Please enable JavaScript.
Coggle requires JavaScript to display documents.
CRIME ANALYSIS & INVESTIGATION (WEEK 4:SCP (IIRRR) (focus on specific…
CRIME ANALYSIS & INVESTIGATION
WEEK 1: INTRODUCTION TO CRIME ANALYSIS
INTRO
environmental criminology
victims
offender
time
place
laws
develop theory
three levels of analysis
MACRO
countries
state
cities
1820 crime maps
MESSO
streets
homes
human ecology
chicago school
social disorganisation
delinquency feature of neighbourhood individuals
five zones
business
poor inner city
workers
step up
suburbs
Jane Jacobs
built enviroments
poor planning
old buildings
no green space
residents feel isolated
increase formal surveillance
bring people togeather
MICRO
crime scene
whole broken down
elemnts
locus cause
fundamental attribution error
to much focus on individual not environment
cross situational consistency debate
traits remain stable
behaviour changes with sitauation
predators dont offend all the time
context
most people will offend if opportunity
crime analysis
investigative tool
crime patterns
trends
ECCA
not focused on offender or criminality or distal causes like traditional criminology
prevent crime
not change society or offender
three propositions
criminal behavior influenced by environment
distribution of crime and space is not random
role of criminogenic environment
environmental criminology x3 theories
RCT
RAT
GEOMETRY OF CRIME
POLICING FOR CRIME PREVENTION
SCP
increase effort
remove excuses
reduce provocations
RRRII
increase risks
reduce rewards
POP GOLDSTEIN
SARA
reactive to proactive
BROKEN WINDOWS Wilson
CPTED
DAC
UNDERSTANDING & ANALYSIS CRIME PATTERNS
time space analysis
crime pattern theory
nodes
pathways
hot spots
repeat offenders
geographical profiling
WEEK ONE:POP
Application
develop pop process
SARA
scanning
analysis
responce
assessment
what is it
Goldstein: Conceived Problem Oriented Policing as a more comprehensive policing approach
discrete police business
more than single problem
concerns public,
cluster of incidence
cases =problem
measured results
Resolving problems can often be done without resorting to legislative powers
frame work, principles
2.microscopic examination
analysis investigate problem
look for causes , links, patterns
software
social service
id problem
id problem
Be specific about the problem:
Behaviour
Territory
Persons
Time
3.more effective strategy
new methods
knowledge understanding
police legitamacy
fair procedure
POP+SCP
equity
dont use force or coercion
4.preventative
reduce risk
remedial
5.dont rely on cjs
cjs desighned for conventional crime
expensive
relies heavily onpolice
exclusive arrest
erode legitimacy
strain resouces
alienate
6.engage with other public agencies
7.new strategy
action research
overcome obstacles
response
evaluate effectiveness
reflect
measure
criticise
benefits
limitataions
reduce
report share with others
build body of knowledge
systemic
standardise
improve
standard policing
means overends syndrome
means
reactive. patrol, investigation
police more than law enforcement
traffic manage
care for children
assist corrections
settle disputes
enforce regulations
only small amount of time dealing with crime
dont always enforce law
discretion
alternative to arrest
alternatives to cjs
schools
mental health
civil regulataions
objectives of police
prevent
assist
create
protect
resolve
identify
RAT
motivated offender
suitable target
lack of guardian
convergence in time and space
crime triangle
offender
handler
place
manager
target
guardian
week2
RCP
cornish and clark
opportunity, constraints, produce
role of environment on behaviour
environmental/ learning theory
current environment
cues,stimuli, reinforcement, from enviro
satisfy human urges
sex
excitment
autonomy
revenge
admiration
control
reduce tension
material goods
deliberate, intent to benefit
achieve goals
specific
good outcome
learned beahiour
situation
nature of offender is not imortant
rationality
little or nothing known about the offender with rcp
six core concepts
criminal behaviour serves a purpose
crim behav is rational
crim decision making is specific
decision, involvement, event
separate stages
sequence of stages and decisions
distinguish stages
initiatation
habituation
desitance
crime scripts , opening closing middle stages of crime event
MO
RCP base for SCP
decision points
25 situation intervention points
deal with displacement
defusion benefits
benefits of intervention
anticipatory benefits
person x sitauation
