Professional Documents
Culture Documents
a n
This handbook is one of a senes of "Prescriptive Packages"
sponsored by the National Institute of Law Enforcement and
Criminal Justice. Prescriptive Packages are designed to provide
criminal justice administrators with operating guidelines in impor-
tant program areas. Based on research findings and recent
program experience in various parts of the country, they are
specifically designed for practical application.
,1
POLICE
CRIME ANALYSIS UNIT
HANDBOOK
GEORGE A. BUCK, Project Director
Contributing Authors
ROBERT AUSTIN JOHN HODGES
GARY COOPER KAI MARTENSEN
DON GAGNON MICHAEL O'NEAL
This project was supported by Grant Number 73-TA-99-1000 awarded by the National
Institute of Law Enforcement and Criminal Justice, Law Enforcement Assistance Ad-
ministrati.on, U.S. Department of Justice, under the Omnibus Crime Control and Safe
Streets Act of 1968, as amended. Points of view or opinions stated in this document are
those of the authors and do not necessarily represent the official position or policies of
the U.S. Department of Justice.
November 1973
143486
U.S. Department of Justice
National Institute of Justice
11
ABSTRACT
.,
The purpose of this project was to develop a relevant and
useful Crime Analysis Handbook and to encourage local law
enforcement agencies to make use of it. Wi.th the development of
the Handbook this goal has been accomplished in two ways. First,
the Handbook describes the benefits derived from the implemen-
tation of a formal crime analysis unit; and second, the Handbook
shows how such a unit may be established.
The Handbook breaks down operational units into three
categories and describes how each unit would operate. The
categories are: (1) manual units for small agencies; (2) semi-
automated unitrs for medium agencies; and (3) fully automated
units for large agencies. Issues dealt with in each category include
goals, staffing, evaluation, operation, etc.
Handbook preparation was undertaken with depth in police
expertise in a staff role utilizing a Users Advisory Committee for
review and recommendations. The committee consisted of police
administrators and line supervisors who were involved with crime
analysis units. Also, extensive use was made of consultants with
far ranging experience in the field.
An extensive literature search was completed, numerous inter-
views with agencies in the field were performed, and draft reports
were reviewed by the Advisory Committee prior to the completion
of the Handbook.
The findings of this report concluded that:
1. There is an insufficiency in the availability of literature on
the subject of crime analysis.
2. There is an overall lack of the use of formal crime analysis.
3. Increased use of these units will be realized with a greater
understanding of their capabilities.
4. From the intense interest shown by contributing agencies, the
Handbook will be of significant use to law enforcement agencies.
111
GOT A MOMENT
...
.. '
iv
-----------.-------------------------~----
CONTENTS
Page
FOREvVORD .......................................... xi
., PREFACE ............................................. XIII
SUMMARY .... .... .... .... ........................... xv
VI
LIST OF FIGURES
Vll
Figure Page
5-1 Example of the Daily Crime Recap ................ . 51
5-2 Example of the Daily Information Bulletin ..... ,' ... . 52
5-3 Example of the Known Offender Identifier ........ . 54
5-4 Example of a Known Offender Identifier .. .' ....... . 56
5-5 Example of a Known Offender Identifier .......... . 58
5-6 Partial Example ofa Narrative Weekly Crime Summary 59
5-7 Example of a Numerical Weekly Crime Summary
With Comparis')n to Previous Activity .............. . 63
5-8 Example of th(' Weekly Public Newsletter .......... . G4
5-9 Example of th'~ Monthly Analysis Report .......... . 66
5-10 Example of (' \~rime Pattern Identification Bulletin 69
5-11 Example of a Crime Pattern Identification Bulletin .. 70
5-12 Example of a Crime Pattern Identification Bulletin .. 72
5-13 Examples of the Investigative Lead Report ......... . 74
5-14 Example of the Major Crime Bulletin .............. . 76
6-1 Overall Program Concept ......................... . 79
6-2 Crime Analysis Control Sheet ..................... . 82
7-1 Information Flow and Processing in a Manual System. 87
7-2 "Flow Process" Semiautomated Crime Analysis System 89
7-3 Information Flow in an Automated Crime Analysis
System .......................................... . 92
viii
LIST OF TABLES
Table Page
1-1 The Crime Analysis Mission ............................. 1
2-1 Criteria for Selection of Crime Analysis Unit Staff ........ 13
3-1 Some Crime Analysis Source Reports by Department ...... 17
3-2 Outside Sources of Crime Analy&is Information ........... 27
4-1 Universal Factors for Crime Analysis ..................... 33
4-2 Crime Specific Factors for Crime Analysis ................ 35
5-1 Various Formal Written Dissemination Techniques for
Crime Analysis Information ........... ,................. 50
7-1 Minimum Staffing Levels for a Manual Crime Analysis
System ................................................ 85
A-I Detailed Project Budget ................................. 96
A-2 Timetable for Organization and Implementation of Manual .
Crime Analysis Unit Project .............................. 101
B-1 "Flow Process" Semiautomated Crime Analysis System .. '" .106
B-2 Crime Analysis Control Sheet ............................ 108
B-3 T'imetable for Organization and Implementation of Semi-
automated Crime Analysis Unit Prqject ................... 112
C-l Information Flow in Automated Crime Analysis System ... .117
C-2' Crime Analysis Control Sheet ............................ 119
C-3 Timetable for Organization and Implementation of Auto-
mated Crime Analysis Unit Project ............................. 121
IX
--------~---
FOREWORD
Xl
PREFACE
GEORGE A. BUCK
XIV
SUMMARY
XVlll
A. Scope ana Use of Crime Analysis
Information
Crime analysis supports police operation
through strategy planning, manpower de-
ployment and investigation assistance. It sup-
Chapter I.
ports police and criminal justice planning
efforts, and provides data for program and
INTRODUCTION tactical evaluation. A more definitive over-
view of the crime analysis mission appears in
Table 1-1.
The purpose of a crime analysis unit is
ANALYZING CRIME is not new. Ever since threefold. First, crime analysis should assist
policemen began searching for similarities in the process of establishing, screening, and
between reported crime occurrence there ordering lists of suspects for individual
has been some form of crime analysis. This crimes, based on characteristics of the crime
text hopes to legitimize and systematize the and the MO of known offenders. Second,
crime analysis process so it will become an crime analysis should assist in assembling
accepted and identifiable function within the and ordering the topics and specific crimes
police organization. Although crime analysis which may involve a suspect already in
is usually considered to be an esoteric proc- custody. This can maximize the number of
ess left to the Sherlock Holmes types, a cases properly cleared by a single arrest.
number of recent factors have renewed Third, crime analysis should 7.issist in the
interest in the process. Certainly the prob- proper assignment and deployment of pre-
lems of increasing crime rates, increasing ventive patrols and other police functions in
calls for police service, increasing costs of order to assure police observation of crimes
police operations, and the increasing atten- in progress.
tion given to productivity standards ha.ve
had a significant effect. As a result, agencIes
are beginning to develop crime analysis units
of varying responsibilities and sophistication, TABLE 1-1
with the use of computers assuming ever- The Crime Analysis Mission
greater importance. THE CRIME ANALYSIS MISSION
The impact that crime analysis can have
on a law enforcement agency is impressive. Support Activity Method or Technique
The Los Angeles Police Department, for MO
example, in 1972 reported that their PA-
TRIC system (Pattern, Recognition and In-
formation Correlation) can process 130,000
Detective Case Investigation
Known.
Offender c{ Associates
Status
Location
~
cases per year and yield over $6,000,000
annually in total savings on the basis of
£~~~~~~
Offense Day, Week, Etc.
saving 4.5 hours of investigative time per Correl- Property
case. A further finding showed that in Detective Case Investigation lation- Crime Specific
Victim, Witness
approximately two of every five new cases, Locational Stake-Out
Detective Special Operations
there was in the PATRIC data base a crime Patterns
report or related suspect information of Patrol Manpower Crime Pattern Information
immediate interest to the investigator. l The Allocations Crime Prediction Promes
Chicago Police Department, utilizing their Patrol Tactical Crime Location Patterns
manual hand-sort system, in 1972 identified Assignments
1,528 crime patterns in five selected offense Patrol Suppression I.D. of Offenders Active in
Area
categories and, of those, cleared 436. The
Patrol Patrol Cha racteristics-U nique
average pattern consisted of six cases. Effectiveness Crime Types
Improvement
Planning Strategy Categorize Crime Problems
Development Demographic Correlations
Prediction of Future
Problem Areas
, "PATRIe Design Requirements", S.Y5inn RcqlliremnlL,. Vol. I, July 17, 1972.
1
---- -----
2
crime analysis. In this respect, the handbook use in many police agencies; (2) the require-
can be used as a general guide in establish- ment for traffic analysis as promoted by the
ing possible EDP programming for crime Northwest Traffic Institute. The develop-
analysis usage. ment of effective traffic supervision was
d. Crime Analysis Usage. The main pur- predicated on the need to have readily
pose of the handbook is to act as a source available information con~erning the type of
reference for those people who are directly circumstances that create traffic accident
associated with the crime analysis unit opera- problems. The effort was further articulated
tions. The handbook is intended to identify to show the need to process data and place it
as many considerations as possible which in significant format, e.g., pin maps, tables,
should be given to a newly formed crime graphs, summaries, etc., for prediction, de-
analysis unit. The handbook can provide ployment, and other purposes.
essential information in such areas as data In a discussion of crime analysis concepts,
collection methods, data storage, searching it is helpful to define the qualities of both
and correlation techniques, and standards "informal" and "formal" crime analysis con-
for overall evaluation. Interviews have cepts. The letter will then be redefined in
shown that the few agencies who have for- terms of basic operations and advanced
mally established crime analysis units had operations.
also spent a considerable amount of time 1. Informal Crime Analy;is. Informal crime
and money in traveling to and observing analysis, in its simplest sense, is performed
such operations in other cities. Hopefully, by all officers as ,they investigate crimes.
this document can lessen the expense of Crime analysis is the quality o.f examining
men and time spent in such research and one crime occurrence and comparing it with
enhance understanding of operating crime similar past events. In essence, the officer is
analysis units. a walking crime analysis unit as he compares
The handbook has utility for crime analy- his investigations with his past experiences
sis units already in operation. For such and with the experiences of others. How-
agencies, a detailed account of the "state-of- ever, the officer's experiences are limited by
the-art" provides the impetus for expanding the number of hours he works and, essen-
into new areas of operation or updating tially, his experiences are not coordinated
current practices and methodologies. Finally, with the experiences of others.
the projection of a "model crime analysis Larger agencies which have crime specific
unit system" establishes a theoretical basis details in their investigative bureaus also
for comparison with current operations. perform informal crime analysis. Inasmuch
as investigators specialize in particular crime
categories, the quality of the informal analy-
sis is generally of a higher level than that of
c. Crime Analysis Development the patrol officer. Despite the sometimes
extensive system of logging reports, investi-
All police departments perform some gators generally rely on memory as their
crime analysis activity. However, the re- main tool for correlating reports and identi-
search of this study has shown that the fying patterns.
overwhelming majority of the police depart- The following is a list of characteristics
ments have not made anyone individual or which can be generally associated with infor-
unit responsible for performing this activity. mal crime analysis:
In cases where police departments have • Based on individual officer's memory
designated crime analysis units these units retention and past experiences.
are actually performing tasks which more • Hampered by an officer's limited "on
reasonably relate to counting crime statistics, duty" availability and interest.
making beat surveys, and planning man- • Tends to be subjective, biased and out
power allocations. The actual work of crime of date.
analysis is being performed in unassociated • Hampered by a large volume of crime
operational divisions and details. occurrence.
Stimulation for crime analysis can be at- • Requires a longer time period to iden-
tributed to (1) the development of the modus tify patterns.
operandi in England in the early 1900's and • Limited MO data storage system.
which now may be found in various stages of • Patterns are, more time than not, iden-
3
---------------------------
tified only by unusual or odd MO char- • Scope of crimes, subgroups, and MO
acteristics. traits which are analyzed.
o Limited in scope and ability to recognize • Analysis, techniques, and capabilities.
a general crime picture developing a. Basic Operation. Basic level crime anal-
within an area or throughout a commu- ysis operations are characterized by limited
nity. capabilities. That is, tasks are perfotmed
o A noncoordinated function. which are intended to aid in "solving" a
GI Information which is developed is gen- current problem, rather than preventing its
erally for limited use and is hampered occurrence through crime predictions or
by the absence of a formal communica- suggested corrective programs.
tions link between units or individuals. A basic operation is characterized as follows:
2. Formal Crime Analysis Operation. A formal • Staffed by 1-2 personnel.
crime analysis operation is one in which the • Operates during normal business hours.
responsibility for identifying crime patterns • Analyzes 3-4 crime categories.
has been given to one specific person, per- • Employs a manual system of filing and
sons, or "unit". Very few crime analysis units storing data.
have a delineated set of operational goals. • Has a limited cross referencing of data
The essential quality of a formal crime storage.
analysis unit is that it views the overall • Lacks crime prediction.
occurrence of crime through "one set of • Lacks known-offender/modus operandi
eyes". As a general rule, the staff of a crime analysis.
analysis unit has been selected for qualities • Has a limited visual geographical analysis,
of experience and analytical ability. The generally pin maps.
following is a list of characteristics generally To a very large degree crime analysis is
associated with a formal crime analysis unit: directly dependent upon a unit's ability to
o Provides a more objective analysis. collect and store information from incoming
• Reviews the overall occurrence of crime crime reports. The limited staffing capability
through "one set of eyes". of a basic crime analysis operation severely
• Has, as a general objective, the identifi- handicaps its capability. In all but the small
cation of crime patterns through MO departments, the absence of an automated
analysis. data storage ana retrieval system limits the
o Is a staff unit and should not be directly crime analysis utility.
involved in investigation or enforce- b. Advanced Operations. Advanced crime
ment. analysis operations are of a much greater
.. Provides a vital communications link 5cope than those of the basic crime analysis
between operational units relating 'to operation. The advanced operation is also
crime pattern activity and thereby pro- oriented toward anticipating future prob-
vides a coordinating staff service. lems. It analyzes past data for the purpose of
o Identifies criminal patterns within a identifying future trends and problem areas.
shorter period of time than informal Although they are not absolutely essential,
crime analysis. com puters can form the central core to
• Provides a systemized method for stor- advanced crime analysis unit operations. ..
ing and retrieving crime M 0 data. Computers are able to provide greater ex-
o Has a broader scope as to the overall tended benefits to the advanced operations
general crime picture.
The degree of operational sophistication
beca use of their ca pability to search a
greater number of records and use relatively
..
of a formal crime analysis operation estab- complex search criteria. Furthermore, a
lishes its operational utility. For the purposes computer does not tire of repetitious tasks,
of this handbook, the two extreme levels- nor fail to recognize logical associations as a
basic and advanced-are identified. Most result of fatigue or stress.
crime analysis unit operations will operate Advanced operations should have the fol-
somewhere on the continuum. Factors deter- lowing characteris tics:
mining the operational level include: • Rapid correlation between offenses.
• Number of personnel assigned. • Provide names of suspects.
o Hours of operation. • Complex searching criteria.
o Type of equipment employed. • Large staff.
• Extent of data storage. • 24-hour day operaeion.
4
• Computer-stored data base. indispensable in day to day deployment of
• Crime reports which are reviewed for personnel. Crime analysis will provide the
quality control before updating data nucleus of data support for dynamic police
base. command and control. One department has
• Expanded numbers of crime categories already undertaken a study to determine if
and subgroups which are analyzed. crime analysis can provide data to direct the
• Complex storage of known otlenders officer's patrol time. Directed patrol activi-
information including descriptions, ve- ties are dispatched to the patrol unit as any
hicles and MO's. other normal call for service activity would
c. Future Consideration. As crime analysis be. Thus, crime prevention duty based on
becomes accepted, refined, and expanded,' it prediction vies for the officer's time equally
will become more of an operational tool with calls for police service.
5
tives by furnishing lists of suspects
whose MO's match those of current
offenses.
• To provide a greater number of crime
pattern bulletins for the patrol function
and thereby increase the awareness of
Chapter II field officers thus increasing the poten-
tial for earlier arrests.
• To provide a means for influencing
BASIC ELElvIENTS citizen groups to observe criminal activ-
OF CRIME ANALYSIS ity as it directly pertains to them, and
thereby aid in enlisting their support
for crime-specific prevention programs.
e To provide information relating to secu-
A. Definition of Goals and Objectives rity considerations for environmental
design of new residential commU11lties
and commercial developments.
• To provide early identification of crime
patterns through MO correlations.
FOR A NUMBER of reasons it is extremely • To increase the number of discovered
desirable that crime analysis unit objectives crime patterns which are capable of
be formally delineated. First,. it provides being identified.
direction and purpose to the un!t as a w~10Ie, • To provide a means of measuring the
i.e., the unit's staff have a fIrm basIs of results of crime-specific prevention or
understanding as to what they, as a team, suppression programs.
are expected to accomplish. Some of the • To provide staff recommendations on
objectives may be purposely ~road or ~en possible program solutions to crime.
eral in nature, such as measunng the efrects problems.
of special task force activities, or provid.ing • To aid in the coordination of special
staff studies on crime profiles and proJec- crime suppression task forces.
tions. However, many goals are specific in • To provide information on projected
nature and can be qualified into numerically levels of offender activity and to iden-
achievable figures. tify future problem areas.
The secon~l purpose of goal setting is that
it actually determines how the unit will
function. In this sense, the work concentra-
tion, or the manner in which the work is B. Crime Analysis as a Step-by-step
actually performed, will be focused on spe- Process
cific problem solving 01' goal atta.inm~nt. .
The final reason for goal settmg IS that It There is a fundamental assumption in the
provides a quantitative standard by which analysis process which holds that a problem
the crime analysis unit commander (CAVC) is best solved by first examining its scope
or the administrative staff, can periodically and by then identifying its components. A
evaluate work performance. Evaluations may further assumption, and one which is pecu-
measure a unit's ability to achieve certain liar to crime analysis, is th.at offenders will
objectives or to solve specified problems. If generally carry out their acts in a repetitive
goals are not specified, then any subsequent manner and style. Therefore, the analysis
evaluation can only be a statistical report of process must include identification of the
activity without really assessing if the unit manner in which a crime was committed, a
accomplished its objective. comparison of the crime with similar crimes
The following is a list of some general and a comparison of the crime with the MO
objectives of crime analysis: "style" of known offenders.
• To increase the number of cases cleared The analysis process as applied to criminal
by arrest by correlating the MO of activity is a specific step-by-step sequence of
arrested suspects to other current of- five interconnected functions:
fenses. • Crime data collection
• To provide investigative leads for detec- • C1"ime data collation
7
• Analysis ble which link, or tie together, two or more
• Dissemination of analysis reports crimes, or a crhl1e with a specific suspect.
• Feedback and evaluation 4. Dissemination of analysis TepoTts has as its
Collectively, these five sequential elements, concern both the fOTmat with which the
or stages, are known as the "Crime Analysis product information is presented and the
System" (CAS). Much of the methodology, timeliness of the report to its user groups.
technique, and examples of these stages will The crime analysis report itself must be
be developed in subsequent chapters. How- objective and must be written, or presented,
ever, it is useful at this point to briefly in such a manner that there is a clear
discuss each stage separately for the purpose delineation between positive correlations of
of explaining its role in the analysis process. MO elements and a tentative hypothesis
1. CTime analysis collection is simply the based on possible correlations of !vIO ele-
gathering of raw data concerning reported ments.
crimes and known offenders. Generally, In other words, the report should 3tate its
such information comes from crime reports, qualitative degree of reliability and then list
arrest reports, field contact cards, and other those factors or reasons which led to such
recording documents used by the agency. conclusions or hypotheses. This may take the
This is not to say that these are the only form. of listing common characteristics be-
sources from which crime data is collected. tween a series of crimes which are suspected
Certainly, they are not. As will be outlined in of being related, or listing common charac-
Chapter III, there are numerous informa- teristics of a crime and the MO of a known
tion sources both inside and outside an offender. In complex cases, it may require a
agency. summary of the information.
The crime format should also be tailored,
The collection phase should also be
or custom-designed, to meet the particular
planned and focused in order to be effec- requirements of the specific user group. It is
tive. That is, crime data should be collected reasonable to assume that user groups will
on only those offenses which are capable of
pay greater attention to those reports which
being analyzed as a result of their repeated are specifically prepared for them, than to
frequency or patterns. For example, murder reports which require an extensive search
is seldom a repetitive crime perpetrated by process to locate information which is rele-
the same offender. Therefore, it would not
va~_~o _~J?~.£..p.Cl.rticul§lr n_~.e~s ..
serve any general purpose to continually Finally, the timeliness of the crime analysis
collect such crime data. report to the user !TOUpS is important. In
2. CTime data collation is the first step in tlle order for the report \0 have user meaning, it
process of transforming raw data on crime must reasonably coincide with problems that
and known offenders into an organized are current. The utility of crime analysis
format for subsequent comparison and anal- information which is developed weeks after
ysis. However, collation means mort than the suspect h'as been arrested is certainly
the simple storage of materials in files. It marginal. The dissemination phase, then, is
includes sifting out useless or irrelevant or the reporting of information according to
incorrect information, the arranging of col- user group requirements, and getting it to
lected materials so that relationships between them when they most need it.
crime data elements may be established, and 5. Feedbacll and evaluation is the key con-
creating a system for rapid retrieval of necting link for the crime analysis system. It
stored (file) information. is the phase which returns user group assess-
3. Analysis is the function of assembling ment on the worthiness and validity of the
and comparing the bits and pieces of infor- crime analysis unit's products and activity. It
mation which have been collected and plac- cannot be over-stressed that the amount of
ing them together in such a manner as to feedback be as broad-based as possible. It is
show pattern and meaning. It is the extract- important to understand that feedback
ing of MO elemEnts from crime reports and should be a wide open communications line
the subsequent searching of the data base by between the crime analysis unit and all of its
each of the separate elements in an attempt user group personnel, down to and includ-
to associate the crime with past events. ing the beat officer on the street.
Analysis is the searching, comparing, and The crime analysis unit needs feedback
identification of as many elements as possi- for two reasons. First, the unit must deter-
8
mine if it is performing those tasks which analysis unit. The unit then becomes "offi-
most satisfy user needs. In other words, is cial".
the information good? Can the user group 1. Organizational Placement. One of the
actually use it? Second, some indication is most surprising discoveries made in re-
needed as to whether the user group has searching information for this handbook was
taken any specific action as a result of the the wide diversity in which crime analysis
reports supplied by crime analysis. Feedback units were l(lrated within various agencies'
on user group actions will thus help crime organizational structures. For example, the
analysis identify and assess any resultant Oakland Police Department has their unit in
changes which might occur in offender pat- the Preventive Services Division, Bureau of
terns. Field Operations (patrol function); the Chi-
Figure 2-1 depicts the basic elements of cago Police Department has their unit as a
crime analysis. The chart emphasizes the function of the Detective Division; the Kan-
relationship between inputs, analysis, and sas City, Missouri, Police Department has a
outputs. special unit attached to a crime suppression
group. However, most of the departments
have the crime analysis unit as part of a
research and planning division, and located
C. Prerequisites for Establishing a organizationally close 'to the head adminis-
Crime Analysis Unit trator. During onsite visits with these agen-
cies, almost without exception, the crime
The administrator who is considering im- analysis unit commanders adamantly sup-
plementing a new crime analysis unit must ported the current manner of their organi-
first consider a number of fundamental zational posture.
issues: formal administrative support; orga- Further research indicates that there are
nizational placement; staffing; and a method obvious advantages and disadvantages to
of guaranteeing the integrity of input infor- each of the possible placement considera-
mation. tions. As a result, the research team con-
Formal administrative supjJort pertains to the cludes that there may not be an absolute
manner in which a new crime analysis unit is "right" way the unit must be organizationally
introduced to the agency personnel. Theo- placed. As a practical matter, the crime
retically, it is possible for a crime analysis analysis unit should be where "it will work
unit to operate without the enthusiastic sup- best". In other words, if the initial organiza-
port of the administrative staff. However, tional posture does not achieve the desired
experience has shown that without adminis- results, the administrator may have to relo-
trative support a considerably longer period cate the unit where it will gain greater
of time is required before user groups gain attention by user groups.
confidence in the judgment and the capabili- Some considerations that administrators
ties of crime analysis personnel. As a conse- should consider in organizational placement
quence, it takes longer for the unit to reach are as follows:
an optium level of operational effectiveness. • Access to user
... The administrative staff can help insure • Physical location
the unit's success by carefully educating and • Objectives of crime analysis
"selling" potential user groups on the merits • Neutrality (the work of the crime analy-
and the utility of crime analysis. However, sis unit should not be captured by one
extreme care should 1:Je taken in such an user group)
approach, for there can be as many hazards • Availability of resoun:es
in being overly assertive as there are in • Management support
neglecting the unit entirely. • Interest of chief
The administration can further demon- • Quality of personnel
strate support by ensuring that early suc- • Organizational philosophy
cesses are adequately reported throughout If a crime analysis function does not
the agency. Finally, support can be shown currently exist, there is an advantage in
through a departmental directive, or general placing the new function high in the organi-
order, which carefully delineates the organi- zational structure, thereby providing the
zational structure, responsibilitie!.., goals, necessary support from top management.
functions, and accountability of the crime This is an important step in the stage of
9
~-~
-
o FIGURE
Crime Analysis Information Flow
2-1
(J lJ T I) lJ T
mD'if'~~U~~~
m~«:~U?)mli\lJ'if~
r\ - - - - - - _!... DEPLOYMENT
r-;;ECrAL - - -,
1- - _ _
OTHER LAW
I CONFIDENTIAl, 'PLJI,NS
_ _ _ _ _ ';,. ~FORMATION I
1
, - , , _ ... ... ... ...
• ENFORCEMENT r CRIME l 1 .... , " "', ... ....
AGENCIES I CORRELATION
- _ _ _ J..~ORHATION
1
I
-
1
- - - - _ -' \ \
\
,
, , ....
SPECIAL INTEHEST ~RI~IE PATTERN I - - - - - ..J I I " .... ,
•
GROUPS
GENERAL PUBLIC
rKNOWN-~FFENDERl
I INFO~IATION'
,- - - - - J
I
/
I
I
I \
\ "1 '
\ ,, ,,
I INFORMATION! I I I I 'I.
.1 _ _ _ , I--~ / / I I I 1 " \
\
II '
".. . ~~ 'I CRIME I I I I I 'I., \
,
~
- SUHHARIES !.. __ .l o\\O~1MI0Ii\lJO~'jj"O»o\WOaDIi\lJ , I / I I ,
:
\ \"----l
\ - - - - - -
I
...II
-"f
•
•
CHIEF EXECUTIVE
,
,
"
,
"
I
I
I
II '\
\
,
\
\
\
\
\
\
I'
'
1\
,
"..
.. "
, I
I • PLANNING and
HESEARCH V "" ,."
"
"
"
r.., I
I~
,
II
I \
'\
-~
\ \ I \ "" I'"
\ '\ LI ~"" I
, : L-;
I " '
,. ---
(: I~ I M IE SI;)I::C: 1).\ L UNITS I;) AT I~O l
• NARCOTICS • BURGLARY • THEFT
/a\NJ.\LYSIS •
•
•
VICE
JUVENILE
TACTICAL
•
•
•
ROBBERY
HOHICIDE
AUTO THEFT
•
•
GENERAL PATROL
TRAFFIC
• HELICOPTOR
6 SPECIAL
ANALYSIS
HEPWlI2
•
•
•
CENTRAL
COHl1UNICATIONS
WARRANTS
am'if'~m~~
SUP~g'~~ALrl~!--_ _ _ _'"
UINlO:i'amMt\WUaD INl OFFENSE
HEPORTS
~ aDQDU~ «:U~ ~
• OTHER LAW ENFORCEMENT
AGENCIES
• PROBATION and PAROLE
• STATE HECORDS
I N I' lJ T
FIGURE 2-2
Possible Organizational Placements for the Crime Analysis Unit
Advantages Disadvantages
IPatrol I
D. • Usually good infonnal • Usually limited hours of
ccmnunication between operation
detectives working on
cases involving com- II Infornation tends to be
IlOn suspects and/or restricted to detectives
similar crirres
• Inadequate feedback to patrol
• Good participation regarding their input contri-
and reliance on butions
section by detectives
• Detectives subject to changes
in case load, can cause dis-
semination function neglect
developing a crime analysis operation. Fur- In summary, then, it can be said that the
ther, many existing crime analysis operations crime analysis unit should be placed high
began as part of a planning and research enough in the organizational structure to
division reporting directly to the chief of allow maximum utilization of informational
police or one of his immediate assistants. flow and resource development. This is
Ideally, a crime analysis operation is a staff probably best done by having the unit report
.unit under the field operations bureau. Pref- directly to a commander in the field opera-
erably, it should report directly to the bu- tions bureau.
reau commander of field operations. Figure 2. Staffing the Crime Analysis Unit. The
2-2 depicts varying organizational placement factor which most determines the success or
strategies. failure of a crime analysis unit is its person-
11
nel. The manner in which user groups nel, the overall number of sworn officers
perceive the crime analysis staff, and the may limit the size of the unit. This is
degree of trust that they place in it, will have particularly evident in smaller agencies
tremendous impact on the success of a where reassignment of two or three officers
newly-formed unit. Therefore, it is desirable to crime analysis would severely affect the
that considerable attention be given to the operating strength of an operations unit.
selection of personnel. Conversely, the overall number of opera-
The crime analysis commander should tions personnel will contribute to the volume
possess certain attributes. He must have the of crime reports which are generated, and
ability to get along with people and must be which ultimately must be processed by the
respected as to his integrity and confidence crime analysis unit. This becomes particu-
in police line operations. larly important if crime analysis also has as
There are a number of variable factors one of its responsibilities the "quality con-
which will act as determinants on the "size" trol" function of reviewing crime reports
level of the staff. For our purposes, it is and arrest reports.
useful to identify those variables and to
examine the characteristics of each. • Use of Mechanical Aids and Computers.
e Agency Objectives for Crime Analysis. More The hardware which is employed to store
ambitious program objectives require more crime analysis information will also contrib-
staff to perform the tasks. In this sense, the ute to the staff composition. If, for example,
administrator may have to "balance" crime devices, such as computers, are employed in
analysis goals with budgetary constraints- storing of data elements, then specially-
particularly when the program is new, and trained personnel also may be necessary-
yet unproven. If, for example, the entire such as key punch operators or computer
programmers. On the other hand, a sophisti-
crime analysis unit staff of three analysts and
cated system of manual files with extensive
a clerk is required to fulfill just the needs
indexing and cross-referencing may require
of the investigative user group, there would
be time remaining to address the needs of a larger number of clerks for updating and
maintenance. It is desirable that as many of
the patrol or the administrative user groups.
