StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Using GIS Profiling to Solve Serial Burglaries - Research Paper Example

Cite this document
Summary
The paper “Using GIS Profiling to Solve Serial Burglaries” discusses the link between current advancements in technology and criminal activities. It then elaborates on GIS tool and its appropriateness in solving serial crime using geographic profiling…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Using GIS Profiling to Solve Serial Burglaries
Read Text Preview

Extract of sample "Using GIS Profiling to Solve Serial Burglaries"

Using GIS Profiling to Solve Serial Burglaries Introduction Technological advancements have resulted into increased criminal offenses in the contemporary society. Increase in serial crime has burdened law enforcement agencies as they aim at curbing insecurity and fear that results from criminal activities. The agencies continue to conduct research on the most efficient methods of curbing such immoral acts in the society. Although the criminal agencies have faced numerous challenges to implementing and establishing efficient methods of solving serial burglaries, their contributions are notable. The paper discusses the link between current advancements in technology and criminal activities. It then elaborates on GIS tool and its appropriateness in solving serial crime using geographic profiling. More significantly, the paper relates geographic profiling to solving serial burglaries. Serial Crimes Serial crimes are illegal acts that warrant punishment based on criminal law. They are crime defined by repetitive nature. Serial crimes include murder, rape, arson, bombing, and robbery. Serial criminals frequently develop behaviors of committing the same type of crime in a similar manner. Sequence of crimes committed by the same lawbreaker constitutes serial crimes that law enforcement agencies files. Studies relate serial criminals to immoral upbringing or environment. Criminal’s Advancements using Technologies Advancements in technology have contributed to increased serial crimes around the globe. Criminals are highly innovative and frequently adopt emerging technology advancements before criminal agencies acquire such technologies. Such innovative criminals have also acquired similar crime tracking devices used by law enforcement agencies. For instance, innovative criminals have encrypted radio communication networks of state agencies.’ Insecurity cases have increased around the globe because of innovativeness of criminals. Criminals have devised advanced systems of committing a crime and escaping from law enforcement agencies. For instance, Serial killers and terrorists use modern communication technologies such as satellite imagery, night vision goggles and smart phones in locating their targets and enemies. Evidence also exists of terrorists who have formed operations centers for monitoring social networks, videos, and global news broadcasts. Serial killers such as the 2008 Mumbai terrorists used modern weapons such as AK-47s, hand grenades, and explosives (Goodman, 2014, p. 1). The terrorists employed use of search engines in planning the attacks and in identifying specific hostages. The powerful search engines the terrorists used gave them a tactical advantage over the India government law enforcing agencies. Advancements in robotic technology have also resulted into consequential increase in criminal misuse. International criminals and terrorists groups have used robotic submarines, for example, in trafficking illegal drugs. Goodman (2014, p.1) reports an incidence in which a terrorist in Boston planned to use remote-controlled robotic aircraft with explosives to attack Capitol and Pentagon buildings. Advancement in genome understanding has also created new avenues for criminal operations. It is conceivable to use computer programs to construct unique DNA sequences reminiscent of deadly viruses such as H5N1 influenza. Cybercriminals can hack DNA profile systems in biological databases, create deadly viruses and use them as biological weapons in killing certain individuals. However, GIS have the potential of tracking the location of most criminal offenders’ using crime mapping and geographic profiling technologies. The system enables law enforcement agencies to monitor, assess, and evaluate criminal activities and initiate mitigating strategies. Geographic Information Systems GIS refers to a computer-based technology used in mapping and analyzing events and existence of things on the Earths’ surface. GIS also captures stores and manage spatial data. The technology integrates database operations such as statistical and query analysis with distinctive provisions of geographic and visualization analysis advanced by maps. Query and statistical analysis feature contribute to the inherent value of GIS in explaining events, planning strategies and predicting outcomes. Components of GIS Operational GIS consists of the series of components that work in coordination. These components include software, data, methods, people, and hardware. The hardware consists of a computer system that forms a platform for GIS operation. In the contemporary society that characterized with increased criminal activities, GIS software remains operational on varied types