Practical
theory for crime prevention. Police Research Series. Paper 98. Available
at http://www.popcenter.org/library/reading/pdfs/thief.pdf.
Filbert, K. (2008). Targeting crime in hot spots and hot places. Geography and
Public Safety 1(1): 4–7.
Gorr, W.L., and Kurland, K.S. (2012). GIS Tutorial for Crime Analysis. Redlands,
CA: ESRI Press.
Gwinn, S.L., Bruce, C., Cooper, J.P., and Hick, S. (2008). Exploring Crime
Analysis: Readings on Essential Skills. (2nd ed) Overland Park, KS:
International Association of Crime Analysts.
Harries, K. (1999). Mapping Crime: Principle and Practice. NCJ 178919.
Washington, DC: National Institute of Justice.
Levine, N. (2010). CrimeStat: A Spatial Statistics Program for the Analysis
of Crime Incident Locations. Vol. 3.3. Houston, TX: Ned Levine and
Associates; Washington, DC: National Institute of Justice.
Levinson, D. (ed.). (2002). The Encyclopedia of Crime and Punishment. Thousand
Oaks, CA: Sage.
Martin, D., Barnes, E., and Britt, D. (1998). The multiple impacts of mapping
it out: Police, geographic information systems (GIS) and community
mobilization during Devil’s Night in Detroit, Michigan. In N. LaVigne
and J. Wartell (eds.), Crime Mapping Case Studies: Successes in the Field.
Washington, DC: Police Executive Research Forum, pp. 3–14.
Mitchell, A. (1999). The ESRI Guide to GIS Analysis. Redlands, CA:
Environmental Systems Research Institute.
National Institute of Justice. (2010). How to identify hot spots. Washington,
DC: National Institute of Justice, Office of Justice Programs. Available at
http://www.nij.gov/topics/law-enforcement/strategies/hot-spot-polic-
ing/pages/identifying.aspx.
Newman, O. (1972). Defensible Space. New York: Macmillan.
Paynich, R., and Hill, B. (2010). Fundamentals of Crime Mapping. Sudbury,
MA: Jones and Barlett.
Ratcliffe, J. (2004). Crime mapping and the training needs of law enforcement.
European Journal on Criminal Policy and Research 10: 65–83.
Reppetto, T. (1976). Crime prevention and the displacement phenomenon.
Crime and Delinquency 22: 166–177.
Sampson, R.J., and Groves, W.B. (1989). Community structure and crime:
Testing social disorganization theory. American Journal of Sociology 94(4):
774–802.
Shaw, C.R., and McKay, H.D. (1969). Juvenile Delinquency and Urban Areas.
Rev, ed. Chicago: University of Chicago Press.
Sherman, L., Gartin, P., and Buerger, M. (1989). Hot spots of predatory crime:
Routine activities and the criminology of place. Criminology 27: 27–56.
Sherman, L.W., and Weisburd, D. (1995). General deterrent effects of police
patrol in crime “hot spots”: A randomized, controlled trial. Justice Quarterly
12(4): 625–648.
282 C rIm e A n d In t el lI g en C e A n A lysIs
Skogan, W., and Frydl, K. (eds.). (2004). Fairness and Effectiveness in Policing:
The Evidence. Committee to Review Research on Police Policy and
Practices. Committee on Law and Justice, Division of Behavioral
and Social Sciences and Education. Washington, DC: The National
Academies Press.
Uchida, C.D., Swatt, M.L., Solomon, S.E., and Verano, S. (2013).
Neighborhoods and crime: Collective efficacy and social cohesion in
Miami-Dade County. Silver Spring, MD: Justice and Security Strategies,
Inc. Available at https://www.ncjrs.gov/pdffiles1/nij/grants/245406.pdf.
Verma, A., and Lodha, S.K. (2002). A typological representation of the crimi-
nal event. Western Criminology Review 3(2). Available at http://www.
westerncriminology.org/documents/WCR/v03n2/verma/verma.html.
Vold, G.B., and Bernard, T. (1986). Theoretical Criminology. New York: Oxford
University Press.
Vold, G.B., Bernard, T.J., and Snipes, J.B. (1998). Theoretical Criminology. 4th
ed. New York: Oxford University Press.
Weisburd, D., and Eck, J. (2004). What can police do to reduce crime, disorder,
and fear? Annals of the American Academy of Political and Social Science 593:
42–65.
Weisburd, D., and Green, L. (1994). Defining the street-level drug market. In
D. MacKenzie and C. Uchida (eds.), Drugs and Crime: Evaluating Public
Policy Initiatives. Thousand Oaks, CA: Sage, pp. 61–76.
