ABSTRACT
This paper looks at the use of a Self Organizing Map (SOM), to link of records of crimes of serious sexual attacks. Once linked a profile can be derived of the offender(s) responsible.The data was drawn from the major crimes database at the National Crime Faculty of the National Police Staff College Bramshill UK. The data was encoded from text by a small team of specialists working to a well-defined protocol. The encoded data was analyzed using SOMs. Two exercises were conducted. These resulted in the linking of several offences in to clusters each of which were sufficiently similar to have possibly been committed by the same offender(s). A number of clusters were used to form profiles of offenders. Some of these profiles were confirmed by independent analysts as either belonging to known offenders or appeared sufficiently interesting to warrant further investigation.The prototype was developed over 10 weeks. This contrasts with an in-house study using a conventional approach, which took 2 years to reach similar results. As a consequence of this study the NCF intends to pursue an in-depth follow up study.
- 1.Adderley, R., Musgrove, P. B., (1999), Data mining at the West Midlands Police: A study of bogus official burglaries. BCS Special Group Expert Systems, ES99, London, Springer-Verlag, pp191-203Google Scholar
- 2.Adderley, R., Musgrove, P.B, (2001), Police crime recording and investigation systems, a user's view. Policing An International Journal of Police Strategies and Management, 24(1), ppl00-114.Google ScholarCross Ref
- 3.Brantingham, P.L., Brantingham, P.L,. (1991), Notes on the geometry of crime, in Environmental Criminology, USA: Wavelend Press Inc.Google Scholar
- 4.Canter, D., Heritage, R., (1990), A multivariate model of sexual offence behaviour: Developments in offender profiling I. The Journal of Forensic Psychiatry, 1(2), pp185-212.Google ScholarCross Ref
- 5.Canter, D., Larkin, P., (1993), Environmental range of serial rapists. Journal of Environmental Psychology, 13 pp63-69.Google ScholarCross Ref
- 6.Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, Rudiger (2000) CRISP-DM 1.0 Step-by-step data mining guide, USA: SPSS Inc. CRISPWP-0800 2000.Google Scholar
- 7.Davies, A., (1992), Rapists' behaviour: A three aspect model as a basis for analysis and the identification of serial crime. Forensic Science International, 55 pp173-194.Google ScholarCross Ref
- 8.Hazelwood, R. R., Reboussin, R., Warren, J. I. (1989), Series Rape: Correlates of increased aggression and the relationship of offender pleasure to victim resistance. Journal of lnterpersonal Violence 4 pp65- 78.Google ScholarCross Ref
- 9.Kohonen, T. (1984), Self-organisation and associative memory, Springer series in information sciences, Vol 8. Springer Verlag, New York, USA, 1984 Google ScholarDigital Library
- 10.LeBeau, J.I., (1987), Patterns of stranger and serial rape offending: Factors distinguishing apprehended and at large offenders. Journal of Criminal Law and Criminology 78 pp309-326.Google ScholarCross Ref
- 11.Rhodes, W.M., Conly, C., (1991), The criminal commute: A theoretical perspective in Environmental Criminology, USA: Wavelend Press Inc.Google Scholar
- 12.Weiss, S.M., Indurkhya, N., (1998), Predictive data mining: a practical guide. San Francisco, USA: Morgan Kaufman Publishers Inc. Google ScholarDigital Library
Index Terms
- Data mining case study: modeling the behavior of offenders who commit serious sexual assaults
Recommendations
Predicting burglars’ risk exposure and level of pre-crime preparation using crime scene data
OBJECTIVES:The present study aims to extend current research on how offenders’ modus operandi (MO) can be used in crime linkage, by investigating the possibility to automatically estimate offenders’ risk exposure and level of ...
General crime from the data mining point of view. A systematic literature review
In recent decades, crime has become an issue of great concern to nations, which is why there is significant progress in the development of investigations in different areas. The literature review considers the data mining techniques applied to crime ...
Mining Criminal Networks from Chat Log
WI-IAT '12: Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, cyber threatening, blackmail, and drug trafficking. One way to fight cyber crime is ...
Comments