of hardware computers. The software operates efficiently in desktop and centralized computer servers (Sugumaran & Degroote, 2010, p. 66). The software component of GIS consists of tools that are vital in storing, analyzing, and displaying topographical information. Software tools include GIS software, database management system, and drawing software. Data component forms the centrality of any GIS functionality and purpose. GIS uses notably spatial and tabular data. Spatial data contains coordinates, boundaries, road networks, and location of places on the earth surface. Non-spatial data includes land ownership, population densities, soil pH values, and address. Data accuracy and availability is imperative in practical analysis of reliable results. The database management system of GIS software can store and integrate data obtained from different sources. It is essential to have human people with the potential to manage GIS system as well as develop plans for its worldwide applications. Users of GIS include technical specialists and end users. GIS specialist helps in designing and maintaining GIS system to its users. It is critical to distinguish GIS users and its experts in the proper implementation of the technology. Procedure is the last component of GIS. GIS use methods in the analysis of data and provision of accurate results. Methods applied in the analysis of data include protocols, guidelines and standards. It is vital to note that most successful GIS consider business operation on a well-designed implementation plan. The primary coordinator of all the GIS components is its operator. As long as GIS feeds information about a problem such as bank raid, software component stores and analyses it. It produces a map and relevant calculations such as distances that assist in investigations. Geographic Profile of Suspects GIS can create geographic profile of suspects. Geographic profile refers to a contoured map, which can predict the likely anchor point of a criminal. Geographical profiling enables criminal justice agencies to analyze the location of a linked series of crimes and identify the exact residence of the offender. Geographic profiling incorporates both quantitative and qualitative techniques in comprehending the psychology of spatial behavior of a serial criminal. Spatial behaviors help in focusing the investigation on smaller regions in the community by predicting the offenders’ cognitive map (Stallo, 2003, p. 4). Police detectives apply geographic profiling in cases of serial rape, arson, serial murder, robbery, or bombing. Geographic profiling of suspects also assists in efficiently allocating resources or extending limited resources about specific criminal cases. A profile of criminal cases of particular geographical locations helps in identification of areas with highest probabilities of criminal cases. Such areas provide the leads for investigational agencies when tracking serial cases. Geographic profiling uses a computerized criminal geographic targeting program that analyses spatial data. The spatial data relates to distance and time calculations. Geographic Profiling Process In the initial stages of developing geographic profile, series of crimes are committed and investigated using traditional methods. Investigators then conduct linking analysis to ascertain the identity of the crimes. Based on the type of crime, investigators develop a psychological profile. The next step involves the construction of geographical profile that continually files criminal cases (Wang, 2005, p. 137). During the preparation of a geographical profile, profilers employ certain operational procedures. They first examine the case files of the criminal and note information relating to autopsy results, psychological profile, and witness statements. The profilers then inspect crime scenes, hold discussions with lead investigators, and perform mathematical analyses of demographic data and crime statistics. Finally, after study of rapid transit maps, profilers analyze and submit a profile report. Relevance of Geographic Profilers to Criminal Investigations Effective and successful geographical profiling requires brilliant profilers who can give prompt tactical advice to intelligence officers in the field. The geographic profilers advance numerous advantages to investigators. To start with, Geographical profiles present criminal intelligence officers with a geographic focus for investigation. The series of maps provided in the geographic profile can locate probably work sites or homes of serial burglaries. Maps provided by the profiles also describe the specific paths followed by the lawbreaker. Geographic profiles also can organize manifold suspects into order of priority with specific locations. Secondly, geographic profilers also assist investigators on the fast track of suspects’ catchment areas. Catchment areas relate to geographical locations with institutions, social facilities, and residences that are potential suspects’ locations. Geographic profilers use Thiessen polygon analysis to determine the catchment areas mathematically in a series of suspected sites (Leitner, 2012, p. 206). For instance, a geographic mathematical analysis can locate a particular building within the city. In addition, geographic profilers can develop maps indicative of the series of criminal offences. The maps are imperative in the court of laws when making briefings or presentations. The maps are also beneficial in reconstruction of historical cases. Lastly, geographic profilers also facilitate speed and timely tracking of offenders through distance calculations (Leitner, 2012, p. 339). The calculated distances are vital for an intelligence officer who needs to know the distance and time already covered by a criminal. A geographic profiler can estimate the rate of criminals when walking, jogging, or driving and thereafter provide tactical strategy to investigators. GIS in Providing Geographic Profile of Suspects Geographic profiling helps in managing and containing serial burglaries. Geographic information system (GIS) converts word-based and tabular information into a form easy to interpret, visually. The computer system’s GIS involves capturing, checking, analyzing, storing and displaying data in relation to the surface of the earth in a form that the operator commands. Integrating the sets of data with maps and boundaries enables the police department to monitor remotely and keep check on different parts of the state. One can correlate multiple spatial data sets to analyze and examine the potential relationships. The relationships may be violent criminal acts or drug smuggling activities, a quick response initiated help in containing the serial burglaries. Hence, crime-mapping using the GIS becomes an essential element to a practical, timely problem-solving approach to crime analysis and policing. Mailing services and free mobile phone calling emergency numbers incorporated for immediate alert of any looming danger effective and efficient security provision. Geographic profiling helps in determining probable hideouts of fugitive criminals. Geocoding involves finding associated geographic coordinates from street addresses. Zip or postal codes, phone numbers, and details of a given computer database software inform security agencies of cases of homicides (Wang, 2003, p. 102). Sightings, purchases, bank transactions, telephone calls and other locational information can be input for their profile. The process assists in instances involving kidnapping and extortion. Geocoding operates at different levels of spatial precision hence does not necessarily require all data to be matched to a precise address or location. Geocoding runs at the position at the center of the object of a geographic region such as a zip code or a census geographical boundary area. Geocoding accuracy observes the mapping position of the point. It also identifies a sample point in the GIS and maps the sample in a GIS against a background of detailed base mapping data (Spencer, 2008, p. 26) and, a mapped version of the reference file used for geocoding. Geographic profiling provides the security agencies with adequate information that enables them to narrow the area to conduct a door-to-door search and set up police surveillance. It prioritizes suspects, develop strategies for linkage analysis of information and even provide clues about an effective polygraph with a suspect. There will be an increase in response efficiency, as only direct responses will be necessary unlike the other instances where preliminary investigations. The GIS provides an offender’s spatial perception and mobility. GIS makes the police departments more efficient and quicker in terms of response in case of serial burglaries. Cells Monitora Espacio Temporal (CEMET), a geographical tool enables criminal agencies to explore certain aspects of localized crime patterns. The device is sensitive to the quality of crime data available and allows criminal agencies to begin exploring changes in crime patterns. It uses a probabilistic method for geographically referencing each crime incident. CCTV cameras installed in several parts of states make it easier to trace a criminal. With the central data bank, an individual’s particulars can be marched for quicker tracking. Psychological profile helps in prioritizing individuals for follow-up investigation by the security agencies. The geographic profile assists in the hearing stage in court by analyzing the spatial relationship of a crime site pattern its equivalence with an accused offender’s activity space. Areas more prone to the criminal activities can be used to help direct patrol efforts. With the maximum monitoring in place, a significant reduction in serial crimes contributes to the ineffectiveness of geographic profiling. Developing a web-based GIS policing solution has made curbing of the criminals much easier. An inaugural browser based mapping application (MAPS). Monitoring the crimes become automatic, for detection of any suspicious moves and quick response sent to bring a lasting solution. Web mapping technology takes part in updating the public crime patterns; this enables them to stay cautious and alert against any form of criminal acts. The websites allow interaction, giving the public an opportunity to choose and consult on any related information (Hess and Orthmann, 2014, p. 35). Geographic profiling organizes an abundance of information through geographical links in order to fast track the apprehension process. It highlights the crime location, hence very useful in tracking the monotonous activities criminals since people tend to stick to their family territory. GIS helps in monitoring the effect of alley gating. Driveway gating involves the installation of security gates or footpaths that run behind properties. It has a central role in preventing potential burglars from accessing the rear of properties. GIS assists in identifying the best locations for the installation of driveway gates. The mapping system identifies areas highly affected by burglary problems. Most crime prevention and tackling initiatives are area based. Resources target a particular region in an attempt to deal with the crime problems in that area. Crime mapping keys are monitoring if the initiative or operation has been a success by analyzing the prior and post pictures and occurrences of crimes in a given area. With the right analytical methods and investigations in place, serial crimes are contained, and a lasting solution provided. GIS has enabled swift crime analysis on network. Network and transport routes lay foundation for the planning and scheming of the crimes. The security agencies may intercept and apprehend the criminals before executing their plan .It becomes evident that GIS plays a core role in shaping the security system globally. Most departments now rely on it wholly as a sure source of security that entrusted as it operates without any compromise. Challenges faced by security urgencies when using GIS The geospatial data in a digital form becomes very expensive and cumbersome to access due to the scarcity of the expertise specialized in handling these data sets. The cost of GIS software in the market restricts possession by law enforcement agencies. Misleading and inaccurate primary or source data makes the acquired data from the GIS misleading (Albert and Leipnik, 2003, p. 54). Wrong Zip code and addresses entered can lead to enhancement in criminal acts, as security responses weaken. Conclusion Technological advances have contributed to increased criminal cases in the contemporary society. Such technological innovations assist serial burglaries in identifying their target victims and evading law enforcement agencies. GIS technology is imperative in monitoring, evaluating and assessing serial crimes by law enforcement agencies. Serial crimes applicable to GIS technology include rape, murder, bombing, arson, and robbery. Application of GIS in geographic profiling requires efficient and experienced profilers as well as GIS specialists. Geographical profilers are of the essence in providing consultancy services on criminal cases and investigation. Accurate and timely profiling ensures the success of geographic profiling in solving serial cases. GIS applications play a leading role in the evolution of geospatial intelligence capability to counter criminal acts. Through the interactive security websites, the citizens obtain updates and consults on particular issues directly; this bridges the gap between national security agencies and ordinary citizens. The bond bridged increases information network, as the citizens will be more willing to air free alerts to them. References Albert, D., & Leipnik, M. (2003). GIS in Law Enforcement (International Forensic Science and Investigation). London and New York: Taylor and Francis. ISBN: 978-0415286107 Boba, Rachel.( 2013). Crime analysis with crime mapping (3rd. ed.). Thousand Oaks, CA: Sage, Chainey, S. (2008). Crime mapping case studies: Practice and research. Hoboken, N.J.: John Wiley & Sons. Chainey, S., & Ratcliffe, J. (2006). GIS and crime mapping. West Sussex, England: John Wiley & Sons Ltd. ISBN: 978-0-470-86098-4 Goodman, M. (July 29, 2012). How technology makes us vulnerable. CNN. Retrieved September 14, 2014, from http://www.cnn.com/2012/07/29/opinion/goodman-ted-crime/index.html Gordon, Marc (2012). How Technology Makes Us Vulnerable. Retrieved September 14, 2014 from http://www.cnn.com/2012/07/29/opinion/goodman-ted-crime/index.html Hess, K., & Orthmann, C. (2014). Police operations: Theory and practice (6th ed.). Clifton Park, N.Y.: Delmar ;. Leitner, M. (2012). Crime Modeling and Mapping Using Geospatial Technologies. Dordrecht: Springer. Stallo, M. (2003, January 1). Geographic Information Systems: GIS and Crime Analysis. Retrieved September 12, 2014, from http://www.twlk.com/law/tests/LETN0560003ct.pdf Uchida, C. (2009). A national discussion on predictive policing defining our terms and mapping successful implementation strategies. Washington, D.C: National Institute of Justice. Sugumaran, R., & Degroote, J. (2010). Spatial Decision Support Systems: Principles and Practices. Boca Raton: CRC Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Using GIS Profiling to Solve Serial Burglaries Research Paper”, n.d.)
Using GIS Profiling to Solve Serial Burglaries Research Paper. Retrieved from https://studentshare.org/law/1657048-using-gis-profiling-to-solve-serial-burglaries
(Using GIS Profiling to Solve Serial Burglaries Research Paper)
Using GIS Profiling to Solve Serial Burglaries Research Paper. https://studentshare.org/law/1657048-using-gis-profiling-to-solve-serial-burglaries.
“Using GIS Profiling to Solve Serial Burglaries Research Paper”, n.d. https://studentshare.org/law/1657048-using-gis-profiling-to-solve-serial-burglaries.
  • Cited: 0 times

CHECK THESE SAMPLES OF Using GIS Profiling to Solve Serial Burglaries

Neighborhood Watch Programs

Since the recession has hit, the instances of burglaries have increased.... Precious valuables are stolen, and this includes personal identification documents, such as ID's, passports, and driver's licenses (Crime Stoppers). … A new trend of burglaries is on the rise and is quite troubling to the public.... This trend is known as distraction burglaries, where a person may come to another's home and ask for help with a particular task while at the same time, this individual is stealing whatever valuables he finds appealing....
14 Pages (3500 words) Essay

CCNA Basic (Final Assignment)

/24, on serial 2, using EIGRP - using an example of one default routehostname branch1!... falls under the Class B distinction: Therefore, to translate this into how many subnet addresses can be used are far greater than those of a Class C subnet as you are using five bits from the original host bits for subnets.... After using the five bits for subnetting, you are left with 11 bits for host addresses.... (d) Configure DHCP using a pool called 'ISP' containing 10....
4 Pages (1000 words) Essay

Who is profiling for

profiling can be applied wisely for a positive purpose and can be an effective tool for protecting students as well as easing the minds of… However, there can be problems when using profiling with high school students.... These problems pose a threat to the viability of profiling technique as a useful tool to be applied in schools.... Hence we may argue that profiling is not the best way to prevent crime at school and In “The Violent Kid Profile,” Mary Lord claims that the new method being used to detect violence from unpredictable students will take over the student dignity of millions of students at school....
4 Pages (1000 words) Essay

Foundation Degree in Security and Risk Management

This therefore forms the framework for the prevention of these student burglaries.... Also, the frequency of burglaries must be known.... Data on burglaries and their frequencies can be attained from the police archives.... The paper focuses on how the research will be conducted to provide and how data will be gathered and conclusions would be drawn from a blend of available… A literature review involves examining authoritative texts for information that defines the framework of a new research (Smith, 2010)....
12 Pages (3000 words) Literature review

Geographical Profiling

Originally it was applied in cases of serial murder, rape and bombings, it is now frequently being used in robbery, burglary, arson, and fraud cases as well.... his methodology evaluates the location of connected serial crimes in order to figure out the most probable area for criminal activity.... This essay "Geographical profiling" explains an investigative method used by sleuths, police, and detectives to trace the path of the crime happening in a closed environment of a town or a society....
6 Pages (1500 words) Essay

Preventing Residential Burglaries

The neighbors should work together as a team to reduce the frequency of burglaries. Crime prevention experts recommend that the Preventing Residential burglaries Introduction Most of the residential burglaries are not by force entry.... The neighbors should work together as a team to reduce the frequency of burglaries.... The police will educate on how to begin using operation id of the block watch on the neighborhood and discuss ways to detect and deter crime....
2 Pages (500 words) Essay

Criminal Profiling

The author explains the key elements of serial murder and profiling, identifies the typologies and motivations of serial killers, identifies the typologies and motivations of serial killers and explains and analyzes the profiles of rapists and arsonists … The process of serial killer criminal profiling is by far common in practice than first thought.... In 1970, the Behavioral Science Unit of the FBI developed a profiling process, and Ted Budy was the first serial killer to have the profiling conducted on For instance, if victims of the serial murders are Caucasian, then it is very likely that the offender is Caucasian too....
4 Pages (1000 words) Assignment

Analysis of Serial Murder Profiling

This review "Analysis of serial Murder Profiling" discusses some of the criminal profiles developed in the 1960s and 70s.... serial killing has been defined as “repetitive killings…where the relationship between the victim and the offender is that of a stranger or slight acquaintance and the motivation to kill……” (Holmes and DeBurger, 1988: 138).... A general profile of a serial killer is provided by Apsche (1993) as follows: Serials killers are generally (a) white males who are (b) in their late twenties or early thirties....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us