Strategic, Tactical, and Administrative Crime Analysis Coursework

Exclusively available on Available only on IvyPanda® Made by Human No AI

Since time immemorial, varied disciplines and institutions have been engaged in investigations about the origins and causes of crime. In the process, different factors have been highlighted which have great influence on the type and frequency of crimes in different places. There are different types of crime analysis which help the administrative personnel to plan on preventing and suppressing criminal activities. Some of these, crime analysis include; tactical, strategic, and administrative crime analysis. This paper will seek to answer various relevant questions related to tactical crime analysis (Douglas, 2003).

After reviewing the incident summary from the crimes which occurred in; convenient store in South State Street, Gas-N-Go on corner of State and Main Streets, and Donut Shop on South State Street. It’s evident that, a tactical crime analysis is being performed from the information derived from the three different incidents. The crime analysis is tactical in nature since is carried on immediate crimes which is aimed at providing a quick response. The analysis of the criminal offenses is aimed at providing credible information which can be used by administrative and operational personnel in identification and arrest of the criminals (Paulsen, 2009).

After reviewing the trends of the crimes in the three different situations; the operational personnel are able to identify crime patterns and trends. In addition, the tactical information is helping in linking the offenders in the three incidents that is likely to provide precise and effective leads in investigation. In the case of tactical crime analysis, the information gathered is likely to lead to help in arrest of the criminals, clear the cases alongside solving crimes (Egger, 1997).

From information gathered on the three instances, it’s evident that those crimes were a series of operations. This is strongly supported by the similarities of the there operations and the sequence in which they occur. Firstly, the time of the operations is depicted to be in series; where one is at 2.00 Am, 1.30 Am, and 11.58 Pm. This is a clear evidence that the criminals are the same and definitely strategizing on there consequent operations. Secondly, the mode of dressing is also closely related in the three different operations thus raising controversies. It is noted that, the criminals in the first operation at Convenient Store on South State Street; are in similar dressing with the criminals in the second instance (Paulsen, 2009).

A point worth noting is that, the mode of action of the criminals in the different operations is similar. Though, there is a problem in identifying their accent; the language used in communication is similar. The instructions given by the criminals to the clerks are similar thus making the type of operation to be series. Additionally, the vehicles used by the criminals are closely correlated thus raising questions about the relation of the three instances (Douglas, 2003).

The information retrieved from the third instance is very vital in identifying the criminals. First, one of the criminals is heard yelling “Nemo keep it running”. The word Nemo is a name of a person and can be very useful in deriving viable information about the criminals. Further, the clerk was very conscious and identified a large spider tattoo in the right leg of one of the criminals. This information about the name of one of the criminals and the tattoo is a credible clue that can help in cracking down the criminals. On the other hand, its very possible for the operational personnel to identify the criminals by examining their finger prints from all the objects their touched in the instance of the crimes (Egger, 1997).

Generally, the modus operandi in all the three instances remained consisted in despite some few differences. First, the mode of dressing is consisted whereby all the criminals wore masks. This helped to hide their identity throughout their operations. Secondly, it is evident that, the criminals used vehicles with temporary number plates and moved at high speed at all times. Another similarity in their modus operandi is on the nature of language used, at all times they instructed the clerk not top do something stupid or get injured (Douglas, 2003).

On the other hand, the modus operandi differed at some instances in the three operations. In the first instance and second instance it is revealed that, the two criminals acted in the process of seizing the cartons of Marlboro cigarettes while in the third instance only one criminal participated. Another difference in their modus operandi is noted in the conduct of the criminals, it’s noted that in the first and second instance; the criminals were very minimal in speech unlike in the third instance where they communicated widely (Paulsen, 2009).

From the information derived from the series of operations in the three different instances, it’s possible to apprehend the criminals. Particularly, the clues and information gathered regarding the criminals can be effectively used it cracking down the criminals. An efficient and competent investigative team should be established which should utilize the clues and information about the criminals to arrest them (Egger, 1997).

In sum, crime analysis is very essential in laying down efficient and effective strategies that can be adopted in preventing and suppressing crimes. In addition, tactical analysis of crime is one of the best ways of dealing with present crimes and help in apprehending all criminals thus solving the issue of crime.

Works cited

Paulsen, Derek, Bair, Sean & Helms, Dan. “Tactical Crime Analysis: Research and Investigation”. London: CRC Press. (2009): 124-210.

Egger, Steven. “The Killers Among Us: An Examination of Serial Murder and Its Investigation”. New York: Prentice Hall. (1997): 57-96.

Douglas, John. & Olshaker, Mark. “Mind Hunter: Inside the FBI’s Elite Serial Crime Unit”. London: Pocket Books Press (2003): 297- 345.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 17). Strategic, Tactical, and Administrative Crime Analysis. https://ivypanda.com/essays/strategic-tactical-and-administrative-crime-analysis/

Work Cited

"Strategic, Tactical, and Administrative Crime Analysis." IvyPanda, 17 Mar. 2022, ivypanda.com/essays/strategic-tactical-and-administrative-crime-analysis/.

References

IvyPanda. (2022) 'Strategic, Tactical, and Administrative Crime Analysis'. 17 March.

References

IvyPanda. 2022. "Strategic, Tactical, and Administrative Crime Analysis." March 17, 2022. https://ivypanda.com/essays/strategic-tactical-and-administrative-crime-analysis/.

1. IvyPanda. "Strategic, Tactical, and Administrative Crime Analysis." March 17, 2022. https://ivypanda.com/essays/strategic-tactical-and-administrative-crime-analysis/.


Bibliography


IvyPanda. "Strategic, Tactical, and Administrative Crime Analysis." March 17, 2022. https://ivypanda.com/essays/strategic-tactical-and-administrative-crime-analysis/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1