Index
NOTE: An italicized f, ff, and t following a page number denotes a figure, multiple figures, and tables, respectively, on that page.
A
Actionable Mining model,
99–100
Algorithms
unsupervised learning,
169
Al Qaeda handbook,
38,
318
Analysis.
See also Link analysis sequential iterations of,
46–47
Analysis of Violent Crime, National Center
Analysts
operational personnel and,
22–24
Analytical stream, sample,
136f
Analytics, predictive,
28
Arrest-based crime reporting,
147
Assaults
robbery-related,
Automated classification techniques,
203
Automated motive determination,
203–205
B
Behavior
economic motive for crime,
207
effect of weather events on,
91
future, predictions about,
277
identification and analysis of a sample of,
similar, repeated identification of,
98–99
“Brute force” analytics,
28
Business understanding,
50
C
Calls for service data
challenges associated with analyzing,
81–82
citizen complaints, random gunfire,
80t–81t
Central Intelligence Agency
Intelligence Process models
analysis and production phase,
48–49
processing and exploitation phase,
48
CIA. See Central Intelligence Agency
CIA Intelligence Process model
compared to CRISP-DM process,
52t,
64f
Classification techniques, automated,
203
Clementine stream, sample,
136f
Clustering, Two-Step,
122
Clustering algorithms,
129f
Coalition Provisional Authority headquarters,
216f
Cold case investigation,
194
Collection modalities,
89
Composite crime indices,
148
Control-charting function,
182
Crime
benefits of analyzing, violent,
205
evaluation based on homicide rate,
149
fluctuation of patterns,
183,
218
probability by dispatch zone,
169,
171f
Crime control strategies,
146
Crime prevention, economical viewpoint,
153
Crime reporting, arrest-based,
147
Crimes. See also Assaults; Homicides; Violent crimes
associating to known suspects,
198–199
D.C. sniper investigation,
32–33
frequency, related to cash flow,
274
identifying frequent,
166
Laci Peterson disappearance,
32
nonadjudicated activity,
86–87
reduction, targeted approaches to,
31
specialized databases,
74–75
Criminal behavior. See Behavior
Criminals
CRISP-DM process
compared to CIA Intelligence process model,
52t,
64f
D
Data. See also Text data
accurately characterizing,
35–36
calls for service
(See Calls for service) continuous,
70
for risk and threat assessment,
227 spatial attributers
(See Trinity Sight
analytical model)
Databases
for case management,
72–73
Data mining
intuitive nature of,
23–25
web-based deployment,
168f
Data Mining Moratorium Act (2003),
25
Data mining tools
“black box,” 228
considerations based on needs,
33–34
data mining algorithms,
304
domain-specific tools,
319
for information-based operations,
45
specialty niche markets,
34
Decision making, group-based,
232–233
Defense Advanced Research Projects Agency (DARPA),
26,
232–233
Department of Defense, U.S.,
232
Deployment
of information over the Internet,
288
threat assessment of information,
294
Descriptive statistics definition,
Discriminant analysis learning algorithms,
122
Disraeli, Benjamin,
Distribution of complaints,
150f
Distributions, uneven,
9–11
DNA
cold hits, for sex crimes,
206
offenders identified by,
181
Southside Strangler case,
30–31
Documents, escalation,
99
Domain expertise
variable selection process,
59–60
Domain-specific tools,
319
Drive-by shootings. See Victims
Drug arrests, information map,
173f
Drug markets, illegal, 191
changing patterns and trends, 46
Drug-related violence. See Violence
E
Enterprise Miner analytical process,
136f
Enterprise miner analytical process,
136f
Errors in data entry,
83–85
Events
Evidence.
See also DNA evidence validity checks on,
87
Expert systems
F
Facility map with overlay,
170f
Fahrenheit temperature scale,
70
Federal Bureau of Investigation
National Center for the Analysis of Violent Crime,
210
Uniform Crime Reports,
13
Violent Crime Apprehension Program,
89
Firearms
assaults among drug sellers,
202
violent offenders and,
210
Functional interoperability,
318
Fusion of multiple resources,
56–57
Futures Markets Applied to Prediction (FutureMAP) program,
232–233
G
Generalizability vs accuracy,
14–17
Graphical representations, heat maps,
166
Gunfire
random complaints, hypothetical,
150,
150f
H
Hawaii Five-O (t.v. show),
194
Hierarchical organizational strategies,
97
Homicides
drug-related rule set for,
211
Southside Strangler case,
30–31
victim-perpetrator relationships,
196–197
Hostage siege and massacre, Nord-Ost Theater,
224
Human-Source Intelligence (HUMINT),
48
Huxley, Thomas Henry,
178
I
Illegal drug markets. See Drug markets, illegal
Imagery Intelligence (IMINT),
48
Improvement, indicators of,
85
Inferential statistics,
Information samples,
Injury
aggregate analysis of,
210
behavioral styles associated with risk,
35–36
Integrated surveillance analytical model,
305
Intelligence Process model, CIA,
47–49.
See also Models
International Association of Chiefs of Police,
40
Internet activity patterns,
295–296
Internet surveillance,
287
Interoperability, functional,
318
Investigative efficacy,
211
Iterative processes,
45–47
K
Kohonan network models,
125
L
Law enforcement officer safety, 36 predictive analytics, 28
Likelihood
false positives in infrequent events, 220 of risk,
215
identifying relationships in data,
119
Locations vulnerable to attack,
222
M
MARGIN. See Mid-Atlantic Regional Gang Investigators Network
Measurement and Signature Intelligence (MASINT),
48
Mid-Atlantic Regional Gang Investigators Network,
89
Minority Report (movie),
28
Misrepresentation
nonadjudicated crimes,
86–87
Models. See also Central Intelligence Agency, Intelligence Process models; specific models
in the applied setting,
60
drug-related homicides,
17–18
generalizability vs accuracy,
14–17
lack of a control group in,
221–222
overview,
revising and adjusting,
154
Motive determination, automated,
203–205
Motive determination model,
113
Motives
Multiple resources,
56–57
Murder. See Homicides
N
National Center for the Analysis of Violent Crime,
210
National Incident-Based Reporting System,
77
National Security in the Information Age,
319
Nature of the incident,
99–100
Network models, Kohonan,
125
New relationships within,
30–31
NIBRS. See National Incident-Based Reporting System
Nonobvious relationship analysis (NORA),
37–39
NORA. See Nonobvious relationship analysis (NORA)
Nord-Ost Theater hostage siege and massacre,
224
O
Open-Source Information (OSINT),
48
Operational limitations,
21
Operationally actionable output,
63
Operational personnel
“Outlaw lifestyle,” 205
Output
hostile surveillance activity,
231–232
operationally actionable,
63
P
Patterns
identifying changes in,
46
identifying patterns of,
207
Police deployment. See Deployment
Population, samples versus,
Population statistics,
12–13
Predictions
armed robbery escalation,
Predictive algorithms,
29
Prior probabilities,
Priors. See Prior probabilities
Property-related crimes,
181
Q
Quality-of-life increases,
72
R
Racial distribution,
12–13
Random assignment software procedures,
155
RECAP. See Regional Crime Analysis Program
Recoding
continuous information,
93
relevant preprocessing,
57–59
Records
management systems,
72–74
Regional Crime Analysis Program,
130,
182
Regional fusion centers,
89
Relationships, victim-perpetrator,
201
Request for analysis,
68–69
Risk-based deployment overview,
251–252
Risk-based deployment strategies,
45
Risk evaluation and mitigation,
215
ROI. See Return on investment
Rule induction models,
61
S
Samples
behavior,
population vs,
Schools
Self-generated databases,
74–76
Self-perpetuating cycle,
23,
23f
Signals Intelligence (SIGINT),
48
Signal-to-noise issues,
11
Situational awareness,
165
Software products. See Data mining tools
Southside Strangler case,
30–31
Spatial boundaries, delineation of,
306
Specialty niche markets,
34
Species-specific defense reactions,
190
SPSS and Information Builders,
169
SSDR. See Species-specific defense reactions
Statement analysis,
39–40
Statements, value of,
87–88
Statistics,
Strategic characterization,
220–222
Suicide bombers, profiles of,
220
Surveillance
identifying specific locations,
275–276
important aspect of detection,
232
risk and threat assessment,
219–220
techniques in crime analysis,
268–269
Suspects
Syndromic surveillance,
303
T
Television station KXTV,
32
Terrorism
Chechen attack on a school,
224
deployment of information,
288
geographically distinct attacks,
269–270
Nord-Ost Theater hostage siege and massacre,
224
school emergency response plans,
229–230
September 11th attack,
217
strategic characterization of terrorists,
220–222
tactics, importance of understanding,
224–225
Terrorism Information Awareness system,
26
Tools. See Data mining tools
Total Information Awareness system (TIA),
26
Trinity Sight analytical model
nature of the incident,
99–100
U
UCR. See Uniform Crime Reports
Uneven distributions,
9–11
Uniform Crime Reports,
77
U.S. Department of Defense,
232
V
Variables
domain expertise to identify,
114
VICAP. See Violent Crime Apprehension Program
Victim-perpetrator relationship,
201
Victims
attributes related to risk,
209
identification of risk factors,
226
Violence
global injury prevention programs,
47–48
risk-based deployment strategies,
260
in schools, preparedness for,
230–231
Violent Crime, National Center for the Analysis of,
210
Violent Crime Apprehension Program,
89
Violent crimes
modeled using advanced statistics,
202
Virginia, Commonwealth of,
30–31
Vulnerability, children,
222
W
Warfare, fourth-generation (4GW),
216–217
Weapons. See Firearms
Weapons of mass destruction,
224
Web-based deployment,
168f
Web browsing patterns,
111