Weisburd, D., and Green, L. (1995). Measuring immediate spatial displace-
ment: Methodological issues and problems. In J. Eck and D. Weisburd
(eds.), Crime and Place. Monsey, NY: Criminal Justice Press, pp. 349–361.
Weisburd, D., Maher, L., and Sherman, L. (1992). Contrasting crime general
and crime-specific theory: The case of hot spots of crime. In F. Adler and
W.S. Laufer, Advances in Criminological Theory. Vol. 4. New Brunswick,
NJ: Transaction Press, pp. 45–69.
Weisburd, D., Mastrofski, S., McNally, A.M., Greenspan, R., and Willis, J.
(2003). Reforming to preserve: Compstat and strategic problem solving
in American policing. Criminology and Public Policy 2, 421–456.
Wilson, J.Q., and Kelling, G.L. (1982). The police and neighborhood safety:
Broken windows. Atlantic Monthly, March: 29–38.
13
s tr ateg iC C rime a nalysis
Chapter Outline
Introduction
Strategic crime analysis and tactical crime analysis differ in that tac-
tical crime analysis looks at current crime patterns, whereas strate-
gic crime analysis examines long-term trends or chronic problems
in crime and disorder. Examining those long-term trends generally
takes longer and requires the analyst to collect his or her own data
instead of relying exclusively on police reports.
In Chapter 12, you learned about crime patterns, but now it is time
to learn about trends. A crime pattern is not a crime trend. In general,
crime trends are long-term increases and decreases in crime, or simply
changes in the characteristics of a crime over a period of time. Crime
trends can occur over months, years, decades, or even centuries, but
are rarely discussed in terms shorter than a month or longer than a
decade. Sometimes, they can be traced to a single cause (e.g., a new
shopping mall or a shortage of heroin), but at other times they have
s t r At egI C C rIm e A n A lysIs 287
Qualitative Methods
Strategic crime analysis is, then, the systematic study of crime and
disorder trends and problems in order to assist the police in crime and
disorder reduction, crime prevention, and evaluation. Crime analysis
is not haphazard or anecdotal; rather, it involves the application of
social science data collection procedures, analytical methods, and sta-
tistical techniques.
While crime analysts employ both qualitative and quantitative
data and methods, strategic crime analysts use qualitative data and
methods when they examine nonnumerical data for the purpose of
discovering underlying meanings and patterns of relationships. The
qualitative methods specific to crime analysis include
• Field research
• Content analysis
• Interviews
• Surveys
• Focus groups
• Environmental assessment
Field Research
Content Analysis
Interviews
Surveys
Surveys are the most frequently used mode of observation within the
social sciences, including criminology (Maxfield and Babbie, 1995).
Basically, survey research involves the collection of information from
a sample of individuals through their responses to questions (Schutt,
1999). Survey research can be carried out through mail or email, by
telephone, or in person.
Typically, surveys contain a combination of open- and close-ended
questions. Open-ended questions ask the respondent to provide an
answer to a particular question. For example, the respondent may be
asked, “What do you think is the most important problem facing resi-
dents in your neighborhood today?” Then, in his or her own words,
the respondent would provide his or her answer. On the other hand,
close-ended questions ask the respondents to select an answer from a
list of choices provided. For example, the question asked above would
read exactly the same, only now respondents are provided with a list
of options to choose from: “What do you think is the most important
problem facing residents in your neighborhood today? (a) Crime, (b)
drugs, (c) education, or (d) employment.”
s t r At egI C C rIm e A n A lysIs 293
Focus Groups
Environmental Assessment
Data analysis and field research will lead to some hypotheses or con-
clusions about a crime problem or a crime trend. The hypotheses or
s t r At egI C C rIm e A n A lysIs 295
In the SARA model, the strategic crime analyst will collect the
data, define the scope of the problem-solving effort, find an effec-
tive response, and set up the project so that it can be evaluated and
the police can learn from the results. This necessarily means that the
crime analyst is not waiting patiently by his computer for a unit in the
police department to ask for his or her help. Instead, the analyst is an
integral member of a team that will investigate and propose solutions
to crime trends.
In the following pages, we will describe the four stages of SARA,
a problem-oriented program to provide viable solutions to trends.
But first, we will provide further background on problem-oriented
policing.
It has become clear since the 1970s that effective police work
requires both focused attention and diverse approaches. The least
effective policing uses neither element (Clarke and Eck, 2005). The
explanation for this is also clear. If diverse approaches are used with-
out focus, it is difficult to apply the appropriate approach to the places
and people who most require it. If police are focused on hot spots,
but only enforce the law, they limit their effectiveness. A fully effec-
tive police agency must diversify its approaches to crime and disorder
(Clarke and Eck, 2005). That is, policing must address crime and
disorder using a greater range of tools than simply enforcing the law.
The second element necessary to highly effective policing is focus.
