Introduction

Good analysts are like sculptors. They can look at a data set and see underlying form and structure. Data mining tools can function as the chisels and hammer, allowing the analysts to expose the hidden patterns and reveal meaning in a data set so that others can enjoy its composition and beauty.

Whether it is called data mining, predictive analytics, sense making, or knowledge discovery, the rapid development and increased availability of advanced computational techniques have changed our world in many ways. There are very few, if any, electronic transactions that are not monitored, collected, aggregated, analyzed, and modeled. Data are collected about everything, from our financial activities to our shopping habits. Even casino gambling is being analyzed and modeled in an effort to characterize, predict, or modify behavior.

One area that has been somewhat limited in its acceptance and use of these powerful new techniques is the public safety community, particularly in security, crime prevention, and crime analysis. This is somewhat surprising because in many ways analysts, detectives, agents, professionals in the intelligence community, and other operational personnel embody many of the principles of data mining or knowledge discovery. For example, the process of training detectives in investigative techniques and practices bears a strong resemblance to case-based reasoning.i In addition, the characterization, modeling, and prediction associated with the behavioral analysis of violent crime are very similar to some of the categorization, linking, and predictive analytics associated with data mining and predictive analytics.

While the relationship between the two areas seems to be natural, the law enforcement community in particular has not enjoyed many of the analytical benefits coming from these powerful new tools. It is unclear whether this is due to cost, training, or just a lack of knowledge of the existence and availability of these tools, but when they are adopted, the increased quality of life for law enforcement personnel, as well as the communities that they serve, is remarkable. In these times of dwindling economic and personnel resources, no agency can afford to deploy carelessly. As organizations compete for qualified personnel, a candidate’s final decision often comes down to quality of life and job satisfaction issues. Just a few of the questions potential employees ask themselves before making a final decision are: Will I have a reasonable work schedule? Will I be able to manage my workload effectively? Will my time be used productively? Can I make a difference in my community? Similar decision processes are associated with maintaining a satisfied work force and long-term retention—something that is increasingly difficult, given the rapidly emerging employment opportunities for law enforcement personnel.

At the same time, requirements for accountability and outcome studies are coming from funding agencies and constituents alike. It is no longer acceptable to run programs without the outcome indicators and metrics necessary to demonstrate their efficacy. The emphasis on these measures of accountability highlights the need for new methodologies to document progress and change in response to new initiatives and strategies.

Given the infinitely increasing amounts of information, “connecting the dots” will be possible only with automated systems. Perhaps more important than trying to create these associations, though, will be addressing gaps in information and information sharing. Only after these challenges have been addressed will we be able to identify and characterize trends and patterns so that future events can be predicted, anticipated, and perhaps even prevented. The emphasis needs to shift from describing the past to predicting the future. Only then will we have the possibility to enhance public safety and create safe neighborhoods for all.

Skill Set

Analysts are deluged with information on a daily basis. The ability to bring some order into this informational chaos can have a huge impact on public safety and the quality of life in the communities that they serve. On the other hand, the opportunity to bring analytical and predictive models directly into the operational environment holds the promise of giving public safety and intelligence professionals the ability to maneuver within the decision and execution cycles of their opponent. Whether it is the war on terrorism, the war on drugs, or the war on crime, enhanced knowledge and the ability to anticipate future actions can afford operational personnel essential situational awareness.

Knowledge of advanced statistics is not a prerequisite for using predictive analytics. In fact, the discovery process associated with data mining also could be viewed as after-the-fact explanations for unpredicted outcomes, something somewhat distasteful in inferential statistics. When examined under the intense scrutiny of the analyst’s domain knowledge, however, these unanticipated or surprising findings can have significant value and greatly enhance our understanding of crime and intelligence data. For those who are analytically inclined, it can be a wonderful and exciting process of data exploration and discovery. Those with a strong background in statistics, though, might be somewhat handicapped by the comparatively rigid nature of inferential statistics, with all of its associated rules and assumptions. With a little confidence and practice, even statisticians will be able to overcome their previous training and perform what they once considered to be unnatural acts with data and information.

