computational criminology
{{Short description|Use of computer science methods to formally define concepts in criminology}}
{{Criminology}}
Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.
Methods
Computing science methods being used include:
Areas of usage
Computational criminology is interdisciplinary in the sense that both criminologists and computing scientists work together to ensure that computational models properly match their theoretical and real-world counterparts. Areas of criminology for which computational approaches are being used include:
=Forensics=
Computational forensics (CF) is a quantitative approach to the methodology of the forensic sciences. It involves computer-based modeling, computer simulation, analysis, and recognition in studying and solving problems posed in various forensic disciplines. CF integrates expertise from computational science and forensic sciences.
A broad range of objects, substances and processes are investigated, which are mainly based on pattern evidence, such as toolmarks, fingerprints, shoeprints, documents etc.,S. N. Srihari, "Beyond CSI: The Rise of Computational Forensics", [https://spectrum.ieee.org/computing/software/beyond-csi-the-rise-of-computational-forensics/0 IEEE Spectrum] {{Webarchive|url=https://web.archive.org/web/20160910002640/https://spectrum.ieee.org/computing/software/beyond-csi-the-rise-of-computational-forensics/0 |date=2016-09-10 }}, pp. 38-43, December 2010. but also physiological and behavioral patterns, DNA, digital evidence and crime scenes.
Computational methods find a place in the forensic sciences in several ways,[http://www.csm.ornl.gov/viz/apps/comp-foren.html Computational Forensics Project - Automated Reconstruction of Human Faces (Archival page 6/2002 )]{{cite journal | last = Wong | first = J.L. |author2=Kirovski, D. |author3=Potkonjak, M. | title = Computational forensic techniques for intellectual property protection | journal = IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | issue = 6 | volume = 23| pages = 987–994 | year = 2004 | doi = 10.1109/TCAD.2004.828122 | citeseerx = 10.1.1.196.2803 | s2cid = 2971347 }} DIO 10.1109/TCAD.2004.828122[https://www.genomeweb.com/informatics/propelled-computational-forensics-911-ncbi-preps-qa-software-id-katrina-victims Propelled Into Computational Forensics by 9/11, NCBI Preps QA Software to ID Katrina Victims (November 28, 2005)]{{cite book | last = Franke | first = Katrin |author2=Srihari, Sargur | title = Third International Symposium on Information Assurance and Security | chapter = Computational Forensics: Towards Hybrid-Intelligent Crime Investigation | pages = 383–386 | year = 2007| doi = 10.1109/IAS.2007.84 | isbn = 978-0-7695-2876-2 | s2cid = 5702875 }}Book Announcement: Statistical DNA Forensics: Theory, Methods and Computation (January 2008), [http://www.researchandmarkets.com/reports/c82672/ Researchandmarkets.com] as for example:
- rigorous quantification of individuality,
- definition and establishment of likelihood ratio,
- increase of efficiency and effectiveness in daily forensic casework.
Algorithms implemented are from the fields of signal and image processing, computer vision,{{ cite journal | url = http://pages.cs.wisc.edu/~huangyz/cvpr08_Huang.pdf | title = Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model | author = YiZhen Huang | author2 = YangJing Long | name-list-style = amp | journal = Proc. IEEE Conference on Computer Vision and Pattern Recognition | year = 2008 | pages = 1–8 | url-status = dead | archiveurl = https://web.archive.org/web/20100617081150/http://pages.cs.wisc.edu/~huangyz/cvpr08_Huang.pdf | archivedate = 2010-06-17 }} computer graphics, data visualization, statistical pattern recognition, data mining, machine learning, and robotics.
Computer forensics (also referred to as "digital forensics" or "forensic information technology") is one specific discipline that could use computational science to study digital evidence. Computational Forensics examines diverse types of evidence.
==Forensic animation==
Forensic animation is a branch of forensic science in which audio-visual reconstructions of incidents or accidents are created to aid investigators. Examples include the use of computer animation, stills, and other audio visual aids. Application of computer animation in courtrooms today is becoming more popular.
The first use of forensic animation was in Connors v. United States, both sides used computer re-creations and animations in a case surrounding the crash of Delta Flight 191 on August 2, 1985.{{cite web|last1=Hofer|first1=Inga|title=The Rise of Courtroom Technology and its Effect on the Federal Rules of E vidence and the Federal Rules of Civil Procedure|url=https://digitalcommons.law.msu.edu/cgi/viewcontent.cgi?article=1102&context=king|website=Michigan State University College of Law|accessdate=7 January 2018|date=1 January 2007}} The crash resulted in the deaths of 137 people and extensive property damage. In the resulting lawsuit a method was required to explain complicated information and situations to the jury. As part of the plaintiff presentation, a 45-minute computer generated presentation was created to explain the intricacies of the evidence and thus began forensic animation.{{cite journal|last1=Marcotte|first1=Paul|title=Animated Evidence - Delta 191 Crash Re-Created through Computer Simulations at Trial|journal=ABA Journal|date=1989|volume=75|url=http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/abaj75&div=261&id=&page=|accessdate=7 January 2018}}
The first reported use of computer animation in a U.S. criminal trial was in the 1991 Marin County, CA homicide trial of James Mitchell (of the porno-businessman Mitchell Brothers){{cite news|last1=Pinsky|first1=Mark I.|title=Jury Out on High-Tech Courtroom : Computer animation, televised testimony and other innovations could streamline the justice system. But they also raise fairness questions and worries about abuse.|url=https://www.latimes.com/archives/la-xpm-1993-12-17-mn-2822-story.html|access-date=7 January 2018|agency=L.A. Times|date=17 December 1993}} The prosecution used the animation to explain the complex details of the shooting incident to the jury. It showed the positions of James Mitchell, Artie Mitchell (the victim), the bullet impact points, and the path taken by bullets as they entered Artie's body. The animation was admitted, over objection by the defense, and the case resulted in a conviction. The use of the animation was upheld on appeal and the success of the forensic animation led to its use in many other trials. In India Prof. T D Dogra at AIIMS New Delhi in 2008 used animation to explain the court of law and investigating agencies first time in two important cases of firearm injuries, case of Murder and Terrorist encounter killings (Batla house encounter case).{{cite web|url=http://medind.nic.in/jal/t14/i1/jalt14i1p104.pdf|title=Reconstruction of Scene by Forensic Animation Two Case Reports|publisher=J Indian Acad Forensic Med.Vol. 36, No. 1|date=January 2014|accessdate=24 June 2014}}
Applications
- Geographic profiling (Rossmo's formula)
- Social network analysis
- Understanding spatio-temporal dynamics of IED attacks in Northern Ireland{{Cite journal|last1=Tench|first1=Stephen|last2=Fry|first2=Hannah|last3=Gill|first3=Paul|date=2016|title=Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army|url=https://discovery.ucl.ac.uk/1477461/7/Gill_article.pdf|journal=European Journal of Applied Mathematics|language=en|volume=27|issue=3|pages=377–402|doi=10.1017/S0956792515000686|s2cid=53692006|issn=0956-7925}}
See also
References
{{reflist}}
External links
- [https://www.expertlaw.com/library/animation/admission_forensic_animation.html Admission of Forensic Animation]
- [https://www.expertlaw.com/library/animation/assess_forensic_animation.html How to Assess a Forensic Animation - Offensive and Defensive Strategies]
- [https://www.sfu.ca/icurs/index.html Institute for Canadian Urban Research Studies] (ICURS)
- [https://web.archive.org/web/20080524232935/http://stl.sfu.ca/projects/mastermind.php The Mastermind Project]
- [https://web.archive.org/web/20091223041309/http://pages.cs.wisc.edu/~huangyz/ The digital photo authentication project at CS Dept. University of Wisconsin-Madison]
- [http://www.tmba.tv/forensic-animation/ Trial Graphics: The role of forensic animation in the courtroom]