There is generally solid evidence that geographically concentrated
enforcement at crime or disorder hot spots can be effective, at least in
the short run (Clarke and Eck, 2005). That is, focused patrolling of
very small high-crime places (e.g., street corners and block faces) has
a modest effect on crime and a large effect on disorder. Also, if a few
individuals are responsible for most crime or disorder, then removing
them should reduce crime. Though sound in principle, the research
testing this idea is very poor, so we do not know whether repeat
offender programs work in actual practice, or if they are a seemingly
promising notion that cannot effectively be carried out. Certainly, we
know that mass incarceration has not worked to reduce crime and
produced many adverse side effects (Petersilia, 2011).
While mass incarceration has proven to be ineffective, so has much
of traditional policing. What this really means is that much police
work is carried out to meet public expectations, and this is of limited
s t r At egI C C rIm e A n A lysIs 297
value in controlling crime (Clarke and Eck, 2005). Today, the police
need to find new and better ways to control crime, while continuing
aspects of their traditional work that is still effective. The innova-
tions that have come along since the 1990s have been trying to do
just that. For instance, police leadership across the country has been
experimenting with CompStat, zero tolerance, community policing,
and, more recently, problem-oriented policing to get smarter about
controlling and preventing crime.
While crime analysts have a role in all these innovations, problem-
oriented policing thrusts them into the limelight and gives them an
important team function. Herman Goldstein originated the concept
of problem-oriented policing in a paper published in 1979. His idea
in “Improving Policing: A Problem-Oriented Approach” (Goldstein,
1979) was simple. That simple idea was this: policing should funda-
mentally be about changing the conditions that give rise to recur-
ring crime problems and should not simply be about responding to
incidents as they occur or trying to forestall them through preventive
patrols.
Goldstein stated that police officers find it demoralizing to return
repeatedly to the same place or to deal repeatedly with problems
caused by the same small group of offenders. They feel overwhelmed
by the volume of calls and rush around in a futile effort to deal with
them all. To escape from this trap, Goldstein said the police must
adopt a problem-solving approach in which they work through the
following four stages:
na
Pla
Ha
ger
en
ce
Off
Problem
Target/victim
Guardian
Formulating Hypotheses
You will note how the questions and hypotheses structure the
analysis. As you test each hypothesis, no matter what the results of
the testing, new, more specific questions will come to you. The objec-
tive is to start with broad questions and hypotheses and, through a
pruning process, come to a set of highly focused questions that point
to possible answers.
Hypotheses suggest the type of data to collect. In the carjackings at
service stations example, the test of each hypothesis requires specific
data. Sometimes, the same data can test multiple questions. In the end,
when enough data are collected and all of the questions are answered,
a strategy should present itself. Following our carjacking problem to a
conclusion, the analyst may decide, based on the data gathered, that
carjackings are most likely to occur at a small number of service sta-
tions, but only at certain hours of the night, and only when a small
number of staff are on duty. Furthermore, observation may tell the ana-
lyst that carjackings occur at these service stations only near gas pumps
where the lighting is very poor and when young people are allowed to
loiter both inside and outside of the service station. The analyst’s recom-
mended plan would include meeting with the city and the management
of the problem service stations and strongly recommending stricter reg-
ulation of young customers, improvement of the lighting at all pumps,
and that security staff be stationed outside the service stations.
Although this kind of problem-solving project may sound easy,
it is usually more complex and difficult. But in action research, the
analyst and others who constitute a team should persist until success
is achieved. That typically means refining and improving proposed
interventions in the light of what is learned from earlier experiences.
The process is not necessarily completed once the assessment has been
made. If the problem persists, or has changed its form, the analyst and
the team may have to start over. This is indicated by “Assessment” in
the SARA problem-solving process. Assessment may read to starting
over with “Scanning” (see Figure 13.1).
Final Report
In-house research, field research, and data analysis will generally lead
to a final report and recommendations to the police department com-
mand. When the hypotheses have been proposed and tested, and a
s t r At egI C C rIm e A n A lysIs 305
Scanning Analysis
Assessment Response
plan for amelioration of the crime trend or crime problem has been
decided, there must be a report to the police department’s command
so that action can be considered.
But, what kind of report should be written, and how should both
the data and the recommended solution be presented?
According to Christopher W. Bruce, an International Association
of Crime Analyst certified crime analyst, there are basically two kinds
of reports that come from strategic crime analysts. One is publications
that track and describe trends; the other is publications that analyze
crime problems (Bruce, 2008).
