Computational criminology

Last updated

Computational criminology is an interdisciplinary field which uses computing science methods to formally define criminology concepts, improve our understanding of complex phenomena, and generate solutions for related problems.

Contents

Methods

Computing science methods being used include:

Areas of usage

Computational criminology is interdisciplinary in the sense that both criminologists and computing scientists work together to ensure that computational models properly match their theoretical and real-world counterparts. Areas of criminology for which computational approaches are being used include:

Forensics

Computational forensics (CF) is a quantitative approach to the methodology of the forensic sciences. It involves computer-based modeling, computer simulation, analysis, and recognition in studying and solving problems posed in various forensic disciplines. CF integrates expertise from computational science and forensic sciences.

A broad range of objects, substances and processes are investigated, which are mainly based on pattern evidence, such as toolmarks, fingerprints, shoeprints, documents etc., [1] but also physiological and behavioral patterns, DNA, digital evidence and crime scenes.

Computational methods find a place in the forensic sciences in several ways, [2] [3] [4] [5] [6] as for example:

Algorithms implemented are from the fields of signal and image processing, computer vision, [7] computer graphics, data visualization, statistical pattern recognition, data mining, machine learning, and robotics.

Computer forensics (also referred to as "digital forensics" or "forensic information technology") is one specific discipline that could use computational science to study digital evidence. Computational Forensics examines diverse types of evidence.

Forensic animation

Forensic animation is a branch of forensic science in which audio-visual reconstructions of incidents or accidents are created to aid investigators. Examples include the use of computer animation, stills, and other audio visual aids. Application of computer animation in courtrooms today is becoming more popular.

The first use of forensic animation was in Connors v. United States, both sides used computer re-creations and animations in a case surrounding the crash of Delta Flight 191 on August 2, 1985. [8] The crash resulted in the deaths of 137 people and extensive property damage. In the resulting lawsuit a method was required to explain complicated information and situations to the jury. As part of the plaintiff presentation, a 45-minute computer generated presentation was created to explain the intricacies of the evidence and thus began forensic animation. [9]

The first reported use of computer animation in a U.S. criminal trial was in the 1991 Marin County, CA homicide trial of James Mitchell (of the porno-businessman Mitchell Brothers) [10] The prosecution used the animation to explain the complex details of the shooting incident to the jury. It showed the positions of James Mitchell, Artie Mitchell (the victim), the bullet impact points, and the path taken by bullets as they entered Artie's body. The animation was admitted, over objection by the defense, and the case resulted in a conviction. The use of the animation was upheld on appeal and the success of the forensic animation led to its use in many other trials. In India Prof. T D Dogra at AIIMS New Delhi in 2008 used animation to explain the court of law and investigating agencies first time in two important cases of firearm injuries, case of Murder and Terrorist encounter killings (Batla house encounter case). [11]

Applications

See also

Related Research Articles

<span class="mw-page-title-main">Evolutionary computation</span> Trial and error problem solvers with a metaheuristic or stochastic optimization character

In computer science, evolutionary computation is a family of algorithms for global optimization inspired by biological evolution, and the subfield of artificial intelligence and soft computing studying these algorithms. In technical terms, they are a family of population-based trial and error problem solvers with a metaheuristic or stochastic optimization character.

Neuromorphic computing is an approach to computing that is inspired by the structure and function of the human brain. A neuromorphic computer/chip is any device that uses physical artificial neurons to do computations. In recent times, the term neuromorphic has been used to describe analog, digital, mixed-mode analog/digital VLSI, and software systems that implement models of neural systems. The implementation of neuromorphic computing on the hardware level can be realized by oxide-based memristors, spintronic memories, threshold switches, transistors, among others. Training software-based neuromorphic systems of spiking neural networks can be achieved using error backpropagation, e.g., using Python based frameworks such as snnTorch, or using canonical learning rules from the biological learning literature, e.g., using BindsNet.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

The expression computational intelligence (CI) usually refers to the ability of a computer to learn a specific task from data or experimental observation. Even though it is commonly considered a synonym of soft computing, there is still no commonly accepted definition of computational intelligence.

Demosaicing, also known as color reconstruction, is a digital image processing algorithm used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA) such as a Bayer filter. It is also known as CFA interpolation or debayering.

Honeywell, Inc. v. Sperry Rand Corp., et al., 180 U.S.P.Q. 673, was a landmark U.S. federal court case that in October 1973 invalidated the 1964 patent for the ENIAC, the world's first general-purpose electronic digital computer. The decision held, in part, the following: 1. that the ENIAC inventors had derived the subject matter of the electronic digital computer from the Atanasoff–Berry computer (ABC), prototyped in 1939 by John Atanasoff and Clifford Berry, 2. that Atanasoff should have legal recognition as the inventor of the first electronic digital computer and 3. that the invention of the electronic digital computer ought to be placed in the public domain.

<span class="mw-page-title-main">Les Hatton</span>

Les Hatton is a British-born computer scientist and mathematician most notable for his work on failures and vulnerabilities in software controlled systems.

The following outline is provided as an overview of and topical guide to forensic science:

Object recognition – technology in the field of computer vision for finding and identifying objects in an image or video sequence. Humans recognize a multitude of objects in images with little effort, despite the fact that the image of the objects may vary somewhat in different view points, in many different sizes and scales or even when they are translated or rotated. Objects can even be recognized when they are partially obstructed from view. This task is still a challenge for computer vision systems. Many approaches to the task have been implemented over multiple decades.

Informatics is the study of computational systems. According to the ACM Europe Council and Informatics Europe, informatics is synonymous with computer science and computing as a profession, in which the central notion is transformation of information. In some cases, the term "informatics" may also be used with different meanings, e.g. in the context of social computing, or in context of library science.

<span class="mw-page-title-main">Sargur Srihari</span> Indian academic (1949–2022)

Sargur Narasimhamurthy Srihari was an Indian and American computer scientist and educator who made contributions to the field of pattern recognition. The principal impact of his work has been in handwritten address reading systems and in computer forensics. He was a SUNY Distinguished Professor in the School of Engineering and Applied Sciences at the University at Buffalo, Buffalo, New York, USA.

<span class="mw-page-title-main">MNIST database</span> Database of handwritten digits

The MNIST database is a large database of handwritten digits that is commonly used for training various image processing systems. The database is also widely used for training and testing in the field of machine learning. It was created by "re-mixing" the samples from NIST's original datasets. The creators felt that since NIST's training dataset was taken from American Census Bureau employees, while the testing dataset was taken from American high school students, it was not well-suited for machine learning experiments. Furthermore, the black and white images from NIST were normalized to fit into a 28x28 pixel bounding box and anti-aliased, which introduced grayscale levels.

<span class="mw-page-title-main">René Vidal</span> Chilean computer scientist (born 1974)

René Vidal is a Chilean electrical engineer and computer scientist who is known for his research in machine learning, computer vision, medical image computing, robotics, and control theory. He is the Herschel L. Seder Professor of the Johns Hopkins Department of Biomedical Engineering, and the founding director of the Mathematical Institute for Data Science (MINDS).

Dynamic texture is the texture with motion which can be found in videos of sea-waves, fire, smoke, wavy trees, etc. Dynamic texture has a spatially repetitive pattern with time-varying visual pattern. Modeling and analyzing dynamic texture is a topic of images processing and pattern recognition in computer vision.

Soft computing is an umbrella term used to describe types of algorithms that produce approximate solutions to unsolvable high-level problems in computer science. Typically, traditional hard-computing algorithms heavily rely on concrete data and mathematical models to produce solutions to problems. Soft computing was coined in the late 20th century. During this period, revolutionary research in three fields greatly impacted soft computing. Fuzzy logic is a computational paradigm that entertains the uncertainties in data by using levels of truth rather than rigid 0s and 1s in binary. Next, neural networks which are computational models influenced by human brain functions. Finally, evolutionary computation is a term to describe groups of algorithm that mimic natural processes such as evolution and natural selection.

Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.

<span class="mw-page-title-main">IoT forensics</span> Branch of digital forensics

IoT forensics is a branch of digital forensics that has the goal of identifying and extracting digital information from devices belonging to the Internet of things field, using a forensically sound and legally acceptable process.

<span class="mw-page-title-main">Dmitri Maslov</span> Computer scientist

Dmitri Maslov is a Canadian-American computer scientist known for his work on quantum circuit synthesis and optimization, quantum advantage, and benchmarking quantum computers. Currently, he is the Chief Software Architect at IBM Quantum. Maslov was formerly a program director for Quantum Information Science at the National Science Foundation. He was named a Fellow of the Institute of Electrical and Electronics Engineers in 2021 "for contributions to quantum circuit synthesis and optimization, and compiling for quantum computers."

Nikola Kirilov Kasabov also known as Nikola Kirilov Kassabov is a Bulgarian and New Zealand computer scientist, academic and author. He is a professor emeritus of Knowledge Engineering at Auckland University of Technology, Founding Director of the Knowledge Engineering and Discovery Research Institute (KEDRI), George Moore Chair of Data Analytics at Ulster University, as well as visiting professor at both the Institute for Information and Communication Technologies (IICT) at the Bulgarian Academy of Sciences and Dalian University in China. He is also the Founder and Director of Knowledge Engineering Consulting.

References

  1. S. N. Srihari, "Beyond CSI: The Rise of Computational Forensics", IEEE Spectrum Archived 2016-09-10 at the Wayback Machine , pp. 38-43, December 2010.
  2. Computational Forensics Project - Automated Reconstruction of Human Faces (Archival page 6/2002 )
  3. Wong, J.L.; Kirovski, D.; Potkonjak, M. (2004). "Computational forensic techniques for intellectual property protection". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 23 (6): 987–994. CiteSeerX   10.1.1.196.2803 . doi:10.1109/TCAD.2004.828122. S2CID   2971347. DIO 10.1109/TCAD.2004.828122
  4. Propelled Into Computational Forensics by 9/11, NCBI Preps QA Software to ID Katrina Victims (November 28, 2005)
  5. Franke, Katrin; Srihari, Sargur (2007). "Computational Forensics: Towards Hybrid-Intelligent Crime Investigation". Third International Symposium on Information Assurance and Security. pp. 383–386. doi:10.1109/IAS.2007.84. ISBN   978-0-7695-2876-2. S2CID   5702875.
  6. Book Announcement: Statistical DNA Forensics: Theory, Methods and Computation (January 2008), Researchandmarkets.com
  7. YiZhen Huang & YangJing Long (2008). "Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model" (PDF). Proc. IEEE Conference on Computer Vision and Pattern Recognition: 1–8. Archived from the original (PDF) on 2010-06-17.
  8. Hofer, Inga (1 January 2007). "The Rise of Courtroom Technology and its Effect on the Federal Rules of E vidence and the Federal Rules of Civil Procedure". Michigan State University College of Law. Retrieved 7 January 2018.
  9. Marcotte, Paul (1989). "Animated Evidence - Delta 191 Crash Re-Created through Computer Simulations at Trial". ABA Journal. 75. Retrieved 7 January 2018.
  10. Pinsky, Mark I. (17 December 1993). "Jury Out on High-Tech Courtroom : Computer animation, televised testimony and other innovations could streamline the justice system. But they also raise fairness questions and worries about abuse". L.A. Times. Retrieved 7 January 2018.
  11. "Reconstruction of Scene by Forensic Animation Two Case Reports" (PDF). J Indian Acad Forensic Med.Vol. 36, No. 1. January 2014. Retrieved 24 June 2014.
  12. Tench, Stephen; Fry, Hannah; Gill, Paul (2016). "Spatio-temporal patterns of IED usage by the Provisional Irish Republican Army" (PDF). European Journal of Applied Mathematics. 27 (3): 377–402. doi:10.1017/S0956792515000686. ISSN   0956-7925. S2CID   53692006.