Geospatial Monitoring of Community-Released Offenders

Total Page:16

File Type:pdf, Size:1020Kb

Geospatial Monitoring of Community-Released Offenders The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: Geospatial Monitoring of Community- Released Offenders: An Analytics Market Survey, Version 2.0 Author(s): Harold I. Heaton Document Number: 250371 Date Received: November 2016 Award Number: 2013-MU-CX-K111 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Please see NCJ 249889 for complimentary information concerning location-based offender tracking technologies. AOS-15-1437 October 2016 NIJ RT&E Center Project 14-1 GEOSPATIAL MONITORING OF COMMUNITY- RELEASED OFFENDERS: AN ANALYTICS MARKET SURVEY Version 2.0 Harold I. Heaton Prepared for: The National Institute of Justice Prepared by: The National Criminal Justice Technology Research, Test, and Evaluation Center The Johns Hopkins University Applied Physics Laboratory 11100 Johns Hopkins Rd. Laurel, MD 20723-6099 Task No.: FGSGJ Contract No.: 2013-MU-CX-K111/115912 This project was supported by Award No. 2013-MU-CX-K111, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication/program/exhibition are those of the author(s) and do not necessarily reflect those of the Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. CONTENTS Page Tables ............................................................................................................................................. iv Executive Summary ........................................................................................................................ v 1. Introduction ............................................................................................................................. 1 1.1 Prior Survey of NIJ-funded Geospatial Software Tools ............................................... 2 2. Design and Purpose of the Commercial Market Survey ......................................................... 4 2.1 Preliminary Identification of Candidate Vendors ......................................................... 5 2.2 Commercial Vendors Contacted ................................................................................... 6 2.3 Responses to the Market Survey ................................................................................... 7 3. Product Purpose and Installation Information ...................................................................... 10 3.1 SAS Targeting Framework ......................................................................................... 10 3.2 Sentinel Visualizer, Ver. 7 .......................................................................................... 11 3.3 INTELLITRACK, Ver. 1 ............................................................................................ 11 3.4 VeriTracks, Ver. 11..................................................................................................... 12 3.5 BI Analytics: Risk-based Dashboard Analytics Suite ................................................ 13 3.6 GeoTime, Ver. 5.6 ...................................................................................................... 14 3.7 EM Manager ............................................................................................................... 14 4. Performance Characteristics and Validation Approach ........................................................ 16 4.1 SAS Targeting Framework ......................................................................................... 16 4.2 Sentinel Visualizer, Ver. 7 .......................................................................................... 17 4.3 INTELLITRACK, Ver. 1 ............................................................................................ 17 4.4 VeriTracks, Ver. 11..................................................................................................... 18 4.5 BI Analytics: Risk-based Dashboard Analytics Suite ................................................ 18 4.6 GeoTime, Ver. 5.6 ...................................................................................................... 19 4.7 EM Manager ............................................................................................................... 19 5. Analyses Performed by the Product ...................................................................................... 21 5.1 SAS Targeting Framework ......................................................................................... 21 5.2 Sentinel Visualizer, Ver. 7 .......................................................................................... 23 5.3 INTELLITRACK, Ver. 1 ............................................................................................ 24 Offender Tracking Version 2.0 10/20/2016 Page ii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. 5.4 VeriTracks, Ver. 11..................................................................................................... 24 5.5 BI Analytics: Risk-based Dashboard Analytics Suite ................................................ 26 5.6 GeoTime, Ver. 5.6 ...................................................................................................... 27 5.7 EM Manager ............................................................................................................... 28 6. Data Formatting and Information Exchange ......................................................................... 31 6.1 SAS Targeting Framework ......................................................................................... 31 6.2 Sentinel Visualizer, Ver. 7 .......................................................................................... 32 6.3 INTELLITRACK, Ver. 1 ............................................................................................ 33 6.4 VeriTracks, Ver. 11..................................................................................................... 33 6.5 BI Analytics: Risk-based Dashboard Analytics Suite ................................................ 34 6.6 GeoTime, Ver. 5.6 ...................................................................................................... 35 6.7 EM Manager ............................................................................................................... 35 7. Requirements for Host-Agency Computing Systems ........................................................... 38 7.1 Operating System Requirements................................................................................. 38 7.2 RAM, Processor Speed and Hard-Disk Storage ......................................................... 38 7.3 Graphics Board and Display Requirements ................................................................ 39 7.4 Software Utilization Options ...................................................................................... 39 8. Operator/Analyst Education and Training Requirements ..................................................... 41 8.1 Minimum Education and Training Requirements to Set-up/Operate the Product ...... 41 8.2 Number of Training Hours Needed to Set-up/Operate the Product ............................ 41 8.3 Minimum Educational/Experience Requirements for Interpreting Results ................ 42 8.4 Required Familiarity with Supporting Software ......................................................... 42 8.5 Available Documentation and Training Aids ............................................................. 43 9. Summary, ISSUES, and Recommendations ......................................................................... 45 9.1 Principal End-User Information Needs ....................................................................... 45 9.2 Role of Analytics in Corrections................................................................................. 47 9.3 Potentially Enabling Analytics Capabilities ............................................................... 48 10. References ............................................................................................................................. 50 Appendix A. Published Request for Information ...................................................................... A–1 Appendix B. Abbreviations and Acronyms ................................................................................ B–1 Offender Tracking Version 2.0 10/20/2016 Page iii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies
Recommended publications
  • The Table Lens: Merging Graphical and Symbolic Representations in an Interactive Focus+ Context Visualization for Tabular Information
    HumanFac(orsinComputingSystems CHI’94 0 “Celebra/i//ghrferdepende)~cc” The Table Lens: Merging Graphical and Symbolic Representations in an Interactive Focus+ Context Visualization for Tabular Information Ramana Rao and Stuart K. Card Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CA 94304 Gao,carcM@parc. xerox.com ABSTRACT (at cell size of 100 by 15 pixels, 82dpi). The Table Lens can We present a new visualization, called the Table Lens, for comfortably manage about 30 times as many cells and can visualizing and making sense of large tables. The visual- display up to 100 times as many cells in support of many ization uses a focus+ccmtext (fisheye) technique that works tasks. The scale advantage is obtained by using a so-called effectively on tabular information because it allows display “focus+context” or “fisheye” technique. These techniques of crucial label information and multiple distal focal areas. allow interaction with large information structures by dynam- In addition, a graphical mapping scheme for depicting table ically distorting the spatial layout of the structure according to contents has been developed for the most widespread kind the varying interest levels of its parts. The design of the Table of tables, the cases-by-variables table. The Table Lens fuses Lens technique has been guided by the particular properties symbolic and gaphical representations into a single coherent and uses of tables. view that can be fluidly adjusted by the user. This fusion and A second contribution of our work is the merging of graphical interactivity enables an extremely rich and natural style of representations directly into the process of table visualization direct manipulation exploratory data analysis.
    [Show full text]
  • Army Acquisition Workforce Dependency on E-Mail for Formal
    ARMY ACQUISITION WORKFORCE DEPENDENCY ON E-MAIL FOR FORMAL WORK COORDINATION: FINDINGS AND OPPORTUNITIES FOR WORKFORCE PERFORMANCE IMPROVEMENT THROUGH E-MAIL-BASED SOCIAL NETWORK ANALYSIS KENNETH A. LORENTZEN May 2013 PUBLISHED BY THE DEFENSE ACQUISITION UNIVERSITY PRESS PROJECT ADVISOR: BOB SKERTIC CAPITAL AND NORTHEAST REGION, DAU THE SENIOR SERVICE COLLEGE FELLOWSHIP PROGRAM ABERDEEN PROVING GROUND, MD PAGE LEFT BLANK INTENTIONALLY .ARMY ACQUISITION WORKFORCE DEPENDENCY ON E-MAIL FOR FORMAL WORK COORDINATION: FINDINGS AND OPPORTUNITIES FOR WORKFORCE PERFORMANCE IMPROVEMENT THROUGH E-MAIL-BASED SOCIAL NETWORK ANALYSIS KENNETH A. LORENTZEN May 2013 PUBLISHED BY THE DEFENSE ACQUISITION UNIVERSITY PRESS PROJECT ADVISOR: BOB SKERTIC CAPITAL AND NORTHEAST REGION, DAU THE SENIOR SERVICE COLLEGE FELLOWSHIP PROGRAM ABERDEEN PROVING GROUND, MD PAGE LEFT BLANK INTENTIONALLY ii Table of Contents Table of Contents ............................................................................................................................ ii List of Figures ................................................................................................................................ vi Abstract ......................................................................................................................................... vii Chapter 1—Introduction ................................................................................................................. 1 Background and Motivation .................................................................................................
    [Show full text]
  • Geotime As an Adjunct Analysis Tool for Social Media Threat Analysis and Investigations for the Boston Police Department Offeror: Uncharted Software Inc
    GeoTime as an Adjunct Analysis Tool for Social Media Threat Analysis and Investigations for the Boston Police Department Offeror: Uncharted Software Inc. 2 Berkeley St, Suite 600 Toronto ON M5A 4J5 Canada Business Type: Canadian Small Business Jurisdiction: Federally incorporated in Canada Date of Incorporation: October 8, 2001 Federal Tax Identification Number: 98-0691013 ATTN: Jenny Prosser, Contract Manager, [email protected] Subject: Acquiring Technology and Services of Social Media Threats for the Boston Police Department Uncharted Software Inc. (formerly Oculus Info Inc.) respectfully submits the following response to the Technology and Services of Social Media Threats RFP. Uncharted accepts all conditions and requirements contained in the RFP. Uncharted designs, develops and deploys innovative visual analytics systems and products for analysis and decision-making in complex information environments. Please direct any questions about this response to our point of contact for this response, Adeel Khamisa at 416-203-3003 x250 or [email protected]. Sincerely, Adeel Khamisa Law Enforcement Industry Manager, GeoTime® Uncharted Software Inc. [email protected] 416-203-3003 x250 416-708-6677 Company Proprietary Notice: This proposal includes data that shall not be disclosed outside the Government and shall not be duplicated, used, or disclosed – in whole or in part – for any purpose other than to evaluate this proposal. If, however, a contract is awarded to this offeror as a result of – or in connection with – the submission of this data, the Government shall have the right to duplicate, use, or disclose the data to the extent provided in the resulting contract. GeoTime as an Adjunct Analysis Tool for Social Media Threat Analysis and Investigations 1.
    [Show full text]
  • Arcgis® + Geotime®: GIS Technology to Support the Analysis Of
    ® ® In many application areas, this is not enough: Geo- spatial and temporal correlations between the data ArcGIS + GeoTime : GIS technology should be studied, so that, on the basis of this insight, the available data - more and more numerous - can to support the analysis of telephone be translated into knowledge and therefore in appropriate decisions . In the area of ​​security, to name an example, all this results in the predictive traffic data analysis of the spatial-temporal occurrence of crimes. Lastly, a technologically advanced GIS platform must Giorgio Forti, Miriam Marta, Fabrizio Pauri ® ensure data sharing and enable the world of mobile devices (system of engagement). ® There are several ways to share data / information, all supported by ArcGIS, such as: sharing within a single Historical mobile phone traffic billboards analysis is organization, according to the profiles assigned becoming increasingly important in investigative Figure 2: Sample data representation of two (identity); the sharing of multiple organizations that activities of public security organizations around the cellphone users in GeoTime may / should share confidential data (a very common world, and leading technology companies have been situation in both Public Security and Emergency trying to respond to the strong demand for the most Other predefined analysis features are already Management); public communication, open to all (for suitable tools for supporting such activities. available (automatic cluster search, who attends sites example, to report investigative success, or to of investigation interest, mobility compatibility with communicate to citizens unsafe areas for the Originally developed as a project funded in the United participation in events, etc.), allowing considerable frequency of criminal offenses).