The publications that track and describe trends include periodic sta-
tistical reports that might be issued on a weekly, monthly, quarterly,
or annual basis. These periodic reports typically show increases and
decreases in crime, and ideally analyze the most important changes
(Bruce, 2008). On the other hand, reports that analyze problems usu-
ally combine police data with primary data collected by the analyst to
explore the underlying causes and recommended solutions of long-term
crime problems or crime trends. These, in fact, might be called “stra-
tegic analysis reports” or “problem analyses” (Bruce, 2008). In general,
these strategic analysis reports aim to assist long-term planning and
direct problem-solving efforts. Thus, they are written not for the gen-
eral public, but with the higher-level police administrators in mind.
The following is a sampling of the kinds of reports strategic crime
analysts might write:
306 C rIm e A n d In t el lI g en C e A n A lysIs
by age, sex, and race; and the report of any crime patterns at
specific locations.
• Compound problem report: This report gives information and
recommendations about the highest-level problems that stra-
tegic crime analysts face. These are crime problems or crime
trends that encompass various locations, offenders, and vic-
tims and, in many instances, exist throughout an entire juris-
diction. The analyst may end with a recommendation for a
tailored crime prevention response for the agency in order to
achieve a reduction in the problem.
• Three-year crime or disorder trend chart: This report evaluates
the success of crime reduction strategies overall, as well as
helps to identify emerging long-term problems. A three-year
crime trend chart may include a line chart that depicts the
frequency of a specific type of crime or disorder by month for
three years, as well as a trend line for the entire time period.
• Three-year seasonal crime or disorder trend chart: This report
identifies trends of seasonally reoccurring problems. It could
be a line chart that displays the frequency of a specific type of
crime or disorder by month, comparing each month with the
same month in the previous two years.
• Comparison crime trend chart: This report shows the success of
crime reduction strategies overall, as well as helps to identify
emerging long-term problems by comparing the jurisdiction’s
crime rate with that of other entities. The other entities could
be other jurisdictions, cities, or states. Often a line chart,
this report compares monthly or yearly rates (by population)
of specific crime types or disorders of the analyst’s jurisdic-
tion with those in other similar jurisdictions, the state, or the
nation.
• Change in crime or disorder density map: This report is a den-
sity map that compares two periods of time (baseline time
period and target time period) and displays areas where the
selected crime or disorder has increased or decreased. This
report could also use other kinds of maps, such as a graduated
area map (a map that consists of aggregated data displayed in
groupings with visual variables used to denote specific data).
These groupings can be graduated by size or by color, and
308 C rIm e A n d In t el lI g en C e A n A lysIs
The final goal of crime analysis is to help with the evaluation of police
efforts by determining the level of success of programs and initiatives
implemented to control and prevent crime and disorder, and measur-
ing how effectively police organizations are run. In recent years, local
police agencies have become increasingly interested in determining
the effectiveness of their crime control and prevention programs.
Furthermore, strategic crime analysts also assist police departments
in evaluating internal organizational procedures, such as resource
allocation (i.e., how officers are assigned to patrol areas), realign-
ment of geographic boundaries, the forecasting of staffing needs,
and the development of performance measures. Police agencies keep
s t r At egI C C rIm e A n A lysIs 309
Important Terms
References
Bruce, C.W. (2008). Crime analysis publications. In S.L. Gwenn, C. Bruce,
J.P. Cooper, and S.R. Hick (eds.), Exploring Crime Analysis: Reading on
Essential Skills. Overland Park, KS: International Association of Crime
Analysts, pp. 342–363.
Canter, P.R. (2000). Geographic information systems and crime analysis in Baltimore
County, Maryland. In Weisburd, D. and McEwen, J.T. (eds.), Crime Mapping
and Crime Prevention. Monsey, NY: Criminal Justice Press, pp. 157–190.
Center for Problem-Oriented Policing. (2015). Learn if the 80-20 rule applies.
Albany, NY: Center for Problem-Oriented Policing. Available at http://
www.popcenter.org/learning/60steps/index.cfm?stepNum=18.
Clarke, R., and Eck, J. (2005). Crime Analysis for Problem Solvers: In 60 Small
Steps. Washington, DC: U.S. Department of Justice, Office of Community
Oriented Policing.
Eck, J.E., and Spelman, W. (1987). Problem-oriented policing. Research in
Brief. Washington, DC: National Institute of Justice. Available at https://
www.ncjrs.gov/pdffiles1/Digitization/102371NCJRS.pdf.
Fritz, N.J., Baer, S., Helms, D., and Hick, S.R. (2008). Qualitative analysis. In
S.L. Gwenn, C. Bruce, J.P. Cooper, and S.R. Hick (eds.), Exploring Crime
Analysis: Reading on Essential Skills. Overland Park, KS: International
Association of Crime Analysts, pp. 128–157.
s t r At egI C C rIm e A n A lysIs 313
Chapter Outline
315
316 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
will vary as well. The audiences that administrative crime analysts may
be preparing a presentation for can be police executives, city council,
media, citizens, and neighborhood groups, or a combination of these
audiences. The type of information prepared and presented should
be appropriate for the intended audience. However, in all instances,
the information should be simple, clear, and concise and should not
disclose sensitive information (Boba, 2001).
