+ All Categories
Home > Documents > Theft and banditry - Latest News in Geospatial and Space...

Theft and banditry - Latest News in Geospatial and Space...

Date post: 29-Mar-2018
Category:
Upload: phamnhu
View: 212 times
Download: 0 times
Share this document with a friend
110
UNIVERSITY OF NAIROBI USE OF GIS AND GPS TECHNOLOGIES ON CRIME HOTSPOT ANALYSIS AND CCTV SITE RATIONALIZATION A CASE STUDY OF NAIROBI CBD AND ITS ENVIRONS By KOECH CHERUIYOT PETER F19/2566/2008 A project report submitted to the Department of Geospatial and Space Technology in partial fulfillment of the requirements for the award of the degree of: Bachelor of Science in Geospatial Engineering 1
Transcript
Page 1: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

UNIVERSITY OF NAIROBI

USE OF GIS AND GPS TECHNOLOGIES ON CRIME HOTSPOT ANALYSIS AND CCTV SITE

RATIONALIZATION

A CASE STUDY OF NAIROBI CBD AND ITS

ENVIRONS

By

KOECH CHERUIYOT PETER

F19/2566/2008

A project report submitted to the Department of Geospatial and Space Technology in partial fulfillment of the requirements for the award of the degree of:

Bachelor of Science in Geospatial Engineering

1

Page 2: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

APRIL 2013

Abstract

Crime is increasingly becoming one of the greatest challenges to Kenya as a nation with many wondering what mitigation measures can be implemented. It has a serious impact on development both socially and economically. Most of these have been attributed to the fact that Kenya’s population is increasing drastically with overwhelming rates consequently calling for more reactive policies. It is therefore a high time that the governmental agencies especially internal security embraces proactive law enforcement policies that tend to be more technology based in order to supplement on other resources. For example the International Standards recommend one policeman to serve one hundred and fifty people but Kenya has not yet attained that standard.

Although the crime incidences appear to be random and their patterns varied there is a spatio-temporal aspect to them. Geographic Information System can be a very useful tool to substitute on the manual handling and analysis of the criminal activities. It is unfortunate that most organizations handling crime have not yet given priority to this approach and still appear totally unaware of the advantages of GIS databases as opposed to traditional ways of record keeping.

In this area of study, the spatial distribution of crime hotspots has been derived from the crime and incidence reports files kept at the Nairobi Central Police station between August 2010 and September 2011.Thematic maps were used to show the high crime areas and dot maps were used to show the particular hotspots. Time series maps were then displayed to show the variation or the pattern of those hotspots over time. Statistical analysis in terms of type of most committed crime, time of attack and the frequency of occurrence were also considered and displayed using graphs.

It would be incomplete as a geospatial engineer to determine the hotspots without trying to propose a solution on how to control and monitor those crimes. The use of closed circuit televisions (CCTV) would assist the security personnel especially the police in on-screen crime detection and with effective communication would direct their agents to those particular spots. The CCTV sites were strategically located to ensure maximum coverage during surveillance.

The study concludes that GIS is one of the most effective ways of identifying the hotspots, analyzing them and visualizing the crime patterns over time and space. Adoption of this technology would lead to better management and allocation of the appropriate resources especially in law enforcement.

2

Page 3: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Dedication

To all my family members who have always done everything to give their best in any way for the betterment and success in whatever academic aspiration I would like to achieve.

3

Page 4: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Acknowledgements

First and foremost I would like to thank Almighty God for having given me good health not only during the time of this project but also for the entire time of my studies.

Secondly I would like to thank the following people for their invaluable contribution towards the accomplishment of this study.

Much gratitude goes to my project supervisor, Mrs. Tabitha Njoroge for her guidance and encouragements that saw me through to the completion of this project.

I am also much indebted to my parents Mr. and Mrs. Chirchir who were much more than willing to provide everything they could right from the time of data collection to the completion of the project.

The laboratory technicians Mr. Mwandongo, Mr. Oyugi and also Mrs. Mary Gwena who advised and assisted me to get the necessary materials for the project.

The OCPD of Nairobi Central Division, Mr. Robinson Mboloi , Director of Operations Mr. Sang From Nairobi Police Provincial Headquarters who were ever willing to assist me in acquiring the necessary crime and incidence reports that were basically the pillars of this project.

Finally to my friends Gideon Sigei, Joshua Kibet, Joseph Ndana and Beatrice Atieno for their numerous contributions towards the success of the project.

4

Page 5: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Table of Contents

Page Title Page………………………………………………………….…………………….i Abstract………………………………………………………........................................iiDedication……………………………………………………………………………....iii

Acknowledgement……………………………………………………………………...iv

Table of Contents………………………………………………………………….........v

List of Tables……………………………………………………………………….......viii

List of Figures……………………………………………..…………………………….ix

List of abbreviations……………………………………………………………………..x

CHAPTER ONE: INTRODUCTION

1.1 Background……………………………………………………………… ...1

1.2 Problem Statement……………………………………………………….....1

1.3 Objectives of Study…………………………… ………………………....2

1.4 Scope of Study……………………………………………………………...3

1.5 Organization of the Report……………………………………………….....3

CHAPTER TWO: LITERATURE REVIEW

2.1 Definition of crime..........................................................................................4

2.1.1 Classification of Criminal Activities……………………………...4

2.2 Crime in Kenya……………………………………………………………...5

2.3 Crime in Nairobi………………………………………………………….....7

2.4 Management of Information on Criminal Activities………………………..9

2.5 Use of Geographic Information Systems in Monitoring Crime…………....10

2.6 Components of GIS Technology…………………………………………..10

2.7 GIS Techniques and Technology…………………………………………..12

5

Page 6: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

2.8 Identifying Crime Hotspots…………………………………………………13

2.8.1 Hotspot Categories……………………………………………….13

2.9 Crime Analysis……………………………………………………………..14

2.10 Geostatistical Crime Analysis…………………………………………….14

2.10.1 Use of Morans I in Crimestat…………………………………...15

2.10.2 G-Statistic for Measuring High or Low Clustering……………..15

2.11 GPS Intervention on Crime Mapping……………………………………..16

2.12 Application of GPS to Crime Activities…………………………………..17

2.13 CCTV Surveillance Systems……………………………………………....18

2.14 Application of CCTVs in Kenya…………………………………………..20

2.15 CCTV Rationalization…………………………………………………….21

CHAPTER THREE: METHODOLOGY

3.1 Study Area…………………………………………………………………..22

3.2 Data Collection……………………………………………………………...23

3.2.1 Data Identification Process………………………………………..24

3.2.2 Attribute Data Entry……………………………………………....24

3.2.3 Geographic Data Acquisition……………………………………..25

3.2.4 GPS Receiver Operation……………………………………….....26

3.3 Geocoding the Map…………………………………………………………28

3.4 Database Creation…………………………………………………………..28

3.5 Georeferencing……………………………………………………………...30

3.6 Map Digitization Process…………………………………………………...32

3.7 GIS Database Query………………………………………………………..33

3.8 Cartographic display and visualization…………………………….……….34

6

Page 7: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

3.8.1 Thematic Mapping…………………………………………….....34

3.8.2 Graduated Maps………………………………………………….34

3.9 CCTV Site Selections……………………………………………………...35

CHAPTER FOUR: DATA ANALYSIS

4.0 Results and Analysis……………………………………………………….36

4.1. Generation of Crime Distribution Maps…………………………………..37

4.2 Crime Statistical Analysis by Other Attributes………………………….....44

CHAPTER FIVE: CONCLUSION AND RECOMMENDATIONS

5.1Conclusions………………………………………………………………...51

5.2 Recommendations………………………………………………………….53

References……………………………………………………………………………...54

Appendices……………………………………………………………………………..58

7

Page 8: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

List of Tables

Table1 Datasets and their Sources………………………………………………….….24

Table 2 Tabulated Crime Data…………………………………………………………25

Table 3 Geographic Data Entry………………………………………………………...26

Table 4 Coordinates of Georeferencing………………………………………………..31

Table 5 Tools and Software Used……………………………………………………...32

8

Page 9: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

List of Figures

Fig 2.1GPS Data Acquisition Model………………..……………………………..….16

Fig 2.2 Super Shock Proof Armored Ruggedized High Speed 1/4" Sony CCTV..……19

Fig 2.3 Sony 1/4" EX-View 6" High Speed CCTV camera…………………………...20

Fig2.4 Rotating CCTV cameras………………………………………………………..21

Fig 3.1 Map of Nairobi Area……………………………………………………….......22

Fig 3.2 Data Collection Workflow……………………………………………………..27

Fig 3.4 Data Extraction and Verification……………………………………………....32

Fig 3.5.2 Georeferencing Procedure…………………………………………………...33

Fig 3.6 Adding Attributes to Shape files…………………………………………........36

Fig 4.1.1 Crime Hotspots Map………………………………………………………...40

Fig 4.1.2 Hotspots Buffers At 55metres………………………………………….……41

Fig4.1.3 Buffered Hotspots at 60metres………………………………………….…....42

4.1.4 Proposed CCTV Sites………………………………………………………........43

Fig 4.1.5 Crime Hotspots and Related CCTV Sites……………………………….......44

Fig 4.1.6 Graduated Crime Hotspots…………………………..…………………........45

Fig4.1.7 Buffered CCTV Sites…………………………………………………….......46

Fig 4.2.1 Crime Rates Per Months of the Years…………………………………..…...47

Fig 4.22 Crime Incidences from January to March………………………………..…..48

Fig 4.2.3 Crime Incidences from April to June…………………………………..…....49

Fig 4.2.4 Crime Incidences from July to September……………………………...…..50

Fig4.2.5 Crime Incidences by Gender by Months of the Year………………….….....51

Fig 4.2.6 Crime Incidences at the Place of Occurrence………………………….…...52

9

Page 10: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

List of Abbreviations

CCTV: Closed Circuit Television

CBD: Central Business District

OCPD: Officer Commanding Police Station