present focused
decision making model
centered for immediate prevention of crime
current lifestyle
enviro
motives
need
inducments
oppurtunity
rcp compatible with life course
criticism
not all crime is rational
not always rational
over simplifies
precipitators
wortley
rcp +enviro shape decisions
rcp explains 1/2
immediate environment creates, triggers, interferes, motivates, crime
1st stage precipatators 2nd stage rcp
remove precipitators, opportunity no crime
four classifications (4PPPP)
prompts (SITE)
immediate environment brings out feelings that are dormant
Signals, cues
Imitation
Triggers
Expectancies
Pressure (COAG)
Conformity
Obediance
Compliance
Annoymitty
Permissions (MMMM)
Minmise victim
minimise responcibility
minimise consequences
minimise rule
Provocation (FECT)
Frustration
enviroment irritant
crowding
territory
precipatators operate
offender
mundane offender (impulsive)
provoked offender (provoked)
antisocial predator (planned)
implications
expands the range of the situation prevention
analysis behaviour that is not rational
control stress,
counter displacement, remove precpatators,remove motivation
RAT
focus on crime not the criminal
motivated offender
suitable target
lack of guardian
crime traingle
motvated offender
handler
suitable target
guardian
place of opportunity
manager
15 points
most crime is ordinary
ordinary routines
start with offender, target , guardian
small time and space more important than large
small amount of people responcible formost crime 20:80 rule
raa applied to cyber space
Geometry of crime /crime pattern theory
places where we spend time
crime pattern
offender
target
time
place
geographical concepts
Nodes Where people travel to and from
Paths Linking nodes
Activity Space Individuals Nodes + Paths
Awareness SpaceArea of activity space with visual range
Other criminal intelligence (from peer contacts
crimes not random in space or time
need tolook at uniform non uniform
rules combination of rules
theories for rules GOC, crime pattern theory
rule 1: backcloth matters
allactivity, political, social , economical, physical
these factors dictate how we move through the environment
social norms, ecomicreality, political freedom, impact choice
physical built environment impacts how we move
roads , networks
daily movement patterns
rule 2: backcloth individaul routine activity
nodes, places
school, work, pleasure
pathwys
nested movemnet patterns
different patterns
repetative patterns of travel pathways
alternatives, general surroundings crime area and flexible days
rule 3:crime normal spatio
temporal movenment patterns same as everyone else
crime near these normal activities
individaul patterns
most criminals spend most of the day doing non criminal activity. non criminal activity shapes criminal activity
rule 4: individuals make decisions in course of activities. decisions become regualr, guiding template
crime template
network of individuals
template and decisions, activity space can be altered by friends, nodes shaped by networks of friends networks change nodes changes
rule 5: most people function in networks not as individuals these links affect desion making in network
target and victim locations, GEO +RATunderstand patterns
disorganisation theory, differentail assocaition
streghne networks that inhibit crime
target and victim locations, GEO +RATunderstand patterns
spatio temporal movement of offenders similar to the victims
victims are mobil but regular victimised near activity nodes
overlap of activity spaces of motivated offender + suitable targets that crime patterns emerge
crime links, guardian links
rule 6: targets and offenders share passive and active nodes that intersect
victim and offender need to cross space and time for crime to occur
overlapping lifestyle or spatio/ temporal pattern or common node activity more likely for victimisation
targets and offenders need to meet in space and time
Rule 7: crime generator and attractors
urban backcloth, crime occurs in context of the environment
desighn,, roads land use
economic forces, socio/economic status
urban backcloth not static eg daytime different to day time
created by high flow of people through and to nodal activity points
attractors are created when targets are located at nodal activity points of individuals with will to commit crime
network theory , structure of roads city, like river , smooth flows and halts
pattern of crime dependant on location of offenders