Since there is an eclectic selection of administrative and statistical
reports, research, and other projects not focused on the immediate
or long-term reduction or elimination of a pattern or trend, reports
and presentations can be diverse. Here are more examples of the
type of product the administrative crime analyst might expect to be
asked to produce, along with the audience for which the product is
intended:
PRODUCT AUDIENCE
Report on demographic changes in the jurisdiction Police administration/city council
Historical research project on crime during the College lecture/city council
Prohibition period
Miscellaneous crime statistics to support grant Police agency/city grant writers
applications
Preparation of Uniform Crime Reports or Incident- Police administration/FBI
Based Reporting System (IBRS) reports
Creation of charts and graphs to support the chief’s Chief of police/city council
year-end summary of police activities presentation
to the city council
Creation of patrol deployment maps for a special Police administration/mayor/city council
event
List of individuals with warrants by police beat and Police command
seriousness of offense
Charts and maps showing trends in business Police command/business association/
robberies during past six months mayor/city council
Statistics on a series of residential break-ins and Police command/city council/neighborhood
rapes association
Homicides and burglaries during the past two years Police administration/mayor/city council/
in the city citizen groups
Presentation on police–community relations City council/citizen groups
crime and disorder have on the city and the citizens. At times, the
police administration and city council will request long-range com-
parisons (quarterly, semiannually, or annually) of various categories of
crime in the city.
While a great deal of the data that administrative crime analysts may
use in preparing reports and presentations may come from the data
contained in police files, because of the nature of many of the products
of the administrative crime analyst, qualitative information is often
useful.
For example, if the analyst was asked to put together a presenta-
tion on police–community relationships over the past three years,
there may be just a few traditional police reports related to this assign-
ment. If there were reports about incidents in which the police were
the target of violent protests, or if there were formal complaints to the
department about police brutality, the analyst may be able to find those
reports and use them as data. However, in order to put together a more
comprehensive report, the analyst may need to use qualitative meth-
ods, such as interviews, focus groups, researching archived newspaper
stories, or reading public email forums or blogs by local residents.
The analyst may interview patrol officers or officers who might work
in the community policing unit. Asking them questions and getting
their candid views of the state of police–community relations and how
320 C rIm e A n d In t el lI g en C e A n A lysIs
it has changed over the past three years may yield valuable insights.
Similarly, putting together focus groups of police officers or commu-
nity leaders may also produce important observations and recommen-
dations. However, newspapers usually have their fingers on the pulse
of the community, and exploring newspaper stories and editorials over
the past three years may give the analyst a broad perspective of how
the police are viewed by the community.
Newspapers and news broadcasts, as well as Internet forums and
blogs, are likely to show with much more insight what is important to
the citizens in the local community. Then, after gathering information
about what has been printed or said in Internet forums or blogs, the ana-
lyst can compare this with the messages, mission statements, and stated
goals of the police administration to provide an accurate picture of what
the true state of police–community relations is at present, what it’s been
over the past three years, and what still needs to be done to improve it.
In regard to the qualitative research method to gather the kinds of
data we have used in this example, the analyst should have access to
LexisNexis as a comprehensive database. If there are certain Internet
blogs that would provide a steady stream of possible useful informa-
tion, the analyst might best follow them. To find those blogs in the
first place, there are Google directions for doing so at https://support.
google.com/blogger/answer/104226?hl=en. In addition, an analyst
can figure out what topics are trending using Twitter or other tools:
http://blog.hootsuite.com/5-ways-find-trending-topics/. Finally,
there is a database called iPoll that can be searched by topic to find
opinion polls on all kinds of subjects from many different sources
(https://ropercenter.cornell.edu/CFIDE/cf/action/ipoll/index.cfm).
but also educate the public with visual information to clarify crime
concerns and enlist community action.
Like the rest of society, police departments must make use of the
Internet and social media these days to communicate with the com-
munity. While there may be some disadvantages to using the Internet
to communicate with the public (it is impersonal and requires resources
to keep updated), the benefits, many police departments have decided,
outweigh any potential drawbacks.
Police departments, with presentations developed by crime ana-
lysts, can do much to communicate important information to citizens.
This kind of information dissemination can include lists or maps of
criminal activities in particular neighborhoods, recommendations for
public safety, current or ongoing dangerous situations, or emergency
alerts.
Below is an example of an administrative crime analysis report.
