CAS: Crime Anticipation System Predictive Policing in Amsterdam.

Slides:



Advertisements
Similar presentations
Prediction of Crime/Terrorist Event Locations National Defense and Homeland Security: Anomaly Detection Francisco Vera, SAMSI.
Advertisements

Data Mining in Computer Games By Adib Adam Hussain & Mohammed Sarfraz.
Han-na Yang Trace Clustering in Process Mining M. Song, C.W. Gunther, and W.M.P. van der Aalst.
New Technologies Supporting Technical Intelligence Anthony Trippe, 221 st ACS National Meeting.
The British Crime Survey Face to face interviews with a sample of adults (16+) living in private households in England and Wales Measures crime victimisation.
Group A: Dan Diecker, Uzair Bhatti, Puji Bandi, Latoya Lewis.
Chapter 9 Business Intelligence Systems
Chapter 9 Competitive Advantage with Information Systems for Decision Making © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Classical Techniques: Statistics, Neighborhoods, and Clustering.
Data Mining By Archana Ketkar.
Police Technology Chapter Twelve
DASHBOARDS Dashboard provides the managers with exactly the information they need in the correct format at the correct time. BI systems are the foundation.
Introduction to Data Mining Data mining is a rapidly growing field of business analytics focused on better understanding of characteristics and.
Hotspot Mapping, Near Repeat Analysis, and Risk Terrain Modeling Joint Operational Utility Leslie W. Kennedy Joel M. Caplan Eric L. Piza Rutgers, The State.
Algorithms for Data Analytics Chapter 3. Plans Introduction to Data-intensive computing (Lecture 1) Statistical Inference: Foundations of statistics (Chapter.
1 Columbia Police Department, Phase IV Integrated Data Exchange & Analysis (IDEA) This project was supported by Grant No DG-BX-K021 awarded by the.
Enterprise systems infrastructure and architecture DT211 4
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Data Mining: Concepts & Techniques. Motivation: Necessity is the Mother of Invention Data explosion problem –Automated data collection tools and mature.
Geographic Profiling in Australia – An examination of the predictive potential of serial armed robberies in the Australian Environment By Peter Branca.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Data Mining Techniques
 BA_EM Electronic Marketing – Pavel
Dr. Rado Kotorov Technical Director Strategic Product Mgt. BI Applications For Crime Intelligence : Data Mining & Predictive Modeling.
Next Generation Techniques: Trees, Network and Rules
1.Knowledge management 2.Online analytical processing 3. 4.Supply chain management 5.Data mining Which of the following is not a major application.
Data Warehouse & Data Mining
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
Spatial Statistics and Spatial Knowledge Discovery First law of geography [Tobler]: Everything is related to everything, but nearby things are more related.
Chapter 1 Introduction to Data Mining
INTRODUCTION TO DATA MINING MIS2502 Data Analytics.
Effects of Geocoding Quality on Predictive Crime Hotspot Mapping Paul Zandbergen Department of Geography University of New Mexico Timothy Hart Department.
Public Safety Overview Daryl K. Roberts Chief of Police Hartford Police Department August 1, 2009.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Event Management & ITIL V3
Esri Southeast User Conference Lara Hall May 5, 2014.
Mapping and analysis for public safety: An Overview.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
The Utility of Criminality Analysis techniques in frontline OA Sam Mitchell Support to Operations, Dstl 01 Sep 2010 © Crown copyright Published with.
Some working definitions…. ‘Data Mining’ and ‘Knowledge Discovery in Databases’ (KDD) are used interchangeably Data mining = –the discovery of interesting,
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Data Mining Knowledge on rough set theory SUSHIL KUMAR SAHU.
Fox MIS Spring 2011 Data Mining Week 9 Introduction to Data Mining.
Spatial and Temporal Analysis: San Antonio Burglaries Neo Geo Spatial Detectives.
2014 Minneapolis Crime Totals Statistics verified and completed on 1/12/2015 CRIME yr % Chg Homicide % Rape % Robbery %
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Data Mining In contrast to the traditional (reactive) DSS tools, the data mining premise is proactive. Data mining tools automatically search the data.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
MIS2502: Data Analytics Advanced Analytics - Introduction.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
DATA MINING PREPARED BY RAJNIKANT MODI REFERENCE:DOUG ALEXANDER.
Copyright © 2001, SAS Institute Inc. All rights reserved. Data Mining Methods: Applications, Problems and Opportunities in the Public Sector John Stultz,
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
CJ 425 Crime Mapping Unit 6 Seminar “Patterns”. Outline Repeat Incidents Tactical Analysis – Definition – Information Used 7 types of Patterns Inductive/Deductive.
Crime theory.
Nearest Neighbour and Clustering. Nearest Neighbour and clustering Clustering and nearest neighbour prediction technique was one of the oldest techniques.
Why Is It There? Chapter 6. Review: Dueker’s (1979) Definition “a geographic information system is a special case of information systems where the database.
A Self-organizing Semantic Map for Information Retrieval Xia Lin, Dagobert Soergel, Gary Marchionini presented by Yi-Ting.
CP8308-visualization Fall 2015 Mina Mobini
CPNZ Basic Training 002 – Patrol Basics Part 1. The Role of Community Patrols Community Patrols are members of the public, they work with the Police and.
MIS2502: Data Analytics Advanced Analytics - Introduction
Can Computer Algorithms Guess Your Age and Gender?
Dr. Unnikrishnan P.C. Professor, EEE
Data Warehousing and Data Mining
3.1.1 Introduction to Machine Learning
Introduction of Week 9 Return assignment 5-2
Welcome! Knowledge Discovery and Data Mining
Tactical Crime Analysis
Presentation transcript:

CAS: Crime Anticipation System Predictive Policing in Amsterdam

Introduction  Dick Willems  Background in Mathematical Psychology (University of Nijmegen)  Statistician at Universities of Nijmegen and Maastricht  Datamining consultant for commercial businesses  Joined Amsterdam Police Department in 2012

Agenda  Police Datamining in Amsterdam  Predictive policing: Crime Anticipation System  Origin  Method  Future

Police Datamining in Amsterdam  The Netherlands are divided into 10 regional units, of which Amsterdam is one.  The Dutch Police puts great effort into reducing High Impact Crimes (domestic burglary, mugging and robbery)  Some numbers concerning High Impact Crimes in Amsterdam:  Domestic burglary:8.257 incidents in 2013  Mugging: incidents in 2013  Robbery: 276 incidents in 2013  One of the tactics the Amsterdam Police uses is to intelligently allocate manpower where and when it matters most, using data mining methods.

Police Datamining in Amsterdam  The Amsterdam Police Department has invested in datamining for over 12 years.  2 dataminers in service  Availability of data mining software  Availability of dedicated server  Team datamining works on:  Predictive policing  Extraction of useful information from texts in police reports (domestic violence, discrimination, human trafficking, identification of potentially dangerous “einzelgangers”)  Uncovering criminal networks  Sporadic issues involving large amounts of data

Predictive Policing: Crime Anticipation System Origins  Planning of manpower used to take place using “gut feeling” and ad hoc analyses.  Police analysts were capable of making “hot spot” maps: plots of incident locations modified by applying a Gaussian filter

Predictive Policing: Crime Anticipation System Method  A grid divides the Amsterdam map into 125m by 125m squares.  There will be more events in some squares than in others.  Determine characteristics of the squares from the database.  Calculate the probability of an event in a square based on its characteristics.  Knowing the locations, determine when (what day, what time) the risk on an event is greatest.

Predictive Policing: Crime Anticipation System Method  First selection: exclude squares that are “empty” (pastures, open water, et cetera)  This leaves relevant squares of 196x196 = possible ones.  Collect data from the remaining squares for three years (reference moments every two weeks).  Every square has 78 data points.  Total dataset has 78x11500 = data points.