clustering of offences hotspots created due to rules 1-8
crime neutral area dont attract dont produce crime, no low opportunity, occasional crime by the residents low on attractors and generators
displacement unlikely due to crime opportunity
crime pattern theory
rule 8: crime is committed by individuals and networks when there is a triggering event, locate victim based on crime template
rule 9: triggering event occures during RA
change experience alter future direction
knowledge base always changing
rule 10: the structural backcloth impacts both the RA of individual and the decisions made to commit a crime
THE ROLE OF ENVIRO CRIMINOLOGY IS NOT TO IDENTIFY PATTERNS OF CRIME PER SE BUT TO UNDERSTAND WHY THEY EMERGE WHICH RULES TO APPLY
week 4:CPTED
design features of a built environment and natural environment. impact on crime and risk
altering will reduce crime
movement control
management
surveillance
maintence
defensible space
principles
defensible space and territory
clear who owner is who should should not be in the space
limit through movement
access control,connectivity, and permeability
based on crime pattern theory RCT, RAT
limit offender
make navigation more difficult
increase physical barriers
raise concerns
remove excuses
limit footpaths an dculd secacs
surveillance
formal
informal
panoptic
physical security
target hardening
management and maintenance
broken windows fix problems
WEEK 4:SCP (IIRRR)
alter the situation
enviro crim
RAT
RCT
GOC
motivation and situation
not about propensity, about opportunity
temptation inducement, provocation
crime is always choice
decisions rewards, benefits
opportunity plays a role
regular opportunity more opturunity
those without predisposition can be drawn into crime
if opportunity, even law abiding citizens will commit crime
more opportunity= more crime : less opportunity =less crime:
principles of scp
change immediate time
not distant like predispositions
direct link cause and effect
reduce opp = reduce crime
dont need to know cause
focus on specific crime
offender
determinants
resources
motives (immediate)
motivation (long term)
think thief
understand crime , find rewards/ risks
action research model
scp eliminates existing problem
dac +cpted anticipate problems
scp + pop solve problems
scripts
25 techniques
INCREASE THE RISKS
INCREASE THE EFFORT
REDUCE REWARDS
REDUCE PROVOCATION
REDUCE EXCUSES
week 4: DAC
sub field of SCP
desighn products to reduce crime
hot products influence crime
products in crime
targets (phone)
targets enclosure (house, car)
enviroment
resource for offending (weapon)
misdeeds
missapropriated (stolen)
mistreated (damaged)
mishandled (sold)
misbegotten (copied)
misused (tools)
misbehave (spray paint)
CRAVED
available
valuable
removable
enjoyable
CONCEALABLE
disposable
guide manufacturer to incorporate prevention into product theft
use of scripts , designer need to look at every step in the theft process
desighning against crime crime
security, design, tech, reduce risk,
4 ways to secure product
design to be secure
adding on security
secure situation
intervention
involve designers in DAC
partnership
mobilisation
CLAIMED
alert them of product
inform them of risks
locate best people to tackle problems
motivate them
clarify crime prevention
empower them
direct them
week 5 assessing response to problems
scanning
id define problem
analyse
research
offender interviews
analyse repeat offenders
analyse repeat victims
partner with business
pop
understand hot products
types of evaluation
process evaluation
did all responses components work
accountability
was reponce implemented as planned
impact evaluation
did problem decline
did responce cause reduction
measure problem
compare responce
4 criteria to meet cause
convincing argument
amount of problem related to responce
responce before decline
eliminate alternatives
prepost desighn
use control group
week 6: hotspots
crime reduction
cpted
dac
pop
sara
scp
spatial
crime attractors
crime generators
offender spatial behaviour
geographic info systems
techniques for id hotspots
location quotation
kerial surface
estimation algorithms
local indicator of spatial association
hotspot matrix
dipersed (spread)
clustered (one or more)
hotpoint (single)
theory
Crime generators – are places to which large numbers of people are attracted for reasons unrelated to criminal motivation.
Crime attractors – are places affording many criminal opportunities that are well known to offenders.
