Geoprofiling and other geo-spatial methods against metal theft CONFIDENTIAL SNCF London, September 15th, 2015.

Slides:



Advertisements
Similar presentations
Temple University Department of Criminal Justice The Hotspot Matrix as a framework for the spatio-temporal targeting of crime reduction Jerry Ratcliffe.
Advertisements

State Center for Health Statistics Division of Public Health NC Dept. of Health and Human Services.
Indianapolis, Indiana Offender Notification Meetings.
Facilitated by Effective Analysis Tuesday 21 st May 2013 Sam Hepenstal, Hampshire County Council.
A2 PSYB3 Question 8 Lessons 6
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
1 MODEL ACADEMIC CURRICULUM MODULE 9 Crime Analysis for Problem Solvers in 60 Small Steps.
Psychlotron.org.uk You have two minutes to draw a map of Birmingham.
Geospatial Intelligence Applications in Law Enforcement Analysis Gregory Thomas.
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition 1# Forensic Science An Introduction to Scientific and Investigative Techniques Stuart.
Chapter 30 CRC Press: Forensic Science, James and Nordby, 2nd Edition1 Chapter 30 Serial Offenders: Linking Cases by Modus Operandi and Signature.
Crime Mapping & Analysis William Jarvis & Ibrahim Sabek CSCI 5715 Prof. Shashi Shekhar Wilson, Ronald and Filbert, Katie. “Crime Mapping and Analysis.”
August 19, 2014 watch me!.  Describe the steps to take when processing a crime scene  Describe how to package evidence  Explain the importance of preserving.
Initiative # 14 Data Driven Practices A/Lt Bryan Grenon A/Sgt. Christi Robbin Position and Title Start Here.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Geographic Information Systems ( GIS) Geography is the study of locational and spatial trends about the earth’s surface, the objects found on it, and the.
Ian Oldfield, Metropolitan Police Service (New Scotland Yard), Interactive Offender Profiling System (IOPS) Ian Oldfield – Metropolitan Police Service.
Police Technology Chapter Twelve
Geography is the study of locational and spatial trends about the earth’s surface, the objects found on it, and the people who inhabit it. GIS is a technology.
Department Of Computer Engineering
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Geographic Profiling in Australia – An examination of the predictive potential of serial armed robberies in the Australian Environment By Peter Branca.
Dr. Rado Kotorov Technical Director Strategic Product Mgt. BI Applications For Crime Intelligence : Data Mining & Predictive Modeling.
The National Intelligence Model (NIM)
Police Administration: Structures, Processes, and Behavior
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Location quotients, ambient populations, and the spatial analysis of crime in Vancouver, Canada Paper by Anderson, M.K Environment and Planning.
Crime Analysis with Crime Mapping Chapter 10: Identifying Useful and Meaningful Patterns Prepared by: Dr. Rachel Boba (August 2008)
HOLMES 2 System Administration Through HOLMES 2 System Administration, an incident can be configured such that access is restricted to: – specified users.
Catching Lightning in a Bottle: Forescasting Next Events Presented by Dr. Derek J. Paulsen Director, Institute for the Spatial Analysis of Crime Assistant.
Testing the Effectiveness of Geo- Behavioural Profiling Systems Professor David Canter & Laura Hammond Director, Centre for Investigative Psychology The.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
CJ 266 Deviance and Violence Seminar 8. SEMINAR OVERVIEW Welcome Final Assignment Guidelines Managing Serial Murder Cases Forensics Profiling—Benefits.
Best practices in combating hate crime on the ground osce.org/odihr.
The Utility of Criminality Analysis techniques in frontline OA Sam Mitchell Support to Operations, Dstl 01 Sep 2010 © Crown copyright Published with.
Role of Spatial Database in Biodiversity Conservation Planning Sham Davande, GIS Expert Arid Communities Technologies, Bhuj 11 September, 2015.
Geoprofiling in commercial robbery series. Is it useful? Pekka Santtila, PhD Professor of Forensic Psychology Department of Psychology Åbo Akademi University.
1 Criminal Investigative Analysis. 2 A Comprehensive Investigative Aid Indirect Personality Assessments Equivocal Death Analysis Investigative Suggestions.
CRIME SCENE. Defining a Crime Scene The only thing consistent about crime scenes is their inconsistency.
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
Well Andy, I guess I’m a Serial Killer THE NOVEMBER PROJECT.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Julie McDonald And Alli Hicks. Criminal Profiling The analysis of the behavior and circumstances associated with serious crimes in an effort to identify.
Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
FBI Method of Profiling Violent Serial Offenders
Psychology and Investigations Chapter 12. Psychologist’s Contributions  Investigative inferences  Offender profiling, geographical profiling, correlates.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Discrete and Continuum Models of Crime Pattern Formation
Conclusion BACKGROUND Since the basis of this analysis is not based on the skill of the offender, but rather, an inherent dependence on environmental and.
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
CJ 425 Crime Mapping Unit 6 Seminar “Patterns”. Outline Repeat Incidents Tactical Analysis – Definition – Information Used 7 types of Patterns Inductive/Deductive.
CJ 213 Unit 3 Information Technology. Crime Analysis Collection and analysis of data pertaining to a criminal incident, offender and target. Crime Analysis.
Welcome/Housekeeping Turn on Speakers Phone Numbers Tech Support (2) (3) (open 24/7) Tim – (8:00 AM – 9 PM ET) Unit weeks.
Noah Fritz, CMAP Director President of International Association of Crime Analysts.
Seminar 2 TOPICS Organization of the Crime Scene Crime Scene Problems Modus Operandi Rules/Approaches to Criminal Investigations Documentation Search Methods.
You have two minutes to draw a map of Birmingham..
Managing ITS Assets using GIS in Silicon-Valley City of San Jose, CA Kenneth Salvail, P.E. ITE District 6 Annual Meeting July 2007, Portland Oregon.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
CP8308-visualization Fall 2015 Mina Mobini
Geospatial Mapping, Analysis, & Data (GeoMAD) Unit For more information, contact: Ariann Nassel – GeoMAD Director – –
Janette Nichols Seminar 8.  This unit explores the various strategies that law enforcement uses to investigate serial murder. The unit also delves into.
1 C.I.A.T. Technical Conference Theme 2 KEY ASPECTS FOR IMPROVING CONTROL CAPACITY OF TAX ADMINISTRATION Mr Luigi Magistro Director of the Central Directorate.
Freya Newman, MSc Centre for Investigative Psychology
3. Prioritize suspects using Geo-behavioural profiling
INVESTIGATION PROCESS AND TECHNIQUE
Mapping the Tracks of Serial Killers
Tactical Crime Analysis
Presentation transcript:

Geoprofiling and other geo-spatial methods against metal theft CONFIDENTIAL SNCF London, September 15th, 2015

 My name is Jean RUAUD  I’m crime mapper and geomatician for SNCF Security. 

 Every time a security incident occurs on the network a CEZAR form is filled in.  CEZAR is SNCF’s security incidents database.  CEZAR means: ConnaissancE des Zones A Risques (knowledge of zones at risk). CONFIDENTIAL SNCF

 Information on the CEZAR form is entered into the dedicated CEZAR database.  The following typology is used for metal theft: ◦ Main category : THEFT ◦ Type : SIMPLE THEFT or THEFT WITH INTRUSION ◦ Main Consequence : SNCF ◦ Second Consequence : METAL or TRACK MATERIAL, ATTEMPTED THEFT  Other details can be entered : ◦ Offenders involved ◦ Offenders arrested ◦ Victim categories ◦ Number of trains affected ◦ Total time lost ◦ Type of metal and weight ◦ Estimated cost CONFIDENTIAL SNCF

 Data is geolocated: ◦ By line number ◦ by kilometer post number where the incident occured on this line number.  This geolocation allows localization mapping of the data: CONFIDENTIAL SNCF More important for geospatial analysis

Maps address different issues and audiences. Operational maps:  What happened and where?  Quick reaction  Management of day to day resources Very simple “dots” maps, conveying their meaning clearly under all conditions. CONFIDENTIAL SNCF

Example of map produced

CONFIDENTIAL SNCF

Example of map produced

Tactical maps: Assistance to management in:  Resource allocation  Hot spot identification  Evolution over time  Criminal movements  Accountability, communication and reporting Density and chloropeth maps, hot spot analysis, animated maps. CONFIDENTIAL SNCF

Example of map produced

CONFIDENTIAL SNCF

Strategic maps:  Statistical visualization (correlations, spatial relative quotient)  Problem solving analysis  Long term evolution  Predictive mapping  Geographic profiling  Monitoring, assessment, evaluation and performance reviews  Communication CONFIDENTIAL SNCF

Example of map produced

 GIS (Geographic Information System): ArcGIS 10.2  Geographical databases: ◦ Infrastructure geographical database (all the elements of network infrastructure in vector shapefiles) ◦ IGN shapefiles (for administrative limits and elements in the local environment)  ArcGIS Online (for streaming photographic maps from the Web in GIS)  CrimeAnalyst (ArcGIS extension specialized in crime analysis)  RIGEL (geographic profiling) CONFIDENTIAL SNCF

 Geo-profiling is an investigative methodology that uses the locations of a connected series of crimes to determine the most probable area of offender residence (or base, or anchor point).  Originally developed to help police locate serial killers, rapists and arsonists, geographic profiling can be applied to any circumstances where an unidentified person is known to have carried out criminal activities at a series of known geographic points.  Very useful to explore high volume crime series such as metal theft on the railway network. CONFIDENTIAL SNCF Approaches to geo-profiling

 Prioritises areas and individuals for attention  Helps to manage information  Is based on what is most likely What geographic profiling is not… An “X marks the spot” estimation A “silver bullet” A substitute for good investigative work CONFIDENTIAL SNCF What geographic profiling does…

 Identify a crime series  Evaluate suitability for geographic profiling  Verify the linkage and seek missing data  Develop a scenario  Create the geographic profile  Draw up a suspect list and prioritize it  Produce the report and suggest investigative strategies CONFIDENTIAL SNCF The geographic profiling process

 Professional geographic software for police and military analysts  Rigel® is produced and distributed by Environmental Criminology Research Inc. (ECRI) Vancouver, Canada. CONFIDENTIAL SNCF

 An investigator from the Gendarmerie Nationale (Cooperation Unit) came to us to make a geo- profile of a series of thefts committed on the network.  A series of thefts was detected in the east of France and investigators already had some clues.  They had already done the linkage process and attributed all the offences in the series to the same group of suspected offenders. CONFIDENTIAL SNCF

 The thefts were entered in the CEZAR database.  We extracted the entries from the database and made a simple map of their position in ArcGIS.  In this way we could assign geographical coordinates to each of the thefts.  Then the crime sites and clue locations were entered into RIGEL®. CONFIDENTIAL SNCF

 Then we produced the first geo-profile based on the scenario involving all the crime sites: CONFIDENTIAL SNCF High probability zones

 Investigators suspected an organized crime group operating in the area.  This group used the same modus operandi for each crime.  In an abandoned vehicle used by the group, investigators found a piece of metal from the SNCF, this clue allowed them to make the connection between the group and this series of crimes. CONFIDENTIAL SNCF

 Investigators made a search of premises used by the group and found more SNCF material.  The premises were found to be within a zone identified by RIGEL. Zone where the group’s premises were found CONFIDENTIAL SNCF