Project outcomesPatterns of burglaryUs<strong>in</strong>g a modification of an approach developed <strong>in</strong> the field of epidemiology, analyses wereconducted to see if burglary does cluster <strong>in</strong> space and time and if the patterns vary acrosslocation. Briefly, to do this, for each area each burglary event is compared to every other andthe space-time distance between them recorded. The pattern of results observed is thencompared with what would be expected on the basis of chance, determ<strong>in</strong>ed us<strong>in</strong>g what isknown as a Monte-Carlo simulation. Burglary was considered to be communicable if moreevents occurred near to each other <strong>in</strong> both space and time than would be expected on thebasis of chance.Without exception <strong>in</strong> the East Midlands areas studied, the risk of burglary is communicable upto a distance of around 400m for at least one month. This f<strong>in</strong>d<strong>in</strong>g was used as a general rule<strong>in</strong> the construction of basic prospective maps. Sensitivity analyses were conducted toexam<strong>in</strong>e the duration of the elevation <strong>in</strong> risk. These suggested that risk (albeit dim<strong>in</strong>ish<strong>in</strong>g)extended beyond one month and <strong>in</strong> most cases up to around eight weeks.The patterns were to some extent specific to the time of day considered. For example, if aburglary occurred at one location dur<strong>in</strong>g the afternoon, a further burglary was more likelynearby soon after and at a similar time of day. In supplementary work not <strong>report</strong>ed here, theftfrom (but not theft of) vehicles was also found to be communicable.Develop<strong>in</strong>g the predictive system and measur<strong>in</strong>g its accuracyOn the basis of the above f<strong>in</strong>d<strong>in</strong>gs, a method of prospective <strong>mapp<strong>in</strong>g</strong> (hereafter, Promap),based on the authors’ previous work, was developed. Across the different areas studied <strong>in</strong>the <strong>in</strong>itial phase of the research, police analysts were already us<strong>in</strong>g descriptive hotspot<strong>mapp<strong>in</strong>g</strong>. Promap was tested aga<strong>in</strong>st an optimised version of the ‘retrospective’ hotspott<strong>in</strong>gmethod <strong>in</strong> current use. The optimised versions were substantially more predictive than mapswhich resemble those typically used <strong>in</strong> <strong>crime</strong> analysis. Promap outperformed the optimised‘retrospective’ hotspot <strong>mapp<strong>in</strong>g</strong> system. It did this <strong>in</strong> three ways.• Promap correctly predicted more burglaries than other methods. For example, the f<strong>in</strong>alversion of Promap could identify the locations of 78 per cent burglaries that occurredwith<strong>in</strong> the next seven days of a forecast, whereas for the same <strong>in</strong>terval theretrospective model could identify only 51 per cent.• Relative to the retrospective maps, it yielded hotspots which formed more solid,coalescent, hence readily patrollable, areas.• The f<strong>in</strong>al version of Promap accurately predicted more <strong>crime</strong> while identify<strong>in</strong>g a smallerarea than other methods. For example, the same fraction of burglaries occurr<strong>in</strong>g with<strong>in</strong>two to seven days of a prediction could be forecasted by identify<strong>in</strong>g patroll<strong>in</strong>g areas halfthe size of those generated by retrospective mapsImplications for <strong>operational</strong> polic<strong>in</strong>gResearch conducted by the authors and others suggests that police officers’ perceptions ofwhere burglary hotspots form are often imperfect. This is particularly true for recent ratherthan endur<strong>in</strong>g problems. The fluidity of burglary risk provides an explanation for this. Crimemoves and patterns evolve. Why should police officers be able to anticipate such changes?They should not, but computerised support systems that can assist <strong>in</strong> the <strong>crime</strong> reductionenterprise should.The advantages of Promap are that it could act to facilitate more targeted <strong>crime</strong> reduction<strong>in</strong>terventions, <strong>in</strong>creas<strong>in</strong>g the likelihood that resources are deployed to the right places at theright time, rather than where they were needed last week or last month (as with conventionalhotspot methods). Risky areas can be better def<strong>in</strong>ed so that patrols could move throughpriority areas more efficiently, spend<strong>in</strong>g less time <strong>in</strong> places with lower risk. The maps can alsobe produced for specific shifts to ensure their cont<strong>in</strong>ued relevance over the course of the day.vi
Develop<strong>in</strong>g predictive <strong>mapp<strong>in</strong>g</strong> <strong>in</strong> an <strong>operational</strong> polic<strong>in</strong>g <strong>context</strong>Support systems are only valuable if they can be used and understood by those operat<strong>in</strong>gthem. Promap software was developed for use <strong>in</strong> one police Basic Command Unit (BCU) <strong>in</strong>the East Midlands <strong>in</strong> consultation with local police and community safety practitioners. Us<strong>in</strong>gthe software, maps could easily be produced at regular <strong>in</strong>tervals by <strong>crime</strong> analysts, discusseddur<strong>in</strong>g shift brief<strong>in</strong>gs and provided to beat officers. The maps clearly def<strong>in</strong>ed the areas withthe highest predicted risks, aga<strong>in</strong>st a background of the hous<strong>in</strong>g distribution and significantgeographical po<strong>in</strong>ts of reference, which could then be used as guides to patroll<strong>in</strong>g. Inresponse to feedback, different maps were generated for each of the three police shifts of theday.The system was modified <strong>in</strong> response to practitioner requests. Considerable effort wasexpended to optimise the algorithms used to ensure that the system could generate mapsrapidly. The f<strong>in</strong>al version could generate maps for the entire participat<strong>in</strong>g BCU <strong>in</strong> around 20seconds. A different system which generates descriptive (i.e. not predictive) maps, took tenm<strong>in</strong>utes to complete an analysis of the same area, with extra time required to display theresult<strong>in</strong>g output.Issues of implementation encountered <strong>in</strong> situFollow<strong>in</strong>g consultation with the staff <strong>in</strong> the pilot BCU and their <strong>crime</strong> reduction partners, thesystem was modified and used <strong>in</strong> an <strong>operational</strong> <strong>context</strong> over a period of six months.Promaps were generated for each of five sections which comprised the BCU by <strong>crime</strong>analysts located at police headquarters, and dissem<strong>in</strong>ated us<strong>in</strong>g the force IT system.A process evaluation was conducted over the implementation period to see how the systemwas used. This <strong>in</strong>volved observation of brief<strong>in</strong>g meet<strong>in</strong>gs, a log of the tactical options used <strong>in</strong>response to the maps, and a survey of front-l<strong>in</strong>e police officers.Issues with system implementation• Despite the fact that the system itself was considered simple to use, changes of keypersonnel (<strong>in</strong>clud<strong>in</strong>g the BCU commander) and force IT requirements (which <strong>in</strong>itiallyrendered the system unnecessarily complex) made for a slow start. Those surveyedcame to regard it as useful to the po<strong>in</strong>t of enquir<strong>in</strong>g about the possibility of its extensionto cover other <strong>crime</strong> types.• Timely dissem<strong>in</strong>ation of relevant maps to front-l<strong>in</strong>e officers was a source of <strong>in</strong>itialdifficulty, resolved to general satisfaction distress<strong>in</strong>gly late <strong>in</strong> the pilot period. At firstthere were issues with the physical transfer of maps from the <strong>crime</strong> analysts, located atpolice headquarters, to the staff throughout the BCU. The maps were <strong>in</strong>itially generateddaily but beat officers felt that there were only m<strong>in</strong>or changes <strong>in</strong> the maps whengenerated with this frequency. Eventually, these issues were partially resolved byprovid<strong>in</strong>g local staff access to the <strong>mapp<strong>in</strong>g</strong> software, and by produc<strong>in</strong>g the maps twicea week. Implementation issues of this k<strong>in</strong>d currently represent one of the mostimportant limit<strong>in</strong>g factors <strong>in</strong> prospective <strong>mapp<strong>in</strong>g</strong> utility, but their resolution is mostly amatter of ensur<strong>in</strong>g that basic IT <strong>in</strong>frastructure is adequately configured, and the systemis not hobbled by adherence to IT custom and practice.• Part of this project <strong>in</strong>volved a review of possible tactical options that could be used <strong>in</strong>conjunction with the new maps. These ranged from well-established anti-burglary<strong>in</strong>itiatives, such as target harden<strong>in</strong>g and police patrols to novel techniques suggested <strong>in</strong>the light of the burglary patterns found. The review of each technique <strong>in</strong>cludeddocumented success or failure, f<strong>in</strong>ancial costs, and the speed with whichimplementation was plausible, swiftness of implementation be<strong>in</strong>g important <strong>in</strong> thecurrent project.It appeared that the most favoured methods were those that comb<strong>in</strong>ed the maps withother local <strong>in</strong>telligence (such as data on known offenders) to direct police patrols, andvii
- Page 2 and 3: 1. UCL JILL DANDO INSTITUTE OF CRIM
- Page 4 and 5: ContentsAcknowledgementsExecutive s
- Page 6 and 7: 2.5 Illustration of a simple neares
- Page 10 and 11: those that involved collaboration w
- Page 12 and 13: 1. IntroductionThis report represen
- Page 14 and 15: optimally calibrated system, the go
- Page 16 and 17: e ij = n .j x n i.nWhere, e ij is t
- Page 18 and 19: Table 2.2: Knox ratios for Mansfiel
- Page 20 and 21: Table 2.6: Monte-Carlo results for
- Page 22 and 23: Table 2.10: Weekly Knox ratios for
- Page 24 and 25: Table 2.14: Monte-Carlo results for
- Page 26 and 27: Figure 2.1: The five policing areas
- Page 28 and 29: The results for area 5 again demons
- Page 30 and 31: The bandwidth used to generate the
- Page 32: a densely populated urban area this
- Page 35 and 36: Table 2.24: Average number of crime
- Page 37 and 38: Patrolling efficiencyAs discussed e
- Page 39 and 40: 3. Tactical options and selecting a
- Page 41 and 42: Selecting a pilot siteThe decision
- Page 43 and 44: Table 3.2: Tactical options matrixT
- Page 45 and 46: Type ofinterventionStudyUse ofintel
- Page 47 and 48: Other potential tactical optionsAt
- Page 49 and 50: 4. System development and evolution
- Page 51 and 52: the same time of day as each other
- Page 53 and 54: unfortunately, implementation or us
- Page 55 and 56: any tactical options were employed
- Page 57 and 58: the end of the pilot. In addition t
- Page 59 and 60:
Figure 5.1: Promap dissemination pr
- Page 61 and 62:
the busy schedule of the new Divisi
- Page 63 and 64:
Tactical deliveryCommand Team daily
- Page 65 and 66:
Table 5.3: Number of respondents wh
- Page 67 and 68:
permitted, up to four plain clothed
- Page 69 and 70:
observation made by those who used
- Page 71 and 72:
A simple time-series analysis (see
- Page 73 and 74:
Two approaches were used to compute
- Page 75 and 76:
Figure 6.3: Changes in the proporti
- Page 77 and 78:
Figure 6.5: Changes in the proporti
- Page 79 and 80:
With respect to implementation real
- Page 81 and 82:
ReferencesAggresti, A. (1996) An In
- Page 83 and 84:
Johnson, S.D., Summers, L., and Pea
- Page 85 and 86:
Appendix 1. The information technol
- Page 87 and 88:
Figure A1.2: Stand-alone applicatio
- Page 89 and 90:
Recommendations that may be realise
- Page 91 and 92:
Section 1: knowledge and understand
- Page 93 and 94:
Extra Comments (please outline any
- Page 95 and 96:
In relation to the evaluation of in
- Page 97 and 98:
Time-series analysisFor the purpose
- Page 99 and 100:
Figure A3.1: Changes in the spatial
- Page 101 and 102:
Figure A3.2: Lorenz curves showing
- Page 103 and 104:
To recapitulate and elaborate, the
- Page 105 and 106:
Concluding comments on methodThe te
- Page 107 and 108:
Figure A5.2: An enlargement of the
- Page 109 and 110:
Figure A5.6: Prospective map magnif
- Page 111:
Produced by the Research Developmen