137374NCJRS
137374NCJRS
0 5 Em 3
1 4 t
WHEN? S F 8 WHY?
WHERE? K r WHAT?
WHO? HOW?
By
OFFICE OF
CRIMINAL JUSTICE PLANNING
THE PREPARATION OF THIS PUBLICATION WAS FINANCIALLY ASSISTED THROUGH GRANT AWARO NUMBER
CASSO' 6350-00 FROM THE CALIFORNIA OFFICE OF CRIMINAL JUSTICE PLANNING (OCJP). THE OPINIONS,
FINDINGS, AND CONCLUSIONS IN lHlS PUBUCATION ARE THOSE Of THE AlffifORS AND NOT NECESSARILV THOSE
OF OCJP. OCJP RESERVES A ROYALTY-FREE, NONEXCLUSIVE, AND IRREVOCABLE LICENSE TO REPRODUCE,
PUBLISH, AND USE THESE MATERiAlS, AND TO AUTHORIZE OTHERS TO DO SO. A COpy OF THESE MATERIALS
MAY BE OBTAINED FROM OCJP UPON PAYMENT OF lHE COST OF REPRODUCING THE MATERIAlS.
Crime Analysis: From Concept to Reality
By
137374
U.S. Department of Justice
National Institute of ,Iustlce
THE PREPARATION OF THIS PUBLICATION WAS FINANCIALLY ASSISTED THROUGH GRANT AWARD NUMBER CA 86
01 6360 00 FROM THE OFFICE OF CRIMINAL JUSTICE PLANNING (OC.IP). THE OPINIONS, FINDINGS, AND
CONCLUSIOtlS IN THIS PUBLICATION ARE THOSE OF THE AUTHORS AND NOT NECESSARILY THOSE OF OCJP. OCJP
RESERVES A ROYAL TY·FREE, NONEXCLUSIVE, AND IRREVOCABLE LICENSE TO REPRODUCE, PUBLISH. AND USE
THESE MATERIALS WrrHout ALTERATION, AND TO AUTHORIZE OTHERS TO DO SO. A COpy OF THESE MATERIALS
MAY BE OBTAINED FROM OCJP UPON PAYMENT OF THE COST OF REPRODUCING THE MATERIALS.
TABLE OF CONTENTS
PAGE
PREFACE v
ACKNOWLEDGMENTS viii
INTRODUCTION 2
PREFACE
PREFACE
The protection of life and property has always been the primary goal
of law enforcement. Philosophies regarding how this goal could best
be achieved however, have changed throughout the years. lintil the
1970s, many police administrators felt that the adequate suppression
of crime and the apprehension of criminals could be accomplished only
by the increased acquisition of personnel and equipment. The visible
presence of the police, it was believed, was the key to reducing
criminal activity,
v
provide the information needed to ensure that we are using limited
resources to their best advantage.
The authors are well qualified to write this book. Steve Gottlieb has
spent over twenty years in the law enforcement profession and, as
Special Services Manager of the Chino Police Department, has been
responsible for the operation of our crime a~alysis program since
1982. Shel Arenberg is a private consultant to law enforcement and is
a nationally recognized expert in the fields of crime analysis and
intelligence analysis. Both of these gentlemen have taught crime
analY3is classes within California and throughout the nation.
We are extremely pleased with the benefits we have derived from the
implementation of a crime analysis program within the Chino Police
Department. Our adoption of the program has helped us meet the
challenges presented us by the changing world in which we live. We
hope that you, the readers of this Dook, will be similarly succesful in
your efforts.
James E. Anthony
Chief of Police '.
Chino Police Department
vi
--- ---------~-- ---------~ ----
ACKNOWLEDGMENTS
ACKNOWLEDGME:\TS
We also wish to thank Louisa Chabot, Roz Hodge. Lori Douglas. Patrick
Northam, Jim Coyne and Dick Dauphin, crime analysts from the Los
Angeles County, California, Sheriff's Department. for consenting to
review our initial work. Their comments led to the inclusion of much
of the new material which is presented in this book.
This book is but another step on the authors' learning curve regarding
crime analysis. Other agencies supported us while we took our first
faltering steps and they deserve mention for being there when we
most needed help and encouragement. Without such support. this
manual would not have been written.
vi ii
of trainers including one of the authors. Since the conclusion of the
national effort, the California Department of Justice, supported by the
California Commission on Peace Officer Standards and Training has
provided similar training for crime analysts throughout the Golden
State. Both of the authors are still very much involved with this
effort.
We are also indebted to Fred Cotton of SEARCH Group, Inc. for his
insight and generous donation of material regarding automation ...
processes. Fred provided us with the information presented in
Chapter 9 of this book and we sincerely acknowledge his contribution.
IX
his monograph entitled Time Series Analysis Methods (September
1987) which was originally presented to the Bay Area Crime Analysts
Association. Dale's research methods were used ~n the preparation of
Chapter 13 of this book and we thank him for shar1.ng them with us.
We also wish to thank the people who graciously provided their time
and expertise in the preparation of this material. Alan Bediamol,
Crime Analyst for the Chino, California, Police Department took our
hand-drawn sketches and transformed them into the readable graphs
that have been used throughout the book. Alan also provided us with
some of the crime analysis products that appear in the Appendix of
the book. We appreciated his generous assistance to this effort.
Steven Gottlieb
Shel Arenberg
x
INTRODUCTION
INTRODUCTION
Although the term "crime analysis" has been known to law enforce-
ment since 1963, the incorporation of crime analysis units into the
mainstream of police operations is still a relatively new phenomenon.
As such, compared with the functions of patrol or investigations. little
has been written to acquaint crime analysts with the tasks they need
to perform when assigned to these units. Even less has been written
about how these tasks should be performed.
The first chapters of the book discuss the history of crime analysis and
its place in the modern police organization. the functions of a crime
analysis unit. the role of the crime analyst, and how to perform the
tasks necessary to be successful on the job. Data collection. collation.
analysis. distribution, feedback and evaluation processes are covered
in detail as are the issues involved in the development and
implementation of a crime analysis program. Management of Patrol
Operations Program and Management of Criminal Investigations
Program.
2
.-------------------------------------
Finally, the book has been designed to give you a hasic overview of
the crime analysis process. It will not tell you everything you need to
know about this field. But it will get you up and running and give you
the information you need to provide a high level of quality service to
your user groups.
3
------ --
Part One:
e-
CRIME ANALYSIS: AN HISTORICAL PERSPECTIVE
By the late 1800s, crime in Europe had risen to the point that it
seemed only Sherlock Holmes, the fictional detective created by Sir
Arthur Conan Doyle, was capable of ferreting out the criminals.
Holmes' ability to scientifically analyze bits and pieces of information
made him a legendary hero; the real police officer was viewed as a
buffoon. The reason, of course, was that use of scientific methods to
study and analyze crime was not as advanced in reality as it was in
the imaginative mind of Mr. Holmes' creator.
As the years rolled on, new scientific discoveries were made and many
came to be of significant benefit to law enforcement. Physical
examination of a wide variety of materials enabled police officials to
place suspects at scenes of crimes. At the same time, the developing
field of psychology began to explain the nature of human personality
and the establishment of habit patterns. These and other outgrowths
of scientific inquiry allowed law enforcement to accurately determine
the nature of criminal activity, predict its future occurrence, and iden-
tify its perpetrators.
6
Police Beat, /I Vollmer offered the following statement regarding the
use of crime analysis to support police operations:
1 Experience gained over the years suggests that crime analysis units s h 0 U, d
n.o t be assigned to planning. research or other administrative divisions. In-
stead. it is highly recommended that they be assigned to patrol or investigative
divisions and that they provide strategic and tactical action suppon-as opposed
to administrative support-to their agencies.
2 Richard G. Grassie, ~ .• Ctime Analysis Executive Manual (U.S. Depanment of
Justice. Law Enforcement Assistance Administration. April 1977). pp. 1-8
through 1-11.
7
by the Law Enforcement Assistance Administration in the 1970s.
Pioneered by President Richard M. Nixon, this federal organization was
created by the Omnibus Crime Control and Safe Streets Act and the
program was founded on the belief that many crime problems can be
attributed to persons who are habitual, and thus career criminals or, at
the very least. repeat offenders.
Founders of the leAP Program recognized that people who had de~
voted themselves to a life of crime (career criminals) would frequently
come into contact with law enforcement officials. Sometimes they
would be arrested and an arrest report would be completed. On other
occasions they might be the subject of a field interview (FI) or receive
a traffic citation. In each case, officers would include in their
paperwork a physical description of the person, his or her address, a
description of a vehicle (if appropriate), and a notation as to how the
crime was committed (MO). Until the age of computerization, however,
this information was of little value since everything pertaining to the
individual was generally filed according to the subject's last name.
8
These concepts, along with others derived from the famed Kansas City
Police Department study of the 1970s, dealt the death blow to the
time-honored tradition of fielding police units under the "random
patrol" theory. For years it was believed that the visible presence of
police officers was a significant deterrent to crime and the best way
to cure crime problems was to hire more police officers. This was an
expensive belief to maintain; more importantly, it proved to be false.
The Kansas City study told us that it was not how many officers an
agency had, but what they did with those officers, that was of greatest
importance. If an agency had its officers deployed on the east side of
town while all its crooks were on the west side, little in the way of
crime reduction would be accomplished. The study, therefore,
concluded that best use of the patrol force was achieved when officers
were placed in the right areas at the right times. The crime analysis
unit subsequently came to be viewed as that component of a
department that could be of significant assistance to patrol
supervisors.
Under the leAP Program, this concept fell under the heading of the
"Management of Patrol Operations." Additionally, the Program sup-
ported other changes which also led to better utilization of patrol re-
sources. Call prioritization systems, mail-in report systems, and the
use of non-sworn community services officers to perform non-
hazardous duties were employed to allow officers to concentrate on
preventing crime and apprehending criminals.
9
preliminary crime reports. Patrol officers were encouraged to fully
participate in initial investigations by obtaining most information
which could have been obtained during the officers' first victim
and/or witness contacts. Finally, the ICAP Program recommended that
crime analysis units provide investigators with suspect leads, MO
pattern analyses and other such aids to assist the agency with
identifying criminals and possible future locations of criminal activity.
State funds are not, however, necessary for beginning crime analysis
programs. Many ,lgencies have developed them without external
fiscal assistance. No matter how they are funded, and no matter what
name they are given, these programs all share the same basic
objectives-to provide a sophisticated means for identifying and
apprehending criminals and for improving utilization of the
Department's resources.
10
CHAPTER 2
DEFI~ITION:
TYPES:
3 !.hl.Q.... p. 1.14.
12
Strate~ic Crime Analysis:
Only in the larger police agencies of the country will crime analysts
become involved in but one of the above areas. Most frequently they
will be expected to perform some of the tasks associated with each
process from time to time. This expectation is not unreasonable as
long as the emphasis remains on the analysts' performance of tactical
crime analysis tasks.
FUNCTIONS:
13
• Provision of trend and other data to support ret~ource
allocation and departmental planning
APPLICATIONS:
In the daily process of reviewing crime reports, the analyst looks for
similarities in dates, times and methods by which crimes are
committed. He or she also notes any similarity in suspect descriptions.
This procedure identifies a particular suspect who may be responsible
for the commission of several offenses. After report examination, the
analyst collates and analyzes the data in an attempt to define
recurring patterns of criminal activity. If a pattern is noted. relevant
information is disseminated to p.atrol or special tactical action units.
The analyst then continues to monitor the pattern until the pattern
ceases, usually because the suspect leaves the area or is arrested.
14
during the week. Witnesses also described a variety of suspects. Some
were male white juveniles while others were black adults.
At this point, the analyst would say that a crime pattern existed. A
crime pattern is the occurrence of similar offenses in a defined
geographic area, either a single reporting district, a beat, or an entire
city. In this case, the analyst has a number of construction site
burglaries committed in the same part of town but there is nothing to
suggest that the same person or persons are responsible.
15
describing the nature of the series and disseminate that bulletin to
patrol and special units for tactical action planning.
Some people feel that the analyst has a crystal ball or, that the
analyst's computer magically foretells the next criminal incident.
Crystal balls are nonexistent, and the best any computer can do is
provide the analyst with information he or she can use for
examination purposes. There is no magic button that tells the analyst
the location. date and time of the next crime, or the name of its
perpetrator.
There are many other reasons why predictions may not come true:
16
• targeted locations and/or date/time calculations were incorrect
• suspect is deceased
Target profile analyses benefit both police and the public at large.
Police officials use the information to develop tactical action and
directed patrol plans. Tactical action plans guide the activities of
operations personnel in the suppression of specific and well-defined
crime problems (e.g., the four liquor store robberies in our example).
Directed patrol plans are less specific and are designed to place
officers in areas having more generalized crime problems (e.g.,
neighborhoods where burglaries have increased to the extent that a
crime pattern can be ·identified). Target profile information can be
used to warn the public of existing or impending criminal activity. A
newspaper story citing robberies at automated teller machines can
help reduce the number of these occurrences. Radio or television
announcements describing certain crimes in certain areas and
emphasizing the need for caution can also be effective.
17
would be passed to investigators and leads would be used by
detectives to identify and locate the suspect.
When suspects are taken into custody, the analyst can' determine if
they may be responsible for offenses other than those for which they
have been arrested. When our mythical robber is captured and
interrogated, he may tell investigators that the robbery for which he
was arrested was the only robbery he ever committed. Fat chance!
How is the investigator to know what other crimes he may have com-
mitted? The investigator can use crime analysis information to link
the suspect with other crimes he may have committed. Once these
have been identified and substantiated. they can be cleared.
18
Dat3 to Support R~source Allocation and Departmental Plannin~
Acti vities;
Analysts can provide their agencies with a wealth of material for
overall planning purposes. For example, crime analysis can provide
answers to the following questions:
• how many calls for service are we likely to receive next year?
• how many officers will we need over the next two years?
Answers to these inquiries will provide the basis for planning for
future departmental growth.
While the 10 officers on day shift were falling all over themselves
trying to find something. to do, the folks on evening and graveyard
shifts were buried in work. Workloads weren't evenly distributed.
Because beats were drawn along geographical boundaries (e.g.. "let's
divide the city into a four-beat quadrant at Elm and Maple Streets
since they're the two biggest streets in town and everybody knows
19
where they are'"), it was not unusual to find some officers in a state of
near retirement while others were working themselves to death!
20
CHAPTER 3
Timing of Implementation:
Program Planning:
The development of a written plan which takes the above factors into
consideration is highly recommended regardless of funding source.
Wahout such a plan. the program may develop haphazardly and fail to
achieve its objectives.
-...
1')
Executive Commi t men!:
All persons in the organization must know that the program has the
total support of the chief executive. Command staff must be told that
the unit has been established to benefit the entire department and
that the cooperation of their personnel is not only necessary, but
required.
23
~ An investigations commander (if not the project man-
ager)
Because the crime analysis program fosters many changes. the person
who serves as the project director for the program must have access to
the chief executive. Where the chief or sheriff is the project director.
this access must be g,iven to the project manager. The chief executive
must be kept informe.d of contemplated changes and the program's
continuing state of development.
Line level individuals who will have direct contact with the crime
analysis unit must cooperate in the program. To secure this
cooperation, these individuals must be included in the user group
committee.
The user group should be, comprised of members from the following
divisions, units or bureaus:
• Crime Analysis Unit
5 In those states which have them. this individual should be the pmJl.'cl
director for the district allorney's Carecr Criminal or olhcr such pro~(,C'ullnn
program. Where no such program exists. the district al\orncy should aSl'lgn a
deputy district attorney to coordinatc wilh Ihe 10c:11 agency regarding Ihl:
handling of career criminal cases.
24
• Patrol
• Investigations
• Records
• Special Units/Details
• Crime Prevention
• Administration
• Communications/Dispatch
• Traffic
• Any additional division, unit or bureau whose represen-
tation would promote successful implementation of the
program.
Representatives of the above divisions, units and bureaus need not bt!
supervisors; indeed, sometimes it is better if they are not. However.
regardless of rank, they should be' people whose opinions are re-
spected by others in the organization.
25
• Neighboring Police/Sheriffs jurisdictions (for informa-
tion regarding shared criminals, crime patterns, crime
series and/or other crime problems)
• Schools (for information regarding the activities of juve-
nile offenders and the nature of gang, drug and other
crime problems on or near school grounds)
26
CHAPTER 4
28
Supervision of Crime Analysis Personnel;
29
analyst and in hushed tones whispers. "You know, I wouldn't want this
to get around; but frankly, I haven't got the foggiest idea!"
This happens more frequently than one might imagine. And the
reason it occurs is because little in the way of formal crime analysis
training is currently available. To prevent reinactments of the
scenario just described, we recommend that supervisors receive crime
analysis training prior to the arrival of analysts and the development
of' the unit. If this is not possible, analysts and supervisors may
attend training sessions together.
Staffin~;
30
Placing analysts outside of headquarters promotes personal
interchange between analyst and station officers. Dallas officials found
that communications efforts were hampered when they had only a
centralized unit; this realization served to promote assignment of
analysts to outlying areas.
31
on a "door kicktl, etc.). The use of light-duty officers is also of
minimum benefit for they return to regular duty after recovering
from an injury or illness; projects started by such officers may not be
completed. An additional disadvantage is that it costs more to hire
sworn staff than it does to hire civilians.
Those who hire civilian analysts look for people who enjoy analysis
work and who will likely be around to do it for many years. When
hiring an analyst, look for someone with demonstrated research,
writing, analytical and mathematical skills. Applicants who have
congenial personalities, are adaptable to new situations, and who can
work well wi th others are de~irable.
HOUTS of Operation:
Most crime analysis units maintain a Monday through Friday. 8:00 A~1
to 5:00 PM, workweek. This schedule is satisfactory for most agencies.
especially in the beginning stages of program development. The crime
analyst will have to be available to answer questions. draft new
procedures and perform other tasks associated with development of
6 If you are an analyst who has tried everything and found yourself hopelessly
caught in this situation. we have a word of advice for you. "Quit!" Then find
another organization who will be more appreciative of your efforts.
32
the program. This can best be accomplished during the standard
workweek.
The crime analysis unit should have an· "open door" policy; all persons
regardless of rank or position within the organization should have
ready access to it. Supervisory approval to contact analysts regarding
legitimate requests for information should not be required. Open door
policies encourage communication and the free exchange of
information; establishing "procedures" for visiting the crime analysis
unit erects barriers that inhibit this process.
The crime analysis unit should be equipped much like any other non-
tactical office of the department. Basic items include the following:
• Typewriters
• Offic.:e supplies
• Telephones
• File Cabinets
• Bookcases
• Statistical calculator
33
• Multi-color 1/8" adhesive dots (for color coded depiction
of crime locations on maps)
o Software
7 Agencies need not have a computer system to have effective crime analysis
units. Indeed. many operated successfully in a manual mode before the advent
of automation. However, for those departments which art or will be automated.
it is essential that crime analysis units be provided their own computer
terminals. These terminals should be on-line to a department's primary
computer system so that an analyst can easily download data from or upload data
to it.
If the primary system bas only the singular function of capturing crime and
other incident data. it is recommended that the agency acquire a stand-alone
personal computer sys.tem for ~he crime analysis unit. Depending upon the
software purcbased for it. the system will allow the analyst to create graphics.
spreadsheets and databases. It will also perform word processing and desktop
publishing tasks and facilitate computation of the statistics necessary to the data
analysis process. Further. the system can be used to monitor crime patterns and
series and to track case assignments and clearances. Project management.
flowcharting, simple budget accounting for the unit and other such routine
activities can also be assisted through use of the personal computer. Finally.
when networked together on a department-wide basis. these computers can be
used to promote the rapid exchange of information throughout the entire
organization. For more information regarding automated systems. please see
Chapter 9 of this book.
34
o Dot matrix or laser printer (a color printer will add
flair to documents)
• Overhead projector
• Facsimile machine
35
---- -----------~ -- - - - - -
CHAPTER 5
Source Documents:
37
Data Elemcnt R~qlliremcnl":
• Crime Reports
o geographic factors
o time factors
o victim/target descriptors
o property loss descriptors
o physical evidence descriptors
o solvability factors
o specific ~10 factors
v preliminury investigation information
• Suspect/Arrest Reports
o geograph ic factors
o time factors
o victim/wrget descriptors
o recovered property descriptors
o physical evidence descri ptors
o specific MO factors
o suspect descri ptors
o suspect vehicle descriptors
o geographic descriptors
o time factors
o subject descriptors
o subject vehicle descriptors
o names of associates with subject
o reasons for the interview.
Report Formats:
The two types of formats most widely used in the design of soun.:e
documents are the:
• narrative format
38
• forced choice format.
•
OFF NAME STANISLAUS COUNTY SHERIFF'S OFFICE
IUIPECT/AAREITlElM.UINQ PD.ION REPORT 2. INCIDENT NO.
1. PAGE OF [J FOllOW-UP
~3.SrOl
4.1WoII-\.AIT Ia.. "/IIfT"( IOfI
I'~
~ MIOQ.I "MT WIOC.I
~
'.1401
13.AOTYI"!
14. STATUS
roo.
"oo .. ,ss
IU.fT
r'>OATEA .....
".WT
rt.TIMI~
11o.~ATlOH
CITY
.,... - ,a-1:aIIl .
CITY IT
.~
"
ZJft
16 .
- ,..c.."-GlS
8WT
ltone.
avKQ.
SAGE 17001
13 AD TYI"l
!4 STATU'
AOOIIUS
I
,""T
15.0ATE AA ...
1
rO>OCCUflATION
jt7.LOCATIOH O¥ AMQT.A..."'OMSI
111.~
IT %I" ....:::Ifa..a_
CITY
.-. ,D_
.,...
IT
•
ID
........:;..,~
-
ZI"
- I.CI'IARGU
...,.
3 Sloe 4 NAMI·I.AST I~ "..-TY 101)
I'I ..ST MIOOU MlCCI..l
.I·.MM.AIT
,.....
~
'.AGE
13.AOTYI"!
1~
17.001
STATUS
AOQfIiSS
_,II'IT
r'OATEA ....
18.WT
..
II~.TI EAMI,
110.OCCU"ATIOO
CITY
IT
&S
~
"
- 1'.CHAAQU
: -. -
2 3
MTYTYN (2')
o 0 0 RE·SPOHSIBLE
1 2 3
IYI COLOR (I)
o 0 o BLK·IlLACK
1 2 3
HAiN LlNQTH It,
o 0 0 SHTSHOfrr _
1
~(I)
o 0 0
2 3e CAS-UAi
COO SU-SPECT C 0 o '1lUoE .D a CCII..&.M~ a a a fU.IMt
ceo CI·TATIOH o 0 o BRO-WH o 0 0 SHO-ULDR LGTH o 0 O. COH-SfI\
. . c ~
C 0 o GAY'-. o a DLGH OQO-.n
C MI·SSNG PERSH
l.. .J o 0 C GRK-GREEN HAIfIITY~ (C, o 0 C Ols-GUlS
ceo Ff.a.D IfflMr C'o a 1W.a· . o 0
aDC _ _
0 AFFI-O Q a a fIDofII
lUel (1) o 0 o UHf(·HOWH oa 0
0 0 ~L-L&
0 __
o 0 0 W·HITE C 0 C BUs-MY
o C 0 ~ a.I.A8N. (2)
o 0 0 H-ISPAHIC/MEX C 0 C PRE·SCRIPTH
O. a a
CIlIa":!
COO CRE·W CUT
01...,..,.. (2)
o 0 C VIOl..£ff1
COO e-. . . o r.J Cl 1II..Jt.51t,.. D.Cl 0 c.&.r' ao 0 CAUl
o 0 0 F·ILlPlHO o 0 0 WIR-E FRAIIIES COO GIlE·ASY o 0 C NERV.()U
COO 1-AMEJI1fDWI' a C 0 " ' " p" a c a . . . ~ £I 0 0 PIIUoll
o 0 0 J-APAHESfi o C 0 SUH-GlASSB
Dec 0 0 C "l-lTARY
___ .: a·Il" . ..G. . . ~~A
COO AHGA-Y
'£I D 0 _ _
cae »-II EAlTBIII
o C 0 STI.IfI.£~
NOmfAlM:M CCONON-E COO~
o ~•..;D~D' . . .~ C'O CI I\IIM-m
0 C P·AClAC iSU HAl" coc.o. ...
" ,., 0 C C SIQ.E PART o 0 0 UNKM-O't
ASIAN ceo AU!-URH ,-~a->~ .•>~. '~'.>
o 0 C o-AU IJIloII9I& • CJ 0' ...,..,.....~ , - - _ . ' ,. ....CHII)
o 0 0 ACC€-HT
o 0 C U-KHOWI~ o C C IlHlOHO HAM TTN (I)
a
UX(1) aD • • • . . :~~&g~ ;.~ o
0 0 SLlJWE
0 0 USP
o 0 C M·ALE C 0 C ~ . COO flEC.EOIHG ......oRMAND(t, "0 0 0 ..-..u
ceo FoaIAI.! C 0 I1I1II ....,; ;Qi..O"O _ _ ....• o 0 0 I-DTH o 0 0 TALK·ATl
o C C U-KHOWH a 0--0 tMF.t' ',j
ao a0 a0 _.-t···1
WHI-TE 0 0 0 THK.THICK
·1It8"'tfllR' ...·_-.-e.. o cr-D
a 0 0 ~
••__ ~~
a.
Q C STUT·18
• COO SLOW
C 0 C OTlf.ER COO MED-lUM 'cao~
10' c:t cr. I ... 0;
-----------------------·-----------~~~~~~~..~R~i&i~~AUN1~~W~A~Y----~------------~--------~.~----
1 2 3 1 :2 3 123 123
fItI.UON '0lIl LOlIt_ (I)
•0 C 0 FlH-AHCIAL WOORY o C 0 _
0fIJ.6S1
_AlCOHCl. C C C JlEM.TAlIUJtBS c:un MOT.-o IW ~ •
,.. a D CUl-lD.wI C 0
DO aC .............. __.. D:.a
UIitO-ER Alii: WAfllUGE R __
C 0 C YES
:I 0 POO-fl HEALTH o 0 0 FAM-Il Y TAOO8I.E o 0 0 UNK..,.,. o 0 C NO
~------~--~~~~~~~------------------------~----------
I HEREBY ARREST THE ABOVE DEFENDANT(S) ON THE CHARGE(S) INDICATED AND REOU~'ST APEACE OFACER TO TAKE HIM INTO CUSTOOY.I WILL APPEAR
,.~ DIRECTED AND SIGN A COMPLAINT AGAINST THE PERSON(S) I HAVE AAAeSTED.
40
2:c."ITIZEN·S SIGNATURE _ . _ _ _ _ _ _ _ _ _ _ _ _ _ Clnz"ar:.,:S.:S:EOI:.:====::.:A:R:R.;.::SEOI::.:::..:=:.:::._ __
--------------------~---------------ITATU.COa..-
81(1).i(I()e(E) COM-PLAINT OIV-C1TE TO OIVEIfT INF~WA T10ff , mlEf
r:I'T.F ~ AI c: r.~C:"""C: '40." "'foIT ..... --.11'1: T i ' ' ' ' T'\I\A'
STANISLAUS COUNTY SHERIFF'S OFFICE
CRIME/INCIDENT REPORT Figure lA
CJIS
t. PAOE _ _ OF _ _ 2. INCIDENT NO._
a FOLLOW-UP
-~ - ,--
- - --- -~~ - -- - - - - - --
-- - -
3. REPORT TYPE o CR·I .. E o IN-CIDENT o TH-E" C AO-OITIOHAL "A~ c su-sPtcIOUSCIAcUMSTANC
o AL.-·AA-MC-W-A-..fItRANT--YAvICE OOT-HEAII.-."-T-'-- - -- -- - ------
---
UPEcIALCATEGOAv-C ClO-wESTICVIOlENCe- 0 AE·STAAINIHOOADEA c LA-HOt.of.~ o ~LD CUSTOOY
-
---I'~ -1IIiDo..I
e
- fi.~
It ~ATIOH- - aDCe
24Ac-TYfII AooMA--- - - - --QTY-- - -- -
- QTY --------::IT=---::,."" - - - -
a~
...