When user requirements exceed staff capa- the filing tasks as possible be delegated to
bilities, the agency administrator may have clerical personnel, freeing the sworn officers
to set the priorities for the crime analysis or trained analyst to concentrate his efforts
on crime analysis.
function, and in so doing establish a "man-
agement by objectives" principle. • Degree of Crime Analysis Sophistication.
• Crime Type and Volume. The scope of The use of mechanical data storage devices
criminal activity will vary from region to is tied closely with the level of crime analysis
region in terms of the types of offenses sophistication. This would pertain not only
which are committed, also their frequency of to the quantity of data elements which are
occurrence. Both of these factors will affect stored, but also apply to the various types of
the number of persohnel involved in the analytical processes which are used to com-
analysis process. For example, a metropoli- pare the MO elements of one crime to
tan city may be inundated with robberies,
commercial burglaries, and auto thefts. As a
another, and then to compare them with
known offenders. The more complex the -
consequence, their crime analysis staff will crime analysis operation, the greater the
be considerably larger than that of the need for larger numbers of officers or
farming community where crime analysis is analysts.
concentrated on fewer incidences of crime • HOUTS of Operation. Finally, staff size is
scattered over a sparsely populated area. directly related to the number of hours
The difference becomes even more evident devoted daily to the crime analysis opera-
when further compared to the operation of tion. In other words, an 8-hour day opera-
a small mountain county where crime analy- tion will probably require fewer personnel
sis is greatly affected by seasonally influ- than will a 24 hour operation.
enced crime, i.e., winter burglaries of moun- It should be evident that many of the
tain cabins. above variables are not only inter-related but
• The Numerical Size of the Agency. If the also mutually dependent. They will have an
agency administrator intends to staff the important impact on the size of the staff and
crime analysis unit with "in house" person- the types of specialists needed and should be
12
of major concern when staffing a CrIme sonnel provide fresh insights on offender
analysis unit. activity.
3. Selection Considerations fOT Staff The It is also important that crime analysis
qualification standards and selection proce- duties not be categorized as a "dead end" or
dures for clerks, secretaries, programmers, a "retirement job". If possible, assignment to
and key punch operators are generally set the unit should be made as an integral part
out elsewhere in established personnel prac- of an officer's career development. program.
tices and, therefore, they will not be in- The Chicago Police Department. Crime Anal-
cluded here. However, distinctions will be ysis Unit utilizes patrolmen who are about to
made between sworn officers who are as- be promoted to a detective classification. In
signed to crime analysis duties and the so doing, the assignments become an impor-
research analyst with no prior law enforce- tant stepping stone to the individual's career.
ment experience.
Under optimum conditions, crime analysis Officers who are applying for positions in
units should be staffed with representatives the crime analysis unit should submit at least
from each of the user groups, particularly three reports of crimes in which they con-
from patrol and investigation. By so doing, ducted the investigations 01.' contributed sub-
the staff will provide the unit with immedi- stantially to them. These reports should be
ate knowledge of what is "current" in terms evaluated in terms of the candidates' atten-
of operational problems, present operating tion to detail and written expression. It is
procedures, and specific needs. Moreover, it recommended that potential candidates be
also establishes an important informal com- given an oral interview and a practical
munications link and rapport between the aptitude test.
crime analysis unit and the working level of An excellent means of establishing analyti-
operations personnel. It is equally recom- cal skills would be to provide the candidate
mended that the officers selected for crime with five to ten crime reports with similar
analysis duty be rotated from the unit after a MO characteristics. Applicants' ability to cor-
maximum period of three years. Personnel relate offenses, identify similarities, or reach
rotations are desirable to gain fresh view- conclusions should provide considerable in-
points and new ideas.. Moreover, new per- sight to their potential. Essential qualities to
TABLE 2-1
Criteria for Selection ofCrirne Analysis Unit Staff
Esselllini characltri,l;Cs. SI!ollld be cOllsitlmd jUJllhal; Ihe enlldi,!ole who aPl"ars weak 011 all)' 01" oj Ih, chnrarleriJlics sh"uld I'robably }lot be al'IJOillled.
flighly Desirable·Desirabie chamclcriJlics. Should he col"i,lme/ as comple/llelllillg th' ol/"r qualilies. alle/IIII" 1101 a/l oj th,m lire lleers."'1)' for SliCcessJlI1 (areers ill crime aMI),is.
Trade,off' are Ixmible wilhill pach "hlll/ill," of Highly Desirable a/lll Desirable characterislia, alld beh",,"lh, Iwo "blllull,,".
II less well det·elolled m/,"city ill aile category call be /IIatl, "I' Jar by greal slrellglh ill aile or /IIore oj the olher.l.
Forc~ful mul Jkilljul mmwgemeut efm oJf.~1 Jome wrakllesJ in tile secom/ary chartlcteri..~lil·s.
SUbJfqlllmllra;nmg (aU be lINJlied in fOmc ca~".f to turn a weakness iuto a strmgth.
13
look for in screening applicants are imagina- sider broadening the base of the crime
tion and perceptiveness. Candidates must analysis staff by employing an analyst with
also have the ability 'to identify problems, research skills, especially when such skills are
isolate the contributory elements, and use not available in the unit or within the
good judgment to reach reasonable conclu- agency. The research analyst can give "bal-
sions. ance" to the staff by bringing together the
Godfrey and Harris in their manual, problems of crime, the experiences of sea-
"Basic Elements of Intelligence," prepared soned officers, and the individuals with
an excellent outline of personality traits training in research methodology.
considered desirable in the intelligence unit Contributions provided by the research
staff. Inasmuch as crime a\llalysis and intelli- analyst can be of considerable importance.
gence analysis are linked by a common They can aid in design considerations for
process of examining and analyzing criminal MO data storage systems which would sim-
activity, it is natural that the desired person- plify retrieval and analysis of criminal
ality traits for both groups of analysts be events. Furthermore, the research analyst
very similar. Table 2-1 is from the Godfrey can conduct specia~ request studies, statistical
and Harris publication, only the heading has analyses, evaluations of the crime analysis
been changed. , program, and projection studies of future
Finally, agency administrators should con- crimin~l activity areas.
...
14
-----------------------------------------------------------------------
II) J;<
6. DATE AND TIME OCCURRED-DIW Dro'E AND TIME REPORrED tl. LOCATION OF 0Ct.'URRENCE
I"
9. VICTIM'3 NAME LAST ,FIRST ,MIDDLE ,FIRM IF BUSINESS) i 10. RESIDENCE ADDRESS U. RES PHONE
ICOD&SFOR V~VICTIM W=WITNESS P=PARENT RP=REPORrING PARTY DC=DISCOVERED CRIME 18. CHECK IF MJRE
IooXFS 20 AND 30 NI\MES IN
CONTlNUATICN C
19. NAME-LAST,FIRST,MIDDLE 120. CODE 21. RESIDENCE ADDRESS 22. RESIDENCE PHONE
23. OCCUPATION
29. NAME-LAST,FIRST,MIDDLE
1
24
• RACE-SEX r 5
• AGE 1
26
•
DOB 27. BUSINESS ADD,'1ESS (SCHCOL IF JUVENILE)
33. OCCUPATICN 34 RACE-SEX 135. AGE 136. OOB 37. BUSINESS ADDRESS (SCHCOL IF JUVENILE) 38. BUSINESS PHCNE
1 •
148. SUSPECT NO. 1 {IAST ,FIRST ,MIDDLE) 149. RACE-sEXI50. AGE 51. HT152. \','1'1 53 • HAIR154. EYESr!>' ID NO. OR OOB 1.56. ARRESTED
YES nNO I'
157. ADDRESS ,CLO.l'HING AND Ol'HER IDENTIFYING MARKS OR OlARACTERISTICS
58. SUSPECT NO. 2 (LAST,FIRST,MIDDLE) 159. RACE-SEXJ60. AGE 61. HT162. WTl63. HAIR164. EYES165. ID NO. OR OOB 1~6. ARRESTED
YESnNOI
67; ADDRESS,CIDrHING AND OTHER IDENTIFYING MARKS OR CHARACl'ERISTICS 68. CHECK IF MJRE
NI\MES IN
CONTINUATICN r
REPORl'ING OFFICERS IRECCM1ENDING OFFICER ITYPED BY jDro'E AND TI!1E rUV1'lill BY
t'Ul<l'lllili COPIES
El~
~m= ~cr,
ACTICN 'IO
JUVENILE
DIST ATrNY =L
SO/pD REVIE.WED BY IDATE
16
form which provides the specific data ele- offense reports. Such reports are submitted
ments required for analysis. by the officer who initially responds to the
Where practical, the crime analysis section call for service at a crime scene. Other
should become involved in determining the reports that supply additional or supplemen-
data to be collected by the units of its tal information include arrest reports, fol-
organization. Thus, the analysis unit can low-up reports, field contact or interrogation
improve its analysis process by broadening reports, complaint/dispatch reports, and var-
the scope of its analysis and increasing the ious operational logs.
validity of its output. a. Initial Crime Reports. The initial crime
1. Departmental Data Sources. The majority report is the basic information concerning
of the data analyzed by a crime analysis unit location, victim, suspects, evidence, witnesses,
will come from its own police department. multiple offenses, MO, etc., and may be the
This data will be the most meaningful to only report associated with crimes that re-
crime analysis, as the analysis section can main uncleared. An initial crime report may
more readily manipulate the data being be an offense report, report of a crime
collected, influence its collection form, and against a person, report of a crime against
both determine and attempt to regulate the property, report of a crime against a vehicle,
quality of such data. The data received from etc. Data from crime reports will be used in
departmental sources may be a formal writ- nearly every analysis of crime carried out by
ten departmental record or informal infor- a crime analysis unit; therefore, special at-
mational data. tention should be paid to these reports. The
2. Written Departmental Records. The basic amount of detail collected at the scene of a
written records for the collection of informa- crime will greatly affect the analysis capabili-
tion used by ."\ crime analysis section are the ties of an analysis section. Many crime re-
Complaint-Dispatch Reports
Communications
Communications NCIC/State Crime Data
Teletype Reports and Requests
Statistical Data
Warrant Data
Field Records Distribution of De,partment
Interrogationsl Crime Reports
Contacts
Teletype Reports
Special
Investigations Statistical Data
Ad ministration Special Crime Data
17
------------------------------------------------------
FIGURE 3-4
Outside Departmental Sources of Crime Analysis
Information
Court FBI
ports are mostly narrative in nature and tion from patrol or detectives and have it
leave the amount of description of the crime supplied as a follow-up report.
scene to the individual officer (see Figure 3- c. Arrest Reports. Most of the reliable data
5), while other offense -reports require that on suspects or persons of interest to the
the officer respond to specific questions or analysis unit will come from the arrest
data categories about a crime (see Figure 3- process. Included in arrest reports are physi-
6). This detail of specific data elements and cal descriptions of the individual, current
data element descriptors is especially rigid in place of residence, drivers license, social
the check-off type reports as illustrated in security number, automobile owned, etc.
Figure 3-7. The narrative approach can be a These data are the basis of a known of-
problem for the analysis unit in that the data fender file.
presented are not in an easily extractable
form, and no data collection standards are
d. Field Contact Reports. Field contact
reports can be a valuable tool to the crime
..
presented to the officer as he is recording analysis unit. These reports establish the
the information. movements of persons of interest, develop
b. Follow-Up or Supplemental Reports. the existence of associations among suspects,
These reports are usually narrative in nature and help define what "people" activity is
and add information to that collected during occurring in various areas of the city. The
the initial investigation. The reports may relative validity of field contact repdrt data
come from either patrol, detective or special must always be kept in inind, as they are not
units. These reports include different cate- always exact or complete. A well-designed
gories of information, including changes in field contact card is presented as Figure 3-8.
crime classification of the event, case disposi- e. ComplaintlDispatch Reports and Opera-
tion, and evidence information. They may tional Logs. The utility of complaint/dispatch
provide the crime analysis unit with data reports and operational logs to crime analy-
elements about a crime that were missing sis will vary with the individual reports that
from the initial crime report. The analysis are used by various departments. Only in
section may request such additional inforrna- cases where the reports contain the total
18
FIGURE 3-5
Narrative Crime Report Example
POLICE DEPARTMENT
OFFENSE REPOID'
~ OF COMPIAINANT, VICTIM OR FIRM ADDRESS IPHONE NO.
TYPE OF OFFENSE LOCATION OF OFFENSE
DA'l.'E AND TIME OF OFFENSE I DATE AND TIME ARRESTED I DATE AND TIME BOOKED I ARREST NO.
~IAGE
RJI.cE HEIGHT
rEX
loWlliE OFEWlliE
IWEIGHI' ICOLOR EYES I COLOR HAIR
...
19
FIGURE 3-6
Data Specific Crime Report Example
I SEX I I -I
iicORElS - - - - - - - - - - - - - - - - - - - - - - - - - - -I - - I iitiS. -PiioNE- -+"'4-.-;UCR=.."CLAS="'S"'lF;;;I"'==I"'Cl'l~---Tn9-."DFd"'TE=""&-;T"'IME=.;;O"'F?oo:uRRENCE"""-=i'=;;----
IRACE_1
6 • VICTIM S CX:CUPATICl'l
\mERE OCCUPJlTICl'l
I
84. VEHICLE 0 BY OFFENDE:R> YEAA BOD STYLE • LIe. w. STATE lDl'NrIFYING MAlU<S
alED 0 BY VICTIM I I
20. REPORrING OFFICER I S NAME (PRlNI', 1""'-"""'" I ",. U.ll>'nUl.:l' I "". AP~ROVED BY 121. PERSON RilPORrING CRIME (SIG.)
I
(A) I
I 1J6. G1UO 129. REPORr PREPARED BY (SIGNATURE)
rl.
I
!ll)
28. REFERRED TO ISI<1<A'.I.\Jl<B
I
I
EDJRDED B< 125. INDEXED BY 24
1 •
STATISTICS
I
30. OISPCSITICl'l 0 CLEARED BY ARREST o
o EXCEPTIONALLY CLEARED o
UNFOUNDED
PENDING :~~~----------------------~BADGEw.---------~~~------_
,
ll4.02-33 (REV. 10/71)
..
~o
------------------II--'l--------------------------------------.r-----,....------
FIGURE 3-7
Checkoff Offense Report Fonns
BURGLARY CASE REPORT/CHlCAGO.OllCE
,1 Off Sfl LA55tH AiIOr.lION
nFORClBlE ENTRY
aUA MU B
DUNLAWFUl ENTRY
HECKEDI
0 AnEMPIED fORCIBLE
2.8 tOil: UNIT A55IGN£D r3. Bf"" Of OC.CURlI£NCf
j
400
AODRESS Of OCCURRENCE
"0 'NO fORCEI A70
Al>r.-NO~ : ...~4tE~~~URf~r-?E
ENTRY
. rIME I
r',~~:;~~ 0
.59 RESIDENTlAt
D~ES1DEN'E
53 GAR,AGE
O='cIAi"OV,",,,WN'--lO=r.Cl";;£Ac';N;:-.
21 ~?8~l 23 ~~gRE
_=±;".,..-l=--=-'-''--::::::'-_-'- 0~Dwm.
32 OffiCE 61 HOUSE
I
I
oc~::~ 2B
D~~N··T DOfUIlCH
13
D:roP~~
30
DLAUNDROMAT
'29
DOIHEA
99
la. VICtIM'S NAME IflRM NAME If BUSINESS, 13: BlisiNESS-PHONE
lB. PERSON WHO DISCOVEJi;ED CRIME (If VICIIM. WRIIE I·Sli!,u.CE 1~·~~j,r:T.jUillfvitl~lOaIiI""ON"'· API. NO.i20. HOME PHONE 121. BUSINESS PHONE
-VICtlMj
2~,obLSiJSED tN ,...AlING ENiRy------- 21, POINT Of [HIRV lEXAMl'lEtFIiONT DOOR,. 8ACS:; DOOR) 2e. POll'll OF UU 1EXAMPLE, FROf'l R. A t:.OOORJ
9~~ a""~
~
VfHlClE-OR-TRAiWfSiOlUl
D~&~~'Ws~g?N I Om ONO
CONlINU[OON
DREV(RSESIDE I DyES
VEHIClE OR fRAilER STOllf'll
0,.0
.
-
35~EXTRAt-OPIESRfcilljffDlNO_=_&-RfCiI'IE.;;nJ- -36.DAtf INVESTIGATION COMPLfiro
D"Y !~O. :y .. ITtME
I
39.suPERVISORAPE'R.OVINti STAR NO. ..-j-:-IxiRACOPIESifEol?:Rlo-fNO&-ilECiPiENtJ :...-: DATE tNV(STlGA.1I0N COMPlETED
,
: .. 0. ;"It.
~1, SUPERVISOR APPROVING ~IA.R NO
N:l J7.RfPORttili(;-ofi'fcu ,SIARN". lIJ.RtPORIiNG OHlCfR ",),REPORIiNGOffltfR 46. REPORIING OHiCU OAIC·-------'iiMr--
,STARNO. DMr---------r~----
O"y : ... 0. ~YI'I. I 1,",0. '1_. I
; : I
: : I
CPD-II.112IREV.3!6t.1
CPD-II.IIIIItEY. ~PG'J'
-I
crime report and require no additional field f. Special Grime Analysis Data Collection
report will there be data for use in crime Forms. In some departments special forms
analysis. Where the disposition of certain are devised to collect crime analysis data.
criminal offenses or activities can be com- These are usually aimed at collecting data on
pleted on a complaint/dispatch report, these a specific type of crime and the analysis is
reports must be reviewed by the analysis pointed to produce information to bring
section. In some instance's data on dispatch about positive results in the prevention of
or citizen complaint cards may indicate crim- the crime and apprehension of suspects. An
inal activity that is not being actively re- example of such a form is presented as
sponded to and repohed:.: An example of a Figure 3-9. This form is used by the Seaside
static response would' be a "close patrol" of Police Department in California for its bur-
an area or business that has reported suspi- glary prevention program. The form is filled
cious activity in the vi~initi out by the field officer in addition to his
FIGURE 3-8
Example of a Field Contact Report
,j, tolllnlll141S1611111'?o71n~'14lSU21lnIH3011nlll.n)6l1liltI4{l4141UH45"47I41lulsosdnSlS4lnS6S1IS1nl~"lnlul"u"61Ul6t1011lnI1l7.,sl"7111"1O
I
.
4 S, , • •
""_If-LAST NAME FIRST SEX RACE AGE I ADORESS-ResIDENCE
.r UOHE
OIiUltOATE
'.
IIIE'GIIT I WeiGHT I""'R
,ICOMrLEXION SOCIAL SECURITY NO,\ PLACE EMPLOYED/SCHOOL/UNION LOCAL NUMBER/ETC, I USU".L OCCUPATlotl
o I. HAT. IIllIHUC"1
t CU1\U IC.IlIIUIAllI"
Ii. r,oAIU
D1I01III"
INICKNAME
I
cRESS
I PRODATION
PAROLE
Ej o
~ OPERATORS LICENse NO I VEIIICLE PECULIARITIES I nu Of "M I MAKE MODEL InODy TYPE ICOLOR IVEHICLE IDENTlFIC~TlON NO" LICENSE NO. l~u:'r'olOl 1
YES 1\10
IN COMPANY Willi INAME, SEX, RACE. AGE, AODRESS}
O. z,
3
>, ., 3
~
EXPLAIN REASON fOR 5TOP. fINOINGS, DISPOSITION,
4
s s
6
~
7 7
8 DATE
ITIME I
BEAT I CENSUS I StRtAI. NO, I LOCATlCN Of CONTACT· HOUSE OR ULOCIC NO.-STREET I
AnN; OET~IL 8
9 STA:
t
LICENSE HO, .I
I I,l 4S, 7• , to n~IY13 ,:11.5 " III;,'::~~~L~1;r~I!4
ST. YEAR MAKE
17 H
•• "' COLOR
H" 211;~,LAST HAM'
19)0 JI,., 1114 U y 11l1" 40
""FIRST HAME
(1 fl 4)« 4S
,,I~lal.
46 41: ~ SOC~ SIR\,'n"',.l·"~J."I:.I, eX
"l,l~ ~ DAT: HRJ e SERIAL ~ 1;" 9
S2 U J4 n S6 S1,SI Sf.a'" u ,,:ul":'ul~I,I, ~ 71 n 314 n 1:~;~:~ =
22
•
FIGURE 3-9
Seaside Police Department Special Crime Analysis Data Collection Form
Burglary Data Research Sheet 17. Nethod of Enb:y (check one in each column)
(Fill out all known inforrration) (1) garage (1) front (I)_door (1) --.J>icked lock 'I
(2)-house (2)-back (2) winacM (2) forced enb:y
REPORI' IDENrIFIC/\TION (3 )-ccmrercial (3)-side (3) airvent (3) nonnal
-building (4) roof
1. Bep:>rt if _ _ __ 2. Block if _ _ _ 3. MDR ----yes _no
(1) (2) 18. Latent prints? ----yes _no 19. Tools? ----yes _no IF YF..8: --;;-;--=_
(1) (2) (1) (2) (kind)
REPORI'
a.m. (1) 20. Footprints: ----yes _no 21. Item.s left at scene? ----yes __no
4. Date reported 5. Tine rep:>rted _ _ ---'p.m. (2) (1) (2) (1) (2)
(=) (day) (yr)
IF YES to 21: Write 1..n ;u+..icle left _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
6. Watch 1st 2nd 3rd 7. Date a::mnitted
(i) 72J ""[j") (mo) :fran t i ) (yr) MERCHANDISE
(day)
22. Type of nerchandise
8. Estimated tine carmitted(l) 6:00 a.m.-11:59 a.m. (3) 6:00 p.m.-5:59 a.m.
(2) 12:00 p.m.- 5:59 p.m. (4) unknown (1) rroney (4) appliance - kitchen
(2)~ewelJ:y (5)--appliance - living :roan
9. Day of week: SlID M::m Tues Wed Thurs Fri Sat (3)_gIIDS (6) other:
(T) (2f (3) 74) (5j" 76J 77T (specify)
10. I\'eather condition at tine carmitted (check one in each column) 23. Value of stolen article(s): $0-50 $51-100 $101-200 $201-300
12. Classification: residential cc:rmercia1 autarobile 25. Age: 16 or belCM 17-20 21-26 27-35 36 or above
OJ m (3) OJ m m (4) 75f
other: 26. Sex: male female 27. School attended:
74) (specify) (lj (2) (specify)
13. Location of crine: 28. High school drop out: ---yes _no 29. Gainfully anp10yed ----yes _no
(House #) (Street #) (Apt. #) (1) (2) (1) (2)
PREX:III1.rIONARY ME:I'HODS 30. Is there other relevant infonnation not given above? ----yes _no
(1) (2)
Before burg1<n:y, had the victims:
IF YES:
14. Left the lights on ----yes _no 15. Gone on vacation ----yes __no (specify)
(1) (2) (1) (2)
~ 16. If yes to 15, had the paper been cancelled ----yes _no
C,)O (1) (2) -2-
r
l\:)
~
FIGURE 3-10
Denver Police Department Victim Analysis Report
1. 2 J 4 S
n n rL___n
_'
1) ~REPOR:L'MHIfll 2) c:H'ENS:E /lS 0RIGIN1\L!.Y 3) lS'l' ~0f'F. lFDCfT'. 4' VICI'IHK\RI'I7\L9IA'I'l5 5) ru:oa u:ve:t. OF CUM:: 6} NtH!.Dl. OF PEISlZS DMlLVED IN 7) E!APSm TD£ ~ CW£ 81 SPD::IF.IC urJ\:tlW Of'-Cf'1'nlSE
CXXED OfF. CCOlRRflCE 'IN BUIlD. 'DiE a::tflISSIOO OF 'mE CFFmSE ~ , ml'OKI.' TO POLlCE .IF IN RESlIfNl'IM. DiEtI..UC
OFH:::sES AS ORIGI!JII.l.Y
"""""'"or
,1m"""""
1-= o NJl' IN BlIIlDltlC
1 <>rue FLOOR
, ......" ,lOr"""""" OOIPturG:XlJRlN~
(where a\C IiJlre 2Sna& 1 l>foDlIAm.Y
''''''~
3 ornJIOD
4 wm:w(ER1
5 OIl-:ER_ _ ,sm:ml
2 2ND flllJR
, 3l<PFLOOR ,,,,,.,,
1 "'"
2 To<)
,rom
2WI'lHIN Im;a
31-12 KX.tlS
2:Dn'IJ!E DI'E1L1}l;. lIX.SE. AI'T••
lXIfIL.1oU\S'lHEto::Al'ICN
, BEIRX>t
""'=
5 smFLCOa
6 6'lU.FI.COR OR AIDI£
SF"'"
, SIX
4 1)-24 tJ:XJR;
S2-7~
68-14 Il\YS
4&\n[fIXM
5 uvm:: RlCH
7 """"""
arm llEl'ORIlD
7""""
a EIO!l'
715-31 t'A'iS
81.-3 KllrnS
6DDmc1lXfi
7 KlTCIlEII
9 NINE ORJOIIE 9 evER 3 ronHS B IDI OR ~oo RD1
9 arum (SPECIFY)
[] __ 0
9) SPfX:IFlC l.OCi\TIQl OF 0fnX5:e IF Qi' OR tiEAR 10) sn:x:IFlC I.CCATIaI or t:n'DQ.;
n
11) Wi'\S (XHoUSSICI< CF CfiS:s&
Q n
.12) VICrlM N:rNI:rJ PRIOR 'IO CU1RSE l3) VICTIM m.a.vm IN s:x:rAL
rl_____ ____
14) FIRSl' SllSPECl' m~VIOR ~ ~
0
n1IS 10 ca:uR lSI \IlCl'lH Clf'FDUJl. SCClAL Ul'll:RF.CI'IOO FRIo.<! 'lO OFf'I:GE
1eiItD:rIi\L PREMISES (~inside doull1ng) l1" CCCl.!RRm m PUBLIC PIJ,Q'; ll'tm'!RI.iPl'm OR A3:Rl1D IXlE: 1>Cl'.IVlTm> .PRIOI\ 'It) CFfll5&
n32:
_un 33
n 35
19} tt\'lWEOFVICl'lMllUtlRIl'S
_Un
36
20) N1I7URE:CFVICl'l.'!'Stcn.VERESISTAra:
~
31
~__ ~
211 PKI'ml"/laiS'I'AAa:ABU::"l'OCWiDl.
38
22) 11CW~nn'P.YGIlM:D
3 "'AID
(ident1ty~) E:tC. 3 u.a:AA1'1(lG/J:'t,N::ItIRE WXNr.6 3 WGrt FlO>! scn.E 3 PRPERlY S'rm'fDJM'\PXED WITH 300~~OR
orn:mER RESPCtittD 'l'O VIC1lM Ra.:.U:'Sl'.roR lNFaW.l'IGI 3 \'lCr1M/Of1E-lIER liEIL m:ciN 3 m.GS flU1 cum, Cf'~. 4BlUItSES. ctNl'lSICIG, 4 VEIlnAL FlESlSl'nC£ MrER'SlI:clI'IFICAT.ICN
"'AID '!OEN:lI~
4 on!ER """"" PUCIUlED BY
orr. SI'J\BSiD,
S!'Ri\n.S.JIBAASIa<S 5 P!n'SlCAL RESlS'I:A.o.n: 4 PII:ll'ElnY wr..s tJm)1E 4~'lllll:u:J!
4 VlCl'lM ~:ED SDNIO:: FOO CfmZER
5 Cf'FfN:at ~ SERIIIC:I:: FOR. VlC'l"L'i
4 ...~otER
500""_ _ _ _ '=)
JlE:Uam
I<7>!m
5 M."'UZ'l'O SE:lSOK{OrG'\NS.
BAAIN OR NER\.Ul3 SYST'E:i
GRESIStA.-aWlTlIUSECf"WE'JIPW
7 C1lHm (SPfl:lfY)
5 MFG. SERIAL t (not recorded)
, OlllER_ _ _ _ (SPOCIFYl """"""'"
5 UXilTDW't 1O:CSS BY'
6 VICl'IM 1\NIJ ~ lllJXXUlD 1'0 aat 0!'I1:ER IN A 5 WXN>m B¥ a.tI soor !. I!ll'm1AL DutlUES arm=<
N:N.scx::IRL SI'11.IA:rICN B'L otHER PERS:tHS) • ODlER_ _ _ _ 'sm:mrl 7 ODlER_ _ _ (S/'!t:IFll 6 NEl<l1lP£R'l'llHS: 0ll7am B'l
7 OIHER (Sl'fX:IFi) CFro"'"
39 7 onlER_ _ _ _ (sm::nYl
o
39 40 41 42 43 44
0 0 [J 0 0
23) Pm'SlCI\L SlXlliUTl IN crr.rt.ma. 24) II7.S PRPml"i IOSS/PEPSl'Wo lNltiRY JlnX.QD TIl '5) VICI'lM ~ lM~ ~ 11!E ~ 26) FIRST PEf&lI'l'O M\XE l'OLICE J..W.RE anus& a:Hl1T'llD 27) VICl'IM'S J\lNlIKU. P!astC\lll'S'itlIJUXrrCAL STM'US 28) l'a.ICE DISPOSITlai OF 'l1/E OfmtSE
SPa:l1\L l'H'iSICAL sa::tJRl'l"l t£nIXlS D-!PI.Oi"ED
OI'l..T~ , ""''''''''''''' D1..~mromw 'wr_ ,1m Rm)Rml
1 tn\E APPAPflll'
1 tor APPLICAB!.E
2 lIN:
Ot;..~lWO'
''''''''''''''''''
ltml\1'PLICl\BL!:
2 VICl'lfol DDlPACI'IAlDl
1 VIC1'%>!
2 lNINIIOLVDl wrtNtSS 2 tNER Tht"WEllCE OF AL'XItJL/tlIU:;s
3 nESTRICl'fII,IlWtDIaIPPEO OOE 'lO ll.UiESS/
'''''''''''''
2 DIttP'l'lCW.U.Y QXARED
3 lNAC'1'lVE ror
2". 3 fDl'IFIED POLICE 3 VICl'lJoI mA.."1.VF/FRIEND CW\llD)
,=
3 1o£X:ESS 'IO PKmrl'IVE WFJ\PQl
5 AIM>!
3 ro;NJr APPAPt:1I' 4 tCI'lFIED flUEND OR RE1ATIV&
ssooo:rr;.mFlO>!~
4 FOL!C& 0FFla:R
SSUSP!rl·
INJURY
4 />ell"ALLY DIS'll.!ImD, Sf.NlL&, PSYODLCXlla.u:r
4 QE.AAfD BY SI!G.E ADJI:r ARREST
5 CED.Rm BY SI!CLE .:1tlI.ImIIE J.RmST
6 PKlilSSIClW. SEa.:RI'IY PA:IroL 6~'IOPI.lRStl£mm::o. 6~CJ\LU.R 1W1IlICl\PPfl) 6 ctOJIDl BY tllL'fIPU; J\OOLT ARREST
FIGURE 3-10
Denver Police Department Victim Analysis Report (can't.)
