skip to main content
10.1145/3340531.3412694acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns

Authors Info & Claims
Published:19 October 2020Publication History

ABSTRACT

The identification of criminals' behavioral patterns can be helpful for solving crimes. Currently, in order to perform this task, police investigators manually extract criminals' behavioral patterns (also referred to as criminals' modus operandi) from a large corpus of police reports. These patterns are compared to the patterns observed in an ongoing criminal investigation to identify similarities that may link the suspect to other documented crimes. Due to the large number of historical cases, this manual process is time consuming, very costly in terms of police resources, and limits the investigators' ability to solve open cases. In this study, we propose an automatic and language independent method for extracting behavioral patterns from police reports. Relying on the extracted behavioral patterns as input, we utilize a Siamese neural network to identify burglaries committed by the same criminals. Experiments performed using a large dataset of police reports written in Hebrew provided by the Israel Police demonstrate the proposed method's high performance, achieving an AUC above 0.9. Using our method, we are also able to identify potential suspects for 22.41% of the open burglary cases in Israel.

Skip Supplemental Material Section

Supplemental Material

3340531.3412694.mp4

mp4

11 MB

References

  1. Sanjeev Arora, Yingyu Liang, and Tengyu Ma. 2016. A simple but tough-to-beat baseline for sentence embeddings. (2016).Google ScholarGoogle Scholar
  2. Luca Bertinetto, Jack Valmadre, Joao F Henriques, Andrea Vedaldi, and Philip HS Torr. 2016. Fully-convolutional siamese networks for object tracking. In European conference on computer vision. Springer, 850--865.Google ScholarGoogle ScholarCross RefCross Ref
  3. David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research, Vol. 3, Jan (2003), 993--1022.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2017. Enriching Word Vectors with Subword Information. Transactions of the Association for Computational Linguistics, Vol. 5 (2017), 135--146.Google ScholarGoogle ScholarCross RefCross Ref
  5. Anton Borg and Martin Boldt. 2016. Clustering residential burglaries using modus operandi and spatiotemporal information. International Journal of Information Technology & Decision Making, Vol. 15, 01 (2016), 23--42.Google ScholarGoogle ScholarCross RefCross Ref
  6. Anton Borg, Martin Boldt, Niklas Lavesson, Ulf Melander, and Veselka Boeva. 2014. Detecting serial residential burglaries using clustering. Expert Systems with Applications, Vol. 41, 11 (2014), 5252--5266.Google ScholarGoogle ScholarCross RefCross Ref
  7. Gerlof Bouma. 2009. Normalized (pointwise) mutual information in collocation extraction. Proceedings of GSCL (2009), 31--40.Google ScholarGoogle Scholar
  8. Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S"ackinger, and Roopak Shah. 1994. Signature verification using a "siamese" time delay neural network. In Advances in neural information processing systems. 737--744.Google ScholarGoogle Scholar
  9. Anna L Buczak and Christopher M Gifford. 2010. Fuzzy association rule mining for community crime pattern discovery. In ACM SIGKDD Workshop on Intelligence and Security Informatics. ACM, 2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Spencer Chainey, Lisa Tompson, and Sebastian Uhlig. 2008. The utility of hotspot mapping for predicting spatial patterns of crime. Security journal, Vol. 21, 1--2 (2008), 4--28.Google ScholarGoogle ScholarCross RefCross Ref
  11. Subhayu Chakravorty, Souparno Daripa, Urmi Saha, Subhasree Bose, Saptarsi Goswami, and Shinjan Mitra. 2015. Data mining techniques for analyzing murder related structured and unstructured data. American Journal of Advanced Computing, Vol. 2, 2 (2015), 47--54.Google ScholarGoogle Scholar
  12. François Chollet et almbox. 2015. Keras.Google ScholarGoogle Scholar
  13. Arpita Das, Harish Yenala, Manoj Chinnakotla, and Manish Shrivastava. 2016. Together we stand: Siamese networks for similar question retrieval. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1. 378--387.Google ScholarGoogle ScholarCross RefCross Ref
  14. H David and A Suruliandi. 2017. SURVEY ON CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUES. ICTACT Journal on Soft Computing, Vol. 7, 3 (2017).Google ScholarGoogle Scholar
  15. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018).Google ScholarGoogle Scholar
  16. Qing Guo, Wei Feng, Ce Zhou, Rui Huang, Liang Wan, and Song Wang. 2017. Learning dynamic siamese network for visual object tracking. In Proceedings of the IEEE International Conference on Computer Vision. 1763--1771.Google ScholarGoogle ScholarCross RefCross Ref
