Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Friday, September 29, 2023

Using ChatGPT-4 to Write This Book

The Writers Guild of America recently negotiated a contract that allows writers to take credit for writing they do based on ChatGPT and other AI language learning models, along with writing they revise if given writing produced by those AI tools. They own their writing with or without using the tools. I took this stance in writing the book Elements of Crime Patterns. I am the book's writer, even if AI greatly helped me. ChatGBT helped me immensely, but I had the concepts I wanted to present first and used AI as a tool to manifest them beyond what I could have done alone.


How did I use ChatGBT-4?


I gave these custom instructions to it:


ChatGBT asks: What would you like ChatGPT to know about you to provide better responses? I am writing a book on elements of crime patterns for law enforcement. The questions I ask are to help me write the book clearly and correctly. This is a reference book and needs to include as much detail as possible. ChatGBT asks: How would you like ChatGPT to respond? I want the book to make sense to police officers as well as researchers and criminal justice students. I do not want opinions. I need facts. I need detailed answers regarding the variables involved.


At first did not set up custom instructions and I was continually being warned about how I should not use the answers to commit crimes; similar dire statements were in each response. That grew very tiresome. These basic instructions to ChatGBT insured the subsequent quetioning started from that standpoint.


Once I got a better handle on it, AI gave a lot of meat to the bones I already had. I had picked all the categories I wanted in the book and added a few that came up as I used the tools. 


(NOTE: Do NOT put your crime or investigative data into ChatGBT-4 or similar tools. Only use the AI tools available on your closed, secure systems - if you have them - and only with legitimate permissions.)


AI did not do much in the way of research for me - I knew what I wanted to write, but I needed to have the ability alone to come up with saying it the way I wanted to say it and retrieve it all. In a very real way, it corroborated my "theory" that we know a lot we do not articulate. Tacit knowledge is a genuine thing - it is what we know without words or speech. We can only hold a minimal number of conscious thoughts in our brains simultaneously, a tiny number compared to the thoughts we actively "know." Often, we do not know what we know because we have not consciously thought out the knowledge. We learn so quickly, and taking the time to acknowledge every bit of learning would waste time - our minds are designed to be efficient. We use mental shortcuts, called heuristics, to think quickly. AI helped me pinpoint what I wanted to say, slow down thinking, and say what we know in order to (hopefully) share a common understanding.


Before easily accessing AI tools, I had done much research (over-researched before my discovery that ChatGPT could help me), but much of the study could not verify the outcome I intended. ChatGPT gave me results I could prove with my genuine subject matter expertise since I knew what was true based on real-world observation and experience. 


When AI did give me the information I did not recognize to be accurate, I researched it to verify it, and if I had doubts, I eliminated the results. It was like sifting, much continual querying to get what I wanted. Then reorganizing, formatting, revising... AI does not spit out an orderly book. Then, I put chapters into both Grammarly AI and MS Word Editor to check for plagiarism, which is very tedious. I was not very concerned with plagiarism because this book is primarily about facts rather than theories, and facts cannot be copyrighted, although the expression and presentation of facts can be copyrighted, as is my book. 


In the second half of the book, I present 27 crime categories. I wanted to show crimes the way I might when I worked as a behavior specialist, where we used antecedents, behaviors, and consequences to show what actions were involved. It took many tries to get AI to finally spit its crimes out in a way that worked for me. As a law enforcement analyst, I had personally worked on 3/4 of the crimes in real life that are in the book, in both minor and significant ways, and taught courses on a few of the other crime categories. There are only 3 or 4 crimes that I had no direct experience with in my law enforcement analyst career but knew about and wanted to include. 


I cited any research I referred to in the footnotes and read a lot more, but I could not find that much that supported the facts in the book. For example - concealment methods are written about in customs border protection cases, but there is no research on saying this is what they are and look for them that I could locate. I did not include my extensive bibliography in the book because I felt it falsely represented as if I used everything; I added the bibliography to this blog so that you may peruse it. It is on the right-hand side of the blog.


I used Scite.ai to help me with citations and Perplexity.ai to locate a few extra resources. I tried other AI resources that I did not find helpful enough to use. 


I decided to self-publish after first submitting a proposal to a publisher (I took it back while waiting for the review process) for several reasons. I wanted the book to be affordable and to keep it more practitioner-based than academic. In August, I found an excellent tool called Atticus that allowed me to format the book for Amazon publishing, and it made that part of the task almost easy. I would not recommend doing what I did - every single thing by myself, including editing. (One reason I decided not to index it besides not thinking it necessary.) The good thing about how I did it is that I can easily correct things and upload new versions that can be printed as the book whenever I want to do so. I have a lot of control.


I could risk doing it all myself because I have nothing to lose in that I am retired and have no career plans. There is nothing to gain, either, because I want nothing for myself - I want to stay retired. The truth is, this book would not leave me alone, and now I have it out of my head, once I let enough people know about the book, I can go back to my idyllic retirement life—another reason why you should not copy me. 


Using AI to write is a wonderful way to feel like you have superpowers. As a former member and short-term President of the Police Futurists International, I have an inclination to want to think about the future. It was a pleasure to use these tools of the future and show what can be done in the present via this book. I encourage everyone to experiment with it!


And I hope you find Elements of Crime Patterns useful.

Read:

Want to Save Your Job From A.I.? Hollywood Screenwriters Just Showed You How by Adam Seth Litwin, associate professor of industrial and labor relations at Cornell University, published in The New York Times on September 29, 2023.

Thursday, September 28, 2023

Communication

 One example out of fifteen in "Communication" in Chapter 21:

 Written Communication:

  • Handwritten or typed notes left at crime scenes as a form of communication or intimidation
  • Anonymous letters sent to victims, law enforcement, or media to claim responsibility or issue threats
  • Correspondence between criminals or with accomplices through written letters or notes
  • Handwritten notes or letters used to convey messages or threats
  • Graffiti or symbols left at crime scenes as a form of communication or identification
  • Posters, flyers, or other printed materials used for criminal purposes or to send a message
  • Messages or markings left on victims or objects as a signature or form of communication


See the book for the other communication categories! It's not only mobile phones...

Wednesday, September 27, 2023

Similarities and Anomalies

Both similarities and anomalies play crucial roles in recognizing and identifying crime patterns. 

Similarities, such as consistent modus operandi, geographic location, and victim profiles, often help in linking multiple incidents, suggesting that they are the work of a single offender or criminal group. On the other hand, anomalies in crime data—unusual spikes or patterns that deviate from statistical norms—can serve as red flags that a serial crime pattern may emerge. These could be temporal, spatial, or even cross-jurisdictional anomalies that, when detected, prompt further investigation to either confirm or disprove the existence of a serial pattern. Analyzing similarities and anomalies provides a comprehensive approach to identifying and understanding crime patterns.

Similarities or anomalies may first be noticed in qualitative data rather than through statistical analysis. Review of crime and investigative data by officers or analysts with subject matter expertise may trigger further investigation. The similarities of anomalies may exist across non-integrated datasets or have a basis in unwritten historical, tacit knowledge.


Recognition and Identification of Crime Patterns via Similarities

Modus Operandi (MO): The method used to commit the crime can be a critical factor in identifying a pattern. Law enforcement often looks for similarities in how a crime is executed, such as the tools used, time of day, or specific actions carried out during the crime.

Example: If a series of burglaries occur where the perpetrator enters through the back door and disables the alarm system similarly, it may indicate a single offender or group using a consistent MO.

Geographic Location: Crimes occurring in a concentrated area often indicate a pattern. Offenders may be more comfortable or knowledgeable about a particular locale.

Example: Multiple car thefts happening in the same neighborhood within a short time frame may indicate a pattern.

Victimology: Certain characteristics of the victims, such as age, gender, profession, or lifestyle, can indicate a pattern.