NPPH: Nairobi Province Police Headquarters

GIS: Geographic Information Systems

GPS: Global Positioning Systems

UN: United Nations

MAPS: Mapping Analysis for Public Safety

CAD: Computer Aided Design

MAUP: Modified Aerial Unit Problem

VCA: Video Content Analysis

FOV: Field of View.

RDBMS: Relational Database Management Systems

SQL: Standard Query Language

10

Page 11: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

CHAPTER ONE

1.0 INTRODUCTION

1.1 Background

Crime is present not only in the majority of societies of one particular species but in all societies

of all types. There is no society that is not confronted with the problem of criminality. Its forms

changes; the acts thus characterized are not the same everywhere but always they have been

observed in such a way as to draw themselves penal repression. If in proportion as societies pass

from lower to higher types, the rate of criminality i.e. the relation between the annual number of

crimes and the population tended to decline, it might be believed that crime while still normal, is

tending to lose this character of normality. However there is no reason to believe that such a

regression is substantiated.

Since time immemorial statistics enable us to follow the cause of criminality. It has increased

everywhere globally. There is no phenomenon that represents indisputably all the symptoms of

normality, since it appears closely connected to conditions of all collective life. To make of

crime a form of social morbidity, would be to admit that morbidity is not something accidental

but on the contrary, that in certain cases it grows out of fundamental constitution of the living

organism.

Currently advanced as well as developing countries have a growing problem of crime and

delinquency (Reckless C, 1973). The magnitude of the problem is registered in increased public

concern about the safety of individuals and property, the current escalation of offenses which

manage to escape detection in a fluid world, the growing willingness of victims observers to

report criminal deeds to the police, owing to the development of communication technology, the

state of greater police coverage in every state and even attention given to criminal activities by

the news media.

1.2 Problem Statement

11

Page 12: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Crime in Kenya especially in cities and big towns has been on the rise. It is perceived to be as a

result of the fast urbanization progress in not only in Kenya but Africa as a continent. Crime is

associated with high economic costs, sociological costs and psychological effects. With this

increase of crime, it is a high time that the department of internal security should incorporate

modern ways of crime monitoring which calls for the use of Geographic Information Systems

and increase surveillance using the closed circuit television in addition to historical patrolling

and manning of the streets. With the alarming population growth rate in Kenya, it is a challenge

to assign a policeman to every street. On the other hand crime surveillance devices and

monitoring of the same can be done at a central monitoring unit.

Nairobi metropolitan has a population of about four million people with a higher concentration in

the informal settlements and slums. With a high rate of poverty and unemployment, these places

have turned out to be a beehive of activities, whereby individuals are trying to make ends meet

by whatever means consequently compromising on security. Due to the overwhelming

population growth, crime management capacity tends to be overcome unproportionally. It is a

high time we realized the need of technological measures such as GIS and GPS to minimize the

traditional system of manual maintenance of crime records which is no longer adequate in

addressing the current resolution needs. In addition to that, it is not only enough to identify the

crime hot spots but also to keep analyzing the trends and patterns of those activities in time and

space.

1.3 Objectives of the Study

The objectives of this study are as follows:

Main Objectives

i. To identify the major crime prone areas or the crime hotspots in Nairobi CBD and the

environs.

ii. To identify the optimum sites for CCTV installation.

Specific Objective

i. To analyze the crime pattern trend based on spatial-temporal variables.

12

Page 13: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

1.4 Scope of Study

Nairobi is the most populous city in East Africa, with a current estimated population of about 4

million. According to the 2009 Census, in the administrative area of Nairobi, 3,138,295

inhabitants lived within 696 km2 (269 sq mi). Nairobi is currently the 12th largest city in Africa,

including the population of its suburbs. The study focuses mainly on the Nairobi Central

Business District and the immediate environs particularly towards the areas of Ngara, Kamkunji

and Muthurwa. Since crime is a broad aspect covering various vices, for this particular study the

data collected was basically from reported cases in the city. The data was acquired from Central

Police Division for the period between June 2010 and December 2012. The data contents include

the type of crime, time of the day, the month, identity of the victim or perpetrator and the

location of committed crime.

1.5 Organization of the Report

Chapter 1-Provides the background information on crime in the study area, problem statement,

objectives and the scope of study.

Chapter 2-Gives a general overview on Crime, GIS, GPS, CCTV and the use of GIS in crime

mapping and analysis.

Chapter 3-Gives the methodology or the steps followed in the data collection, preparation,

editing, verification and database creation.

Chapter 4-Deals with the actual manipulation of data to give results and also their visual displays

which enable the analysis of the same.

Chapter 5-Statement of the conclusions and recommendations.

13

Page 14: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

CHAPTER TWO

2.0 LITERATURE REVIEW

2.1 Definition of Crime

Crimes are acts that are against the law. A crime is any act or omission prohibited by the law for

the protection of the public and made punishable by state in a judicial proceeding in its own

name. It is a public wrong as distinguished from a mere private wrong or civil injury to an

individual (Marshall L, 1999). There are many different types of crimes, from crimes against

persons to victimless crimes, violent crimes to white collar crimes.

2.1.1 Classification of crime

Crimes against Persons

Crimes against persons, also called personal crimes, include murder, aggravated assault, rape,

and robbery. Personal crimes are unevenly distributed in not only Kenya but also the rest of the

world, with young, urban, poor committing these crimes more than others. (United Nations

Report 2007).

Crimes against Property

Property crimes involve theft of property without bodily harm, such as burglary, larceny, auto theft, and

arson. Like personal crimes, young, urban, poor, and alien minorities generally commit these crimes more

than others.

Crimes against Morality

Crimes against morality are also called victimless crimes because there is no complainant, or

victim. Prostitution, illegal gambling, and illegal drug use are all examples of victimless crimes.

14

Page 15: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

White-Collar Crime

White-collar crimes are crimes that are committed by people of high social status who commit

these crimes in the context of their occupation. Examples of such crimes are the pyramid

schemes of 2006 and the Anglo-Leasing which cost the individuals and the country billions of

money. This includes embezzling (stealing money from one’s employer), insider trading, and

tax evasion and other violations of income tax laws.

White-collar crimes generally generate less concern in the public mind than other types of crime,

however in terms of economic effect; white-collar crimes are even more consequential for the

society. Nonetheless, these crimes are generally the least investigated and least prosecuted.

Organized Crime

Organized crime is crime committed by structured groups typically involving the distribution of

illegal goods and services to others. The term can refer to any group that exercises control over

large illegal enterprises such as the drug trade, illegal gambling, prostitution, weapons

smuggling, or money laundering.

A key sociological concept in the study of organized crime is that these industries are organized

along the same lines as legitimate businesses and take on a corporate form. There are typically

senior partners who control the business’ profits, workers who manage and work for the

business, and clients who buy the goods and services that the organization provides.

2.2 Crime in Kenya

The most common serious crime in urban Kenya is carjacking in order to commit an armed

robbery. In early 2007, foreign citizens were killed and one critically injured in two separate

carjacking incidents. Nairobi averages about ten vehicle hijackings per day, while Kenyan

15

Page 16: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

authorities have limited capacity to deter or investigate such acts. Public service vehicles tend to

be targeted since they carry up to 14 passengers or more especially in the evenings. Although

these attacks are often violent, victims are generally not injured if they do not resist (Gimode, E

A. 2001). However, victims are sometimes tied up and put in the back seat or trunk of their own

car. Criminals who commit these crimes will not hesitate to shoot a victim who is the least bit

uncooperative or who may appear to hesitate before complying with their assailant.

Theft and banditry

Pickpockets and thieves carry out "snatch and run" crimes on city streets and near crowds

(Google, Inc. 2013).There have been reports of safes being stolen from hotel rooms and hotel

desk staff being forced to open safes. Thieves routinely snatch jewelry and other objects from

open vehicle windows while motorists are either stopped at traffic lights or in heavy traffic.

Thieves on matatus, buses and trains may steal valuables from inattentive passengers. Many

scams, perpetrated against unsuspecting tourists, are prevalent in and around the city of Nairobi.

Many of these involve people impersonating police officers and using fake police ID badges and

other credentials. Nevertheless, police checkpoints are common in Kenya and all vehicles are

required to stop if directed to do so. There has been an increase in armed banditry in or near

many of Kenya’s national parks and game reserves, particularly the Samburu, Leshaba, and

Maasai Mara game reserves. In response, the Kenya Wildlife Service and police have taken

some steps to strengthen security in the affected areas, but the problem has not been eliminated.

Travelers who do not use the services of reputable travel firms or knowledgeable guides or

drivers are especially at risk.

Political crime

Kenya is generally a peaceful and friendly country in its political activism, it is nonetheless

common during elections, referendums and other political votes for campaign violence to occur

around the country, and ethnic clashes account for much of Kenya's problems. On 29th

December 2007, the day after Kenya’s National Parliamentary and presidential elections,

violence erupted in major cities cross Kenya, including Nairobi, Mombasa, and Kisumu. Political

instability throughout Kenya was reported, which resulted in the deaths of over 600 Kenyans.

16

Page 17: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Kenya was ranked 150th out of 179 countries for corruption in the year 2007. (Corruption

Perceptions Index 2007). On a scale of 0 to 10, with 0 the most corrupt and 10 the most

transparent, Transparency International rated Kenya 2.1.

Terrorism

At the urging of the Al-Shabaab militant group, a significant and increasing number of terrorist

attacks in Kenya have been carried out by local Kenyans, many of whom are recent converts to

the unpopular cult. Estimates in 2012 placed the figure of Kenyan fighters at around 10% of Al-

Shabaab's total forces (Google, inc. 2013). Referred to as the "Kenyan Mujahideen" by Al-

Shabaab's core members, the converts are typically young, overzealous with poverty making

them easier targets for the outfit's recruitment activities. Because the Kenyan insurgents have a

different profile from the Somali and Arab militants that allows them to blend in with the general

population of Kenya, they are also often harder to track. The mastermind the Kampala bombings

who now cooperates with the Kenyan police believes that in doing so, the group is essentially

trying to use local Kenyans to do its "dirty work" for it while its core members escape unscathed.

According to diplomats, Islamic areas in coastal Kenya and Tanzania, such as Mombasa and

Zanzibar, are also especially vulnerable for recruitment.

Drug abuse

Drug abuse has become a major issue in Kenya, especially in Mombasa which is affected by this

issue more than any other part of the country. Young men in their early 20s have been the most

affected demographically. Women in Mombasa have held public protests, asking the government

to move quickly to arrest young people using narcotics. Bhang smoking has until recently been

the drug of choice, but heroin injection is becoming increasingly popular. Seventy percent of

drug abusers have admitted that they are using heroin. In addition to drug abuse, the trafficking

of illegal drugs in the country has become a major issue as well. An estimated 100 million

dollars' worth is trafficked within the country each year.

2.3 Crime in Nairobi

17

Page 18: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

According to the UN Habitat report 2007 on crime in Nairobi, the following observations were

made. The most common causes of crime given were identified by respondents as unemployment

and poverty, although general idleness and the quick rewards that crime brings were also noted.

A very small minority mentioned the increase in foreigners as the major cause of crime. Just over

half of the all the residents of Nairobi worry about crime all the time, whilst a further one-third

thinks of it sometimes. There was very little difference between men and women and across

different age cohorts. Generally, people think that most crimes are caused by people within their

neighborhood. About 75% of all respondents feel unsafe in their homes during the night and

more than half feel unsafe during the day. Just under half consider that they live under siege and

would avoid going out during the day unless it was absolutely necessary, whilst just under three-

quarters feel the same about travelling and working after dark. The vast majority of residents

would not go into the City Centre during the evening at all.

Nearly two-thirds of all respondents’ link crime to the fact that they felt that during the past year

the number of illegal firearms had increased. The vast majority of these respondents felt that

these increases were due to smuggling from Somalia. To substantiate their claims a little over

half of all the residents of Nairobi claim to regularly hear gunshots. Only a tiny fraction of all

respondents admitted that occasionally they carried a firearm, but ten acknowledge knowing a

friend that owns a firearm. Most disturbing was the fact that one-third of all Nairobi’s residents

would own a firearm if they had the opportunity to acquire one.

On the police force, half of all respondents argue that although the terms of service and

conditions of the police force are consistently reviewed by Government, efficiency levels of

police service had worsened during the past few years. The overwhelming majority of

respondents suggest that the police institution is one of the major casualties of bribery at the

individual level, attributing one in three crimes either directly or indirectly to police officers.

Nearly two-thirds of all respondents argued for the need to set-up some form of assistance group

to help people who are victims of crime. Just over one-third felt that complementary measures

such as security guards or vigilante groups or simply setting up neighbourhood watches is

essential to enhance community policing in addressing crime, for the police alone were incapable

of dealing with crime.

18

Page 19: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

The issue of street children is an emotional one in Nairobi, and it is not uncommon to find

residents attributing a good proportion of crime to this group of Nairobi citizens (Gimode E. A,

2001). However, the portion of crime perceived to have occurred in the respondent’s

neighbourhoods bears very little resemblance to the kind of crime people think street children

commit elsewhere. Yet they feel that street children may become the criminals of the future.

Because of this, one-quarter of all respondents felt that the best solution to the problem of street

children was to forcibly remove them from the city. This however was balanced by the views of

the rest of the respondents who feel that positive interventions are possible and must be

attempted if the street children problem is to be solved.

Almost all the respondents felt that that bribery has assumed alarming levels of acceptability

among residents in Nairobi, with half admitting to having actively participated in some form of

behaviour that might be classified under the broad category of bribery. Furthermore, nearly one-

quarter of all residents felt that residents of the city are catalyzing the culture of bribery among

the police force, with just over 25% claiming to have in fact bribed a police officer during the

past year. While noting government efforts on the poverty reduction strategy, respondents

emphasized the creation of employment opportunities and policies to reduce poverty should take

precedence in government policy.

2.4 Management of Information on Criminal Activities

With the high rate of poverty and unemployment, Nairobi especially within informal settlements

has turned out to be a beehive of all activities with individuals trying to make the ends meet by

whatever means. Owing to its overwhelming population growth, crime management capacity

tends to be overcome unproportionally thus calling on for other mitigation measures such as

surveillance monitoring using CCTV which are strategically positioned. Traditional system of

record maintenance is no longer adequate in addressing the current resolution needs and is a high

time modern technology was embraced.

Since 1960, GIS has emerged a discipline on its own right. From its land use application in

Canada to all pervasive technologies used today in navigation, retail site location, risk

management, and military planning.GIS is ubiquitous in modern life. Reduction in computer

hardware and development of software enabled its use in crime pattern and trend analysis.

19

Page 20: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Computerization of police criminal records has come with a realization that this material can be

used for crime and intelligence analysis (Ratcliffe 2004).Early use of GIS on crime mapping had

geocoding and technical problems (Hirschfield et al 1995) unlike now. Much innovation on

crime mapping was driven in USA by Mapping Analysis for Public Safety (MAPS), which has

been the foundation of crime mapping in many countries e.g.UK, SA, Australia.

2.5 Use of GIS in Crime Mapping

Crime in any form is connoted to an inherent geographical or spatial quality which is of interest to a Geospatial Engineer (Alexander M, 1994). In turn this location could be of relative position to the

epicenter of crime perpetration.

In around 1970s,the realization that crime could not be solely understood and explained deeply by

exploring geographical components.New technology and techniques were needed to tackle these

challenges through critical identification of crime patterns and hotspots; exploration of environment and

crime including socio-economic variables. Thanks to GIS which is a more comprehensive tool not only

for this study but also other aspects.

Practical examples of GIS in crime mapping are as follows;

Analyzing the impact of crime-reduction activities.

Identifying the crime hotspots for targeting, deploying and allocating suitable responses.

Helping to understand the crime distribution through pattern analysis and other local data e.g.

demography.

Use of information for resource allocation by both public and police.

All the spatially related matters of crime are entered into records as geodatabases on which the GIS

analyst can perform data query consequently displaying the desired results. Information can then be

derived through time, dates, modus operandi, and crime type amongst others. Strategic decisions can then

be made, such as deployment of more security persons to high crime areas.

2.6 Components of GIS Technology

Geographic information system (GIS) is a system designed to capture, store, manipulate,

analyze, manage, and present all types of geographical data. (Mulaku, G. C 2013). In the

simplest terms, GIS is the merging of cartography, statistical analysis, and database technology. This

20

Page 21: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

system therefore requires computer hardware, software, and people in order to manage geospatial

databases.

A GIS can be thought of as a system which digitally creates and manipulates spatial areas that

may be jurisdictional, purpose, or application-oriented. Generally, a GIS is custom-designed for

an organization. Hence, a GIS developed for an application, jurisdiction, enterprise, or purpose

may not be necessarily interoperable or compatible with a GIS that has been developed for some

other application and purpose. What goes beyond a GIS is a spatial data infrastructure, a concept

that has no such restrictive boundaries. In a general sense, the term describes any information

system that integrates stores, edits, analyzes, shares, and displays geographic information for

informed decision making. GIS applications are tools that allow users to create interactive

queries, analyze spatial information, edit data in maps, and present the results of all these

operations. Below are the basic components of GIS.

a. Hardware

The basic items of hardware for GIS include the computer, printer, digitizer, keyboard,

mouse, monitor and external storage media. Others may include DVD writers, a scanner and a

modem for internet link. The choice of the hardware to install may depend on the type of

software requirement such as the computer’s RAM size and speed.

b. Software

These are the set of instructions written in formal programming languages which can be understood

by the programmer and the computer. The operating system is the chief coordinator of all the

instructions given to computer.GIS software enables the input of data through folder connections,

data management and manipulation through editing tools. It is also necessary to put protective

software like the antivirus.

c. GIS data

Data in a GIS environment is kept in a database and is managed by a database management system.

These data may include scanned maps which are used to construct shape files and their attributes.

Building a GIS database may take up to 70% of the total cost of setting up a GIS. (Arnoff, 1989).

d. Organizational Procedures

21

Page 22: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Includes the creation of awareness about GIS technology and how it will fit appropriately in

the overall operation of the organization in question. It generally includes development of

standards, access protocols, database administration, quality assurance and system security.

e. The people

These are the individuals who operate the system, use and also maintain the databases.

Normally in a large geospatial setup, the following personnel are required; GIS manager, GIS

analyst, GIS programmer among others.

2.7 GIS techniques and technology

Modern GIS technologies use digital information, for which various digitized data creation

methods are used. The most common method of data creation is digitization, where a hard copy

map or survey plan is transferred into a digital medium through the use of a CAD program, and

geo-referencing capabilities. With the wide availability of ortho-rectified imagery (from satellite

and aerial sources), heads-up digitizing is becoming the main avenue through which geographic

data is extracted which involves the tracing of geographic data directly on top of the aerial

imagery.

GIS uses spatial-temporal location as the key index variable for all other information. Just as a

relational database containing text or numbers can relate many different tables using common

key index variables, GIS can relate unrelated information by using location as the key index

variable. The key is the location and/or extent in space-time.

Any variable that can be located spatially, and increasingly also temporally, can be referenced

using a GIS. Locations or extents in earth space–time may be recorded as dates/times of

occurrence, and x, y, and z coordinates representing, longitude, latitude, and elevation,

respectively. Units applied to recorded temporal-spatial data can vary widely even when using

exactly the same data, but all earth-based spatial–temporal location and extent references should,

22

Page 23: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

ideally, be relatable to one another and ultimately to a "real" physical location or extent in space

and time.

Related by accurate spatial information, an incredible variety of real-world and projected past or

future data can be analyzed, interpreted and represented to facilitate education and decision

making. This key characteristic of GIS has begun to open new avenues of scientific inquiry into

behaviors and patterns of previously considered unrelated real-world information.

2.8 Identifying Crime Hotspots

In order to identify the crime hotspots we use a range of techniques which involve visualizing the

crime patterns in terms of location, size, shape, extent and the magnitudes of these hotspots.

There are more advanced technologies which can be used however they are not available in the

common GIS packages (Ratcliffe J, 2004).

A Crime hotspot is a geographical area of higher than average crime that is known for repetitive

crime concentration with respect to the whole or particular region of interest. As mentioned

earlier hotspots are clusters of varying magnitudes of activities. Knowing the exact locations of

these locations is an important step when figuring out why these areas record persistent crime

reports. The process of crime mapping is not a straight forward procedure and may be biased

during interpretation.GIS software capabilities on spatial data analysis becomes handy in

buffering the hotspots thereby allowing the picking of the exact hotspot with the assistance of

GPS.A good example of additional functionality is the Modifiable Aerial Unit Problem(MAUP),

the range of classes and parameters to set in map legend, designing of the map and visualization

aspect of spatial patterns and whether the crime data needs to be normalized against underlying

population.

2.8.1 Hotspot Categories

Spatial categories

i. Dispersed-A crime hotspot where events are distributed around the hotspot are e.g.

vehicles across a car park.

ii. Clustered- Crime spots surrounding a particular feature e.g. a bar.

23

Page 24: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

iii. Hotpoint-Repeated victimization at a certain location.

Temporal categories

i. Diffused –No discernible pattern to the time of occurrence.

ii. Focused-Characterized by block of time or peak hours e.g. between

10-11 p.m.

iii. Acute-Crime taking place at exact span of time e.g.12 O’clock midday.

2.9 Crime Analysis

Crime analysis is a law enforcement function that involves systematic analysis for identifying

and analyzing patterns and trends in crime and disorder. Information on patterns can help law

enforcement agencies deploy resources in a more effective manner, and assist detectives in

identifying and apprehending suspects. Crime analysis also plays a role in devising solutions to

crime problems, and formulating crime prevention strategies. Quantitative social science data

analysis methods are part of the crime analysis process; though qualitative methods such as

examining police report narratives also play a role.

Crime analysis can occur at various levels, including tactical, operational, and strategic. Crime

analysts study crime reports, arrests reports, and police calls for service to identify emerging

patterns, series, and trends as quickly as possible. They analyze these phenomena for all relevant

factors, sometimes predict or forecast future occurrences, and issue bulletins, reports, and alerts

to their agencies. They then work with their police agencies to develop effective strategies and

tactics to address crime and disorder. Other duties of crime analysts may include preparing

statistics, data queries, or maps on demand; analyzing beat and shift configurations; preparing

information for community or court presentations; answering questions from the public and the

press; and providing data and information support for a police department's Comp Stat process.

