Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis.

Similar documents
CRIMINAL JUSTICE (CJ)

USING GIS AND DIGITAL AERIAL PHOTOGRAPHY TO ASSIST IN THE CONVICTION OF A SERIAL KILLER

Predictive Policing: Preventing Crime with Data and Analytics

GIS and crime. GIS and Crime. Is crime a geographic phenomena? Environmental Criminology. Geog 471 March 17, Dr. B.

TACKLING NEAR REPEAT CRIME

Criminal Justice (CJUS)

Application of Investigations

Program in Criminal Justice Rutgers, The State University of New Jersey. Learning Goals: A Statement of Principles

Los Angeles Valley College Emergency Services Department

VISTA COLLEGE ONLINE CAMPUS

Kentucky SAFE Kit Backlog Research Project Initial Report: Data Collection, Sources, Methods, and Research Questions

High-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany

The Investigative Process. Detective Commander Daniel J. Buenz

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

The Relationship between Crime and CCTV Installation Status by Using Artificial Neural Networks

Fingerprinting. A game-changing science that detects concealed information stored in the brain

she went to a Detroit restaurant with friends for dinner, and on the way back to her car, she was dragged into an alley and brutally raped.

Cold Cases and Follow-Up Investigations:

Section 4: Behavioral Geography

Rapid City Police Department 2016 Crime Statistics PREPARED BY CHRIS STEVENSON CRIME ANALYST RAPID CITY POLICE DEPARTMENT

Criminology and Criminal Justice

Mapping fear of crime dynamically on everyday transport: SUMMARY (1 of 5) Author: Reka Solymosi, UCL Department of Security & Crime Science

FREE INTRODUCTION MODULE

ORDINE DEGLI AVVOCATI DI MILANO GUIDELINES TO FIGHT CYBERCRIMES AND PROTECT VICTIMS

The Research Partner Model

Determining the Optimal Search Area for a Serial Criminal

Leading the SART Response: A Workshop for Rural Team Coordinators

SpringerBriefs in Criminology

DRAFT Unit Overview

A Visual System for Custom Security Analysis in Cities

Safety & Accountability Audit

Criminal Justice - Law Enforcement

Detecting and Disrupting Criminal Networks. A Data Driven Approach. P.A.C. Duijn

Event Classification and Relationship Labeling in Affiliation Networks

Lasso: Linkage Analysis of Serious Sexual Offences

Moving Towards a Continuum of Services. Plumas County Alcohol & Drug Strategic Planning Process DRAFT PLAN

Crime Research in Geography

Do Serial Sex Offenders Maintain a Consistent Modus Operandi?: Findings from Previously Unsubmitted Sexual Assault Kits

Violence against Women: Do the Governments Care? Mapping the state response in CEE and CIS countries

Corrections, Public Safety and Policing

FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT ABSTRACT

Juvenile Curfew Ordinance Review and Data Analysis

Foundations of AI. 10. Knowledge Representation: Modeling with Logic. Concepts, Actions, Time, & All the Rest

National Outreach Priorities & Agenda

VULNERABILITY AND EXPOSURE TO CRIME: APPLYING RISK TERRAIN MODELING

Guidance for generating Design Against Crime ideas

E x e c u t i v e S u m m a r y. P o w e r e d b y

Unit 1 Exploring and Understanding Data

CRIMINAL JUSTICE SECTOR. Strategic Intent YEAR PLAN

Physical Evidence Chapter 3

Applying Mathematics...

Statistical Summaries. Kerala School of MathematicsCourse in Statistics for Scientists. Descriptive Statistics. Summary Statistics

Group Assignment #1: Concept Explication. For each concept, ask and answer the questions before your literature search.