On the other hand, data mining brings powerful analytics to those who really need them, including operational personnel. In my experience, it is far easier to teach someone with interest who knows something about crime and criminals how to effectively use these tools. With some guidance regarding a few “rules of the road” for data mining, and the application of off-the-shelf software tools, data mining is well within the reach of any organization with an interest and willingness to put more science and less fiction into crime and intelligence analysis. Moreover, many of the new tools have been adapted to run in a web-based environment and are no more difficult than making a purchase or completing a survey over the Internet. These advancements have created the opportunity for “24/7” analytical capacity,ii even within smaller agencies with comparatively limited personnel resources.

The more that operational personnel, managers, and command staff understand the information requirements and possible outcomes from analytical products; the more likely they will be to contribute data that is meaningful, detailed, and valuable. They also will be in a better position to work with the analyst and participate in the analytical process, requesting output that has increased value for them as they acquire a better understanding of what is available. By understanding the importance of the data inputs and the potential range of outputs, operational personnel, managers, and command staff alike can become informed information consumers and increase the likelihood of identifying actionable output from the analytical process. This subtle change in relationships and understanding can greatly enhance analysts’ ability to gather the necessary data and information, ultimately increasing their ability to support operational personnel, policy decisions, managers, and command staff.

At a recent security expo, Tom Clancy advised the security and intelligence professionals in the audience to seek out the “smart people,” observing that, “[t]he best guys are the ones who can cross disciplines . . . [t]he smartest ones look at other fields and apply them to their own.”iii In my opinion, many of the “smart people” Clancy refers to will rise out of the operational ranks, given the intuitive nature and relative ease of use associated with the new generation of data mining and predictive analytics software tools. While most analysts probably do not need to fear for their jobs just yet, increasingly friendly and intuitive computer systems will allow data and information to serve as a fluid interface between analytical and operational personnel. At some point in the future, that distinction will become almost meaningless with the emergence of increasingly powerful software tools and systems and the “agent/analysts” that employ them.

“Agent/Analysts” and Future Trends

I see a day in the not-too-distant future when analysis will be available without immediate access to an analyst. Information from operations will feed analysis, while the analysis will concomitantly drive the operations, thereby creating a feedback loop of ever-increasing information and actionable intelligence. I see a day when a patrol officer will come back to work after several days off and, at the beginning of the tour, will be able to review recent patterns and trends within the context of historical data and accumulated knowledge from the mobile data terminal in his cruiser. After responding to his first call, he will be able to enter the incident information directly into the department’s computerized records management system (RMS) using direct voice commands. This information then will be used to create the computerized offense report. Any digital images captured from the incident will be quickly uploaded and linked directly to the offense report, as well as any associated or linked information already stored in the RMS. During the data entry process, this new information will pass through an analytical filter prepared earlier in the week by the analytical staff, who are home asleep at this hour. The algorithm running in the background will quickly link this most recent incident to a recent series and prompt the patrol officer to consider several possible alternatives. With this real time, value-added analysis, the officer can make quick, information-based operational decisions that result in a rapid apprehension of the criminal.

This is handled similarly when an agent in a remote location is debriefing a suspected terrorist. The verbal information is recorded and transcribed directly into a free format text file using voice recognition software. The file is then uploaded to an analytical fusion center a thousand miles away. An analyst there uses sophisticated text mining technology to probe and characterize the results of the interview. Several key phrases are identified and compared to an existing database generated from earlier interviews with members of the same terrorist cell being held in other locations around the world. Based on the analysis of the current interview and its comparison to the existing models, areas of possible deception and truth are identified and highlighted, as are promising interviewing strategies. This information, including the interviewing strategies and approaches, is sent back to the agent in the field, further informing and guiding the ongoing interview process, while concomitantly enhancing the existing intelligence on the operations, practices, and strategies of this particular terrorist group.