Predictive Policing: Crime Anticipation System Method  For each reference moment and square, a number of characteristics are computed:  Location specific characteristics  Crime history  Which crimes took place within the two weeks following the reference moment.  For prediction, it’s important that only those characteristics are recorded that could have been known at the reference moment. Reference moment Two weeksAllowed characteristics

Predictive Policing: Crime Anticipation System Method  Static, location specific characteristics  Information from the central bureau of statistics: demografics en socioeconomical characteristics  Number and kind of companies (bars, coffeeshops, banks, etc)  Distance to the closest known offender (mugger, robber, burglar etc)  Mean distance to the 10 closest known offenders  Distance to the nearest highway exit

Predictive Policing: Crime Anticipation System Method  Crime history  Number of burglaries, robberies etc in several different time periods (relative to reference moment)  Last two weeks, two weeks before that etc  Last four weeks, four weeks before that etc  Last half year  Same for the neighbouring squares  Linear trend in square (number of crimes increasing, decreasing, stable?)  Season

Predictive Policing: Crime Anticipation System Method  To link the characteristics known at the reference moment to what happens afterwards, an artificial neural network was applied.  Result: a model that can assign risk- scores to squares based on current knowledge.

Burglary No rule applied: all squares have the same probability of burglary in the next two weeks (1.4%). If the last burglary in the square was less than 3 months ago, this rises to 4.7% If additionally the mean distance to the 10 closest known burglars is less than 400m, then this rises to 6.1% If a burglary has taken place in the last four weeks, this becomes 7.2% Simplified model

Opbouw Mugging No rule applied: alls squares have the same probablility of a mugging in the next two weeks (0.8%). If a mugging has occurred in the square less than 8 months ago, this increases to 4.9% If in the last half year two or more violent incidents have taken place in the square, this rises to 8.4% If there are many houses in the square, the probability increases to 10.2%. Simplified model

Burglary 22feb2014-7mar2014 Colored area: 3%

Burglary 22feb2014-7mar2014 Colored area: 3% Number of incidents: 218

Burglary 22feb2014-7mar2014 Colored area: 3% Number of incidents: 218 Direct Hits: 45 (20,64%)

Burglary 22feb2014-7mar2014 Colored area: 3% Number of incidents: 218 Direct Hits: 45 (20,64%) Near Hits: 90 (41,28%)

Burglary 22feb2014-7mar2014 Colored area: 3% Number of incidents: 218 Direct Hits: 45 (20,64%) Near Hits: 90 (41,28%)

Mugging 22feb2014-7mar2014 Colored area: 3%

Mugging 22feb2014-7mar2014 Colored area: 3% Number of incidents: 58 Direct Hits: 14 (24,14%) Near Hits: 36 (62,07%)

Predictive Policing: Crime Anticipation System Method  High-risk times are determined after high-risk locations are identified  Locations are geographically clustered using a Kohonen algorithm  Weekday of incident is recorded  Incident times are categorized to correspond to police shifts  00:00-08:00  08:00-16:00  16:00-24:00  The characteristics above are used in a similar classification algorithm.

Thursday, 00:00-08:00

Thursday, 08:00-16:00

Thursday, 16:00-24:00

Friday, 00:00- 08:00

Friday, 08:00- 16:00

Friday, 16:00- 24:00

Saturday, 00:00-08:00

Saturday, 08:00-16:00

Saturday, 16:00-24:00

Predictive Policing: Crime Anticipation System Deployment  Automated process  Every two weeks, data is collected and prepared, models are built and map data is generated.  No human work is required to do this.  Users can access the maps by a HTML-landing page that starts up a script that opens the desired maps.  Users can use CAS without needing technical knowledge.

Predictive Policing: Crime Anticipation System Deployment  CAS is leading for the planning of the following units  Flexteams (entire region)  Teams of districts 4 and 3 (South and East)  For the other units, CAS is considered in the planning, but not (yet) leading.

Predictive Policing: Crime Anticipation System Deployment  Planning process (tactical analysts):  When should deployment take place?  Where should deployment take place?  Gather information on high-risk locations  What’s happening?  Who causes problems?  Anything else that might be interesting.  Production of briefing  Shift commences  Feedback after shift

Predictive Policing: Crime Anticipation System Deployment  Widening of predictive scope; also predict:  Pickpocketing  Corporate burglary  Car break-in  Bicycle theft  Re-evaluate temporal component  Migrate to different mapping tool

Questions?