Example: If assaults have occurred against women jogging in parks in the evening, a pattern may be forming around this specific victim profile.

Time Frame: Crimes committed during similar times of the day, days of the week, or even seasons can indicate a pattern.

Example: A series of robberies occurring on Friday evenings may suggest that the perpetrator exploits a particular vulnerability associated with that time frame.


Recognition and Identification of Crime Patterns via Anomalies

Temporal Anomalies: Sudden spikes or dips in crime rates within a specific time frame may indicate a serial pattern. For example, a sequence of related crimes occurring in a narrow time window can create a noticeable "peak" in the data.

Example: If a jurisdiction typically reports one or two burglaries per week but suddenly experiences five burglaries over two days, this temporal anomaly could indicate a serial burglar is active.

Spatial Anomalies: This cluster may indicate a serial pattern when a specific geographic area experiences an unusual concentration of similar crimes. Such a spatial anomaly often appears as a 'hotspot' on crime mapping software.

Example: If car thefts are usually spread throughout a city but suddenly concentrate in a specific neighborhood, this spatial anomaly could be the work of a serial car thief operating in that area.

Victimology Anomalies: If data reveal an atypical concentration of victims sharing specific characteristics (such as age, occupation, and gender), this may signify a targeted pattern by a serial offender.

Example: A series of attacks on women who work late shifts in a specific industry within a particular area may represent an anomaly in victimology, suggesting a serial offender.

Cross-jurisdictional Anomalies: Sometimes, an anomaly can appear when data from multiple jurisdictions are analyzed collectively. Crimes that appear unrelated in isolated datasets may show a pattern when combined.

Example: If multiple nearby towns each experience a minor uptick in home invasions, the anomaly may only become apparent when these datasets are combined, potentially revealing a serial offender operating across jurisdictions.

Anomalies in Crime Type: An unusual increase in a specific type of crime or modus operandi within a short period could indicate a serial pattern.

Example: A sudden increase in arson incidents using a specific incendiary device could indicate a serial arsonist at work.

Mixed Anomalies: Sometimes, an anomaly may be a combination of spatial, temporal, and other factors.

Example: A spike in robberies occurring near ATMs late at night over a weekend could be a mixed anomaly indicating a serial pattern.


Tuesday, September 26, 2023

Robbery Patterns

From the book:

Robbery serial patterns are more easily identified than most crime patterns. A robbery has a witness who can provide information on the offender(s) description, approach, and characteristics, as well as vehicle description (sometimes), the weapon(s) used, exact time and place, and the property was taken. Thus, commonalities are easier to find for crime pattern identification.

Robberies were my favorite crime to analyze when I worked as a crime analyst (1997-2007) because they were easiest to recognize and early identification was important because of threat of injury or death to victims. Shortly after I left that job, I wrote blog posts on another, inactive blog, with examples of various types of crime patterns. Here are the robbery patterns from back then, when they were fresh on my mind:  


Pattern: Purse Snatching (Robbery)

Perpetrators: mostly males but sometimes females, often lone criminals but also work in groups

Victims: primarily females of any age

Locations: primarily streets, sometimes in other public places 

Times: any time, most often when victim is alone without other observers nearby

Approach Methods: may come from behind, may use weapon, may knock victim to ground

Weapons: may use a weapon or threat of weapon, may assault victim

Tools: may cut purse straps

Vehicles/Transportation Routes: may target victims waiting at bus stops, train stations, on routes to bank or shopping

Stolen Goods: purse, contents of wallet, cash, credit cards

Method: a crime of opportunity, serial purse snatchers may use same MO

Motive: quick cash/profit, sometimes to feed drug habit

Query Terms: purse, bag, knapsack, handbag, strap

Suggestions: Track all incidents of purse snatching robberies as these tend to be serial crimes. Track all persons arrested for these crimes in case a series emerges where they are the perpetrators. Note larceny/theft of an unattended purse is not considered a robbery.


***


Pattern: Carjacking

Perpetrators: suspects in need of quick transportation, suspects who want a vehicle to take to be stripped, suspects who are in gangs, may be organized crime group stealing high end vehicles to export overseas

Victims: may be innocent persons, sometimes related to drug buying/dealing - victims who trade cars for a few hours to a drug dealer and call it a carjacking when they report the loss of their vehicle

Locations: more likely in large urban areas, near drug houses, at intersections when a vehicle is stopped, at gas stations, in parking lots 

Times: various times of day

Entry/Approach Methods: may bump car with another car to initiate opportunity, may be hiding and attack victim

Weapons: often occur at gunpoint or threat of gun not displayed

Vehicles/Transportation Routes: may use vehicle in crime and discard it in their own neighborhood

Stolen Goods: vehicle, sometimes rob victim of wallet/purse/belongings

Method: a carjacking involves robbery of a vehicle while people are in the vehicle and is often a violent crime, sometimes victims are kidnapped as well, in rarer instances crime may lead to sexual assault or murder

Motive: to obtain a vehicle, also may be a need for power, or a need to escape a scene or obtain a vehicle to use in a crime/to commit a crime

Query terms: vehicle, car, robbery, carjacked, carjacking, stopped at light (or sign), fled in victim's vehicle (or car)

Suggestions: It is important to track all carjackings in your area to uncover any sort of patterns; query your databases for stolen cars AND robbery to find all incidents of carjacking; track all known carjackers in your jurisdiction.


***


Pattern: Bank Robberies

Perpetrators: variety of perps, from inexperienced (usually drug addicts) to professional (less common), may work alone or in teams

Victims: financial institutions, banks and credit unions

Locations: inside bank – ATM (automatic teller) crime may be involved as well

Times: varies, but serial robbers often follow a pattern in time of day, day of week

Entry/Approach Methods: perps may stake out banks, target banks with easy escape routes, generally robbers just walk into bank

Weapons: often use note with threat of weapon and no weapon is seen, sometimes gun is seen

Vehicles/Transportation Routes: vary, banks in strip malls and/or near highways may be targeted as more vulnerable, may have get-away car accomplice

Stolen Goods: cash – often with dye-pack

Method: suspect may ‘case’ bank undetected prior to robbery, may wear disguise, may bring bag for cash – type of bag may be similar in series so is something to track, may jump over counter, may force victims to the ground, may target same type bank branches, tends toward becoming a serial crime if suspect has success, may be multiple suspects

Motive: cash

Query terms: bank, credit union, safe, unlock, alarm, vault, safety deposit, deposit, names of banks

Suggestions: Map all banks in your jurisdiction, including credit unions. If possible, get data on ATMs, track all known bank robbers on parole in your jurisdiction – know their MO. Familiarize yourself with bank robbery prevention techniques.


***


Pattern: Cab/Taxi /Ride Share Driver Victims

Perpetrators: usually lone males, sometimes two or more males

Victims: cab/taxi/rideshare drivers

Locations: usually in a city

Times: late at night, infrequently in daytime

Entry/Approach Methods: when fare is dropped off, victim is robbed by the fare – sometimes robbery occurs during the ride

Weapons: more often gunpoint, sometimes knifepoint

Vehicles/Transportation Routes: suspects will more often be let out of cab at an intersection rather than a particular address

Stolen Goods: cash, sometimes wallet

Method: robbery occurs during normal course of cab ride – suspect calls cab or hails cab or orders ride share and then robs victim, suspect may wear a disguise, sometimes violent 

Motive: crime of opportunity, sometimes becomes a series of crime

Query terms: cab, taxi, fare, driver, meter, Uber, Lyft, rides hare, backseat

Suggestions: Track all robberies of this type in one file to note a series of crimes early. Analyze by company, by time of day, by geography, by weapon, by suspect(s) description, by victimology (old driver? young? race?). Track where rides begin and where they end. 

"Suspects wanted in at least 24 rideshare robberies" - click to see video 




Sunday, September 24, 2023

Focus on the Observable Behavior

I chose to focus the book Elements of Crime Patterns on behavior, and made infrequent mention of motives. When analyzing data to uncover serial crime patterns in tactical policing, thinking too much about the psychology of the offender can distract from the real need to search data and discover facts. It is my view that, in the early stages, focusing on offender psychology is a mistake because the ability to apply the inferences made in the profile to find the offender is near impossible. A psychological profile is often not helpful until suspects are identified. In my opinion, even in research it makes more sense to focus on the actual behavior of offenders because that is where prevention mechanisms can be better applied. For example, environmental designs can be modified to make a type of criminal behavior more difficult.

From ChatGPT:

Advantages of Objectively Focusing on Behavior in a Crime

Immediate Applicability: Behavioral analysis can be used immediately for solving the crime at hand. Behavioral patterns help in predicting the offender's next move, which is crucial for law enforcement.

Factual Basis: This approach relies on tangible evidence and observed actions, making it less speculative and often more admissible in a court of law.

Wider Scope: Behavioral patterns are often common across multiple cases, which may help law enforcement in linking crimes and identifying serial offenders.

Time-Efficient: Less time is generally needed to analyze behavioral evidence than to construct a psychological profile, making it more practical during time-sensitive investigations.

Less Expertise Required: While some training is necessary, understanding behavioral evidence does not generally require the specialized knowledge needed to interpret psychological data.

Data-Driven: The approach can be more empirical and quantifiable, making it easier to use with modern data analytics tools for crime mapping, pattern recognition, etc.

Lower Risk of Bias: Focusing on behavior is generally more objective and may minimize risks related to cultural or social biases that can sometimes affect psychological profiling.

In behavioral analysis, variables often include:

Type of offense (violent, property, etc.)

Modus operandi (the methods used in committing the crime)

Choice of victim

Location and timing

Evidence left at the scene

Advantages of Developing a Psychological Profile

In-depth Understanding: Psychological profiles offer a deeper insight into the motivations behind a crime, which can be useful for preventative measures and in understanding criminal behavior on a broader level.

Narrowing Suspects: Psychological profiles can help law enforcement to narrow down a list of potential suspects by identifying specific characteristics or traits.

Long-Term Strategy: These profiles are often useful in investigations that span a long period or require a deep understanding of the criminal’s motives.

Interdisciplinary: Profiling often brings in expertise from psychology, sociology, and criminology, making it a comprehensive approach.

Qualitative Insights: Provides rich, qualitative data that can be useful for academic research and can complement other forms of investigation.

Useful for Negotiation: Understanding the psychology of a suspect can be extremely valuable in situations that require negotiation, such as hostage scenarios.

Human Element: It may help to predict future behavior and even possibly lead to rehabilitation by understanding the underlying psychological triggers.

In psychological profiling, variables can include:

Psychological traits

Background and upbringing

Social and economic status

Emotional triggers

Mental health status



Saturday, September 23, 2023

Confirmation Bias and Crime Patterns

The online Oxford Language Dictionary defines confirmation bias as "the tendency to interpret new evidence as confirmation of one's existing beliefs or theories." Since it is impossible to eliminate one's existing beliefs or theories, the only workaround is to expand the ability to see things in other ways.

I explore some self-explanatory variables for crime pattern recognition in the book Elements of Crime Patterns. Anyone working at the ground level will see that these variables are how we might begin to recognize a serial crime in the data. They are common sense and I documented them because they have not been documented broadly as existing variables to identify. I used these variables daily to look for crime patterns, and many analysts do that. Many of these variables will mean nothing to a researcher, so when reading the book, they could dismiss them. Some researchers might find variables in this section to explore for new research. For example, is there a correlation between masked robbers and the level of violence used in crimes? Many questions could be developed and explored. Whether they matter is another story.

The officer collecting information at the street level and the investigator following up with more information-gathering have needs that conflict with researchers and policy-makers. They want to get their jobs done and may focus more on finding a charge that will stick or getting to a higher-priority call or case. In documenting information, each individual will decide what they believe is essential, which will vary. The quality of data collection suffers because of this.


From The Criminal Investigation Process, Volume III, Observations and Analysis (click on link), October 1975, page 152: 



Things may have improved since 1975, but with over 18,000 law enforcement agencies in the United States and little training on the importance of uncovering crime patterns, including the understanding of elements of modus operandi, it is likely that much information falls to the wayside and is lost forever.

So, where does confirmation bias apply here? You are unlikely to find what you do not know much about or value. 

Researchers and policy-makers will see the need to understand aggregate problems to find lasting solutions and distribute resources in the best places. They have different objectives than those on the ground.

The citizen who does not want their car broken into will value the agency that uncovers a specific car break-in pattern involving a drug addict stealing from many vehicles in their neighborhood before their car is broken into. They want the police to study a seemingly urgent matter that a researcher or policy-maker is less concerned with. But if the researcher or policy-maker is that citizen, they will want the same.

Those working in law enforcement agencies will have biases based on their expertise. The statistician sees things in terms of statistics, the Excel expert sees the application of spreadsheets, the GIS expert sees geography and maps, and the investigative or intelligence analyst sees research on specific criminals and their actions. 

How we focus on crime patterns will depend on where we stand in the world. But once we know our own viewpoint, we can try on others' views and appreciate their value.

Having more than one person or department analyze data can provide different perspectives that may help offset individual biases. Assembling a team with diverse backgrounds and perspectives can be an effective countermeasure against confirmation bias.


Additional reading: Knowledge management, criminal investigation and the Basic Policing Model: an integrated approach towards effective detection (click on link)



Friday, September 22, 2023

Elements of Crime Patterns

I finally wrote the book I had in mind for decades: Elements of Crime Patterns is now available in paperback, hardcover, and Kindle on Amazon. I will use this blog to offer tips to think about, recognize, and identity crime patterns using qualitative data. This blog supplements the book and vice versa.

Here I will explore a concept that I call, in my mind, "qualitative crime pattern identification." It is a means to uncover a specific crime series in a specific jurisdiction by those tasked to do so - police officers of various ranks and law enforcement analysts such as those with the title of crime analyst. It extends to those investigating crimes, any crimes that might be committed by the same offender.

There are a number of ways to link serial crimes. Physical evidence is the best, most reliable way. Since it is often not available, we must find other ways. First, we must recognize crime patterns, and then we can identify their specifics.

From the book:

In the context of crime patterns in law enforcement, recognizing and identifying have distinct meanings:

Recognizing refers to perceiving or acknowledging something based on previous knowledge or familiarity. Recognizing involves the capability of law enforcement officers, investigators, or analysts to identify patterns, trends, or behaviors that they have encountered before or have been trained to recognize. It's about seeing familiar patterns and understanding their significance in the context of crime investigation and prevention. Experienced police officers, investigators, and analysts recognize specific modus operandi associated with crime patterns and sometimes even particular criminals. This is their on-the-job learning. By simply reading this book, you will gain similar knowledge.

Identifying goes further and involves determining or naming something or someone based on specific characteristics or information. Identifying means pinpointing a particular pattern, suspect, or element based on the available data and evidence. It can include identifying  modus operandi, suspect descriptions, or evidence linking crimes together. Users of this book can take the specific information contained in it and actively search for existing real-world crime patterns. 

Using common sense, it is can seem easy to connect crimes with qualitative data - police agencies do it everyday. A man wearing a red jacket robs several McDonald's restaurants in the same city on Friday nights four weeks in a row. It is not rocket science. These crimes are likely committed by the same guy.

Yet, qualitative data in and outside of police reports holds various, often unexplored treasures in the form of clues to the existence of crimes being committed by the same offender or group of offenders. 

Any crime can have a serial offender, although we don't often think in those terms. This blog will explore the 27 crime categories included in the book, and more. Stay tuned.

Fraud

 Fraud involves deceptive practices with the intention of gaining something of value, often financial, from a victim. Fraud MO Variables Obj...