123 t 2 S 123
aC 0 C VJ..CTIM
a::Gii"_·~
C C C PA-AEJ(T
·j'._•.•_liiii___
'AIfT'Y 1'YN (1J
gee \~,AIfTY
C C C 1AC-AJ1J11JEST15 CIT1l!M o
MCi("
DCCW-tm
..... 'C.C C I K-ISI'A»CJ fItD
'1
D.tr~. IttA ~.&
• • •,~~~,,~ of .f .::
C Q'sq
C C, ST-9 'AJIIBIT iiiicf!icP.iclIi'~iiii6lS_TSIS)
~~
• •(MII"1IiI
I:t !!2 -Y
C eel 1I).M8)ICAL. C C C GA-AAGE c 0 QLJ.APANEJE
IJ".IS-QJ £ • &D:iaaAtii,w'liiill• • • '.11
C c C WE.fmONED c C Bt~IIUAIWf
ceo u.QOWIf
. REP
C'Ana.~ _ __
t:I aI ANAl valS _ __
~~~====--~==============~--Co~----------------~------~
HM»N. . nN
fIES..IIaCf AlIOfIJBS 41
YAC-A'IlOIC IIISIQEJa ADIIIeI 1010·
WQA.«J~ ADDfIESS
Pigm:e 2
STANISLAUS COUNTY SHERIFF'S OFFICE
IIODUC ONAAHDf DITAIL
---
-''''1'')
cw,
a..-
__ •
.._.,.....,...--
:.=s~_
~
.-.., ....,
al·-:cm
--",.....,CIJ
a WCHlO
c· ...
...........
C"4_~
C'J DU'I..o • • • • 'aIiI
D~ alToO..
a a.crw
....'""'" ,....,
a....u a;_~
a _ su.STlA'XO Do • ~ r:... '"7.11
alW4Jlr 1:2' _ a CUT·V!CTII
a OT'-
.~
•• ... :. -0•
a A'U.TMeff a __
a. . .'-.... 1
"TVICTII
D Hl!llJIIInIl ~C1'
a DOMt-ITOIrf oS'·NGlE ST~Y
a weVtCT1M.
121_- CcUU. - . . . . ']
II ~"'" U!IIt a CCJIII.8B V'I 'IICI
OIT1MAQl
a wAM44OUl! ,...,... COIIDi....... (11 a:.'_."ClI •.
a TaN HlllTAil
~
a ... a OAY.uliHT 1Il_ • • • _ , ..i
O'_~UT
aIAM- a ~'UT a .... crw
a,t.~" ...--: ;::J
o co 'CIM. a!_~
a·~· a~ ... wa
en- .. 12-.-__
• ,::IL;
IICWIT'Y &.- III rw. F '0:::.1 nra
a Al,.AMf aMN_
c ........ ~: •. till • •
OlIN
•a
0 • •_ "
GI"''''~
....
• ;,a . . ." .
o ..mau&KT
Q .... '·,'.1
o Lo-cxI _.I"~.
ao .•••l
~CAIBA
U. a~
O~~ .,.:,;
.. -
a.~sr
0..,.. ~ ••L. i:;3
~c..
..,., CV1l
O~
an
c
'!fa:r.. 7 1
a,UT~_.
·D'.... IS
•
'0 SI-OE 0
...... .•
• IIOTOIII WWtICU II. ,;• CCk1
o CAIIUVTO L.I'I& CWI
a TJIUC:.& Dtnn' (11" an'
:W,..,.
.,'-
alU$- ~ CQ
av. . . . C UN9I U\'B. 0 a.;;;nm
a MOTQ.«l'CI.E u;- • Ow-f"
It IIOeLI , . . . "
a TUI-l91
C IA-saaT a a._wo
0 . . . . ·-.- • c
~_
~T""
P II a- 'WM'·til
a"''''''
a AIIIfI~
C UHMMII C
a
a "J.
CAw.eI
LOCA.... Of'I
.,.,.., CVft . . , c .......
at ~ . . ., N~!I
• o.tIIAMA
a C*I''' 0'_ a a .......
a'~l ~~ 111M 7 IIM.j
a H!liH-WAY
a .... ' :
'. ,
.. c au.erlaf
ao~
a MMon.-,.Ta
.-. . . ._
aa 1'rM\
ALlH
•.12',..........,
c""'-
_
a CYAII-:O'1ra:w. T .
'0 , . _.... ~ a a«1M
eon.~
C 0U1'I-4~
C , . . .... a'~L.-n'
a
t4~.
SIGN
I:L~ •
.- .
4. IIOTIVI (I)
• MOl . . . . AMA C1' c . . . . ,...
o IISIO«TlAl
a - .. ...- a MIo . . . . ..-.
ca 1lUAA1WUL1ICMI'.,.
- __ t ' - : a cow...,1WM
a 1USI-.mI~
O~."" at
alIT""- •
o IifCIIE·AT1OIW.
ap= . . . . . . at--
a .UIoWJPT ~
04
. . _ IM~M
Ic:o.c.c AMA C', a ~~""W411
o ~ClASI
Q· . . . . . cua at
0 .........
a L-WSI CUll 42
.1L C8S
--- - --- -----
1 2 3 4 5 12345
e----
UJtML'MII (1) 0THf.. WIUON " " (2) WIUOtc ,........ (2)
o 0 C C C ~lE o c e o 0 SlU-NT IHSTJWMEHT OCt 0 0 SAR·E METAL
ceo C C MUl· TIPlE C C C C ClU.e c o C 1.1 C 0 lIlu·e
1 2 3 4 5
C C C C C Ove·R UNDER C I:J C C C ClE·AVER o 0 n 0 0 CMR-OMe
C C C C C SIO-E BY 5mE C C C C C M·M IMSlPlUMEMT COIl 0 0 PLA-STIC
FI"EA"M TY" (1) C C C C C SIN-GLE C C C C C olR-K/oAGGER o 0 'J C 0 RUs.. no
a a a 0 0 RIF·LE C C ceo llMK...OWN C' C C C C FOl~H6 KNIFE o C ] 0 C $T4-lNlESS
o 0 001:1 PIs.. Tot. IA""IEL LeNOTH (1) C C C C C HtJN. TIHG KNIFE C 0 J 0 0 WOO·O
a 0 000 SHQ.TGUN COO 0 C 2 IN·CH C 0 C C C. ICIT-OtEH KNIFE C C .J C 0 OTH·ER
ACTION " " (1)
!J 0
C C C C C 31N-CH o COO 0 Mll·ITARV KNIFE C 0 J 0 0 UHK·NOWH
COO AUT.oMATIC o 0 0 0 C ~
IN·CH C O' 0 0 C MAC-METE o..~ ' ...IIH (2)
o 0 0 0 0 BLA·CI( POWDER o 0 0 0 0 S IN·CH o COO C SWI·rCH BLADE o 0 0 0 0 80N·E
o 0 0 0 0 BOL·T o 0 COO 6 IN-eH o C C C C HAT.cHETlAXE C C ceo IVo.RY
o 0 0 0 0 lEV·ER o c b C 0 LO~ o 0 C C C EXP-lOSIVE C 0 (] (] 0 MEl·AL
o a 0 0 0 PUM·P o 0 C 0 C MEo·IUM COO C C UQ.UIO/GA$ (] (] 0 0 0 P\,A·STlC
o a 0 a
0 REV·OLVER o 0 0 0 0 SAW·EO OfF o 0 COO MAR·TIAl ART WPNS COO 0 0 TAP·E
o 0 0 0 0 SE"'·I AUTO o ceo C SHo.RT C 0 C C C nm.owN OUEcr o 0 0 0 0 woo.o
o 0 0 0 0 SIN-GLE SHOT COO 0 0 UNK·NOWN o COO 0 OTH·ER ceo 0 0 OTH·EIl
a 0 0 0 0 UNK·NOWN o 0 0 C C UNK·NOWH o 0 0 0 0 UNK·NOWN
------------------------------------------~~----~~~~~~----------~-------------
- Y HI - NFORMATI N
-
I HEREBY CERTIFY THAT TO THE BEST OF MY KNOWLEDGE THE INFORMATION GIVEN IN THIS REPORT IS llIUE,.NO ACCURATE. - - -~I.X:KEo DYES DNa
AUTO PAYMENTS CUIIR£NT 0 YES 0-
43
_ - - - -
~G:An:A:G:E:AG:E:NT~X~~~~:;;::;::;:::;::;;:;:::~~GARA~AGGEE!N~rS~S~E~~~_;:::~~VE~H!lOC~:;::,:::~~~::;:~~~~~
CODII- SHADE CONDITION
COLO R E ('jRY.GRAY OR'-.ORANGE PlN.K WHI.T£ eLI' 8lrl( PRIMR III)II·IIEO ..,.,,,.R o.ARI( F.A[)f.D G·C·JO P·OOIl
/'lGE BFIr.e BUR·GUNOY eLU· " " U...... H....... H l.!GHT FAIR M.15SING
~LKBLACK 8110.WN (jOL·n GilN.GREEN PUII.PlE IIEo. YEL·LOW GRP G"'v !'fItMR .... u ..
SCAN'l'RCN ~ - cmN:> POLICE 0EPARlmNl'
- M O. IDENTlFIERS NAME/OFFICER I D CRIME CASE NO Pg of_
II ~ PLACE AT1"K
33: Phone Booth ·12. Garage '13; '13_ Sldng Dr/Wndw
I l I
FI'Bk Yard ::)4.- Photo '13' Kitchen '14: '14 Uppr Lvi
1 1 Park 35- Restaurant .14' L,v,ng Room 15 15 Wall
2 ParKing l.ot 36 Shoe Str 15 Person 16
I :!" ~~:~~:~RBoXom
I 3 School 37: Storage
4 Shol)cng Cnt. 38 Supermarket Vehicle
~ SI Alley 39 Tht,· .Enlmnl 30 30:
!I 6' Slruc
7 Vac 101
40:
41
42"
Travl)!l
TV-Radio
VIdeo Sir I ~1
Vehicle
_ _ _ _ _ _ __
31:
'32:
33:
;31- Drvr Or
;32:: Drvr Wndw
~33: L/R Dr
.12
- - -I
I SURR AREA 43 Warenouse ! Console 34.. 34- L R Wndw SECURITY SYSTEM I 19. Muill Susps
I 0 Eng Cmptmt 3S. "35 L'Wng Wndw , O· ________ I 24' o.\ade V Vulgar La
1 BU5lne 55 I ReSIdence Glove Bx 36- ,36- Pass Or ,1 AUdible Atarm 2S! Maslurbated Self
2 Farm I 51 Trunk 37" 37 Pass Wndw 2: AUXIliary Locks • 70: Needed Phone
I 3 Induslrlal 52 ApI 36 Truck Bed 36. 31! R. R Or 3- Dog · 26: Pholog,aPhed, V
1
"
4 Open' Area -5::t" Gondo :39: 39: RIR Wndw : 4: Gar Dr Locked :27: Pul Propd'cketi6
7 Park 54: Duplex Property :40: :40: R/Wng Wndw : 5 : InSide Light On : 2 e:. Put P,op/ Pllowc.
6 Prison 55- Garage -40: _ _,__ ,._,~, _ _ __ ;41: _41" Rear Doer : 6: Obscured Int View :71: Police'FI,'em",n
5 Resldenllal 56: House -4 I: Auto Parts :42: :42= Rear Wndw : 7 : OutSide Light On "29: Prepared EXit
6 School 57- Mobile Home -42= Bike '43: 043: Sun Root : 6, P"vate Sec Ptrl '30: Ransack
STRUCTURE 43: Cash/Notes 44: Trunk " g; Secuflly SIgl'l5 ~ 3 I: Rape lly Instrume
Commercial Public 44: Clthsl Fur 45-: W,ndshield :10: Silent Alarm :72:: Renter
o 61" 45.: COins 11, Standard Locks :73: Repallman
1 Aplnce. Frn 62" Church 4&: Coil/Stmps MOE : 12= Wndw Bars:G'llis • 327 Rip/Cut Clothe!
2 Aulo ParIs 63 HosPllal 47- CoIII(Oth) .0 _ - 74: Sale'lilct Ods
SUS!' / ACTION
3 Bank 64- Park 48. Consum Gds 1 Unknown : 0; _75.; Saleslle!!On
4 Bar 65- ParkIng Lol 49: Const Mal ~ 2 _ Attempt : 1: Alarm Dsabld :33: Searched/V
5 Bike 66 PubliC Bldg SO: Firearms ~ 3 ; Body Force : 2; Arson '77; Seek AUls\
6 Book Sir 51 Hshld Gds Bolt Cut 3 Ate· Drnk on Prem 78: Seek Person
7 Car'Sales
6 Camera Str
61 Vehicle
_ _ _ __ I 52'· Jwlry:Mlls
53: LIvestock 6
!\ Brick. Rock
Chnnl Lock
. 4' Bound GaglV
; 18: Been Drlnkn9
-34: SelectIve Lool
:35.; Shut Pwr Olt
9 Cleaners
10 Clolhg SI,
11 COin l.nd,y
6Z"
63·
84
Arrcrtt
Boal
Camper
I 54 Ofc EqUIP
5& Pu,se
55 TV, Rdo/Cam
6
7 Ct 'Hngr 'Wre
E~plostves
9 Hid In Bldg
5 Cased Loc
6 - Cat Burglar
6~ Conducting Srvy
1. -36:. Smo~ed/Premlt
I :3~ Sodomy
'79: Sohel Funds
12 Const
13 Cony Str
85
86
Mtr Home
Pass~:lger
57 Tool
Victim
10 Ky'Sllp,Shm
11 No !'o,ce
63: CusllCllenl
7 Covered V Face
I
:3a: Struck VIc
39= Sggsl Lewd Act
14 Computr Str 67 Plck·Up 61 0-13 YI 12 ,Punch 9: Oefec/Unnated :40: SiArmed
15 Dept Str 8a: RRICar 627 14-17 YI :13: !lemove Lvrs 10: Demandl!d Monev :41: S/Climaxed
1 16 Drv'ln Sir 89" T,aller 63: 18·24 YI '14 SW/D,II:Brn 64: Delivery Person 42= S, Fondled/V
- : 17 Drug SIr 90'. Truck 64- 25-54 yl 'l0: S,;rw Drvr :6&: [)funk 43: 5, ErechA
, 16 Elctrnc Sir 91' Van 65.; 55+ yr 'IS; TiI'e Iron . 6' Dsabld Phone I 44: S. Lea~e.s
"';'1 19 Fast Foods
I 20 Fnce Cr Un
16 • TMI ThrLl 65- Dsabld Motollst I
·4S. SiOrl Copulat/'
TARGETS ENTRY/EXIT 17 Pry Bar 11 DisrObed V, !'ully 46. TOOk Concealb
i
21 FlOrist
22 Gas,Garage
I 23 Gun, Sp Gds
o
I
2
Allie
Back,oom
o
\
2 -
I
_2
o
Unknown
Adl Bldg
16 VIce' GriP
19 Wndw Smash
Vehicle
12 DIsrobed V Partly
67" Employee Employer
- 13: Exposed Sell
I
47 TOOk V'Veh
48. Tortured,V
49;. Und Influ'Drgs
I 24 Hardware 3 Basement 3 3" Basement 31: 14.; Flied Weapon 50: Unk II Chmaxet
I 25 Hotel,Molel 4 Bathroom 4 "4' Door 32= Unkn(1wl'I - 16: Frcd V Fondle S 51- Un usa I Odors
I 26 Jewelry Str 5 Bedroom 5 5 Duel/Vent 33: Dr/Lo(:k Forcd 1t, Fred V Move 5Z" Used Demnd I'll
27 L,quor Sir 6 Cash Reg 6, 6 Floor 34- Pass Door ; 15. Fred V InVeh 53: Used Drover
1 26 Med Chnoc 7 Countr Area : 7 - - 7: Front 35.; StlP Lo\:k .68: Fllend' Relatl'/e 54: Used Lookout
I 29 MI9Firm 6 Den/Fmly Room _6 8: Garage '36: Trnk Fo,'ced 20: tnlhet Inlury 55,; Used Match, Cr
-:30' Mom & POP 9 - Dlnong Room -9 - . 9~ Ground Lvi '37: Unlocked ~21: Insert Fng" VagIna 56:. Used V/Name
\,:31 Olloce Bldg 10'" Display '10, "10: Rear 3a: Wndw Br,oken 69= IIIdnlured 57': Used V Sultc3~
, 32 Pawn Shop 11 Fenced Area II : II" Roof . 39: Wndw FOI'ced 22'"" Knew Loc,Cash 5a: Used V 'Tools
! 12' .12" S,de 40: Wndw Oplln 23: Made Threats sSe Vandalized
PRELIMINARY INVESTIGATION REQUeSTED RESPONDED 50: Veh Remove P
AREA CHECKED : STATEMENT TAKEN DUSTED FOR PRINTS HELICOPTER 51 VOrl Copulal.
DIAGRAM OF SCENE : VICTIMiS) CONTACTED , : TlRE/SHOE TRACKS CANINE
SPECIAl. UNIT ,
I
EVIDENCE
NEIGHBORS CONTACTED: : WITNESSES CONTACTED'
I
1 Y
SOLVABILITY FACTORS
N I ....AS THERE A WITNESS TO THE CRIIitEl Y: .' N: 8 IS THE STOLE. PROPEAllIDENTlfII8lE? Y
OTHER
NEIGHBORHOOD WATCH
N I IS MEIII!!R Of BUSINESS
ISe
..
I~
Blood
Bul Casing
I Y N 2 IIII.S A SUSHCT AmmO? : Y: ~ N: 9 tS THERE A SIGNIFICUT 1It.01 NEIGHBORHOOD WATCH I' 3
4
BulPIIU
I Y
Y
Y.
N
N
N
l 1$ A SUSP!CT NAIIIED?
'tAX l SUSYECl BE lDemO?
5 CAN A SUSPECT BE OESCRI!EOI
Y:
Y:
Y'
! N;
. N~
- N:
10
II
12
IS SIGNifiCANT mSlCAl EVIDENCE PRESENT?
IS TMUi l'~D' IIJUIl SEX CIIIE ,MlIIIIED?
IS l1I!!E AGOOO roSSllllll1 Of SOlUTIO.?
y ' N - 2 IS ItEIIt!ER Of O~R IDENT
Y - N' 3 IMHftESm 1M MW IW 010
y: 'N: • stCURITI tHEClS OESlm
5 Clothing
Cntrld Subs
6 Feces
Y, N 6 CAN A SUSPECT BE ICENTIflEOI Y . N' il IS fURl1IER InEMATIO. mom Y , N: 5 HAD HOllE IUSI.r5SNSPEtT t 1 Fng, Prnts
hY~",.,.,.~Nl.".,~I~CA~.~lJS!!!US~PE~C!.T!!YE~HI~CllE!aE~I~O£~N~Tlf~I£!D?~_ _~Y~~N~-!!"...!I!.S~CAS~£.!&~"!!.'~R£l!\I~lE!D?~_~~_ _ _"T-::_•.J...:W:H!.:EM~IN::S~~:.:CT!!E~Dl=========:;..;i
8 - !'orearms
- VICTIM PROFILE Physlc<:J1 Condition Mafftal Status Annual Income Education ' $I' Glass
Relation To Suspect o. NO IM~IRMUIT 0 UNKNOWN : " Q·51( : 1: 8 lRS 1 10: Half mow
- o - U~KNOWN
1 ACQUAINTANCE
. 2 BOYFRiEND
3 BROTHER
9 HUSBAND
'10' MaTHER
I l' NEIGHBOR
1 2 OTHER FAMilY
1: BLIND
2' DEAF
.3: ELDERlY
4 EMOTIONAlLY UPSET
• 1
-3
ANNULLED
- 2; tOHASITIIiS
COMMON·LAW
4' DIVORCED
2
:)
5-IOK
IO-15K
.4: 15-251(
5 - 25·m
: 2 : BELOW 1% lRS
- 3: HIGII SCHOOL
- 4" 2·'"$. COllEGE
5 HRS COllm
0 None
Paint
lZ' Pllraphn"_
',3: PhotOg'A
'I"
4 BUSINESS ASSOt -13: SISTER 5: HANDICAPPED . 7: MARRIED 6 OVER 35K 6 MORE THAN 4 TRS I 14 Rape K W
5 DAUGHTER 14. SON 6: MENTALLY 0lS1 RET. 8 WIDOWIERI I' IS. Semen
6 fAmR
7 fRIEND
15 STRANGER
.16 WIFE
7
6
MUTt
SICK INJURED
5· SEPARATEO
6 SINGlE
Homeowner
Y 1\1
-.I~6~G~IR~lf~RI~fN~O__~-~'1~7~OT~HE~R========~_·~9__~UN~O~ERWI~NFll~O~RU~G~S~Al~CO~H~Ol~______________~~~~.~~~~______________~I~a~U~"~ne~____
I
16 TI MarkIngs
17 Tools
•
-I
Susp Name
Susp Name
--- SUSPECT/ARREST
IDENTIFIERS
Case No .
Pg._ot_
";].4: ~.e:: :7.e:: "lI~a
-I HAIR LENGTH: STYLE (cont) FACIAL HAIR (cont) BODY SHAPES: SPEECH:
1 2
991 2 (141 .'1avy 1 2 i 12: Looe Lglh Sideburns - 1 2 1991 1
-I 1 , • 2 • 2' 991
13) Collar Length -1 '2 (22) Widows Peak 1 , • 2 t 13) Lobe Lglh sa w/Flre : 1 - . 2'
e
! (1) Thin : 1 : : 2 : 121 Acetnl. Fort',
1 2 '51 Long 1 ' 2 10) Unknown 1 ' . 2 • 121 I Long POinted Moust 1' : 2 (2) Medium : 1'
: 2: (1) Acetnl. US
1 2 151 Punk Style · 1 • , 2 125) Low Exlenslon : 1 : • 2 : (3) Heavy : 1:
~ 2 : '91 oeeo
-1-1' 2' (7) Shaved COMPLEXION: : 1 7 ~ 2: (7) Mouslache : 1 : : 2: (4) Fat : 1:
:2:
-, 1
-i 1
2 (2) Short
2 141 Shldr Lng\h ,.
1 '2 (99)
2 (1) Acne. Pocked
~ 1:
, ' 2 : (:15) Mutton Chop~
· : ' 2 - 1:1:1) Old Dulch Beard
, 1: : 2: (5) MUlcular ,
•
1:
: 2'
1:
·2'
(3) O'sgul14
IA) LISP
-61 ..lute
1 2 111 Unknown 2
_I
I TYPE:
1
1'
1
2
'21 AlbinO
13) Cteat
2 141 Dark
· l ' , 2' 141 I POinted Goatee
• 1 ' '2 l23l POinted ",. Part
1: 2 . (:12) Scraggly Beard DISTINGUISHING
•
· ,-
1
: 2:
~ 2 :
, 1· : 2 :
151 S;urred
'61 Imeed,,.,enl
17) Stulleltn\l
-
-1
;
1• 2 199) 1 - 2' 15) Freckled : 1 : : 2 ; (:17) Short Bea'd MARKS: : 1: : 2 : (0) Unknown
=j:r
l 1 2 (7) Said 1 2 (5) L.19ht. Fair : 1 ' : 2 • (22) Short Moustache : 1 • = 2: 199)
: 1•
- .,"
• 2' (4) "'lne 2 (7) Medium :; 1 : : 2: (8) Sideburns : 1 : : 2: (1 I MISSing LImb WEAPON:
, 2' (6) Recedln9 - 1• - 2: IB) Olive ': 1 : ': 2 -:c 129) Small Ring Beard : 1 : : 2: (2) Anlhc~1 LImb
: 1 : : 2: 199) - - - - -
2· (2) Thick 1. • 2' (9) PalefSaliow =1 - : 2 - (40) SoutherN Colonel : 1 :; =2: (3) Blind : 1 : : 2: It 11 Butcell Bit
--
- '1' • 4! (5) Thinning • 1- • 2 • (10) Ruddy : 1: = 2 : (17) Squale Moustach. : 1 : : 2: (4) CIne/Crutch : 1 : :; 2: (12) Bllck)lck
- l' ·2 (I) WI9 : 1. 2'(11) Janned : 1 :- : 2: (27) Thick Moustach. : 1 : :2: 15) Crppld Bdy Prt : 1 : : 2: (13) Blowgun
-II'
-I 1•
2 (8) Wiry
2 (3) Unknown
•
· ,
1.
,
• 2' (12) Weathered
- 2 -(13) Wllnkled
,
:
1:
1:
: 2 - (24) Thin Moustache
: 2 : (42) Throe-Point Goatee
: 1 :- =2: (6) Deaf ~ 1 : • 2: (14) Bodily Farc.
: 1 : :2: (7) O"ormed limbs : 1 : : 2: (15) Bombl Elplol
=1 STYLE:
~ 1. '2 : (0) Unknown :
:;
1;
1:
:; 2 : (19) Turkish Moustache
: 2 ~ (9) Unshaven
:; 1 : : 2 : 18) Growth.
= 1: =2= (9) Helling Ald
: 1 :- :- 2: lIe) Bottle
: 1 :; :; 2:; 111) 8n(ItIRock
---
- "1' • 2 199) FACIAL HAIR: : 1 :- :- 2 : ( 10) Va n Dyke = 1 : :2:'l0)Ltmo : 1 : : 2' (IS) Club/Bludge..
, 1 • 2 ( 1) Alro Natural - 1 - ·2' (99) : 1: :2~ (0) UnknOWN = 1 : : 2: (11) Mute : 1 : : 2 = (19) FIIJhhghl
1• , 2'
(5) Bangs ' 1 : - 2: (34) Abe Lincoln : 1 : : 2: I (2) Skn OSCOlolltn : 1 : : 2: 12) HIr!d9un
- " 1 :-
1 • 2 (3) Bushy
'2 ,
(2) Braided , 1 • • 2' (43) Anchor Beard
1
,
2' 1\ Beard ' 1• • 2
FACE SHAPE:
(99)
: 1 : :; 2: (13) Sp,utlc Mvmn!J : 1 : : 2: (8)l(nl/e
'; 1 - : 2 ' (14) Whee"hatr ~ 1'
,1 :
, 2: .J I "'Ien,n. Gun
-\-,:
-, 1
-
2 (4) Butch
2' (16) Center Patt
'1" , 2 117l Combed Back 1.
1
,
2 •
2
2
1351 Beara w'uposea CM
,20) Busny Moustache
21 Clean Shaven
:- 1 :;
: 1 :;
' 1:
- 2 • 11) Broad
: 2:; (2) HIgh Cheekboned
• 2' (3) Long : 1:
TEETH:
: 2: 1991
:
:
, 1:
: : ~: 1201 IoItlllllnUCklt
: 2' 12.1) Hu~hlk\ll
: 2: 110) OIh Sib/Cut I
· 1 " • 2 ' (18) Curlels · 1 • • 2' I 18 I ContuCIOUS : 1: : 2: (4) Oval : 1: : 2: (1) Btle .. : 1: :2= (7) OIh Unit Gun
- 1• 2' (5) Curly - 1 ' 2" (28) o.sq Surd w/Moust : 1: = 2 : (5) Round : 1: : 2: (2) Btoken : 1: :2= (4) AIIlt
- 1 ' '2 ' (19) Dirty - 1 . •2. '38) Fork Beard : 1: = 2 : (6) Square : 1: :;2: (3) ChlP~ : 1: = 2: /22) ScIt&Oll
: 1: , 2-
· 2 •
,3) Fu ManChU
1391 FUll Beard
(A4) Full Go;tee
: 1:
: 1:
2 : (7) Thln/Lon9
: 2: (0) Unknown
~ 1:
: 1:
'; 1 :
::2=
:2:
=2:
(4) CrOOked
IS) FI/le
16) ~PI BetwHn
::
:
:
1 ::
1:
1::
' 2: (23) ScrtWdlNtt
:; 2: 15) Shotgun
:2= \1) S,mullt.d
e't-.
