ABSTRACT
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at the Tucson Police Department (TPD), we found that two types of tasks are important for crime analysis: crime pattern recognition and criminal association discovery. We developed two separate systems that provide automatic visual assistance on these tasks. To help identify crime patterns, a Spatial Temporal Visualization (STV) system was designed to integrate a synchronized view of three types of visualization techniques: a GIS view, a timeline view and a periodic pattern view. The Criminal Activities Network (CAN) system extracts, visualizes and analyzes criminal relationships using spring-embedded and blockmodeling algorithms. This paper discusses the design and functionality of these two systems and the lessons learned from the development process and interaction with law enforcement officers.
- Chen H., Jenny Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K. Rasmussen, A. W. Clements (2002), " COPLINK Connect: Information and Knowledge Management for Law Enforcement"; Decision Support Systems, 34: pp. 271--285.Google ScholarCross Ref
- Chen H., Zeng D., Atabakhsh H., Wyzga W., Schroeder J. COPLINK: Managing Law Enforcement Data and Knowledge. Communication of the ACM. Special Issue on Digital Government: Technologies and Practices. 2003 Google ScholarDigital Library
- Brown, Donald E. (1998). "The Regional Crime Analysis Program (RECAP): A Framework for Mining Data to Catch Criminals," Proceedings from IEEE.Google Scholar
- Plaisant, C., B. Milash, A. Rose, S. Widoff & B. Schneiderman (1996). "Lifelines: Visualizing Personal Histories," ACM CHI '96 Conference Proceedings. pp 221--227. Google ScholarDigital Library
- Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C., and Ascher, M. (2004). ``Towards A National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism,'' Proceedings of the Fifth Annual National Conference on Digital Government Research, 2004 Google ScholarDigital Library
- Xu, J. and H. Chen (2004). "Fighting organized crime: Using shortest-path algorithms to identify associations in criminal networks." Decision Support Systems 38(3): 473--487 Google ScholarDigital Library
- J. Schroeder, J. Xu, H. Chen, & M. Chau, "Automated Link Analysis Using CrimeLink Explorer," under the 2nd round review of IEEE Transactions on Systems, Man and Cybernetics.Google Scholar
- White, Harrison C., Scott Boorman, Ronald Breiger. 1976. "Social Structure from Multiple Networks. I. Blockmodels of Roles and Positions."American Journal of Sociology 81: 730--780.Google ScholarCross Ref
Index Terms
- Visualization in law enforcement
Recommendations
Visualization in law enforcement
dg.o '05: Proceedings of the 2005 national conference on Digital government researchVisualization techniques have proven to be invaluable in crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at the Tucson Police Department (TPD), we identified two crime analysis tasks that can ...
Cryptography, Law Enforcement, and Mobile Communications
In this issue's installment of Crypto Corner, we review the handset-related methods law enforcement agencies can use to gather evidence during criminal investigations. This article's goal is twofold: explain how law enforcement agencies gather handset-...
The Law Enforcement in Cyberspace Criminal: Focusing on the Experience between Taiwan and the United States
MINES '11: Proceedings of the 2011 Third International Conference on Multimedia Information Networking and SecurityThis article is discussing the Cyberspace Crime from the point of view to law enforcement. From the observation of this article, it indicates that the trans-bordering and hard-to-trace are two prominent characteristics in the field of Cyberspace Crime ...
Comments