Crime enablers – occur when there is little regulation of behavior at places: rules of conduct are absent or are not enforced.
diffusion of benefits
Researchers looking for displacement have sometimes found the opposite.
Rather than finding that crime has been pushed to some other place or time, they have found that crime has been reduced
more widely than expected.
temporal
aoristic analysis
diffused (anytime)
focused (significant times)
acute (combined non existent)
policing
prevention
detection
Small number of places experience a lot of crime
Risky facilities – experience a disproportionate level of crime of that facility type
Crimes fluctuate depending on time of day, day of week, season etc
Analysing spatial and temporal trends
Effective, targeted responses
Better development of resources
week 7 RV
2 measures
prevalence
number of people / number of population
prevention none victims
frequency
number ofvictimisations / number of victims
prevention victims
ducks : victims :
10% of victims 40% of crime
wolves: offenders
10% of offenders 50% crime
den: places
10% of places 60% crime
Those previously victimised are most likely to be victimised in the future
A small number of victims account for bulk of crime (80/20 Rule)
RV tends to happen swiftly
explanations
Flag account
Everyone is at risk, but everyone’s risk is different
“Flag” as more vulnerable/susceptible to victimization
Boost account
Prior victimization “boots” future victimization
measuring
Percent repeats—proportion of events that are repeats
Prevalence—number of victims per 1000 population
Incidence—number of crimes per 1000 population
Concentration - average number of crimes per victim
Physical facilitators - help to overcome prevention measures
Social facilitators - encourage offending
Chemical facilitators - ignore risks or moral prohibitions.
prevention
Protecting victims by blocking future opportunities against these specific persons or places
2) Shifting responsibility for repeat victimization
3) Increasing actual or perceived risks of apprehension for offenders, primarily for repeat offenders
week 11 the future of crime prevention
enviro criminology
Cybercrime is patterned
Small number of websites observe most of the problems
Certain activity “riskier” than others
Sale websites increase risk of fraud
Illegal downloads increase risk of malware infection
Activity fluctuates over time of day
Different MO for different crime
Email common for malware & phishing
Child grooming most common in chat rooms
Snapchat & sexting
Early research shows RV likely
characteristics of cyber crime
(Generally) not limited by geography
Can interact instantaneously
Target multiple victims at once (increased chance of success?)
Multiple methods of communication
Anonymity
Provides opportunities for interactions unlikely to occur in physical space
prevention
ID/authentication systems
Honeypot/stings
Antivirus/spyware software
Firewalls
Change default passwords
Security level labelling
Education about risks
Warnings to offenders
Banking algorithms
Report functions on websites
Ethical hackers
User agreements/policies
Parental locks
Spam filters
Crimes directed at computers or other communication technologies (hacks, viruses)
Using computer as the target
Crimes where computers or other communication technologies are an integral part of an offence (online fraud; child exploitation material)
Using computer as the weapon
week 3
SARA
Scanning
Analysis
Response
Assessment
id problems
Police data can provide a starting point
Calls for service, crime data and agency records for patterns and trends involving repeat locations, victims, and offenders
Mapping specific crimes by time of day, proximity to locations, and other similar factors
Consulting officers, supervisors, detectives, mid-level managers and command staff
ways to id problems
Police data can provide a starting point but should not just use crime data
Community consultation and meetings
Court cases
Community and non-profit organizations
Welfare agencies
Government agencies
Policy makers
Hospital admissions
Insurance claims
Media coverage and public opinion (bit of caution here!)
CHEERS
Community
Harmful
Expectation
Events
Recurring
Similarity
nature of problem
Environment
Residential
Recreational
Offices
Retail
Industrial
Agricultural
Educational
Human Service
Public Ways
Transport
Open/Transition
behaviour
Predatory
Consensual
Conflicts
Incivilities
Endangerment
Misuse of Police
understand problem
Who is involved?
What exactly do they do?
Why do they do this?
Where do they do this?
When do they do this?
How do they carry out the crime?
data sources
Crime analysts
Mapping/geographic information systems
Resident/business surveys
Interviews with victims and offenders
Repeat victimization
Site visits/audits
Time