The Use of Data Mining Techniques in Crime Trend Analysis and Offender Profiling

The aim of this project is to ascertain whether the data in existing Police recording systems can be used by existing mature data mining techniques in an efficient manner to achieve results that are more accurate than those achieved by Police specialists when analysing crime. The Police Service has no formalised methodology of recording and analysing crime data and it is incumbent on each Force to train and develop appropriate personnel to provide operational analysis. Police data is inconsistent and, frequently, incomplete making the task of formal analysis far more difficult and current analytical practices are semi-manual and time consuming producing results of limited accuracy. These analytical processes would benefit from using data mining techniques within a structured approach as discussed within this thesis. The usage of supervised and unsupervised learning techniques within a structured methodology to mining Police data is evaluated. The research demonstrates that data mining techniques can be successfully used in operational policing. High volume crimes such as burglary that have been committed by one or more known offenders can be classified and the model used to attribute currently undetected crimes to one or more of those known offenders. Burglary crimes that previously had no overt relationship and the identity of the offender is unknown can be clustered with the ability to suggest one or more offenders who may be responsible for committing the crime. The same techniques used in analysing high volume crime can be used to link low volume major crimes such as serious sexual assaults. The recognised benefits include an improvement in the accuracy of results over current semi-manual processes and a reduction in the time taken to achieve those results.

[1]  Agnar Aamodt,et al.  Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..

[2]  William Frawley,et al.  Knowledge Discovery in Databases , 1991 .

[3]  Eli B. Silverman NYPD Battles Crime: Innovative Strategies in Policing , 1999 .

[4]  Janet I. Warren,et al.  Serial Rape , 1989 .

[5]  Charles E. Taylor Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. Complex Adaptive Systems.John H. Holland , 1994 .

[6]  Jozef Zurada,et al.  Next Generation of Data-Mining Applications , 2005 .

[7]  Sholom M. Weiss,et al.  Predictive data mining - a practical guide , 1997 .

[8]  Hsinchun Chen,et al.  Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.

[9]  J. Ross Quinlan,et al.  Bagging, Boosting, and C4.5 , 1996, AAAI/IAAI, Vol. 1.

[10]  A. Davies,et al.  Rapists' behaviour: a three aspect model as a basis for analysis and the identification of serial crime. , 1992, Forensic science international.

[11]  Alfred Blumstein,et al.  Delinquency Careers: Innocents, Desisters, and Persisters , 1985, Crime and Justice.

[12]  Heikki Mannila,et al.  Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.

[13]  Kamal Dahbur,et al.  Classification System for Serial Criminal Patterns , 2003, Artificial Intelligence and Law.

[14]  Pieter Adriaans,et al.  Data mining , 1996 .

[15]  Anna Tulkki Real Estate Investment Appraisal of Buildings using SOM , 1998 .

[16]  Kate Smith-Miles,et al.  An analysis of customer retention and insurance claim patterns using data mining: a case study , 2000, J. Oper. Res. Soc..

[17]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[18]  Edward C. Ratledge,et al.  Handbook on Artificial Intelligence and Expert Systems in Law Enforcement , 1989 .

[19]  Hsinchun Chen,et al.  Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.

[20]  B. Bryan,et al.  VISUALISING THE SPATIO-TEMPORAL PATTERNS OF MOTOR VEHICLE THEFT IN ADELAIDE, SOUTH AUSTRALIA , 2000 .

[21]  R. Shortland,et al.  Digging for gold [data management] , 1995 .

[22]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[23]  Tao Guo,et al.  Neural data mining for credit card fraud detection , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[24]  Gang Wang,et al.  Automatically detecting deceptive criminal identities , 2004, CACM.

[25]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[26]  Alex Alves Freitas,et al.  Understanding the crucial differences between classification and discovery of association rules: a position paper , 2000, SKDD.

[27]  James L. Lebeau Patterns of Stranger and Serial Rape Offending: Factors Distinguishing Apprehended and at Large Offenders , 1987 .

[28]  R. Lucas An Expert System to Detect Burglars using a Logic Language and a Relational Database , 1986, BNCOD.

[29]  Thomas Reinartz,et al.  CRISP-DM 1.0: Step-by-step data mining guide , 2000 .

[30]  T. Kohonen,et al.  Visual Explorations in Finance with Self-Organizing Maps , 1998 .

[31]  Nigel Coles,et al.  It's Not What You Know-It's Who You Know that Counts. Analysing Serious Crime Groups as Social Networks , 2001 .

[32]  Richard Adderley,et al.  Data Mining at the West Midlands Police: A Study of Bogus Official Burglaries , 2000 .

[33]  Jon M. Kleinberg,et al.  A Microeconomic View of Data Mining , 1998, Data Mining and Knowledge Discovery.

[34]  Lalit M. Patnaik,et al.  Genetic algorithms: a survey , 1994, Computer.

[35]  Dean Abbott,et al.  An evaluation of high-end data mining tools for fraud detection , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[36]  T. Kohonen Self-organized formation of topology correct feature maps , 1982 .

[37]  Dorian Pyle,et al.  Data Preparation for Data Mining , 1999 .

[38]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[39]  Richard Adderley,et al.  Modus Operandi Modelling of Group Offending: A Data-Mining Case Study , 2003 .

[40]  Marcus Felson,et al.  Routine Activities and Crime Prevention: : Armchair Concepts and Practical Action , 1992 .

[41]  Guido Deboeck Picking Mutual Funds with Self-Organizing Maps , 1998 .

[42]  Alfred Ultsch,et al.  Self-Organizing-Feature-Maps versus Statistical Clustering Methods: A Benchmark , 1994 .

[43]  David V. Canter,et al.  A multivariate model of sexual offence behaviour: Developments in ‘offender profiling'. I. , 1990 .

[44]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[45]  Ronald J. Brachman,et al.  The Process of Knowledge Discovery in Databases , 1996, Advances in Knowledge Discovery and Data Mining.

[46]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[47]  B. Klevecz THE WHOLE EST CATALOG : COMPUTATIONAL ANALYSIS OF COMPLEXITY IN GENE EXPRESSION ARRAYS , 1999 .

[48]  D. Broomhead,et al.  Radial Basis Functions, Multi-Variable Functional Interpolation and Adaptive Networks , 1988 .

[49]  Cao Feng,et al.  STATLOG: COMPARISON OF CLASSIFICATION ALGORITHMS ON LARGE REAL-WORLD PROBLEMS , 1995 .

[50]  Christophe G. Giraud-Carrier,et al.  Characterising Data Mining software , 2003, Intell. Data Anal..

[51]  Self-Organizing Maps (SOM): a clustering neural method for urban analysis , 2001 .

[52]  Richard Adderley,et al.  Data mining case study: modeling the behavior of offenders who commit serious sexual assaults , 2001, KDD '01.

[53]  G Cheng,et al.  Outlier management in intelligent data analysis. , 2002 .

[54]  Michael Brady,et al.  Learning Shape Descriptions , 1985, IJCAI.

[55]  Patricia L. Brantingham,et al.  Environmental Criminology: From Theory to Urban Planning Practice , 1998 .

[56]  Kevin Swingler,et al.  Applying neural networks - a practical guide , 1996 .

[57]  Bruce H. Mayhew,et al.  Baseline models of sociological phenomena , 1984 .