Gun Violence. 7th Annual Youth Violence Prevention Conference. April, 2008

PLOs for Social Science & Humanities Division - Active Only

A Multi- jurisdictional Test of Risk Terrain Modeling and a Place- based Evaluation of Environmental Risk- Based Patrol Deployment Strategies

SOCIAL-ECOLOGICAL CONSIDERATIONS IN THE EVALUATION AND IMPLEMENTATION OF ALCOHOL AND HIGHWAY SAFETY PROGRAMS

THE BLOCKWATCH HANDBOOK

Discovering Identity Problems: A Case Study

Expert consultation on improving drug statistics and strengthening the Annual Report Questionnaire (ARQ)

Kimberly A. Lonsway, PhD and Sergeant Joanne Archambault (Ret.) with contributions by Alison Jones-Lockwood. August 2006, Last updated July 2017

Arrests for Drug Offenses in Alaska:

CHAPTER 1 An Evidence-Based Approach to Corrections

Expert consultation on the improvement of drug statistics and to strengthen the Annual Report Questionnaire (ARQ) UNODC Concept Note

P.O. Box 4670, Station E, Ottawa, ON K1S 5H8 Tel Fax Website: BULLETIN!

Department of Criminal Justice

MSc Criminology with Forensic Psychology

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test?

Cybercrime: Technology Turns into a Curse. Technology has advanced drastically over the years. Specifically, computers continue to

Digital evidence, absence of data and ambiguous patterns of reasoning

Presentation to The National Association of Sentencing Commissions Annual Conference August 28, 2017

School of Law and Criminology

Towards an instrument for measuring sensemaking and an assessment of its theoretical features

Programme Specification. MSc/PGDip Forensic and Legal Psychology

Mayor s Gang Prevention Task Force

COLLEGE BOUND- Criminal Investigation

Using Data Mining Techniques to Analyze Crime patterns in Sri Lanka National Crime Data. K.P.S.D. Kumarapathirana A

Law Enforcement Related Violence Reduction Strategies (with Inventory) Working Paper # 9 September 2011

POSSIBLE IMPROVEMENTS TO THE NATIONAL CRIME VICTIMIZATION SURVEY USING THE AMERICAN COMMUNITY SURVEY

Campus Crime Brochure

Our focus. Your priorities.

Handling Partial Preferences in the Belief AHP Method: Application to Life Cycle Assessment

Criminal Psychology. What it takes to commit a crime

CHAPTER 1 Criminology and the Sociological Perspective

CRIMINOLOGY TODAY. AN INTEGRATIVE INTRODUCTION sixth edition. By FRANK SCHMALLEGER. Pearson Education, Inc.

Violence as a Health Crisis: What Does the Research Say about Reducing Violence?

Planning for Problem Solving in BCJI: Finding the Solvable Problem. FY 2016 Planning and Implementation Grantee Meeting Washington, DC March 2017

NEW COURSE: BACHELOR OF FORENSIC SCIENCE DR SCOTT CHADWICK LECTURER, CENTRE FOR FORENSIC SCIENCE

M.S. in Criminal Justice Electives Course Descriptions: CJI 0601 Examining the Role of Police and Minority Communities (3 credits):

Smart BJA Initiatives and the Role of the Research Partnership

Spring 2018 Law Enforcement Course Listings Continuing Education & Customized Training

Executive Summary. The Case for Data Linkage

The Link Between Drugs and Homicide

PROSECUTION AND RACE IN THE CRIMINAL JUSTICE SYSTEM MILWAUKEE S EXPERIENCE

Criminal Justice (CJ)

CITY OF BEVERLY HILLS POLICY AND MANAGEMENT MEMORANDUM

Summary. Frequent offenders: specialists or not?

FASD: A Justice Perspective

Improving rapid counter terrorism decision making

1. What we learned from the problem analysis note that these findings are preliminary and a final report is yet to be completed.

Transcription:

Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis. Quist-Aphetsi Kester, MIEEE Lecturer, Faculty of Informatics Ghana Technology University College, Accra, Ghana Email: kquist-aphetsi@gtuc.edu.gh Abstract - There are challenges faced in today s world in terms of crime analysis when it comes to visualization and analysis of data in fighting crime. Activities of criminals in terms of who they communicate with, and how they are linked and related with other groups is very difficult to visualize and follow using traditional investigative procedures. In this world of terrorism, it is very important to know the network of individual suspects. It is also important to analyze the attributes of members of a network and the relationships that exist between them either directly or indirectly. This will make it easy for concepts to be built in aiding criminal investigations. However traditional approaches cannot be used to visualize and analyze data collected on individuals. With this current day where information systems play critical role in everyday life of every individual, it is easier to depend on digital information in fighting crime. Effective computer tools and intelligent systems that are automated to analyze and interpret criminal data in real time effectively and efficiently are needed in fighting crime. These current computer systems should have the capability of providing intelligence from raw data and creating a visual graph which will make it easy for new concepts to be built and generated from crime data in order to solve understand and analyze crime patterns easily. This paper proposes a new method of computer aided investigation by visualizing and analyzing data of mobile communication devices using Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus. This method considered the set of common and distinct attributes of data in such a way that categorizations are done based on related data with respect to time and events. This will help in building a more defined and conceptual systems for analysis of crime data that can easily be visualized and intelligently analyzed by computer systems. Keywords: Computer Aided Investigation, Visualization, mobile communications, analysis, crime pattern, data.

I. Introduction According to S Hinduja, many traditional crimes are now being aided or supported through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future. [1] Virtually all societies in the modern world are troubled by criminal activities every day. Most of these activities are done by individuals or organized groups. While crime rates vary enormously from one country to another and from one region to another, criminal behavior remains a cause for concern amongst most members of the public. Solving crimes has been the prerogative of the criminal justice and law enforcement specialists. With the increasing use of the computerized systems to track crimes, computer data analysts have started helping the law enforcement officers and detectives to speed up the process of solving crimes. The most efficient and effective way of fighting crime today cannot be resourceful without geographical profiling. Criminal activities have become very complex in such a way that rapid monitory can only be achieved by using intelligent systems with geographical components. [2] Criminal investigative approaches are needed to analyze connected series of crimes to determine the most probable area of offender residence. By incorporating both qualitative and quantitative methods, it assists in understanding spatial behavior of an offender and focusing the investigation to a smaller area of the community. Typically used in cases of serial murder or rape (but also arson, bombing, robbery, and other crimes), the technique helps police detectives prioritize information in large-scale major crime investigations that often involve hundreds or thousands of suspects and tips.[3] A criminal pattern analysis is very crucial in combating crime. Computer systems have to be engaged in order to gather and interpret intelligence so as to control the criminal environment as well as influence effective decision making as in figure 1 below.

Criminal environment Interpret Impact Intelligence /Analysis Influence Decision Maker Figure 1: Pattern analysis theory Formal Concept Analysis (FCA) is a mathematical theory of data analysis using formal contexts and concept lattices. It is a principled way of deriving a concept hierarchy or formal ontology from a collection of objects and their properties. Each concept in the hierarchy represents the set of objects sharing the same values for a certain set of properties; and each sub-concept in the hierarchy contains a subset of the objects in the concepts above it [11]. Its range of applications can be found in information and knowledge processing including visualization, data analysis and knowledge management. This paper proposes a new method of computer aided investigation by visualizing and analyzing data of mobile communication devices using Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus. This method considered the set of common and distinct attributes of data in such a way that categorizations are done based on related data with respect to time and events. This will help in building a more defined and conceptual systems for analysis of crime data that can easily be visualized and intelligently analyzed by computer systems. The organization of this paper is as follows, section II of this paper provides details of the related work in the domain of crime pattern analysis and application of FCA in the field of computer science. Section III proposes how the FCA will be used to classify and analyze data with respect

to events that has to do with crime. Section IV provides application and results: provides the use of FCA in crime analysis. The last section of this paper, section V, Concludes the paper. II. Literature Review Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. Thus, crime datasets must be interpreted and analyzed in conjunction with various factors that can contribute to the formulation of crime. Discovering these correlations allows a deeper insight into the complex nature of criminal behavior. There are challenges faced in today s world in terms of crime analysis when it comes to graphical visualization of crime patterns. Geographical representation of crime scenes and crime types become very important in gathering intelligence about crimes. This provides a very dynamic and easy way of monitoring criminal activities and analyzing them as well as producing effective countermeasures and preventive measures in solving them. (QA Kester 2013) proposed a new method of visualizing and analyzing crime patterns based on geographical crime data.[2] In the United States, Federals collaborate with local law enforcement and prosecutors to share intelligence and efforts through teamwork has demonstrated effectiveness in addressing traditional crimes involving drugs, weapons, gangs, and violence (McGarrell & Schlegel, 1993; Russell-Einhorn, 2004)[4][5]. By extension, many scholars and practitioners have asserted the importance of forming comparable teams to combat computer crime with the hope of similar positive outcomes (see e.g., Conly & McEwen, 1990)[6].[1] P. Rogerson and Y. Sun described a new procedure for detecting changes over time in the spatial pattern of point events, combining the nearest neighbor statistic and cumulative sum methods. The method results in the rapid detection of deviations from expected geographic patterns. The method was illustrated using 1996 arson data from the Buffalo, NY, Police Department. [7] The appearance of patterns could be found in different modalities of a domain, where the different modalities refer to the data sources that constitute different aspects of a domain. Particularly, the domain that refers to crime and the different modalities refer to the different data sources within the crime domain such as offender data, weapon data, etc. In addition, patterns