This report was prepared for the administration of a police depart-
ment that wanted more information about the use of tasers by the
officers in the department in order to properly respond to questions
from the city council about taser usage.
TASER Number in
Year model service
2015 X2 218
2014 X2 235
2013 X2 82
2012 X26 90
2011 X26 80
2010 X26 68
2009 M26 - X26 60
2008 M26 48
2007 M26 59
2006 M26 58
2005 M26 48
2004 M26 35
2003 M26 35
No Yes
Upper limb 90.0% 2.2%
Lower limb 69.0% 18.6%
Back torso 47.3% 38.2%
Front torso 44.3% 35.2%
Missed subject 89.0% 4.5%
Taser use was threatened 89.0% 1.6%
Hospitalization:
Table 4: Hospitalization, compared to injuries suffered during the SRR. Note, all persons
injured were either admitted to the hospital, treated and released, or refused treatment
(with one unknown and one deceased).
This administrative crime analysis reports provides information about taser usage
by police officers which may help lead to administrative policy decisions.
A d mInIs t r AtI v e C rIm e A n A lysIs 323
Next Chapter
In Chapter 15, you will learn about a final type of crime analysis:
operations crime analysis.
Important Terms
References
Boba, R. (2001). Introductory Guide to Crime Analysis and Mapping. Washington,
DC: Community Oriented Policing Office, U.S. Department of Justice.
Available at http://ric-zai-inc.com/Publications/cops-w0273-pub.pdf.
A d mInIs t r AtI v e C rIm e A n A lysIs 325
Chapter Outline
327
328 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
The techniques associated with these processes are varied, but basi-
cally involve police records, Federal Bureau of Investigation (FBI)
data, and several qualitative research methods.
330 C rIm e A n d In t el lI g en C e A n A lysIs
Analysts might solicit and collect documents from the police agency
related to strategic plans, personnel staffing and deployment, evalu-
ations, training records, and performance statistics. These kinds of
documents will be helpful for the analyst to determine whether there
is adequate staff (particularly at critical times of the day or night),
whether officers are deployed to hot spots, whether officers are being
adequately trained for the duties they are expected to carry out, and
whether the performance evaluations are utilized to make personnel
decisions.
Finally, observations can be carried out by the analyst to see how
patrol officers carry out their assignments, whether special enforce-
ment duties are done, how officers handle special event assignments,
how detectives work investigations, and how trainings are conducted.
Examples of Recommendations
Important Terms
References
Bruce, C.W. (2008). Crime analysis publications. In S.L. Gwenn, C. Bruce,
J.P. Cooper, and S.R. Hick (eds.), Exploring Crime Analysis: Reading on
Essential Skills. Overland Park, KS: International Association of Crime
Analysts, pp. 342–363.
ICMA (International City/County Management Association). (2012). Police
operations analysis and data analysis. Washington, DC: ICMA. Available
at http://www.ci.royal-ak.mi.us/sites/default/files/meetings/City%20
Commission/2012/RO%20Police%20Final%20Report.pdf.
ICMA (International City/County Management Association). (2014).
Operations analysis report for the Skokie Police Department.
Washington, DC: ICMA. Available at http://www.egovlink.com/public_
documents300/skokie/published_documents/Police%20Department/
Police_Operations_Analysis_Report.pdf.
IACA (International Association of Crime Analysts). (2014). Definition and
types of crime analysis. Standards, methods and technology methods.
White Paper 2014-02. Overland Park, KS: International Association of
Crime Analysts.
Part V
C rime
a nalysis and
the Future
16
C rime a nalysis and the
Future o F P oli Cin g
Chapter Outline
339
340 C rIm e A n d In t el lI g en C e A n A lysIs
Introduction
This book has been about the past—and the future—of American
policing. In many ways, the future of policing is here today. In other
ways, we can only imagine at this point what we will have the capac-
ity to do in the future. But what we do know is that crime fighting
and policing are rapidly changing and discovering new and innovative
ways to make communities safer while being better able to predict
crime, respond to emergency situations, and make the lives of crimi-
nal offenders more perilous.
We have written at various times in this book that routine activi-
ties theory and environmental approaches to crime prevention pay
off dividends in terms of preventing crime—rather than invest-
ing time and resources in crime detection and apprehension of
offenders.
As you will recall, routine activities theory holds that crime
takes place when a motivated offender and a suitable target coincide
C rIm e A n A lysIs A n d t he f u t ure o f P o lI CIn g 3 41
Are you thinking about becoming a crime analyst after you leave col-
lege? Do you have what it takes to be a competent crime analyst?
