Building Multi-modal Crime Profiles with Growing Self Organising Maps

Profiling is important in law enforcement, especially in understanding the behaviours of criminals as well as the characteristics and similarities in crimes. It could provide insights to law enforcement officers when solving similar crimes and more importantly for pre-crime action, which is to act before crimes happen. Usually a single case captures data from the crime scene, offenders, etc. and therefore could be termed as multi-modality in data sources and subsequently has resulted a complex data fusion problem. Traditional criminal profiling requires experienced and skilful crime analysts or psychologists to laboriously associate and fuse multi-modal crime data. With the ubiquitous usage of digital data in crime and forensic records, law enforcement has also encountered the issue of big data. In addition, law enforcement professionals are always competing against time in solving crimes and facing constant pressures. Therefore, it is necessary to have a computational approach that could assist in reducing the time and efforts spent for the laborious fusion process in profiling multi-modal crime data. Besides obtaining the demographics, physical characteristics and the behaviours of criminals, a crime profile should also comprise of crime statistics and trends. In fact, crime and criminal profiles are highly interrelated and both are required in order to provide a holistic analysis. In this chapter, our approach proposes the fusion of multiple sources of crime data to populate a holistic crime profile through the use of Growing Self Organising Maps (GSOM).

[1]  John Charles Focus: AI and Law Enforcement , 1998, IEEE Intell. Syst..

[2]  Dennis Howitt Forensic and criminal psychology , 2002 .

[3]  Richard Adderley,et al.  Data mining case study: modeling the behavior of offenders who commit serious sexual assaults , 2001, KDD '01.

[4]  Saman K. Halgamuge,et al.  A self-growing cluster development approach to data mining , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[5]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[6]  Nikola Kasabov Evolving Systems for Integrated Multi-Modal Information Processing , 2003 .

[7]  Vicenç Torra,et al.  Modeling decisions - information fusion and aggregation operators , 2007 .

[8]  Richard Adderley,et al.  Police crime recording and investigation systems – A user’s view , 2001 .

[9]  Rudolf Kruse,et al.  Fusion: General concepts and characteristics , 2001, Int. J. Intell. Syst..

[10]  Marco Strano A Neural Network Applied to Criminal Psychological Profiling: An Italian Initiative , 2004, International journal of offender therapy and comparative criminology.

[11]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[12]  Marc Toussaint,et al.  Extracting Motion Primitives from Natural Handwriting Data , 2006, ICANN.

[13]  Damminda Alahakoon,et al.  Dynamic self organizing maps for discovery and sharing of knowledge in multi agent systems , 2005, Web Intell. Agent Syst..

[14]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[15]  Christopher R. Westphal,et al.  Data Mining Solutions: Methods and Tools for Solving Real-World Problems , 1998 .

[16]  Belur V. Dasarathy,et al.  Information fusion, data mining, and knowledge discovery , 2003, Inf. Fusion.

[17]  Tim W. Nattkemper,et al.  Fusing Biomedical Multi-modal Data for Exploratory Data Analysis , 2006, ICANN.

[18]  K.C. Baumgartner,et al.  Bayesian Network Modeling of Offender Behavior for Criminal Profiling , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[19]  Evangelos Triantaphyllou,et al.  Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques , 2009 .

[20]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[21]  Gregory Piatetsky-Shapiro,et al.  The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.

[22]  Colleen McCue,et al.  3 – Data Mining , 2007 .

[23]  Richard Adderley,et al.  Modus Operandi Modelling of Group Offending: A Data-Mining Case Study , 2003 .

[24]  Yorick Wilks,et al.  Extracting relational facts for indexing and retrieval of crime-scene photographs , 2003, Knowl. Based Syst..

[25]  Dorian Pyle,et al.  Data Preparation for Data Mining , 1999 .

[26]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[27]  Rong Zheng,et al.  Crime Data Mining: An Overview and Case Studies , 2003, DG.O.

[28]  Walter A. Kosters,et al.  Data Mining Approaches to Criminal Career Analysis , 2006, Sixth International Conference on Data Mining (ICDM'06).

[29]  Donald E. Brown,et al.  A decision model for spatial site selection by criminals: a foundation for law enforcement decision support , 2003, IEEE Trans. Syst. Man Cybern. Part C.

[30]  D.E. Brown Data mining, data fusion, and the future of systems engineering , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[31]  Ronald R. Yager,et al.  A framework for multi-source data fusion , 2004, Inf. Sci..

[32]  Josef Kittler,et al.  Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings , 2005, AVBPA.

[33]  John Zeleznikow,et al.  Decision support systems for police: Lessons from the application of data mining techniques to “soft” forensic evidence , 2006, Artificial Intelligence and Law.

[34]  Richard N Kocsis An Empirical Assessment of Content in Criminal Psychological Profiles , 2003, International journal of offender therapy and comparative criminology.

[35]  Xindong Wu,et al.  Knowledge Discovery in Multiple Databases , 2004, ICTAI.

[36]  H. Chen,et al.  Automatically detecting criminal identity deception: an adaptive detection algorithm , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[37]  Joost N. Kok,et al.  Why the Information Explosion Can Be Bad for Data Mining, and How Data Fusion Provides a Way Out , 2002, SDM.

[38]  Bala Srinivasan,et al.  Dynamic self-organizing maps with controlled growth for knowledge discovery , 2000, IEEE Trans. Neural Networks Learn. Syst..

[39]  Vicenc Torra,et al.  Information Fusion in Data Mining , 2003 .

[40]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[41]  Vicenç Torra,et al.  Trends in Information fusion in Data Mining , 2003 .

[42]  Donald E. Brown,et al.  Criminal Incident Data Association Using the OLAP Technology , 2003, ISI.

[43]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[44]  Colleen McCue,et al.  Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis , 2006 .

[45]  Philip S. Yu,et al.  Data Mining: An Overview from a Database Perspective , 1996, IEEE Trans. Knowl. Data Eng..

[46]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[47]  Der-Jiunn Deng,et al.  Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data , 2011, IEEE Journal on Selected Areas in Communications.

[48]  Michael Leitner,et al.  Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach , 2013 .

[49]  Zeno Geradts,et al.  The image-database REBEZO for shoeprints with developments on automatic classification of shoe outsole designs , 1996 .

[50]  Q.A. Memon,et al.  Crime investigation and analysis using neural nets , 2003, 7th International Multi Topic Conference, 2003. INMIC 2003..

[51]  Norman J. Finkel,et al.  Criminal personality profiling , 1990 .

[52]  E. L. Waltz Information understanding: integrating data fusion and data mining processes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[53]  Adel Said Elmaghraby,et al.  Data Mining from Multimedia Patient Records , 2006 .