also exist in different levels of granularity for each modality. In order to have a thorough understanding a domain, it is important to reveal hidden patterns through the data explorations at different levels of granularity and for each modality. Therefore, Yee Ling Boo and Alahakoon, D presented a new model for identifying patterns that exist in different levels of granularity for different modes of crime data. A hierarchical clustering approach - growing self organizing maps (GSOM) has been deployed. The model was further enhanced with experiments that exhibit the significance of exploring data at different granularities. [8] Formal concept analysis (FCA) is a method of data analysis with growing popularity across various domains.fca analyzes data which describe relationship between a particular set of objects and a particular set of attributes. Such data commonly appear in many areas of human activities. FCA produces two kinds of output from the input data. The first is a concept lattice. A concept lattice is a collection of formal concepts in the data which are hierarchically ordered by a sub-concept super-concept relation. Formal concepts are particular clusters which represent natural human-like concepts such as organism living in water, car with all wheel drive system, number divisible by 3 and 4,etc. The second output of FCA is a collection of socalled attribute implications. An attribute implication describes a particular dependency which is valid in the data such as every number divisible by 3 and 4 is divisible by 6, every respondent with age over 60 is retired, etc.[9] Modern police organizations and intelligence services are adopting the use of FCA in crime pattern analysis for tracking down criminal suspects through the integration of heterogeneous data sources and visualizing this information so that a human expert can gain insight in the data [19]. III. Methodology Formal Concept Analysis, or Galois Lattices, is a data analysis technique grounded on Lattice Theory and Propositional Calculus. This paper proposes a new method based on FCA method and considered the set of common and distinct attributes of data collected from mobile communication devices of suspects in such a way that categorizations are done based on related data with respect to time and events.

In FCA a formal context consists of a set of objects, G, a set of attributes, M, and a relation between G and M, I G M. A formal concept is a pair (A, B) where A G and B M. Every object in A has every attribute in B. For every object in G that is not in A, there is an attribute in B that that object does not have. For every attribute in M that is not in B there is an object in A that does not have that attribute. A is called the extent of the concept and B is called the intent of the concept. If g A and m B then (g,m) I,or gim. A formal context is a triple (G, M, I), where G is a set of objects, M is a set of attributes and I is a relation between G and M. (g,m) I is read as object g has attribute m. For A G, we define A := {m M g A :(g,m) I }. For B M, we define dually B := {g G m B :(g,m) I }. For A, A1, A2 G holds: A1 A2 A`2 A`1 A 1 A`` A`= A``` For B, B1, B2 M holds: B1 B2 B 2 B 1 B B``

B`= B``` A formal concept is a pair (A, B) where A is a set of objects (the extent of the concept), B is a set of attributes (the intent of the concept), A`= B and B`= A. The concept lattice of a formal context (G, M, I) is the set of all formal concepts of (G, M, I), together with the partial order (A1, B1) (A2, B2): A1 A2 ( B1 B2). The concept lattice is denoted by (G,M,I). Theorem: The concept lattice is a lattice, i.e. for two concepts (A1, B1) and (A2, B2), there is always a greatest common subconcept: (A1 A2, (B1 B2) ) and a least common superconcept: ((A1 A2), B1 B2) More general, it is even a complete lattice, i.e. the greatest common subconcept and the least common superconcept exist for all (finite and infinite) sets of concepts. Corollary: The set of all concept intents of a formal context is a closure system. The corresponding closure operator is h(x):= X``. An implication X Y holds in a context, if every object having all attributes in X also has all attributes in Y. Def.: Let X M. The attributes in X are independent, if there are no trivial dependencies between them.