- 1 : '2: (8) Military , 1 . :2: (4) Fun GEN APPRNCE: :: 1 : :2: (1) Gold CI"~ : 1: : 2: (24) Telt ~I/Cht
, • 1 . " 2 ' (9) Mohawk , 1 • • 2: IS) Gaalee = 1 : : 2 : (99) :: 1 : :2: (8) JewId/Studd~ : 1: :2: 16) Toy Gun
I . , ' • 2 (10) Ponytail - 1• •2' (25) Handl. Bar : 1 : :2: (1) COlisuai :: 1 : :2: (9) MISSing =1 : • 2: /9) Toy Krul.
•.• 1 - '2 (11) Processed · 1: 2' 1151 Lge Cheek Sideburns : 1 : ;2: (2) Dllty/Unkempt : 1: :: 2: (10) Rtllln., : 1: • 2 ~ ,251 VehICle
_1,
- 1 ' 1 ' 2 (12) Punk
2 \ 20) S,de Part
· 1
1. 2
2" 114 I \.ge Flare S,debums
30) Lge Full Buld
: 1 : =2' (3) Olsgulsed
• 1 : • 2 - (4) FlaShy
: 1 : :: l '
:: 1 : : 2:
tIl) SIlver CI~
(12) S~ln.d Otcyd
:: 1 :: ' 2 :: .• 0) Utlknown
- ! ' 1 ' • 2 113) Straight 1 ' 2 1(6) L9' AevtlSe Fir S9 : 1 ' • 2: (5) Military : 1 : =2= to) Unknown
-I · 1 2 •311 Lqe Rln9 Burd · 1: • 2 ' (6) Welt-Groomed
I
5- COOEj CLOTHING TATTOOS/MARKS/SCARS DESC.
L R HANDED: L R U
5-
. CODE CLOTHING TATTOOS/MARKS/SCARS OESC
L R HANDED: L R U
~ c.o Ha' 1 - C.p/H,I
--
I
I
COlWJk\ 1 -
--- - lor", COII/Jk\
- -- Arm
-- Hind
-- MIn<!
(i/ov.
--
1
(ilov.
-- - ~109
....
1- LI09
J .... ,ly
1- -- Nee~
--
Je .... lry
--
I (;Ju . . .
1- -- ShoulO ..
-
(ita....
- $hould ..
- /- -- -- -- --
I- -
w GANG NAME: I Known: Y N Suspect,d: Y N
o
S· !
N IS .... i
Chino Police Department - Figure 4 45
e NAMEIlASI.IIH~I MI!llllll
"Aiir- I~
A ____
• HAIR LENGTH
• 3 • C .. II.11
FACIAL HAIR
1 (iI';JIII
crAEXION
. ""'1.,/1'1.><:1.1'"
RE~AOO 5 1'111'\ '2 LI'-om SI~,",!II' 2. ' AllJlno
ft •6 1'"",, ',Iyl!· •3 Ftl M.lIl(;hll ,3' Clem
br"'- II:lC£ --------
l
~
7 ••1o.IVI·II 4 I "II ' 4 - V;)lk
11 M UWlIl I) NI.. II \lI\I\NI ~
III ()Wx (JAIUO II 2 ';1",,1 5 ( .. ,.• 1..,· • 5 'frl'<.kl"cj
-;~iAB~ • TOOD 4 : ."~h 1""'1111 7 t-AlJt.o,lal hI! ,6, lKJ,JI' ,lIr
, 1 .! 1"\<11",,,n 6 SM \.-11I1l 1'15 • 1 'MP.lj'lIl1\
~LOR------
9 Url~ll.IVI'fl • a . Oily{'
IJ \ ... A. II WIll II IlfIN II IIlIlI II IIAII I
I) ~'\ I' I) . . __ LI OLK II \;IIN I J \,"A'(
HAIR TVPE 0 • Unk"".",,, • 9 . PaIp/S.Jlk,.",
liiJIilr--- iQ:."y ~S~ .-- -: - 7 B.II'I 10 U..lkly
11
:.!.. I
I) I IIltoj
tI MI )
II MII~iCIIII\"
111,0.1
II (lIIIV!.H
U PAS
II 11 (I
...
n
• 4
,6
'Ill'"
H,·, .. rI""J
HANDED. 11 1.lIInerl
1 Hltlhl ,12· Wt'illI~'r~d
• 2 "," k 2 II'" - 13· Wrll,kl"d
~.~ 5 1I11111111kl U Unknown • 0 'Un\o.nown
~"fiON6fFI
----:7~ ~::
QJ S I ~41 ·0· Unknown
~ ~. II~.
~J.!f; ~~
HAIR STYLE
1 Alto/N.II"I ••1
.....
Ol
~ iKJi 0'
~
{)~~~~ ... u
2 . 8r.I.II·11
·3 Ut,....hy ~ LO" R' ,U· • 1
PART
AIm
v.,~+-cY
0
lur I 1
• 8 M,lliary - L - I R - 'U - -
~oCiA.tt-t ~~
RACE 668
• 9 Mohawk
-10·Pollyl.1I1 ' l - -R -U '5,ltanc!
ASSOCIATE -2 n M 0
,12 Plink
U r ~
G CAkG lFI:iiJATION II I KrWlWti
II :' "II~..t ctlU
•
3-
• 13' Slrou'Ihl
- 14' Wavy
I L - I R - -U I - 6 . '\eiMl
&! • •
-20' S.I.. Pa,1 · l · -R' 'U- -l'lcg
:J """:~H'-'.Y=R·-_""'I"=·h:l:'''. 1'==" ... ..
'. P .' Unknown
-
QJ
'..-i
-L- -R' IU, ,a I Neck
~ mnllAMO-AfltjjjE~1 'L' oR' 'U. 19'5h()uld~1
QJ
.w
C
H
'0
M
.....
QJ
~
.-~----.- -.-----
.. ---
Intradepartmental Impact:
47
o ahility to provide operations rn:lnagers with infor-
mation which can be lISCU 10 dl.!\'clop directed pa-
trol and tactical action plans.
Source document and repon form revisions will not only impact
membcn: of a law enforcement organization. but those of othl.!r
agencies as \vell. Advise judges. proseclltors. public defendas.
probation ol'fict:rs' and other members of the criminal justice
community of any document changes which are being planned and
give them the opportunity to provide input into the revision process.
At the same time. ask members of the judicial system to review new
documents to ensure that they meet legal requirements.
• timely
• reliable
• accurate
• valid.
Timeliness refers to the time it lakes for documents to reach the crirnt:'
analysis unit. Copies of all crime reports. suspect/arrest repons. FI
cards and related documents should be received by the crime analysis
unit within 24 hours of their submission by field and investigati\'~
personnel. Crime analysts can only produce useful material when
provided with fresh information. Unit products describing last week's
or last month's incidents are yesterday'S news and of little value (0
patrol and investigative officers. Without the information needed to
monitor ongoing criminal activity, the analyst is unable to provide
material necessary for the development of directed patrol or tactical
48 "
actiau plans. rr this oCCurs with regularity. operations personnel \vill
eventually vh!w the analyst us unresponsive to their neetl'l and
discontinue their patronage of the crime analysis unit.
The necessity for providing the crime anillysis unit with timely
information should be discussed with patrol. investigative and recordli
bureau managers in the eurly stages of program development. If
necessary, managers should draft new procedures allowing expedient
review, approval and internal processing of documents so that they
can be submitted to the crime analysis unit within 24 hours.
49
body and notations as to what will be considered short, medium-
length, and long hair; what part of the body is the shoulder, the upper
arm, etc.; how vehicles and articles of clothing are to be described, and
so on. Development and use of these types of materials by law
enforcement agencies is highly recommended.
Validity refers to the extent that the incident reported is actually the
incident that occurred. We concern ourselves with validity because
we wish to avoid misclassification of criminal events. In California, for
example, someone breaking into a house and stealing a firearm i$
committing burglary. If that same individual steals a gun left lying on
the bench at a public, outdoor shooting range, the crime is theft of a
firearm. If tools are taken from an open, unlocked, garage, the crime
is classified as a burglary. If the same tools were taken from the back
of an open-bed pick-up truck, the crim~ would be classified as a theft.
50
Internnl Information Sources:
51
• Traffic Citations - As with field interview reports, traffic
citations can be used to link suspects to vehicles they
own, register or drive. For various reasons, victims and
witnesses are often unable to provide a physical
description of a suspect (they did not get a good look at
the suspect, the suspect wore a mask, etc.). However, if
they are able to get a description of the suspect's vehicle,
the analyst can run it through the traffic citation file and
often determine the identity of the offender.
52
criminal events. The follow-up information contained in
these reports may extensively describe suspects and
their actions and the analyst may be able to better
establish their identities or determine their patterns of
criminal activity.
o feces
o fingerprints
o firearrils
o foot pri n ts
o glass
Ohair
o paint
o semen
o tire markings
o tools and tool markings (also known as pry
marks)
o urine
53
o anything else which may reveal the identity of a
suspect and/or establish his or her presence at a
crime scene.
54
often result in additional case clearanc(:'s. On the other
hand. verified admissions that esta~lish innocence will
eliminate suspects and free officers to continue their
search for the actual perpetrator(s).
55
------.---- .. ---
56
DATA COLLATION:
• geographic factors
• time factors
• victim descriptors
• specific MO factors
• suspect descriptors
57
------- --- --~ --- ---
58
CKN) POLICE DEPT. PAGEl
KNOWN OFFENDERS Figure 6
H.mo ,008 Is-. IR.~.IHgl"~~ 'H.~ EyeofT,,,,,- IAd£ll ... - lAD Ic, ..... IVohlcle Jr.n.. JO_ I......... 10M.
~~.;;;;;:~;!!.~!!~ .~~*;~~. . '~""'i~~-- ·~···m~··
Abba'. frol~!, 581071~~ M ~~. 507:140 SIll. arn lPa.olN
:.:;-. ~~--I~!IO';';;· ·~;;;':~i·7&o.·~·B:-·· ~-M~;r-···Py.~I=··~::::+s.;~;·s;.;;;·&·S;;;ip·········"··'" 'C";;P'i;:~'i""'-""""""'"''''
41~~!.!!.1I1 &) !Soll.. :1I48JD5 1eo.. on aranch, Bunallly sw....
.-......_..--_.-...:~~t:+
s.... ."O!oll2
Aceve •• D.vld 55104109 M 'Mn &00 ,200 Blk Bm ,ParolN C.·.... &l283C4 110 ,4511 ,IODAB!IO 'Cry~ Clown CI>Ino Sur Y~ llIOVI4
A""I~'. Adodo 72105124 '" ,Me. 5011 11150 BIl Bm ,SHO W Ralslon 505 0... NA :496 ,23CASl • Chino Pom.>na Soucn SIde 1"02lD~
Ace~. hmandO
......................................
7111012.. M :Mal
• ....................................
505 II~ BIl Bm :SHO E 91h1l31 Pam. NA '.t5l1 !3013107
u . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .u . . . . . . . . . . . . . . . . . . . . . . . . . . . . . _ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . _ . . . . . . . . . . . . . . . . . . . . . . . . . . . ._
,SurlJE....
..........._ ~
•••••• •••• _ ................ _
Pomona s....-. SIda
. . . . . . . . . . . . . . . . . . . . . . . . . . . .# ••••••• _ . _ _ •••
(!:>o
~_ • • • _____
• .,06111
. _ ............. .
AchOlla. David 71110"0 '" !Mes 510 11115 BII< Brm ,SHO 1351 211 1S5 ;211 ;N5413.t5 , 1.,0611,
Addelono. AlgOI>eno 7310lIl1" '" !Me. 507 1137 ell Bm ,SHO W. IUlllon 506 0... NIl ,4911 ,lI David CI>Ino Sur U ~ 1"0&101
ActwJa. AnIonIC! '" 31/0lIl13 ail !Me. 511 ,1111 BIk Bm ,1I5!1O R..... 5183 r.; 30 i 11350 11104104
I'guja., Benjolmln 118108112 '" ,Mal 505 .1110 8m 8m i2IKI S AeMrvicr 211!7 Pom. NIl !2111 ;635GTD ! Benjlo AlArm. AI1"'IIIr LJArm POIflDnol &. 1r1gg101 ItJ06I1 I
~!Ie~:_~~!.~! .._..._... !J:.~~!~.L ~..__i.~......~.!.!...I.!.!!?_ ~•. ~_'!!.. l~~?L ~.I!:'.•!~.. _...................... ~~ .. .i.~.~ .......!..................... __ .........l........._........._........................._ ~~.~ .._ .........___ ~~.!!L- !!'.o.~~~.
A'-<:ano. John 55105131 M ~Me. 507 11eo alk Bm 'Pa",1N 51h 51. 13240 l1li is.Jtr.i735FD5 i sw.ra .....,.. ItJO~I2
An<I8r50n. JoIIo 55105131 '" lWlll 507 170 BIn BIu i2IKI Ial 1.t3245 57 i2612 i203.tn7 '''05l0~
I
"oullar. SI~~n.Jot;n-T551Oii122lM ;Mel 1501 i\lIOIBilSm!1H;\l() \Slh 1:13115 1611 i 11550 12fPRlIIIJ ;Sut,IJ.ChIno I Chino Sur Paco lat03l22
A.. ane., Roy ISg,05l2' I'" iWhl 1509 !leo IBm IBm i 116s;o ISlh 51. 12432 1l1li ! 11350 Iso... A.co lat06l12
.
~~;~:;:~~~.-.. {~~;'i- '~-"i~;-' '~I~" ~ ~~-j;;:~-.- ·~~i~~!J!·~!~-<?~:...··- ~···i~~~······IH:M7·eo····-···..··--·j~t;:;;;~~;g.~······-·· ~;-...- .......-.........--. ~~ 'i~~;'i'
Alca,ado, EUllorgID !>311W23 '" ;Mal 507 1180 BIo. Bm 1115110 E. Be"",," eo7 40 ! 11550 I i SInnera NonIe I ,,/06112
AI.,..z, Ralph 51105/15 '" ,Mal 1501 11!1O Silo. Bm !1I5!1O ........ Villi. 13171 l1li ! 11350 1073YZN I ItlO""I.
AI.'VIo.Armardl 71/06104- '" :Mal 1501 1120 all am ;SHO\Ptt 51h 1:JOn l1li i~ 'II7lZCS I&.. ~ C'*>D SutJs...p.)..... ShortJ. latO""I.
~!~!~!!~'!? .....- ..~~~~~?... ~..-.i~- ~_l!?O_ !!ToO ~-l~ !?r.~~~__..._..._.._. ~... l.........-. --.--..-----.t..... '__"_"'_"_" ~~_~j~J.L _ _ _ ......._ _ _ !~~4!.~
~
AI.radeI, Richard 71I0Il10. '" !Mal I5O.t 11011 Bil Bm. iSHO Can1lo 13034- M !4!ia IS-a Chino St.w 80 • ., lata""'.
Awn. Rod IIIWI2128 '" ,Mal 1506 1136 .BIt Bm. jPerolN 51h 13072 l1li !211 ILFABI1! CNno &. (&..p, Cupttt.... 1$10""14
A"""'II"z, Ralmond 80/12I0Il '" ,Mal 1503 150 BIl Bm 'ParaIN 11M 131118 10 !4!ia I lEavIe&Splder,Chinc> s..., EIc:. SIIvw,. .... IIIIO!oll2
Ala'*". Roman 57105123 '" ,Mel 1501 140 Bil Bm IPerolN 41h 13263 eo i~ !IC52805 !ChIno SInnonI AlArm ~ 111106112
~~~;;: . -.- f~~~~~-" ~-.+~. ~h';:- ~. ~;;H'~~~~'- ~~~~. . . . . . . -.. . . . . :··H·i~~···I··········-···-···-----··!~~~~. -·-··,··-·· ~J~._.____...__.sq:;;~__ ~~~}
A"'-On. .Io"'l'h 111081211 '" !Met 1507!t4O Blk Bro iSHO 2nd 131150 511 j .. 5g !2WEV6.ta 1 Chino &. Popop, HoMf. 1110""14
AI_aGn. Moch.lel 7211210~ M ,Met 507 i 140 BIl Bm iSHO(Plt RIv.", ... ~35 711 ! 10851 Chino & . G o o I y , o.Itr 88J(W1.
Al\lOIlI1era,. f.m.ando 45111/02 '" i"... I50Il 1200 Bm Bm ,ParolN Aibol 875 62 !481 A2!14CVA !Slmerw S!mora CWoI) BueloW 180106112
~!?~2:.~~...__ .....~~~~!~L ~.-.i~... ~ .. l~~- ~!':'.. ~~-l~.~.~.~..-... ~~.!h..~.~~~..........................~.~... l.!.'.?~.~... !.~.~.l!.Y.::.._.. _. __ .•••...l~~.~~..'!!!!! ......................... ..............-..-..._........._._........_...._ _ .!~!?~!!.
AIa",n. Them.. 56105124 '" : Me. 510 i21l5 Bm Bm ! 116'10 17th 13154 70 111550 1 2 1 3 6 1 1 7 j 1. . . on face. To..".,. Chino &.or .sh.riY 18106111
Amaro• .Io...ph 0II/tl1I1 M ,Mal 510 !\1I3 BII< am l2llO ChI .... 5&48 70 1 , " 7 A t 1110",,11
Amo.,Hank W12121 '" ,WIll 50S !170 Bm am !Paro'" Odv.:Jg511 24 1211 19,01ll11
Amm... Eric 70108124 '" ,Blk 15O.t'leo BIk Bm !SHO(Ad) B..-nI2Q5','l8 70 12\\ ilN0II35,~UEX \WSC CrlpW..1SldeMalla E·tlqj.HouN ,g,0"" 17
.
.. . -I-
[1~~~::!"--""'" .~~~~~ ·~---i~..·· ~.~ ~.;. ~~-I~~L ;:ii~i~~~--"""-'-'" ~i H~·h ·!~~~..·-···-..-·-f:~·-·····-·-····-·····...····........... ~;~L-. . ... __.__._. a;;;, .~~~~~;
Ande,.on. Arnold M. 1I",,03l0!l '" ,Me. &00 1180 Bm Bm ! 115110 ~h 12Q5O III! '116150 I I Ig,O"" I 1
Andlrw, TonI 71105131 '" 'WIll eol '200 Bm Blu ,SHO falnlloo.1IIIII Om. 47 ,211 12:l8KSD 181( CrIi'iAuoc:.l 1110""11
Angelo, AnIOOJ. 72/0.tJQ5 '" !WIlI I50Il '110 Bm Hz( :SHOIP21 3rd tl624 110 !~II I Ig,O""I'
~5i~~·~7·~-··· '~~~7~' ~. .-!~- ~-H~" ~~ ~~-t~~·ii- ~;;'~~;.20·ii·-········..····· ·:·;···mk·..··· ~·!~!~-......--·fc;;.,-·..··-..··....·-..-··-·········· ~i!;~~In.W!.~:L. fj'&;;;d--' 'i;~~'H'
mlCo• ..Ie"I. 70103120 '" :Mal !SOlI 1140 Blk Bm ,SHO ..... " HoUMllrd , oCIh 115 12.t5 I I&.. 13 Chino &. WhR;I 1110""14
Archer, lJUIc 651119103 M ,Mel 1507! \150 am Bm ,115110 Horlon 1284 70 III 550 II W2345e
A.chldu, Rick 16510lIl20 I'" iWhl 11508 !14O IBm IBm !115!1O 1171h 13252 171 ! 11352 T Chino Moah Crw. 8OJOillUl
ArCh. RIcha.d 170103112 1M iBlkl50ii h30 -IBiklBmrPa"'IN~nk» 5235,g---\7& ~t87 jll" Scar Mione! CrIp IANOe., 8110""11
e ·.t.
...
e
---- I
The crime analyst who is working with an automated system need not
create and keep a matrix to track criminal activity. Depending upon
its programming, the system will generate this information
automatically. This is done through its delivery of the preliminary
case report data that has been entered into it. Additionally.
automated systems simplify the process of creating files. For example.
a suspect need only be entered as a known offender. He Tleed nM be
entered specifically as a robbery offender since the system would
automatically classify him as such. The system makes this
60
determination based upon the preliminary information it receives
from the case report. Thus, once the computer knows that a robbery
report is being entered, it automatically classifies the suspect as n
robbery offender.
Analysts often ask if they should capture the data elements necessary
to analyze all crimes. The answer is no. "The crime analysis operation
.
e should direct its efforts towards those classes of criminal offenses that
the police are most capable of preventing or suppressing. Failing this.
the analytical function should consider those offenses in which the
responsible persons can be apprehended." 10 A review of existing
police crime analysis operations reveals the crimes most applicable to
analysis are:
• burglary
• robbery
• auto theft
• larceny (petty and grand theft)
• fraud
• rape and other sex crimes
• aggravated assaul ts
61
• murder.
"Each individual community should analyze its o\\'n crime activity (tl
determine whether crimes should be :tdded. subtrac.:tt:d or e1irnln.lt~d
from this list." 1 1
There is an old computer axiom. "garbuge in, garh.lge OUI.·' 1'hl\ J,\Htm
holdw true for the crime analysis function as welL CllBecuon. CI.,n.llh~n
and categorical storage of accunHe. reliable ~lnd \ ~llh.J tnfOntlJtmn H\ .\
11 Ihid,
62
manner permitting expedient retrieval is essential. Under lesser
conditions, the analysis of crime is not possible.
DATA ANALYSIS:
The task of analyzing data and drawing conclusions from them is, much
like putting a jig·saw puzzle together. The analyst is working with
many data elements that have been gathered from a wide variety of
sources. The goal is to combine the data so that a true "picture" of
criminal activity can be determined. These pictures manifest
themselves in the form of crime patterns. As described below, they
are of two types:
12 I.l2lil..' • II .44
63
~--
----- - -- --~
64
Because of the uniqueness of his MO and the similarity by which he
was described by witnesses, he had committed a crime series and
thus, by definition, was a "serial killer."
Had crime analysts been around in lack's day, they would have known
that they were observing a crime series for several reasons. First, the
murderer was attacking prostitutes, a very specific type of victim.
Second, all of the murders occurred at night. Third, all of the victims
were killed with the same type of weapon-a knife or similar cutting
instrument. Fourth, in addition to cutting the throats of his victims,
the murderer used the knife to further mutilate their bodies. Fifth,
enough witnesses described the suspect as being a well-dressed
10
Though Jack the Ripper, the Zodiac killer, the Night Stalker and other
such persons generate headline news, crime analysts throughout the
nation observe less noteworthy crime series on a daily basis. In every
series, notorious or mundane, there will usually be something unique
to the commission of each crime. The identification of that
"something" will serve to indicate that the crimes are being commined
by the same person(s).
65
CHINO VALLEY
Figure 7 CHAMBE~ Of COMMERCE
I J 13~ Cenlrll Avenue
ChIno, CA 9 171 0
1~1 627·6117
-~--
--~-- -
-------~-
Lefs assume that, upon review of the matrix, the analyst notes that
there have been ten commercial burglaries in the past month (see
Figures 8 and 9). Five of them were burglaries of pharmacies and five
were of various other establishments. Of the five pharmacy
burglaries, three showed definite similarities. Each of the three was
committed between Tuesday night and Wednesday morning, had
evidence of rooftop entry, drugs were stolen, and storeroom safes
were pried open. Having observed these similarities, the analyst
would be able to confirm the existence of a crime series. He or she
would then take the information from these three cases and use it to
create. a separate log to track the progress of the series (see Figure 10).
All future c~currences would be placed in the log and the log would be
maintained until the series stopped or the suspect(s) were
apprehended.
Crime calendars can also manually track crime series. The analyst
takes a calendar that has a one to two inch square box for each day of
the week. Whenever a new crime in the series is committed, the
analyst makes a note of it on the day of its occurrence (see Figure 11).
By flipping through the calendar, the analyst can easily determine how
many days elapse between "hits. ItCrime calendars, when used in
conjunction with spot m3?S and matrices, provide the information
necessary to determine possible dates, times and locations of future
serial events.
This entire task is made easier for the analyst working with an
automated system. "InsJead of devoting time to maintaining
cumbersome and lengthy files, the information is entered into the
computer and is available for instant recall whenever necessary. This
approach saves not only data input time, but if the sort routines are
effectively written, can save data extraction time by allowing the
analyst to search and retrieve just the information wanted on an
67
..-rI ,JANUACZ,7' I • .!j PiG! J:.. ..
C4 If ,
crmaa-
DMI Dm---
m.
. ' uLffiiii-
I.OCA1'SaI
-- c)' .;--01.0
..,-T ---rTj; !
- 'oc - ,Cloo
",- 'UN
.
q. -cl. DO 1 " -
.,,,,
--
lOa! CC\n"CA" Itt.
"'.T'
·'0"- CIOO
,74· 10 "
, -1.'00 -.. 0100
12)& _ , . . v.
II.d - - - - - , -
1 4
o --,(,;;-c~.;--
4IIII'l .... NO WO NO
sa
IACI -
AGI
!
mm
cc VIlQIT
GI 5g ~ WI
-=- ------~
~
",too
! i C'.OIIP LIllO.
~ I..• CWSD
, AJ:.U&. loLa
"II.W)~
-
t : T I A I - - - -- - --,-,
! d ICW I tIlDe.
§ i COI.DI
LICIIII
I WUc::r.1ZI
§ ~~I_C!.OOi -,!ua~lD~__
- Ct.otmc -S'roU- -- '--
DDT.nou
DIOC riOu
....,n:i.UIctiJ. tnt"
- .
GAl S'U'UOI
-
---_.-
~
r: LIQOOI nou
ICIDIW ILDG/Dl. orr
SCIOOL
srolmc GODCII STQU
TV I'ea ri'ou ----,- ---
si -tIeD '
~ too
~ .-U4U.
• 100' -
vtIIDCIW I! ';x- -
Ii
2 :.
i FacID -AlIA
uDM
PIlD 0lIl
_ora--
I mn-...- -
i ~:~
----..;
- --- --
I1M.DCID
IUUGft
1Iw.~
ma'-'-
c:...wAA __ iMft-
JMU!' - - )(
GUll
j(
--T
- " - J{- -
68 "-X - - - -
1
e .. g , .. - ----- ---~------
(3-ma.a-- -:'0 I ;,;-- 1"-:
~
- cu- 0\10 --~ 013'·- -~ --;-0';--01.7\ q,,-c'.-cff
[:;:'J -0411 D.t.fI
n.
T~- 11'1.""
2100 -aqoo· ~--. 21 ,., - -T=W-
C - _0-- ..
I .i4-6S., Th -"". t.~;;~. -T :.",--, " ..-~
"2Cc:I-. -0700 uco-:;-~o· ·-itCO --;;:-,--
II~m---------
I . . --.. -
=- -
... --.- ---
E vtICIT=-_ _ _ c _ __
----~~ ---- -
1 Ujifc:rm - - -
. . tW:1ctoaj KtsCam- --
g _ _ _1,"--_
DlDC nQU_ _ - - __ _
~~!~!I,-- ~
---.-- -----
----x -
-e:--.,.; . ----, - ._---' ---
---~---
-
.... ,a.mI
PIlI» OPD
m:oi:zD - - - -
--'",....,...---~
IIn.lIOlft
iiW,- 'nIIIIiIz.-.- -
CiftIi.. _ _. - ---
x
- - - --- ----
69 -~--------,,-
~~~~---.--------~----------~-~-Y-~~IM-·-'u>~------
e Figure 10
e e
CRIME SERIES LOG foK)NTII JANUA.lt)' OEM Iq~
SPLIT
TlMEI HETUOD OF POINT OF PROPERTY SUSPECT SUSPECT EVWI
OR' DATE DAY TIME DAY LOCATION RD BEAT ENTRY ENTRY REfoK)VED DESCRIPTION VEHID.E TARGET PRINT'
",
Page 1 of 1
Figure 11
JANUARY
)-
SUNDAY
'I,
MONDAY WlSOAY WlDN[SDAY
, IBURSDAY "-X J
- X., SAtuRDAY
"
'I
"' ""
1 2 3 .
4 5 6 rw_Moon
7
11 12 13
/
14 "
fin. Qu"I~'
[)~U6 Sn::>R€
7JS Phi\ockt~la
32/2- :ZlOO " " -
I- ()~OO t\~.
"-/" ,
\.
/
Roo~ / SQ.()\(£N V~{
'I
\...