    [Show full text]
  • Crime Mapping and Analysis by Community Organizations
    U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice R e s e a r c h i n B r i e f March 2001 Issues and Findings Crime Mapping and Analysis Discussed in this Brief: An as- sessment of how community orga- by Community Organizations nizations in Hartford, Connecticut, used the Neighborhood Problem Solving (NPS) system, a computer- in Hartford, Connecticut based mapping and crime analysis technology. The NPS system en- By Thomas Rich abled users to create a variety of maps and other reports depicting Crime mapping has become increasingly community policing field offices. Devel- crime conditions by accessing a popular among law enforcement agencies oped with NIJ funding, the system enables database containing the most re- and has enjoyed high visibility at the Fed- users to create a variety of maps and other cent 2 years of incident-level police information. eral level, in the media, and among the reports depicting crime conditions by us- largest police departments in the Nation, ing a database containing the most recent Key issues: The objective in Hart- most notably those in Chicago and New 2 years of incident-level police informa- ford was to extend basic mapping York City. However, there have been few tion, including citizen-initiated calls for and crime analysis technologies efforts to make crime mapping capabilities service, reported crimes, and arrests. Al- beyond the law enforcement com- available to community residents and or- though some police departments routinely munity by putting them into the ganizations, although a National Institute publish aggregate crime statistics and a hands of neighborhood-based organizations so they could analyze of Justice (NIJ)-funded project in Chicago few publish incident-level crime informa- incident-level data and produce in the late 1980s aimed at introducing tion on the Internet, the objective in Hart- their own maps and reports.
    [Show full text]
  • BOSTON POLICE DEPARTMENT | BOSTON REGIONAL INTELLIGENCE CENTER Alexa Lambros, Class of 2018
    BOSTON POLICE DEPARTMENT | BOSTON REGIONAL INTELLIGENCE CENTER Alexa Lambros, Class of 2018 The BRIC interns with the BPD Chief of Police! MY ROLE: ASSISTANT CRIME ANALYST/RESEARCH ASSISTANT SPECIAL PROJECT • Mission/Goal Community policing; “working in partnership with the community to fight crime, STANDARD RESPONSIBILITIES reduce fear and improve the quality of life in our • Took raw data from UASI neighborhoods” (BPDnews.com) DAILY INFORMATION INFORMATION crime mapping database of all property stolen from • Size 20th largest LEA in the country; 3rd largest in SUMMARY REQUESTS • Fulfilled information retrieval 9/2015 – 2/2016 New England (Wikipedia) • Assembled packets of recent gang • Utilized Excel skills to • Organization 8 Bureaus and 12 districts incidents and summarized reports requests for Boston/UASI police, correctional, and probation officers organize/categorize data • Focus/Success Utilizes unique combination of • Researched arrests from Urban • Evaulated relationships community relations and statistical analysis to Area Security Initiative (UASI) between numerous elements of reduce crime throughout city; over the last four districts and summarized reports BULLETINS collected data and drew decades, Boston has achieved a large decrease in • Compiled incident summaries on • Created ID Wanted, Wanted, relevant conclusions its overall crime rate (BPDnews.com) violent and property crime within Missing Person, and BOLO bulletins • IMPORTANCE: Created Boston and UASI districts into BRIC's at request of Boston/UASI officers infographic
    [Show full text]
  • Motor Vehicle Theft: Crime and Spatial Analysis in a Non-Urban Region
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Motor Vehicle Theft: Crime and Spatial Analysis in a Non-Urban Region Author(s): Deborah Lamm Weisel ; William R. Smith ; G. David Garson ; Alexi Pavlichev ; Julie Wartell Document No.: 215179 Date Received: August 2006 Award Number: 2003-IJ-CX-0162 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. EXECUTIVE SUMMARY Crime and Spatial Analysis of Vehicle Theft in a Non-Urban Region Motor vehicle theft in non-urban areas does not reveal the well-recognized hot spots often associated with crime in urban areas. These findings resulted from a study of 2003 vehicle thefts in a four-county region of western North Carolina comprised primarily of small towns and unincorporated areas. While the study suggested that point maps have limited value for areas with low volume and geographically-dispersed crime, the steps necessary to create regional maps – including collecting and validating crime locations with Global Positioning System (GPS) coordinates – created a reliable dataset that permitted more in-depth analysis.