  17. Alon Itai and Shuly Wintner. 2008. Language resources for Hebrew. Language Resources and Evaluation, Vol. 42, 1 (2008), 75--98.Google ScholarGoogle ScholarCross RefCross Ref
  18. Wolfgang Jentner, Geoffrey Ellis, Florian Stoffel, Dominik Sacha, and Daniel Keim. 2016. A visual analytics approach for crime signature generation and exploration. In IEEE VIS2016 Workshop on Temporal & Sequential Event Analysis.Google ScholarGoogle Scholar
  19. Dror Kamir, Naama Soreq, and Yoni Neeman. 2002. A comprehensive NLP system for modern standard Arabic and modern Hebrew. In Proceedings of the ACL-02 workshop on Computational approaches to semitic languages. Association for Computational Linguistics, 1--9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Gregory Koch, Richard Zemel, and Ruslan Salakhutdinov. 2015. Siamese neural networks for one-shot image recognition. In ICML deep learning workshop, Vol. 2.Google ScholarGoogle Scholar
  21. Da Kuang, P Jeffrey Brantingham, and Andrea L Bertozzi. 2017. Crime topic modeling. Crime Science, Vol. 6, 1 (2017), 12.Google ScholarGoogle ScholarCross RefCross Ref
  22. Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning. 1188--1196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yu-Sheng Li and Ming-Liang Qi. 2019. An approach for understanding offender modus operandi to detect serial robbery crimes. Journal of Computational Science, Vol. 36 (2019), 101024.Google ScholarGoogle ScholarCross RefCross Ref
  24. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119.Google ScholarGoogle Scholar
  25. Amir More, Amit Seker, Victoria Basmova, and Reut Tsarfaty. 2019. Joint Transition-Based Models for Morpho-Syntactic Parsing: Parsing Strategies for MRLs and a Case Study from Modern Hebrew. Transactions of the Association for Computational Linguistics, Vol. 7 (2019), 33--48.Google ScholarGoogle ScholarCross RefCross Ref
  26. Malith Munasinghe, Harsha Perera, Shanika Udeshini, and Ruvan Weerasinghe. 2015. Machine Learning based criminal short listing using Modus Operandi features. In Advances in ICT for Emerging Regions (ICTer), 2015 Fifteenth International Conference on. IEEE, 69--76.Google ScholarGoogle ScholarCross RefCross Ref
  27. Shyam Varan Nath. 2006. Crime pattern detection using data mining. In Web intelligence and intelligent agent technology workshops, 2006. wi-iat 2006 workshops. 2006 ieee/wic/acm international conference on. IEEE, 41--44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Michael D Porter. 2016. A statistical approach to crime linkage. The American Statistician, Vol. 70, 2 (2016), 152--165.Google ScholarGoogle ScholarCross RefCross Ref
  29. Radim Rehurek and Petr Sojka. 2010. Software framework for topic modelling with large corpora. In In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. Citeseer.Google ScholarGoogle Scholar
  30. Martin B Short, Maria R D'orsogna, Virginia B Pasour, George E Tita, Paul J Brantingham, Andrea L Bertozzi, and Lincoln B Chayes. 2008. A statistical model of criminal behavior. Mathematical Models and Methods in Applied Sciences, Vol. 18, supp01 (2008), 1249--1267.Google ScholarGoogle ScholarCross RefCross Ref
  31. Reut Tsarfaty, Amit Seker, Shoval Sadde, and Stav Klein. 2019. What's Wrong with Hebrew NLP? And How to Make it Right. arXiv preprint arXiv:1908.05453 (2019).Google ScholarGoogle Scholar
  32. Tong Wang et almbox. 2016. Finding patterns in features and observations: new machine learning models with applications in computational criminology, marketing, and medicine. Ph.D. Dissertation. Massachusetts Institute of Technology.Google ScholarGoogle Scholar
  33. Tong Wang, Cynthia Rudin, Daniel Wagner, and Rich Sevieri. 2013. Detecting Patterns of Crime with Series Finder. In AAAI (Late-Breaking Developments).Google ScholarGoogle Scholar
  34. Jessica Woodhams, Ray Bull, and Clive R Hollin. 2007. Case linkage. In Criminal Profiling. Springer, 117--133.Google ScholarGoogle Scholar
  35. Cheng Zhang, Wu Liu, Huadong Ma, and Huiyuan Fu. 2016. Siamese neural network based gait recognition for human identification. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2832--2836.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Shixiang Zhu and Yao Xie. 2019. Crime Linkage Detection by Spatial-Temporal-Textual Point Processes. arXiv preprint arXiv:1902.00440 (2019).Google ScholarGoogle Scholar
  37. Imed Zitouni. 2014. Natural language processing of semitic languages. Springer.Google ScholarGoogle Scholar

Index Terms

  1. Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge Management
          October 2020
          3619 pages
          ISBN:9781450368599
          DOI:10.1145/3340531

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 October 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,861of8,427submissions,22%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader