The Concept of âEntitiesâ in Police Recording Systems
The main purposes of crime intelligence and crime analysis are to detect offenders and/or disrupt their activities, thus moving toward the ultimate goal of crime reduction. In this context, the offender must be viewed as an âentityâ that has a living space, journey to crime, methods, behaviours, description, and unique biometric features and that, through actions, generates intelligence information from sources and leaves forensic evidence whilst engaged in criminal activity. Indeed, all people, real locations, forensic exhibits, latent marks, DNA profiles, etc. are real entities.
The concept of entities applies to all real things, for each real item can be the focus of a record. For example, a burglary is reported at 2 West Street; a crime report record is created for the address, but inside the report are many fields covering details of the investigation, the alleged victim(s), suspects, etc. To find details in the fields across many crime reports and information in other systems, users have to seek the information relevant to the âentitiesâ they seek by proxy. In other words, the entity itself is not the focus of the search or enquiry. If the address at West Street was the focus, then all records in relevant systems (not just the crime report system) would respond with the address as the location entity with all records relating to that entity.
At this time, police systems are based on records rather than on entities. To achieve an entity-based approach, most police systems have to be data warehoused, usually by extracting copies of all records in different systems daily into data warehouse servers, enabling entity-based searching to be carried out in the data warehouse servers. Such an example is the Metropolitan Police Service Integrated Information Platform (IIP), which enables entity searches across crime reports, crime intelligence, and custody and stops databases. Without such an approach, most searches are made by proxy or are looking for entities within records-based systems. Entities are found in subsets of data, usually in headed fields where they may be recorded. The consequence of using records-based systems at this time is that analystsâ time is consumed in the creation of spreadsheets from different systems and then having to compare or merge the spreadsheets to seek common factors relating to the entity or real item, which is the real focus of the research.
It is therefore wise to view the process of intelligence and crime analysis holistically across all the available disciplines ranging from recorded facts, intelligence information, and recovered forensic evidence.
The primary objectives of this book are to raise awareness of forensics as intelligence sources for those involved in investigations, crime analysis, and forensic examinations. When considering forensics, service providers involved in forensic examinations, crime intelligence, and analysis should consider these key issues by asking the following questions:
Do crime analysts within our organisation have any meaningful awareness or training in the significance of forensic recoveries?
How many fingerprint identifications and DNA matches against crime scene forensic recoveries did our service achieve in the past year? Has this number increased or decreased from the prior year?
With respect to the fingerprint and DNA (hard evidence) recoveries, did the matches result in arrests and prosecutions? Are there useful hard evidence forensic hits that are not making their way to analysis or being turned into detections? Also, what is the trend relative to follow-up analysis performed on the bulk of these fingerprint or DNA identifications and matches?
What is our serviceâs track record in expanding fingerprint and DNA hits by the use of intelligence and crime analysis research?
What additional achievements has our organisation made using other, âsofterâ forms of forensics such as shoe marks or tool marks apart from fingerprints and DNA? What results can be achieved from using the softer forms of evidence?
As 80% to 90% of forensic materials recovered never make their way into a forensic laboratory, what are the ways that we can utilise this material to solve cases? Is my organisation keeping track of forensic matches against offenders, particularly prolific offenders?
How can forensic intelligence enhance the nine standard crime analysis techniques listed in Chapter 3 to be used to drive police intelligence-led models?
What are the implications of not investing in a proper digital evidence imaging, measuring, and comparison system (e.g., Treadmark or Shoeprint Image Capture and Retrieval [SICAR]) as a knowledge and system asset to deal with footwear and tool mark evidence?
Has our service negatively experienced what is defined as the âCSI effectâ derived from the television series, which has increased the expectations of juries and courts in the capabilities of forensic examinations and services?
If the answers to these questions are mainly ânoâ or âI do not knowâ, then your service is missing big tricks in improving its results and is not using a major set of tools to enable real intelligence links and forensic matching techniques to improve your business. If you have answered âyesâ, then the following chapters will be your go-to reference for continuing success in forensic intelligence management. Regardless of your current position, it is important to read this book carefully as it will help to clarify some of the preceding issues as well as offer solutions to day-to-day problems in forensic intelligence.
If the volume crime work stream seems daunting and your organisation is having difficulty in recovering or dealing with forensics effectively, then major problems can arise in major investigations. In these conditions, there will not be any forensic context in which to relate recoveries, even for petty crime. Further development of forensic recoveries can quickly lead to the identifications of single offenders, crime series offenders, and gangs as well as create leads necessary to address dated and unsolved cases. It should be pointed out that the main impression of the CSI television series is that everything is somewhere in a database and that general categorisations of criminal types are invariably true, but this is unrealistic. What is realistic, however, is for a properly structured forensic service to manage and handle the real forensic recoveries they retain effectively to make best use of them, within their finite resources.