Upload
ulondon
View
0
Download
0
Embed Size (px)
Citation preview
CRIME PATTERN ANALYSIS – IMPORTANCE IN MANAGING RISK
The safety and security of staff and properties is of prime
importance for the smooth functioning and profitability of
any organization. The role of security department in an
organization has grown exponentially during the past few
years. As stated by Sennewald (2003:19), ‘during the past
five decades, the security function has climbed up from the
depths of organizational existence... Security is now viewed
as a critical part of most organizations today with security
professionals reporting directly to senior management’. The
role of a security manager is considered to be of vital
importance in any organization.
The purpose of this essay will be to discuss the role of a
security and crime risk manager in an organization and to
analyze how useful the knowledge of crime patterns could be
to assist his/her role. In order to achieve this end, a
review will be made of the available literature on crime
pattern theory and crime pattern analysis and how it can be
used to facilitate the development of crime reduction and
loss control strategies by a security manager. Review would
be made of the development of crime patterns by the Chicago
School, routine activity theory and rational choice
perspective, leading to the development of the crime pattern
theory and crime pattern analysis. An attempt would be made
-1-
to discuss the relationship between these theories and how
they can be useful to a security and crime risk manager in
understanding crime patterns. In order to maintain focus of
this assignment, the role of a security and crime risk
manager in a United Nations operation would be evaluated as
an example. The security manager in such a setting has to
work often in difficult and hazardous conditions, deal with
a wide variety of crime risks, poor law enforcement and has
a huge responsibility to minimize and mitigate these risks.
Thus, it would be useful to analyze the extent to which the
knowledge of crime patterns can assist his/her role and the
impact it would have on the organization.
First of all, it would be useful to understand the
importance of having a security department and a
professional security and crime risk manager in an
organization. The basic purpose of the security department
is often summarized as ‘to protect company assets and ensure
a safe and secure environment for customers and staff’
(Bamfield, 2003). Kofi Annan (2004), former Secretary
General of the United Nations, said “Staff Security is not a
privilege or a luxury, not an afterthought or a burden. It
is not an option. It is a necessity and essential part of
the cost of doing business”. In this context, the role of a
-2-
modern day security manager in any organization is clearly
laid out. According to Rogers (2006:66), ‘Security managers
are responsible for directing the solution of security
problems in a cost and performance effective manner’.
Sennewald (2003) similarly identifies one of the major
remits of the security manager as being the limiting of
losses to his or her organization. The security manager has
to work towards preventing crime and losses by denying
opportunities to offenders. In order to achieve this end,
he/she must be able to adopt strategies that identify both
the scale and nature of threats to the organization, as well
as introducing measures to counter such threats. In order to
understand how crime pattern analysis can assist the role of
a security manager in this aspect, it would be appropriate
to have an understanding of the occurrence of crime and the
development of various theories explaining this occurrence
and the crime patterns.
Criminology developed in the late 18th century and
criminologists have been studying the relationship between
crime and place since early 19th century, after the first
annual national crime statistics were published in France.
Adolphe Quetelet (1796-1874), a Belgian mathematician,
statistician and sociologist was among the first to analyze
these statistics and found considerable regularity in them
(Mannheim and Bernard, 2009). Similarly, French scholar
-3-
Guerry (1833) and Henry Mayhew (1864) in U.K. analyzed the
incidence of crime in different areas (Department of
Criminology, 2009a). According to Brantingham and
Brantingham (2008), crimes do not occur randomly or
uniformly in time or space or society, across
neighbourhoods, or social groups, or during an individual’s
daily activities or during an individual’s lifetime.
Brantinghams further explain that understanding crime
requires concepts and models that can be used to account for
the patterned non-uniformity and non-randomness that
characterizes real criminal events.
The spatially-based studies of crime were developed during
the early 20th century by the Chicago School of
Sociologists. It comprised of researchers such as Ernest
Burgess, Robert Park and later, Clifford Shaw and Henry
McKay (Department of Criminology, 2009a). The Chicago
School developed a theory of crime and delinquency, which
was based on Ernest Burgess’s model of a city, and provided
a framework for explaining the social roots of crime.