..... /"
~ ..I
'I
.J
~
'15 16. 17 18 19 20 21
full Moon
[) £UG ~TOR.E
MARliN lU1lt(R ":lSI Tek~Oflc:..
kiNG. III ls/l 2100 'UI.. - f- 0<'100 ~ ROBIAI l. Uf.
BIA lItoAY OBSI RV(Q 11107
"- ,
..I\... '- ROoF / CMT "OLe \..
I' , \..
-- ,
.J
22 23 24 25 " -26 27 28 I I
I
I
r
\.
,
.J \. .J\.. .)
r
1
"
/ / ""'\
29 30
l~\I QU~111"1
31 \
DECEMBER
M , W I
t
I
2 J
, ,
fEBRUARY
M •
1 2
W I I
J <4
\
DRU(:J $\O~
t-
e e e
appropriately formatted report." 13 Thus, in our current example, the
analyst using an automated system would merely query the system
and request a report of all commercial burglaries in which one or more
data elements are common.
rooftop entries had been made AND safes had been pried
Once you are satisfied with the data you have obtained, these data can
be stored away in a separate computer file. This file is analogous to
the log kept by the analyst working in a manual mode. And, just as
that individual would add updated information relative to subsequent
pharmacy burglaries to the written log, so would you add this type of
data to your computer file.
72
---------
In our present scen:lrio. a target profile analysis would reveal that the
suspect(s) had a preference for pharmacies. This information would
be given to patrol and investigative officers and used in the creation of
directed patrol and/or tactical action plans. Crinie prevention officers
would use the information to inform other pharmacy owners of the
crime series and admonish them to take whatever precautions
necessary to prevent victimization' (e.g., better secure roof vents,
empty the safe at night, put the emrty safe near a well-lit window,
etc.).
This is the desired goal of the crime analyst. but it is very difficult to
achieve. Suspects may change locations, may no longer have a need to
commit their crimes and so on. When changes occur. the analyst is left
with a prediction that fails to materialize, a frustrating experience for
analysts and officers alike.
Suspect Identification:
73
-----------------------------.~
Continuing with our current example, let's assume that our drug store
burglar has been arrested by the agency i~ the past for burglary. The
offender's name, physical description, etc. would be contained in the
analyst's MO file. A search of this file~fo!- previously arrested persons
who ha.d committed commercial rooftop burglaries would likely reveal
the suspect's identity. The suspect might also be found in any file
which contained the names of persons arrested in conjunction with
safecracking incidents.
Searches of suspect description files and suspect vehicle files will also
facilitate the suspect identification process as long as there is
something un i que about the suspect or the vehicle being sought.
Broad searches for white males between 35 and 40 or late-model red
Chevrolets will prove unproductive. Conversely, searches for people
and vehicles having unique identifying features can produce usable
e
results.
Case Matchini:
DATA DISSEMINATION:
74
GQals of Data Dissemination:
There are two goals associated with data dissemination. These are:
75
o general crime summary information
o crime pattern information
o crime series information
o crime trend information
o known offender/career criminal or ho.buual
offender information
o suspects wanted information
o gang, narcotics or other ·special prohlem inlornuUH.)n
o stolen vehicle information
o warrant information
o parole/probation information
o
o
pawn information
daily, weekly. monthly or yearly crime
crime prevention presentation data
$UUlSUC~ •
o calls for service statistics. manpower and \l,corU~JJ
statistics, officer arrest and citahon stausucs. et.~
• What products will meet those needs? Among othen.
products to be considered may be:
o Daily Bulletins
o Crime Pattern/Crime SenesBulJetms
o Known Offender Bulletins
o Parolee Bulletins
o Weekly Statistical Crime Summaries
o Monthly Statistical Crime Summane~
76
o Warrant Lists
o Arrest/FI Summaries
o Crime Prevention Statistical Bulletins
77
o how much time will it take to create products?
o does the crime ~.\nalysis unit have the. necessary re-
sources to publish the products requested?
o of what value is each product-very helpful, some-
what helpful, nice to have, will be used occasionally.
not helpful?
o what is the likely return on investment from each
product? Is it worth the time and effort to do it'?
Would the operation be hampered without it'?
Instead of creating products on their own, analysts should initially
meet with management and staff from throughout the organization to
ensure that products ultimately developed will, in fact, meet user
needs. For each user group, the analyst should document:
• which products are needed
• the purpose of each product
• the information needed for each product
• product dissemination requirements.
Types of Products:
78
There are some precautions that should be taken when publishing a
daily bulletin. First, be sure the information it contains is timely. Do
not print old material if you know or suspect it may be stale. Officers
will not only stop reading the bulletin if it frequently contains
yesterday's news, but may also assume that you are either behind in
your work or uninformed. Neither assumption will enhance your
credibility. Second, some analysts use the Daily Bulletin as a catchall.
There is nothing wrong with this so long as it does not become difficult
to use, too lengthy to read, and continues to contain information of
interest. Officers do not have time to search through the bulletin
looking for crime, suspect and other pertinent information. Make sure
they get the information they need to have, and present it in an easy
to read format.
Crime pattern and crime series bulletins will most often. be used by
patrol officers to create directed patrol or tactical action pi.ans. Patrol
officers must, therefore, be given as much information as possible to
enable them to develop a strategy which effectively deals with the
problem. This may be accomplished by providing officers with a
narrative description of incidents, a map depicting past and possible
future locations of occurrence, and any graphs which clarify the
problem.
79
---------_._-- --~
80
opportunity to more accurately assess the impact of thcir officers on
crime problems and may point to a need to develop directed patrol
plans to abate any escalating criminal activity occurring during their
tours of duty.
Assume that the summary was being completed for ~1ay 1989. At the
far left of the summary would be a column that lists the types of
crimes being reported upon. To the right of each crime would be the
number of incidents posted during the current month. Next to that
number would be the number of incidents posted during the same
month of the prcvious year. This would be followed by the numerical
change and percentage difference between them.
81
-----------------------~ -- ----
Most officers Jove to make arrests, but some do not want to take the
time to complete FI reports. This is detrimental to the crime analysis
operation, for the intormation provided by FIs can be extremely useful
to the analyst. Arrest and FI summaries can be used to list arrest and
FI occurrences, and to congratulate officers for their work and
initiative. Everyone likes to see his or her name in print. This is your
chance to give public recognition for effort-take advantage of it!
82
customize presentations to neighborhood and business watch or block
groups. These most often contain crime statistics which have been
posted over a specific period of time for certain beats or reporting
districts. Among others, these bulletins may provide area-specific
information regarding numbers of domestic violence incidents, elderly
persons victimization, and the nature of crimes occurring in any
particular part of town.
83
gang members. major narcotics violators or any other group of
targeted offenders, or to familiarize personnel with the occurrence of
a particularly unique criminal offense.
84
• Select formats that are both neat and attractive,. Also.
• design them so that they are easily recognizable as crime
analysis products. Consider the use of a special logo for
this purpose. You may also wish to use different colored
paper for each each publication.
Though you may distribute products to officers each day. be sure your
contact with them is not limited to the printed page. Attend the
briefing sessions of all shifts occasionally and verbally descri be the
nature of curren t criminal even ts.
85
example, many patrol supervisors would prefer that management and
executive staff receive crime pattern/crime series bulletins ten to
fourteen days after they are initially published. This gives them the
opportunity to resolve a problem before it comes to tbe attention of
the chief or ~heriff. Thus, when later asked about it, they are able to
explain what action was taken and what results were realized from
the efforts of their officers.
"I certainly hope so. I just received this Crime Series Bulletin
from the crime analysis unit. It says that burglars are carrying
off half the city during your shift. What do you know labout
this?"
"Uh, urn, well, Sir, I, ah, just got my bulletin this morning, too. I.
ah, well I really haven't had an opportunity to, ah, well really
look into it fully, Sir."
"Uh, well Sir, I'm not exactly sure what, ah, I mean I am going to
do something about it, but, ah, well, if you could just give me a
little time, Sir, then I feel pretty sure that, I mean I know t hat
my officers and I can solve this little problem."
86
Cndoubtedly, Lt. Tackkbcrry will handle the problem. However. his
embarrassment could have been avoided if he had been given the
information nnd had a chance to do something with it prior to its
receipt by the chief. \Vhcn questioncd. he could have told the chief
that he was indeed aware of the burglaries and had implemented
various directed patrol and tactical action plans to deal with them. He
could then cite the results he achieved.
87
professionally accomplish this task. it is recommended that it be
bypassed in favor of other activities which might be more productive.
FEEDBACK:
88
Figure 12
STANISLAUS COUNTY SHERIFFS DEPARTIvIENT
CRIME ANALYSIS •
~fEQl9~Su fO~ ~fr\sJfO~~Jlj\l~Oil\j
TYPE oP REOUEST
OrFE.NDER INFORMATION
_ SUSPEcr DEVELOPMENT (TO DEVELOP NAME LEADS) BY ,PHYSICAL DlSClUPTION
CRIME INFORMATION
_ GENERAL ANALYSIS OF CRlMES wrnnN A SPECIFIC AlU?A DURING A SPECIFIC TIME
OTHER INFORMATION
_ MATO{ PROPERTY RECOYE.REO AGAINST REPORTS OF STOI.E.N PROPERn"
_ STATISTICS ON CRIME TYPE(S) FOR COMMUNITY MEETINGS, MEDIA INFORMATION,
BUDGET PURPOSES, ETC.
_ OPERATIONS ANALYSIS INFORMATION (FOR DEPLOYMENT AND AU..OCATION OP
RESOURCES. MAY INCLUDE WORKLOAD DlSTRlBtmON QUESI'IONS, BEAT SURVEYS
CASB MANAGE.MF.NT QUP.STIONS ETC.)
..
89
SAN DIEGO SHERIFF'S DEPARTMENT
CRI1'r:E A!:JALYSIS UNIT
FIGURE 13
REOUEST FOF: rEEDE.ACr~
TO:
Career
· .
Cnrnlnc, I Dl\'l'£ :
program
Recently you received information fran Cr:i.rrc l\nalysis. To rronitor our effectiveness
and irrprove our services to you, VP- need your feedbnck. Pleci.!3e ars~ the follONing
questions and return this form by
If not, . . .'hy?
2. Did this informl tion assist in:
CASE # an.MR
90
STANISLAUS COUNTY SHERlFFS DEPARTMENT
. CRThlE ANALYSIS
Figure 14
RECENTLY YOU WERE PROVIDED DATA FROM THE CR.l1vfE ANALYSIS UNIT. TO
INSURE WE ARE PROVIDING YOU THE DATA :Y.Q!l NEED, YOUR FEEDBACK TO
TIlE UNIT IS VITAL. PLEASE COMPLETE TInS FORM AND RETURN IT TO US
WITI-IIN 15 DAYS OF RECEIPT .
••••••••••••••••••••••••••••••••••••••••••••••••••••
PLEASE COMPLETE ALL SEmONS
--------------------------------~----,---------------
••••••••••••••••••••••••••••••••••••••••••••••••••••••
CRI1-m ANALYSIS USE ONLY
91
Survey research methods can also provide formal feedback to the unit.
Creating and distributing a questionnaire asking various questions
about crime analysis products and services can assess the frequency
with which users request information or service. the efficiency of the
unit in responding to requests. the value of the information provided
and so on.
If you are unfamiliar with survey research techniques but wish to use
a questionnaire as part of your feedback process. contact a local
college or university (n1'.lrketing research, psychology. or sociology
departments) for assista·(lce. Survey research ptoje~cts are always
needed by students. and many will do them without charge.
92
e Examine crime analysis unit request logs. If the unit has
received many requests for information and service,
then it probably has made a positive contribution to the
organization.
)
• Talk with people individually and collectively under
informal circumstances and solicit their opinions of the
unit and its products. This may be done on ride-alongs.
in the hallway, at briefings, in the gym, etc. Ask people
if they are receiving the information lind service they
desire, have any suggestions for improvements and can
recommend anything else that might be done to better
serve their needs.
EV ALUATION:
93
upon its achievement of goals and objectives set for it by
administrators of the organization.
94
CHAPTER 6
"
VOLUNTEERS IN CRIME ANALYSIS PROGRAMS
Job Duties:
• processing reports
• filing reports
Volunteer Recruit.ment:
96
Figure 15
Authority -'
(P"" trr; IImitItions to IU1hoIit"j'
OuIlific8tionl
Raqu1rwnlntl of me job
CGrM. . .
s.nllian
hiIIW....,
~ wfdI dhctr:wof.",... ........._ .....
jaI) ..,.a...
97
POSSIBLE SOURCES OF VOLUNTEERS
Figure 16
98
Figure 17
RECRUITING POSSIBILITIES
DISPLAYS/EXHIBITS
MOBILE RECRUITMENT
99
MEET YOUR NEIGHBOR
Invite the public to tour your facility. Let them see your
volunteer(s) at work and give them the opportunity to learn
more about your organization.
..
,
WORD OF MOUTH "
100
--- - -- - - - - - - - - -
Interviewing Candidates:
Moti . . ations
Attilllcies
\Vhat ha\'e you enjoyed most/least In
previous volunteer assignments'?
Interpersonal Relations
With what type of co-worker do you work
best (i.e. goal oriented. mechanical, etc. r?
101
·e
POLICE DEPARTMENT FRED AGUIAR
MIYo,
JAl\1ESE.ANTHONY
Pubhc Saftl) Dlrwor AL YANKEY
MIYO, P,o Tom
Chltf 01 Polict
DIANE J. ERWIN
DICK SAWHILL
CITY OF CHINO EUNICE ULLOA
Counc,l .... mb.u
Dear
Thank you for your inquiry about our Vol~ateer Program.
Our citizen assistants are efficient, highly motivated, and
sincerely welcomed by staff members. A variety of assignments
are ,performed within various offices of the Department.
Volunteers may be asked to assist with clerical, research, o~
computer-related tasks. Although special skills are a plus, we
provide on-the-job training and no previous experience is
necessary!
Since assignments are limited, please complete and return the
enclosed application form at your earliest convenience.
If you have any questions, you may contact me at (714) 627-7577.
Sincerely,
JAMES E. ANTHONY
Chief of Police
Jessie C. Pryce
Volunteer Coordinator
Special Services Bureau
Enclosure
riqure 18
102
NAME
T ~ c .....
.-..J ...... _ ..... First ..-..
...."'
SEX
---w- / -=F-
HOME ADDRESS
Si:reet City
HOME PHONE ( MESSAGE
PERSON TO CONTACT
IN EMERGENCY PHONE
CALIFORNIA DRIVER'S LICENSE NO.
- -Shorthand (wem
. --- Resea:.-::::',
Filing __ Da t.a E:-.:. ::j' /Ccllec~': ~:-.
__A~:/G~apr.:= ~e'si.g:-.
DAYS/TIMES AVAILABLE:
(0820-:208)
:·:~ndaJ·
--------
T~esday
-------
Wednesday _ _ _ _ __
Thursday- - - - - - -
:riday- - - - - - - -
103
VOLtnrHJ:J. UPLlCA'rIOH
Page 2
Signature Date
-~-~-----------------------~---~-------------------------
Interviewer'S Comments ________________________________________
104
Figure 20
SCREENING WORKSHEET
Rating Range
1-1" Scale
.
,,",
(10 = Superior)
2. Appearance
- ..
5. Objectivity - Ability to be
non-jt.:dg:nent.al)
-
10. Your overall view of applicant's
acceptability into program.
105
Velllles
Decision Making
106
o Confine the interview to pertinent information.
Concenirate on appraising the applicant's qualifica-
tions to work in the crime analysis unit. Attempt
to match interest areas, talents and abilities to
possihle job assignments.
Background Investigations:
107
inquiries by mail. include applicant fingerprint cards. Driving records
may be checked through Department of :V10tor Vehicle files. •
Background investigations should not be done without the knowledge
and consent of applicants. A written form for this purpose is shown in
Figure 21.
Ori en ta ti on Training:
Orientation training for volunteers should parallel that given any new
employee. Volunteers should be introduced to members of the
departmen t, acquainted with organizational rules and regulations and
f~lmi liarized with the operation of the crime analysis unit. Volunteers
should also be given special identification cards to wear while on duty.
Supervision:
Recognition:
108
honor. At the very least. they should be presented with certificates of
appreciation, certificates of merit or similar written accolades.
Volunteers may also be routinely recognized by supervisory comment.
by notes congratulating them for johs well done, by the sending of
greeting cards on employment annj\'er~ary dates and so on. Feelings
of appreciation will also be generated by using any products or ideas
developed by volunteer assistants.
109
e POLf( L DEP:\RT:-"IE:-':T
JA:-"IES E. _~ '\ THO:-':Y
}I," • "" I . i l •.• ' , '.' ·110 r"f'
. ,,' ',' ..
I) I \" I I ! f{ \\ I"
IJlr;.. '\\\HI! L
II "Ie I L1l()-\
·,t.' ... ,.
NAME
-------------------
.-~~--.
DATE
ADDRESS
Signed,_____________________________
Date_________________
Witness
Date
------------------
Figure 21
11 0
honor. At the very least, they should be presented with certificates of
appreciation, certificates of merit or similar written accolades.
Volunteers may also be routinely recognized by supervisory comment,
by notes congratulating them for jobs well done, by the sending of
greeting cards on employment anniversary dates and so on. Feelings
of appreciation will also be generated by using any products or ideas
developed by volunteer assistants.
III
VOLUNTEER RECOGNITION
Figure 22
112
CHAPTER 7
Victims and witnesses could still only contact the police by waItIng for
the officer to come by or by calling the station and requesting that he
be sent to their location. This was not always satisfactory and the
introduction of radios in police cars of the Detroit Police Department
during the 1920s significantly enhanced the ability of officers to
respond to calls for serVIce. The Wickersham Commission of 1931
concluded that "the radio in police work is assur~d a brilliant
future. "15.
The Kansas City Response Time Analysis (1977) found that many
serious crimes were not discovered until some time after they
occurred and their solutions were unaffected by rapid police response.
For remaining crimes-those in progress or just completed-the time
taken by a citizen to report a crime, not the speed of the police
response, was the major factor in determining whether or not an on-
scene arrest would be made. Prompt reporting time-under 5
minutes-coupled with a speedy police response can have a significant
impact on certain types of crime. But the study found that many
15 David G. Monroe and Earl'e W. Garrett, under the direction of August Vollmer.
police Condilions in Ihe United Slates. A Report to the National Commission on
Law Observance and En rorcemcnt. Patterson Smith Reprint series. 1968 as cited
by William Spellman and Dale K. Brown in Calljng the police; Citizen Reporting
or Serious Crime, (National Institute of Justice. October 1984). p. 17.
1 14
citizens delay before calling police and, with each additional minute,
the chance of on-scene arrest drops. 16 Similar conclusions were
reached elsewhere. The Police Executive Research Forum replicated
the Kansas City study in Jacksonville, Florida; San Diego, California;
Peoria, Illinois; and Rochester, New York. In their three year study of
the problem, they found that:
1 15
• police calls should be answered on a "first come, first
served" basis
18 Since the 1970s. a number of patrol management stucUes have been conducted
throughout the nation. Those reviewed for this text include the W iI min g Ion.
Delaware Management of Demand Program (sponsored by the National Institute
of Justice); Differential Police Respon{je Field Test (designed by the National
Institute of Justice and conducted by 'th~ Garden Grove. California; Toledo. Ohio
an rl Greensboro. Nonh Carolina Police :Depanments); and the Managing Patrol
Operations Program Test Design (sponsored by the National Institute of Justice
and conducted. by the Albuquerque. New Muico; Charlone. Nonh Carolina: and
Sacramento. California. Police Departments).
1 16
ALTERNATIVE APPROACHES TO POLICE RESPONSE
Calls which do require a police response are usually divided into two
categories: critical and noncritical. Critical calls (those of an
emergelicy nalure) are answered first. Noncritical calls are put in a
queue (referred to as "call stacking") and handled as time becomes
available.
Use of call screening/call prioritization does away with the "first come,
first served" police response and is extremely useful for maximizing
patrol force efficiency. To work properly, however, the dispatcher
must be trained to classify calls and to deploy agency personnel in
accordance with departmental response guidelines. The caller must be
advised if the call is to be held; citizens do not object to waiting for a
response if they are told in advance that the response will be delayed
and given a general idea of for how long.
Police perform many tasks that do not require a sworn police officer.
Many departments have non-sworn personnel handle such requests;
this allows officers to patrol their beats and quickly respond to
emergencies. Trained civilians can take some types of reports.
perform vacation house checks, home security inspections and simi lar
crime prevention duties, handle parking and minor trafflc problems.
and provide a wide range of other services.
] 17
satisfied with an alternative response that allowed better use of the
officer's time. 19
Three other techniques can be used for taking minor police reports.
One instructs the caller to give the report over the telephone, a second
sends a report form to the caller and le~s him or her fill it out and mail
it in. Both techniques work well as' long as report forms are well
designed, easily understood, and used only for minor incidents (e.g.,
petty theft where the stolen item cannot be identified, there is no
suspect, or any information or evidence that might lead to the
recovery of the item or discovery of the thief). A third technique
requires the caller to come to the station to make the report.
Some agencies are able to send sworn officers to all calls, others are
not. Those with limited resources may wish to adopt one or more
alternative response strategies to increase patrol efficiency.
The patrol force is the largest and most costly resource of the police
organization. But because of its size, it can be difficult to manage. We
indicated earlier that random patrol produced random results and
recommended that patrol supervisors "direct" the activities of their
officers so as to make the most efficient use of them. Left to their own
devices, patrol officers will generally approach the job in one of four
ways. They will:
• be dependent upon the radio and react to situations
rather than assuming a ¥Jr.'.pactive role in discovering and
handling problems
19 f\,.:-4
~ .• p. S
.
1 18
~~- - -----~--
Needs Identification:
While these are all responsibilities of the department, they need not
be the responsibility of the patrol force.
20 G. Hoban Reinier, et. al.. .crime Analysis Operations Manual (U.S. Department
of Justice, Law Enforcement Assistance Administration, June 1977). p. 2-3.
1 19
the patrol function. Calls involving immediate threat to life, felony
crimes in progress, and the like should be answered first; other calls
should be stacked or handled in accord with alternative response
procedures.
120
provide information regarding how many days each officer works
along with the number of days lost due to vacations, holidays, illness
or other absences. Once this has been determined, it can be divided
into the total number of patrol hours required to provide the
necessary staffing level. 21
12 1
Creation of a Workload Analysis Study;
Our manpower distribution study indicated that since day shift had 23
percent of all incidents, it should have 23 officers assigned to it. What
if 15 of those officers are bt!sy all of the time and 8 are not? This
indicates that beats are incorrectly drawn, and some officers are
overworked while others are underworked. The solution to the
problem is to redesign the beats by determining the percentage of
total workload generated by each beat.~ Assume that in a simple four
beat system, day shift beat 1 has 42 percent of the workload, beat 2,
18 percent, beat 3, 31 percent, and beat 4, 9 percent. Officers working
beats 1 and 3 are much busier than those working beats 2 and 4.
Redraw the beats so that the workload is evenly distributed. In this
example, beats 1 and 3 would probably be reduced and beats 2 and 4
would be increased.
122
Random patrol is unplanned patrol, but "directed patrol" is planned
and directs resources to have the greatest influence on identified
crime problems. The crime analyst can be of great assistance to patrol
supervisors in the identification pro~ess.
These objectives are met by the analyst's examination and analysis of:
Qfficer Trainini:
124
which may occur should be viewed by officers as short-term
inconveniences necessary to the developmental process.
125
MEMORANDUM
CITY OF CHINO
POLICE DEPARTMENT
126
------------------ ---- ----------
127
power to lead them, guide them, and to help them grow
personally and professionally. And, you most certainly have
the responsibility, authority and the obligation to ensure that
they are maXimIZIng their potential and meeting the
Department's crime suppression goals.
In the months and weeks ahead, the CAU will be giving you
information relative to what the crime problems are, where
they are occurring and so on. The CAU never has and never
will require that any action be taken. Its personnel may
make recommendations in an effort to assist you with your
strategic and tactical action planning efforts, but it will never
impose itself on you. Thus, what you do with the information
given you by the CAU will be up to you. However, recognize
that inaction, in reality, is itself an action.
128
The objective of the Manag(~ment of Patrol Operations program is not
to have officers driving aimlessly about their beats, but to have them
concentrating on criminal activities in accord with the plans of action
you set for them. Further, the Department is considering several
alternatives to our current methods of policing. Primarily, we are
attempting to identify those areas where the uncommitted time of
each officer can be increased so that you will not only be facilitated in
you r efforts to develop Directed Patrol Plans, but will be able to
develop them confident in the knowledge that you will have the
creative ability to bring those plans to successful conclusions.
No, this is a time for excitement and a time to be very creative. Let
your imaginations go and think of new solutions to old problems. Can
you take two people out of their beats and let them stake out an area?
.. ,
How about four hours in uniform and four hours in plain clothes? For
burglary problems, could all of the units be concentrated in two or
three areas and only broken away for emergency calls? Maybe yes, or
maybe no. These mayor may not be viable alternatives. The point is
that you have the opportunity to be creative with the time of your
people. They may resent the structuring of their time at first, but the
positive results that will come out of this program should quickly
counteract any negative feelings which initially appear.
129
CHAPTER 8
131
officers were not allowed to investigate criminal incidents to any
appreciable degree, agencies had to employ many detectives for this
purpose, clearly an inefficient use of personnel.
e
Preliminary investigation is the most important part of the
investigative process. It determines:
Most agencies have patrol personnel collect basic information and then
return them to general patrol duties. Few departments can afford to
have patrol officers tied up on one or two cases for an entire shift. If
patrol officers become overly involved in investigations. an agency can
easily lose its ability to quickly respond to emergency situations and
routine calls for service. If' a department does not have the resources
to provide an illtensive effort. preliminary investigations should
usually be limited to the capture of data which can be obtained by
132
patrol officers at the crime scene. Once this information has been
obtained, it can be turned over to detectives for further investigation.
In this process, cases which can be solved are separated from those
having little chance of solution. Investigative managers assign only
solvable cases to detectives; others are administratively deactivated or
closed unless the discovery of new information warrants reactivation
and review.
133
• Is there a good possibility of solution?
134
Enhancement of PolicelProsecutor Relationships;
135
• has the quality of preliminary investigations improved?
136
• percentage of investigator time spent on administrative
duties
It is possible that the police agency developing this program has never
kept these types of records before. A considerable amoun'c of the
analyst's time may be spent gathering the data needed to properly
monitor the investigative process. Resist the urge to relegate this task
to a position of minor importance! Examination of these data is
necessary, for it will identify investigative training needs, assess any
need for change in the investigative process, and ultimately contribute
to the heightened efficiency of the entire law enforcement operation.
137
CHAPTER 9
AUTOMATION ISSUES
.
e·'
AUTOMATION ISSUES
139
the automated outputs desired by various divisions, units and bureaus
of a typical law enforcement organization.
RECORDS DiViSION
CRITICAL:
• Master name and index file
• Call up reports by case number, names, assigned
officer, type of crime
• VCR, BCS and arrest register
• Warrants System
o Track all warrants
o Recall warrants by name, docket, case number
o Track abstracts
• Ability to print complaint forms based on system data
• Single entry for information into the system
• Rapid movement from one screen to another without
going through a hierarchy of menus
• Ability to generate form letters based on data In the
system
• Maintain stolen/recovered/stored/impounded vehicle files
o Abatement
o Evidence
o Impounds
o Value information
• Word processing capability for case narrative linked to
case information. The system should have the ability to
download the narrative to hard copy and clear it from the
140
system under the control of the system aldministrator.
• Audit trail for copies of any case
• Password security system with different levels of security
• Uninterruptable power supply (UPS) back-up
SHOULD BE INCLUDED:
• Soundexsearch on master name index file
• Ability to link names and AKiAs in the master name index
• Ad Hoc query capability on any field across all files
• Vehicle information file linked to master name index file
• Warrant due diligence record
• Warrants linked to master name index file
• Registered persons file
o Narcotics
o Sex
o Arson
o CCW Permits
• License files
o Bicycle license
o Card rooms
o AB C violations
o Pawn shops/second hand dealers
• Track traffic citations
• Track traffic accidents
• Maintain case file number log for audit trail purposes by
o Victim name
o Date
141
------------------------------------------- .. - -
o Occurrence
o Location
o Officer
• Maintain business emergency information files
• Electronic spreadsheet capability for budget preparation
• Events calendar for all departmental activities
o Tickler file when appointments or key upcoming dates
OPTIONAL:
• Prepare duty schedule for records pe';rsonnel
• Probation, Parole search conditions and information
• Maintain inventory of Department property
o Shotguns
o Vehicle fleet
o Equipment assigned to officers
o Supplies
• Traffic accident/enforcement analysis module
PATROL OPERATIONS
CRITICAL:
• Officer, shift and division activity log information
o Type of arrest (felony, misdemeanor, warrant, citizen)
o Reports taken by type (felony, misdemeanor, traffic, etc.)
o Citations issueq (hazardous moving, other moving,
parking)
o Specialized miscellaneous activity tracking
142
~-~ .---------------~~~~ ~--
Bar checks
· Citizen assists
· Abandoned vehicles
· Other
• Activity broken down by
o Type of call
o Day of week
o Month
o Time of day
o Reporting district or location for multiplt beat
systems
• Field contact report file with query capability on any field for
c()mbination of fields
• Ad Hoc Query capability for incidents and traffic by
any field
SHOULD HAVE:
• Officer scheduling information for any given date range
o Number of officers working
o Number of officers off
o Officer shift assignment history
· Vacation scheduling compared to work schedules
• Tracking officer schedules and work hours (overtime, compo
time, vacation, etc.)
• Crime/workload analysis function with pre-programmed
reports
o Analysis of individual officer activity with standard
143
deviation for reasonable expectation of productivity
OPTIONAL:
• On-line Departmental manual or emergency response
procedures
• Emergency resources file
o Skilled personnel
o Special equipment
• Mutual and requests/responses
ADMINISTRATIVE SERVICES
CRITICAL:
• Ad Hoc query of data elements across all files
• Do analysis on Juvenile, Parolees and Probationers
• Ad Hoc report generator capability
• General word processing
• Specialized security for internal affairs documents
'" Electronic spreadsheet with graphing capability
• Track Neighborhood Watch groups
SHOULD BE INCLUDED:
144
·-. \
OPTIONAL:
INVESTIGATIONS
CRITICAL:
• Case tracking/Case management
• Track case status (open, pending, closed, court dispositio
etc.)
• Case assignment
• Ad Hoc query across all files
SHOULD BE INCLUDED:
,. Crime trends by
o Reporting district
o Time
o Date
145
.1
o Day of week
o Crime type
°M.O.
• Statistical workload of individual investigators
• Statistical workload of investigations division
o Track bad check files with the ability to
o Search checks by name of sUbject
o Identify amount owed/paid
o Search by victim's name
• Query premises history files
OPTIONAL:
TRAFFIC BUREAU
CRITICAL:
• Accidents/enforcement by
o Primary violation
Cl Location
o Day of week
o Time of day
o Officer
• Accidents/enforcement by specialized category
°DUI
o Bicycle
146
o Pedestrian
o Hit and Run
o Hazardous materials
• Ad Hoc query capability into traffic files
SHOULD BE INCLUDED:
• Inquire as to returned reports
• Status of reports (pending, completed, follow-up required,
etc.)
• Ability to log citizen complaints by violation or location
• Ability to track temporary statistical information on
accidents and enforcement activity
o DUI during specified periods
o Seat belt violations vs accidents
o Commercial vehicle enforcement activity
• Tracking parking functions
o Parking meter reliability
o Parking meter complaints
o Complains forwarded to court
• Track drivers license suspension/revocation orders
• Computer aided design/drawing with template files of
intersections and measurements
• Electronic spreadsheet for skid mark-speed analysis
• Tracking blood-alcohol levels by
o Case
o Officer
• IBM compatibility for data e~change with PWC
147
• Track traffic and engineering surveys for city locations
o Feed accident data into survey data
OPTIONAL:
PROPERTY SECTION
CRITICAL:
.. Locate items by case file number or by name
• Track property by type
o Evidence
o Stolen/recovered
o Found
o Safe keeping
• Track property by classification
o Narcotics
o Vehicles
o Firearms
o Explosives
o Hazardous materials
• Ad Hoc file query capability on property by any property
field
.. Maintain chain of custody information
SHOULD BE INCLUDED:
• Generate form letters
.. Purge property list based on user defined criteria
148
----.-~~----- --- ---------
.-. I
OPTIONAL:
I. PROBLEM STATEMENT:
149
• Indicate in general terms the problems encountered with the
current system.
150
• Assist the operator in screening out redundant reports of
previously reported incidents.
151
Example: Investigations
152
o Maintenance of databases (back-ups, purges, etc.)
o Training of users
o Time lines for each phase of the project and penalties for
late responses to the time lines unless approved by both
parties.
153
• Proposals due
o Title Page
The title page will show the vendor's name, the system
title and the date.
o Letter of Introduction
The vendor must state exactly what they are bidding on.
Within a one page limit, the following must be included:
vendor's name, address and a statement as to whether the
vendor is an individual, partnership or corporation. The
letter will be signed by an individual, partner or officer of
the corporation authorized to bind the corporation.
depending on the legal nature of the vendor. It will also
name the person or persons who will be authorized to
make representations for the vendor, their addresses and
telephone numbers. If this quotation is a joint venture or
involves subcontracting, this must be stated in the letter of
introduction. .
154
o Table of Contents
Along with the cost data outlined above, the vendor should
indicate the basis and method of billing the requesting
agency. All services and other items to be billed should be
specifically identified along with a full schedule of billing
rates.
155
o References and Company Information
o Acceptance of Conditions
156
Requests will be addressed to the person(s) authorized by
the vendor to represent the vendor.
157
that which is required. This will be done at no additional
cost or liability to the requesting agency.
o Other
o Additional Information
VIII. ApPENDIX A
DETAILED PROBLEM STATEMENT AND OPERATIONAL
ANALYSIS
158
• Each functional area of the agency should have a separate
section and each task should have a separate sub section.
• This section must give the vendor enough information about
the operation of the agency to allow it to determine what
software package will best meets its needs.
159
CHAPTER 10
OVERCOMING RESISTANCE TO THE CRIME
ANAL YSIS PROGRAM
=
0YERCOMING RESISTANCE TO THE CRIME ANALYSIS PROGRAM
If you are just beginning to develop a crime analysis program, the title
of this chapter may be a little disconcerting for it presupposes that
program development efforts will, in fact, be met with resistance. This
is not true for all agencies; but it occurs in enough of them that its
discussion is warranted. Don't panic! The encountering of at least
some resistance to your program is normal and should be no cause for
concern if you have prepared for and developed strategies to deal
with it.
One would think any program that could provide law enforcement .
officers with suspect leads, accurate knowledge of when and where
crimes are occurring, and a. heightened ability to identify, apprehend.
and successfully prosecute criminals would be warmly received. Why
might people be resistant to it? Because of the misconceptions they
may have about the program. These misconceptions, in tandem with
strategies that can be employed to overcome the resistance they
engender, are discussed below.
PROGRAM MISCONCEPTIONS:
161
3. Request that the chief executive meet with staff and user group
members to explain program benefits. If in-person meetings
cannot be arranged, request that the chief executive circulate a
department-wide memorandum to accomplish this objective,
162
3. Take advantage of or create opportunities to explain the true
purpose of the program. Promote the understanding that, with
implementation of the program, the agency will develop a
heightened ability to identify and apprehend criminals.
2. Determine how many people are necessary for, and how much
time is currently spent on, data processing. Identify the
personnel and time savings anticipated because of automation.
Outline other tasks personnel can perform if their available time
Mel Programs. Hopefully. however. you will be allowed to use this information
not for productivi~y measurement. but for program development purposes.
Remember, if you are to obtiin the acceptance of the troops. you must be
considered one of the "good guys." Those who conduct productivity studies are
often viewed as the enemy. Therefore. to the areatest extent possible. resist the
-:ffons of those who asle you to conduct them.
163
--~~-----------~~----
To familiarize personnel with the operation and the "feel" of the equipment.
some agencies have installed computer games c;>n their automated systems. We
have no panicular objection to this practice as long as it serves its intended
purpose. Problems sometimes arise. however. when game playing becomes an
end in itself. When this occurs. the games should be removed. After all.
occasional worle breaks are not an unreasonable request of management!
164
but too unfamiliar with police operations and the "ways of the world"
to be of any real assistance.
1. The unit supervisor should have made it clear that the analyst
would not be telling anyone how to do his or her job prior to the
analyst's initial entry into the department. Analysts only
provide information; how that information is ultimately used is
up to management and staff. Stress this point.
2. Get to know people, attend officer briefings on all shifts, and ride
with on-duty officers. If you are so inclined, work out in the
gym with them or volunteer to be on their softball team. Offer
to do some "grunt work" for detectives. In short, seek
opportunities to talk with people and explain the program to
them.
5. Accept the fact that you may be tested. This is normal. Officers
and in\'estigators often want to determine if you are really a
team player before trusting you with information. Expect to go
through an initiation period and accept whatever teasing or
ribbing accompanies it.
165
7. Respond quickly to requests for information and assistance.
Delay is the deadliest form of rejection. People will continue to
ask for help only to the extent that they know it will be
provided.
10. Recognize that some people will never allow you to truly interact
with them no matter what you do. When this occurs. accept it
and do not take it personally. Be content with the knowledge
that others in the organization will receive great benefit from
your work.
e
The Pro~ram Will Take Away Our Freedom:
166
you ... too secretl" With all due respect to the maJonty of hud-working
investigators throughout the nation-and indeed their number is
legion-this mystique provides excellent cover for those few detectives
who are less than attentive to their duties. With the implementation
of a crime analysis unit, however, come& the removal of the mystique
and the scrutiny of their efforts. This may not be welcomed by certain
individuals who have grown comfortable in positions where
accountability was unquestioned.
167
statistical techniques (explained in this book) to determine event
probabilities and provide this information to your users.
Most changes noted above will not be warmly received-at least not
initially. Officer's may resent the extra work created by the
introduction of new forms, new shift schedules may prove
inconvenient, and many complaints may be voiced during the early
stages of program development.
Focus on the need for change and the resulting benefits. Explain that
changes will heighten efficiency and increase apprehension effort.
Specific complaints may be addressed as follows:
168
• New Forms are needed to more accurately and
comprehensively capture criminal incident and suspect data.
Data collected from the forms will be analyzed to inform
personnel of the nature of crime problems (probable locations.
dates and times of future occurrences) and to build known
offender. MO and similar files to aid the offender identification
process.
169
during peak time hours. Others may be overworked because
beats were originally drawn without regard for the volume of
work generated by each beat.
SUMMARY:
Police officers tell people what to do all day long and usually get their
way. If they determine someone is going to get a ticket or go to jail.
that happens. It doesn't take long for officers to become so
accustomed to controlling others that they becr)me resistant to being
controlled. They will accept control from departmental executives and
supervisors (usually), but seldom from anyone else. That this creates
170
problems in their interpersonal relationships is understood by police
psychologists throughout the nation.
Officers may see the analyst as yet another person trying to control
their actions and shake them out of their comfort zones. You and your
program may initially be perceived as tools the department will use to
"fix what ain't broke." For the sake of your own self-esteem, realize
that this interplay of personal dynamics creates resistance to
programs. Expect it, prepare for it, and do not take it personally. Be
yourself. Learn from the officers, provide them with what they' want
and need {\nd you will eventually gain the acceptance you desire .
171
PART TWO:
•
STATISTICS AND THE CRIME ANALYSIS PROCESS
174
The role of the crime analyst is to give order to the myriad numbers
generated in a police agency. Only in the ordering of numbers can we
make rational decisions that are baseJ on quantitative factors. The
"ordering" of numbers is known collectively as mathematics.
Mathematics, like language, have various forms. The world of spoken
and written language is COillprised of English, French, Spanish, and a
planet full of other languages and dialects. The language of
mathematics is comprised of algebra, geometry, calculus, and so on. In
crime analysis, we communicate Inost effectively through use of the
mathematical language known as "statistics."
EARLY STATISTICS:
175
From the crime analyst's point of view. descriptive and inferential
statistics are inexltricably linked. The number of robberies committed
over a period of time can be shown on a table or I grapb (descriptive
statistics). However, by observing a criminal's habit pattern or MO,
the analyst is often able to infer or predict what the criminal will do
next (inferential statistics). This information can be used to develop
directed patrol or tactical action plans or to aid detectives with their
investigations. Indeed, correlating behavior to individuals is often the
most effective way we have of assisting the investigative process.
The bulk of modem statistical theory was known by 1930, but it was
insufficiently used. This was because the accumulation &ond analysis of
statistical data, even with the aid of powerful theory, involved
performing tedious and often overwhelming computations. Before the
arrival of electronic data processing, it was not practical to carry out
the lengthy calculations required by the theory. Today, this obstacle
has been removed and we see a vast increase in the use of statistical
analysis, particularly by those employed by law enforcement agencies.
Anymore, the tedious mechanics of deriving answers to analytical
problems has been leO to the computer.
176
computational tricks and shortcv.ts required by manual computations.
For our purposes, the present need is to master statistical concepts and
to learn how to apply them to crime analysis work. That's what the
rest of this book is all about.
OVERCOMING NUMEROPHOBIA:
Mc.lst people have fears of one sort or another. While some folks are
affilid of heights or enclosed places, others are plagued by
numerophobia, a fear of numbers. This often results from one's
having had difficulty with theIll in school and his or her coming to the
conclusion that "I'm just no good at math." For these people, balancing
even a checkbook is a traumatic experience that is accompanied by
hair pulling, chest beating and frequent expressions of pain and
suffering.
If this describes you, here's the good news. The following chapters
have been written just for you! They were written on the assumption
that you have no prior experience doing statistical or analytical work.
Further, the material is presented without the use of complicated
formulas and the technical jargon which often accompanies statistical
texts. If you can add, subtract, multiply and divide-or use a calculator
that performs these functions-you should be able to follow the
examples given. You may then apply the principles which are
demonstrated to your work.
177
CHAPTER 12
GETTING STARTED
GEITING STARTED
Often the most effective way to describe, explore and summarize a selL
of numben is to look at "pictures" of these numbers. Data graphics
(pictorial representations of sets of numbers) visually d~splay
measured or computed quantities by means of a coordinate synem,
points, lines, numbers, symbols, shadings, and color. At their best,
graphics are instruments for representing quantitative information
and well-designed data graphics are usually both simple and very
effective.
Before graphing or analysis can begin, the analyst must organize the
data. Picture a month of crime reports and field interviews as they
were handed to you. The days of occurrence of all crimes are jumbled,
as are the hours, the locations, and other elements that have been
included. All of these "facts" are of little value if they are not
organized in a meaningful manner. We organize data so that we may
look for such things as the range in the values (smallest to largest),
any' apparent trends, values around which the data: tend to group,
• values that appear most frequently, etc. The more patterns we can
identify, the more likely we, as crime analysts, will understand what'S
going on "out there".
Data, before they are arranged and considered, are called "raw data".
They are "raw" because they are not organized. Consider being
requested to give an overview of response times for calls-for-service.
Dispatch provides the following raw data (in minutes):
5 15 14 7 6 6 12 10 9 8
7 6 8 7 7 9 10 9 S 10
The flI'st thing to do to correct this situation is to array the data. The
simple data array arranges data from lowest value to highest value in
ascending order, or from highest to lowest value in descending order.
For example, response times could be arrayed u follows:
S S 6 6 677 7 7 8
8 9 9 9 10 10 10 12 14 1S
179
From this simple array:
(1) The analyst can quickly see highest and 'lowest values
wi thin the data.
(2) The analyst can easily partition the data into mean-
ingful sections.
(3) The analyst can see whether any value appears more
than once.
(4) The analyst can sec intervals between values.
X f
5 2
6 3
7 4
8 2
9 3
10 3
12 1
14 1
15 1
20 Column Total
Now let's assume that the person who requested this analysis can't get
a feeling for the distribution of response times from reading numbers
in the frequency column and would prefer to see percentages. To
accomplish this modification, simply total the frequency column (sum
= 20 in our case), divide each frequency by that total, multiply the
180
resultinl decimal by 100% and enter the final resuh in a column
labelled ",.-. Our revised frequ~ncy table would then be:
X f
S 2
"
10 (2/20) X 100 = 10
6 3 IS (3120) X 100 = 15
7 4 20 etc.
8 2 10
9 3 15
10 3 IS
12 1 S
14 1 S
15 1 5
•
minutes, for some it was 6 minutes, and for some it was 7 minutes. By
adding the percentages representative of these response times, the
analyst sees that 45% of the calls took fewer than 8 minutes to
respond to. Similarly, 15% took more than 10 minutes. to get to.
Adding percentages is a lot ea§ier than recomputing each time a query
is made.
Intervals f
of response times (minutes)
4-5 2
6 •7 7
8 -9 5
10 - 11 3
12 - 13 1
14 • 15 l.
20 Column Total
181
We could also expand our grouped data frequency chan by adding
associated percentales. Such an expansion would look like:
Intervals f
of response time (minutes)
In our example, the range for the distribution of our response times is:
Range = (longest response time • shortest response
time) + 1
Range = (15 • 5) + 1
Range = 11*
* The range of a set of values is not the same as the difference. The
difference is simply the lowest value of a set subtracted from the
highest whereas the range includes both the highest and the lowest
values. For example, the set of values 61, 62, 63, 64, and 6S has a
difference of (65·61= 4) whereas the set "ranges" over 5 distinct
values.
Next we compute the number of data groups and divide the range by
the interval we would like to use. We chose an interval of 2. If the
result of this division is a number between 5 and 10, we have met the
first and second requirements for constructing a grouped data
frequency table correctly (see 1 and 2 above). In our response time
example, we get
Finally, we must choose a lowest value for our table. Five minutes is
the lowest response time in the distribution. Five, however. is not
evenly divisible by the interval we chose (5/2=2.5). To meet the third
requirement above, we select the first number below 5 which is
evenly divisible by our chosen interval. In this example, that value is
4 (4/2=2). We now have the basic elements of our grouped frequency
table:
Interval 2 =
Number of groups • 6
Lowest value = 4
l~
4 .. 5
6 .. 7
8 .. 9
10 - 11
12 - 13
14 - 15
The analyst chooses which factors to count. The factors you select, "X",
are known as independent variables. Once "X" is chosen, the number
of elements of "X" is provided by the data that you have collected.
Resulting frequencies of occurrence of each data element "X" are
referred to as "f", and are known as dependent variables.
You can also get more sophisticated and hold one independent variable
constant while counting another. For example, you could hold a day of
the week constant and count the number of burglaries by reporting
qistrict. Or, you could construct a table illustrating the pattern of
burglary throughout your jurisdiction on a particular date.
You are not limited to one independent choice. Two, three, or more
independent variables can be held constant while the distribution of
other variables is counted. You can hold both day-of-the-week and
reporting district constant and count the number of occurrences of a
particular crime by hour of the day. Your choices are limited only by
the data you have collected, your imagination, and experience.
184
123 on Wednesdays between 1500 and 1700, patrol resources could
be assigned accordingly.
185
·.
186
An Exemplary Data Search:
To illustrate this point, Mr. Aren.berg, one of the authors, cites the
experience of the Dallas, Texas, Police Department. In conceptualizing
the development of a fully automated pattern detection system, Dallas
personnel first thought that every offense committed in the city every
day should be compared to every other offense committed over a
three to six month period and to all known offenders. It became
readily apparent that the sheer size of the data processing implied in
such comparing made such an effort impractical. Obviously, an
effecti ve limiting approach was needed that would both reduce
insignifica'nt comparisons and select the most probable offense
similarities.
,
category for a shorter time period. An important exception was rape.
Rapes should be compared against residential burglary offenses but
not vice versa. Index crimes should be compared within crime
categories for 40 day periods relative to murder, rape, robbery and
aggravated assault, and to 30 day periods relative to burglary, larceny,
and auto theft. In Dallas, as in most jurisdictions, the former set of
index crimes occurs less frequently than the latter. Thus~ for these
offenses, an extra ten days was given to the data collection and
comparison process. To limit the similarities reported by the system
to only those that would have significance to a criminal investigation,
it was found necessary to consider not only the degree of similarity
between two offenses, but the significance of the similarity as well.
Moreover, the offenses considered for similarity had to contain
significant or unique data.
•
However, if a suspect's height was unusual, less than 5'2" for instance,
the uniqueness would be significant.
187
Grapbina:
(1) Make sure your graph has a title explaining its nature.
(4) The X-axis should be 25% longer than the Y-axis. The
vertical axis should be laid out so the height of the
point representing the largest frequency is three-
quarten the length of the horizontal aXIS.
There are four basic grap~s of use in crime analysis: the bar graph.
the histogram, the frequency polygon, and the bivariate graph.
Assume that the following numbers are the ages of the last 100 men
arrested for burglary in your city:
188
~~-------------
ORDINATE V
-ca
CD
.-.as.
.Q
>
-c
CD
"0
C
•
CD
Q.
CD
Q
o~-----------------------------------x
Independent Variable ABSCISSA
ORIGIN
Figure 23
189
20 1S 22 23 25 26 23 30 31 26
31 IS 20 38 27 21 19 35 18 21
21 22 24 24 19 36 33 23 20 33
24 17 21 20 19 27 24 36 21 25
22 39 22 26 27 21 23 23 21 24
30 16 21 28 27 22 29 19 39 17
32 21 18 28 15 33 24 25 22 22
21 27 30 15 21 18 22 24 18 23
31 29 20 18 22 17 22 19 15 18
18 42 24 26 16 22 18 33 28 25
Arrange these data as a frequency table (using grouped data):
X f %
Bar graphs are most often used when the dependent variable is
discrete. A discrete variable can only take on a finite number of
values, usually whole numbers. For example, the roll of a pair of dice
can only result in one of eleven discrete values: 2, 3, 4, S. 6, 7, 8, 9, 10,
11, and 12. There are no other values that the pair of dice can have.
Therefore, if we were to construct a bar graph depicting the number of
ways that each value of a pair of dice could be made. a bar at each of
1
35
30
25
F
R
e 20
Q
U
e
N 15
C
•
Y
10
o
15·17 18·20 21·23 24·28 27·28 30·32 33·35 36·38 39·41 42·44
Age (years)
Figure 24
190A
the eleven discrete values would be drawn but no other data would
appear on the graph. In crime analysis, such discrete variables may
include numbers of a specific crime, .year-to-year or month-to-month
figures, numbers arrested, patrol units deployed, etc.
191
\
30 ...
25 . ~
F -
R 20
e
Q
U
e 15 • l-
•
N
C
Y
10
I .
5 l- I
I
\
\
o • •
• • .
I
. .
l
15-17 18·20 21·23 24·26 27·29 30-32 33·35 36-38 39-41 42·44
Age In years (Nominal)
Figure 25
192
30
25
F 20
R
E
Q
u 15
E
N
C
Y 10
o +-____~--~----~----+_--~~--_+----~----~--~----~
16 19 22 25 28 31 34 37 40 43
Age (years)
Figure 26
193
27-29 had 10 cases in it. The point would be placed opposite 10 on
the vertical scale and at the midpoint of the interval 27-29.
•
the entire population .
From the table on page 185, let us determine the smoothed frequency
for the interval 27-29. We work with -the frequency of that interval,
10, and the frequencles of the interval below it (24-26) and the one
above it (30-32), These frequencies are 16 and 7, respectively. The
sum of these three frequencies (10+16+7=33), divided by three
intervals, results in a "smoothed" frequency of 11 (note: 33/3= 11) for
the interval 27-29. When this procedure is repeated for all intervals.
the smoothed frequencies can be graphed.
194
interval (10), add to it the frequencies in the intervals above and
below, 0 and 18, respectively, and divide by three. The smoothed
frequency for interval 15-17 is 9.33 (10+0+18=28/3=9.33).
Now, how do we handle interval 12-14, the one just below our first
frequencies? Again, the intervals 12-14 and 9-11 are certainly real,
even though they contain no frequencies. Interval 12-14 is zero, as is
the interval below. The interval above (15-17), however, contains 10
cases. We add 0, 0, and 10, divide by three, and compute a smoothed
frequency for interval 12-14 of 3.33. Similarly, the smoothed
frequency for interval 9-11 is zero.
x f F
(actual) (smoothed)
9-11 0 0.00
12 -14 0 3.33
15-17 10 9.33
18 -20 18 18.67
21-23 28 20.67
24·26 16 18.00
27·29 10 11.00
30-32 7 7.33
33·35 5 5.00
36-38 3 3.33
39-41 2 2.00
42-44 1 1.00
45·47 0 0.33
48-50 0 0.00
195
30
F 20
R
E
Q
U
• E
N
C
Y
10
o .---~ __ __ __ __ __
~ ~ ~ ~ ~~ __ __+-__
~ ~ __~__~__~__~
10 13 16 19 22 25 28 31 34 37 40 43 46 49
Age (years)
Figure 27
196
What is the impact of changes in the enforcement of codes regarding
narcotic usage on reported burglaries? When two 'Variables are
plotted together, the result is a bivariate graph. For this type of graph
two measurements are required for each item observed. One variable
is scaled along the horizontal axis, the other along the vertical axis. A
point is placed on the graph where a given ordinate (vertical) value
intersects its associated abscissa (horizontal) value, and this point is
known as the coordinate. Later in this book we will discuss techniques
for relating coordinates on bivariate graphs to establish patterns and
predictions. Consider the following values for X and Y:
Coordinate X Y
A 1.0 12.5
B 1.5 13.0
C 2.0 17.5
D 2.5 17.0
One variant of the bivariate graph is the "pin map", commonly used in
law enforcement to illustrate types and times of crimes by location.
Locations of crimes are plotted on a street map by placing a marker at
the point on the map which represents the street address. Assume
that a type of crime (e.g., burglary) occurred at the following
addresses:
CRIME ADDRESS
197
- - - - - - -----
18
oc
..
16
,14
0B
• 12
W-A
G
A
Figure 28
"
198
-.
C/')
c:
-.
C/')
E
....
C/')
Q)
-.
C/')
.::t(.
'ffi iIi c: m
:E il: 0
5 th St.
e8
4 th St.
eD
ec 3 rd St.
2 nd St.
-A
1 st 51.
eE
• I
Pin Map
Figure 29
199
If we add a set of axes to our street map (as shown in Figure 30), our
crimes have new "addresses" expressed in terms of bivariate
coordinates:
CRTh1E X Y
A 11 1.82
B 21 4.95
C 32 3.81
D 21 3.55
E 32.5 l.41
200
Pin map converted to X-Y coorinates
5
• B
• 0
ec
3
2 • A
• E
1
x
o 10 20 30 40 50
Figure 30
201
Group A. 53%
Group B 46%
Group C 57%
Group B 46%
Group A 53%
Group C 57%
Tables are the best way to show exact numerical values and are
preferred over graphics to describe small data sets. Further, a table is
usually better than a pie chart; the only worse design than one pie
chart is several pie charts. No viewer should be asked to corr:pare
quantities located in spatial disarray within and between pies! (Pie
charts are not covered in this book. We recommend that you avoid
using them).
• When sets of data are large, use graphs. Use bar charts and
histograms when illustrating tabular data, or when you want to
compare elements within a single data set. Use frequency polygons.
smoothed or unsmoothed, when you want to illustrate the distribution
of your data. Use bivariate graphs when you need to illustrate trends
or patterns.
202
CHAPTER 13
THE BASICS
I
THE BASICS
The most common "center" is the ordinary average. This center is the
arithmetic mean or, simply, the mean. The arithmetic mean is called "a"
measure, rather than "the" measure because there can be other points of
view on what is the "true" center. For each point of view, there is a
different way to compute the center. The three most commonly used
"center" calculations are explained below. Guidelines as to which one to
use under what conditions are discussed .
• THE MEAN:
The mean is the best known and most commonly used measure of central
tendency. The mean is computed by summing up all the values in the data
set and dividing by the number of those values. The rule for computing
the mean can also be stated as follows:
Suppose you had the following data items and wanted to compute the
arithmetic mean: 87, 76, 94, 105 and 79. The sum of these numbers is
441. The number of data items is 5. Applying our procedure for
computing the mean, we get:
204
This is the true arithmetic mean ("average"), yet most would not accepL
$2,059 as the meaningful center of the set of data. In this case, it is more
meaningful to examine the middle ~.alue (or median ") of the data set.
II
The median is obtained by rearranging the data in order by size from low
numbers to high numbers and selecting the term in the middle. In our
example of burglary losses, the middle tenn is 26th in the list of 51 and its
size is, of course, $100.
When you have an odd number of data items, the median is the middle
value of a rearranged data set. For example, assume you have an odd
number of data elements as follows:
Rearrange the data into numerical order from low to high as shown below:
The median is the middle data item, 89. Eighty-nine is the middle data
item since there are the same number of data elements below it as above
it (two on each side).
When you have an even number of data items, there is no middle item.
Thus, the median must be determined by calculating the mean of the two
items nearest the middle. For example, assume you have the following set
of six values (six is an even number):
Determine the two items nearest the center (10 and 12). We know that 10
and 12 are nearest the center because there is an equal number of
numbers below the lowest value (10) as above the highest value (12). Two
numbers are below 10 and two numbers are above 12. Thus, 10 and 12
are indeed the two values nearest the middle. The median value for this
set of data is calculated as follows:
205
THE MODE:
The mode (mode = popular) in a data set is the most frequently occurring
item. If there are three 68's, four 70's, six 75's and one each of other
values in a listing of various values, 75 is the mode of that distribution. If
there were four 68's, four 70's, and three 75's, then the distribution would
have two modes-68 and 70-and would be called bimodal. A distribution
may have one or more modes. A distribution could also be comprised of
data elements in which no value appears more than once and, in that case,
the distribution would have no mode (no mode not a mode of 0). A mode
1
of zero i~plies that the most frequent value in the distribution is zero.
Because the location of the mean is ~ependent upon the position of each
observation in the distribution, the "mean" average is the best of the three
to use except when the data are obviously skewed.
If the following data represent the time (in minutes) of patrol's responses
•
to a single type of call-for-service:
6 4 9 4 6
10 7 8 5 7
7 7 7 7 6
5 6 6 9 8
7 8 7 8 6
x
x
x x
x x
x x x
x x x
x x x x x x
x x x x x x x
I I I I I I I
4 5 6 7 9 8 10
Response time (in minutes)
206
and readily see that the data are pretty well balanced, and their
distribution is somewhat bell-shaped.
our data are concentrated around the higher values. This data set 15
"skewed to the right".
We could also have data that are "skewed to the left" and data with two
modes, etc. Nothing beats a picture for allowing you to see how to best
describe your data.
2fJ7
2, 3, 3, 4, S, 6, 6, 6, 28
[n summary: Use the "mean" average when the data are symmetrically
distributed, and use the median when the data are skewed. Don't use the
mode to summarize data distributiolns ...
High and low values are as real as other values. Dropping them cannot be
justified unless a clear and IQgically precise explanatiQn is Qffered. To
simply ignQre certain values leads to difficulties, both objective or
subjective in nature:
The mean, median and mode tell us only part of what we need to know
about the characteristics of data. To understand mQre, the analyst must
also determine variability (the spread or dispersion of the data), Three
measures have been found most useful: the range, the mean average
deviation, and the standard deviation.
the range is (99 - 32) + 1 or 68. Though simple to compute, the "range" of
a data set gives little in the way of understanding to the data since only
two data points are considered.
Another measure of dispersion, which considers all the data, is the mean
average deviation. To calculate mean deviation, we first calculate the
mean average. Then we find the difference between each individual piece
of data and the mean average of the data.
to compute the mean average, we sum these data (for a total of 40) and
divide by the number of data elements (in this case, 5). The mean average
e
for this simple data set is S.
11-S=3
8-8=0
6 -8=2
7 - 8 :: 1
8-8::0
What do these calculations tell us? Two things: the data center around the
value 8 and the average dispersion of the data is 1.2 units to the left, and
1.2 units to the right of that center value.
Standard Deyiation:
Measures discussed so far are used because they are easy to calculate and
understand. They are of little use, however, to the crime analyst asked [0
address problems impacting upon an agency's resources. The most
important measure of dispersion, in these cases, is the "standard
deviation". The standard deviation is the most informative of all
calculations of dispersion.
•
(4) Sum the squares calculated in Step 3.
(6) Find the square root of the variance to obtain the standard
deviation. (The square root of a number is a number that,
when multiplied by itself, results in that number. The square
root of +36 is 6. When you multiply 6 by itself [6 x 6]. the
result is +36. Remember that -6 is also a valid square root of
+36. When you multiply -6 by -6, the result is also +36
[multiplying two negative numbers results in a positive
number]. Thus r all numbers actually have two square roots-a
positive root anci a negative root).
210
~-~--------------------~~--
(6) The standard deviation of the example data set is the square
root of 2.8, a plus or minus 1.67.
While there are formulas that use the standard deviation to make
predictions, they must, by necessity, be quite conservative since they
cover every conceivable type of data distribution. For distributions having
a bell-shaped appearance, the following empirical results more nearly
reflect what is encountered.
EMPIRICAL PREDICTIONS
The interval of +/- one standard deviation from the mean will contain
about 68% of the data.
The interval of +/- two standard deviations from the mean will contain
about 95% of the data.
The interval of +/- three standard deviations from the mean will contain
about 99.7% of the data.
Alternatively, we can say that about 68% of the data are within one
standard deviation of the mean, about 95% within two standard deviations
of the mean, and virtually all are within three standard deviations of the
mean. See Figure 31.
-2
13.59~
-1
34.13~ 34.13~
+1
13.59
+2
2.28~
+3
X
I , + + +
~ N ~ N . t.H
..-.
(J)
..-
(J)
-•
(J)
•::J
-&...
(J)
-.....,
(J)
..&.-
(J)
.,,.~
~ ~
a. &. &.
.,
a. a.
., i'
a ., Q,
..,
at
Q.
*
Q,
0
i< 'i i_. i' 0
- -. --...
~ c.
:s.
--.
:5.
at
0
~
at
::::
0
~
0
~
<
at
::
0
~
:5.
0
:;,
-
:So
at
0
:::I
Figure 31
Bell Curve wtth Stenderd Deytetton
111 ustreted
212
average (like a bell .. shaped curve) is unimodal. That is, it has one hump in
the center when the data are plotted as a histogram. These types of data
have some unique characteristics that lend themselves to the forecasting
function. For example, there is little error in assuming that two-thirds
(actually 68 percent) of the data are distributed within one standard
deviation of the mean. In addition, 95% of the data are distributed within
two standard deviations of the mean, and almost all of the data (99.7%) lay
within three standard deviations of the mean. This is a rough rule, of
course, but it has been found to work very well.
The standard deviation is a powerful tool for crime analysts and can be
used in a variety of ways. For example, assume a neighborhood is being
victimized by a burglar-rapist. After interviewing victims, we find that
the mean average time of the crime is 0300 and that the mean average
time has a standard deviation of +/- 1 hour. Two standard deviations from
the mean are +/.. 2 hours. Three standard deviations from the mean are
+/- 3 hours.
We would conclude that 68% of the crimes that have been committed and
are yet to be attempted by this criminal-if his current pattern continues-
will occur between 0200 and 0400 hours, one standard deviation from the tit
melln. (Remember, the mean is 0300. Thus, calculating +/- 1 hour from
the mean gives us the range of 0200 to 0400). Ninety-five percent of
these crimes (two standard deviations from the mean or 2 hours) are
distributed between 0100 and 0500 hours, and virtually all of these
crimes are distributed between 2400 and 0600 hours (three standard
deviations from the mean or 3 hours). Armed with this information, a
department's patrol commander wou{d be in a position to order a cost-
effective deployment of agency resources in an effort to apprehend this
perpetrator.
SEASONAL AVERAGING:
Many human activities vary with time of year. Traffic accidents near a
beach are more frequent during the warm summer months than during
cold winter months. In jurisdictions where snow marks the winter season,
response times to calls-for-service tend to be longer than during non-
winter months. Some crimes increa~e with the advent of the
Thanksgiving~Christmas holidays, particularly shop lifting and theft from
vehicles. Although these observations may seem obvious to law
enforcement professionals, it may be important to demonstrate a surge in ..
a particular crime during a season to a non-professional, or to demonstrate ,.,
that a crime is occurring at a higher or lower rate than expected.
213
It is imponant for crime analysts to be able to compute seasonal averages
so that management is able to plan for seasonal changes. It is also
import~nt for law enforcement professionals to be made aware of the
season just past. Was a specific crime committed with a frequency that
fell within the expected range of values (a threshold). or was its frequency
unusually high or low?
Two methods for computing seasonal average are presented. The first is
the easier of the two. but its results are not as accurate as other methods.
The second method is presented in Chapter IS of this book. Both methods
are exemplified by three years of data-three years are necessary for
seasonal averaging. If you have more data, fine. If you have fewer,
advise those who will be utilizing your results to use them with caution.
•
YEAR 1 ¥EAR 2 YEAR 3
JAN 40 60 50
FEB 42 62 73
MAR 53 64 71
APR 82 60 78
MAY 74 71 81
JUN 82 84 100
JUL 100 103 120
AUG 122 125 141
SEP 115 124 118
OCT 92 110 103
NOV 76 94 90
IE 126 123 137
214
were hijacked during January of YEAR 4, the seasonal
adjustment factor would be:
58 (the most current data)/50 (the 3 year mean for Jan.) = 1.16
MONTIlLY
YEAR 1 YEAR 2 YEAR l MEAN SAF ESTIMATE
JAN 40 60 50 50.0 1.16 58 (*)
FEB 42 62 73 59.0 68.4
MAR 53 64 71 62.7 72.7
APR 82 69 78 73.3 85.0
MAY 74 71 81 75.3 87.3
JUN 82 84 100 88.7 102.9
JUL 100 103 120 107.7 124.9
AUG 122 125 141 129.3 150.0
SEP 115 124 118 119.0 138.0
ocr . 92 110 103 101.7 118.0
NOV 76 94 90 86.7 100,6
J::B: 126 123 137 126.7 147.0
(*) Actual
One reasonable question the analyst might pose is: What if the actual
amount hijacked in February does not agree with the calculated estimate?
(It probably won't),
215
~~~ -----
The answer: Adjust the calculations using February's actual amount as the
basis for computing a new Seasonal Adjustment Factor (SAF). Then,
recompute the new estimates for March through January, with January's
estimate being for YEAR 5.
MOVING AVERAGES:
• average is the time interval. The longer the time interval, the less
influence exerted by any particular time period within the interval. The
best way to choose a prudent time interval is to examine your agency's
recent data, and experiment with it.
There are three basic moving averages: simple, weighted, and exponential.
All can be used for any time interval; the choice is up to the analyst. The
authors, however, have found the most practical minimum time interval to
be one year. Moving averages smooth variation within the time interval
of the average, and emphasize variation for time intervals greater than
the average. For example, a four quarter moving average would smooth
seasonal variation and concentrate on year long (or longer) trends.
The simple moving average does not require intricate calculations and
does not recognize that the most recent data may have more meaning than
less recent data. Table I creates a five-week simple moving average for a
hypothetical set of data. The first five weeks are required as an
initialization period, and the moving average should be interpreted from
the sixth week on. Calculation of the average for each week requires
summing the five most recent weekly data points and dividing that sum
by five. All the data are given equal weight and all the data determine
216
the level of the average. The data added and deleted each week affect the
moving aver;\ge, causing week-to-week variations.
Assume that the data given in the column titled "end of week data" is the
number of robberies reported for the week listed in the column titled
"week". If the data given in the first two columns were plotted, we would
get a classic "saw tooth" and not see the long-term trend in robberies. The
data in the column titled "moving average" gives us the average week over
a five week span (starting in the sixth week). Note that beginning with
week 6, the data from week 1 is dropped and the pattern of "dropping
weeks" continues to the end of the data set (Le., in week 7, the data from
week 2 is dropped; in week 8, the data from week 3 is dropped, etc.). If
we were to plot the moving average by week, our curve would be
considerably smoothed and we would see that the trend in robberies is up.
Table I
Simple Five-Week Moving Average
End of Moving
Week Week Data Calculation AVi·
1 20 20/1 20.00
2 21 20+21/2 20.50
3 21 20+21+21/3 20.66
4 20 20+ 21 +21 +20/4 20.50
5 22 20+21+21+20+22/5 20.80
6 22 21+21+20+22+22/5 21.20
7 21 21+20+22+22+21/5 21.20
8 23 20+22+22+21+23/5 21.60
'9 24 22+22+21 +23+24/5 22.40
10 24 22+21+23+24+24/5 22.80
11 25 21+23+24+24+25/5 23.40
12 27 23+24+24+25+27/5 24.60
13 24 24+24+25+27+24/5 24.80
14 23 24+25+27 +24+23/5 24.60
15 25 25+27+24+23+25/5 24.80
217
most recent data; however, any weighting system is possible. When there
are sharp movements in recent data, the weighted moving average may
differ significantly from the simple moving average.
The concept behind the we:ighted moving average is that current data is
more significant than past data. To reflect this significance, various
multipliers are used. Let's look at week 2 in Table II below. The data at
the end of the second week (21) are more important than the data at the
end of the first week (20). To reflect this difference, we multiply the data
at the end of the second week by two, thus making this datum twice as
important than the first. Multiplying it by two, however, creates the effect
of two second weeks. Since we are also averaging in one first week, we
have the' mathematical equiv4ilent o.f three weeks, hence the division by
three. The same concept is used for calculating the moving average at the
end of the third week. In this case, the third week is the most current
and, therefore, the most significant, followed by the second week and
finally the first week. This significanc'e is reflected in the multipliers (also
known as weights) and the division by six is due to the sum of the
mathematical equivalent of three third weeks, two second weeks and one
first week.
• This process continues until we reach the end of the sixth week. Since our
example deals with a five week moving average, data from the end of the
first week are dropped from further inclusion in our calculations (they are
six weeks old). The same "drop" of second week data is implemented
when we compute the moving average as of the end of the seventh week.
Table II
Weighted Five-Week Moving Average
End of Moving
Week Week Data Calculatjon AVK·
1 20 (20xl)/1 20.00
2 21 (20x l)+(21x2)/3 20.66
3 21 (20x 1)+(21 x2)+(21 x3 )/6 20.83
4 20 (20xl)+(21x2)+(21x3)+
(20x4)110 20.50
5 22 (20xl)+(21x2)+(21x3)+
(20x4)+(22x5)/15 21.00
6 22 (21xl)+(21x2)+(20x3)+
(22x4)+(22x5)/15 21.40
7 21 (21xl)+(20x2)+(22x3)+
218
(22x4)+(2Ix5)115 21.33
8 23 (20xl)+(22x2)+(22x3)+
(2Ix4)+(23x5)115 21.93
9 24 (22xl)+(22x2)+(2Ix3)+
(23x4)+(24x5)115 22.73
10 24 (22xl)+(2Ix2)+(23x3)+
(24x4)+(24x5)115 23.26
11 25 (2Ixl)+(23x2)+(24x3)+
(24x4)+(25+5)/15 24.00
12 27 (23xl)+(24x2)+(24x3)+
(25x4)+(27x5)/15 25.20
13 24 (24xl)+(24x2)+(25x3)+
(27x4)+(24x5)/15 25.00
14 23 (24xl)+(25x2)+(27x3)+
(24x4)+(23x5)/15 24.40
15 25 (25xl)+(27x2)+(24x3)+
(23x4)+(25x5)/15 24.53
EX12Qn~nIiaI MQvini Averaie:
SC = 2 I (5 + I) = 0.33
Table III presents an example of a five-week exponential moving average.
In order to start the exponential average, the moving average in week one
was assumed to be equal to the actual data at the end of week one. The
calculation for any subsequent week is straightforward. It is the
219
smoothing constant (0.33 in our example) times the end of week data, plus
ODe minus the smoothinl constant (1 • 0.33 = 0.67), times the previous
movins averale.
Table III
Exponential Five-Week Moving Average
End of Moving
Week Week Data Calculation Av&,
1 20 -------------- 20,00
2 21 (0.33 )(21 )+(0.67)(20.00) 20.33
3 21 (0.33 )(21 )+(0.67)(20.33) 20,55
4 20 (0.33 )(20)+(0.67)(20.55) 20,36
5 22 (0.33 )(22)+(0.67)(20.36) 20,90
6 22 (0,33 )(22)+(0.67)(20.90) 21.26
7 21 (0.33 )(21 )+(0.6:7)(21.26) 21.17
8 23 (0.33 )(23 )+(0.67)(21.17) 21. 77
9 24 (0.33 )(24 )+(0.67)(21. 77) 22.50
10 24 (0.33 )(24 )+(0.67)(22.50) 22.99
11 25 (0.33 )(25)+(0.67)(22.99) 23.65
• 12
13
14
15
27
24
23
25
(0.33 )(27)+(0.67)(23 .65)
(0,33 )(24 )+(0.67)(24.75)
(0.33 )(23 )+(0.67)(24.50)
(0,33 )(25)+(0.67)(24,00)
24.75
24.50
24,00
24,33
COMPARING DATA:
In 1985, Plainville had 487 residential burglaries. The year before. 1984.
they hafi 319, The Chief of Plainville's Police Department wants a
comparison of 1985's residential burglaries with 1984's. The Department's
crime analyst identified the object data to be 1985's total of 487 and [he
220
reference data to be:: 1984's total of 319. (The analyst must listen closely
to requests for comparison. If, for some obscure reason, it were requested
that 1984 be compared to 1985, the result would be quite different).
Having correctly identified the object data and the reference data,
Plainville's crime analyst simply "plugged" the values into the above
equation and got:
These figures reflect a change of 34% from 1984 to 1985 and the "_" sign
indicates a decrease in the object data when compared to the reference
data. Remember that the key is accurate identification of the object data
and the reference data. The computation is straightfor:ward, giving both
the magnitude and direction of change.
RATES:
# OF RESIDENTIAL #OF
YEAR BURGLARIES RESIDENCES
221
Comparing the number of residential burglaries in 1987 with the number
in 1986 gives us:
And comparing the number of residences that could have been burglarized
gives us:
(14,739 - 11,149) / (11,149) x 100% = +32%
And it would appear that we have cc,ntradictory results. On the one hand.
the absolute number of residential burglaries increased 6% from 1986 to
1987. On the other hand, the rate of residential burglary (chance of any
individual residence being burglarized) decreased 20%. Which result to
give? Both! Your job as departmental crime analyst is to provide
completed work. Both answers are correct, and completed work demands
that you provide both numbers. Presentation and use of these values is
not the analyst's job.
222
INDEXES:
~
Note that we have not changed any relationship. All we have done is
change a rate (which is a measure per unit-in this case, 0.28) to an index
(which is a measure per chosen number of units-in this case, 100). You
may choose any multiplier; the index, however, must stipulate the --:hoice
(as shown in our example).
Now suppose you want to compare your agency's index of some crime with
that for the state. If your jurisdiction had 1.3 homicides per 1000
population and the state's index was 104.5 per 100,000 population, you
would convert both indices to a common homicide rate.
The procedure for indexing involves finding the smallest number which.
when used as a multiplier of both the numerator and the denominator,
wi'll produce a whole number in the numerator. Your community has a
homicide rate of 1.3/1000 (0.0013 homicides per person) and the state
reports a homicide rate of 104.5/100,000 (0.0010 homicides per person).
From a rate point of view, your jurisdiction has a greater homicide
problem than the state. Specifically, your community's rate compared to
the state's rate is:
This means that your rate is 30% greater than the state's.
223
of the community's rate of homicide, a rate 23% less than your
community's.
Most state and Federal crime statistics are based on 100,000. Using
100,000 for a community whose population is 15,000 does not help you
communicate to your constituents, however. Remember, keep the index as
small as possible in order to generate whole numbers in the numerator. It
is all right to have a decimal in the numerator (e.g., 4.8, 6.2. etc.). Just
keep in mind that an effective index contains whole numbers .
224
CHAPTER 14
ANAL YZING PA 1TERNS OF TIME
"
~ALYZING PAUERNS OF TIME
If a time pattern can be discerned for past crimes (in a series), then
criminals involved with that crime series may continue following the same
time pattern. Time patterns fall into two general categories: exact time
patterns. and time interval patterns. Exact time crimes are those in which
law enforcement is advised as to the exact time that a crime occurred.
Crimes such as rape or robbery are usually exact time crimes.
Burglary and auto the.ft are typical examples of time interval crimes. The
victim is unaware of his loss until sometime after the crime occurred. A
citizen parks his vehicle at 2300 hours and retires for the evening. At
0800 hours the next day, the citizen returns to his cat' and finds his stereo
radio stolen. The crime occurred sometime (time interval) between 2300
and 0800 hours. but the exact time of the theft is unknown.
The procedure for identifying the time pattern or exact time crimes that do
not wrap around midnight consists of the following steps:
(4) Subtract the standard deviation from the arithmetic mean, and
convert that time to the format of a 24-hour clock. Add the
standard deviation to the arithmetic mean, and convert that
time to the format of a 24-hour clock. These two times form
the boundaries of the time period in which 68% of the crimes
have occurred and are likely to occur.
(5) Subtract two times the standard deviation from the arithmetic
mean and convert the result to the format of a 24-hour clock.
Add two times the standard deviation to the arithmetic mean
226
and convert the result to the clock. These two values form the
boundaries of the time period in which 95% of the crimes have
occurred and are likely to occur.
Following Step (2) requires calculation of the arithmetic mean which in this
case is 13.50 + 14.25 + 11.00 + 12.00 + 13.00 + 15.75 + 16.50 + 10.00 / 8 =
Step (4) combines the result from Step (2) with one standard deviation
[calculated in Step (3)]. The result gives us the 68% probability period.
which is:
13.25 +/- 2.24 hours
227
------------------
,e Step (5) results in the 95% probability period (two standard deviations),
which is:
13.25 +/- 4.48 hours (Note: 2.24 X 2 = 4.48)
Assume that we are analyzing a series of crimes that have occurred at the
following times:
Step (2) calls for the arithmetic average which, in this case is:
(23+1+2+22)/4
Create a continuum of time so that we can use our statistical tools. 0100 is
an hour after 2400 hours, so we convert 0100 to 2500 hours. If a crime in
our series occurred at 0230, we would 'first convert the time to its decimal
equivalent (2.50) and then convert it once more by adding 2400; the fully
converted time is 26.50.
228
Remember our original times:
Suppose you had a series of crimes that occurred at ~,he following times:
The sum of the times represented in this final conversion is 155.16 which,
when divided by 6 (the number of data points), gives us the arithmetic
average of:
25.86
229
Finally, let's use our conversion together with the five basic steps for
determining the time spread of a crime series. The following series of
times represents the times of occurrence of seven crimes:
• Step (3):
24.79 (2447 hours, or 0047 hours)
23.70 to 25.88
22.62 to 26.96
230
TIME SPAN CRIMES:
Time span crimes are crimes in which the exact time of the crime is
unknown, but the time span during which the event occurred is known.
Examples of time span crimes are burglary and auto theft. In both types
of crime, the victim left a premise or a vehicle at a known time, returned
to it at a known time, and found that between leaving and returning (the
time span), a crime had been committed.
Studying time span crimes draws the analyst into that fuzzy world where
experience means as much as knowledge of analytical procedures. Three
methods for handling time spans will be discussed; the strengths and
weaknesses of each method will be presented. Before getting into methods
of time span crime analysis, however, it is essential that the reader
understand that each of the following techniques works when the time
span is no greater than 24 hours. For time spans exceeding 24 hours, no
method has yet been found that will provide a practical solution.
231
·e
Crime Report
Number Date Span Time Span
1 4/22 0900-1400
2 5/05 0845-1600
3 5/06 0800-1715
4 5/06 0745-1720
5 5/15 1130-1200
6 5/17 1400-1600
7 5/16-5/18 1200-0800
8 5/18 1245-1345
9 5/19 1345·1630
Crime report #2 shows an initial time of 0845 and an ending rime of 1600.
The respective decimal equivalents of these times are 8.75 ·and 16.00 and
the difference between them is 7.25. When 7.25 is divided by 2, we get
3.625 which, when added to the initial time (8.75), places the mid-point at
12.375 (or 1223 hours).
Finally, let's look at crime report 117. Here we see that the time span is
greater than 24 hours. We will ignore this crime report (as mentioned
earlier) and consider that we are dealing with 8-instead of 9--crimes in
the pattern.
When we have calculated all mid-points, our table looks like this:
232
8 5/18 1245-1345 1325 13.250
9 5/19 1345-1630 1508 15.125
Each time span crime has a beginning and an ending time. The equal
opportunity method assigns one point (a value of 1) for each hour (or part
of an hour) defined by the time interval. The total number of points per
hour per day are then calculated; the grand total of all points is also
determined. Dividing the total of each hour by the grand total (and
multiplying by 100%) will result in the percentage (or probability) of each
hour that the series of crimes could have occurred.
The major advantagc~ of this technique is that it works well for a wide
range of time spans. Moreover, the technique produces an easily
interpreted graph. A crime that could only have occurred within one hour
is assigned i point to that hour while a crime that could have occurred
anytime within a 24-hour period will also be assigned 1 point during the
same hour.
(1) For each crime, determine the hellfs in which the crime could
have occurred. A partial hour counts as a full hour. To each of
these hours, assign a point, a value of 1.
233
(2) Total the number of points that fall during each hour of the
day.
(5) Plot the results of Step (4) as a bar graph. Plot these data with
hour of the day on the horizontal axis and percentage on the
vertical axis.
(6) Examine the bar graph. 'Identify the peale hour(s) and move
away from this hour along the graph in both directions,
totalling percentages as you go.
o( 7) The hours you select represent your time span. Related total
To illustrate this process, let's use the same data we used previously:
Step (2): Total the points for each hour represented in the total span of all
reports:
0700-0759: 1
0800-0859: 3
0900-0959: 4
234
1000-1059: 4
1100-1159: 5
1200-1259 : 5
1300-1359: 6
1400-1459: 5
1500-1559: 5
1600-1659: 3
1700-1759: 2
43 points
Step (4): Determine and round the percentage of the total represented by
each hour. That is, divide each of the ~points in Step (2) by 43 and round
the result as follows:
See Figure 32
Steps (6) and (7): Determine time spans and probability of occurrences.
This is done by selecting any two intervals and adding the percentages
between them. For example, there is a 62% probability that the crimes are
occurring from 1100 to 1600 hnurs. (Note the percentages listed above for
each hour between 1100 and 1600. When added together, we get 12% +
12% + 14% + 12% + 12% = 62%). Following the same process, we can
determine that there is a 27% probability that the crimes are occurring
between 0700 and 1100 hours.
e •
cnmGl~~zmo:um."
e
o N ~ Ol Q)
.... ..... .... N
o N ~ Ol OJ 0
OUUU-UU!>9-f-
m
~
:u
G')
:u
~
."
X
% ~
o Z
c: ~
N :!! :II r-
W
0\
..
IQ
•
C o-wi
o
-<
-e•n
rn
W ~
m
~
-< o
c:
~
r-
3:
rn
~
:r
o
o
2200-2259-4-
2300-2359
Tim~ Span Crimes .. Weiahted Method:
The weighted method assumes that each hour in the time interval has an
equal probability of being the hour during which the crime occurred. For
example, when the time span is 0100-0200, we know with certainty that
the crime took place during the one hour from 0100 to 0200, and assign
that hour a value of 1. When the time span is 0100-0400, the crime could
have occurred during any of the three one~hour periods defined by that
time-span: it could have occurred between 0100 and 0200, between 0200
and 0300, or between 0300 and 0400. Since the crime may have occurred
during any of the three one-hour periods defined, we assign a value of 1/3
to each of these periods. Once these values have be"n assigned for all
associated crimes in the series, total points for each hour of the day are
calculated, as is the grand total of points for the twenty-four hour period.
Percentages can then be calculated and graphed.
:,:
The weighted method works well for a wide range of time spans, and
allows the production of an easily interpretable graphic. In addition, the
method permits the analyst to estimate the probability of futun~
occurrences. One major drawback is that it amplifies the importance of
small time spans; an exact time receives a full value point for the hour of
the crime whereas the same hour will only receive 1/10th of a value point
in a 10 hour time span.
To illustrate the weighted procedure, let's return to the crime report data
we used earlier:
0900-1400 - There are five possible hours during which the crime
could have occurred. ~ssign 0.20 (l/5) value points to each hour;
0900 to 0959, 1000 to 1059, 1100 to 1159, 1200 to 1259, and 1300
'to 1359.
231
0800-1715 - Th~re are 10 possible hours in this time span. Assign
0.100 (1/10) each to 0800 to 0859, 0900 to 0959, and so on through
1600 to 1659.
Step (2): Total the points for each hour. (See Table A)
0700-0759: 0.090
0800-0859: 0.315
0900·0959: 0.515
1000·1059: 0.51.5
1100-1159: 1.515
1200-1259: 1.015
1300-1359:.. 1.265
1400-1459: 1.065
1500-1559: 1.065
1600-1659: 0.440
1700-1759: Q..190
7.990 Column Total
Step (3): Grand total of points for the rime period is 7.99 which. rounded.
is:
•
8 Points
(NOTE: Theoretically, the grand total win ways equal the number of cases
being analyzed. Since our total is 8 points and we are working with 8
cases-remember. one wa,s not considered-we know our calculation is
con:ect).
238
· .
r
TABLE A "'
Probability that crime occurred during a particular hour segment
HOUIt
0700- 0800- 0900- 1000- 1100- 1200- 1300- 1400- 1500- 1600- 1700-
t~T 0759 0859 0959 1059 1159 1259 1359 1459 1559 1659 1759
C.R.
1 0.2 0.2 0.2 0.2 0.2
TOTALS: 0.09 0.315 0.515 0.515 1.515 1.015 1.285 1.0S5 1.065 0.44
-
0.19
'"
239
Step (5): Graph the results.
See Figure 33
Steps (6) and (7): Select any two intervals of your choice and determine
the time spans and their combined probabilities:
MIXED DATA:
• (1) If most crimes are of the exact time type, use midpoint
analysis for the time span crimes and integrate the values
derived from them with those of exact-time crimes.
(2) If most crimes are of the time .. span type, use either one of .
the bar graph methods.
Crime analysts are often interested in the quick detection of patterns, and
frequently only have data for a week or a month upon which to base
analyses. Data from a small number of crimes can produce highly variable
results; one or two unusual cases can radically change the distribution of
;.!lcidents over time.
240
CJ)mG)> ..... zmO:Dm"1J
-4 ... -4 N
a N -'" m en
J
a
I
;
N
I
~
I
0>
I
(J)
I ,
a
0000-0059
f
0100-0159-L 1
II
0200-0259-i- i
0300-0359+
tI
0400-0459 !
1
!
I
CD
0500-0559 >
0600-0659 I :D
a
:D
0700-0759 »
"1J
0800-0859 %
%
o 0900-0959 »
c: Z
.-..
:!! 21 1000-1059 »
I~
N r-
o 1100-1159 -<
•
Co.) "C
»
1200-1259 --
U)
U)
".,
-< 1300-1359 •
~
I
1-400-1459
1500-1559 ~t:;:'.HI: : ..J; ';{·L?,"l ,: ~:/;I)·: :./;:·1 I -
m
a
1600 1659 .. ' ; . < . ' < .
- :l·;·''f!
~-":':;:::: .::.-: .' -;~ :'--"-,,:-::,: :.:' . -:--:.::: '! I I :t
-I
m
c
r:\S(· r I
1100-1759
1800-1859 I I I I I I 3:
m
.....
1900- 1959
2000-2059
1 I I I I I
:z:
0
C
2100-2159
2200-2259
2300-2359
I-
J
e e e
A minimum of 3S incidents is required to analyze the distribution of
crime over the seven days of a week (S incidents X 7 days = 3S incidents),
at least 60 incidents are required for time-of-day analyses (assuming 12
two-hour intervals per day X 5 incidents per interval = 60 incidents), and
at least 420 (60 incidents X 7 days) incidents are required to analyze time-
of-day distributions over all seven days in a week.
When there are too few incidents, a possible solution may be to reduce the
number of categories by combining two or more of the originai categories
into a single category. In a day-of-week analysis, for example. Friday and
Saturday could be combined into one category, and Tuesday and
Wednesday into another. This reduces the number of categories to five:
Sunday, Monday, Tuesday/Wednesday, Thursday and Friday/Saturday.
Then following the rule requiring 5 cases per category, the minimum of 35
cases for a sevenaday analysis would be reduced to 2S cases (S cases X 5
categories = 2S cases) for a "day" analysis. The analysis using fewer days
is less detailed and its subsequent conclusions more general. It would be
impossible to distinguish a crime occurring early Friday morning from one
,
occurring late Saturday night. If, however, all you have is a data set,
general conclusions are better than none. An analyst may be hard pressed
to defend the proposition that nothing can be done until the community
suffers more rapes or robberies. Remember that all analysis must be
accompanied by a statement of its limitations.
242
CHAPTER 15
ANAL YZING PA TTERNS OF LOCATION
I
ANALYZING PAUEBNS OF LOCATIO~
MAPPING TECHNIQUES:
Manual mapping techniques include pin maps, symbol maps, dot maps or
any other means for depicting crimes by location.
244
Map data should be stored so that it is easily retrieved. Pin maps can be
recorded by pbotograp1Jic means; using two ))fojectors to superimpose one
figure over another i" often effective. Color coded paper dots on ucetate
overlays of area 1!1apS facilitate data rec:overy for law enforc:ement
agencies whose access to equipment is limited. Computer produce,d and
coded area maps can be easily stored and retrieved by today's
microcomputer systems.
Seven is the minimum number of maps most crime analysis units should
maintain. Five crime types are well suited to geographical analysis:
burglary, robbery, special theft classifications, auto theft and sex crimes.
Two of these types (burglary and robb~ry) have logical sub classifications
(commercial and residential for burglary, and armed and unarmed for
robbery).
Three other informational maps have been found to be quite useful. One is
designed to suppon career criminal ~apprehension programs by mapping
the last known residences and specialties of known offenders. Another
supports narcotics operations by indicating locations of crack and crash
"pads", street corners where narcotics are sold and so on. A third map may
be used to depict locations where stolen propeny is "fenced". Communities
plagued by gang activities may find a map relating to gang "turfs" helpful
e
in deploying field resources, identifying criminal groups (and individuals),
and anticipating future inter-gang conflict. A department's ability to
"read" spray-painted graffiti provides the basic data for such maps.
GRAPHICAL ANALYSIS:
245
NUMBER OF BURGLARIES IY TYPE
-1RRRRRAAAAAR
1 VVVVVVV KEY
ecce
~AAAAAA R: RESIDENCE
2 VVVVVVV
CCCCCCCC V: VEHICLE
---iRAAAAAAAAAAAAAAA
C: COMMERCIAL
B 3 VVVV
cccc
E ~AAARAAR
4 VVVVVVV
cce
A
rAARAAARAA
T 5 -VVVVV
cccccc
II _rRAAAARAAA
6 VVVVVV
• 7
eccccccCC
_ _rAAAAARAA
VVVVV
eccc
r RAAA
13 VVVVVVVVVV
ecccccccc
~RARAR
9 VVVVVVV
CC
---iAAAAAARAAAAAA
10 VVVVVVVVVVVV
ccc
246
EXlmpl. of I Grlphlcil Anllysl. of the Pr.sent 8-Month P.rIOd Compared to the
Sam. Plrlod of thl Pravlous Yllr for Rilldlntlil Burgllrll •
..
180 • CURRENT YEAR
• PREVIOUS YEAR
en
<II
~
= 160
~
~
:=
=
-
.~
C
<II
140
"
u;
<II
a:
-...
0
CII
.c 120
E
:=
z
100
.
V ...........
~
~
Figure 35
247
area. This type of graphic can be used for other, shorter, time periods such
as month-to-month or by day-of-week.
Statistical analyses of crime information for geographic areas are useful for
determining where, and for what purpQse, tactical and special assignment
personnel (e.g., directed patrol operations) should be deployed. A
percentage analysis of purse snatchings and strong-armed robberies over a
one month period might indicate that a significant percentage of these
crimes were being committed in a restricted area. Such simple analysis
•
allows management to develop programs and assign personnel to impacted
areas for the purpose of suppressing crime and apprehending criminals.
The use of the standard deviation provides a more effective way to deploy
a directed operation. However, before we can use this powerful statistical
tool, we must convert conventional location data (street addresses) 'to
another form. To illustrate this need, let's assume that two crimes have
occurred: one at 123 Maple St. and the other at 456 Central Ave. The first
step in computing the standard deviation requirt!s that we compute the
arithmetic mean of the basic data. What is the arithmetic mean of 123
Maple and 456 Central? If you answered that you don't know, you are in
complete agreement with Messrs. Gottlieb and Arenberg, the authors of
248
this book. We do nOt know either. What is required is a method for
convening street addresses, such as our Maple and Central examples, into
numeric form where such concepts as an arithmetic mean make sense.
This is done through the use of a grid system.
Figure 37 is the same map, with one addition. Note that a pair of axes
have been added, one labelled "North", and the other, "East". All axes are
located such that the area being analyzed lies to the right of the "North"
axis and above the "East" axis. It does not matter where the axes cross,
except that the area under consideration must be in the northeast
quadrant. If the area under analysis were a beach community on the
Pacific Ocean, the "North" and "East" "axes would intercert somewhere at
sea. Note that each axis in Figure 37 has been scaled into intervals of 5.
With this set of axes, actually an abbreviated form of a grid system, we can
convert each of our crime locations into a pair of numbers. Converting the
locations shown in Figure 37 to their respective grid locations, we get:
249
• 3 .10
.7 • 1
• • 2
• 9
Flgur. 36
'---------
250
NORTH
40
35 • 4
30 .8 .10
25
• 5 .7 .1
20 • 2
.e ~
••
15
10
-'
o +----+----+---I----4---=~·.....!:=::;::::===:.-_I1 EAST
o 5 10 15 20 25 30 35
Figure 37
251
Let's start with the East coordinates:
• value). This rectangle now represents the geographic area in which 68% of
the crimes (one standard deviation) have occurred. If the criminal
continues this pattern, we may predict (with 68% certainty) that the
criminal will commit his next crime within rectangle ABCD. . If we were to
doublr! the distance from point "X" along all sides of the rectangle, we
would expand the rectangle to include 95% of the expected area of the next
occurrence (two standard deviations).
252
NORTH
40
35 • 4
e10
8
30 e
X • 1
25
• 5
-7
es
20 e 2
e9
15
10
o +------4------4------4------4---~~~--~~~~~EAST
o 5 10 15 20 25 30 35
253
CHAPTER 16
RELATIONS AND PREDICTIONS
,
-- ~~--~-- ----
We have long accepted the concept of "cause and effect"; do one thing and
something else will occur. Sometimes the result of a cause is a surprise,
such as the side effects of some medicine. Other times, we take a specific
action (the cause) to create a specific result (the effect). Often the cause is
controllable and, if the result is favorable, we continue; if not, we cease.
Such relationships are often of considerable interest to law enforcement
and we measure one factor (a cause) in order to determine another (the
result). We might count the number of neighborhood watch programs
operating and assume that the more programs we have in effect, the less
burglaries we will have. We might expect that the number of assaults in a
parking lot would decrease if lighting were improved. Or we might look to
another community's changes in crime after a particular action has been
taken, such as the building of a regional shopping c~nter.
• variables.
Suppose you were asked to guess the quantity of loot burgla,;zed knowing
only the shoe size of the burglar. Chances are Shoe size alone will tell you
nothing about the quantity stolen; there is generally no relationship
255
between these two variables. Such a condition would be indicated by a
correlation coefficient of zero. If, however t you were given thirty pairs of
shoes and were asked to guess the size of each right shoe from the
corresponding size of every left shoe, you would probably guess correctly.
In this case, the correlation coefficient would be +1.00 because the
relationship between left shoe size and right shoe size is generally a
perfect one.
256
THE SCATTER DIAGRAM:
Y: 5, 5.5, 6. 6.5
graphed on a bivariate format. these data would look like Figure 39. Note
that as X increases a given amount, Y increases a proportionate amount.
but the increments are of different size. The relationship is, therefore,
perfect and poshive and the plotted points lie in a straight line.
•
X: 1, 2, 3, 4
Y: 4.9, 5.7, 5.9, 6.6
Graphed, the data would look like Figure 40. The tendency for "Y" to
increase with an increase in "X" is clear, but increases do not progress unit
for unit. The plotted points fall near, but not exactly on, the straight line.
Although the relationship is positive, it is not perfect and the con'elation
coefficient would be less than 1.00.
257
y
6.5
5.5
':f o 1
I I
2
I
3 4
I
x
Flgur. 39
258
v
•
I I I I I IX
o 1 2 3 4 5 6
Figur. 40
259
y
Figure 41
260
y
®
® ® ®
® ®
® ® ®
®
®
• ® ®
®
®
®
x
Figure 42
261
v
® ®
® ®
® ®
®
® ®
® ®
®
® ®
® ® ®
® ® ®
® ®
®
X
Figure 43
.262
manual or to recoanize :i correlation coefficient when it shows up on your
computer screen. The following are luidelines for interpreting the
meanin, of "r":
-1.00 perfect negative correlation
-0.800 to -0.999 strona negative correlation
-0.600 to -0.799 high negative correlation
-0.400 to -0.599 moderate negative correlation
-0.200 to -0.399 weak negative correlation
0.00 to -0.199 . negligible negative correlation
0.00 to +0.199 negligible positive correlation
+0.200 to +0.399 weak· 'positive correlation
+0.400 to +0.599 moderate positive correlation
+0.600 to +0.799 high positive correlation
+0.800 to +0.999 strong positive correlation
+1.00 perfect posi ti:ve correlation
Cautionary Note:
•
change in one variable causes or is "caused" by a change in the other
variable. Correlation analysis cannot determine cause and effect. If we
were to show that a strong correlation existed between a cadet's standing
in his academy class and the number of speeders he cites five years later.
we are not indicating that one caused the other. We are simply observing
the relationship between two 'Y>ariables. If the cause and effect does exist.
it will take more sophisticated analysis to clearly demonstrate that
relationship. Don't fall into the cause-and-effect trap!
LINEAR PREDICTIONS:
All straight lines ~re defined by two parameters: slope and the Y-axis
intercept. Turn now to Figure 44. The slope is defined as the unit change
in "Y" indicated by a unit change in "X". Statistical texts often refer to the
slope by the letter "rn". Every straight line, if drawn sufficiently long. will
263
y
Change In Y
Chang. In X
Change In Y
Change In X
= slope, m
Y-axis Intercept, b
~----------------------------------------------- X
Basic Characteristics of a Straight Line
Figure 44
264
intercept the Y-axis. The point at which this occurs is referred to as "b".
The equation that determines these values is:
Y=mX+b
If the line goes downhill, "mPl will be negative. If the line intersects the y.
axis below the X-axis, "b" will also be negative. And of course, "m" and lib"
can be of different algebraic signs: use the algebraic sign your calculations
indicate.
Crime analysts are often asked to predict future occurrences on the basis
of past and current data. To apply the information given above to a "real
world" situation, assume that it is February 1989 and your Chief is
considering launching a new burglary prevention program. If he proceeds
with the project, the Chief estimates that it will be six months (August
1989) before program results can be adequately determine~.
Bo!fore he makes his final decision on the endeavor, the Chief requests you
provide him with a prediction of how many burglaries are likely to occur
six months from now if he dots not implement the program. Your
February 4S
March 60
April 65
May 80
June 7S
July 95
August 90
265
September 1 120
October 110
Since statistics deal with numbers, we must now convert the name of each
month to a number. Since February is the second month of the year. for
the sake of convenience, we will give it the number 2. March will be 3, etc.
Having done that. we will redesign the above table. Months will be listed
in an ttX" column and burglaries will be listed in a tty" column as shown
below:
x y
2 45
3 60
4 65
5 80
6 75
7 95
8 90
9 120
10 110
The first thing. you would do is plot the data as a bivariate graph. See
Figure 45. Note that the data have an uphill trend. Working with a
statistical calculator or statistical computer software, you would now enter
the data from the X and Y columns into the calculator or computer and
calculate the slope "m" and the Y-intercept "b". Your calculator or
computer should reveal that:
m = +8.4
and
b =+31.7
These numbers, when substituted into the equation
Y=mX+b
will give you
Y = 8.4X + 31.7
To plot your line, find 31.7 on the Y-axis and make a point. From this
point go one unit to the right and then go up 8.4 units and make a point.
Draw a line through the two points you just made; the resulting line i~ the
266
"LEAST SQUARES" FIT
Y This Line's cllcullted by the equltlon:
120
Y =8.4X + 31.8' . •
100
80
•
60
40
20
~--+---~--~~--~---+--~--~--~I~ X
o 1 2 3 4 5 7 8 9 10
Figure 45
.e
267
line of best fit. Note: if "m" (+31.7 in this case) had been negative, you
would have moved right one unit and then down 8.4 units.
You now know how to use the "line of best fit" for predictive purposes. At
this point you are ready to make your prediction as to the number of
burglaries that are likely to occur in August 1989.
Recall that your table ended with the data from October 1988. This was
month 10. It is now February 1989. If the table was to continue,
February would be month 14. August 1989, the subject of your interest,
would be month 20. Since you wish to know how many burglaries C'Y")
are likely to o'ccur in August, you must. substitute the number 20 for "X" in
the equation as shown below:
Y = 168"t 31.7
Y = 199.7
A note of caution: a line of "best fit" can be constructed from any data, but
the line does not a.lways predict well for many law enforcement
applications. If the correlation coefficient, "r", you calculated falls between
-0.600 and +0.600, do not use linear projection-the correlation will
probably be too weak to use for predictions. Linear projection is best used
when fIr" is +.8 or higher or -.8 Oi' lower. When "r" is between +.8 and -.8,
predictive equations other than linear should be considered. Further
discussion of these other equatiokls exceed the scope of this book. Readers
are encouraged to obtain a commercial text or software package that
explains their calculation and function.
RANGE OF ESTIMATE:
You will note that only one of the original data points in Figure 45 falls on
the line of best fit. Some are above the line, others below. Your calculation
for "Y", in the above example, 200 cases, will fall on the line because you
268
calculated it to fall on the line. But don't forget-it's only a prediction.
However, there is no reason to believe that for X=20, the actual value for
"Y" will fall on the line. The actual value of "Y" will not be known until
sometime in the future and it may vary from what you predicted it to be.
All predictions are merely "educated" guesses, based on acceptable
statistical procedures. No statistically-based prediction will be, nor should
it be expected to be, exact, and the analyst must have some method for
determining over what range his or her estimate will fall.
ABSOLUTE DIFFERENCE
BElWEEN CURRENT AND
•
X Y PREVIOUS VALUE OF Y
2 45
3 60 15 (60-45 = 15 )
4 65 5 (65-60 = 5)
5 80 15 etc.
6 75 5
7 95 20
8 90 5
9 120 30
10 110 --LQ
105 Column Total
Values in the difference column were found by subtracting successi ve
values of "Y" from each other; all. algebraic signs are ignored. The average
of the differences in this example is:
105/8 = 13.125
Our actual forecast of "Y" when X = 20 is 199.7 (from our equation for the
line of best fit), +/- 13.125. The value of "Y" we would expect when X=20
would lie somewhere between 186.68 and 212.93, and we would be 509',
confident that our estimate was correct. The 50% indicates that our
269
computations were based on the mean average as calculated 10 Step 2
above.
All of the methods necessary to carry out the various steps of Seasonal
Averaging - Method (2) presented below were covered in Chapter 12.
JAN 50 65 75
FEB 45 70 80
MAR 55 65 70
APR 55 80 75
MAY 65 85 90
JUN 70 95 100
JUL 80 110 120
AUG 75 100 125
SEP 60 90 110
ocr 65 75 90
NOV 65 85 95
I:H:: 75 90 100
270
Step 3: Calculate the seasonal adjustment f&ctor (SAF) for each
month by dividing the monthly mean by the grand mean.
The first three steps of Method 2 as, applied result in the following
table:
MEAN
AVERAGE SAF(*)
•
JAN 63 0.78
FEB 6S 0.80
MAR 63 0.78
APR 70 0.86
•
MAY 80 0.99
JUN 88 1.09
JUL 103 1.27
AUG 100 1.23
SEP 87 1.07
ocr 77 0.95
NOV 82 1.01
I:JI: 88 1.09
271
•
Step 4 results in the following:
JAN 64 83 96
FEB 56 88 100
MAR 71 83 90
APR 64 93 87
MAY 66 86 91
JUN 64 87 92
JUL 63 87 94
AUG 61 81 102
SEP 56 84 103
OCT 68 79 95
NOV 64 84 94
r:a: 69 83 92
Y=mX+b
Y = 1.1X + 60.8
273
CHAPTER 17
ON CALCULATORS AND SOFTWARE
I
ON CALCULATORS AND SOFIWARE
CALCULATORS:
COMPUTER SOFTWARE:
SYSTAT Inc.
1800 Sherman Avenue
Evanston, Illinois 60201
(312) 864-5670
275
documentation supplied with the package is purported to be excellent. For
additional information contact:
SPSS Inc.
444 N. Michigan A venue
Chicago, Illinois 60611
(312) 329-3500
STSC Inc.
2115 E. Jefferson Street
Rockville, Maryland 20852
(800) 592-0050
BRAINPOWER Inc.
24009 Ventura Boulevard, Suite 250
Calabasas, California 91302
(818) 707-1712
276
As mentioned earlier, these are only a few of the many statistical software
packages which are available. If you have the opportunity to do so, try
before you buy. We suggest, however, that belo re you make a
considerable investment in statistical software, you purchase an electronic
calculator that has been configured to handle basic statistical computations.
We have found that use of such a tool is a cost-effective way to get a good
"feel" for statistical calculations, and an excellent method for identifying
your needs before you select a software package for your computer.
277
BIBLIOGRAPHY
,
BIBLIOGRAPHY
Berge, C., Theory of Graphs and its Applications, John Wiley & Sons,
New York, 1962.
Brown, Dale K., Callin.g the Police: Citizen Reporting of Serious Crime,
National Institute of Justice, 1984.
279
Grassie, R. O. and Hollister, J. A., A Preliminary Guideline Manual for
Patrol Operations Analysis, Integrated Criminal Apprehension
Program, U. S. Department of Justice, 1977.
Luce, R. D. and Raiffa, H., Games and Decisions, John Wiley & Sons,
New York, 1958.
280
Slonim, M. J., Sampling in a Nutshell, Simon and Schuster, New York,
1960.
281
APPENDIX
-
CAREER CRIMINAL IDENTIFICATION WORKSHEET
STANISLAUS COUNTY SHERIFF'S DEPARTMENT
S/OIO#_:_______________c , n # : - - - - - - - - - - - - - - - -
2. ______________________________________________
3. ______________________________________________
e--------~--------·-------------------
PREPARED BY: SOURCE: S/O Fll..ES _ _ _ _ _ __
en mSTORY __________
DA FILES _ _ _ _ _ __
cc: CRIME ANALYSIS UNIT
282
DATE 08-16-88 BULLETIN: 88-0002
NAME/AKA'S: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
DESCruwnON: _______________________________________________________________________________
ADDRESSES:
OTHER: ________________________________________________________________________________
DETAILS: ____________________
___________________________________________________________________________________
C
A
U
~
O
:
PAROLE~O: ______________________________________________________________________________________________________
PROBATION: YES NO
SUBMITTED BY: - - - - - - - - DETAIL: _ _ _ _ _ PHONE: -----e
'··:,:::t::::::?:,:;:::,,;:i.[:::i:;::;:,/:(3@NEIDENooIAtt:;;::;g:;;,t1S!4Vl :·ENEGRGEMEN01};::cISE·::(jNL¥:;.):i:irr:::tJ;:':::·:::;:::\i\·1
JIM TREVENA SHERIFF-CORONER PO BOX 858, MODESTO, CALIFORNIA 95353
STANISLAUS COUNfY SHERIFFS DEPARTMENT
CRIME ANALYSIS UNIT
I 1.
W ANTED PERSONS BULLETIN J
WAWLrIE!D) CO>W A WArn.rn.AW~
DATE ~~ BULLETIN:
NAME CHARGES
AKA REPORT #
SOC SEC #
FBI#! Cll#
•
DL# STATE
VEI-UCLE
RIO
AREASOFACTIVlTY
DETM~: ______________________________________________
CAU INFO: _ _ _ _ _ _ _ _ _ _ _ _ ,_ _ _ _ _ _ _ _ _ _ _ _ _ __
PAROLE INFO: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
PROBATION: YES, _ _ NO_ _
SUBMITrED BY~ _ _ _ _ _ _ _ _ DETAll..: _ _ _ _ _ _ PHONE: _ _ _ __
•• OVER ••
••••••••••••••••••••••••••••••••••••••••••••••••••••••
sUBmcrsNAMrn: _________________________
REGARDING WPB#: _ _ __ Fll...E#: _ _ __
CHECK CURRENT STATUS;
,
ARRESTED - CANCEL WPB
BOL CANCELLATION DATE _ __
ARREST DATE AGENCY/AUTHORITY
NAME~ _________________~_C~GE-------------------
AKA __________________
~ORT#
SOC SEC#_ _ _ _ _ _ _ __
FBI# _ _ _ _ Cll# _ _ _ _ __
VEHICLE _ _ _ _ _ _ _ __
WO __________________
AREAS OF ACI'IVITY - - - - - -
CAU INFO: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
PAROLE INFO: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
PROBATION: YES_ NO_
SUBMIITED BY: _ _ _ _ _ _ _ DETAIL: _ _ _ _ _ PHONE: - - - - _ . _
M
HGT S' S" WGT -ill HAIR l!.BJi. EYES BEN ADDRESS(S) 2431 SYLVAN RD #3
MODESTO
DETAILS: ON 04-18-88. susPgCT HODGE ALONG WITH N'lOTIfER SUSPEcr RICHARD AN-
THONY SILER. WHO IS IN CUSTODY. TOOK A FEMALE TO T.I.D. LAT. #2 NEAR IEGNAR RD.
\VHERE BOTH SUSPEcrS RAPED HER.
SUSPECT HODGE KNOWS HE IS WANTED AND WILL RUN
e
I
88-31646 370 E. BStreet 12-13 2310 Tue Pry Kitchen Window Screen
88-30762 1298 N. 8th Street 12-03 1450 Sat Adlitted by occupant (88 YOAI
88-32712 1270 N. 8th Street 12-26 1835 ~on Unlocked rear door
1. H/M/A 35 YOA 509 160 Bro Bro LSW Levis, Blu pleid shirt
blue ski caD.
2. W/M/A 30's 508 220 Bro Hair LSW tan-kheki pants, jacket
dark beanie.
3. H/M/? 505 165 Blk hair, NFD
Notity the Crime Analysis Unit it eny errests result from this
Crime Pattern Bulletin.
COLTON POLICE DEPARTMENT
7 .:
~
"'Ii/.:
/ ,I / .~':.
I /
/
I
.-.
::
I I
• INFOR"ATION IN THIS BULLETIN 1$ TO ASSIST LAW ENFORCEnENT OFFICERS IN THEIR INVESTIGATIONS ONLY. ~ERSONS
A~~EARING HEREIN ARE NOT NECESSARIl.Y ASSOCIATED WITH OR ~ART OF ACRIniNAL ACTIVITY. UNLESS SPECIFICALLY
INDICATED, THERE ARE NO WANTS OR WARRANTS KNO~N AND ~ROBABLE CAUSE TO DETAIN "U5T BE DEVELOrED OM AN
INDIVIDUAL BASIS BY FIELD OffICERS.
LONG BEACH POLICE DEPARTMENT
BEAT 9
RESIDENTIAL BURGLARIES
• OCCURRENCE FACTS:
Most Common Time of Day: 2400-0759 hours (06.9%)
0800 1559 hours (48.3%)
a
• Single Occurrences
• Multiple Occurrences
L,.."i4
~~':
..'
BEAT 11
AUTO THEFTS
Beat 11 has a high number of auto burglaries (see previous CIB's) as well
as auto thefts each month. From January 22nd through February 11th,
there were 24 auto thefts. Toyotas and Chevrolets were the most common
vehicles stolen.
•
Sixty-two percent of the thefts occurred in the area around the Traffic
Circle and south to Anaheim Street. Two vehicles stolen elsewhere were
recovered at 4351 E. Willow and one was found at 5000 Airport Plaza
Drive. See pin map on page 2 for locations.
Two suspects were ar'rested and one of the arrests was by LASO-Carson.
OCCURRENCE FACTS:
Host COl1ll1on Time of Day: 2400-0759 hours (58.3%)
0800-1559 hours (20.8%)
1600-2359 hours (20.8%)
Host COl1ll1on Days of Week: Sun H2n ~ 1W1 IhY. .Ed.
254 2 5 2
.s.u
4
Vehicle Hakes: 20.8% Toyota (Celica Corolla, HR2)
t:
16.6% Chevrolet (Camaro, Citation)
12.5% Ford (PU)
12.5% Nissan (280ZX)
Suspects: None described
- 2 -
AUTO THEFTS
1/22 - 2/11/89
i&UtC"
e
~)
.. Single occurrence
~MultiPle occurrence
~ Recovered Vehicle
Per your request, a detailed area analysis was conducted In Beats 3 and 4. All crimes between 1986 and 1988 were
retrieved, graphed and examined. Included in this report is an analysis of the CFS from May 1986 to May 1987 and an
arrest analysis of narcotics in beats 3 and 4.
The information was then correlated to Identify trend. for day of week and :by time of day and to identify the
t.:ausation of the rise of the crime activity in beats 3 and 4. In addition, targeted crimes, Ioc(itlons, and possible known
offenders were identified in the targeted areas. The following charts, graphs, and data will aid in developing a directed
patrol for your shift.
E~CUTIYE SUMMARY;
Since January 1, 1989, there was a tctal of 233 burglaries, of which 55%(128: cases) occurred in Beats 3 and 4. As
compared to the same tim a period in 1986. there was a total of 201 burglaries, of which 49%(98 cases) occurred in Beats
3 and 4. This represents a signnicant increase of 31% in the targeted area (Beat 3 & 4). OVerall, there is a 12-/. increase
of burglaries city-wide for 1988 and 1989.
As shown in below graphs, the annual average of city-wide burglary is 7% and'the targeted area is 17%. The city-wide
Part I crimes annual average is 13%. The targeted area had the highest aver.age with a 23% increase.
400200
600
500
100
300Ulm~_[R1T
o
1988 1987 1988 1989
LEI. CITY E:I BEAT 3 & 4 I
~ above graphs display a positive growth for each variable. However, Beats 3 and .. show a stronger growth because
. . . of ratio of 2 to 1. In essence, there are more burglaries and other part I crimes occurring in the targeted area. This
ivement is expected to continue through March 1989.
31
• the below graphs show the 1987 and the 1988 monthly pattern of the Part I crime activity for Beats 3 and 4. As indicated, there 'Nill be a
mild increase of activity during February and March in Seats 3 and 4. The Part I crime activity throughout the year (1989) will be active
and consistent.
80
70~-----------------------------------------------------------~~~
60
50r-~~----~~~·~~--'·~~~----~~~~~~~~~~~
40
30
20
10
O~----~--~~--~~--~----~--
BEAT 3
JAN FEB MAR APR MAY JUN
.... --~~--~-----.~--~--~~--~
JUL AUG SEP OCT NOV DEC
100~------------------~---------------------------------------~
8°~a:~ii~!t~~~~c=~;;~~~~~1
60l.E
40
20
o~--~~--~--~
JAN FEB MAR
.. --------~----~--~~--
APR MAY JUN JUL AUG
.. ----~--~~--
SEP OCT NOV
.. ~--~
DEC
The day of week pattern is different for each Beat. The number of cases in Beat 4 starts to increase on Thursday and
"eaks out on Saturday. The pattern in Beat 3 seems to be more constant and consistent because the 1987 pattern is very
simi/arto 1988. BEAT 4 • DAY OF WeEK BEAT 3 • CAY OF WEEK
100~.......~.......-r.......~..............~.......~.......~:.~ 160
140
80T-~==~~~_F--~~~==:T
120
6'0+--00+- 100
80
40
60
20 40
20
a 0
SUN MON TUE WED THU FRI SAT
2S00r-.....................--+-............................~--.....................~....................--~...........................~
2000
1S00
1000
SOO
o
SUN MON TUE WED THU FAI SAT
La P2 • P1
ihe priority 1 calls are consistent during the week; however the Prlor~y 2 calls start to increase on Friday and peak out on
Sunday.
32
The case activ~y by time of day for Beats 3 and 4 occurred during the same time period. Beat 3 had an activ~y of 54%
between 1800 and 0200 hrs and Beat 4 experienced a 47%. During this time spand, the yearly pattern of Beat 3 was not
consistent. At 1800 hrs, the 1987 movement (which was the highest peak) decreased moderately while the 1988 pattern
_ irJ:reased and peaked out at 0000 hrs. The time pattern for Beat 4 was consistent, but the growth rate in 1988 decreased .
. , Mo're importantly, the time pattern for both beats are similar because the volume of the case activity are w~hin the time
c:lrameters.
100~--~----~--~----~----~~"~~~---'~~~----~~
90
B 80
E 70
60
A 50
T 40
30
20
3 10
O~---4----~----~---4----~----+---~----~
160~---4----4---~~--~----~~~----~--~~~~----+-----,
B 140
E 120
A 100
T 80
60
40
20
O~--~----~----+---~----·~--------------------~--~~----I
08 10 12 14 18 18 20 22 00 02 04 06
2000r-__________________~~=====-6-1-%--C-F-S-A-c-tl-vl-tY-~----~~----__~
1800+---------------------+_~
1600+-________________ ~
1400+-----------~
1200 +----
1000
800
600
400
200
o
08 10 12 14 1S 1.~.
20 22 00 02 04 06
• CFS 1986-1987
_Further examination revealed that the time characteristic in beats 3 and 4 Is similar to the time pattern of Calls for Services.
I '5 shown in the above graph. the primary volume of priority 1 and 2 calls OCCUlTed between 1600 and 0200 hrs (61%). •
33
BEAT 4 • CRIME
160r----r----~--~--~~--~--~~---~--~
l'he crime composition in Beat 4 is shown 140~--~~~~--~--~~--~--~~--4_--~
on the right. As ~ be seen, 459R, GTA, 120+--...r
'd Theft from Vehicle are the primary 100f---...r
..rgeted crimes. This pattern has existed
80'-'--+
in both years. 459V has been developing
60f---...r
a positive growth rate.
40+---+
20
o
459C 459R 459V 211 GTA SHOP TVEH BIKE
I_ 1987 • 1988 I
BEAT 3· CRIME
I_ 1987 - 1988 1
PART I CRIME VS NARCOTIC ARRESTS 83 & B4
1986 1988
40u~-_----------__- - -__.....- - - - -__--.....-----------.....--------~400
35 350
300
25 250
200
150
10 100
50
o
1987 1988
I CJ'P1 . . 8 3 . 84 1
Further analysis indicated that a possible relationship exists between Part I crimes especially Residential burglary and
Narcotic arrests in Beats 3 and 4. As can be seen in the above graph, a negative trend of the narcotic arrests in Beats 3 ..
lind 4 started in 1986 and continued through 1988. In comparison, the Part I Crimes developed a positive trend in 1986 _
d continued to 1988. This growth maybe 2ttributed to the population increase and the demographic changes but
ddditional research indicated that a Ii.~rge majority of the Illegal chemical dependant Individuals that were arrested
had a case history of burglary.
34
CHiNO POLICE DEPARTMENT
INVESTIGATION • WEEKLY SUMMARY
CRIME AGAINST PROPERTY DATE: MAY 24,1989
_From May 23 to May 30, there was an Increase of 18% of the targeted crimes c~iwide as compared to the same time
• qriod last year. Beat 2 had the highest with 250%, but 57°/. was shoplifting. Beat 1 was second with 22%. Beat 3 and
had an ave~age decrease of 430/.. The most notable crime decrease was 459R. Beat 3 had a decrease of 100% and
Beat 4 experienced a 67-/. drop of 459R activity. In general, 459V had a strong growth citiwlde co"1'ared to last year.
During this CUrTent time period, the majority of crimes involved vehicles. This trend has been developing during the
past several months. We strongly recommend a Tactical Action Plan be implemented.
BEAT 1 BEAT 2
8?---~--~~~~--~-~_
7+---+--~~~~---+--+-
3 +--+--t- 6+---+---~~~~---+---+-
5+-~~-+--~--+-~~-+-
2 +--+-_p- 4+--~--~~~~--_+---+-
3+---+--+-
1 2 +--+--+---
1 +--+-
O+-_+---
459C 459R <459V GTA niFlV BIKE SHPLT T'I-FT <459C <459R <459V GTA THFTV BIKE SHPLT T'I-FT
BEAT 3 BEAT 4
5
4 +--+---+---+---+---+---+---+-~
3 +--~
2 +---+
o +----+
459C 459R <459V GTA lliFTV BIKE SHPLT T1-FT <459C <459R <45QV GTA 'Tl-FTV BIKE SHPLT T1-FT
INVESTIGATION BUREAU
WEEKL Y SUMMARY 5/23 - 5/30
81
459C 459R 459V GTA THFTV BIKE SHPlT THFT - . Ttl -/+ %
198~1 0 2 0 2 3 1 0 1 9
1989 1 2 3 2 3 0 0 0 11 22.2%
82
459C
198~1 0
459R
,0
459V
0 ,
GTA THFTV BIKE SHPLT THFT
3 0 2 0 6
1989 0 3 1 2 1 12 1 21 250.0%
83
459C 459R 459V GTA THFTV BIKE SHPLT THFT
198~l 52
1989
4
0
5 2 3 0 0 0 16
0 1 1 1 0 1 9 -43.8%
84
459C 459R 459V GTA THFTV BIKE SHPLT THFT
198~1 0 3 0 1 2 0 0 1 7
1989 0 1 1 0 0 1 0 1 4 -42.9%
TTL 459C 459R 459V GTA THFTV BIKE SHPLT THFT Glrtl
1988= 2 9 5 6 11 1 2 2 38
1989= 6 ..
• 7 4 6 3 12 3 45 18.4%
200'% -5-3% 40% -33% -45% 200% 500% 50%
, CURRENT TIME PERIOD: 45
459C 459R 459V GTA THFTV BIKE SHPLT THFT
13% 9% 16<1/<1 9% 13% 7% 27% 7%
SAN DIEGO COUNTY SHERIFF'S DEPARTMENT
POST O~FICE BOX 2991
SAN OIEOO. CALIFORNIA 92112
TELEPHONE (51!)) 495-5600
Page 1 of 2 pages
·- ..
CASES
Juris.
ES
Case *
89004456
Location
Pizza Hut
Time
~
Day
Tue
Date SusEects
37I1/89 I & 2
Vehic.
unk.
1856 E. Valley Py.
Escondido
SH 08928309 Pizza Hut 2359 Sat 3/25/89 1 & 2 '76
1463 W. Vista Way Brown
Vista Chev.
OC 89008984 Domino's Pizza 0012 Fri 4/14/89 1 & 3 Unk.
(Attempt) 545 S. vista Bella
Oceanside
OC 89009135 Domino's Pizza 2400 Sat 4/15/89 1 & 2 Unk.
545 S. Vista Bella
Oceanside
OC 89009911 Domino's Pizza 2350 Sat 4/22/89 1 Unk.
545 S. Vista Bella
Oceanside
ES 89008385 Pizza Hut 2325 Wed 5/17/89 1 Blue
1856 E. Valley Py. 2 Or
Escondido Chev.
SC 89-2642 Domino's Pizza 2320 Thu 5/25/89 1 & 3 Unk.
2241 El Camino Real
San Clemente
SH 08943734 Domino's Pizza' 2315 Tue 5/30/89 1 & 2 Unk.
1038 S. Mission
Fallbrook
SH 08943884 Domino's Pizza 2250 wed 5/31/89 1 & 2 Tan or
805 San Marcos Blvd. White
San Marcos Escort
SH 08943858 Domino's Pizza 2317 Wed 5/31/89 1 & 3 Unk.
603 Sycamore
Vista
Page 2 of 2 Pages
STANISLAUS COUNTY SHERIFF'S DEPARTMENT
CHILD ABDUCTION
ABDUCTED CHILD SUSPECT
MISSING JUV/RUNAWAY
3/18/S8. 1938 HRS, INC. 38S8
SUBJ: JESSe DUARTE, MM, 15 YAS. 5.081100,
BU<lBRO
oce: 13224 BENSON, BT. 2
AEF: ag·03·0638
---- ----
e
(
211 12027 CENTRAL AV
YUM YUM DONtrrS
8T.1
2143 SAT ~!18 MM. UNK AGE. SHRT S20 !NONES
BL.K COMBED BACK
HAIR. LT COLOR SKlICKT.
OK. PANTS. SUSP TOLD CLERK
HE HAD A GUN .t KNIFE. NO WPN
SEEN.
®f1
NAME:
AKA:
SEX: MALJ:
008: 03109/84
DESCRIP: HISPANIC. 5-111175. BROIBRO. TT'S··STEVEt.r LT ARM. 'BAD TO THE
BONE" LT CHEST. OLI N9682090. SSt 551·e1·2~i
OFFENSE: PC 459. HS 11350
PAR/AGNT: ~
PAROLED: 11/12/U
REStO:
VEH:
HIST/ARR: PC 4871148/135/4230/HS 11350
SPC/COND: ANTl·NARconc TESTING: REG HS t 1590
•• - SUBJECT IS NOT A PAROLEE.AT.LARGE 10-
OfFICER NO!!S;
;i** G I A V ! ••~*
6/01 6/08 6/15 TREND TTL
---.. --1-·. ------.......+/-
----1----......---..+/-
---- ---------------I---~---~-------
211:
•
1
1
1
I
• -
0 1
I •
I 0
• +/- IAvg
1---
1 1
y• -----
1 2
•1
GTA:
459R:
6 1
I
2
2
- 4 1 1
1
- 1
- 1 I 8
12
6
11
11 9
.8
459V:
5
1 :r 1
0 2 2
12
3
4~9C:
VTHrT: 1
2 1
0 \
1
0
2 1
1
1
I
1
2
- 1
1 I1 1
5 6 9
1
S
saPLT: 1I 0 - 1 1 1 1 \ 1 1 3 3
I
G/TTL: 16 I 7 9
1
1 6 1
\
I •
37 -29
**** DAY ****
6/01 6/08 6/15 TREND TTL
------1--------------- --------------- ---------------I---------~-----I---
I I' +/- • +/- • _~~: I~~~ • _!___ I_!_
211: 01 0 0 12 1 410
GTA: 1\ 3 2 1 -2 i 5 4 9\ S
459R: 4 1 s 1 2 - 3 1 15 9 lS 1 11
459V: 1\ 0 -1 0 12 3 3\ 1
459C: 01 1 1 0 -1 12 1 411
TarT: 21 1 -1 0 -1 14 4 913
saPLT: 11 3 2 3 16 8 717
~=-~ ___ 'l __....___.--___..,.____- _______ 1 1_
" D/TTL: 9 I 13 4 6 - 7 I -. 51 I 28
**** S W 1 N G ****
6/01 6/08 6/15 TREND TTL
------ ..--- ---~-----------
-----------+/- -------_....-- ........ Avg
---------------
I
• • +/-
• +/- • -----
y
•1
---
211:
GTA:
1
5
0
2
-3
-
1 0
4 2
3 2
8
1
11
9 11
459ft:
459V: 5
3 6
2
3
- 32
4 -2 4 2
16 4 16
10
13
6 9 11
459C: 0 2 2 7 4 7 4
-- 12
VTHrT: 1 7 6 13 9
SHPLT:
3
5 4 - 1 3 8 8
13
8
11
1
S/TTL:
............
22 17 -
••••••••••••••• .....
22
S
,
5
......... ................. -
•••
68 61
TOTAL: 47 37
-10 34 - 3 • •••••••••••••• ! 156 118
[WEEKLY SUMMARY ..JUNE 1989)
SHIFT; GBAYE
14~-----r----~~----~-----T------r-----~----~14
• WK3
12 12
~ WK2
10 10 m WK 1
B B "Y'
6 6
• 4
2 2
o 0
211 GTA 4S9A 45StV 45;C V/THFT SHPL.FT
Targeted Crime.
SHIEl; DAY
16~----~----~------~--F--~----~----~----~16
14 14 • WK3
[21 WK2
12~----~----~----~~----+------r----~----~12
·E!JWK1
10 10 "Y'
B B
6 6
4~~~~~~W-~-b~~---+
2 +---+-V
oL----Wtt~~LU~~~~l£2Z~1I~it~U o
211 aTA 4StR 45ft V 45tO V/THFT SHPLIFT
Targeted Crime.
SHIFT. SWINQ
18~----~----~----~~----~----~----~----~1B
16 16 II WK3
14 14 t2l WK2
12 12 £J WK 1
"Y'
10 10
8 8
6 6
4 ~
2 2
o 0
211 OTA 45tR 4StV 458C vrrHFT SHPLln
Targeted Crime.
INDEX
Ie
INDEX
A C
Calculator" 257, 263, 266, 272,
Abscissa, 188. 197 275, 277
Administrative crime analysis, Call screening, 116-117
1 2 -1 3 Calls for service, 114
Admissions of suspects, 54·55 alternative police responses to,
Arithmetic Mean, 204 116, 118
Arrest reports, 38, 51, 93 calculating response time to,
Arrest summaries, 76, 82 179-181
Automated information systems, 31, categories ot, 117
34, 139-159 graphing of, 191
and administrative services, response time to, 114-115,213
144-145 Calls for service records, contents of 52
and data analysis, 67-72, 139 Call prioritization, 9, 116-117 '
and data collati~>n, 60, 139 Career criminals, 8, 131, See a/so Habitual
and data retrieval, 139 criminals, Repeat offenders,
and decision-making, 31 Known offendars
and investigations, 145-146 Case clearance processes, 13, 18, 47,
and patrol operations, 142-144 55, 74, 137
and property sections, 148-149 Case correlation, 47, 74
and purchase considerations, 139 Case matching, 47, 74
and records divisions, 140-142 Case screening, 9, 133-134
and traffic bureaus, 146-148 Cause and effect, 255, 263
fears associated with, 163-164 CCAP,10
formats of requests for proposals Central tendency, 204
e to acquire, 149-159
needs assessments and, 139, 163
peripherals, 34-35. 39
CMange, 24, 168·170
resistance to, 23, 124, 161-171
Impact of, 47
statistical computations facilitated ·Check-Box· reports, 39, 49
by, 176
Citizen complaints, 83
Automated methods of crime analysis, 60-61 Civilian personnel, 31, 116-117, 124,
Averages, 204 164-166, See a/so Non-sworn
computation of, 204-208
personnel
moving, 216-220
Commission on Peace Officers Standards
seasonal, 213-216, 270-273 and Training (POST), 30
Commitment of executives, 23 124
B Committees, 24-26 '
Beat analyses, 6 Intradepartmental. 24
Bar Graphs, 188, 190 interdepartmental. 25
Bell-shaped curve, 213 Communication, 28, 33
example of, 212 Importance of, 28
Best fit, line of, 263, 268 Communications/dispatch, 25
Bimodal distributions, 206 Comparing data. 187, 220-224, 244, 245
Birmingham, Alabama, Police Department Computer(s). See Automated
117 ' Information systems
Bivariate graphs, 188, 195, 197-200 Conversion of data
257, 266 ' decimals to time. 227
Booking reports, 52 locations to numbers, 248-252
Brearcliffe, Daie, 226 time to decimals, 227
Briefing s'~ssions, 48, 165. See also Roll call Correlation analysis. 63, 255-273
Budgeting, 14, 19, 28, 50
Bulletins, types of, 76-77
Correlation coefficient, 255-256, 268 volunteer employment in, 96
cause and effect and, 255, 263 vs. records bureau, 14
computation of, 257 Crime analysts, 28
interpretation of, 263 desired skills of, 28, 32
CottO'l, Fred, 139 role in MCI process, 136-137
Crime analysis role in MPO process, 123
and citizen complaIns, 83 supervision of, 29
and crime prevention, 18, 73, 82-83 sworn vs. non-sworn, 31-32
and department planning, 19, 74 training of, 29
and deployment planning, 19 Crime calendars, 67
and investigations, 17 example of, 71
and resource allocation, 19 Crime indexes, calculation of, 223-224
and the budgeting process, 19 Crime, misclassification of, 50
and the case clearance process, 18 Crime pattern bulletins, 76, 79
applications of, 14-20 Crime patterns
as a police function, 7 data needed to determine, 185-186
automated methods of, 60-61, 67-72 definition of, 15
crimes applicable to, 61-62 identification of, 13-15, 64
data needed for, 57 methods of determining, 63,
defined, 12 65- 72
functions of, 13-14 types of, 63-65
history of, 6-10 Crime prevention, 13, 18, 25, 73, 74, 222
in England, 6 Crime prevention bulletins, 77, 82-83
manual methods of, 60, 65-67 Crime rate, calculation of, 221-222
overcoming resistance to, 161-171 Crime reports, 10, 38, 51
processes, 37-94 Crime series
statistics and, 174 data needed to determine, 185-186
to support police operations, 7 definition of, 15
types of, 12-13 identification of, 13-15, 64
Crime analysis products methods of determining, 63,
data needed to produce, 77 65-72
developmental considerations, 75, 77 Crime series bulletins, 76, 79
distribution techniques, 85-88, 93 Crime summary bulletins, 76, 80-81
"faxing" of, 88 Crime/suspect correlation process, 73
formats of, 77, 84-85 use of, 74
soliciting suggestions for, 166 Crime trends, 8, 13, 245
technical considerations in Criminal history information, 52
developing, 84-85 cautions in using, 52
types of, 76-84 Criminal Justice Newsletter, 35
use of graphs in, 85
video products, 87-88 D
Crime analysis unit, 24
Daily bulletins, 76, 78-79
centralized vs. decentralized, 30
Dallas, Texas, Police Department, 30-31, 187
development of, 28-35
Data
equipment and supplies, 33
combining catetories of, 242
evaluation of, 93-94
comparisons of, 187, 220-224
feedback requirements, 88-93
distributions, 183
hours of operation, 32
determining relationships between,
objective of, 28
195, 197
open door policy, 33
graphing of, 179, 188-202
organizational placement of, 28
grouped, 181-184, 190
phYSical placement of, 28
mixed, 240
responsibilities ()f, 7
object, 220-221
staffing of, 30
organizing, 179·184 method, 233-235
presentation of, 200, 202 Equipment. 33
quality of, 48 Estimate, range of, 268-270
quantity of, 240 Evaluation
range, 183 defined, 93
reference, 220·221 of crime analysis units, 93-94
reporting contradictory results in, of management of criminal
222 investigations program, 136
retrieval of, 62, 139 of volunteers, 107
skewed, 206 Evidence reports, contents of, 53
smoothing, 194·195 Exact time patterns, 226-230
specificity of, 62 around midnight, 228-230
uniqueness of, 187 mixed data and, 240
Data analysis, 63·74 not around midnight. 226-228
automated systems and, 139 Executive task ferce, 23
defined, 63 composition oil 23
methods of, 65·72 purpose of, 23
types of, 63 Exponential moving average, 216, 219-220
Data collation, 57·63 smoothing constant and, 219
automated systems and, 139
defined, 37 F
manual vs. automated
Federal Bureau of Investigation, 55
methods of, 60
Feedback, 88-93, 135
planning considerations, 62·63
and management of criminal
Data collection, 37-57
Investigations, 135-136
automated systems and, 139
defined, 88
defined, 37
formal methods of, 88-92
source documents for, 37
forms for, 88-91
Data dissemination, 74-77
defined, 74 Informal methods of, 92-93
formats for, 77 need for, 88
goals of, 75 questionnaires and, 92
Decimals, converting to time, 227 survey research and, 92
Field interview files, 60
Department of motor vehicles, 55
Dependent variables, 184, 188 Field Interview reports, 38, 51
Deployment planning, 14, 19 Field interview summaries, 76 82
File development process, 57-SO
Descriptive measures, 204
Descriptive statistics, 125 Files
Detroit Police Department, 114 methods to create, 60-61
planning considerations, 62
Differential Police Response Field
Test, 116 searching of, 63, 73.
Directed patiOl planning, 122 types of, 58-60
Directed patrol plans, 8, 48, 62, Forecasting crime, 13, 15-17, 213, 265,
73, 74, 83, 123 268, 269. See also Predictions and
Discrete variables, 190 relations
Dispatchers, 117, 118 cautions in, 73, 168
District attorney, 24, 25 goal of, 73
Doyle, Arthur Conan, 6 Frequency polygon, 191, 193·194
smoothed, 194, 195
"Dropping" high and low values 208
"Dropping" weeks, 217, 218 ' Frequency tables, 179-184, 190
E G
Equal opportunity time analysis Gang bulletins, 83
Geographic analyses, 244, 248·252
Geographic concentration Institute of Police Technology
patterns, 64,65 and Management, 30
Grand mean, computation of, 270 Integrated Criminal Apprehension
Grant funding, 10 concept, 8
Graphical analysis, 245-248 history, 7-8
Graphs, 85, 188-202 programs, 7, 8, 30
construction of, 188, 197 Intercept, slope and, 263, 265, 266
types of, 188-2Q2 International Association of Chiefs of
Grid systems, 249 Police, 30
Grouped data, 181-184, 190 Interpol, 55
Intervals, 181-184, 191, 194-195
H Interview information
as method of feedback, 92
Habit patterns, 6, 8
cautions in use of, 54-55
Habitual offenders, 8, 131. See a/so Career
of victims and offenders, 54
criminals, Known offenders,
Inverse relationships, 256
Repeat offenders
Investigation reports, contents of, 52
Histograms, 188, 191, 213
Investigations, 9, 131
Holmes, Sherlock, 6
and automated information
"Hot spots", 216
systems, 146
identification of, 200
monitoring of, 135-136
Investigative leads, 13, 17-18,47, 136
I
Independent variables, 184, 188, 191 K
Indexes, 223-224
Kansas City Response Time Analysis
Inferential statistics, 176
Information
Study, 9, 114
Known offenders. See Career
accuracy of, 49-50
criminals, Habitual offenders,
automated data systems, 56
Repeat offenders
California State Department of
Known offender bulletins, 76, 79-30
Finance, 56
Known offender files, 58, 60, 61, 74
control over the use of, 94
dissemination, 85-88, 167
external sources of, 55-57 L
formats for presentation of, 77 Law Enforcement Assistance
from California Bureau of AdminIstration, 8, 10, 12
Criminal Statistics, 56 Law Enforcement News, 35
from California Department Livermore, California, Police
of Justice, 56 Department, 226
from Department of Motor "Least squares fit", 263
Vehicles, 55 Linear Predictions, 263·270
from District attorney's office, 25 Line of best fit, 263, 268
from FBI, 55 Location patterns, analyses of, 244-253
from other police agencies, 26
from parole/probation, 25 M
from prisons, 26
from schools, 26
Mail In reports, 9
Management of criminal
internal sources of. 51-55
investigations, 9, 131-137
National Institute of Justice, 56
and case screening, 133
necessity to exchange, 23
and Continuing Investigations
other federal agencies, 56
Management Procedures, 134
reliability of, 48-49
and enhancement of police/
timeliness of, 48-49, 135
prosecutor relationships, 135
validity of, 50
history of, 131-132 methods of determining, 65·72
monitoring of the investigations Moving averages, 216·220
system and, 135-136
preliminary Investigation process N
and, 131
program elements of, 131 Narcotic bulletins, 83
purpose of, 131 Narcotic/sex registration forms, 51
resistance to, 134 Narrative reports, 39
National Crime Information Center (NCIC)
role of crime analyst in, 136-137 55 I
v
Variables
dependent, 184
determining relationships between,
195, 197, 255-256, 257, 263
independent, 184
Variance, 210, 211
Variation around the line, 270
Vehicle files, 58, 61
Victim profile analysis, 13, 17, 72·73
Video presentations, 87-88
Vollmer, August, 6·7
Volunteers, 96-111
background Investigations of, 107-108
duties of, 96
evaluation of, 107