45 46 011 48 49 50 Sl 52 53 54 S5 56 51 58 59 60 61
n ___ n n n 0 OJ OJ OJ OJ OJ CD
29) flEP.SQI fOR POL:IC1: DlSPOSma; OF CASE JCJ ~ ZOlo\.W 1JXlL1' SUSl'ECIS WERE: 31) a::w K\NY JtlVf%mE.st5PECl'S 32) taCru OF TlY.E FKl1 ClIin:>SE TO Am'IfSl' 33) WAS S'ItIUN PIa'ERTl ~ 34) WlG.ARlES R:'GBEP.IfS RAI'YJ'SD,tru. ASSA1JUlS 101lCIm:S 1.SS1.tlL'IS 0lUER n::LCHrJ::S
AImES'l'm FOR 'lHIS ~ ~ ARR£mm fOR 'tHIS tnDSE
.
ormitEE'O~..r:i'N:'h."l Ooor~AIlRfSr OfDrPD'ORlI.Il I'D!DERCF1\OOlT:rc::tW.~CIE.I\mIlm'
l.u.a.QF-tiDll!~ Q tmR&PCRIE:l/fm=: 5 ON.1l'~S lll-l1EDIAml:': 1 tm ~ PRPERlY S'ltlIDl Q-t: OR JoDIE ARRfSl'S IN a:wucrIOO wrm: 'lHIS CASE
2 VlcrDt REFUSm 10 ~ 1 , 1 , 2lil'lHIN 'lWJ 100RS 2ID
3 VIcrIM ruA~"'lCN UOOIRl
4ua:OFSt.5PICl:'lI:C.-~
5 uatOFCDllPtS w.rCl'I
,
2 1 2
J
1
•
)F1Oi2to24lD.lRS
"FKMI tv4 D'U'S
SFKM4to7001l'S
3US PJIRl'IP.Li!Ettl\Im't
4 Y£S 'l'trmL llIXDVEm'
(Cil to 99 ORAOOIIE)
n n n n n n n n n n n n ___ n ~
l5) ~ R:eBDtlIS ~- fDoIICIlE ASSAULT I./IRDoY/lllEl"!' AUl'O 'llaT :~C,/t(UX; OB!NK ARR&STS AS 36) I'm'SICAL.E.'I/IIlDCE CJlUD:Im 37) ~ 'IEO!tm!IA." CAlUD 'l1l O!IME sc:r:e 38) 9:UI:E CF susm::!'l' lDDr.'lFICATIm lSI DMSl'IGI1'lV£ nX:llmM 'WHIOI
c;u. ASSiIULT (aUlpWaggr,n.-ated) ~
LY"""",,"
A.l1l'mm.E flI:H CRIME sa:iE: FOR A'W.YSIS
orm"""""" orm""""""
===
o tm ml'ORIm 1 YES 1 J.Ol.OENI'IFIC1\T.lOO olmmraam
liIAT w.s 1m: N".H!ER CF PRe\."1;OOS AFllESl'S FOO'me SI.I.Si'Fl:l'S ARR£ST£D FOR 'lHIS
(0 - 9 CR ;:.mo.'E)
om:.~ 1 N:I;N:N:
2 B'i REPORl'm:; OiFlc:ER
3 Bt Ih'V£STIC1I:l'IN> m:m:'l'IVE
4 BY fOLIi:E E:VItflO.: 'llXlMClAN
5 w.l'E DlIma AND/OR VICI'lM
StBiITlm '10 A.'W.YSlS Nr tGI
2NJ
.=.
2 INFO...' .."
3 SEU" o:rftSSICl1
5'=
6 n:vmrlGAl'lVE'lmINlOOE
1 Ol1lER_ _ _IS!'fX:IN1
1 """""" sarIl'lC
2 Fnl<>l<'RINl'S
3~CfiAHn~
"KX> SlDrS
5 Pm'SICAL LINE: UP
6 U\OOIOO'OR:tA'W.\'SlS
6 ontER (SPEX:IFY) 1onlER_ _ _ ISPIClYI
17 18 19 20 21 22 23 24 2S
, , I I llnrrn
44)~OFVICl'lH
,.....,.
BUO< Drrux:-
TIm
S'1'REE1'
an:
,,'~
~
Ct
offense report. Another example of a special ment's crime analysis system. This type of
crime analysis form is the Denver Police information can iil...!icate the department's or
Department's Victim Analysis Report pre- the individual user's confidence in and reli-
sented in Figure 3-10. ance upon the information produced by the
If a department has a well-established analysis section.
reporting system that does not lend itself to 4. Outside Sources. In order to get a com-
the production of the types of data an plete picture of crime within a jurisdiction,
analysis section requires for its analytical data from outside agencies must be brought
functions, a special crime analysis data col- into the crime analysis function. Those areas
lection form may be introduced into the of information that are most useful to crime
operational reporting system. This collection analysis are disposition information, data on
form can be designed to specifically acquire suspect/known offenders, data on vehicles of
those data elements lacking in the normal interest, and other local jurisdiction'S crime
reporting system. analysis reports.
g. OtheT DepaTtmental Sources. There are Disposition information provides crime
other departmental reports that may be analysis with the current status of a particu-
useful to the crime analysis unit in its lar case or individual and allows the unit to
analysis function. These are reports pro- keep its records up to date.
d uced by various units, usually records or Data on suspect/known offenders and ve-
statistical units, and computer-produced re- hicles of interest further increases the data
port~ that are made for other police func- available to the crime analysis unit for analy-
tions. Included in this category are suspect sis and identification.
debriefing or screening reports. These types Some outside sources may be able to
of reports are invaluable in deriving an supply specific data elements that can be
understanding of how and why a perpetra- used in the department's crime analysis
tor committed a certain offense. They also process. If these data are specific to the
give indications as to the attractiveness of the crime analysis section's area (geographic and
object of attack, suspect MO, relationship to subject) of concern and can be directly used
police practices, etc. Reports produced for in its analytical process, they should be
use by the department's various units must considered for analysis. An example of such
be reviewed to determine if they contain data would be juvenile, family or gang data
data useful to the analysis section. from the juvenile probation authority.
3. InfoTmal Data Sources. informal depart- Those agencies or data sources which
mental sources include personal contacts usually supply information in each of these
with patrol, investigative, and undercover area are indicated in Table 3-2.
personnel. Also included in this category is
information from criminal informants or
"soft intelligence". This informal informa-
tion, while in most cases not appropriate for
quantitative analysis, can provide indications B. Data Collection Methods and
of possible subjects for further investiga- Procedures
tions. For example, an informant may pro-
vide a detective with information that, while Since the crime analysis section must de-
insufficient for suspect pick up or arrest, pend upon other units to collect its base
indicates that a certain person should be data, two areas of data collection are of
included in the known or suspected of- major importance. The first is the data
fender's file. This informal type of informa- collection process of the units which supply
tion may also aid in the determination of the data to the analysis unit; and the second is
underlying causes of events or trends that the data capture process of the unit itself.
the analysis section has been analyzing. It The crime analysis system must have ready
will also give the crime analysis operation an access to the data sources that provide it
indication of what other areas of crime with information. It must be able to influ-
should be specifically analyzed. ence the method of source data collection.
The amount, reliability and source of Further, it must develop a standardized set
informal information made available to the of data elements and a means of extracting
crime analysis unit may provide the most important data from the total information it
valid index to an evaluation of the depart- has been provided.
26
L
TABLE 3-2 mal sources of information are concerned.
Outside Sources qf Crime Analysis I11:formation By widening communications with a data
source, the analysis section can not only
INFORMATION SOURCE receive all of the already available data from
the source, but may be able to influence the
Sheriffs Office collection, procuring, and distribution of
Prosecutors
Disposition Courts data and, thus, increase the section's effec-
Information Probation tiveness.
Corrections 2. Integrity of CTime Data. To a large extent,
Parole
the reliability of crime analysis reports will
Pawn Shops depend upon the quality of crime data
Crime Analysis Gun Registration provided by operations units, such as patrol
Data Check Data
Credit Card Data and investigation. In other words, if the MO
elements contained within the initial crime
Sheriffs Office report are incomplete, inaccurate or not
Other Police Departments
Probation clear, it is possible that conclusions reached
Suspect/Known Parole may be erroneous.
Offender Data State Police Almost without exception, police agencies
State Identification and Intelli-
gence have some means of reviewing the reports
FBI which are submitted by line officers and
investigators. The issue for crime analysis to
Sheriffs Office
Other Police Departments determine is the acceptability of the facts
Vehicles of contained within crime reports. Do they
State Police
Interest Data
FBI accurately reflect what actually occurred?
National Auto Theft Bureau
There is great variance in the manner, style
Crime Analysis Surrounding Area Police De- and format of crime reports. Many agencies
partments and Sheriffs Off- rely totally on the narrative crime report,
Report
ices
which often leaves the manner of document-
ing the facts to the officer's individual writ-
1. Accessibility of Data Sources. The data ing ability. On the other hand, some of the
sources for a crime analysis unit are diverse larger agencies such as Chicago Police De-
in nature, but the majority of them are partment and Los Angeles Police Depart-
located within the unit's parent organization. ment have designed specific reports for
The varying nature of criminal justice re- different offenses which compel the report-
porting, feedback and recordkeeping makes ing officer to provide required information
it necessary for each analysis section to by having to "check off" or answer a series
determine what data sources are available to of relevant MO questions. In terms of crime
it and discover the accessibility of the data analysis, the latter system is the most satisfac-
I source for the specific types of information tory.
needed for its analysis. In addition, the It is strongly recommended that agencies
I amount of influence the analysis unit has on forming a crime analysis unit also initiate a
FIGURE 3-11
Miami Police CACHA Classification of Personal Descriptors
LDilS
=Cl!o:o~ses=t-,Es=tiJna",'
.o;t'otEX",o"'f:...A9=e'---_ ~~: =~i'.!i~fr- DISTINCrruPEARANCE 212. Hairlip _LI_PS_ 522. Large ~
01. fotlle 53. l\l:m(Both) 001. Full 214. Inpedilrent in Speech 524. Noticeable Different Size
"'02..,.~Faral.="""e'--='"'_ _ _ _ 54. Hand (Right) 003. Square Face 222. Protruding Upper 526. ThUITb Missing
- ~ 55. Hand (Left) 004. TriaIlgle Up 224. Protruding loWer 528. Fingers Hissing
01. White 56. Hand(Both) 005. Triangle IXMn 226. Thirt Lips 530. Rings on Ring Finger
02. Negro 57. Leg (Right) 006. round Face 227. Thick Lips 532. Rings on Fingers Other
03. Indian 5B. Leg (Left) 007. Rectangle 22B. '!Wists ~buth When Speaking Than Ring Finger
04. Chinese 59. Leg(Both) 008. Oval 232. Thick Upper 534. Left Handed
05. Japanese 60. Foot (Right) 009. NarroN 233. Thick Iower 536. Crippled Right
"'09::..:.""All=....:Dthe=""r==_ _ _ _ 61. Foot (Left) 010. Goatee MJUl'lI 537. Crippled Left
HEIGHT 62. Foot (Both) 012. Beard 236. Foreign Accent 540. Missing Right
01. Less Than 5 Foot 63. Wrist(Right) 014. Mustache 237. SOUthern Drawl 541. Missing Left
02. 5"0" to 5'2" 64. Wrist(Left) 0l7. Fu Manchu 23B. Fast Clipped S'I\M\CH
03. 5'3" to 5'5" 65. Wrist(Both) 019. Skin.lJead 239. Brooklyn Accent 562. Very Fa-t--
~~: ~:~:: : ~:f~" ~~: ~=~~~~f} :::.0"'22",.-'Pockmar===;~Eed'$;R,,------- ~:~: ==~~r~e ~~:: ~~ or Pot
06. 6'0" to 6' 3"
02. 100 to 120 73. Needle Harks 031. Short curley :.24:!;7"'•-....:S~t~ut!::!ter=s;.,.=_ _ _ _ _ 735. One Side Higher
03. 121 to 140
04. 141 to 160
74.
75.
vaccination (Right l\l:m)
Vaccination(Left l\l:m)
032.
033.
Receeding
curley 25B. False
~
756. Heavy
=UPPER
05. 161 to 180 76. Vaccination(Thigh) 034. Straightened Hair 260. Gold 757. foEcliun
06. 181 to 200 99. Nultiple Scars Over Body (Processed) 262. Pretty .!..:75~8:!..-,Thirti!:!·=--;;;=;;-____
07. 201 to 220 BIRrnNARKS, mLES, WARrS 035. Toupee 264. Irregular or Chipped KNEES
08. 221 to 240 01. Forehead 036. Wig 266. Spaces or Separated 772. Knock Kneed
:::.0",9'c...::,24",1""o",r",'",b",r.:;,e==_ _ _ 02. Eye (Right) 038. Bald With Fringe 268. Missing Top 774. BcMed
EYES (aJI.OR) 03. Eye (Left) 040. Sidaburns 269. Hissing Bottan 776. Straight
01. Blue 04. Eye(Both) 042. Kinky~fui.te Person) 271. Protruding Upper(Rabbit) -,-77:..:8::...-=S:..:ti==·f:::f===~_ __
02. Brown
~~: ~~1
05. Green
05. Nose
~~: ~~~~~f)
OB. Ear (Eoth)
019.
062.
Bald
Cr~edREHFJ\D
066. Short
272. Protruding loWer
m:
.=2",90",._V",i=sib=·=le=-;;=;;;;;;i'-y_ _ _ _ _
318. Clipped - -
~~~
LCMER LEGS
.!..:79""6c:..-=Thi=n'--;;;;;"""',,-_ _ __
06. ~Ia.roon or Black 09. ~uth(Between ~uth&Nose) 068. Boney 320. Square ANKLES
:::.0-"7.'-"'Se"'par=a"'te"'-ii~oclo;i;Ri"'rs"-----it ~~(Lips) ~~~: ~andHigh ~~~: ~:e~:~t ~~
01. Blond or Strawbeny 12. Face or Cheek (Right Side) FAllS 328. Double 806. Thirt
02. Brown (Light) 13. Face or Cheek (Left Side) 087. Cauliflower 330. Dirrpled 808. Boney
~!: :=(Dark) i~: ~:~ or Cheek(Both) ~~~: ~:;. Hearing Aid ~i~: = n g !08l!:-':0:!.• ....:S"'ti""·f;:f'--;;FEET=,.---_ _ __
05. Grey or Partially Grey 16. Back of Head 093. Wears Earring (fotlle) 012. Full Beard 822. Pigeon TOOd
06. White
07. Fed or Auburn 31. Chest
TORSO AREA 094.
096.
Ailputated Ear or Part
Bent Forward, Snall 342.
=
Large AdBms Apple
824. Large
826. S!ral.1
08. Dyed or unusual or O:ld 32. Shoulder (Right) 097. Bent Fol:Ward, Large 344. Thick !082!:-':8c:.• ..!.An"''''''u'''ta'''ted~-;;;;=,.------
COlor 33. Shoulder (Left) 098. Bent Forward, Nonnal 346. Thirt BODY BUILD
:::.0"'9.'-"'Bal~d".,(H"ai;5'r,,1'"es:;;:s"");;rn;:;..---- 34. Upper Back 100. Small 348. Giraffe 837. Slight
SCAffi (IDCATI(XoI) 35. IJ:Mer Back or Buttocks EYES 350. Goiter 839. ~Edium
HEAD AND NEJ:K AREA 36. SI:al<1ch 122. Blind UPPER TORSO 841. Huscular
01. Forehead 37. Hip (Right) 124. Crossed 361. LUIq? on Back 843. Large
02. Eye (Right) 38. Hip(Left) 126. COcked 363. Defomed ::.84""4"-.-=Squ=ar=;<e===,--_ __
03. Eye (Left) LDi3S 128. Cast 365. Paralyzed ClJMPLEXI(XoI
04. Eye (Both) 51. l\l:m(Rigm- 131. Deep Set 367. I.qlsided 852. Sallow
05. Nose 52. l\l:m(Left) 133. Squints 370. Stooped 854. Dark
06. Ear(Right) 53. l\l:m(Eoth) 135. Walleyed ~ 856. Light
07. Ear (Left) 54. Hand(Right) 137. Glasses 387. Large "'85""8::..• ...:F"'lo"'r"'i""d===-_ _ __
08. Ear(Both) 55. Hand(Left) 139. COntacts 389. Sunken CIDl'HING
09. ~uth(Between ~uth&Nose) 56. Hand(Both) 141. Oriental 391. Snall 869. Partially Dressed
10. ~uth(Lips) 57. Leg(Right) 144. Glass Eye 394. Protruding 870. Nude
11. Chin 58. Leg(Left) 146. Bloodshot 397. Hollow 871. Poorly Dressed
12. Face or Cheek (Right Side) 59. Leg(Both) 148. Different COlored SHOUIDERS 872. Well Dressed
13. Face or Cheek(Left Side) 60. Foot(Right) 149. Heavy Eyabrows 411. One Side Higher Than Other 873. Neatly Dressed
14. Face or Cheek(Both Sides) 61. Foot (Left) 150. Thirt or No Eyebrows 413. Sloping 874. l\Ore Unifol:lll, Nilitary
15. Neck 62. Foot (Both) NOOE 370. Stooped 875. WOre uniform, Police or
16. Back of Head Ol'IIER 152. Hooked - - 418. Wide Fire
17. Eyebrow (Right) 71. Freckles - - 155. Broken 420. Narr<:M 876. WOre Uniform, WOrkclothes
18. Eyebrow (Left) 72. Pinples 157. unusual Shaped UPPER APNS 877. WOre Coveralls
=.1",9.,--Im=;er=fiiLi~p~-;;;;;;;;-___ TATIXG 159 "Sniffer" 427. Large 878. Cap or Hat
TORSO AREA 80. On Neck - - 161: Flat 428. Sna11 879. Gloves or Stcckings on
31. Chest 81. On Chest 163. ·arge 429. Anq:>utated(Right) Hands
32. Shoulder(Right) 82. On Back 165. S!ral.l 430. Anq:>utated(Left) 880. Topcoat or Raincoat
33. Shoulder(left) 8834'. OnOn SS~_u:acher .1.6",7",-•..!.Has=h""ed""~,,",,,;;o;.; ; ; - 0 - - - - 431. Withered(Right) 8B1. Opposite Sex Clothing
34. Upper Back ~,n - ~ 432. Nithered(Left) 882. Hask
35. Iower Back or Buttocks
36. Starach
37. Hip (Right)
85. l\l:m or Hand (Right)
86. AIm or Hand (Left)
87. l\l:m or Hand(Both)
186. Dinples--
187. High
189. Receeding
434.
457.
Paralyzed
Cyst(Rigm-
= 883. NasI<, Silk Stocking
884. Nask, False Face
385. Tennis Shoes, Crepe Boles
38. Hip (Left) 88. On Fingers 191. Shall"" 458. Cyst(Left) or unusual Shoes
='-"'=="'------- 89. Leg or Foot (Right) 193. Bloodshot 460. Cyst(Either) 886. Nalre Up, False Nose, Etc.
90. Leg or Foot (Left) 195. Blue Veina 461. Cyst(Both) 887. WOre Religious Nedalion
91. Leg or Foot (Both) 200. Praninent Bones 463. Stiff and/or Chain
92. "Pachuco" "'02"'2;.:..""PocI<nru:=="".kcd=_____ E1JREAR.'1
98. Nultiple Tattoos Over Body 475. l\mputated (Right)
99. Hultiple ~larks Over Body 476. Anq:>utated(Left)
479. Defomed(Riyht)
480. Leforned (Left)
28
This is necessary to aid the crime analysis FIGURE 3-12
collection process in recognizing and captur- Information Validity Weighting for Crime Analysis
ing data elements from operations reports. Source Information
Another area of standardization is the
definition of sub-element descriptions. After
DATA ELEMENT DATA SOURCE
a crime analysis data element has been
defined, the manner in which the data WEIGHT
element is to be described must be estab- Physical
lished. This process must be carried on until Characteristic
of Suspect 1 Co~~aint Report
the lowest level of descriptor has been de-
fined. An example of this is the Miami 4 Field Crime Report
Police Department's GACHA classification of 10 Arrest Report/Data
personal descriptors as shown in Figure 3-
11.
The analysis section must determine the
level of detail that it requires for analysis or
that is available from its data sources. In all
cases, the most detailed level of description from its data sources, the analysis section
may not be a determining factor because the must extract that data and "collect" it in a
detail may add nothing to the analysis func- form that lends itself to analysis and storage.
tion or may be unavailable due to the The crime analysis unit must put a value on
reduction of the data before it is given to the each data element captured from a report
crime analysis unit. document. By doing so, a measure of the
After the data elements have been deter- validity is obtained from captured output. It
mined, the sub-elements defined, data ele- must be kept in mind that not using "soft" or
ment and data sub-element descriptors es- unreliable data in a statistically oriented
tablished, and data sources identified and analysis process is much more advantageous
weighted for validity, the analysis section to the analysis output than the use of every
must set criteria for the validity of data item of data, no matter how suspect its
elements and institute a methodology for nature. Because the elements of data used
collecting the data for analysis. by an analysis ~ection represent only a sam-
--:-if. Collection Methodology. An analysis of the pling of crime data (there are many more
data elements required and data sources crimes that are committed and not re-
available to supply the valid data must be ported), the more precise the data elements
carried out. This process will interconnect used, the more valid will be the analysis
the data elements and the available sources, output.
while determining the weighting factor to be Some processes within crime analysis are,
applied to t4e data sources. This weighting due to the uncertain nature of the data
factor is a scale of validity that can be available or the analytical question posed,
assigned to the particular data element and not statistical in nature. These processes seek
the data source. For example, our physical comparisons and evaluations that may indi-
characteristic of suspect may be graphically cate trends that the hard data cannot reveal.
FIGURE 3-14
Typical Crime Analysis Index or CTOSS Reference FIGURE 3-15
Methods Example of Purge Criteria
31
should establish priontles based on individ-
ual agency policies and operational needs, as
well as prevalent community crime prob-
lems. The crimes to be analyzed should be
decided by the individual agency. This text
will discuss the general suitability of various
Chapter IV crime types to analysis.
A large percentage of the offenses re-
DATA ANALYSIS ported to any law enforcement agency are
committed by persons who have committed
TECHNIQUES AND similar crimes in the past. If not prevented,
STATISTICAL these persons will commit similar crimes in
the future. These criminals have established
METHODS an MO pattern based on past successes. In
his recent book, Crime and Informational The-
ory (Aldine Publishing Company, 1970),
M.A.P. Willmer examines the criminal as an
A. Identification of Specific Crimes emitter of informational signals. Willmer
and Data Elements Most Applicable to believes that a systematic interpretation of
Analysis
TABLE 4-1
Universal Factors for Crime Analysis
CRIME ANALYSIS is most effective when ap- Burglary (class: business·commercial, resi·
plied to the class of criminal offenses where dential, other)
Robbery (class: armed vs. not armed)
a high probability of recurrence exists. Auto Theft (automobile, commercial vehi·
clc, motorcycle, etc.)
Single incident type crimes should be General Larceny (thefts from autos, auto
identified as not lending themselves to analy- • CRIME TYPE ace.s, scrap metal, dock. etc.)
Fraud (forgery, credit cards. confidence
sis. Most Part I crimes against persons, on games, etc.)
Rape and Sex Crimes (forcible rape, chi::!
the other hand, do not usually benefit from molesting, indecent exposure)
Aggravated Assault and Murder
analysis, with the notable exceptions of rape,
Location offense occurred
robbery, and related combinations of offen- Street address or intersection
ses (such as kidnap-rape, robbery-attempted • GEOGRAPHICAL nIock
Sub-reporting area or census tract
murder, burglary-rape, burglary-robbery- Reporting area, patrol area or beal
Zone, precinct, or district
kidnap). Analyzing the isolated criminal of-
Specilic time offense occurred
fenses has some value, such as gaining
I
Time span in which offense occurred (day.
knowledge of where these offenses are most • CHRONOLOGICAL night)
Day of week
likely to reoccur. However, this knowledge is Week of year
Month of year
usually difficult to utilize effectively for
Viclim person (sex, age, race, etc .. of
either preventive or suppressive purposes. victim)
• The crime analysis operation should direct Type victim structure (single dwelling
house, apartment, high risc j etc.)
its efforts toward those classes of criminal • VICTIM TARGET Type victim premise (commercial, indus ..
trial, pUblic, etc.)
offenses that the police function is most Victim purpose (sales, service, manur.1ctur..
capable of prevent.ing or suppressing and, ing, etc.)
Victim knowledge of sus peel
failing this, those offenses in which the
l
Name of responsible
criminal offender can be apprehended. Age of responsible
Race of responsible
The information coordination function of • SUSPECT Height of responsible
crime analysis serves to increase apprehen- Weight of responsible
Clothing and unusual characteristics
sion of criminals, while the analysis and speciliC license number
strategy formation functions serve to prevent • SUSPECT VEHICLE Make of vehicle
Model and year of vehicle
and suppress crime. DESCRIPTIVE { Color ofvehicle
The crime analysis operation must also Damage to vehicle
GElJGRI\PHlC
CRIME TYPE
lIND
[--"--lJ
. . . ....
TIME
...... .........
'rProPOOYI
I IDSS _ I
lll=mu..ru FACTORS CIASS, ~lQ2...R§.. 1Jl.~!U
Crime-specific factors provide information - =High Availability (75%-100%)
which can be used by the analyst to connect -- = !le1ative Availability (25%-75%)
--- = !J:M Availability (0%-25%)
crimes with similar characteristics and also to
identify MO patterns. Information regarding This figure depicts that information which
physical evidence may have considerable is typically available for analysis in a residen-
value in the analysis of several crime types, tial burglary case. The available information
such as burglary and auto theft. Thus, the evaluation must consider the specificity, ac-
suitability of different crimes to analysis is curacy, and value of the information re-
dependent upon the seven universal factors, ceived.
specific MO factors, and physical evidence. The analysis of residential burglaries
With these considerations in mind the differ- should be systematically directed toward ex-
ent crime types and classifications will be amining the following factors:
exami.ned in order to determine their applic- • Crime type and classification
ability to analysis. • Geographic factors
1. Residential Burglary Analysis. Although
residential burglary is one of the most diffi- I The FBI Uniform Crim~ Reports for 1971 indicates that 60% ofthe total number
of ;eported burglaries were residential and that 19% of the total were solved by
cult crimes for the police to prevent, sup- arrest.
34
• Property loss descriptors • Time factors
• Specific MO factors • Suspect descriptors
• Victim target descriptors • Suspect vehicle descriptors
• Physical evidence factors In this listing the informational factors are
presented in order of relative importance. It
should be emphasized that the above listing
TABLE 4-2
is for analysis purposes, The ordering of a
Crime-Specific Factorsfor Crime Analysis listing for investigative solutions would be
very different.
Type premise attacked (house. exterior 2. Commercial Burglmy Analysis, The analy-
IIpt., interior apl., etc.)
OccupiC;d vs. unoccupied sis of commercial or business burglaries is in
• RESIDENTIAL
BURGLARY
Point of clltr), (window. door. elc.)
Method of entry (pry door 01' window,
many respects easier than that of residential
SPECIFIC pipe wrench door. break window, etc.) burglaries, More pertinent information is
Presence of physical evidence (latent prints,
etc.) available to the analyst in analyzing commer-
Type of business attacked (fV store, cloth· cial burglaries. Commercial burglaries are
ing store, svgns. & loan, etc.)
Alarm information (no alarm, alarm dc~
more specialized and will exhibit more spe-
• COMMERCIAL feated, method, etc.) cific MO characteristics. The analyst has
Point of entry (window. door, roof, \-;a1I,
BURGLARY nODI', vent, etc.) more specific information regarding point
SPECIFIC Method of entry (window smash, loc~ in· and method of entry, victim target descrip-
break out, peel wall, etc.)
Safe ~1ttack method (rip. punch, peel, burn, tion, and property loss description. The time
drill, grind, etc.)
factors for commercial burglaries may be of
Type of business \'ictim (diner. bat" taxi,
savings & loan, gas stmion, etc) less value in commercial burglary analysis
Victim person descriptors (sex, racc, agc,
occupation, etc.)
than in residential burglary analysis since
• ROBBERY Type weapon used (handgun, shotgun, most commercial burglaries occur at night or
SPECIFIC knife, club, etc.)
Suspect mask and type (f.,cial area covered) during weekends,
Suspect. sl;:ltcment during commission (or
note), particular M.O. The commercial burglar is generally more
Exact location of victim (sidewalk, park, mobile than the residential burglar. An anal-
hallway, bar, etc.)
Victim person descriptors (sex. racc, age, ysis of commercial burglaries is not as re-
etc.)