Burgess (1928 as cited in Department of Criminology, 2009b)
model suggested that as cities expand in size, their
development is socially patterned and a city grows from the
centre outwards in a series of five concentric zones. The
zones were named central zone or business district,
transitional zone, the workers’ home zone, suburbia and
-4-
commuter area. Shaw and McKay (1942 as cited in Department
of Criminology, 2009b), later on, adapted this basic model
to Chicago city in order to analyze crime and delinquency
rates in each of the concentric geographical areas. They
discovered that the highest crime rates were in the
transitional zones, which had the greatest ‘social
disorganization’. Although useful at that time, this model
is no longer applicable to most modern cities in the world,
as the mobility has vastly increased and patterning of
amenities has changed. However, it demonstrates the use of
crime patterns in attempting to reduce crime and led to the
development of two very important sociological theories for
the explanation of crime, i.e. the ‘routine activity theory’
and ‘rational choice perspective’.
Cohen and Felson in 1979 introduced a new concept, which
tried to explain the occurrence of a criminal event on
spatial as well as temporal basis rather than just depending
on the area and was named the ‘Routine Activity Theory’. As
Cohen and Felson (1979:590) state, ‘the probability that a
violation will occur at any specific time and place might be
taken as a function of the convergence of likely offenders
and suitable targets in the absence of capable guardians’.
This theory further suggested that ‘likely offender’ can be
any normal citizen for any reason and a ‘capable guardian’
does not need to be a police officer or security guard, but
-5-
any person that may be in close proximity of the offender
and the target, who is able to witness the event or prevent
it. If any one of these factors is removed, then the
criminal event could be prevented.
The relevance of the routine activity theory to crime
patterns is the fact that it explains how criminal
opportunities come up during the normal routine activities
of normal people, thereby showing the spatial and temporal
aspects of crime. For example, this theory can explain the
occurrence of certain crimes at certain times and certain
locations like brawls near bars and pubs at night or during
weekends, shop-lifting inside the shopping centres during
certain hours and burglaries targeting secluded or
unattended households during night. However, the drawbacks
of this theory are that it excludes the motivation for
commission of a criminal act and it can only explain
offences when there is an ‘offender’ and a ‘target’, i.e.
‘direct-contact predatory violations’. So, it excluded
consensual and mutualistic crimes such as selling drugs,
gambling and prostitutions or individualistic offences like
suicide attempts, drug and alcohol abuse (Department of
Criminology, 2009a).
Felson, later on developed this theory in 1986 to introduce
the role of socializing factors in influencing potential
-6-
offenders in time and place, arguing that any changes in the
structure of the community and community relations affected
the routine activities of offenders and their targets as
well as the presence or absence of capable guardians. During
this development, he introduced the fourth element, called
the ‘intimate handler’, who is a person whose relationship
with the potential offender influences the occurrence of the
offence (Felson, 1986 as cited in Department of Criminology,
2009a).
The issue of motivation of the offender and the role
environmental factors can play in influencing the decision
making process of the prospective offender is taken up by
the rational choice perspective. This theory allows for
analyzing how and why a possible offender comes to the
decision whether to offend or not. ‘The assumption is that
the offender is acting rationally and within this approach,
offenders are seen as decision-makers, they choose to become
involved in crime after weighing the costs and benefits of
this course of action’ (Cornish and Clarke, 2006:19 as cited
in Department of Criminology, 2009c:3-7).
The value of rational choice perspective is greatly enhanced
by the fact that it complements the routine activity theory
in explaining how a prospective offender decides to commit
criminal offences and how such offences occur in the
-7-
backdrop of environmental factors. According to Cornish and
Clarke (2006 as cited in Department of Criminology, 2009c),
this theory can be used both to explain the required
conditions for the occurrence of specific offences (event
decisions) as well as to explain why people become involved
in crimes (involvement decisions). These decision making
stages are all influenced by complex situational variables,
which can be psychological, sociological and depending on
incentives and opportunities. Understanding this process of
what influences the decisions of a potential offender, the
various stages in commission of crime and modus operandi
employed in commission of various offences can help a
security and crime risk manager in understanding the
patterns of crime and offending leading to development of
suitable preventive measures.