IV. The Applications and Results We consider crime events such that E is the set of crime events and E1, E2 En are subsets of E. Let E= {E1, E2 En} = {murder, robbery, drugs, assault, burglary, Money Laundering, Bombing, Theft, Rape, Kidnapping..}. Let the objects be the events. Let the geographical locations in which the events occurred at be (A, B, C, D, E, F, G, H, I, J and K) as indicated on the map below in figure 2. Let P be the set of suspects intended to be investigated and P1, P2, P3.. Pn are the elements that belong to P. A C B E F F H G J K D I Figure 2: Geographical locations of a map Table 1: Events x (Geographical locations and Persons) Geographical Locations Persons Events

Figure 3: Galois lattices of intents and extents

Figure 4: Galois lattice of (G, M, I)

The concept lattice of a formal context (G, M, I) as shown in figure 4, is the set of all formal concepts of (G, M, I), together with the partial order (A1, B1) (A2, B2): A1 A2 ( B1 B2). It is clearly seen visually from figure 3 that the intents of concepts 24, 25, 26, 27 and 49 are subsumed by the intents of concept 28. This means that all suspects involved in events 24, 25, 26, 27 and 49, have a higher probability of committing crime at geographical location c, d, and g of concept 28. Relationally and based on figure 4, the deduction is accurate. From figure 4, concept 277 we have intent I= {P5, P7, P8, c, d, g}, extent E= {7} and set of attributes G= {[P5, P7], [P7, c], [P8, g], [c, g], [P5, P8, c]}. We can draw several conclusions from the analysis such as the persons involved in event of E= {7} are likely to have been working in a network group and events at places c, d and g are likely to have a link also with event of E= {7}. V. Conclusion A formal concept analysis was used to analyze crime data based on information gathered from suspects mobile communication devices such as mobile phone, tablets etc. Visualization of relationships between the occurrences of various crime events within different geographical areas was achieved successfully. This method considered the set of common and distinct attributes of data in such a way that categorization was done based on relationships between concepts. The result from the approach will help in building a more defined and conceptual systems that will make data relationships to be easily visualized and intelligently analyzed by computer aided investigation systems.

References [1] Hinduja, S. (2007). Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International Journal of Cyber Criminology, 1(1), 1-26. [2] QA Kester(2013). Visualization and analysis of geographical crime patterns using formal concept analysis. International Journal of Remote Sensing and Geoscience (IJRSG) 2 (1), 30-35 [3] A Geographic profiling retrieved from http://en.wikipedia.org/wiki/geographic_profiling #cite_ref-2 [4] Russell-Einhorn, M. L. (2004). Federal-Local Law Enforcement Collaboration in Investigating and Prosecuting Urban Crime, 1982-1999: Drugs, Weapons, and Gangs(No. NCJ 201782): National Institute of Justice. [5] McGarrell, E. F., & Schlegel, K. (1993). The implementation of federally funded multi jurisdictional task forces: Organizational structure and interagency relationships. Journal of Criminal Justice, 21(3), 231-244. [6] Conly, C. H., & McEwen, J. T. (1990). Computer crime. U.S. Department of Justice. National Institute of Justice. [7] P. Rogerson, Y. Sun Spatial monitoring of geographic patterns: an application to crime analysis Computers, Environment and Urban Systems, Volume 25, Issue 6, November 2001, Pages 539 556 [8] Yee Ling Boo; Alahakoon, D.;, "Mining Multi-modal Crime Patterns at Different Levels of Granularity Using Hierarchical Clustering," Computational Intelligence for Modelling Control & Automation, 2008 International Conference on, vol., no., pp.1268-1273, 10-12 Dec. 2008 [9] Radimbˇ Elohl Avek introduction to formal concept analysis Olomouc 2008. [10] Security Informatics, Special issues on Formal Concept Analysis in Intelligence and Security Informatics Springer, 2012. [11] Analysis Homepage from: http://www.upriss.org.uk/ fca/fca.html