the presentation

advertisement
The Utility of Criminality Analysis
techniques in frontline OA
Sam Mitchell
Support to Operations, Dstl
01 Sep 2010
© Crown copyright 2010. Published with the permission of the Defence
Science and Technology Laboratory on behalf of the Controller of HMSO
Content
• Who are we
• Criminality analysis - What is it and why are we
interested?
• Geospatial profiling
Anchor point Identification
 What it is
 What already exists
o Prospective Crime Mapping
 What it is
 What already exists
o Utility to Support to Operations
o
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Who does it?
PCS Support to Operations Group
“Providing analysis support to exercises and operations through timely application
of science and technology”
•
Operational Analysts directly
supporting operational commands
and warfare centres brought
together as the Support to
Operations Group within the PCS
Department, providing:
o Support to Current Operations
o Support to Planning for Future
Operations
o Support to Trials
o Support to Exercises
o Rapid Operational Analysis
o Operational and Exercise Data
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
What it is and Why we’re interested
• What it is:
o
o
• Why we’re interested:
Civilian policing authorities
use various criminality
analysis techniques to help
solve and prevent crime
Based on the premise that
humans are inherently
predictable
o
 Serial offending criminals
set patterns as a result of
numerous variables (time,
transport, etc)
 Insurgents will similarly be
likely to set patterns
o
August 23, 2010
UNCLASSIFIED
o
Looking to improve the OA
support to deployed HQ
planning and decision
making.
Looking at providing
analysis to contribute to the
IED ‘Prevent’ strand
Another club in the OA golf
bag
Dstl is part of the
Ministry of Defence
Geospatial Profiling- Anchor Point
Identification
• Geospatial profiling is based on the premise that everyone has a
pattern to his or her daily lives
o
including a general geographical area in which they spend the majority
of their time, and the principle of least effort
• Career criminals and serial offenders are no different, they have a
comfort zone, typically within driving distance from their home.
o
Committing a crime in this area affords the offender the benefit of
familiarity but is not too close so that they maintain anonymity
• Geospatial profiling was developed by Canadian Mr Rossmo whilst
studying for his PhD
o
o
Does not widely distribute, believes strongly in the analyst in the loop
Variety of different commercially available products
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
What already exists
• Rigel© Software developed by Dr Rossmo and
used by civilian law enforcement agencies
o
o
o
o
The algorithm takes a series of linked events and
predicts the likely location of an anchor point such
as a residence or workplace of the offender.
This information can be used to prompt further
intelligence collection or can be combined with
other existing intelligence to trigger action
The algorithm contains a distance decay function.
The premise behind this is that the farther a
criminal travels to commit their crime the more it
costs in terms of money, time and energy.
The distance decay function has been found to
vary in different types of crimes
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Everything else
• Since the creation of Rigel numerous other software packages now
exist such as Crimestat III a spatial statistical package that
interfaces with Geographic Information System (GIS) programmes
such as ArcGIS®, MapInfo®, and Surfer for Windows®.
These commercially available products have several features,
including those which calculate travel distances from origin to
destination, to predict likely residence of serial offenders.
o They use a known sample from other crimes and employ the
distance decay function.
o
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Prospective crime mapping
• Aim: To determine where the next incident will occur
• Usage: Knowing when and where to deploy resources
• Like Hotspot analysis
o
Take for example burglary; the risk of a house getting burgled is not
even and will vary by area and within areas some homes are victimised
more than others
• Where this differs from classical hotspot analysis is that research
has indicated that spatial and temporal patterns of crime are fluid.
Johnson et al and others have demonstrated that the risk of
burglary appears not only to move, but to cluster in space and time
in much the same way as a communicable disease.
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
What already exists
• The requirement for tools to help analysts recognise patterns has
accelerated the development of forecasting or predictive software
• One such tool developed by US Strategic Command (STRATCOM) and
The Engineer Research and Development Centre's Topographic
Engineering Centre (TEC) is Threat Mapper
• Given an input data set of past threat activity such as IED events and any
relevant feature information such as roads and rivers Threat Mapper will
forecast future events
o
The likelihood of future incidents in different areas is calculated by establishing
spatial patterns between the past events and surrounding feature information
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Dstl use in Frontline OA
•
Insurgents thought to behave much like ‘criminals’
• Research by National Ground Intelligence Centre (NGIC) and Defence Research
and Development Canada (DRDC) found IED locations followed similar patterns to
those identified in “western crime”
•
Dstl Information Management Department are developing software for use in the
Counter-IED arena based on these criminality analysis techniques
• Using historical data sets looking at IEDs linked via biometrics, MO, geospatial
proximity, and technical signatures
• Initial results show the technique to be successful at reducing the search area for an
IED anchor point.
• IED specific algorithm developed and ratified against different historic data
•
The Applied Geo-profiling Tool (AGT) for anchor point identification was taken to Theatre
January 2010
• Trialed to determine usability
• Discussed with military stakeholders
• Brought feedback for the developers
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Future use in Frontline OA
• Ideally we’d like a purpose built Geo-profiling toolset combining these
analysis techniques to run on existing GIS software packages with
counter insurgency operation specific algorithms
o
o
Location
Type of threat
• The application of this, would allow the deployed analyst to provide an
additional statistical probability in the identification of an anchor point to
the intelligence cell which could contribute to the planning, targeting or
influence processes, or the location of future threats for troops on the
ground.
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Future use in Frontline OA
• For Anchor point identification in contrast to the use in law enforcement
which lies late in the intelligence cycle the utility for a military application
could be earlier in the cycle where incidents are linked perhaps by MO and
technology but no further intelligence exists.
o
Here, with an understanding of the sensitivity to error, its use could for example
prompt the allocation of intelligence collection assets. This would not prohibit its
further use down the line, for which it was originally intended, where a higher
statistical probability of area identification would be likely.
• It is important to remember that the actions of the coalition forces will affect
any given pattern seen.
o
So when attempting prospective incident mapping our own temporal and spatial
footprint should therefore be taken into account, as it is likely that any change
in our tactical decision-making, in general or in response to an attack would
lead to an alteration in the pattern seen.
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Questions?
August 23, 2010
UNCLASSIFIED
Dstl is part of the
Ministry of Defence
Download