“WELL, IF I EAT IT, AND IF IT MAKES ME GROW LARGER, I CAN REACH THE KEY; AND IF MAKES ME GROW SMALLER, I CAN CREEP UNDER THE DOOR: SO EITHER WAY I'LL GET.

Slides:



Advertisements
Similar presentations
Review of the Incident Command System
Advertisements

Chapter 4: Defining Intelligence-Led Policing. Important notes These slides are not a replacement for the text Please use these slides as a starting point.
Incident Command System
Problem-Oriented Policing CRITIC. Introduction Problem-oriented policing (POP) is an approach that seeks to – Determine the underlying complex mechanisms.
1 MODEL ACADEMIC CURRICULUM MODULE 9 Crime Analysis for Problem Solvers in 60 Small Steps.
Scoping in the EIA process Proposal Identification Screening
Crime Mapping & Analysis William Jarvis & Ibrahim Sabek CSCI 5715 Prof. Shashi Shekhar Wilson, Ronald and Filbert, Katie. “Crime Mapping and Analysis.”
Initiative # 14 Data Driven Practices A/Lt Bryan Grenon A/Sgt. Christi Robbin Position and Title Start Here.
Chapter 2.
Third Edition Dr. Wasim Al-Habil. Chapter Strategic Management in the Public Sector.
LESSONS AND BEST PRACTICES IN POLICE REDESIGN MEXICO CITY, MEXICO JULY 14, 2005.
Interrelationship Between Crime Prevention, Community-Oriented Policing and Problem-Solving Policing The American Crime Prevention Institute Presented.
Police Technology Chapter Twelve
Session 211 Comparative Emergency Management Session 21 Slide Deck.
Prepared by: Dr. fatma Baddar King Saud university college of nursing Nursing administration & education Dep. mission, vision, goals, objectives, values,
Integrating “hot spot” technologies to establish effective methods for deploying law enforcement resources through analysis of crash and crime data. Date.
Crime Analysis/Mapping Crime Analysis is the process of analyzing crime to identify patterns and suspects. –Who is doing what to whom, where, and when.
Essentials of Management Chapter 4
Emerging Latino Communities Initiative Webinar Series 2011 June 22, 2011 Presenter: Janet Hernandez, Capacity-Building Coordinator.
GARDINER POLICE DEPARTMENT SERVING SINCE 1849 SERVING SINCE 1849 Chief James M. Toman.
The Process of Conducting a Post Disaster Needs Assessment (PDNA) United Nations Development Programme Bureau for Crisis Prevention and Recovery Bangkok,
[meeting info] [presenter info] [date]. Data-Driven Approaches to Crime and Traffic Safety DDACTS DDACTS is an operational model that uses the integration.
Outcomes of Public Health
The National Intelligence Model (NIM)
Police Administration: Structures, Processes, and Behavior
Community Demonstration Project Baltimore Police Department June 27, 2000 Regional Crime Analysis GIS (RCAGIS) Developed by the United States Department.
Incident Command System (ICS)
INTERMEDIATE: SFFMA OBJ – – hrs credit received.
Do it pro bono. Strategic Scorecard Service Grant The Strategy Management Practice is presented by Wells Fargo. The design of the Strategic Scorecard Service.
Working Definition of Program Evaluation
Strategic Prevention Framework Overview Paula Feathers, MA.
GBA IT Project Management Final Project - Establishment of a Project Management Management Office 10 July, 2003.
1 MODEL ACADEMIC CURRICULUM MODULE 3 Introduction to Problem-Oriented Policing.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Dr. David Mowat June 22, 2005 Federal, Provincial & Local Roles Surveillance of Risk Factors and Determinants of Chronic Diseases.
© 2012 Delmar, Cengage Learning Section I Management, Supervision and Leadership: An Overview Chapter 2 The Organization and Structure of American Policing.
Community-Oriented Policing. Rationale 1. Community-Oriented Policing (COP) is a recent, and occasionally controversial, concept in law enforcement. 2.
Community Oriented Policing Problem Solving With Funding from: Department of Justice, COPS Office Presented by the Florida Regional.
Crime Mapping Using ArcView & ArcIMS Vierbicher Associates, Inc. Aaron Otto Aaron Weier.
1 of 27 How to invest in Information for Development An Introduction Introduction This question is the focus of our examination of the information management.
Computer Forensics CJ 317 Dr. Joe Ciccone – Week 6 RIP – Dep
Evaluating Ongoing Programs: A Chronological Perspective to Include Performance Measurement Summarized from Berk & Rossi’s Thinking About Program Evaluation,
Responsiveness to Instruction RtI Tier III. Before beginning Tier III Review Tier I & Tier II for … oClear beginning & ending dates oIntervention design.
Dr. Bea Bourne 1. 2 If you have any troubles in seminar, please do call Tech Support at: They can assist if you get “bumped” from the seminar.
Monitoring and Evaluation
United States Department of Justice Criminal Division Geographic Information Systems Staff Regional Crime Analysis Geographic Information System (RCAGIS)
Criminal Intelligence and Crime Analysis Chapter 13 ©2013, Taylor & Francis.
Community-Oriented Policing and Problem Solving
Washington State Patrol Office of the State Fire Marshal Unit 5: Command and Support Structure of a State Mobilization.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
1 Strategic Planning Session Scottsdale Public Safety Division December 7, 2008 Scottsdale Stadium Team Shop 8:30 a.m.- 4:00 p.m.
Crime Analysis and Mapping Jonathan Lewin. Impacting Crime Considerations in Developing a Crime Mapping Application.
Statewide Radio Feasibility Study (SIRN) Presented by Tom Harris SIEC Chair Mike Ressler.
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
Chapter 6 The Police: Role and Function. Police Organization  Most municipal police departments are independent agencies within the executive branch.
PROBLEM SOLVING CJ211: Unit 4 Seminar. Unit 4 Seminar Are there any questions about anything before we begin? *Unit 3 Discussion ? Community Policing.
Welcome Unit 4 Seminar Community-Oriented Policing and Problem Solving.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
CJ 213 Unit 3 Information Technology. Crime Analysis Collection and analysis of data pertaining to a criminal incident, offender and target. Crime Analysis.
CJ-499 CAPSTONE Instructor David F. Connor. Unit 1 Assessment No Assessments scheduled for this Unit Complete – Introduce Yourself Response Read about.
Systems Analysis & Design 7 th Edition Chapter 2.
Welcome Unit 4 Seminar Community-Oriented Policing and Problem Solving.
B ASIC I NCIDENT C OMMAND S YSTEM A N I NTRODUCTION D AVID C HAPLIN, H OSPITAL P REPAREDNESS T RAINER.
Over the last several decades police agencies have been working to gain the respect and the cooperation of the communities they serve. Now you will write.
CHAPTER 2 SYSTEM PLANNING DFC4013 System Analysis & Design.
BECOMING AN EXPERT IN SURVEY DESIGN By Ghania Zgheib EDIT 732
CJA 475 RANK Knowledge is divine-- cja475rank.com.
CJA 475 RANK Education for Service-- cja475rank.com.
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Unit 5: Planning Process, IAP, and Operations Briefs
Presentation transcript:

“WELL, IF I EAT IT, AND IF IT MAKES ME GROW LARGER, I CAN REACH THE KEY; AND IF MAKES ME GROW SMALLER, I CAN CREEP UNDER THE DOOR: SO EITHER WAY I'LL GET INTO THE GARDEN, AND I DON'T CARE WHICH HAPPENS!” - ALICE'S ADVENTURES IN WONDERLAND (1865) Crime Analysis Dr. Joe Ciccone RIP – Dep. Chief Maxwell (photo below – the Lead Inv. For the Rape Case)

Last Week & Grade Review Midterm Comments – Time line & Project 4 Grades Practical Application (This Week) – Unit 6 Project PLEASE BE ON TIME with your Project this week!

Crime Analysis Strategies Crime analysis is a merging of several interdisciplinary studies. A crime analyst excels at statistical analysis, understanding and developing research methodologies, and incorporating sociological, psychological, and criminological theories to produce strategic and tactical assessments. Often the most smilingly simplistic recommendation has undergone a time-consuming assessment.

SARA SARA is a problem-solving model. It stands for Scanning, Analysis, Response, and Assessment.

Scanning The process of conducting a preliminary and final assessment. For example, if you are conducting an analysis of muggings occurring between the hours of 1:00 am–3:00 am, the scanning process would include collecting those incidents over a defined period. In essence, scanning is the collection of incidents pre and post the assessment.

Analysis The process of evaluating the information collected during the scanning process. Continuing with the mugging example, if you know that on average 21 incidents occur during the hours of 1:00 am-1:15 am, 32 incidents from 1:15 am–1:30 am, and decreases after 1:30 am then you have just conducted the analysis of the incidents. Using this information you can form a response.

Response The process of developing a strategic or tactical plan to address the problem identified in the scanning and analysis process. If you analyze the time between 1:00 am–3:00 am you have an increase in reported incidents of mugging during hours of 1:00 am–1:30 am, maximum incidents occurred as it is typically the time people are leaving bars and clubs including staff and patrons. Then you might recommend increasing law enforcement patrols during this time when most incidents occurred.

Assessment The process of examining the plan. However, this process involves the SARA model yet again. To conduct the analysis of the plan, you need to collect the new incidents (scanning), analyze those incidents comparing them against the previous collection (analysis), and if necessary propose a new plan (response). Basically, you have an endless loop that continues until a strategic or tactical plan is determined to be effective.

Criminal Analysis The formula provided on the right is the criminal analysis formula that provides the foundation for the collection, analysis, and dissemination of information to form strategic and tactical assessments. It is a more complicated form of SARA and is based on the basics of the research method. Using this formula, you collect incidents, retain those incidents, analyze those incidents, and then share the results of the analysis. For example, if we return to our SARA mugging example that we discussed in the previous slide, how did we know that more muggings occurred during the hours of 1:00am–3:00am? To determine that an analysis had to occur using all of the collected incidents. The analysis determined the hours when the maximum incidents occurred and the dissemination caused the request of an additional analysis to be conducted during only those hours. Criminal Analysis (CA) + Collection © + Storage (S) + Analysis (A) + Dissemination (D) = Criminal Information (CI)

COP + POP = COPPS Continuing with acronym-based formulas, we have the second strategy that supports law enforcement. The Community Oriented Policing and Problem Solving (COPPS) Program is the merging of two important concepts community-orienting policing (COP) and problem-oriented policing (POP). The premise of this program is to increase the positive interaction between law enforcement and the community. Crime Analysts incorporate this strategy into their development of strategic and tactical plans to increase the likelihood of success.

GIS GIS (Geographic Information Systems) have a pivotal role in assisting law enforcement in the development of strategic and tactical assessments. The most popular of those systems is ARCVIEW. GIS programs allow analysts to visualize the true picture of crime. Up until recently mapping occurred via a combination of a precinct map, a couple dozen different colored push-pins, some colored string, and some markers. While the listed combination makes for some interesting art projects, it was a tedious process. GIS programs made the mapping process and the eventual analysis process more efficient and reliable.

CompStat – NYPD – Bernie Kerik CompStat involves the use of computer-generated statistics to analyze crime problems and develop appropriate responses. COMPSTAT is a process. This process relies on the analysis of crime data in an efficient and effective manner to develop appropriate responses. The primary distinguishing characteristic of this process is technology. It is because of technology that the COMPSTAT process was effective. Using technology (geographic and spatial analysis software), agencies could effectively respond to crimes based on the evaluation of established trends and emerging patterns, while effectively utilizing resources and personnel. In many ways, COMPSTAT is the embodiment of SARA. Even looking at the stages of the process reflects the core tenets of SARA. The success of COMPSTAT as a process is primarily because of the six core components. Mission Clarification: Internal Accountability: Geographic Organization of Operational Command: Organizational Flexibility: Data-Driven Problem Identification and Assessment: Innovative Problem-Solving Tactics

COMPSTAT - Limitations It is important to recognize that the COMPSTAT is very much dependent on technology, available data, and personnel. That is to say, an agencies lack of technology, resources, trained personnel, and even limited incidents of crime make COMPSTAT an ineffective process. Remember that the analysis looks for established patterns and trends and determines if an agencies response caused displacement or actual crime reduction. This requires the dedication of resources and like the basic rule of research, the sample size must be appropriate. Often some smaller agencies lack enough of a sample to implement this process.

Crime Analysis & Questions Civilianization (Internal Issue)  Claim: Scientific Justification for police practices  ZTP – New York Limited Sources of Data Costs (financial and personal) UNIT 6 – PROJECT ~ Questions & Concerns