Opinions differ somewhat concerning what makes a “good” crime
analyst. And what some people believe makes for a good crime ana-
lyst may differ depending on their experience and background. Some
crime analysts who were formerly police officers may hold the notion
that a good analyst should be a police officer first. A civilian ana-
lyst may, on the other hand, believe that an analyst needs to be free
C rIm e A n A lysIs A n d t he f u t ure o f P o lI CIn g 343
Here are two announcements for crime analyst jobs we found recently.
The first comes from the website Monster.com and concerns a crime
analyst position opening in West Allis, Wisconsin:
Crime Analyst I
* The Wisconsin Retirement Fund and Life Insurance program benefits are provided
according to plan guidelines of the State of Wisconsin Department of Employee
Trust Funds.
C rIm e A n A lysIs A n d t he f u t ure o f P o lI CIn g 3 47
About the department: The City of San Jose, the Capital of Silicon
Valley, is one of the nation’s best managed cities and one of the top
ten cities in which to live, work, and do business. Moreover, San
Jose is the center of cultural, government and economic activity for
the region. The employees of the City of San Jose have embraced the
following values: Integrity, Innovation, Excellence, Collaboration,
Respect and Celebration. The San Jose Police Department is seek-
ing an individual whose values align with the values of the City’s
employees. The mission of the San Jose Police Department is
to create safe places to live, work and learn through community
partnerships.
Position and duties: The San Jose Police Department (SJPD) is
recruiting to fill a Crime Analysis Program Manager in the Research
and Development Unit (R&D). R&D is in the Office of the Chief
of Police and is responsible for research and preparation of complex
reports and specialized projects involving inter-Departmental issues
and intergovernmental topics. The Crime Analysis team analyzes
crime data, produces crime-related reports, and ensures accurate
and timely reporting of crime data to the Department of Justice, the
Federal Bureau of Investigation, other City departments and police
management.
Under the direction of a Lieutenant, the Crime Analysis Program
Manager is responsible for managing all functions of the Crime
Analysis Unit by performing work of considerable difficulty in plan-
ning, coordinating, and directing the utilization of complex comput-
erized systems for crime analysis functions; insures the accuracy and
integrity of the various databases; provides management support and
specialized expertise to users of crime data, systems analysts, and oper-
ations personnel.
348 C rIm e A n d In t el lI g en C e A n A lysIs
Minimum qualifications:
You will be prompted to answer the following job-specific questions during the
online application process:
you managed for the program, and include the level and scope
of all other related responsibilities.
• Do you have experience in summarizing statistics into accu-
rate, well-organized, written reports or correspondence? If so,
please describe the nature of the reports and to whom they
were presented or ultimately utilized.
As is evident from these two crime analyst job postings, the job
market is varied in terms of different types of positions available and
with divergent salary ranges. However, as is also readily apparent
from these job descriptions, the skills and qualifications for a crime
analyst can be analyst are extensive and broad.
352 C rIm e A n d In t el lI g en C e A n A lysIs
analysis and crime analysis more effectively (Peed et al., 2008). In one
study, Taylor et al. (2013) found that while most police agencies have
at least one staff member conducting crime analysis, and while most
police departments consider crime analysis a priority and critical to
achieving the agency mission, there still is much work to be done to
bring about an integrated approach within police organizations to make
crime analysis an important part of how patrol operates. Taylor et al.
discovered that few patrol officers make use of crime analysis or have
contact with crime analysis personnel, many police agencies have no
feedback mechanism for the impact of crime analysis, and analysts only
infrequently make use of opportunities (e.g., roll call briefings or ride-
alongs) to better understand the operations and culture of patrol (Taylor
et al., 2013).
Other research suggests that training for both intelligence analysts
and crime analysts is often inadequate and limited (Peed et al., 2008).
However, development of what Peed et al. describe as an integrated
crime analysis model is not out of reach, given the right leadership
direction and proper resources and training. They recommend that
police management should tailor crime analysis training to support
the specific missions and products most needed by command staff
members and line officers.
Although many law enforcement administrators and managers have
not yet fully grasped the full potential of what skilled crime analysts
can do, and they have not quite figured out how to apply crime ana-
lyst skills effectively and efficiently, ultimately we believe that police
departments will come to appreciate the extraordinary benefits of
crime analysis. By making greater use of crime analysts working in
RTCCs or fusion centers, the services of crime analysts will enhance
the safety and efficiency of the police to better serve and protect their
communities.
Important Terms
References
Bond, M. (2015). Crime mapping technology and its impact on law enforce-
ment intelligence. In Public Safety. Available at http://inpublicsafety.
com/2015/01/crime-mapping-technology-and-its-impact-on-law-
enforcement-intelligence/.
Clark, M. (2013). Are you ready for the future of policing? Police: The Law
Enforcement Magazine. Available at http://www.policemag.com/blog/
technology/story/2013/12/future-trends-in-accelerating-technology-
conference.aspx.
FBI. (2014). Crime in the United States, 2013. Uniform Crime Report. FBI.
Available at https://ucr.fbi.gov/crime-in-the-u.s/2013/crime-in-the-
u.s.-2013/offenses-known-to-law-enforcement/clearances/clearanc-
etopic_final.pdf.
C rIm e A n A lysIs A n d t he f u t ure o f P o lI CIn g 359
3 61
362 In d e x
Criminal justice, data mining in, Department of Justice, 9, 23, 27, 34,
181– 183 35, 82, 347
machine learning, 181– 182 Department of Motor Vehicles, 170
neural network, 183 Detroit Police Department, 8
statistical, 181 Developmental, and life course
Criminal Justice Information theories, 62
Services (CJIS), 27, 29 Devil’ s Night period, 265
Criminal offending, 63 Differential association, 60
Criminal personality theory, 65 Dinkins, David, 200
Critical/radical criminology, 61 DIR, see Domestic incident report
Critical thinking, 239 (DIR)
Direct, and circumstantial evidence,
D’ Amico, Joseph, 151 133– 134
Darwin, Charles, 57 Disorder density map, 307
Data collection, and storage, 43, 45 Disruptive behavior disorder, 59
Data mining, and intelligence, Dissemination stage, 156
156– 157, 175– 190 DNA testing, 353
analytical systems, 179– 180 Dolree Mapp, 105
computer-based transaction Domestic incident report (DIR), 158
processing, 178– 179 Dot map, 264
in criminal justice, 181– 183 Drug Enforcement Administration
machine learning, 181– 182 (DEA), 139
neural network, 183 Drug problem, 8
statistical, 181 Dual kernel density interpolation,
overview, 176– 177 269
relationships, 183– 188 Durkheim, Emile, 57
associations, 186– 187
clusters, 184– 186 Early theories, 55– 56
entity extractions, 184 Eck, John, 198, 227, 287, 298
sequentials, 187– 188 Edges, 261
role of information technology Edward I, King, 11, 81
and transaction processing, 80/20 analysis report, 306
179 Ellipse, and choropleth maps,
working, 177– 178 264– 265
Davis, Robert, 339 EntityCube, 184
DEA, see Drug Enforcement Entity extractions, 184
Administration (DEA) Environmental assessment, 294
Defective intelligence, 59 Environmental criminology, 252,
Density analysis, 268 258
Department of Corrections, 171 Environmental Protection Agency,
Department of Criminal Justice 171
Services, 212 Escobedo, Danny, 112
In d e x 367
NOPD, see New Orleans Police PERF, see Police Executive Research
Department (NOPD) Forum (PERF)
NSA, see National Sheriffs’ Personal crimes, 36
Association (NSA) Phoenix Police Department, 232
NSDUH, see National Survey on Photographing, 102
Drug Use and Health Pinkerton detective agency, 100
(NSDUH) Place-based policing, see Hot spots
NYPD, see New York City Police policing
Department (NYPD) Planning stage, 154
Point pattern analysis, 271
Police, and law enforcement, 79– 97
Obama, Barack, 7
criminal investigations, 92
Office of Justice Programs, 23
dual system of, 84– 85
Office of National Drug Control
first, departments, 85– 86
Policy (ONDCP), 39
investigative process, 92
Office of Science and Technology,
investigator, 92– 95
204
eras of police reform leading
Oliver, W.M., 86
to change, 93– 94
Omnibus Appropriations Act, 203
CompStat, 94– 95
Omnibus Crime Control and Safe
patrol function, 90– 91
Streets Act, 23
peacekeeping and order
On Crimes and Punishment , 11, 56
maintenance, 91
ONDCP, see Office of National
research on policing and
Drug Control Policy
prevention of crime, 87– 88
(ONDCP)
response to crimes, 81– 82
Ontario Police Department, 328
role of police officers, 88– 89
OOVOC, see Our Own Version of
state/federal, 82– 83
CompStat (OOVOC)
traffic enforcement functions, 91
Operations analysis, 331
transitional policing, 86– 87
Oppositional defiant disorder, 59
in 2000s, 95
The Origin of Species , 57
Police Administration , 196
Our Own Version of CompStat
Police Executive Research Forum
(OOVOC), 238
(PERF), 34, 339
Police investigations, in twenty-first
PACER, 171 century, 99– 119
Park, Robert, 252 criminal investigation and
Pat-down search, 109 intelligence, 113– 117
Paths, 261 exceptions to search warrant
Patrol, 237 rule, 106– 110
function, 90– 91 consent to search, 108
saturation index, 333 exigent circumstances, 108
Pattern recognition, 63 good faith exception, 110
Peel, Sir Robert, 11, 196, 197, 201 plain-view searches, 107– 108
In d e x 3 73