• THEFT FROM Victim condition after attack stricted in geographical area as an analysis of
PERSON SPECIFIC SuspeCt particular M.O. (approach, night, residential burglaries. The commercial bur-
statements, ctc.)
Object of theft (cash, checks, credit cards, glar may travel a considerable distance to
jewelry, etc.)
attack a particular type of business, The
Area stolen vs. area recovered
residential burglar, however, is less discrimi-
I
• AUTO THEFT Exact last location (on·street, parking lot,
SPECIFIC
carport, sale.It lot, etc.)
Make, year and model of vehicle
nating because he has a greater n umber of
Degree of strippage and parts potential targets. Figure 4-2 depicts the
Presence or absence of physic,~ evidence
availability and informational value of the
Type victim property (business, personal,
usc, purpose, etc.) universal and crime-specific factors for a
Location of property (left unattended, in commercial burglary case.
• LARCENY vehicle, etc.)
SPECIFIC Specific property taken and market paten.
tial A comparison of this figure with that for
Suspect particular M.O,
Presence or absence of physical evidence residential burglary will reveal certain differ~
Check and credit card specifies (how ob-
ences, The analysis of commercial burglaries
I
I
tained, type, etc.) should be systematically directed toward ex~
Type business or person victimized
!.,
• FORGERY Document descriptors (stolen commercial, amining the following listing of informa-
SPECIFIC personal, etc,)
Type of identification used
tional factors:
Confidence game specifics (ploy used, etc.)
• Crime type and classification
Victim person descriptors (age, racc, sex,
occupation, ctc.) • Victim target descriptors
• RAPE & SEX
Location of encounter vs. location of de ..
parturc
• Specific MO factors
OFFENSE SPECIFIC Suspcct statements during commission • Geographic factors
Suspect particular actions or M.0. (include
relationship) • Property loss descriptors
Weapon or degree of force used
• Physical evidence factors
Degree of relationship between victim
and suspect
• Suspect descriptors
• AGGRAVATED AS-
SAULT AND MUR-
Victim personal descriptors • Suspect vehicle descriptors
Motive
DER SPECIFIC Weapon used • Time factors
Physical evidence
The commercial burglar may be the juve-
nile criminal, the addict, or the true profes-
35
sional. Each of these types provides a differ- FIGURE 4-3
ent set of factors to analyze. The above Typical Available Information Factors in an Armed
listing is a composite of the three types. Robbery
3. Robbery Analysis. Armed robbery of- r----l
fe'1ses also have good analysis potential. I S~ICJr--------
FllC'l1JRS ~----------j ~~
PHYSICAL
[ FIGURE 4-4
TyjJical AtJailable Information Factors in a Str01lfJ'-Arm
Robber)1 or Theft from Person '"
Auto. theft off7nders include joy-riders,
profeSSIOnal car chsmantlers, and wholesalers
of stolen vehicles. In many cases, until
apprehended, all of these offenders will
- = High Availability (75%-100%) establish and maintain a particular MO.
- - = l1el.aUve Availability (25%-75%)
- = IJ:M Availability (01.-25%) Helpful elements in analyzing auto theft
I~----l
---- cases are the availability of information, the
t
I presence of physical evidence, and the ability
- - - - - - - ~oks.CllLJ
SPEJ:lFIC
I MJ - -------
L:"~a:...J ._._' F/ICIOI\ of the property stolen to be traced. The
,, probability of universal and crime specific
,,, informational factors for a typical reported
,, auto theft case is depicted in Figure 4-5.
,
,.--~--. 'r---'-i Of special importance in this figure are
I PA:lPERI:Y I the geographic factors, suspect vehicle de-
I~RI
____ :J
~
scriptors, and property loss descriptors. In
37
analyzing an auto theft, the analyst usually operation must first restrict the number of
has information concerning two geographic cases and crime classifications to a workable
locations for analysis (location stolen and level. This may be done by classifying gen-
location recovered). Also, the suspect vehicle eral theft cases into special categories and
descriptors, property loss descriptors, and analyzing them by considering only special
victim target descriptors are all the same. MO factors. Logical subclassifications include
This greatly augments the analysis of auto thefts from autos, thefts of auto accessories,
thefts. In the following listing of general scrap metal thefts, bicycle thefts, shipping
priorities, the suspect vehicle descriptors, dock thefts, tool and equipment thefts, etc.
property loss descriptors, and victim target Many of the general theft cases received
descriptors should be considered of equal by the crime analysis section will be helpful
importance: in analyzing other crime types. For exanlple,
• Crime type and classification an increasing trend in automobile parts
CI Geographic factors thefts may have common perpetrators in-
• Victim target descriptors volved in auto theft and stripping.
• Suspect vehicle descriptors Due to the great number of possible
• Property loss descriptors crimes encompassed in· theft and larceny
• Specific MO factors statutes, a listing of informational factors
• Time factors and their values is difficult to construct. The
• Physical evidence factors following listing represents a more general
• Suspect descriptors set of analysis priorities than those previ-
In an examination. of specific MO factors ously presented, and may be useful in con-
in auto theft, the analyst will place emphasis sidering general theft analysis:
on the condition of the vehicle when re- • Crime type a11d classification
covered. Factors of primary importance in • Property loss descriptors
analyzing auto theft cases are the recovery • Victim target descriptors
location, make and model, and the degree of • Geographic factors
strippage of the stolen auto. o Specific MO factors
6. Larceny and Theft Analysis. Theft reports • Time factors
of a general nature are not usually well e Suspect descriptors
suited to analysis. Some benefits are derived • Suspect vehicle descriptors
from analyzing larceny offenses when spe- • Physical evidence factors
cific factors are selected; scrap metal thefts, Whether a crime analysis operation con-
for example, can be specifically analyzed. siders performing an in-depth analysis of
Another benefit in analyzing larceny offense general theft cases will be left to the discre-
is the possibility of correlating information tion of the individual agency. The analysis
to other analyzed crimes. section should have access to general theft
The problems encountered in attempting information for review, collation, and corre-
to analyze general theft cases result from the lation purposes. When particular patterns
tremendous volume of reported offenses, appear, the analysis section can undertake
the large number of possible crime types, specific in-depth analysis programs.
and the many possible MO patterns. In 7. Rape and Sex Crime Analysis. Rape and
order to analyze theft cases, the analysis sex crimes fall into two distinct categories,
(1) those in which the criminal offender is
FIGURE 4-5 known to the victim and (2) those in which
Typical Available Information Factors zn an Auto Theft he is unknown (stranger-to-stranger). Those
Offense cases in which the offender is known to the
- " High Availability (75\-100\)
- - " Relative Availability (25%-75\)
--- " lJ:M Availability (0\-25\) victim are of limited informational value to
the analyst. The in-depth analysis of rape
and sex crimes should be restricted to those
cases in which there is no apparent relation-
ship between the suspect and victim. Rape
\
, and sex offenses in which the victim knows
\ , the suspect are often crimes of opportunity.
\
\
r-~--, ' > - - - . , Usually a particular MO is not established by
I TDIE I these offenders. On the other hand, the
IL F=!lS
____ ..JI rapist or sex offender committing crimes of
38
the "stranger-to-stranger" type will usually reviewing forgery cases the crime analysis
provide definite MO information. These section should be able to forward informa-
cases are also more likely to result in prose- tion to a burglary investigator that a particu-
cution. lar suspect was apprehended passing a check
The habitual criminal sex offender will stolen in a burglary case that had been
establish definite MO patterns, making his assigned to t.hat particular investigator.
crimes well suited to analysis. The burglary In addition to serving in the apprehension
with rape motive, for exam )le, is particularly of offenders, analysis of forgery and fraud
well suited to analysis, as is the kidnapper- cases can generate information that is dis-
child molester. The advantages to analyzing seminated to area merchants in the form of
rape and sex offenses of the stranger-to- "Check Warning Bulletins". The use of these
stranger type lies in the seriousness of the bulletins can enhance community relations.
crime, it" relative rareness, and the availabil- FIGURE 4-6
ity of information for a particular offense or Typical Available InfIJrmation Factors in a Rape o'r
body of offenses. Other Sex Offense
The probability of universal and crime - ~ High Availiibility (75\-100%)
specific informational factors for a typical - - ~ Relative Availability (25\-75%)
- = U::M Availability (0%-25\)
reported rape or sex offense of the stranger-
to-stranger type is depicted in Figure 1-6. '----l
- - - - - - - -' PIIYSICALJ
As can be seen, the "property loss factor" ,
I =ENCE
I ___
L FAC'l'Ol\
_
has been changed due to its lack of applica- / ,
bility. / / " ,, VICl'lM
As with armed robbery, the suspect de- /
/
,, TARGE:!'
llESCRIP'IOR
scriptive factors are of primary concern to /
/
,
the analyst in examining rape and se~ offen-
ses. The victim descriptive factors are also of SllSPFCr
llESCRIP'IOR
I~J
I FAC'l'ORS I
CIIDID =s
l\ND CIASS.
TTlm
FAC'l'ORS
1:1,I RELATICl'l-
importance in analyzing rape and sex offen- L ____ J l_s::r:._..J
ses; in many cases, the perpetrator will The principal problem encountered in
restrict his attacks to victims of a certain age, analyzing forgery and fraud cases is the
'a particular race, or particular occupation temporal availability of information. In
grouping. The analysis of rape and sex many cases a delay of between three or four
crimes should consider examining cases ac- days to a mon th occurs between the time the
cording to the following listing based on offense was committed and the time it was
information availability and value: reported. For this reason analysis of forger-
• Crime type and classification ies should be limited to review, collation, and
• Suspect descriptors correlation comparison to recorded and ex-
• Specific MO factors tracted information. When a suspect is ap-
• Victim target descriptors prehended, this information can be retrieved
• Geographic factors to generate the appropriate investigative
• Time factors leads.
• Suspect vehicle descriptor~ 9. Aggravated Assault and Murder Analysis.
• Victim-suspect relationship Most criminal offenses constituting aggra-
• Physical evidence factors vated assault and murder do not lend them-
8. Forgery and Fraud Analysis. Forgeries and selves to analysis. The comparative rarity of
fraud cases can provide correlative informa- these crimes involving complete strangers
tion on other reported criminal offenses makes it difficult to plot and predict aggra-
such as burglary and strong-armed robbery. vated assaults and murders. To effectively
The analysis of forgeries is also aided by the predict aggravated assaults and murders, a
fact that most forgers are repeaters who tremendous amount of time and research
have established definite MO patterns. will be necessary.
Although forgery and fraud offenses are The information on reported aggravated
difficult to prevent or suppress, these are assaults and murders should be reviewed by
crimes that can be solved if available infor- the crime analysis operation to utilize its
mation is effectively utili7ed. The analyzed supportive functions of criminal information
information from forgery and fraud cases comparison and correlation. The intelligence
can be most effectively used by individual function of the crime analysis operation may
detectives or investigators. For example, by provide information crucial to solving a
39
murder case by generating investigative Befor:e the various techniques can be dis-
leads. cussed, several different things must be
In cases where the aggravateci assault or considered. These include the number of
murder is committed in relation to another data elements that are to be recorded in the
crime (such as rape-murder, robbery-mur- mapping, the temporal considerations that
der, etc.) the crime analysis operation can must be met, the retrievability of stored
perform a more detailed analysis based on data, and the number of maps to be main-
available information and communication co- tained.
ordination. The number of data elements to be re-'
corded on a map can dictate the technique
to be utilized. For example, if the case
number is to be recorded in conjunction
with the location of offense, a dot (color-
B. Gf·ographical Analysis coded, self-adhesive paper disks) map or flag
pin map can be utilized, whereas a typical
A geographic analysis is performed to color-coded pin map cannot. If particular
determine information not available in either MO factors are to be recorded, various
the original data element source (a crime color-coded and marked pins can be utilized
report for example) or the geographical for identifying specific MO patterns.
measuring device (such as a map). For In addition, the length of time a particular
example, when a pin is used to indicate a map or set of maps is maintained should be
crime location on a map, the relationship to considered. No set rules have been estab-
other reported crimes of the same type lished regarding map maintenance time;
becomes apparent to the analyst. Geographi- however, a number of agencies with opera-
cal analysis can be performed by mapping, ting crime analysis systems were surveyed.
graphical or statistical methods. Generally, the maps are maintained either
Mapping analysis techniques involve the for a one to three month period, or two
use of a map to depict the actual geographi- maps were maintained for each crime type
cal relationships between particular criminal (one on a weekly or monthly basis and the
events according to prescribed data ele- other on a year to date or quarterly basis).
ments. A pin map displaying the actual This decision should be based on the volume
locations of day or night residential burglar- of crime types for the area to be mapped,
ies over a given period of time is an example physical space limitations, the specific map-
of such a technique. ping technique adopted, and the number of
Graphical analysis methods include the maps to be maintained.
comparison of prescribed geographical areas Stored map data should be easily retrieva-
to a body of crime data. ble for use in comparisons of data. Pin maps
Statistical methods of geographical analysis can be recorded by photographic means.
categorize the total number of crimes ac- The use of two slide projectors to superim-
cording to location of occurrence within a pose one figure over another is one effective
number of prescribed geographical areas method of data retrieval. The use of color-
and reduced to percentage figures of the coded paper dots placed on acetate overlays •
total. covering area maps facilitates the retrieval of
Thus, a bar graph with 15 bars, each recorded data. Computer-produced, coded
listing percentage figures for a particular area maps can be of great benefit and are
crime type for different mobile patrol areas easily stored.
for a given time period, represents a tabular The number of maps to be maintained
presentation of percent of reported crime must be based on physical space limitations,
type by geogra phical area by period of staffing of the analysis section, the types of'
measurement. crimes selected for analysis, and the mainte-
1. Manual Visual Techniques. Manual visual nance period for each map. The agencies
geographical techniques involve a manual surveyed maintained from 18 maps to 3
process for the visual analysis of crime maps. There are five crime types suited to
information. This may include pin-maps, geographical analysis (burglary, robbery,
symbol maps, dot maps, or other means of special theft classifications, auto theft, and
depicting crime location. Several different sex crimes). In addition, two of these have
techniques will be discussed. logical subclassifications (burglary--<:ommer-
40
cial or residential, and robbery-armed or l. Cadillac = white with red dot
unarmed). Thus, a total of seven crime types 2. Chevrolet = yellow
and classifications is established. 3. Ford = red
The number of maps to be maintained by 4. Pontiac = pink
the crime analysis section can be reduced by 5. Other = red with white stripe
utilizing one map to record more than one The location of recovery and parts
crime type. For example, commercial and stripped is then designated by a pin coded
residential burglaries can be placed on the from the following:
same map by using different colored pins 1. engine = orange
for each type of crime. The incorporation of 2. transmission = purple
numbered pins of different colors can be 3. interior = pink
used to designate the type of premise at- 4. combination or other = dark blue
tacked. Armed robberies and strong-armed 5. no evidence of stripping = yellow
robberies can be mapped together by using The two locations and pin designators are
pins of a different color, dottec~ or striped then connected by a yellow string for pre-
pins can be used to designate the race of the vious period activity or a red string for
offender. Auto theft and recovery maps may present period activity.
be kept on the same map with recorded The following pin ma.p key for the armed
information on thefts of vehicle parts. robberies of businesses reveals a sophisti-
The number of maps maintained should cated mapping system. 3
reflect the needs of the agency according to The color of the pin indicates the race of
the volume of reported crimes and the the offender and also the number of of-
different data elements or informational fac- fenders:
tors to be recorded. Thus, the more detailed 1. Black-indicates 1 negro offender
the analysis, the more maps required. The 2. Blue-indicates 2 or more negro of-
actual number of maps to be maintained fenders
must be left to the discretion of the individ- 3. White-indicates 1 white offender
ual agency; however, a starting point for this 4. Orange-indicates 2 or more white of-
decision might be to consider keeping one fenders
map for each of the seven crime classifica- 5. Yellow-indicates 1 other offender
tions for the present period, on a weekly or (Latin, oriental, etc.)
monthly basis, and either keep the previous 6. Green-indicates 2 or more other of-
period recorded map or maintain a year-to- fenders
date activity map. Fourteen maps, therefore, The numeral on the pin indicates the
may be considered a point to work from. victim establishment type:
The crime analysis section might also 1 = bank, savings and loan
maintain specialized maps depicting the last 2 = cleaner
known residences and crime speciality of 3 = bus, train, or station
certain offenders. Other maps might depict 4 = delivery driver
the locations of those who deal in stolen 5 = drug store
property or narcotics. 6 = finance company
A number of the police agencies surveyed 7 = gas station
have developed highly sophisticated geo- 8 = grocery store
graphical analysis techniques based on varia- 9 = hallway person
tions of the pin map method. These include 10 = home and apartment
the Oakland Police Department, Chicago 11 = hotel or motel
Police Department, Detroit Police Depart- 12 = jewelry store
ment (7th Precinct), and several others. An 13 = misc. small business
illustrative example is the analysis possible 14 = medical offices
from a recovered (stolen and stripped) vehi- 15 = restaurant
cles pin map used in Chicag0 2 • The location 16 = taxi
of an auto theft and the make of the vehicle 17 = tavern, liquor store
is designated according to the following In many cases, particularly in departments
codings: with smaller geographical areas and po pula-
• Chicago Police Departrnem Detective Division Headquarters Operations Manual, 3 Chicago Polico Del'.lftmcllt Detective Division Headquarters Operations Manual,
Appendix C. Appendix r.
41
tions, aerial photographs can be utilized for grammed to plot the locations of the
pin-mapping purposes with positive results. crimes but can also indicate certain
An interesting variation of the pin map patterns.
technique is the use of small color-coded • The computer can be programmed to
target symbols to designate the time, type, provide regular printouts on a daily,
and location of general crime types. This weekly, and monthly basis.
method is particularly well suited to photo- • The computer can be queried to pro-
graphic slide recording methods. Color strip- vide printouts of combinations of differ-
ings or numerals can also be used with this ent crimes, specific crimes or composites
method to indicate the codings for property of all crime types.
loss indicators. For example: a light blue An example of a computer generated map
small home symbol with a red stripe would is presented in Figure 4-7. This is a reduced
indicate that the house burglarized was a reproduction of an actual map received
single family type attacked in the morning from the St, Louis Police Department. 4 The
or early afternoon and a firearm was re- original map is color coded (not shown in
ported taken; or a dark blue auto symbol the reproduced map) with red print indicat-
with a yellow stripe would indicate an auto ing first watch activity, blue print indicating
burglary committed in the late afternoon- second watch activity, and black print indi-
early evening and camera equipment was cating third watch activity. In addition, the
reported stolen. The informational content circles indicate areas of high activity deserv-
of this type of analysis is almost endless. ing special c<?nsideration. The computer is,
The use of self-adhesive color-coded dots in many respects, analyzing the data.
applied to acetate plastic map overlays is 3. Graphical Geographical Analysis Techniques.
another manual visual geographic analysis Graphical analysis methods include the com-
technique. Using large area maps mounted parison of prescribed geographical areas to a
on slides, the Dallas Police Department Op- body of compiled crime data. The compiling
erations Analysis Section maintains several of raw data elements into totals which are
crime type maps with the crime locations plotted on graphs can be extremely useful in
designated by paper dots on which the identification of criminal trends. This
report number is written. The color of the method of analysis is well suited to compar-
dots is changed monthly and the plastic ing criminal' activity of a given type in
overlay changed quarterly. The removed different geographical areas.
plastic overlay is then placed on a previous Two examples of graphic analysis are
quarter period map and the preceding pre- provided in Figures 4-8 and 4-9. The first
vious quarter period overlay is rolled up, figure represents a comparison of the total
although still readily accessible. This tech- reported burglaries for a prescribed geo-
nique avoid.5 damage to expensive wall maps. graphical area (such as a city or precinct-
Although the paper dots are only slightly district) which contains 10 reporting districts
larger than a typical map pin (approximately (such as patrol car areas).
l/l' in diameter), it is important to note that This type of analysis is useful when per-
a specific case number can be recorded on formed on a weekly basis for review and
each dot. The dot method facilitates the identifications of crime trends which might
compiling of lists of specific cases occurring go unnoticed on a pin map kept on a
in a defined area. This may be useful to a monthly basis.
detective who desires a list of cases about Figure 4-9 illustrates a graphic analysis
which he may interrogate a particular sus- technique for determining the relationship
pect. This method also makes the task of of the present year's crime and clearance
correlating other information easier by in- rates to those of previous years for a particu-
creasing the retrievability of information not lar crime type. The example, in this case,
recorded on the map. The analyst need only illustrates that between the seventh and
check the report as indicated to verify sus- fourteenth weeks the present crime rate was
pected similarities between crimes. significantly higher than the previous year's,
2. Computer Mapping Analysis. The use of but that it was somewhat less after the
the computer has several important advan- fifteenth week.
t~ges over the manual visual mapping tech-
nIques. • Pauly. G. A.• McEwen,j. T., Finch, S.j., "Comp~ter Mapping-A New Techni-
que in Crime Analysis," Law Enforcement &ietlte alld· Tethnology, Vol. I, Thompson
• The computer can not only be pro- Book Company, Washington, D.C.
42
7 5R
5R
7
58
5R
5A
7
5R
5R
3H
2 7
5R 7
<:>\' 5R 7
58
7
56
56
47 5R 7 7 58
7 5R
5B 6
:'fs
6
. l1/ s < •
~'SS/PP/
5R :
PRRT 1 I N0 E X CRIM E F/IVr;,,,
5R 4:
+ TeJTRL (752)
Re
~
7
5R
5R SR SR 3H7 7
5R 7
SR
6 7 :i 5R
6SR
~~~,
7
,; 58
t
58 4
6
7
6
~ 5R
38 38 58
58 5R 6
7
58 38 4
7 5R
SR 6 7
7 '7
6
SR §@ 58
6
58
6
58 58
;:J
\; \llGS~' ij>\HA~
t:
3H
5R
3H 58
7 58 5R 3H
5~R
5B~
SR - c. 7
5R 7 ",R S8
7 5R
SR 7 7
58 58
5R 7 7
58 8
7
'"'"wa-
'5
n.
7
2
3H
59
SR
7
3H 58
SR
5R 5R
S%R
5.Bl
58 SR
SR
G 7
lj
58
3'
5R 5R 4
4 6 38
7 38
5 SR 7 7 5R lj .
7 S~R @R 6
6
6 5~8 S8 6 4 38 3H
R 58 31-j58~t
5R 7 7 3.
31i SR
5R 5R SR
5R 4 7 SR 3H 3H
58 S~R 7 4
7 6
7
7
5B 38
SR 6 SR 7
5R SR
SR 7
4 SR 18
7 58 7 7
658 4
4 7
6 7
38.56
')3
6
SA
58
L (752) 7
HI%I~S!PP'
....ReductlOn
. . 0if a Computer Genera
FIGURE 4-7ted Crime Type Map
~
'R
5 ~R
~ SR 3H7
7 6 47
7
SR .7
5R 7 3H
5R 6 7
SR
6 3fl'
(JjJ~R
SR
3H
6 7 7
7 7 7
SR 7
5R 75R 5R
75~ 58
7 77 S8
58
7~pl-l
SR58 B
5R
5R 7
7 3H SR 7 5R 7
31-1 _ 3H SR7
7
~R SR
73H 3H SR
§1'l568 31-1 7 47 3H
7 5R SR 7
5R 4 SR
6 3H
5~ 3fj
7 6
7 ~R 6 S87
I~
58 B 5~AlI-I
58 5RSR 58
7 6 Siffi ~
'7 58 58 5R 58
; 58
i G
7 SR
4 6
SR 58 SR 13H 7
7 58 59
SR 38iR SR
38
38 5R
SR
31-1
4 58 1H 7 7
38 59
JEFFf:RSC\~
4 r.~ SlR 7
_11 58
6
7
SR
SR SR 7
7 38
7 5R
7
6 58 4
4 7
38
4
18.
58
7 6
6
SR
58
5!3 7 B
-,
7 :l
\'I\~t.?>
<'PPJ
11t%J~,.
R
311'
SR
3H SR
7 7 7
SR 7
7 7
SR
7
38
FIRST WATCH
Sf.CDND WATCH
THIRD WATCH
R
1,
1. 6 7
I SR
I
i!-t.
~
7
7
7
3~j
I '38
~, 1
,.
1;
FIRST WRTCH
Sf.CCJND WRTCH
THIRD WRTCH
43
FIGURE 4-8 determining where and for what purpose
Example of a Graphical Analysis of Burglary by Geo- tactical and special assignment personnel
graphical Beat Area should be deployed. For example, a percent-
N age analysis of purse snatch and strong
U 25
M 24 armed robberies for a particular city during
B 23
E 22 o = Residential Burglary a one-month period might indicate that 75%
R 21
20 I = locked Vehicle Burglary
of these crimes occurred in an area compris-
o 19
F 18 x = Business/Ccmrercial Burglary ing approximately 25% of the city. A
17 monthly manual-visual map analysis would
R 16
E 15 o identify this as a pattern, probably within a
P 14 o
o 13 o week or two at the most.
R 12 o 0
Tll o 01 Statistical geographical methods are well
E 10 o o 01 suited for computer operations but are not
o 9 o o 0 I 01
8 o o 0 X 0 IX 01 well suited to manual methods. Generally,
o 7 01 X 0 0 0 X 0 IX or
F 6 01 rx 0 or 0 0 X 0 IX r 01 statistical methods performed manually are
F 5 01 orx 0 or 0 X arx 0 rx r or
E 4 01
OIX
orx
orx
0
orx
01
01
orx
orx
orx
OlX
01
arx
orx
OIX
or 01
or ar
too time consuming as a primary method.
N 3
S 2 OIX arx arx OIX orx arx arx orx or orx On the other hand, statistical geographical
E 1 OIX orx orx arx arx arx alX orx orx orx
S 0 OIX arx arx alX alX alX alX OIX OIX arx methods can be a primary method in a
BEAT NO. 1 2 3 la system with extensive computer capabilities.
For example, a crime analyst working in
This type of plotted graph can also be an automated system might query a com-
useful in analyzing data for the day of the puter terminal regarding how many burglar-
week. This is shown in Figure 4-10. ies had occurred in a given area for a
4. Statistical GeograjJhical Analysis Techniques. particular period. The computer would pro-
Statistical analysis of crime information for vide this information almost instantly. Later
geographical areas can be very useful in the same analyst might ask the computer
FIGURE 4-9
Example of a Graphical A nalysis of the Present 6-month Period Compared to the Same Period of the Previous Year for
the Residential Burglary Rate
100
N 95
U
M 90
B 85
E
R 80
75
0
F 70
65
R
E 60
• P 55
0
R 50
T 45
E
D 40 ,
,. I
35 ~, I
0
F 30 '- -
F 25
E
N 20
S 15
E
S 10
5
0
WEEK 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
45
-----------------------------------------------------------------------------------------------
Figure 4-10
Example of Graphical Analysis of Reported Residential Burglaries by the Day of the Week
25
N 24
U
M 23
B 22
E
R
21
20
0
F 19
18
R
E 17
p 16
0
R 15
T 14
E
D 13
12
0
F 11
F 10
E
N 9
S 8
E
S 7
6
5
4
3
2
1
o Su Mo Tu Wd Th Fr Sa Su Mo Tu Wd Th Fr Sa Su Mo Tu Wd Th Fr Sa Su Mo Tu Wd Th Fr Sa Su Mo
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
46
area driving a white/blue Chevrolet. The the case if a detective obtained information
circumstances surrounding the contact might from an informant who had limited -knowl-
indicate that the card be forwarded to the edge of the crime and specific knowledge of
burglary unit. In reviewing the card, how- the suspect). The analyst working in a man-
ever, the analyst might recall that a WM ual system might require 15 to 30 minutes to
wearing a navy pea coat had committed an extract this listing from crime logs or card
armed robbery in another area. The particu- files. The analyst working with a well-pro-
lar robbery case could be retrieved and the grammed computer terminal would obtain
information correlated to the contact card. this information in a matter of a few sec-
Should this comparison provide additional onds.
information verification, the contact card The Miami Police Department has devel-
information could be forwarded to the rob- oped an extensive coding system based on
bery detail. the physical characteristics of known robbery
The analytical techniques employed by the suspects. Using a felony screening process
analyst will affect the number and quality of for these subjects, approximately 40 physical
correlations by pro,,:iding several points at characteristics are examined with over 300
which a memory recall response might be possible physically distinctive sub-categories.
initiated. The use of extensive crime logs can The extracted data is coded and cross index
provide one point at which a memory recall filed for retrieval purposes'. Using this sys-
response might be initiated as the data from tem a list of potential suspects based on the
a particular case is being extracted and available physical description can be ob-
recorded. Another memory recall point tained for any given robbery. In addition,
might be at the time a specific case is being investigative information is generated.
plotted on a map and the geographical Mechanical storage of MO data greatly
relationship to other recorded, cases becomes increases its usefulness and availability. The
apparent. Numerous other examples of t,his use of small computers for this purpose
type can be cited. facilitates effective utilization of the ex-
As with the techniques described above, tracted information. Several law enforce-
geographic correlations can be simplified by ment agencies are presently operating such
the use of crime location mapping. A com- systems. These include the Cincinnati Police
parison between residential burglary loca- Department, the Oakland Police Depart-
tions and proximity relationship to known ment, the Long Beach Police Department,
stolen property fences can easily be seen if etc. The Cincinnati Police Department, using
the dealers' locations have been marked. A a Miracode system of mechanical storage,
location map of known criminal offenders' has developed a coding system based on
residences provides a correlative means for physical characteristics and crime type in
determining possible suspects for criminal conjunction with a single print coding
activity in a particular area. method. By providing the machine informa-
The availability and retrievability of stored tion on the type of crime and physical
or recorded crime data greatly influences characteristics of the criminal, the analyst or
the analyst'S ability to verify correlations and investigator receives data on a number of
data collation generated by a memory recall the subjects fitting the input criteria. As the
48
patrol, tactical, and investigative personnel.
An example form for a DCR is presented as
Figure 5-1.
Since the DCR information is highly confi-
dential, it should be restricted to the use of
official law enforcement personnel. One
Chapter V method of satisfying this requirement is to
have the immediate line supervisor distribute
DISSEMINATION AND the DCR to his supervised personnel at the
pre-duty briefing. Another method of con-
UTILIZATION OF trolled distribution is to have a clerk or cadet
CRIME ANALYSIS deposit the DCR in each officer's depart-
mental mail box.
INFORMATION The DCR is utilized primarily for crime
suppression through officer awareness, in-
formation coordination through increased
involvement, and investigative review for
('DIlation and correlation.
A. Dissemination Techniques For optimum utilization, the DCR can be
used as a personal record for recipient
personnel. The department may direct per-
sonnel 'to retain the DCR in a loose leaf or
FOR CRIME ANALYSIS to be effective, the ring binder for a specified period (3 months
information developed from the analysis for example); thus, each officer is provided
must be communicated to those personnel with a personal record of reported crimes in
capable of utilizing it. There are various a reference log form.
techniques for performing this communica- The records and services division in many
tion, both formal anq informal. departments provides something very similar
Formal dissemination methods include pe- to a DCR. This material, however, is pre-
riodic publications, and scheduled meetings. pared by a clerk with little knowledge of
This type of communication is expected and what information is pertinent. The experi-
structured. Informal dissemination of infor- enced ~rime analyst should be the person to
mation results from personal contact and extract information to be condensed and
individual involvement. Usually, this commu- disseminated to user personnel.
nication is disseminated to others in unex- The greatest problems associated with the
pected and unstructured forms. DCR are encountered by the large depart-
For functional efficiency, most of the in- ments .. Problems such as large volume of
formation .disseminated by the crime analysis reported crime may make it impractical to
section will take a written form. The various condense and reproduce information for
written techniques for crime analysis infor- inclusion within the DCR. These problems
mation dissemination are presented in con- can be largely overcome by dividing jurisdic-
Listing of selected
DULY crimes reported during Information extracted Crime suppression
the previous 24 hour from reported offenses
CRIME period. Covering; and disseminated in rfficer awareness
crime type; classific- capsule form Information coordination
RECAP ation; date; time;
location; evidence; Investigative review
and M.O. factors.
WEEKLY
Report on crime rate, :':nformation extraction, Administrative review
percentage increses or Chief Executive
tabulation, comparison, Crime suppression
decreases to previous and correlation with Patrol supervisors
CRIME weeks and years, break- recorded information. line manpower deployment
dewn by area and crime Tactical supervisors information
SUMMARY Statistical breakdown
type. Selected problem and analysis. Investigative supervisors
areas. Presented with Strategy review & eva~uation
graphic representation.
"
~
III
tr.
H General crime information
WEEKLY concerning particular Information extracted conununity relations
areas and problems. Home from selected crime
PUBLIC alert information and reports, arres t reports, General public and Crime prevention through
special police programs. and supplemental reports. concerned citizens increased citizen awareness
NEWSLETTERS crime statistics for groups and involvement
public knowledge.
"~
III SPECIFIC Available information
III
H
on a particular major Information extraction Other law enforcement
MAJOR crime with a request and condensation from and criminal justice Criminal apprehension
for assistance to any a particular offense. agencies
CRIME agencey having additional
information
BULLEnNS
50
L _______________ _
FIGURE 5-1
Example of the Daily Crime Recap
7.2-7823,13 f.1ar,1230-'405 Golden Gate I i 3Pvprint' app. key used or lock woman's BULOVA watcht 067-
I 712P I Tue -1415IApt.9;old apt. I NA INA 'l*palm I slipped: neat search I jewelry, $25.00 in ,-705
3-782S- 13-t-! l. - - -th2.u!!.e~tnid:.bl~.£k; - - - - - - - - - -t _ _ _ _ _ _ , _ _ _ _ ~ 2f_d£a~eE.S_&_~~in~n~s..& _mi,s£._c2,i !l ____ ., __ _
S59P I Tue
ar
0900- 5511 Columbl.a I Nt-l 20 19.brn.hr. 66..-7 Chev 1 2 * i t I pry kitchen wl..ndow took, SONY cas.tape NFD
I 1_ 1530 ' single dwelling thin build NFO I 20-HT blk WI pr n small & JOO:d.size items. G.E. port. D & W TV 1167-
I I I 1 \'IF 18 19.bnd hr. 1 dam.rr 1 app. fled to adj .St. & 1 CANON 3Snun camera -317
3'-'18301" I3-Nar-1330- -+ - - - - - - - ., _d.Ei~e~ 2,f_v!!.hicle-l - - ____ 1____ r me~ s.i!,l_i!Lca!, ___ ., _·18_B~ £.&!i ~:'!.eyNKD_' _ _
614P Tut! 1_ 1630 ,612 So 39th St. NtJ 22 61160~ blk I ,doorknob channel lock front door rents & woman"SEIKO"1
I Apt. 0; new 1 leather coat, lace NA & tool I cased by knocking olli I w-watches;jewelry; 1 119 -
, apt. house 1 boots,blk floppy I Imarks,nol doors 1 asked wit. if BofA pers.checks in -708
I - - - ..!. T - - - - - ...!. - - - - - - - :T _h£.t.LPime. !.h~d~s_ -, _____ -IY E.rin~sr ;:J!!.a!!."_1iv!!.d_i !l ~~._....! _n~~:~O;!E2.,_H~r,;:i~t_l __
~iJ:321 ~u:arl:~~~ol ~!~.S~:3~!e St. app. same as above 1 I~O~~~~Ob same as above I S.O.&ENCO gas cards ,119-
. I I apt house I .NA . marks no' in name FOYE, John A -708
.2'-'7838 J.9=13Mar- - - I TlOl-Solono Av8J - - - - - - - - - - ' - - - - - -1- - -~- .... - - - - - - - - _ - _ ~ _aE.P!,._$~O.:..OQ. £a~h_ - , - -
I 634P Fri-Tue 1 UNK single dwelling NA 1 NA ;lPVprl.nt taped & broke 5 7 c1uded ZENITH port col TV 315-
I
I I '
- -- - .,. _ .,.. ____ ..1 _ _ _ _ _ _ _ -l _ _ _ _ _ _ _ _ _ _1 _ _ _ _ _ _ 1.____ L
1* 'I 1 side bathroom wl.lldow. I ser2kS14ll; WINC.12 1- 115
!a!!.s~c~ ~n.!:.i~e_h2u~e ___g~.Q.B_sh.g!!.;_t20!.s __ 1__
' 73=7989 :T2=1~Ma:2345 -1-;~~~o~a~~~;~~if'FORo-;- Leroy ilmi'i - - '-U~T-032-r;ClLgfoves&4 ;:!:~w£:!:;:2.;~ ;t~r; -. -N; L'o;s- - - '/ - - - T -
lallP Mon I , Power's TV INM9JulSO:KOIJ.72-009, 59Merc SW golf 1 grab disp1y TVs and I 5 port TVs recovered ,088
tele.alarm ITUOl>tP50N,ClY~: Lee J (towed) 1 club I split in vehicle. Arr. I by S.O. & retunled ,311
NM5Feb53 :Arr 13-l56b
< seized by 5.0. in county area to PR victim
173::'7999 - - - -,- ~ -:- - - - -, - - _1- iI!!.. £o!,.t£d;[,}_ - -:- - - - - - ~ - - - .1 pried metaT siding-at -I-appr. -$5,000'.00-in - ~0-6
1
82lP ,12-l3Mar 15;30- 788 Cuttl.ng Blq. app.large I I joint,exit via large I large truck tires 7
I Mon-Tue 1-0700, J & 0 TIRE 1 NA truck I NA I front doors :010 NOT 1 706
1 , SERVICE enter bugged office
Reported Thefts from Locked Vehicles
3-78191 13 Mar 0900-150 6th & Ohio , I 'break driver"s side'door appro 25 sets of' i 055-
I 670P Tue '-llOOILinen Delivery I NA NA ,~!VprIntlglaSs,enter vehlcle and, sheets and pillow '-706
_ ...... .:. _ _ _ .1.. _ _ rV2;Jl _ _ _ _ _ _ T _ _ _ _ _ _ _ _ ... ~ ... __ ... _ ..!. _ ~r_n~l,;:e~o,Ye_v!!.r!.O~5_lin~n __ ~ £,a!!,ee. !n_gE1....P!!.P~.r_ -1 _ _
3-7833 1 13 Mar 0945- 4300 r-tacdonald, lPVprint 51 pped HT wlondows to 5 books Blue Chip 117-
699P Tue 1-1300,WARO's parking I 3 NM JUv.s NFO ,NA ' Ireach k.nob: pass. door 1 stamps I -3l~
1 3-7834
L
T3-MarllOOlf-T:~0~~~~c~~nalif
T - - -.- - - - - -7 ----- ~l;v~rint'~ried
driv;r7s - - r ;.7INO;:-T;: 101- --'in~ 35;;;"-c~';r~ ~
699P 1 Tue 1-131S,:~Rgl~sP:~~~~g I 3 NtJI JUv.s NFO Nl\ 2* print Iwindow,prop.in view 1 & brn leat. case 311
3-7850T I3-Mar-1230-.L9th-&-NevTn-Ave T - - - - - - - - - -+ - - - - - -t _ ... - -ISroke pass7 w'ing-wrndow I ;;d;c- ~e; ~l~the; - -t - -
'702P Tue 1-1630'Macy's parking I N/A I NA INA Ishopping bags lying o n ' 1008-
166 }l'ord s-w rear seat in view 1 -702
Reported Armed Robbe ries
112967 San Pablo MH 25 5'6" 165# , 'suspect approched PR 1
~~~~90: l~u~ar 1 1715 1TACO BELL diner: ~~~;~~~~!!!~~r!~tr, ~~id~;~pel ~:~~~=~ds~:~~ .~~~n g~~
&
and juveniles, major cnmes not usually on tion from these various sources IS reviewed
the DCR (such as attempted murder of and condensed by the crime analyst. An
policemen), information on known of- example of a DIB is presented as Figure 5-
fenders, af?d general service information 2.
such as patrol advice, etc. The information Like the DCR, the information contained
contained in the DIB is extracted from in the DIB should be restricted to distribu-
miscellaneous reports, information received tion among law enforcement personnel. The
from individual patrol and investigative per- DIB is utilized primarily for criminal appre-
sonnel, other jurisdictions, and administra- hension, crime suppression, information co-
tive or supervisory personnel. The informa- ordination, and officer awareness.
51
FIGURE 5-2
Example of the Daily Information Bulletin
NEED C.C. CARDS ON TWO S/A MALES, NO FURTHER DESCRIPTION, IN A DARK BLUE OR
BLACK CHEV. STATION WAGON, PARTIAL LICENSE # 4211, PREFIX LETTERS UNK.
THESE SUSPECTS POSSIBLY INVOLVED IN A BURGLARY AT 2627 ADAMS RECENTLY.
OFFICERS IN THE VICINITY OF 4300 ONIEDA, THE RED SEAL POTATO CHIP CO. BE ON
THE LOOK-OUT FOR THE BELOW DESCRIBED SUSPECT & VEHICLE WHO HAS BEEN STEAL-
ING GAS FROM THE CO. LOT & ON THE LAST OCCASION, TRIED TO RUN DOWN SOME
EMPLOYEES WHO ATTEMPTED TO DETAIN HIM.
1. N-M, 25-30 YRS. OLD, 6'4" 180 LBS. & WEARING A BLACK FLOPPY HAT. ON
THE LATEST INCIDENT, HE WAS DRIVING A FASTBACK BEIGE MUSTANG WITH A
BLACK STRIPE, TP# 11315-G & HAS BEEN OBSERVED IN THE PAST DRIVING A
1959 GREEN CHEV, NO FURTHER DESCRIPTION. APPARENTLY THIS HAS BEEN
GOING ON FOR A MONTH OR MORE.
OFFICERS IN THE E. COLFAX AREA BE AWARE OF THE BELOW SUSPECT WHO, ACCORDING
TO DISTRICT THREE, IS RESPONSIBLE FOR NUMEROUS BURGLARIES IN THE CAPITOL
HILL AREA.
1. EUGENE D. ET' I r ,9-6-51, DPD# 151853 OF 1220 EMERSON #20. PRIORS
FOR ROBBERY, BURGLARY, CCW, AWDW, T.F.M.V. & NARCOTICS. ALSO HAS AN
EXTENSIVE RECORD FOR VIOLENT CRIMES WHERE WEAPONS WERE USED. USE
CAUTION WHEN APPROACHING THIS PARTY.
INFORMATION FROM DISTRICT THREE IS THAT THE BELOW LISTED PARTY IS A SUSPECT
IN DAYLIGHT APARTMENT HOUSE BURGLARIES & HAS A PRIOR RECORD FOR BURGLARY &
NARCOTICS.
1. EDWARD S. W","luIlh'", 7-2-53, DPD# 18860, N-M. OF 1410 PEARL & IS KNOWN
TO ASSOCIATE WITH~'
A. MICHAEL A. ~, 1-13-51, DPD# 188582, U.S.W.M. LONG LIGHT BROWN
HAIR WITH A DARK BROWN FULL BEARD & MUSTACHE, HIPPIE TYPE & ADDRESS
UNKNOWN.
FURTHER INFORMATION FROM DISTRICT THREE IS THAT THE BELOW LISTED SUSPECTS
ARE POSSIBLY ACTIVE IN BURGLARIES DISTRICT THREE, HOWEVER, LIVE IN DISTRICT
TWO.
1. STANLEY A. =6" . , 8-11-52, DPD# 157462, N-M, OF 3049 KRAMERIA & PRIORS
FOR NARCOTICS USE & POSSESSION.
2. ROBERT~' I' ,7-1-49, N-M of 2930 LEYDEN.
3. JOSEPH M. e 6 i Ii AKA: PEACHES, 9-1-54, DPD# 180174, OF 3015 MONROE.
USUALLY CARRIES A GUN & HAS PRIORS FOR ROBBERY & BURGLARY. ALSO IS A
FEMALE IMPERSONATOR. SUSPECT #2, PROBABLY IS HIS BOYFRIEND.
52
The DIB, unlike the DCR, has limited because criminal investigation may be subject
temporal validity. The information on the to pressures causing this important function
DIB should be repeated for a few days, then to be neglected. The crime analysis section is
deleted. The DIB is not as suited to reten- better prepared to correlate information on
tion for record reference as the DCR; thus, specific criminals and reported crimes.
the DIB may be disposed of by the recipient Different departments utilize KOI's for
officers. various purposes. The use of K01's can vary
In many departments the DIB is produced from an aid to apprehension of criminals to
by the records and service division. As is the community relations. Most law enforcement
case with the DCR, a clerk is often assigned agencies utilize K01's solely for official pur-
this responsibility. The crime analysis section poses. Many departments do not allow indi-
should assume this function to increase in- vidual field officers to use a KOI for in-field
formation correlation and coordination. photo line up identifications.
Again, the problems with the DIB are the The Denver Police Department is an ex-
same as those encountered with the DCR. ception to the above restriction. Field offi-
The possible solutions to these problems are cers, during the preliminary investigation of
similar to those offered for the DCR. robberies, may display photos in the KOI
3. Known Offender Identifiers or Suspect MO based on supportive information received
Bulletins. The Known Offender Identifier from the victim or reporting person. Offi-
(KOI) contains information on known or cers are instructed to place the photo of the
suspected criminal offenders with: a pho to principal subject in a group photo before
of the subject, crime specialty, aliases, past displaying the photo to a witness. Should an
arrests, addresses, criminal associates, vehi- identification be effected, it is not, in most
cles, requests for field contact information, cases, authority for arrest; but the same
etc. The information contained in the KOI is group of photos is then taken to the robbery
received from individual officers, arrest re- investigators as potential evidence. The in-
ports, offense reports, supplemental reports, vestigator should conduct the case from that
field contacts, etc. Several examples of K01's point.
are Figures 5-3, 5-4 and 5-5. The Oakland Police Department utilizes
The KOI is used primarily for: criminal K01's for what can be considered public
apprehension by offender identification, in- relations purposes. A KOI containing photos
formation coordination on the identified and names of habitual shoplifters is distrib-
offenders, and criminal suppression. The uted to the security sections of department
value of DCR and DIB can be augmented by stores and area merchants. The recipients
the KO!. Suspected or identified offenders are admonished regarding the limitations of
can be referred to in the DCR and DIB by the KOI, but are encouraged to let the
KOI reference number or date. known offender encountered know that he
Like the DCR, the KOI has excellent is identified as a known shoplifter in an
temporal validity. The KOI bulletins should effort to persuade him to leave. The results
be retained and kept in binders or note- of usage of the KOI in this manner can gain
books. One department publishes its KOI in merchants' support for the police agency.
" notebook size with an individual subject on
each page; this facilitates filing either alpha- The KOI can be either published weekly,
betically or by physical characteristics, and monthly, or on an as-needed basis. One
provides space for the individual officer to department has adopted a method in which
update the information on a particular sub- a set number of individual K01's are pub-
ject. lished weekly. The Tucson Police Depart-
Other departments publish K01's accord- ment publishes 10 per week and individual
ing to crime type or specialty, or by physical officers are encouraged to personally main-
characteristics. The examples presented can tain a field file of 150 of the most active
be considered as representative of the three known offenders.
types. The problems encountered in using K01's
In many departments, K01's are either can largely be eliminated by training person-
publisheci by the criminal investigation divi- nel in their use. Officers can be admonished
sion (or individual investigative units) or the regarding the restrictions required within
. intelligence section. This function should be the regional interpretation of existing laws.
performed by the crime analysis section If officers are instructed that this valuable
53
-------------- ------------------------------------------------------------------------------------
FIGURE 5-3
Example of the Known Offender Identifier
...--
.... I
I
..
'\
\
--
tA' \
/ '- '\ ./
C. R. GAIN ..................... ..
--...... ./
" • • •.. - L
PUBLISHEO BY CRIME ANALYSIS UNIT • ..... 455 7TH STREET •••••• TELEPHONE 273·3741
October 1970
DOWNTOWN OAKLAND STORE BOOSTING OPERATION
The persons listed on this bulletin constitute a loosely knit group of
shoplifters operating in the greater downtown Oakland area. Although
they are not members of any formal gang, these individuals, for the
most part, know each other and often work together. All have numerous
arrests for shoplifting.
These persons spend many hours in the downtown area looking for' the
opportunity to steal. They favor ladies' dress shops'or the bigger
department stores which have a large selection of clothing. They have
a good knowledge of clothing, taking women's knit suits and dresses
as well as men's suits and sport clothes.
The shoplifters usually will enter a store in a group of two to four
persons, then separate, making it difficult for store detectives to
observe them. Most are "grab and run" thieves who, when they can,
merely grab an armful of clothing and flee out the nearest door.
Other members of the group simply wander ~bout until they feel they
are unobserved, then quickly secrete merchandise on their person and
walk from the store. These thieves will vary their method of operation
somewhat by merely picking up an object of merchandise and walking
unobtrusively from the store with the item in plain view.
The best methods of protection against this operation are as follows:
1. Know the thieves and be able to recognize them when they enter.
2. Immediately assemble enough personnel to effectively watch the
suspects.
3. Have someone call the police and request that an officer be
assigned to assist.
4. Make your observations obvious, even to the suspects; this may
cause them to leave the premises.
5. If possible, let them know you are well aware who they are.
Calling them by name is very effective.
tool can be lost through misuse, they will be ments to distribute known offender informa-
more likely to respect its confidentiality. tion on a precinct or district level.
Again, problems of increasing numbers of 4. Weekly Crime Summary. The weekly crime
known identifiers may cause large depart- summary issued by the crime analysis section
54
FIGURE 5-3
Example of the Known Offender Identifier (con't.)
V" .
I
r
l
,I,
,,i'
ER, Douglas O. • ER J Rufus C. KS, Roland H .
MN 30 Jun 45 MN 23 Sep 38 MN 22 Oct 48
6'2" 160 Brn blk brn 6' 1~" 165 brn blk blk 5' 6" 150 brn blk Dk
CII: 2391335 cn: 1208306 ClI: 2813863
AKA: Charles WILSON
IIDE WITT"
"" .
[ !IN
CER, Melvin
7 Jan 49
5' 10" 135 brn blk brn
CII: 3240902
AKA: "Boo Barker"
MN
5' 8"
ClI:
AKA:
KS, Donald M.
3 Jun 47
130 brn blk brn
3271390
Ilonald MILLER
MN
~ICK,
9 Mar 36
Ulysses
2
UlY5es DOMMINICW
3
represents the publication of analyzed infor- Unlike the nCR and confidential informa-
mation for a one week period. It contains tion, the weekly crime summary does not
information on increases or decreases in contain any information of specific crimes. It
crime rate when compared to the previous may contain beat and shift breakdowns of
week or the same week of the previous year, various crimes in conjunction with map rep-
'in the form of graphs, statistical breakdowns, resentations, but this information is intended
general crime trends and problem areas, and for executive and supervisors use. The strat-
other crime information. Two examples of egy formulation of patrol, tactical, and inves-
weekly crime summaries are presented as tigative supervisors should be a result of this
Figures 5-6 and 5-7. crime analysis informatjon.
55
FIGURE 5-4
Example of a Known Offender Identifier
Uses of the information contained in the c~anges in deployment priorities and tech-
weekly crime summary include administra- mques.
tive review, crime suppression through line The weekly crime summary can be used as
man po,yer deployment, and supervisory the basic source information in a weekly
strategy evaluation. By receiving this infor- formal staff strategy review meeting with
mation, field supervisors can make timely attendance limited to midlevel supervisors
56
FIGURE 5-4
Example of a Known Offender Identifier (can't.)
-1-
U. S. WHITES
10, Daryl, Jr., DPD 180649,
IT!', Stephen aka "Poet", DOB 7-1-53, USW, 5'5-, 120, brown
DPD 179404, USW, 5'11", 155, eyes & hair. 885 So. Decatur. 7-11
Brown eyes, brown hair. Last stores.
address 3701 So. Santa Fe.
Assoc. Harold Whatley. 7-11
Stores & other small grocery
stores. DOB 10-5-47.
~f~
,EN, George F., DPD 175106, 'IN, Timothy M., DPD 121808,
DOB 7-4-38, USW, 5'7", 135, DOB 10-4-48, USW, 6'1", 160, Gray
blue eyes, brown hair. eyes, brown hair. Paroled 10-22-71.
. .:rO, Mike, DPD 170986, DOB .ES, Larry T., DPD 156290, DOB
8-14-51, USI'l, 5'10", 170, Brdwn 8-11-52, USW, 5'9", '155, brown
eyes, blonde hair, 2501 W. 17th eyes, red/brown hair, 190 So. Dale
Ave., Paroled 7-31.~2. Ct. Assoc. Daniel Martinez, Solo-
mon Martinez.
OR, Michael R., DPD 166096, .~OK, Gabor George, DPD 178421,
DOB 11-15-45, USW, 6'1", 185, DOB 10-26-54, USW, 6', 145, brown
brown eyes, brown hair. eyes & hair. Paroled 6-10-71.
Paroled 3-1-72.
[
JON, Byron K. aka ' Biff' , .AN, Terry W., DPD 107631, DOB
DPD 93288, DOB 1-23-44, USW, 6-2-44, USW, 5'9", 151, blue eyes,
6'4", 225, blue eyes brown hain Medium brown hair. Paroled 3-1-72.
1112 Broadway (hotel~. Super-
markets, is a narcotic user.
57
(J1
00 FIGURE 5-5
Example of a Known Offender Identifzer
o o
ADD\ADDRESSES: ________________________________________
" .
FIGURE 5-6
Partial Example of a Narrative Weekly Crime Summary
Of the 97 commercial burglaries reported this week, all were analyzed, wholly or in
part, for the following information.
TIME~ Forty=four occurred bet"leen 1600 and 2000 hours, and 20 took pla.ce
between 0000 and 0400. Five were of unknown time, and the remaining
28 showed no time significance.
DAY: Monday reported 16 offenses. Friday reported 9 offenses.
Tuesday reported 10 offenses. Saturday reported 17 offenses.
Wednesday reported 15 offenses. Sunday reported 17 offenses.
Thursday reported 13 offenses.
[ ANALYSIS~
Particular attention could be given to commercial establishments on Beats 3, 6, 15, 17, 27 and
28, concentrating on these areas from early afternoon to early morning. Male Negroes, from
13 to 40 years, are the suspects most often seen. Schools should be given particular atten-
tion on the weekends.
representing the patrol, tactical, investiga- the complexity of the information being
tive, and special services (vice and narcotics) discussed. This type of meeting allows the
units. A good time for this meeting is on exchange of information between the var-
Monday or Tuesday morning; the meeting ious field unit representatives. Also, the
can last from one !o three hours depending analysis personnel can obtain informal feed-
on the information to be disseminated and back evaluation information as to their
59
FIGURE 5-6
Partial Example of a Narrative Weekly Crime Summary (can't.)
The 196 Residential Burglaries reported this week contributed, wholly or in part, to the
following analyzation.
TIME: Of the 196 reports indicating a time of occurrence, the time span of
0600 to 2000 hours totaled 160 offenses, and 2000 to 2400 totaled 19.
The remaining 17 offenses did not reflect a time significance.
DAY~ Monday reported 22 offenses. Friday reported 36 offenses.
Tuesday reported 31 offenses. Saturday reported 24 offenses,
Wednesday reported 28 offenses. Sunday reported 23 offenses.
Thursday reported 32 offenses.
AREA: District I reported 20 offenses (Beats 1 and 4).
District II reported 45 offenses (Beats 6, 8 and 10).
District III reported 47 offenses (Beats 14 and 17).
District IV reported 43 offenses (Beats 19, 20, 22 and 23).
District V reported 41 offenses (Beats 25, 26, 27 and 28).
LOSS: Various types of losses were reported, but identifiable losses were as
follows: televisions, 66; radios, 30; stereos, 37; jewelry, 27; clothing,
20; guns, 13; money, 33; cameras, 11; tools, 5; and office equipment, 3.
ENTRY: Force was used as the method of entry in 144 offenses while open doors and
windows accounted for 52. Entry was directed at front doors in 60, at win~
dows in 81, and at rmr doors in 55.
SUSPECTS: Sixty-two suspects were seen. Of thes~ 59 were male. Forty-eight were Negro,
8 were Caucasian, and 6 were Latin. Ages were reported as follows: under
12, 1; 13-15, 6; 16-18, 17; 19-21, 14; 22-25, 14; 26-30, 2; 31-40, 2; older, 1;
and 5 were unknown.
ANALYSIS:
Marked and unmarked patrol units in residential areas, with particular emphasis on Beats 1, 4,
14, 17, 20, 22, 23, 25 and 26 may be effective. Male Negroes, between the ages of 16 and 40
years, loitering or driving slowly in these areas during daylight ar.d early morning hours, are
possible suspects. Thirteen-to-17-year-olds should be watched going and coming from school.
'"
methods and effectiveness. Many of the ter published by the Oakland Police Depart-
surveyed departments with operating crime ment is presented as Figure 5-8.
analysis systems use the formal meeting The weekly public newsletter effects com-
method of disseminating the weekly crime munity relations and crime prevention
summary. All interviewed personnel thought . through citizen awareness and involvement.
highly of the informational exchange that Many departments should use the commu-
resulted from the meeting. nity relations or preventive services sections
5. Weekly Public Newsletter. The weekly to publish informatiop received from the
public newsletter contains neighborhood in- crime analysis section.
formation on crime and related neighbor- The problems with publishing a weekly
hood problems. The content of the weekly public newsletter are cost and informational
public newsletter may be raw numerical data content. The cost of publishing the newslet-
on criminal activity within geographical areas ter must be weighed against the increased
(not necessarily defined by patrol bounda- public support and citizen involvement that
ries). An example of a weekly public newslet- should result. However, if the information
60
--------------------------------------------------------------------------------
FIGURE 5-6
Partial Example of a Narrative Weekly Crime Summary (con't.)
From the 22 commercial robberies occurring during the last week, the following information
is aval.lable.
WEAFON: Guns were displayed in 15 offenses and simulated in 3; knives were used in
2 offenses, and physical force in 1.
SUSPECTS~ Of the 39 suspects described, all were male; 37 were Negro and 2 were
Caucasian. Ages of the suspects ranged as follows: 13-15, 1; 16-18, 7;
19=21, 13; 22-25, 13; 26-30, 3; and 2 were unknown.
VICTIMS~ The types of businesses robbed were as follows: grocery stores were hit on
1 occasion; gas stations, 2; cafes, 6; taxis, 5. Bars, theaters, catering
truck, toy store, barbershop, laundry, office and a dairy all reported 1
offense.
ANALYSIS:
Early and late afternoon and evening hours were hardest hit. An attempt should be made to
increase preventive patrol during these hours.
content is too specific, the criminal responsi- of reports or meetings generated, or it may
ble may read the newsletter and determine be specific, i.e., problems identified and
Of the 47 robberies from the person this week, all were analyzed for the following
information.
TIME~ The time span of 1400 to 2000 accounted for 22 offenses; 10 occurred
between 2000 and 0200. The remaining 15 offenses did not reflect a
time significance.
DAY: Monday reported 9 offenses. Friday reported 3 offenses.
Tuesday reported 10 offenses. Saturday reported 5 offenses.
Wednesday reported 7 offenses. Sunday reported 5 offenses.
Thursday reported 8 offenses.
AREA: The west, north and near east end areas were the most affected areas.
Beats 1, 5, 14, 17, 24, 25 and 26 had from 3 to 5 offenses each.
LOSS: Money was the primary object of attack, but no loss was reported in 2
offenses.
WEAFON: Force was the main instrument of attack reported in 27 offenses. Guns were
observed in 6, knives in 4, a1d simulated in 1.
SUSPECTS~ Of the 76 suspects listed, 72 were male; 69 were Negrd, 4 were Caucasian,
and 3 were Latin. The ages given for suspects were as follows: under
12, 4; 13-15, 3; 16~18, 14; 19-21, 13; 22-25, 8; 26~30, 5; 31-40, 2;
older than 40, 2; and 25 ages were unknown.
ANALYSIS:
Most offenses occurred during early and late evening hours and early morning hours. Sus-
pects were usually male Negroes, in pairs, aged 13 to 25. Attention should be given to
elderly and middle-aged Caucasians, walking alone, who are consistently the prime victims
in this type of offense. Approximately one-third of these offenses occurred on main
thoroughfares.
FIGURE 5-7
Example of a Numerical Weekly Crime Summary With Comparison to Previous Activity
CIT Y OF T U C SON
To: Chief of Police From: Planning and Research
Subject: Corrp1es Surrrnary Date: Feb 12 to Feb 18, 1973
Al A2 A3 A4 AS A6 D1 D2 D3 D4 D5 D6 B1 B2 B3 B4 B5 B6 B7 C1 C2 C3 C4 C5 C6 'IW LW
roBBERY 1 1 1 1 1 1 2 1 2 1 1 13 10
BURGLARY 2 5 1 3 1 2 1 1 1 1 1 19 29
BUSINESS
BURGLARY 1 1 1 1 4 3 7 1 1 1 1 1 7 1 7 3 1 8 4 5 1 1 61 70
RESIDENCE
LARC.Et'jY 2 1 5 1 2 5 1 1 1 6 1 3 3 2 4 2 3 1 44 42
FROM AUIO
STOLEN 1 2 2 1 2 1 1 1 2 1 1 2 1 1 2 1 1 23 31
\iEHICLES
TOTAL 4 7 14 2 8 6 10 6 9 2 1 4 10 5 3 11 2 11 5 5 13 9 9 2 2 160
LAST WEEK 9 4 9 10 18 6 9 4 8 4 5 2 3 9 9 5 5 9 10 6 6 9 9 6 8 182
DIFFERENCE -5 +3 +5 -8 -JO +1 +2 +1 -2 -4 +2 +7 -4 -6 +6 -3 +2 -5 -1 +7 -4 -6 -22
RECOVERED 1 2 1 1 2 1 8
VEHICLES
LAST WEEK 2 1 1 1 5
~'ERENCE -1 +2 +1 -1 -1 +1 +2 -1 2-! -_.-
+3 i
OJ
C,)O
FIGURE 5-8
Example oj the Weellly Public Newsletter
OAKLAND CITIZENS' CRIME PREVENTION COMMITTEE .... IN COOPERATION WITH OAKLAND POLICE DEPARTMENT
June 1972
CRIME-SPECIFIC
Oakland and five other jurisdictions in California have received fund-
ing from the California Council on Criminal Justice to engage in a
concerted effort to reduce residential and cemmercial burglaries. In
Oakland, the reseurces 'Obtained under the. grant will be used in a drive
te curb burglaries in that pertien 'Of East Oaklahd which includes the
Far East Heme Alert Area, the East Hill Heme Alert Area and the Seuth
East Oakland Heme Alert Area. These area~ were selected fer special,
attentien because they have suffered the mest persistent burglary
preblem.
Grant funds will enable the Pelice Department te assign additienal
persennel and equipment te East Oakland fer specific burglary preven-
tien and enfercement purpeses. In additien, the funds' have made it
pessible te empley twe investigative aides in the Department's Burglary
Sectien te assist investigaters with reutine tasks se they may expend
mere time in investigative duties. Particularly impertant, the grant
funds have made it pessible fer the Department te empley and train
ten East Oakland residents whe will perferm residential security inspec-
tiens upen request. Persens whe reside in the Far East, East Hill and
Seuth East Oakland Heme Alert Areas are invited te telephene the Heme
Alert 'Office at 273-3CSB te arrange fer a residential security inspec-
tien. Remember, the citizen-inspecters have been trained te detect
security weaknesses and te make recemmendatiens te impreve the sf·curity
'Of yeur heme or apartment, but they will cenduct the inspections only
upen request.
The Crime-Specific Burglary Preventien and Centre 1 Pregram has been
funded fer a peried 'Of 'One year. The pregram will receive extensive
evaluatien and, hepefully, the mest effective and efficient metheds 'Of
preventing the crime 'Of burglary can be identified and applied threugh-
'Out the entire City.
LITTERING
Wi th some frequency, ci tizel.. s have asked fer infermatien cencerning
the actien they sheuld take ".,hen they 'Observe littering vielatiens.
Califernia Penal Cede s€ctien 374b makes it unlawful te litter or te
dump any waste matter en any public 'Or private read 'Or upen any public
'Or private property witheut the consent 'Of the owner or persen in
charge 'Of the preperty. Because violatien of sectien 374b is a mis-
demeaner, an officer may net arrest or cite a violator unless he
'Observes the violatien. When he does not witness the violation, the
officer will be limited to taking a report which will be the basis
for follew-up investigatien and, when pessible, prosecution.
When yeu 'Observe a persen dumping garbage, yeu should 'Obtain as cem-
plete a description 'Of the vielater as possible and, 'Of particular
impertance, you should 'Obtain an accurate descriptien, including the
license number, 'Of the vehicle used by the person. Telephene the
Pelice Department's Communicatiens Sectien at 273-3481 and inferm
the cemplaint 'OperateI' cencerning the nature and lecatien of the
violatien and the description of the 'Offender. An apprepriate crime
report will be taken via telephene 'Or, depending upen the circum-
stances, an officer will be dispatched to the scene.
64
--------------------------------------------------------------------------------- --------
FIGURE 5-8
Example of the Weekly Public N ewslettet (con't,)
June 1972
CRIME IN THE MID-EAST OAKLAND AREA
The Mid-East Oakland Home Alert Area includes the Fruitvale District, the
Allendale District, the Maxwell Park District, the Fairfax District and the
Havenscourt-Seminary District.
Residents of the Mid-East Oakland Area reported 110 burglaries during May, a
3% increase over April's figure. The reports were scattered throughout the Area
with no concentrations developing in any particular neighborhood. Because of .
long summer days, the break-ins are being committed later in the evenings. Two
reports were received of a burglar working after midnight and the apprehension
of a nighttime burglar on 36th Avenue may have resolved this problem. Increased
activity during daylight hours can be expected with school vacation.
Robberies from the person decreased again this month with 26 incidents of strongarm
robbery and p~rsesnatch reported. Most of these thefts were of the strongarm
type and occurred during the late afternoon on Foothill Boulevard from 45th Avenue
to 55th Avenue and on East 14th Street from Seminary Avenue to 73rd Avenue. .
Automobile thefts increased slightly over last month with 48 vehicles reported
stolen during May. The majority of these thefts were scatt~red throughout the
Area with no established pattern. Older model Chevrolet~ are the favorite target
of auto thieves in this Area.
Thefts of property from parked vehicles totaled 49 offenses during May. Many
of these offenses involved entries into locked vehicles parked in the neighborhood
of MacArthur Boulevard and Mills College.
Residential burglaries in the Fruitvale District decreased slightly during May
wj.th 26 break-ins reported. Small concentratioiiO occurred in the neighborhood
bounded by 35th to 39th Avenues, East 14th Street to Foothill Boulevard and in the
vicinity of 35th Avenue and Davis Street. In one burglary on Bridge Avenue, the
resident's unexpected arrival surprised the intruder who fled out the rear door
only to be confronted by the waiting jaws of the homeowner's two large dggs.
Residents of the Allendale District reported 15 homes broken into last month.
Except for three break-ins committed in the 3800-3900 bloclt of Lyon Avenue, the
majority of offenses were scattered throughout the District and no established
pattern has developed. Several car thieves were apprehended during May and they
have implicated other persons. It is believed the arrests may hel, to relieve'
the current rash of stolen vehicles in the District.
Fifteen homes and apartments were reported burglarized in the :i'airfax District
during May, a 40% decrease compared to April' s figures. The biJlk of these
entries were concentrated in the neighborhood bounded by 47th to 52nd Avenues,
Bancroft Avenue to Melrosu Avenue. Four persons were apprehended during the
commission of four separate offenses in the District. We are grateful to alert
[
I
neighbors who called the police when they observed suspicious activity and persons
prowling about the neighborhood in a suspicious manner.
The Maxwell Park Distriqt again experienced the lowest incidence of crime. Eight
residential burglaries were reported, many of which were concentrated in the area
of Brookdale Avenue to Fleming Street, Lilac Street to Modesto Avenue. One
young man was captured while breaking into a home on Maxwell Avenue although his
two accomplices managed to escape. In another case on Brookdale Avenue, a young
man was apprehended for attempted burglary when officers in an unmarked patrol
car observed him attempting to force a padlock on a locked garage door.
Residential burglaries in the Havenscourt-Seminary District almost doubled
during May with 46 reported offenses as compared to 26 in April. These offenses
were scattered throughout the District except for minor concentrations in the
neighborhoods bounded by 67th to 76th Avenues, East 14tb to Orral Streets and
in the vicinity of Seminary Avenue and East l~th Street. Vehicles seen fleeing
these break-ins are a 1964 brown Pontiac sedan, a dark blue old mLdel Chevrolet,
a blue 1955 Chevrolet with a noticeably loud muffler, and a dark colored 1965
Thunderbird. Several youths, responsible for a series of purse~natches in the
viCinity of Bancroft Avenue, were apprehended.
65
FIGURE 5-9
Example of the Monthly Analysis Report
Seventh Precinct
ROBBERY:
There were 202 robberies and attempt robberi.es reported in the precinct
during the nonth of August.
Problem Areas:
Scout 7-9 32 robberies nostly on platoon #3, concentrated in an
area bounded by Dequindre to Chene, Gratiot to E.
Forest.
Scout 7-1 28 robberies nostly on platoon #3, concentrated in an
area bounded by Concord to VanDyke, E. Jefferson to
st. Paul.
Scout 7-2 28 robberies nostly on platoon #2 and #3, concentrated
in an area bounded by Mack, Bellevue to Field and
Charlevoix and Mt. Elliott.
Scout 7-6 27 robberies, evenly distributed on all three platoons,
concentrated on Leland, Chene to Gratiot.
Scout 7-7 21 robberies rrostly on platoon #3, concentrated in an
area bounded by Hendricks to Preston and McDougall to
Mt. Elliott.
Proposed Rerredy:
Seventh Precinct Supervisors and Patrol Personnel have
been apprised of this problem and have been instructed
to give attention to business establishments in their
areas. Increased patrols by STRESS Units should also
prove to be effective.
B&E DWELLINGS:
There were 229 B&E and attempt B&E Dwellings reported in the Precinct
during the nonth of August.
Problem Areas:
Scout 7-2 46 B&E Dwellings evenly distributed on all three
platoons, concentrated in an area bounded by East Grand
Boulevard to VanDyke and E. Forest to Mt. Elliott.
Scout 7-6 33 B&E DNellings evenly distributed on all three.
platoons, concentrated in an area bounded by Leland to
Warren and Chene to Mt. Elliott.
-
(cont)
L
66
FIGURE 5-9
Example of the Monthly Analysis Report (con't.)
Proposed Remedy:
Seventh Precinct Patrol Personnel and Supervisors have
been instructed to continue giving residential areas as
much special attention as possible. The use of un-marked
patrol cars would also be advisable in regard to this
category of crirre.
Problem Areas:
Scout 7-6 18 B&E Business Place nostly on platoon #1, concentrated
in an area bounded by Chene to McDougall and Garfield to
Warren.
Scout 7-9 11 B&E Business Place evenly distributed on all three
platoons, concentrated in an area bounded by Chene to
Dequindre and Garfield to Warren.
Scout 7-10 11 B&E Business Place nostly on platoon #3, concentrated
in the area of Milwaukee, St. Aubin to Chene.
Scout 7-1 11 B&E Business Place evenly distributed on all three
platoons with no particular concentration.
Scout 7-3 10 B&E Business Place nostly on platoon #1, concentrated
in an area bounded by Gr~tiot, Mt. Elliott to Helen.
Proposed Remedy:
Seventh Precinct Personnel and Supervisors have been
infonned of the situation in regard to cri.Ire in their
respective areas. Increased foot patrols on the main
arteries would also be advisable.
B&E AUTOS:
There were 97 B&E and Larceny from Auto reported in the precinct during
the rronth of August.
Problem Areas:
Scout 7-9 7 B&E Auto evenly distributed on all three platoons,
concentrated in an area bounded by Gratiot to Erskin,
and Russell to Dequindre.
Scout 7-9 7 B&E Auto evenly distributed on all three platoons,
concentrated in an area bounded by Rivard to Orleans
and E. Jefferson to Larned.
67
FIGURE 5-9
Example of the Monthly Analysis Report (con't.)
Problem Areas:
The 38 Larceny fran Persons reported in the Precinct
were evenly distributed with no particular conce..ntration.
Proposed Remedy:
Seventh Precinct Patrol Personnel, including the C.O.P.
Unit have been instructed to give this category of
crime special attention.
U.D.A.A. :
There were 142 U.D.A.A.s reported in the precinct during the month of
August.
Problem Areas:
Scout 7-5 21 U.D.A.A. nostly on platoon #3, concentrated in no
particular area.
Scout 7-3 19 U.D.A.A. evenly distributed, with no particular
concentration.
Scout 7-8 16 U.D.A.A. nostly on platoon #2, with no particular
concentration.
Proposed Remedz:
Seventh Precinct Patrol Pe.rsonnel and Area Supervisors
have been instructed to continue to give special
attention to areas where vehicles are left unattended.
They were also instructed to increase their investi-
gation of suspicious vehicles on the street.
JOM D. Gnotek
Sergeant S-65
Crime Analysis Unit
Seventh Precinct
68
FIGURE 5-10
Example of a Crime Pattern Identification Bulletin
MEMORANDUM
Suspects Vehicle:
68-69 Blue Dodge - Oregon License
64-65 White Ford PU - License 4V-468
Chev. PU White, crumpled right front fender 4V-6300
Crimes Against Property says these license are registered to
junker cars.
If these subjects are arrested please contact J. W. Dyson -
r Crimes Against Property.
Kathryn Bonham
Operations Analysis Unit
KB:dp
69
FIGURE 5-11
Example of a Crime Pattern Identification Bulletin
CHECKPOINT: Persons driving a late model auto with old worn tires
or a pulled door lock should be the subject of a
street stop and intensive field interrogation. Persons who appear to be working on an
auto or changing a tire should be investigated. _Keep in mind the right door lock is
usually pulled.
e~~
SECTION~E~
AUTO THEFT
Notify the Auto Theft Section, Criminal Investigation Division. Headquarters (PAX 394)
if an arrest results from this informati~n. or if an arrest is made by normal patrol
or investigation which would affect the continuance of this Pattern.
gained by the analysis sections that ide?tify However, formal feedback on the strategy
the problem for particular line superv~sors adopted and its effectiveness should be
but leaves the solution to the superVIsor. transmitted back to the crime analysis secrion
70
FIGURE 5-11
Example of a Crime Pattern Identijication B~llletin (con't,)
M.O.: Offenders approach victim, after he is done making delivery~·1 ' II~~
Offenders produce weapons and announce hold-up, and (..I'~.,j , : : 1'1
offenders reach into victim's pocket and take USC Commander-Robbery Se~tion
and all flee on foot.
Notify the Robbery Section, Crimil1al Investigation Division Headquarters (PAX 386) if
an arrest results from this information.
within a period of from five to seven or ten patrol routes in which specially assigned
days. Some crime analysis operations have units are given routes specifying streets,
adopted the use of directed pre-planned times, and directions of travel for a specified
71
FIGURE 5-12
Example of a Crime Pattern Identification Bulletin
MEMORANDUM
The last two A/R have occurred at closing tirre around 12: 00 a.m.
The men pull .45 automatics (one will have br~m grips and possibly
the other will have pearl handles) then tape the peoples hands and
feet up with masking or adhesive tape. On the A/R on I..errm::>n on
the 6th, only one nan went in. He was there eating for an hour
before he held it up. On the A/R on Audelia on the 4th, both men
had been in previously but had left and then carre back.
period. This latter method provides a tech·· tal methodology briefly discussed in -the last
nique very conducive to evaluating the oper- chapter).
ational strategy (by utilizing the experimen- The issuance of crime pattern identifica-
72
FIGURE 5-12
Example of a Crime Pattern Identification Bulletin (con't.)
5450 E. Mockingbird
6565 Skillman
Martha McGee
Operations Analysis unit
MM:jb
qon bulletins can greatly aid department offense report. In this case, the analyst
operations. For example, where an officer responsible for identifying the pattern and
effects an arrest based solely on information disseminating the information may be re-
received from a CPI, the officer may, out of quired to provide testimony in court to
necessity, resort to citing the crime analysis successfully prosecute the case.
information as the basis for the stop in his 8. Investigative Lead or Crime Correlation
73
FIGURE 5-13
Examples oj the Investigative Lead Report
THE ABOVE MENTIONED REPORT HAS BEEN REVIEWED BY THIS SECTION AND IT IS FELT
THAT THE FOLLOWING INFORMATION MAY BE OF VALUE TO THE INVESTIGATOR.
Dr. The suspect in the report was described as an MN 20-30 5-9 155
pounds. On the 10Feb72 at l500hrs a known burglar was FC'd in the same
area. The description of the suspect and the FC'd suspect don't match
BUT the passenger that was with the FC'd subject DOES match the suspect
5-7 155 pounds address of 236 Sextus Rd. 638-1075. Attached you
will find a copy of the FC. As you will find, the FC indicated that
-the subjects tried to evade OPD officers. Their vehicle at that time
]
BY: d Nishihara 66l6S
74
FIGURE 5-13
Examples of the Investigative Lead Report (con't.)
THE ABOVE MENTIONED REPORT HAS BEEN REVIEWED BY THIS SECTION AND IT IS FELT
THAT THE FOLLOWING INFORMATION MAY BE OF VALUE TO THE INVESTIGATOR.
The ID left by the suspect had the name of ALLEN, Glenn N. MN (lApr51).
The FC file was checked for this individual and numerous cards were on
file for this subject. The FI's were primarily routed to Burglary
Detail but other FIls were sent to homicide and robbery details.
1672-7th St (6Aug70)
IN COMPANY WITH:
75
FIGURE 5-14
Example of the Major Crime Bulletin
SHERIFF'S DIPARTMINT
PETER J. PITCHESS • SHERIFF
INFORMATION WANTED
UNIDENTIFIED MURDER VICTIM JOHN DOE #158
-OVER-
76
FIGURE 5-14
Example of the Major Crime Bulletin (can't.)
2~ L 29 W 100 22
2 R 001 19
PHOTOS AVAILABLE.
[ BER 072-17617-1479-010.
2/73
Reports. As stated above, the investigative ities between a particular case or body of
lead or crime correlation report is one of the cases. This information may be transmitted
most important dissemination functions of by the crime analysis section routinely, or it
the crime analysis section. Like the CPI, the may be the result of a request by an
crime correlation report is based on analysis individual investigator actively seeking corre-
of available crime offense report information lations. Two examples of CCR's are pre-
with the important addition of specific sus- sented in Figure 5-13.
pect and MO information. Crime correlation reports are directed to-
Essentially, the CCR is a report to an ward criminal apprehension and specific
individual investigative unit detailing' similar- case clearances. The number of these re-
77
ports will be a result of the analyst's exper- seminating analyzed crime analysis informa-
tise and the reliance of the detective units on tion. The importance of informal communi-
this crime analysis information. cation at regular and unscheduled meetings
9. Specific Major Crime Bulletins. The major has been previously discussed. Many depart-
crime bulletin contains information extracted ments have made concerted efforts to in-
from a particular case and is directed to crease informal crime analysis information
other law enforcement agencies capable of dissemination. These methods will be exam-
providing additional information or assist- ined next.
ance. An illustration of a major crime bulle- The Denver Police Department has imple-
tin is shown in Figure 5-14. mented a program in which information
The purpose of the major crime bulletin is collators are largely responsible for keeping
solely for criminal apprehension in a partic- track of known criminal offenders. A large
ular case. Many departments require that percentage of the collator's time is actually
the individual investigative unit provide this spent in the field where personal contact
function in specific cases. The advantages of with regular field officers facilitates informa-
having the crime analysis section provide this tion dissemination and communication. A
function are obvious. The crime analysis similar method is used by the Seaside Police
operation is set up for information coordina- Department in Califor:nia in a burglary
tion, and investigative personnel are freed crime specific reduction effort based on
from this task and may work toward clearing analysis and analyst personal involvement.
the case. The special burglary investigators spend ap-
In many cases, the crime analysis section is proximately half of their available time ana-
the primary source of information on major lyzing reported burglaries. The other half of
crimes and criminal activity which is released their time is spent in the field directing the
to the news media for public dissemination. burglary investigations of regular patrol per-
This is a good system for. monitoring public sonnel. Again, the analysis information de-
information and aids in eliminating the pos- veloped by these officers is generally dissem-
sibility that a suspect will be "tipped off" by inated through informal personnel field con-
public information. tacts.
10. Special Impact 01' Evaluation Reports. The Detroit Police Department's 7th Pre-
Special reports written by the crime analysis cinct maintains severa! precinct area crime
section should be made by request only. pin ma ps in the pre-duty briefing squad
These reports may take the form of specific room. These maps are maintained on a
study information on proposed or imple- mon~hly and previous period basis and are
mented programs or projects with regard to kept in locked glass display cases mounted
effect on crime rates or percentages. In on the wall. The maps are available for the
addition, reports may be in response to a individual officers and supervisors to refer
request for a particular analysis of reported to and analyze for themselves.
crime or criminal activity not usually pro- Several police agencies have attempted to
vided by the analysis section. Special reports physically locate the crime analysis section in
from the crime analysis section are less areas that are highly accessible to other.
structured than are most of their other individual officers. Sworn personnel are gen-
reports. Special reports may be written in erally free to enter the analysis section for
almost any format as dictated by the type of personal contact with crime analysis person-
information conveyed. nel and to examine the analysis process.
Techniques such as these tend to increase an
individual officer's awareness of the crime
B. Informal Information analysis section's activity. These techniques
Dissemination also give support to the other dissemination
There are various informal means of dis- techniques utilized.
78
----------------------------------------
B. Evaluation Methods and Procedures be used in most cases to relate the program
to the problem being addressed.
1. Establishing the Program Justification. • Define the Problem
Where a crime analysis unit program has Its nature, its extent and its importance.
been implemented, a logical order should Statistics which demonstrate the prob-
exist which forms the basis for the program. lem's scope.
This basis, or justification, should be clearly Known information about offender
spelled out before the program is imple- characteristics and crime patterns.
mented and will be used in retrospect to • Present Operations
determine which assumptions were valid,
and which assumptions had to be subse- 1 Caro, Francis G., RemUlIgs in Eva/ualioll Research. Russell Sage Foundation. New
79
How the problem is presently handled. ency relationship, while contributing little of
Deficiencies of the current method. permanent value to the agency.3
• Crime Analysis Objectives The evaluation problems associated with
How the crime analysis program will an "in-house" evaluator generally result
operate. from a lack of research expertise. An associ-
What crime analysis is expected to ac- ated problem is the nature of the relation-
complish. ship between evaluator and the agency con-
How the present deficiencies will be ducting the program.
eliminated. Critical factors in a successful program
Anticipated reactions of crime analysis evaluation are the attitude and objectivity of
user groups. the agency administrators. "Some may want
• Evaluation Data a fair evaluation of the program, others mal
Sou:ces of required data and their suffi- want a program to be proved a success
cIency. regardless of its merits. In the latter case the
Problems in using these data sources. evaluation may be of little or no value." 4
Ways in which data reliability may be However, the agency administrator still
affected. needs to make decisions concerning the
Steps taken to insure uniform data program as to continuing it, modifying it,
quality and reliability. etc. The evaluator who has an overall view
A program evaluation report should con- of the program is in the best position to give
tain an analysis of a prior justification for the administrator guidance. In spite of the
the program. The logic supporting the pro- lack of clearcut results, the evaluator should
gram should be modified based on the draw conclusions and make recommenda-
information developed during the program. 2 tions concerning the immediate disposition
2. Crime Analysis Evaluation Problem Areas. of the program. Recommendations should
Establishing the relationship between the also be made. regarding further research,
activities of the crime analysis unit and the program improvement, and program evalua-
final results is not a simple matter. The tion.
primary product of the crime analysis unit is 4. Overview of Evaluation Procedure. This
informational reports which, to become section contams a summary outline of the
v,Jrthwhile, are dependent upon the actions steps which should be taken to evaluate a
taken by other user groups within the police crime analysis program.
agency. The climate in which the reports are General Evaluation Framework for Crime Analy-
received also has a great bearing upon the sis Pmgram
overall program "impact". Furthermore, ex- • Develop the program justification.
ternal factors which are beyond the control • Select the evaluator.
of the program often dictate the conditions • Choose external measures of impact
under which changes in criminal activity effectiveness.
occur. Examples include: shifts in residential • Choose internal measures of productiv-
patterns, redevelopment projects, changes in ity.
attitudes between police and the public, • Determine data requirements for the
seasonal variations, unemployment, changes measures of impact effectiveness and
in patrol practices, etc. methods of compensating inadequacies
of official crime data.
3. The Program Evaluator. A primary re- • Collect and analyze user group re-
sponsibility of an administrator is ~o evaluate sponses and impact results. .
the efforts of his agency. AgencIes should • Modify the program, data collectIon
develop expertise in this area, but if exper- procedures, and the measures of effec-
tise is lacking, qualified consultants should tiveness, as necessary.
be retained. However, agency personnel • Describe the permanent changes that
should be included on the evaluation team have resulted from the program.
and they should be as involved in the 5. Internal Evaluation. The internal evalua-
evaluation as the consultants. Complete reli- tion of the crime analysis unit should be
ance on 'Outside consultants to conduct the oriented toward:
evaluation will only perpetuate a depend-
'l E\'ahmlioll or Crime Control Program!i, p. I!!, U.S. Dept. of Justice, Law En~ , Ibid .. p. 14.
forccl11cnt Assistance Aclminisu'atioll, 1072. 'Ibid., p. 14.
80
• Examining those tasks which the unit is assess whether the crime analysis unit prod-
performing. ucts are "balanced" throughout the user
• Identifying users. groups, or if the crime analysis unit is
• Establishing the overall budget require- favoring one particular user group.
ments for the crime analysis unit and Finally, an attempt should be made to
establishing a cost per unit of work. evaluate the unit's activity in terms of meet-
• Establishing the degree to which the ing user needs. Is the crime analysis unit
crime analysis unit is satisfying user "doing the right thing" according to those
group needs. who are receiving its products? Such a
Employee daily activity reports, or time determination can be made by attaching a
cards, are an ideal source of collecting data "control sheet" to all crime analysis reports
as to the internal activity of the crime which are produced. These sheets would be
analysis unit. These reports describe what completed by the report's user and returned.
work is being actually performed. Summary Control sheets should be designed sepa-
reports, charts or graphs could later lJe rately for each of the main user groups.
prepared to illustrate a "time expended" Figure 6-2 is a modular illustration of some
breakdown for each of the user groups, and of the considerations which should be given
for the specific report types prepared for to a control sheet. The design is not fool-
each user group. proof and only suggests one possible method
The following are some considerations of collecting evaluation data. It is essential
which should be given to the design of that the control sheet be kept as simple as
activity reports for crirne analysis unit em- possible so as not to require an extensive
ployees. These are not exclusive and may be effort to fill out. Possible user responses may
modified for adjustment to individual agen- be pre-listed or pre-coded.
CIes. It should be stressed that control sheets
Crime Analysis Daily Activity Report have utility only in determining whether the
• Time spent for report review (quality crime analysis unit is meeting the needs of
control). its users. Once it has been established that
• Time spent for filing or record keeping. the program is operating as desired, the use
• Time spent for analyzing data. of control sheets should be quickly tenni-
• Time spent preparing output reports by nated or reduced to an occasional sample.
user group. 6. Impact Evaluation. Crime analysis is suc-
• Number and type of reports prepared. cessful when it can provide information
• Time spent consulting with user groups. which leads to the breakup of criminal
• Number of offenders identified. operations-either by individuals or organ-
.. Number of correlations made. ized groups. However, to quantitatively
• Number of new patterns identified. measure the degree to which crime analysis
Additionally, a cost figure should be pla- information has lead to crime solving and
ced on the crime analysis unit work prod- arrests is a difficult matter. Nonetheless, if
ucts. One suggested procedure would first crime analysis is effective some shift should
establish the yearly cost of all employee be observed in the following statistical areas:
salaries and benefits. To this would be a. Crime rates.
r
~
I
added the yearly crime analysis unit opera-
ting expenses including such factors as:
depreciation of capital expenditures (equip-
b. Clearance rates.
c. Arrest rates.
d. Property loss.
ment), rent, utilities, and all other miscella-
e. Property recovery.
neous expenses. The overall cost figure
f. Displacement effect.
when divided by the total number of man g. Crime seriousness index.
hours worked will give the average cost per
hour per employee for the crime analysis Care should be taken in establishing a
unit. Using this figure as a base, it becomes a definite cause-effect relationship. A number
simple matter to convert the amount of of external factors, independent of crime
labor being expended into a unit-work-cost analysis operations, can cause great statistical
figure. alterations. Nonetheless, some indication of
By identifying the amount of time, effort the unit's effectiveness must be established.
and money which is required to serve user 7. ImjJact E-oaluation Measurements.
group needs, the administrative staff can a. A1Test Reports. Most arrest reports can
81
---l
co FIGURE 6-2
N)
Crime Analysis Control Sheet
No "Use" Response
Has the information
oInformation of no value contained wi thin this
report been used by you?
oInformation already knCMIl
Detective
oInformation identified
unknown offense pattern
M)
o bulletin distribution
M) oStrategy developrent
oInformation correlated
oBasis of a special task group
assigrurent
oStrategy change
offense to knc:Mn pattern
M) oCormnmity relations
DEstablish new patrol practices
DInformation correlated and/or procedures oPublic relations (news media)
offense M) to knCMIl offender
oInvestigative information
DShort-tenn manpower
changes
allocation oOther
only
oInformation correlated
oOther
arrestee to offense M)
oother
. --~
--- ---~~-------------------------------
be modified to provide a check box for determining the program's impact in rela-
crime analysis information by which an offi- tion to changes in the overall rates.
cer can indicate if the arrest was based solely Conclusions from the procedures de-
or partially on information which was pro- scribed in this part should be drawn with
vided by the crime analysis unit. Where caution. The critical evaluator must always
possible, reference should also be made to ask, "Is it true that the arrest (property
the specific crime analy§is unit report num- recovery, case clearance) would not have
ber. been made independent of the information
b. Offense Clearance Reports, Property Re- provided by the crime analysis unit?" Never-
covery Reports and Crime Classification Change theless, some weighted value must be placed
Reports. These reports can also be modified in the judgment of the officers preparing
to provide similar crime analysis informa- the report. If, however, the arrest might
tion. An officer's indication of the degree to possibly have been made in any event, did
which' crime analysis was responsible for a crime analysis save the patrolman/detective
case being clear~d or property being re- any time in investigating the case, and
covered can aid the program evaluator in thereby free him to work on other rpatters?
83
7-1
TABLE
Minimum Staffing levels for a LVlanual Crime
Analysis System
Personnel
·Chapter VII Assigned
No. of No. of to
Sworn Clerical Total Analysis
MODEL CRIME Personnel Personnel Personnel Section
ANALYSIS SYSTEMS 50 + 10 60 I
75 + 15 90 1.5
100 + 20 120 1.8
125 + 25 150 2.3
150 + 30 180 2.7
A. Manual Crime Analysis System 175 + 35 210 3.2
200 + 40 240 3.6
1. Definition and Limitations. A manual
225 + 45 270 4.1
250 + 50 300 4.5
crime analysis system, by definition, is one in 275 + 55 330 5
which all methods of data collection, data 300 + 60 360 5.4
storage, data analysis, and information dis-
semination rely on manual processes. The
primary limitations of a manual analysis
system are staffing levels, data analysis tech-
niques, data storage and retrieval restric- manual system are the actual documents (or
tions, and data correlation capabilities. A reproductions) that have been written by the
manual crime analysis system can be adapted personnel providing information to the anal-
to almost any size department. However, the ysis section. Procedures must be established
manual analysis system remains best suited to provide this information to the analysis
to the smaller (50 to 150 sworn personnel) section in an organized and timely basis.
and medium-sized (150 to 300 sworn per- Many of the data documents to be ana-
sonnel) departments. Based on the FBI Uni- lyzed by the crime analysis section are re-
form Crime Reports for 1971, the popula- ceived by direct routing. Examples of data
tions for cities served by these sized. depart- documents received by the crime analysis
ments range from 25,000 to 200,000 inhabit- sectio.n via direct routing are:
ants.
2. Manual Systems Staffing Levels. Manual • All or selected criminal offense reports.
crime analysis requires considerably higher • All or selected criminal offense supple-
staffing levels than either semi-automated or mental or continuation reports.
fully-automated systems to achieve the same e All field contact or interrogation cards.
level of functions performed. Dependent • All arrest reports.
upon several variables, such as crime rates • All subject conditional probation state-
86
.. --------------------------------------------------------------~--------------
FIGURE 7-1
Information Flow and Processing in a Manual System
FIELD
PERSOtl-!--_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.....
NEL
(USERS)
ADMINI-
STRATION
EXECUTIVE
HANUAL
DATA
EXTRACTION
PROCESSES
~
~
RECORD
87
man performs same activities as Sunday 2. Stafj~ng. The semiautomated crime anal-
p.m. ysis system requires analyst types with a
• Tuesday a.m.-Same activity as Sunday background in computer-generated informa-
a.m. except performed by Sergeant. tion. It requires a person who can analyze
• Tuesday p.m.--Same activity as Sunday and make information useful for operational
p.m. except performed by Sergeant. people. Also, the crime analysis unit should
• Wednesday a.m.--Same as Tuesday. be staffed with knowledgeable police officers
• Wednesday p.m.-Same as Tuesday. possessing the qualifications enumerated un-
• Thursday a.m.--Same as Monday a.m. der the staffing section of t.his handbook.
• Thursday p.m.-Both Sergeant and Pa- 3. Data Base Input. The basic input into the
trolman prepare KOI's, crime correla- semiautomated crime analysis system origi-
tion reports, and crime pattern identi- nates from the field. The forms which the
fiers. Files are updated and checked. field officer fills out in the field differ from
Weekly public newsletter is prepared department to department, although the
and typed by clerk. data is much the same. The basic inputs into
e Friday a.m.--Same as Monday a.m. the crime analysis system are as follows:
• Friday p.m.--Same as Thursday p.m. a. Offense Report. This report can also be
• Saturday a.m.-Same as Sunday a.m. referred to as a crime report, complaint
• Saturday p.m.-Same as Sunday p.m. report form, incident report, or case report.
As can be seen in this condensed example, It is used in any situation involving law
a functional manual crime analysis system violations.
can be efficiently organized to provide a b. A17-est ~Report and Booking Information.
majority of the informational services and These reports are used when an arrest is
coordinatioL previously described. The enacted and detention occurs.
model presented is for exemplary purposes c. Supplemental Report. The supplemental
only. Figure 7-1 depicts the information report often is referr~d to as the follow-up
flow and processing in a typical manual report and is used to provide additional
crime analysis system. information for documenting further investi-
gation or closure by detective personnel.
d. Field Contact Report.
B. Semiautomated Crime Analysis e. Other Reports. These include a myriad
System of inputs ranging from intelligence informa-
tion to demographic characteristics of the
1. Definition and Limitation. A semiauto- jurisdiction. Typically, this information is not
mated crime analysis system is used to con- provided by the field officer, but is men-
note a batch information processing mode in tioned here only to demonstrate that inputs
crime analysis operations. The function of the are not limited to field officers.
batch processing mode is that of providing 4. Data Processing. Processing begins with
data within some reasonable time, but not the receipt of the reports by the records or
simultaneously with operations. This type of statistical division personnel. Magnetic tape
processing is frequently accomplished in an should be used when feasible to cut costs.
off-line manner. Off-line refers to operating 5. Data Out/JUt. The output of information
devices not under the direct control of the from the central processing unit is in the
central processing unit. However, batch form of analysis reports regarding incidents,
processing can also operate in an on-line crime occurrence analysis, modus operandi
manner, but typically this is not done. For analysis, criminal (suspect) identification, and
purposes of this section we will discuss the crime location analysis. This information
off-line batch processing method. must be made operational for field, detec-
The primary limitation of this method is tive, and planning personnel. Figure 7-2
turnaround time from initial input into the portrays the semiautomated process.
system until an analysis report is generated. 6. Data Analysis and Dissemination. Crime
This time factor, coupled with analysis time, summary data generated from a semiauto-
often detracts from the timeliness of the mated system must concern crimes of a
information generated. However, proper serious nature which have occurred within
systems design and development can en- the various geographic locations within a
hance speed, accuracy, scope and sophistica- jurisdiction. The file (CPU), if properly
tion of information. structured, would generate information re-
88
t. --~--~r- ----------------------------------------------.r-----.....---
FIGURE 7-2
"Flow Process') Semiautomated Grime A1Ullysis System
PUNCH CARD
CRIME
ANALYSIS CPU OR
SECTION
KNOWN
OFFENDER
PATROL
M.O.
OFFENSE
CORRELATION
CRIME
PROFILE~
INVESTI-
GATION
PREDICTION
VON,
PROFIL~
UNIQUE CRI
CORRELATJ:DNJ-, --"'C
ADMINI-
STRATION
PLANNING
00
CD
garding crime trends experienced in the past captured operationally or by the records or
and expectable in the future. The file would data processing division and entered into the
be based upon geographic locations, demo- computer system. The analysis section would
graphic information, seasonal variation, and only be involved in data capture when it has
tendencies affected by allocation of officers. special data entry requirements that were
The crime behavioral patterns, such as com- not or could not be supplied by the opera-
mercial burglaries that have occurred within tional system. All data items needed by the
specific time periods and are assumed to unit for its analytical processes would be
hav!" some possible interrelation, can be captured and stored in computer files. Each
selectively retrieved and evaluated. data element could be accessed for analysis.
Adequate graphic capabilities, utilizing es- The fully automated crime analysis system
tablished approaches, can be used to draw requires that the police department have a
pattern and demographic maps, and to de- very sophisticated computer operation in
rive reliable projections and identify areas existence-one that can make available -to
which are likely to experience certain kinds the analysis unit all of the data and com-
of criminal action at certain periods in the puter application programs that are required
future. Crime incidence data relating crime for crime analysis. Such a system requires a
to geographical areas should be generated long development and implementation cycle.
and evaluated for specific deployment (tacti- If the computer system is to adequately
cal) purposes. In addition, statistical analysis support an analysis unit, that is, give it the
concerning crime patterns and profiles of capabilities required to "fully automate" the
time, should be provided as output reports. crime analysis function, the unit personnel
The reports should take the form of bar must. become actively involved in the devel-
graphs, statistical summaries, or line graphs. opment and implementation phases of com-
The crime report (supplemental) must be puter installation. As indicated in the chap-
classified, coded, and processed so they can ters on data base and data analysis tech-
be readily retrieved according to numerous niques, the data elements and analysis tech-
identifiers. Possible identifiers should in- niques that are applicable to crime analysis
clude types of premise, stolen property iden- must be delineated for a specific department
tifiers, weapons, disguises, vehicles involved, and then steps must be taken to assure that
etc. proper data elements and techniques are
There is also a need to determine and available to the analysis section.
correlate geographic crime patterns. This 1. Automated Staffing Level. The staffing
involves not only grouping MO factors but level of an automated crime analysis system
also indicating crime patterns during various is dependent upon the levels of support
chronological spans. This information would supplied by other units within the depart-
be plotted on a crime map for maximum ment-data processing, records, statistics,
utilization. etc. If all the programming, data capture
The system should provide relevant infor- and verification, report preparation, report
mation regarding projected trends dealing ,distribution, etc., are carried out by other
with futuristic conditions. Simple semiauto- units, the staffing level of the analysis section
mated models based on historical data are can be relatively small (from five to seven
unsuited for evaluation of alternatives; personnel in a department of 500 or more).
therefore, probability predictions will be nec- But, as the functional requirements of the
essary to derive the fullest impact from a unit increase, so will the staffing require-
semiautomated crime analysis system. ment. For example, if the analysis section is
The information from this system should required to not only define new or advanced
be disseminated to the appropriate opera- crime analysis programs, but to also do the
tional divisions on a continuous basis. programming and debugging of the new
processes, the staffing level must be changed
to include system analysts and programmers.
The staffing level of an automated system
C. Automated Crime Analysis System must be determined bl the functional tasks
that the analysis unit is required to perform.
A fully automated crime analysis system If these tasks can be accomplished more
.does its data handling and analysis with a efficiently or appropriately by another unit,
computer. The data required for analysis are they should be assigned there. But the crime
90
analysis unit must make certain that each In many instances, the results of computer
component of the total crime analysis system analysis will be statistical statements or com-
is adequately functioning, i.e., data collec- plex matrices. of data. These must be scruti-
tion, data verification, data analysis, analysis nized to obtain' functional and operational
results distribution, and effects feedback. In meaning for presentat.ion to the various
addition, any breakdowns or gaps in the departmental users in police operation or
system should be covered by the crime management language. A grid map with a
analysis unit. series of symbols indicating crimes in rela-
2. Data Collection. The data collection func- tion to the time of day may be meaningful to
tion should be carried out by units other the persons who designed the map or use
than the crime analysis unit. This should be the map daily, but operations people and
a separate and distinct task force for dy- management people may waste hours of
namic on-line data capture of information. trying to interpret the map. Thus, one of
Dynamic on-line data capture is a method of the basic functions of the analysis unit in an
data collection which results in data being automated crime analysis system is to insure
input into the computer system at the data that the computer-produced analysis reports
sources. For example, as complaint-dis patch- are understood by the department's opera-
disposition data is generated, it is directly tional and management functions.
fed into the computer system. This type of Analysis carried out 'by a computer is
system is being implemented in the Tulsa limited only by the data available to be
Police Department in Oklahoma. The com- analyzed, the analysis application programs
plaint officer receives the call-for-service available, and the applicability of the results.
over the telephone and records the com- The basic outputs that are available from
plaint via a visual display communications computer analysis (see Fig. 7-3) are:
terminal on the files of a mini-computer. A • Listings-the computer can produce a
complaint report format.is presented on a listing of anyone, a group or all data
video display screen and the officer inserts associated with a particular data element (for
the required data. This display is then sent example, a vehicle hot sheet of all burglaries
to a dispatcher who uses the data for committed in the last week).
dispatch decisions. The dispatcher enters the • Counts-the number of times a speci-
dispatch, field action, and evt:nt disposition fied event or combination of descriptors has
data into the mini-computer files. At the end occurred (usually within a time frame, i.e.,
of the day, an incident list is prepared for 24 hours).
each patrol supervisor who checks to see that • Tables and Matrices-the presentation
the field officers have filed the required of the results of comparisons or counts in a
reports. The reviewed reports then go w a table or matrix format. A matrix will always
data-en try-verification station in the records present the numerical relationship between
division. Here the computer record (com- two factors or data elements, while a table
plaint-dispatch-disposition) is compared with may present the results of one, two or more
the field report and any corrections or relationships.
additions (additional data relevant to the • Graphs, Bar Charts, Histograms-the,
event that is on the field report and not computer can produce graphic displays of
contained in the complaint/dispatch format) data analysis results in the form of graphs
are made and the record is entered into the and charts.
storage media of the main computer for • Maps and Plots-the geographic or spa-
processing. As follow-up reports, arrests and tial relationship of events can be presented
disposition information are received, the in the form of maps or data plots.
appropriate data is entered into the case • Trends or Norm Variances-the com-
record. In this manner, the data is collected puter can establish a normal occurrence
and stored in the computer, ready for analy- relationship and indicate what this occur-
sis by the analysis unit. The unit's basic rence trend is or determine any variations
interest in data is that the required data is from this trend or stable pattern.
collected and the data i~ valid. • Pattern Analysis-the computer can be
3. Data Analysis. In an automated system, used to evaluate the time-type-Iocation, etc.,
the basic data analysis tash are performed factors of crime in not only a numerical
by the computer. Crime analysis personnel sense, but in a pattern development or
become interpreters of the analytical results. variation sense. Thus, the change in geo-
91
-------------------------------------------------------------------------------------- ------~----------------
FIGURE 7-3
Information Flow in an Automated Crime Analysis System
- ...
O(_------iDATA COLLECTION'------_ _ _..
COMPUTER
E__------'STORAGE & PROCESSING III' ...
CRIME ANALYSIS UNIT
.. .. USER
ANALYSIS REQUEST & OUTPUT--Jo-If--- GROUPS
-
OPERATIONS \USEM
REQUESTS
RECORDS
FOR
ANALYSIS
RECORDS -- r KEYPUNCII I
STORAGE
l-lEDIA
graphic dispersal of burglaries can be deter- magnetic tape ur i'emovable disc packs. Data
mined at a significant level, even though the will be maintained by the data processing
numerical count and density patterns may unit. The crime analysis unit will utilize its
remain relatively constant. storage for computer out-puts and crime
• Correlations, Regression Analysis, Fac- analysis reports.
tor Analysis, Non-Parametric Statistics, etc.- 5. Information Dissemination. Reports that
there are a great variety of statistical analyti- are generated by the computer and reports
cal approaches that can be performed by a compiled by the analysis unit from interpret-
computer. These techniques should be ex- ations of the computer output will be distrib-
plored by the analysis section in developing uted to the users. The analysis unit or a
advanced analysis techniques. document dissemination function within the
4. Data Storage. Tl!e data storage tech- department can accomplish this task. Each
niques of crime analysis data in an auto- analysis output should be for a sp~cific
mated system will be determined by the distribution or requesting unit. The reports
computer system available to the analysis will take the sa.me form as those indicated in
section. The data may be stored on-line, in the manual system. Some additional reports
mass storage units such as magnetic discs or may be generated that are user specific or
drums; or it may be stored off-line on cards, based on special requests.
92
APPENDIXES
composed of two full-time sworn personnel,'
one sworn staff member on a part-time basis
and one full-time clerical type.
The Project Director will, administratively,
be in charge of the project. In addition, he
APPENDIX A will be responsible for its operations and
reporting and will be the Commander of
Field Operations. The day-to-day Crime
SAMPLE GRANT Analysis Unit operational responsibilities will
rest with the Crime Analysis Unit Supervi-
PROPOSAL: sor, a sergeant, who will supervise one
MANUAL CRIME officer and one Clerk-Typist II. (For job
descriptions for each, see Handbook Appen-
ANALYSIS UNIT dix D.)
Major match will be provided by the
THE FOLLOWING proposed grant applica- salaries of the Project Director (15%) and
tion was developed to aid those police agencies o~er 40% of the salary of the section super-
VIsor.
applying for grant funds in order to initiate
a formal crime analysis unit within their
departments. Hopefully, the sample pro-
posal, w!).en used in conjunction with the B. Professional Services-O-
Handbook, will provide sufficient informa- With the use of the Handbook and draw-
tion to permit development of a detailed ing upon the knowledge of known experts in
grant application. police service, consultants need not be uti-
The following sample proposal was devel- lized.
oped for a department of approximately 175
sworn personnel. The budget and program
was developed for a hypothetical department
and situation mainly to spark the imagina- C. Tmvel-$850
tion of those who will develop the proposals 1. In-State-$350
to be funded. Items such as placement of These funds are needed to maintain close
the Crime Analysis Unit, salaries, and Oeler coordination with all field divisions and to
cost figures, are listed to draw attention to carry out liaison activities with outside
the issue, not to the proposed answer. As an agency personnel. Throughout the grant
example, while the salaries of personnel may year, many local trips will be necessary to
vary from place to place, the need for exchange information and promote coordi-
personnel is constant. Each department uti- nation and cooperation.
lizing this sample proposal is urged to mod-
ify the program component to fit its needs 2. Out-of-State-$500
and is cautioned that the budget figures As described in Section B, the Department
used herein may not be applicable. Also, the intends to make use of short term assistance
sample proposal format has been adopted from specific police experts in the area of
from the LEAA Application for Grant Dis- Crime Analysis. Either one representative
cretionary Funds and may need modification from this unit will visit a selected depart-
if State Planning Agency funding is sought. ment known for its sophistication in the
Notwithstanding modification, there is suf- crime analysis field or an expert will be
ficient information to provide vital and valu- brought in (for one week) early in the
able assistance to local agencies developing project to provide guidance in establishing
Manual Crime Analysis Units. the Crime Analysis Unit. Five Hundred
Dollars will cover air transportation and per
diem for this service.
BUDGET NARRATIVE*
A. Personnel-$49,763
D. Equipment-$3,911
The Crime Analysis Unit Staff will be
Currently, there is no surplus equipment
* See table A-I, Detailed Project Budgel. available to equip the unit, therefore, it is
95
TABLE A-I. Detailed Pr~ject Budget
A. Personnel
Salary % of Time Total Federal Grantee Share
~ Share
Cash Inkind
C. Travel
In-state coordina~ion with local
adjacent agencies 2,500 miles at
14¢ per mile $ 350 $ 350
~ 850 $ 850
1 - Typist Chair 52 52
1 - Map Ladder with Wheels & Pin Storage Box 160 160
96
necessary to purchase the office furnishings PROGRAM PLAN
to begin operations. Desks, chairs and re-
lated equipment will be purchased on com- MANUAL CRIME ANALYSIS UNIT
petitive bids as per city purchasing policy.
An electric typewriter is necessary as all of
1. GOALS
the publications will be duplicated and clear
copy is necessary. This will also be pur- The initial step in crime reduction plan-
chased on bids through the normal city ning is the establishment of a manual Crime
purchasing policy. Analysis Unit. Consistent with this step, the
An electrical calculator is necessary to unit will have the following goals:
develop statistical information for trends, 1. To increase the number of cases cleared
reports, crime recap logs, and other data. by arrest by correlating the MO of arrested
No file cabinets are currently available for suspects to other current offenses.
this purpose, therefore it is necessary to The Crime Analysis Unit will maintain
purchase them through the city purchasing alphabetical and suspect descriptive files
process. cross-referencing MO's of arrested suspects
with other offenses.
2. To provide investigative leads for detec-
E. Supplies and Other Opemting Expenses- tives by furnishing lists of suspects whose
$8,325 MO's match those of current offenses.
This goal will provide the department a
As stated in the program objectives, the new and systematically recorded investigative
Crime Analysis Unit will develop daily, information tool directly related in increas-
weekly, and monthly reports on crime by ing dei.t:ction and apprehension of criminal
type, location and time. Also, special bulle-
offenders.
tins will be generated from this unit. All of
3. To provide a greater number of crime
these reports will not only necessitate the
pattern bulletins for the patrol function,
capability of providing copies of the various
thereby increasing the awareness of field
reports to the precincts within the city, but
officers and increasing the potential for
also the administrative and support divisions
earlier arrests.
within the department. This capability does
The vehicle for implementing this goal
not exist in the police department; therefore,
will be daily, weekly, and monthly bulletins
based on the estimated cost of the volume to
on crime by type, location and time. Also,
be produced, the proposed copying machine other bulletins will be distributed on criminal
will be able to provide the capability needed.
behavior patterns and known suspects.
It will be necessary to distribute volumi- 4. To aid in the coordination of special
nous copies of reports (monthly, quarterly, crime suppression task forces.
etc.) which will require the use of offset The Crime Analysis Unit will prov;de
printing equipment. This equipment offers a periodic reports of a special nature which
fast and efficient method of providing t3ese will identify crimes, location, and suspects
reports. Additionally, special bulletins re- susceptible to selective enforcement task
quiring prints and photographs will be initi- force methods.
ated by the Crime Analysis Unit. These
reports will also require an offset printer.
This capability presently exists through the
City and County Reproduction Unit, which II. IMPACT AND RESULTS
can provide the necessary equipment for The Crime Analysis Unit will have a
these reports. dramatic impact on coordinating informa-
Also, equipment such as tape recorders tion both inside and outside the police
and dictating machines will be rented on an department. This will be accomplished at the
as needed basis. sources which provide the information. The
Space necessary to house the unit is being departmental sources of information for
provided at a cost of 40c per square foot. Crime Analysis Unit operations are commu-
One-hundred fifty square feet is being pro- nications, patrol, detectives, special units,
vided for every (3) full-time Crime Analysis records and administration. The outside
Unit staff; however, this space will also be sources are probation, sheriffs office, courts,
utilized for storage and file space. pawn shops, FBI, state police, NATB, etc.
97
However, crime analysis will have specific • Chronological factors, day of week,
impact and results in the following ways: month, etc.
1. Better information on crime trends, • Victim target, victim age, sex, victim
MO's and location of crimes will be available structure, etc., descriptive.
to field forces and special task force units. • Suspect descriptive: name, age, weight,
2. Tactical planning and performance will etc.
be improved. • Suspect vehicle, make, license, etc.
3, Operation of field forces will be im- • Property loss descriptive, serial number,
proved by enhanced deployment capabilities. make, etc.
4. The investigation function will improve The Crime Analysis Unit will maintain and
by the distribution of investigative leads. store the following files to assist in its
5. A red uctio n in selected crimes will operation.
occur by utilizing the information supplied • Extensive crime logs or ledgers contain-
by the Crime Analysis Unit for improved ing extracted and condensed criminal
apprehension and prevention methods. offense report information of the type
6. Numerous statistical information for presented in the Daily Crime Recap.
management decision making will be pro- • Cross-filing techniques or card systems
vided by the Crime Analysis Unit in the designed to facilitate information re-
form of crime recaps and summaries, etc. trieval from various' sources with little
The success of the Crime Analysis Unit available information (such as alias or
will have broad implications for other units moniker for reference to known df-
within the department and other criminal fender files or vehicles to suspect files).
justice agencies. The impact of this unit by • Alphabetical and suspect descriptive
providing a vehicle for improved police files of field contact cards with possible
effectiveness and efficiency is apt to reach cross-referencing to time and geograph-
further than the departmental level. ical factors as well as associate informa-
tion.
e Known offender files containing basi-
cally the same information as the
III. METHODS AND TIMETABLE
Known Offender Identifier in addition
The methods employed by this unit will to more extensive information with
essentially be manual data extraction and cross indexing to vehicle file, associates
analysis. The basic documents which will be file, crime type MO file, and possibly
received and analyzed by the Crime Analysis reference maps.
Unit are: • Past analyzed records such as photo-
• Selected criminal offense reports. graphic slides of maps, ac~tate plastic
• Selected criminal offense supplemental map overlays, graphical records, and
or continuation reports. published reports.
• All field interrogation cards. The key to the success of the Crime
• All arrest reports. Analysis Unit will appear through the mode
• All subject conditional probation state- of dissemination that it uses for getting the
ments as received by the department information to operational units. The follow-
from the courts. ing techniques will be used as a method of
• Copies of all outside law enforcement dissemination. These will allow for time
agency reports received by the depart- distribution of relevant information.
ment relating either to previously' re-
corded criminal offense reports or
known resident criminal subjects (such Daily Crime Recap (DCR)
as stolen vehicles recovered by others). The Daily Crime Recap is a listing of
Also, information will be obtained through selected crimes reported during the previous
personal contacts with department members. 24-hour period. This listing will provide a
This may take the form of opinions and great deal of information covering: crime
"soft" in telligence. type, classification, date, time, location, evi-
The analysis of the information will be dence, suspect and vehicle information, and
done concerning the following factors: particular MO factors. The information con-
• Crime type, burglary, rape, etc. tained in the DCR is extracted from the
• Geographic area, blo~k, street, etc. original offense reports by the crime analyst
98
and condensed into a form systematically lem pattern and leave the solution to the
distributed to patrol, tactical, and investiga- recipients.
tive personnel.
Investigative Lead Correlation Report (ILCR)
Daily Confidential Information Bulletin (CIB)
Essentially,. the ILCR will be a report to an
The Daily Confidential Information Bulle- individual investigative unit on a particular
tin contains general information on wanted case or body of cases exhibiting similarities
persons, requests for information assistance, to other reported offenses or available sus-
missing persons and juveniles, major crimes pect MO information. This information may
not usually on the DCR (such as attempted be transmitted by the crime analysis section
murder of policemen, etc.), information on routinely as case correlations are observed;
known offenders, and general service infor- or it may be the result of a request by an
mation such as patrol advice, etc. The infor- individual investigator actively seeking any
mation contained in the CIB is extracted correlations.
from miscellaneous reports; information re-
ceived from individual patrol and investiga-
Specific Major Crime Bulletins
tive personnel; other jurisdictions; and ad-
ministrative or supervisory personnel. The The major crime bulletin contains infor-
information inputs from these various mation extracted from a particular case and
sources are reviewed and condensed by the is directed to any other law enforcement
crime analyst for informational and user agency capable of providing additional infor-
needs. mation or assistance.
TABLE A-2. Timetable for Organization and Implementation of Manual Crime Analysis Unit Project
Timetable:
Tasks by Time and Activity
Task Months
Phase I 0 1 2 3 4 5 6 7 8 9 10 11 12
A. Organization
of Project ---X
B. Recruit Staff
C. Training of Staff x x
D. Develop Plans
& Programs x--x
Phase II
A. Implementation
of CAU Project x ______________________________________ ~
x
B. Progress Review x~
C. Operational Program
Assessment x ----------------------------_____x
D. Project Evaluation x ------------------------------~x
E. Quarterly Report * *
F. Final Report
101
ing a budget for such a project include, but
should not be limited to, the following:
Personnel
Two apparently paradoxical staffing situa-
APPENDIX B tions exist. First, as a Crime Analysis Unit
evolves from the man ual mode to becoming
SAMPLE GRANT semiautomated, the staffing ratio changes.
Automation lessens certain personnel l:e-
PROPOSAL: quirements. Secondly, when a Crime Analy-
SEMIA UTOMA TED sis Unit nears total automation, personnel
needs, in terms of programmers, key punch
CRIME ANALYSIS UNIT operators, etc., increase. Staffing needs
should be determined, using the degree of
automation as a metior consideration.
TABLE B-1
"Flow Process" Semiautomated Crime Analysis System
PlliCIICJ\RD
enure CPU
ANALYSIS ~
SECTIO~
I<NOHN
OFFENDER
pATROL
H.O.
CRU1E
PROFILE
INVESTI-
GATION
UNIQUE CRUll=!
1
{
CO rum Lr, '1' I.m!l-~
ADMINI-
STMTIO:J Glu\PIIIC
PL1-:'-:NING COHRELl\TIQ~
tion with cross correlation to vehicles offenders with: a photo of the subject, crime
file, associates file, crime type MO file, specialty, aliases, past arrests, addresses,
and possibly reference maps. criminal associates, vehicles, requests for
• Past analyzed records such as photo- field contact information, etc. The informa-
graphic slides of maps, acetate plastic tion contained in the (SMOB) is received
map overlays, graphical records, and from individual officers, arrest reports, of-
published reports. fense reports, supplemental reports, field
Table B-1 indicates how the semiauto- contacts, etc.
mated Crime Analysis Unit will process in-
formation.
Weekly Crime Summary
The key to the success of the Crime
Analysis Unit will appear through the mode The weekly crime summary issued by the
of dissemination that it uses for getting the Crime Analysis Unit will represent the publi-
information to operational units. The follow- cation of analyzed information for a one-
ing techniques will be used as a method of week period. It will contain information on
dissemination. These will allow for time increases or decreases in crime rate when
distribution of relevant information. compared to the previous week or the same
week of the previous year, graphs, statistical
Daily Crime Recap (DCR) breakdowns, general crime trends and prob-
lem areas, and other crime information.
The Daily Crime Recap is a listing of This will be computer generated.
selected crimes reported during the previous
24-hour period. This listing will provide a
great deal of information covering: crime Crime Pattern Identification Bulletins (CPI)
type, classification, date, time, location, evi- The content of the CPI is based on the
dence, suspect and vehicle information, and analysis of reported crimes by reference to
particular MO factors. The information con- specific crimes, locations, times and suspects;
tained in the DCR is extracted from the it will be both comprehensive and provide
original offense reports by the crime analyst either directive or suggested patrol strate-
and condensed into a form systematically gies, and it will also identify the problem
distributed to patrol, tactical, and investiga- pattern and leave the solution to the recipi-
tive personnel. ents.
I
---------"--------------------------------------
attaching a "control sheet" to all Crime having similar characteristics-and supply this
analysis reports which are produced. These information to appropriate units.
sheets would then be completed by the
report's user and returned. Table B-2 repre- Evaluation Measurement
sents a sample to be used.
An external evaluation component will 1. The number of patterns identified
evaluate the Crime Analysis Unit in terms of 2. Number of apprehensions made
impact. 3. Statistics indicating number of cases
cleared of selected crimes
Goal II-To provide information for gov-
Impact Evaluation ernmental planning agencies relating to se-
l The effectiveness of the Crime Analysis curity considerations for environmental de-
Unit, if correctly applied, should have an sign of new residential communities and
impact of breaking up criminal operations. commercial developments.
However, to quantitatively measure the de-
gree to which crime analysis information Evaluation Measurement
enabled a case to be cleared or an arrest to 1. The number of reports generated
be made is extremely difficult, but necessary. around planning security considera-
Therefore, if crime analysis is effective, tions
some resultant change will be realized in the 2. Identification of the number of plan-
following statistical areas: ning decisions changed as a result of
1. Crime rates Crime Analysis Unit analysis
2. Clearance rates 3. Estimated dollar loss saved
3. Arrest rates Goal III-To develop and implement a
4. Property loss program of crime information dissemination
5. Property recovery and feedback to the uniformed and investi-
gative operations for the purpose of enhanc-
Impact Evaluation Measurements ing the detection and apprehension capabili-
ties of those operations.
1. Arrest Reports
Arrest reports will be modified to provide
a checkbox for crime analysis information Evaluation Measurement
whereby an officer can indicate if the arrest 1. The number and type of bulletins and
was based solely, or partially, or information reports prepared
which was provided by the Crime Analysis 2. The number of apprehensions directly
U nit. Where possible, reference will also be related to Crime Analysis Unit dissemi-
made to the specific Crime Analysis Unit nated information .
Report Number. 3. The number and type of changes in
field deployment patterns
4. Increase in on-view arrests
2. Offense Clearance Reports, Pmperty Recov- 5. The number of stake outs resultant of
ery Reports, and Crime Classification Change Crime Analysis Unit generated infor-
[ Reports
These reports will be modified to provide
similar crime analysis information. By the
mation
The three evaluation components will en-
able decision makers to assess the effective-
officer indicating the degree to which crime ness of the Crime Analysis Unit. To summa-
I analysis was responsible for a case being rize the evaluation, components are:
cleared or property being recovered, the 1. Internal evaluation
program evaluator can begin to evaluate the 2. External impact evaluation
program's impact in relation to changes in 3. Goal achievement evaluation
the overall rates.
Another evaluation component will review V. RESOURCES
each goal and the evaluation measurement
to see if the Crime Analysis Unit is meeting The resources for the Crime Analysis Unit
that goal. The following goals will be eval- will evolve around four areas. Namely, orga-
uated: nizational placement, staffing, community
Goal I-To identify crime patterns-events relations and computerization.
109
-
o
TABLE B-2
Crime Analysis Control Skeet
No "Use" Response
Has the infOl:rnation
oInforrration of no value contained within fr.is
report been used by you?
oInfonration already knCMn
oInfonnation not needed oNo I0 Yes
oInformation did not apply If no, why? I If yes, hCM?
oInforrration identified
unknCMn offense M)pattern
o M) bulletin distribution ostrategy develop:nent
oInfonnation correlated
oBasis of a special
assigTh-rent
task group ostrategy change
offense MO to knCMn pattern
oEstablish new patrol practices
oCorrmunity relations
oInfonnation
offense M)
correlated
toknown offender
and/or procedures oPubLic relations (news !redia)
oInvestigative infonnation
o Short-tenn manpCMer allocation
changes
oother
only
oInfonnation correlated
oother
arrestee to offense M)
oother
----------------------------------------------------
The Crime Analysis Unit will operate out be made as an integral part of an officer's
of the Field Operations Division and report career development program.
directly to the Commander of Field Opera- Officers who will be applying for positions
tions. The Field Operations Division consists in the Crime Analysis Unit will submit at
of all patrol and investigation functions. This least three reports of crimes in which they
placement will provide the necessary admin- conducted the investigations, or contributed
istrative resources which are necessary for a substantially to them. These reports will be
viable Crime Analysis Unit. Also, it provides evaluated in terms of the candidates' atten-
for a close-working relationship with the tion to detail and written expression. Poten-
operational users. tial candidates will be given an oral interview
Another important aspect of development and a practical aptitude test. An excellent
will be the staffing of the Crime Analysis means of establishing analytical skills is to
U nit. The Crime Analysis Unit will be provide the candidate with five-to-ten crime
staffed with representatives from each of the reports with similar MO characteristics.
user groups, particularly from patrol and Their ability to correlate offenses, identify
investigation. By so doing, the staff will similarities, or reach conclusions should pro-
provide the unit with immediate knowledge vide considerable insight as to their poten-
of what is "current" in terms of operational tial. An essential characteristic to look for in
problems, present operating procedures, and screening applicants will, be their capacity to
specific needs. Moreover, it establishes an be imagi)~3.tive and perceptive. Candidates
important informal communications link and must have the ability to identify problems,
rapport between the Crime Analysis Unit isolate the contributory elements, and make
and the working level of operations person- sound judgments. Also, the Crime Analysis
nel. The officers selected for crime analysis U nit will be staffed with an analyst who has
duty will be rotated from the unit after a a background in computer applications.
maximum period of thr~e years. Personnel Another important resource in the depart-
rotations are desirable to obtain fresh view- ment that will benefit from the Crime Analy-
points and new ideas. Moreover, new per- sis Unit operations, is community relations.
sonnel provide fresh insights on offender When positive data, crime trends, MO infor-
activity. mation, and similar types of information are
It is also important that crime analysis available, members of the Community Rela-
duties not be categorized as a "dead end" or tions Unit can sharply enhance their preven-
"retirement job". Assignment to the unit will tion programs.
III
TABLE B-3
Timetable for Organization and Implementation of Semiautomated Crime Analysis Unit Project
B. Recruit Personnel x
C. Training of
Personnel x x
D. Develop Plans x
E. Develop Computer
Component Program x x
Phase II
A. Implement Programs x
B. Progress Review x-x x--x
C. Operational Program
Assessment x x
D. Project Evaluation x x
E. Quarterly Report * * --x
F. Final Report ---x
*Quarterly reports will be published in the 4th and 8th months.
112
----~----
OPERAtIONS
RECORDS ~====:::;-__
r I~~:STS
- - FOR
ANALYSIS
RECORDS
!
PATROL
INVESTIGATED
ADMINISTRATIOH
SPECIAL UNITS
OUTSIDE AGENCIES
RECOROS
STORAGE
MEDIA
117
Tahle C-1 indicates how the automated These sheets will then be completed by the
Crime Analysis Unit will process informa- report's user and returned. Table C-2 repre-
tion. sents a sample which will be used.
In addition, all user requests for informa-
IV. Evaluation tion will be recorded to determine increases
or trends of user relian'ce on specific types
The evaluation of the Crime Analysis Unit of information available. When information
will cover internal and external evaluation. areas are identified as not being utilized,
users will be asked the cause to identify the
Internal Evaluation reasons for the lack of use. Should duplica-
tion of information sources be identified,
The internal evaluation of the Crime such situations will be rectified by incorpo-
Analysis Unit will be oriented toward: rating the sources or by elimination of one
• Examining those tasks which the unit is of the duplicating sources.
performing Finally, six months and ten months after
• Identifying users the system's operational date, questionnaires
• Establishing the overall budget require- will be dist.ributed to all personnel in the
ments for the Crime Analysis Unit, and user groups. These questionnaires will spe-
establishing a cost per unit of work cifically request evaluation of the informa-
• Establishing the degree to which the tion provided by the crime analysis opera-
Crime Analysis Unit is satisfying user tion and will be structured to quantitatively
group needs measure user assessment. An external eval-
Employee daily activity reports, or time uation component will evaluate the Crime
cards, will be a prime source of collecting Analysis Unit in terms of impact.
data regarding the internal activity of the
Crime Analysis Unit. That is, just what Impact Evaluation
functions or work is actually being per-
formed. Summa.ry reports, charts and If the concepts herein are correctly ap-
graphs will be prepared to illustrate a "time plied, the Crime Analysis Unit's work should
spent/required" breakdown for each of the have an impact on the breaking up of
user groups, and for the specific report criminal opera~ions. However, to quantita-
types prepared for each user group. tively measure the degree to which crime
The following will be criteria in looking at analysis information enabled a case to be
activity reports for Crime Analysis Unit cleared or an arrest to be made is extremely
employees: difficult, but a necessary task.
• Time spent for report review (quality Therefore, if crime analysis is effective,
control) some resultant change will be realized in the
• Time spent for filing or record keeping following'statistical areas:
• Time spent for analyzing data 1. Crime rates
• Time spent preparing output reports by 2. Clearance rates
user group 3. Arrest rates
• Number and type of reports prepared 4, Property loss
• Number of correlations made 5. Property recovery
• N umber of new patterns identified
Impact Evaluation Measurements J
1. Arrest Reports
External Evaluation
Arrest reports will be modified to provide
The external evaluation of the Crime a checkbox for crime analysis information
Analysis Unit will be conducted using three whereby an officer can indicate if the arrest
mea:mrement methods. was based solely or partially on information
An attempt will be made to evaluate the which was provided by the Crime Analysis
,unit's activity in terms of meeting user Unit. Where possible, reference will also be
needs. In other words, is the Crime Analysis made to the specific Crime Analysis Unit
Unit "doing the right things" according to Report Number.
those who are receiving its prod ucts. Such a 2, Offense Clearance Reports, Property Recov-
determination can be made by attaching a ery Reports, and Crime Classification Change
"control sheet" to all crime analysis reports. Reports
118
..,----- , ,
TABLE C-2
Crime Analysis Control Sheet
No "Use" Response
Has the infonnation
oInfoDnation of no value contained within this
rep:>rt been used by you?
oInfonnation already known
oInfonnation not needed ONo I 0 Yes
oInfonnation did not apply If no I why? I If yes I hCM?
oInfonnation identified
unknown offense MJ pattern
o1\1) bulletin distribution oStrategy developnent
o Infonnation correlated
oBasis of a special task group
assignment
oStrategy change
off€TIseMJ to known pattern
oEstablish new patrol practices
o relations
Corrmunity
oInfonnation
offense MJ
correlated
toknown offender
and/or procedures oPublic
(news
relations
rredia)
oInvestigative infonnation
oShort-tenn
changes
manp:>wer allocation
oOther
only
oInfonnation correlated
oOther
arrestee to offense MJ
oOther
......
......
t.O
These reports will be modified to provide The three evaluation components will ena-
similar crime analysis information. By having ble decision makers to assess the effective-
each officer indicate the degree to which ness of the Crime Analysis Unit. To summa-
crime analysis was responsible for a case rize the evaluation, components are:
being cleared or property being recovered, 1. Internal evaluation
the program evaluator can begin to evaluate 2. External impact evaluation
the program's impact in relation to changes 3. Goal achievement evaluation
in the overall rates.
Another evaluation component will review
V. Resources
each goal and the evaluation measurement
to see if the Crime Analysis Unit is meeting The resources for the Crime Analysis Unit
that goal. The following goals will be eval- will revolve around four areas. Namely, orga-
uated: nizational placement, staffing, community
Goal I-To identify crime patterns-events relations and computerization.
having simBar characteristics-and supply The Crime Analysis Unit will operate out
this informa'don to appropriate units. of the Field Operations Division and report
directly to the Commander of Field Opera-
tions. The Field Operations Division pres-
Evaluation Measurement:
ently consists of all patrol and investigation
l. The number of patterns identified functions. This placement will provide the
2. Number of apprehensions made necessary administrative resources necessary
3. Statistics indicating number of cases for a viable Crime Analysis Unit. Also, it
cleared of selected crimes provides for a close working relationship
Goal II-To provide information for gov- with the operational users.
ernmental planning agencies relating ~c se- Another important resource will be the
curity considerations for environmental de- staffing of the Crime Analysis Unit. The
sign of new residential communities and Crime Analysis Unit will be staffed with
commercial developments. representatives from each of the user
groups, particularly from patrol and investi-
gation. By so doing, the staff will provide
Evaluation Measurement:
the unit with immediate knowledge of what
1. The number of reports generated is "current" in terms of operational prob-
around planning security consierations lems, present operating procedures and spe-
2. Identification of the number of plan- cific needs. If the computer system is to
ning decisions changed as a result of adequately support an analysis unit, that is,
Crime Analysis Unit analysis give it the capabilities required to "fully
3. Estimated dollar loss saved automate" the crime analysis function, the
Goal III-To develop and implement a unit personnel must become actively in-
program of crime information dissemination volve.:! in the development and implementa-
and feedback to the uniformed and investi- tion phases of computer installation. The
gative operations for the purpose of enhanc- data elements and analysis techniques that
ing the detection and apprehension capabili- are applicable to crime analysis must be
ties of those operations. delineated for the department; and steps
must be taken to assure that proper data
Evaluation Measurement:
elements and techniques are available to the
analysis section. Also, the Crime Analysis
l. The number and type of bulletins and Unit will be staffed with an analyst who has
reports prepared a background in computer applications. This
2. The number of apprehensions directly person will provide technical expertise in the
related to Crime Analysis Unit dissemi- programming and ongoing upgrading of
nated information the operation. He will also be expected to
3. The number and type of changes in provide some expertise in statistical applica-
field deployment patterns tions within the system.
4. Increases in on-view arrests The Crime Analysis Unit will utilize.. the
5. The number of stake-outs resultant of city owned computer. This is a duplexed
Crime Analysis Unit generated infor- system providing 24-hour a day, seven day a
mation week operation. The police department cur-
120
- ------------------------
rently utilizes this system for the storage of for the known offender and MO files, the
numerous types of police records, including field contact file, the pawned property al-
the recording of all crime reports. The phabetic file, and the known suspect vehicle
department has on-line capabilities to the file. The crime analysis terminal will also be
city computer via three existing remote CRT capable of accessing the existing crime re-
terminals; these are utilized mostly for data port and alphabetic index file in unique and
entry and file updating. Various security and specific ways, by alias or moniker, for exam-
privacy safeguards are already employed pIe.
within the system. The crime analY5is unit Prior to developing software programs to
will require an additional CRT terminal with implement the required crime analysis files
hard copy capability. Several of the files to various packaged applications will be exam-
be implemented will only be accessible ined for suitability. It is anticipated that not
through the crime analysis terminal; this is a all of the required programs will be neces-
security and privacy consideration intended sarily developed by the department.
TABLE C-3
Timetable for Organization and Implementation of Automated Crime Analysis Unit Project
C. Recruit Personnel :x
D. Training of
Personnel x :x
E. Develop Plans x
F. Develop Computer
Component Program x
Phase II
A. Implement Programs x
B. Prosrress Review x--x x--x
C. Operational Pro-
gram Assessment x x
D. Project Evaluation x --x
E. Quarterly Report * * --x
F. Final Report ---x
*Quarterly reports will be published in the 4th and 8th months.
121
DUTIES AND RESPONSIBILITIES:
60% l.SUPERVISION
a. Directs, coordinates and assists in
the preparation of crime data derived
from crime reports submitted by field
APPENDIX D. units and other sources. Directs the
gathering, tabulation, analysis and dis-
semination of information relating to
CRIME ANALYSIS UNIT criminal personalities and activities in
STAFF JOB the city. Reviews daily and periodic
crime summaries and bulletins pre-
DESCRIPTIONS pared by the Unit.
20% 2. STAFF DUTIES
POLICE DEPAR.TMENT POSITION DE- a. Analyzes, reviews and evaluates
SCRIPTION: assembled crime data and prepares
SECTION SUPERVISOR, CRIME ANALY- conclusions and recommendations
SIS SECTION based on this data for publication and/
CIVIL SERVICE CLASS TITLE: Sergeant or for review by command personnel.
of Police b. Prepares narrative portions of
DIVISION, SECTION OR UNIT: Field periodic crime summaries and other
Operations Services Section, Crime reports.
Analysis Unit 20% 3. LIAISON ACTIVITIES
HOURS ASSIGNED: 40 Hrs. per Week a. Maintains close coordination with
IMMEDIATE SUPERVISOR: Captain of all field divisions in order to expedi-
Police tiously disseminate crime information
NUMBER OF SUBORDINATES SUPER, of value to beat officers.
VISED: Five b. Carries out liaison activities with
outside agency personnel in order to
exchange crime information which in-
SUMMARY:
cludes more than one jurisdiction.
A SERGEANT OF POLlCE assigned to the
Crime Analysis Section organizes and directs
the activities of the Unit, maintains liaison POLICE DEPARTMENT POSITION DE-
with line units and outside agencies, and SCRIPTION:
maintains the efficiency and discipline of his CRIME ANALYSIS OFFICER
subordinates. He conducts and directs ap- CIVIL SERVICE CLASS TITLE: Patrolman
praisal and analytical activities and publishes DIVISION, SECTION OR UNIT: Field
various periodic and special reports describ- Operations Services Section, Crime
ing criminal activity and persons believed Analysis Unit
responsible. The position differs from other HOURS ASSIGNED: 40 Hrs. per Week
supervisory positions in that activities per- IMMEDIATE SUPERVISOR: Sergeant of
formed are of a staff nature and depend on Police
effective liaison to achieve their objectives. NUMBER OF SUBORDINATES SUPER-
The Sergeant reviews, edits and approves VISED: None
the production of the Unit, and participates
in crime review meetings to present current SUMMARY:
criminal data to other units. The Sergeant
confers with supervisors in field divisions in A Patrolman assigned as a Crime Analysis
order to exchange information regarding Officer gathers information pertaining to
offenses and suspects. The Sergeant is su- crime from line divisions, and in turn sup-
pervised by the Field Operations Com- plies derived information to these divisions
mander. The position requires supervisory in the form of crime pattern recapitulations,
ability, ability to maintain effective liaison, suspect and associates lists, field contact logs,
and the ability to analyze and present a areas or buildings having a high crime
. variety of criminal data to all levels of the potential, .and the like. The position differs
Department. from others in the Division in that primary
122
I emphasis is placed on daily appraisal and
evaluation of crime patterns and trends.
The officer reviews all crime reports sub-
mitted by line divisions and extracts modus
provide other CrIme prevention In-
formation.
c. Field Contact Report Informa-
tion
operandi and other pertinent information. 1. Receives, sorts, and reviews
He reviews various reports, including field field contact reports for possible con-
contact reports, and attempts to relate offen- nections to offenses, to note associ-
ses and suspects. The Crime Analysis Officer ates of the person interrogated, and
prepares and disseminates daily special bul- to extract other information which
letins containing summaries of crimes occur- may be of value.
ring during the past day and any other 2. Provides requested informa-
information of value to field officers. He tion from field contacts, reports to
prepares a Weekly Crime Summary which other units of the Department and to
reports preliminary statistical data for the outside law enforcement agencies.
period. The officer is supervised by the d. Maintenance of Crime and Of-
Sergeant in ChJrge, Crime Analysis Section; fender Maps
the position requires a sound knowledge of 1. Maintains pin maps on which
police operations, excellent analytical ability, offenses in the .categories of bur-
and ability to maintain effective 'working glary, robbery, car clout and bur-
relationships with field units. glary, auto accessory and auto tqeft
are indicat.ed. Maps reflecting total
crime and special problems undergo-
DUTIES AND RESPONSIBILITIES: ing study are also maintained.
100% 1. STAFF DUTIES
a. Analysis and dissemination of
Crime Data. POLICE DEPARTMENT POSITION DE-
1. Receives, sorts and reviews SCRIPTION:
reports of Part I crimes submitted by DEPARTMENT POSITION CODE NO.
line divisions; verifies proper crime CLERK TYPIST II
and classification descriptions and CAREER SERVICE AUTHORITY CLASS
prepares a synopsis of the crime. TITLE: Clerk Typist II
2. Maintains recap sheets listing DIVISION, SECTION OR UNIT: Field
each type of crime, modus operandi Operations Services Section
information, and any subsequent ar- HOURS ASSIGNED: 40 Hrs. per Week
rests. IMMEDIATE SUPERVISOR: Sergeant of
3. Prepares and disseminates list- Police
ings by police beat of all Part I or NUMBER OF SUBORDINATES: None
other crimes of interest occurring in
the past 24-hour period. SUMMARY:
4. Submits offense evaluation re-
ports to criminal investigators when- A Clerk Typist II assigned to the Crime.
ever offenses have a similar modus Analysis Section, Research & Development
operandi. Bureau files field contact and crime offense
b. Special Publications reports, types crime analysis bulletins and
1. By appraisal and evaluation of recap sheets, and answers telephone inqui-
reported and derived data, prepares ries, giving information to outside agencies
special bulletins containing informa- and other units of the Police Department.
tion describing a particular series of The Clerk Typist is supervised by a Sergeant
related crimes, possible res ponsibili- and receives instructions from the Crime
ties, potential times, and locations of Analysis Section officers regarding specific
occurrences, method of operation, daily duties. The Clerk Typist is guided by
and the like. departmental rules, regul~tions, orders, and
2. Through study and analysis established procedures for this position.
of residence of known offenders and
their movements throughout the city,
DUTIES AND RESPONSIBILITIES:
prepares reports which serve to alert
field officers to their methods and to 35% 1. TYPING DUTIES
123
----~---.
124
Statewide Crime Analysis
State crime analysis operations have lim-
ited utility due to the vast area to cover and
the large number of agencies to service. A
state crime analysis operation cannot per-
APPENDIX E.
form crime anal ysis in the same manner or
provide the same types of services as a local
THE ROLE OF law enforcement crime analysis operation.
Even if a state employs some form of crime
REGIONAL AND analysis operation, it cannot replace the need
STATEWIDE CRIME for local crime analysis operations.
The state crime analysis operations should
ANALYSIS SYSTEMS supply additional services to local law en-
forcement agencies which will aid their own
operations. State operations, similar to that
VERY FEW crime analysis operations exist on of California, can provide services for local
a regional or statewide basis. One of the units of government, such as the ability to
more established operations is the Crime search state criminal identification records,
Pattern Analysis Section of the California establish criminal modus operandi matches,
Department of Justice. It is used by local and identify statewide patterns such as bur-
police departments as a service agency that glary gangs and statewide forgery patterns.
provides investigative assistance by identify- The state can also provide assistance in
ing suspects by crime modus operandi. Its coordinating various local crime analysis op-
main service to communities is informing a erations. This provides a central repository
department that a particular crime they have for crime al?alysis reports, establishes stand-
reported has similar characteristics to a ards in offense reporting, and creates a
crime reported by another agency. These liaison with state investigative agencies.
agencies must then take the initiative to It is important to remember that state
make contact with one another to compare crime analysis operations cannot take the
information. place of nor should they compete with local
We know that criminals do not confine crime analysis operations. State crime analy-
their activities to a single jurisdiction. Conse- sis operations should be viewed as a supple-
quently, there is a need to develop informa- ment to local crime analysis efforts.
tion resources with surrounding communi-
ties to assist a department's crime analysis
operations. An awareness of what is happen-
ing in surrounding communities may assist Regional Crime Analysis
in identifying a pattern that exists in one city
and may spread into neighboring communi- Crime analysis at the regional level has
ties. Usually, the existence of information more applicability to formal crime analysis
cooperation exists between departments at operations since crime patterns have a ten-
l
I
the investigative level. A detective from one
department may make contact with and
receive information from a neighboring de-
partment concerning a specific case or crime
dency to overlap from one jurisdiction to
another. However, difficulties for regional
crime analysis operatioEJ are similar to those
of the state in that they are confronted with
pattern. multiplicity of reporting procedures and
I There are limitations to the effectiveness practices, varying degrees of sophistication
of this kind of agreement. Unfortunately, in conducting preliminary and followup in-
the provincialism of local law enforcement vestigations, and varying degrees of experi-
agencies makes it difficult for a single ence in using crime analysis.
agency to establish a centralized crime analy- Centralized Crime Analysis Model. The cen-
sis service for a number of departments. tralized crime analysis operation has the
The suspicion that one agency is analyzing operation and responsibility housed in a
crime for their own benefit and not for single agency. This model has the advantage
others would interfere with an effective of maximizing the availability of resources
crime analysis operation. and eliminating the duplication of efforts. A
125
disadvantage of this type of system is that data base on which to develop analysis,
the location of a centralized crime analysis varying degrees of interest by participating
unit in one agency causes suspicion and agencies, and difficulty to place responsibil-
mistrust in other agencies. It is often diffi- ity. The most effective use of this model is
cult to establish the lines of communication for those agencies which have crime analysis
necessary for an effective crime analysis operations to develop an informal organiza-
operation. tion allowing them to circulate information
The best placement of a centralized crime regarding patterns and criminal activity on a
analysis operation is in the department routine and specialized basis. In this man-
which has overall jurisdiction. This can be a ner, one department assumes the responsi-
county police office, sheriff's office or met- bility of coordinator for the various analysis
ropolitan police department. There is ac- reports. This procedure provides one central
ceptance by the majority of police depart- contact point for obtaining information re-
ments for this arrangement. The placement garding any specific crime problem in the
of such an operation in a major police area. The effectiveness of this operation is
depcrtment has to overcome existing biases contingent on the interest and resources
of smaller agencies against the department, available at the point of c::oordination. It is
particularly when it comes to telling them essential that the coordination agency has a
how to allocate their field forces. The estab- formal crime analysis operation.
lishment of a board of directors (advisory A modification of this model applies to
board) alleviates some of these problems. those jurisdictions where a number of small
This board should be comprised of users of communities surround a large city. The
the crime analysis system and must be given large city can arrange for smaller communi-
the responsibility and authority to layout ties to make extra copies of selected crime
policies, establish priorities, and direct sanc- reports to be forwarded to the larger depart-
tions against misusers of the system. ment's crime analysis operation. These re-
ports are handled just like the city's reports.
Cooperative Crime Analysis Model. A second Analysis (pin maps and other aids) is ex-
model is sharing information between neigh- panded to include the smaller jurisdictions.
boring communities. While this may be ac- The smaller jurisdictions receive the benefits
ceptable, it has many drawbacks including of the analysis through various bulletins and
difficulty in obtaining reports in a consistent other dissemination mechanisms prepared
and routine manner, lack of an extensive by the crime analysis operations.
126
Data Capture-the process of gathering information.
Data Elelllent-an informational component which can be
extracted from the collected data.
Data Purge Criteria-the basis for removing data from the
files.
Data Source-the informational contributors generating and
pl)viding data.
Extraction-the removal of pieces of information from their
GLOSSARY original context.
Field Contact Infol'lIlation-information derived from review
and examination of field contact reports written by any non-
analysis personnel.
Inforlllational Factors-any conditional variable that is usually
Aggravated Assault-the unlawful attack by one or more recorded when available in reporting all criminal offenses or
persons upon another for the purpose of inflicting great specific crime types.
bodily harm usually accompanied by the use of a weapon. Intelligence (Hal'd)-information which has been verified as to
Severe injury need not result. validity and reliability, and can be used to establish reasonable
Analysis-the breaking up of data into elements and factors or probable cause.
for comparison, collation, correlation, and assembly in a Intelligence (Sqft)-information, not usually recorded, of ques-
logical manner to form patterns and meaning not previously tionable validity and reliability.
discernable. MO-the combination of informational factors and element
Analysis Unit (or Analysis Section)-a phrase used in this text to components which separate one crime type from another and
refer to the personnel and equipment organized to perform define the perpetrator's method of operation for a particular
the analysis function within any law enforcement agency or crime or group of similar crimes of the same type.
grou p of agencies. Prevention-the process by which a crime is kept from
Apprehension-the capture or arrest of a criminal perpetrator happening as a result of an influence not directly associated
during or after the commission of a criminal offense. with law enforcement activity.
Burglary-the unlawful entry of a structure to commit any Rape-the carnal knowledge of a female through the use of
theft or felony offense. force or threat of force.
Close Patrol-the patroVsurveillance of an area or building Robbery.-the theft of property or a thing of value committed
that is a short term directed response to a citizen complaint in the presence of the v;ctim; accomplished by the use of
or req uest. force or threat of force.
Collatioll-the process of putting in a proper order the Screening Re/Jorts-a report of the results of the interviewing
extracted data elements and factors for comparison and of a suspect.
correlation analysis. Strong Armed Robbely-any robbery in which no weapon was
Comparison-the examination of extracted data elements and used or implied.
factors to determine similarities or differences. SUjJprcssion-the process by which a crime is kept from
Coordination-the process by which divergent groups of dif- happening as a result of directed law enforcement activity.
ferently functioning units are brought together to form a Sus/leet Debriifing-the process of interviewing a suspect to
harrnonious relationship for common action. determine cause, motivation, attractiveness, etc. of crime
Correlation-the determination of relationships between ex- inddent.
tracted informational elements. Tabulation-the systematic listing of details or contel1ls in an
Crime Pattern-a number of criminal offenses displaying a orderly arrangemelll.
variable number of similarities. Thifl (Larceny)-the unlawful taking or stealing of property or
Crime Tl'end-a change or deviation from the norm as to articles of value without the use of force, violence, or fraud.
either volume of reported crimes or types of criminal activity. Thifls from Persons-the taking or stealing of property or
Data-collected and assembled information available for anal- articles of value from the victim's person without the use of
ysis. superior force or infliction of bodily injury.
127
,-----------------------------------------------------------------------------------------
I
128
L ________________________________
PRESCRIPTIVE PACKAGE: Police Crime Analysis Unit Hand-
book
To help LEAA better evaluate the usefulness of Prescriptive Packages, the reader is
requested to complete and return the following questions.
3. To what extent do you see the package as being useful in terms of: (check one box
on each line)
Highly Of Some Not
Useful Use Useful
Modifying existing projects o o o
Training personnel o o o
Administering on-going projects o o o
Providing new or important information o o o
Developing or imp'lementing new projects o o o
4. To what specific use, if any, have you put this particular parckage?
A. Structure/Organization
B. Content/Coverage
C. Objectivity
D. Writing Style
6. How did this package come to your attention? (check one or more boxes)
o LEAA Mailing of package o LEAA Newsletter
o Your organization's library o National Criminal Justice Reference
o Contact with LEAA staff Service
o Other
7. Additional Comments:
129
8. Check ONE item below which best describes your affiliation with law
enforcement or criminal justice. If the item checked has an asterisk (*), please
also check the related level, i.e.,
o Federal o State o County o Local
Your Position
(Fold)
Director
Office of Technology Transfer
National Institute of Law Enforcement
and Criminal Justice
U.S. Department of Justice
Washington, D.C. 20530
(Fold)
130