    [Show full text]
  • Inviwo — a Visualization System with Usage Abstraction Levels
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL X, NO. Y, MAY 2019 1 Inviwo — A Visualization System with Usage Abstraction Levels Daniel Jonsson,¨ Peter Steneteg, Erik Sunden,´ Rickard Englund, Sathish Kottravel, Martin Falk, Member, IEEE, Anders Ynnerman, Ingrid Hotz, and Timo Ropinski Member, IEEE, Abstract—The complexity of today’s visualization applications demands specific visualization systems tailored for the development of these applications. Frequently, such systems utilize levels of abstraction to improve the application development process, for instance by providing a data flow network editor. Unfortunately, these abstractions result in several issues, which need to be circumvented through an abstraction-centered system design. Often, a high level of abstraction hides low level details, which makes it difficult to directly access the underlying computing platform, which would be important to achieve an optimal performance. Therefore, we propose a layer structure developed for modern and sustainable visualization systems allowing developers to interact with all contained abstraction levels. We refer to this interaction capabilities as usage abstraction levels, since we target application developers with various levels of experience. We formulate the requirements for such a system, derive the desired architecture, and present how the concepts have been exemplary realized within the Inviwo visualization system. Furthermore, we address several specific challenges that arise during the realization of such a layered architecture, such as communication between different computing platforms, performance centered encapsulation, as well as layer-independent development by supporting cross layer documentation and debugging capabilities. Index Terms—Visualization systems, data visualization, visual analytics, data analysis, computer graphics, image processing. F 1 INTRODUCTION The field of visualization is maturing, and a shift can be employing different layers of abstraction.
    [Show full text]
  • Crime Mapping: Spatial and Temporal Challenges
    CHAPTER 2 Crime Mapping: Spatial and Temporal Challenges JERRY RATCLIFFE INTRODUCTION Crime opportunities are neither uniformly nor randomly organized in space and time. As a result, crime mappers can unlock these spatial patterns and strive for a better theoretical understanding of the role of geography and opportunity, as well as enabling practical crime prevention solutions that are tailored to specific places. The evolution of crime mapping has heralded a new era in spatial criminology, and a re-emergence of the importance of place as one of the cornerstones essential to an understanding of crime and criminality. While early criminological inquiry in France and Britain had a spatial component, much of mainstream criminology for the last century has labored to explain criminality from a dispositional per- spective, trying to explain why a particular offender or group has a propensity to commit crime. This traditional perspective resulted in criminologists focusing on individuals or on communities where the community extended from the neighborhood to larger aggregations (Weisburd et al. 2004). Even when the results lacked ambiguity, the findings often lacked policy relevance. However, crime mapping has revived interest and reshaped many criminol- ogists appreciation for the importance of local geography as a determinant of crime that may be as important as criminal motivation. Between the individual and large urban areas (such as cities and regions) lies a spatial scale where crime varies considerably and does so at a frame of reference that is often amenable to localized crime prevention techniques. For example, without the opportunity afforded by enabling environmental weaknesses, such as poorly lit streets, lack of protective surveillance, or obvious victims (such as overtly wealthy tourists or unsecured vehicles), many offenders would not be as encouraged to commit crime.
    [Show full text]
  • Stories in Geotime
    Stories in GeoTime Ryan Eccles, Thomas Kapler, Robert Harper, William Wright Information Visualization ( 2008 ) © Stefan John 2008 Summer term 2008 1 Introduction • Story a powerful abstraction − Used by intelligence analysts to conceptualize threats and understand patterns − Part of the analytical process • Oculus Info’s GeoTime™ − Geo-temporal event visualization tool − Augmented with story system − Narratives, hypertext-linked visualizations, visual annotations, and pattern detection − Environment for analytic exploration and communication − Detects geo-temporal patterns − Integrates story narration to increase analytic sense-making cohesion Summer term 2008 2 1 Introduction • Assisting the analyst in: − Identifying, − Extracting, − Arranging, and − Presenting stories within the data • Story system − Lets analysts operate at story level − Higher level abstractions of data (behaviors and events) − Staying connected to the evidence − Developed in collaboration with analysts • Formal evaluation showed high utility and usability Summer term 2008 3 Overview • Storytelling • Related Work • Geo-Temporal Visualization in GeoTime • Stories in GeoTime • Evaluation Summer term 2008 4 2 Storytelling • First described in Aristotle’s Poetics − Objects of a tragedy (story): - Plot -> arrangements of incidents -Character - Thought -> processes of reasoning leading characters to their respective behavior • Narrative theory suggests: − People are essentially storytellers − Implicit ability to evaluate a story for: - Consistency -Detail - Structure Summer
    [Show full text]
  • Crime Mapping and Spatial Analysis Using Arcgis Online for Police Officers
    Public Safety - Crime Mapping and Spatial Analysis Using ArcGIS Online for Police Officers Knowledge, Skills, and Abilities (KSAs) Supported This training module aids in the development of several KSAs that are fundamental to using GIS for public safety planning and operations. The ability to perform crime mapping using ArcGIS Online is a foundational skill that is relevant to a multitude of GIS applications. In addition, the following training tutorial builds essential knowledge of how to design and use crime data for web mapping. ** This training tutorial is intended for training, exercise, and preparedness efforts only. It is not intended to support emergency response operations.** Knowledge Gained: ✓ Definition of Crime Mapping: Crime mapping is a sub-discipline of geography that works to answer the question, “What crime is happening where?” It focuses on mapping incidents, identifying where the most crime occurs and analyzing the spatial relationships of targets and these areas. ✓ Definition of Heat Mapping: This technique is used to visualize geographic data and show areas where a higher density or cluster of activity occurs. For both types of spatial analysis, a color gradient is used to indicate areas of increasingly higher density. See the following example from Jersey City, NJ: ✓ Esri has selected HERE Map Content (www.esri.com/here) as the foundation street data for its cloud-based mapping platform as well as for StreetMap Premium and numerous other Esri products. ✓ Esri uses HERE map content and HERE point addressing to build the geocoding locators used in both ArcGIS Online (AGOL) and StreetMap Premium (SMP). 1 Skills and Abilities Developed: ✓ Ability to develop a table with the essential spatial data for crime mapping and how to adjust the address format to be recognized in ArcGIS Online platform.
    [Show full text]
  • A Mobile Visual Analytics Approach for Law Enforcement Situation Awareness
    A Mobile Visual Analytics Approach for Law Enforcement Situation Awareness Ahmad M. M. Razip, Abish Malik, Matthew Potrawski, Ross Maciejewski, Member, IEEE, Yun Jang, Member, IEEE, Niklas Elmqvist, Senior Member, IEEE, and David S. Ebert, Fellow, IEEE (a) Risk profile tools give time- and location-aware assessment of public safety using law (b) The mobile system can be used anywhere with cellular network coverage to visualize enforcement data. and analyze law enforcement data. Here, the system is being used as the user walks down a street. Fig. 1: Mobile crime analytics system gives ubiquitous and context-aware analysis of law enforcement data to users. Abstract— The advent of modern smartphones and handheld devices has given analysts, decision-makers, and even the general public the ability to rapidly ingest data and translate it into actionable information on-the-go. In this paper, we explore the design and use of a mobile visual analytics toolkit for public safety data that equips law enforcement agencies and citizens with effective situation awareness and risk assessment tools. Our system provides users with a suite of interactive tools that allow them to perform analysis and detect trends, patterns and anomalies among criminal, traffic and civil (CTC) incidents. The system also provides interactive risk assessment tools that allow users to identify regions of potential high risk and determine the risk at any user-specfied location and time. Our system has been designed for the iPhone/iPad environment and is currently being used and evaluated by a consortium of law enforcement agencies. We report their use of the system and some initial feedback.
    [Show full text]