The crime pattern theory develops from both routine activity
theory and the rational choice perspective by introducing
the notion of offenders acting on templates of crime
opportunity wherein the offender feels comfortable in the
commission of the criminal offence. As described earlier,
Brantingham and Brantingham (2008) believed that crimes are
neither uniform nor random and occurs in the context on an
‘environmental backcloth’, which is made up of a series of
factors including socio-cultural, economic, legal and the
physical environment. The Brantinghams, therefore take a
-8-
view that crime is complex and multifarious but because of
its non-randomness or non-uniformity, there exist rules and
patterns to crime, both in the criminal events as well as
for the offenders. As these patterns can be recognized and
analyzed, they can be used to reduce and prevent crime
opportunities in a wide number of ways. The first step
towards understanding complex crime patterns is to study the
individual activities of people in general. According to
Brantinghams, ‘it should be remembered that people who
commit crimes spend most of their day in non-criminal
activities. What shapes non-criminal activities helps shape
criminal activities’ (Brantingham and Brantingham, 2008:
79). So, it can be said that the non-criminal activities
prospective criminal is involved in ‘….form a patterned
backcloth on which criminal activities can be played out’
(Brantingham and Brantingham, 1993: 268 as quoted in
Department of Criminology, 2009a: 6-17).
The Brantinghams crime pattern theory is based on eight
rules, which interplay to explain the commission of crime as
well as general formation of hot spots and to project
temporal and spatial displacement of crime, in case of crime
control interventions (Brantingham and Brantingham, 2008).
According to this theory, crime is clustered, but the shape
of the clustering is greatly influenced by where people live
within a particular city or neighbourhood, how and why they
-9-
travel or move about (i.e. their activity space or daily
movement patterns), and how networks of people who know each
other spend their time (work related or leisure activities).
‘People who commit crimes have normal spatio-temporal
movement patterns like everyone else. The likely location
for a crime is near this normal activity and awareness
space. Crimes often occur at nodes where the victim’s
activity space and the offender’s activity space intersect’
(Brantingham and Brantingham, 2008: 84, 86).
The decision by the offender to commit crime depends on
their normal activity space as well as their ‘crime
template’ i.e. situational cues that influence the
offender’s decision to commit crime. These factors or
situational cues would include the visibility of the target,
degree of difficulty apparent to the offender and the
presence or absence of ‘capable guardians’ as described in
the routine activity theory. This ‘crime template’ varies
from individual to individual and from crime to crime as
well as the offenders’ age and experience (Department of
Criminology, 2009a). It does develop with each attempted
criminal action. If an offender is successful in the
commission of a particular offence, the ‘crime template’ for
this type of offence is positively reinforced leading to
repetition of such offence and replication of the crime
patterns. Similarly, any failure during the commission of a
-10-
particular offence or repeated failure leads the offender
either to stop attempting that offence or change the time,
place and modus operandi, thereby altering the ‘crime
template’ for that type of offence. This in turn can affect
the readiness or willingness of the offender to commit that
particular type of offence.
As crime pattern theory explains the specific patterns of
offending in both crime and offenders, it is of vital
importance in crime pattern analysis, which cannot be
carried out without an understanding of crime patterns. The
modern day security and crime risk manager, including a
Security Advisor in the context of UN operations, has to
study crime patterns in his/her area of responsibility and
analyze them before carrying out the Security Risk Analysis
attempting to identify the risks and the Security Risk
Management process aiming at reduction of crime targeted
against UN personnel and properties.
Crime pattern analysis attempts to identify crime patterns
in a particular area, using crime data. According to Cope,
‘crime analysis supports the prevention, reduction and
investigation of crime by providing the police with
information that enables them to prioritise interventions’
(2003: 340). In addition to spatial and temporal
considerations, certain groups and individuals are more
-11-
likely to be victimized or targeted or suffer repeat
offences. For example, men aged 16-24 and single people are
more likely to experience violent crime, while those with no
home security measures and single adult households are more
likely to be a victim of burglary (Povey, Walker and
Kershaw, 2005 as cited in Home Office Strategic Policy Team,
2005). According to Ekblom (1988:4), crime analysis ‘assumes
that crimes cluster in place and/or time, focus on
particular types of property or victims and are committed by
particular range of methods’.
Cope (2003), defined the crime analysis process consisting
of five stages including collection of data, representation
of data, interpretation of data, recommendations for action
and evaluation. It is extremely important to collect data
and information for analysis from different sources and not
to depend solely on official data. Ebklom (1988: 12)
‘identified seven key variables for crime analysts to
consider when representing crime data, which include the
nature of the offence; the location of the offence; the time
it occurred; the method employed; the target chosen and its
characteristics; the victims and their characteristics; and
the social and physical background of the offence’. Other
variables, which could be useful as per need can be used.
-12-
The second stage of representation of data is very important
as it would give an overall picture of the nature and scale
of crime in a particular area. This process is called crime
mapping and there are three main ways of doing it. The
simplest way is to map the incidents on paper.
Alternatively, crime mapping can be done using a computer
graphics software application or using a Geographic
Information System (GIS) (Home Office Direct Communication
Unit, 2005). There are three kinds of crime mapping
techniques, including descriptive mapping, analytical
mapping and interactive mapping. Simple crime maps are made
to reflect spatial, temporal or environmental aspects of
crime in an area and is called descriptive mapping. However,
with the use of computer graphics and GIS, analytical
mapping reflecting examination of more than one variable,
e.g. combined spatial and temporal aspect is possible. GIS
has great potential in criminological research because of
its three key functions, namely database management, spatial
analysis and visualization. Using these three components
collectively provides the capabilities of linking criminal
acts and their multiple characteristics with their
geographical locations and conversely allows association of
the locations of crime with the demographics of the areas in
which they occur (Alexander and Xiang, 1994). Use of GIS
and other computer graphics techniques has made analytical
crime mapping easier leading to Spatial and Temporal
-13-
Analysis of Crime (STAC) as well as ‘Hot Spot analysis’.
STAC analyzes the spatial distribution of crime as a
function of time while ‘Hot Spot analysis’ or ‘Hot Spot
mapping’ is a popular analytical technique that is used to
help identify where to target police and crime reduction
resources after identifying the areas of high concentrations
of crime (Chainey, Tompson and Uhlig, 2008). Interactive
mapping is more sophisticated and involves combination of
both descriptive and analytical mapping. It allows mapping
of time and space variables of crime in addition to other
variables like profiles of potential offenders and their
activities.
The third stage of interpretation of data is where the crime
patterns and distribution of crime can be explained and
understood. This may include both deductive and inductive
methods using spatial, temporal and ecological principles.
The Brantinghams (2008) identified three main forms of crime
analysis. The first is crime occurrence analysis involving a
descriptive mapping out of locations of specified crimes on
a geographical basis. The second is relational / locational
analysis in which analytical mapping of place where crime
occurred is identified and then the relationship between the
location and factors that facilitate the offence are
discerned. The third is ecological analysis involving study
of the relationship between groups of people and the
-14-
territory that they occupy (Department of Criminology,
2009a). Similarly, the analysis can involve studying the
temporal aspects of crime during the day, week, months and
years using time series models.
The fourth stage of crime analysis process involves
recommendations for action based on the review of data and
interpretation from the first three steps. The fifth stage
is evaluation, in which the impact of the action recommended
in the fourth stage is evaluated. In the light of this
evaluation, the recommendations for intervention may be
continued having proved successful or may be modified to
make them more effective.
