Professional Documents
Culture Documents
or
1
Slide 2
Introduction
2
Slide 3
3
Slide 4
5
Slide 6
Looking forward…
6
Slide 7
Agenda
Introduction
– Explanation
– Videos
– Perceptions
Math, Computers & Crime
– Math in everyday life
– Math and crime-fighting
Conclusions
Questions & Answers
8
Slide 9
Who
What
When
Where
How
9
Slide 10
10
Slide 11
Information = Data
This is sometimes recognized at some level.
Joseph Wambaugh, ex-LAPD Detective,
award winning mystery novelist and
screenwriter wrote this in The Black Marble:
11
Slide 12
Information = Data
“You walked in with
information and a
pretty face.
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
Math is everywhere.
Elections
– Voting, exit polls, voter identification/analysis
Sports
– Statistics, sabermetrics, betting/sports book
Lottery
– Probability (or perhaps improbability!)
Math in advertising
– frequency atlas, Google advertisements, British
two pound coin
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
Crash Reconstruction
Collision evidence
– positions of rest, skid marks, roadway markings,
damage to vehicles, damage to property
Other evidence
– Witness recollections, traffic control devices,
weather conditions, lighting issues
Available specifications
– Newton’s laws of motion
Collision reconstruction techniques
– Damaged-based
– trajectory-based
20
Slide 21
Image Deblurring
“Enhance…enhance…enhance…”
Blurring is typically caused by movement
during the capture process by the camera or
by the subject, or an out of focus lens
Deblurring involves finding a mathematical
description of how the image was blurred
21
Slide 22
Image Deblurring
Before… After
22
Slide 23
Image Deblurring
A camera captured this image
23
Slide 24
Deblurring Fingerprints
A very touchy subject! By deblurring a
fingerprint, are non-existent details being
added to a latent print?
Typically, any enhancement (fingerprint or
otherwise) must be verifiable and able to be
duplicated by another expert
The risk in “crossing the line” is highly
dependent upon use of tools
24
Slide 25
Fingerprint Matching
Different vendors use different algorithms
10 different Fingerprint Individuality models
Minutiae matching vs. Pattern matching
Speed and throughput vs. accuracy
Error rates
– Type I (FP, FRR) vs. Type II (FN, FAR)
– Crossover or Equal Error Rate
– Security vs. Forensic Science
25
Slide 26
26
Slide 27
Fingerprint Classification
27
Slide 28
28
Slide 29
Escape Math
Variables
– Time, Method of travel, Achievable speeds,
Traffic density, Traffic choke points
Dijkstra’s algorithm
– Link-state routing protocols (OSPF), MapQuest,
Google Maps
Random walks
– Calculate distance escaped POWs could travel
in WW2
Trawler problem
Drive-time calculations (MapPoint)
Social network analysis (to be discussed
later)
29
Slide 30
Dijkstra’s
Algorithm
30
Slide 31
Random walks
31
Slide 32
Trawler problem
32
Slide 33
33
Slide 34
Social Networks
Social network analysis
– Google’s PageRank algorithm is an example of
network analysis
– Organized crime, gangs, terrorist cells,
individuals, other organizations
– Social relationships in terms of nodes and ties
– Determine the social capital of individual actors
Things to consider
– Who are someone’s closest friends/associates?
– Where might that person flee to?
– Structural cohesion: could you eliminate a
specific individual from a group which could
cause that group to collapse?
34
Slide 35
Social
network of a
project team
35
Slide 36
Crime Mapping
Choropleths
Pin Mapping
Hot Spot Analysis
Geographic Profiling
37
Slide 38
France,
1829
38
Slide 39
London,
September
1854
39
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
Geographic Profiling
If Psychological/criminal profiling tells you
“who”, geographic profiling tell you “where”
Suitable for serial crimes: murder, rape,
robbery, arson, predatory crimes
Gives police a starting point from which to
narrow down lists of suspects
Does not replace traditional investigative
techniques, but supplements them to help
manage the large volume of information
46
Slide 47
Geographic Profiling
CrimeStat, Dragnet, Predator, Rigel
Theory is based upon “journey to crime” and
“principle of least effort”
“Journey to crime” varies among type of
crime, age, race, etc.
Includes a buffer zone around the offender’s
home or base of operations
47
Slide 48
48
Slide 49
Jeopardy Surface
49
Slide 50
Probability of Offender
Residence
50
Slide 51
GeoProfile
51
Slide 52
52
Slide 53
53
Slide 54
55
Slide 56
56
Slide 57
Conclusions
58
Slide 59
References
Mark Bridger, Northeastern University
Valdis Krebs @ orgnet.com
David Weisburd and Tom McEwen, “Crime
Mapping and Crime Prevention”
Dr. Kim Rossmo, Texas State University
Rob Gebeloff, NJ Star-Ledger
Dr. Raymond Chan, CUHK
Mitsubishi Electronic Research Laboratories
Zeno Geradts, Netherlands Forensic Institute
Henry C. Lee and R.E. Gaensslen, Advances in
Fingerprint Technology, 2nd Ed.
59
Slide 60
60