Crime Data Mining

Read Complete Research Material

Crime Data Mining

Crime Data Mining



Crime Data Mining

Introduction

The concern about national security has increased significantly since the terrorist attacks on September 11, 2001. Intelligence agencies such as the CIA and FBI are actively collecting and analyzing information Local law enforcement agencies have also become more alert to criminal activities in their own jurisdictions. One challenge to law enforcement and intelligence agencies is the difficulty of analyzing large volumes of data involved in criminal and terrorist activities. Data mining holds the promise of making it easy, convenient, and practical to explore very large databases for organizations and users. In this paper, we review data mining techniques applied in the context of law enforcement and intelligence analysis, and present four case studies done in our ongoing COPLINK project (Hauck et al., 2002).

An Overview of Crime Data Mining

It is useful to review crime data mining in two dimensions: (1) crime types and security concerns and (2) crime data mining approaches and techniques. 2.1 Crime Types and Security Concerns Crime is forbidden, or the omission of a duty that is commanded by a public law and that makes the offende Dictionary). An act of crime encompasses a wide range of activities, ranging from simple violation of civic duties (e.g., illegal parking) to internationally organized crimes (e.g., the 9/11 attacks).

Crime Data Mining Approaches and Techniques

Data mining is defined as the identification of interesting structure in data, where structure designates patterns, statistical or predictive models of the data, and relationships among parts of the data (Fayyad & Uthurusamy, 2002). Data mining in the context of crime and intelligence analysis for national security is still a young field. The following describes our applications of different techniques in crime data mining. Entity extraction has been used to automatically identify person, address, vehicle, narcotic drug, and personal properties from police narrative reports (Chau et al., 2002). Clustering techniques such as to automatically associate different objects (such as persons, organizations, vehicles) in crime records (Hauck et al., 2002). Deviation detection has been applied in fraud detection, network intrusion detection, and other crime analyses that involve tracing abnormal activities. Classification has been used to detect email spamming and find authors who send out unsolicited emails (de Vel et al., 2001). String comparator has been used to detect deceptive information in criminal records (Wang et al., 2002). Social network analysis has been used to an and associations among entities in a criminal network.

Case Studies of Crime Data Mining

Based on the crime characteristics and analysis techniques discussed above, we present four case studies of crime data mining that are part of our ongoing COPLINK project.

Entity Extraction for Police Narrative Reports

Valuable criminal-justice data in free texts such as police narrative reports are currently difficult to be accessed and used by intelligence investigators in crime analyses. We proposed a neural network-based entity extractor, which applies named-entity extraction techniques to automatically identify useful entities from police narrative reports of the Tucson Police Department ...
Related Ads