Crime pattern analysis is extremely useful for security and
crime risk manager as a tool of understanding crime
patterns, analyzing and interpreting crime data. However, it
is strictly a reactive tool as it is based on the
information on criminal events that happened under certain
circumstances and environments in the past. It cannot be
used to accurately predict the relative risk of a crime and
this has to be factored in to any threat and risk assessment
being carried out using this method. Though it provides
information about crime ‘Hot Spots’ and crime distribution,
it provides little insight into the causes of the crime
because unless the crime maps are properly constructed and
-15-
interpreted based on high quality accurate data, they tend
to ignore the geographical features of an area and other
factors that may affect crime levels (Cope, 2003). According
to Ratcliffe (2004),
The broader area of crime mapping and crime
pattern analysis would appear to either be, or on
the verge of becoming, a fundamental tool in the
criminal justice system and in law enforcement
because specific methodologies like spatio-
temporal mapping and geographic profiling provides
the analytical tools that were not previously
available without considerable effort. While crime
analysis still has a long way to go, it is moving
ahead at a quick rate and growing in significance.
(Ratcliffe, 2004:
79, 80)
As described by Bowers, Johnson and Pease (2004), research
is being undertaken on the use of event-based mapping using
GIS techniques, instead of the current area based
retrospective techniques, to be able to more accurately
predict crime in the future.
It would be useful to explain how useful this process of
crime pattern analysis would be for a modern day security
-16-
and crime risk manager, using the UN Security Advisor as an
example. In the context of UN operations, the host country
is primarily responsible for the security of UN personnel,
property and assets. In addition, the UN organization
strives to maintain a world-wide uniform standard of
security in its peacekeeping missions and other duty
stations as a necessary safeguard against the event of host
country security arrangements collapsing or becoming
ineffective owing to armed conflict, civil disturbances or
sudden change of government. These UN general security
arrangements are monitored by the United Nations Department
of Safety and Security (UNDSS) at HQ New York. The personnel
who maintain the general security arrangements at each duty
station and country form the Security Management Team
(Medhurst, 2002).
The UN Security Management System in a country is
coordinated by a Security Advisor, who is responsible for
‘Security Risk Management’, i.e. identification of the
possible threats and risks associated with the various UN
agencies and organizations working in the country and
devising various strategies and policies in order to
minimize such threats and risks to an acceptable level
(United Nations, 2006). The Security Advisor, at the start
of UN operations in a country, has to initially carry out
the security risk assessment of all the proposed offices and
-17-
possible residential locations for UN staff members. A
comprehensive crime pattern analysis has to be carried out
in consultation with local law enforcing agencies. All
possible crime data is collected from official records. In
addition, data regarding prior offences in the area and
crime surveys are also collected from any UN agencies and
INGOs, who are already working in the area or have worked
there in the past. After collection of this data, an
analysis of the crime situation is carried out, to identify
crime ‘Hot Spots’ which must be avoided and comparatively
‘safer’ areas having lower crime rate, which can be used for
offices and residences for the UN staff. Each proposed
office or residence is then inspected and a threat and
vulnerability assessment of the physical features and
location is carried out to identify the strengths and
weaknesses from security point of view. Mitigation or
‘target hardening’ measures are then suggested in order to
minimize the risk level. The process is continued to be
monitored for evaluation, feedback and to adjust in case of
any development affecting the safety and security of the UN
staff (UNDSS, 2009). Hence, the UN Security Advisor follows
the ‘preventive process’ as defined by Ekblom (1986:2,3),
which ‘aims to obtain a clear picture of the nature of the
crime problem, highlight the preventive options and the
choice of strategy, and once these are implemented, to check
-18-
on their impact and evaluate whether these options are
working or need modifications’.
It can be concluded from the above discussion that the
security managers have the enormous task to protect staff
and properties, prevent and minimize losses and are,
therefore, very important in the hierarchy of any
organization. The development of various theories explaining
the occurrence of crime has led to a better understanding of
crime and crime patterns. It has been clearly demonstrated
that the knowledge of crime patterns is of vital importance
to assist the role of a security and crime risk manager in
order to better target resources and interventions and to
devise policies and strategies leading to crime reduction,
detection of offences, prevention of losses, and increasing
the profitability of the organization.
Reference List
-19-
Alexander, M., and Xiang W. (1994) CRIME PATTERN ANALYSIS USING
GIS, Charlotte: University of North Carolina at Charlotte,
http://libraries.maine.edu/Spatial/gisweb/spatdb/gis-lis/gi9
4001.html (accessed 25/11/2009).
Annan, K. (2004) Address to the United Nations Fifth Committee of the
General Assembly on 01 November 2004, (in the aftermath of the Baghdad
bombings) ,
www.unis.unvienna.org/unis/pressrels/2004/sgsm9572.html,
(accessed 19/11/2009) and http://dss.un.org/BSITF/ (Module
2, Page 2, accessed 17/11/2009).
Bamfield, J. (2006) ‘Management’ in M. Gill (ed) The Handbook
of Security, London: Palgrave Macmillan Ltd, 485-508.
Bowers, K. J., Johnson, S.D., and Pease, K. (2004)
‘PROSPECTIVE HOT-SPOTTING The Future of Crime Mapping?’
British Journal of Criminology, 44 (5): 641-658.
Brantingham, P. and Brantingham, P. (2008) ‘Crime Pattern
Theory’ in R. Wortley, L. Mazerolle (eds) Environmental
Criminology and Crime Analysis, Devon: Willan Publishing, 78-93.
Chainey, S., Tompson, L., and Uhlig S. (2008) ‘The Utility
of Hotspot Mapping for Predicting Spatial Patterns of Crime’
Security Journal 21: 4-28.
-20-
Cohen, L. E., and Felson, M. (1979) ‘Social Change and Crime
Rate Trends: A Routine Activity Approach’ American Sociological
Review 44 (4): 588-608 http://www.jstor.org/stable/2094589
(accessed 23/11/2009).
Cope, N. (2003) ‘Crime Analysis: Principles and Practice’ in
T. Newburn (ed) Handbook of Policing, Cullompton, Devon: Willan
Publishing, 340-362.
Department of Criminology (2009a) Crime and Crime Prevention
Module, UNIT 6, Crime Pattern Analysis, Leicester: Department of
Criminology.
Department of Criminology (2009b) Crime and Crime Prevention
Module, UNIT 2, Theories of Crime, Leicester: Department of
Criminology.
Department of Criminology (2009c) Crime and Crime Prevention
Module, UNIT 3, Situational Crime Prevention, Leicester: Department of
Criminology.
Ekblom, P. (1986) The Prevention of Shop Theft: an approach through
crime analysis, Crime Prevention Unit Paper No 5, London: HMSO.
-21-
Ekblom, P. (1988) Getting the Best Out of Crime Analysis, Crime
Prevention Unit Paper No 10, London: HMSO.
Home Office Direct Communications Unit (2005) Safer Schools and
Hospitals, London: British Home Office in
http:www.crimereduction.homeoffice.gov.uk/toolkits/ssh01.htm
(accessed 08/11/2009).
Home Office Strategic Policy Team (2005) Reducing crime – an
overview analysis, London: British Home Office.
Mannheim, H., and Bernard, T. J. (2009) ‘Criminology’
Encyclopaedia Britannica Online,
http://www.britannica.com/EBchecked/topic/143163/criminology
, (accessed 22/11/2009).
Medhurst, M. (2002) Security for UN Peacekeepers, New York: UNITAR
Program of Correspondence Instruction.
Ratcliffe, J. H. (2004) ‘CRIME MAPPING AND THE TRAINING
NEEDS OF LAW ENFORCEMENT’ European Journal on Criminal Policy and
Research, 10: 65-83.
Rogers, B.B. (2006) ‘Engineering Principles for Security
Managers’ in M. Gill (ed) The Handbook of Security, London:
Palgrave Macmillan Ltd, 66-89.
-22-
Sennewald, C.A. (2003) Effective Security Management, Boston:
Butterworth-Heinnemann.
United Nations (2006) United Nations Field Security Handbook, New
York: United Nations.
United Nations Department of Safety and Security (UNDSS)
(2009) Entry into effect of new policies on Security Risk Management (SRM)
and Minimum Operating Security Standards (MOSS), and Guidelines for
Determining Acceptable Risk, New York: United Nations.
-23-