Are these extravagant predictions? Absolutely not. Both scenarios outlined above are based on existing technologies and resources. In many ways, approaches and methodologies similar to information management have been used in the business community for years. All that is required to implement these strategies is a commitment to take advantage of the currently existing analytical tools and incorporate them into our world. Unfortunately, a paradigm shift in how we view information, analysis, and the relationship between analytical and operational personnel also will be required. That probably will be the most difficult task. Once we overcome that hurdle, however, adapting these new technologies promises to be one of the most exciting adventures in public safety in our lifetime.

How To Use This Book

All of the examples included in this book come from real experience. In some cases, though, the specifics have been changed to protect ongoing investigations, sensitive data, or methods. Whenever possible, I have tried to distinguish between real cases, particularly those taken from published work, and those generated specifically as examples. Given the nature of some topics covered in this book, however, it would be inappropriate to provide too much specific detail and compromise methods. To be sure, though, while the names might have been changed to protect the “not so innocent,” the examples are based on real experiences.

This book is divided into five main sections: “Introduction,” “Methods,” “Applications,” “Case Examples,” and “Advanced Concepts/ Future Trends.” The third and fourth sections include annotated examples focusing on the why and how, as well as the limitless possibilities for data mining and predictive analytics in crime and intelligence analysis. While this organization is relatively logical for training purposes, many readers will choose to read the book out of sequence. In particular, managers, command staff, supervisors, policy makers, and operational personnel interested in learning more about data mining and predictive analytics but not expecting to use these tools first hand will have neither an interest in nor a need for detailed information on specific methods and algorithms. These readers could benefit from reading and understanding the annotated examples if they make acquisition and purchasing decisions for analytical products and determine the focus of their analytical personnel. Moreover, operational personnel can more fully exploit the new technology and work more effectively with analytical personnel if they understand the vast array of possibilities available with these new tools. With the opportunity to deploy data mining and predictive analytics directly into the field, an increasing number of operational personnel will be using data mining products. While they might not be generating the specific algorithms or models, a general understanding of data mining and predictive analytics will certainly enhance their ability to exploit these new opportunities.

Similarly, many analysts will use this book to explore the possibilities for data mining in their environment; identifying ideas and strategies from the annotated examples in the third section, and then returning to the methods section for specific information regarding the use and implementation of these approaches. This book is not intended to provide detailed information about specific software packages or analytical tools, but merely provides an overview of them. It should serve as a starting point, using terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis using data mining and predictive analytics, which each law enforcement or intelligence professional can tailor to their own unique situation and responsibilities. While the basic approaches will be similar, the available data, specific questions, and access to technology will differ for each analyst and agency, requiring unique solutions and strategies in almost every setting.

Perhaps one of the most challenging aspects of writing this book was keeping abreast of the new developments and data mining applications that now appear on an almost daily basis. It is both frustrating and exciting to consider how much this field is likely to change even in the short time between completion of the manuscript and actual publication of the text. Therefore, the final section, “Advanced Concepts/ Future Trends,” should not be viewed as inclusive. Rather, this particular section is intended to serve as a beginning for ascending to the next level of training for those interested in this field. This rapid pace of innovation, however, is what keeps the field of analysis fresh and exciting, particularly for those with the interest and creativity to define the cutting edge of this new and evolving field.

Bibliography

i. Casey, E. (2002). Using case-based reasoning and cognitive apprenticeship to teach criminal profiling and internet crime investigation. Knowledge Solutions. www.corpus-delicti.com/case_based.html

ii. McCue, C. and Parker, A. (2004). Web-based data mining and predictive analytics: 24/7 crime analysis. Law Enforcement Technology, 31: 92–99.

iii. Fisher, D. (2003). Clancy urges ClOs: seek out the “smart people.” eWeek, www.eweek.com.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.182.76