Sociodemographics, along with spatial and temporal information, are all aspects that crime

analysts look at to understand what's going on in their jurisdiction. Crime analysis employs data

mining, crime mapping, statistics, research methods, desktop publishing, charting, presentation

skills, critical thinking, and a solid understanding of criminal behavior. In this sense, a crime

24

Page 25: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

analyst serves as a combination of an information systems specialist, a statistician, a researcher, a

criminologist, a journalist, and a planner for a local police department.

2.10 Geostatistical Crime Analysis

Geostatistical methods of crime pattern analysis make use of samples picked over a wide area of

coverage and interpolate missing points to create a continuous surface. These sample points

could be measurements of some geographic phenomenon such as crime or epidemiology.

Deterministic method of interpolation uses purely mathematical models whereas geostatistical

interpolation technique uses both mathematical and statistical model in order to create

predictable surface events.

2.10.1 Use of Morans I in Crimestat

Morans I is a classic measure of global spatial dependence and can be applied to both polygons

and points which have attribute data attached to them (Chaney S, Ratcliffe J, 2004). One major

advantage of Morans I is that it allows the analyst to measure clustering in points meaning that

the process could determine the clustering of burglary or carjacking distribution even when both

are aggregated to the same set of polygons. Programs like Crimestat require each area to be to be

described as x and y coordinates and then gives the greatest influence to points that are located

closest to the location being tested.

2.10.2 G-Statistic for Measuring High or Low Clustering

The Morans I either global or local can only detect the presence of clustering of similar values. It

cannot tell whether the clustering is made of high or low values. This led to the use of G-statistic

which could separate clusters of high values from those of low (Getis and Ord 1992) .The

general G-statistic based on a specified distance d is defined as follows;

G(d)= ∑∑Wij(d)

∑∑ xixj,i≠j

Where xj=value of location i

25

Page 26: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Epoch

Receiver

Xj=value of j if j is within d of i and Wij(d)is the spatial weight. The weight can be based on

some weighted distance e.g. inverse distance

Expected value of G (d) is

E (G) = ∑∑Wij(d)

n(n−1) E (G) is typically small when n is large. A high G (d) value suggests a

clustering of high values and low G (d) clustering of low values.A z score can be computed for G

(d) to evaluate its statistical significance.

Similarly to Morans I, the local G-Statistic G (d) is often used as a tool for hotspot analysis. A

cluster of high positive z-scores suggests the presence of a cluster of high values or hotspot and

low z scores for a cold spot. G-statistic also allows the use of a distance threshold d, defined as

distance beyond which no discernible increase in clustering of high/low values exist.

2.11 GPS Intervention on Crime Mapping

The GPS or global positioning system is an electronic navigation device that makes use of

network of satellites found on earth’s orbit to locate specific positions and placements. Originally

created for military applications, the GPS was first used by the US department of defense. It is

during 1980’s when the US government allowed its public use.

Because it takes advantage of the satellite systems above the earth, GPS units can be used

anywhere in the world for 24hrs a day. It works in any whether condition and does not require

any subscription charge, GPS units come in a wide variety of specifications and are

manufactured by several companies.GPS units work by receiving information from GPS

satellites that revolve the earth in specific frequency. These satellites transmit information to the

earth through the GPS unit or receiver. Using triangulation to calculate and identify the exact

location of the user.

26

Page 27: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

GPS receivers also compute and compare the time when the signals were transmitted and

received, and such time difference also help in locating the user’s exact position. (Lange,

1992).GPS units feature a screen that serves as an electronic map where the user’s location is to

be shown.

Major Types of GPS

1. Portable GPS. This type of GPS unit is portable enough to be carried along while

travelling by foot or car. However it is not small enough to be kept inside the pocket. It

typically measures 4 inches wide and weighs about 10 ounces.

2. Pocket GPS. This type of GPS unit is designed to fit inside the pocket of pants or

shirts.

It weighs about 5 ounces with a screen measuring 3.5 inches. It costs more than the

portable units because of its small, slim, light weight feature.

3. In-dash GPS. This type of GPS unit is built into the automobile’s dash board, thus

adding security to the unit and avoiding loss of the property.

4. Fitness and cycling GPS. It is specially created for people who walk, jog, run or ride

bicycles. It is designed to fit snuggly on the wrist like a watch. It can also track the

athletes pace, distance speed and even calories burnt!

5. Motorcycle GPS. This type of GPS is almost the same as that used in cars but is

designed to fit in the motorcycle consoles, waterproof, and vibration resistant. Most

units come with blue tooth hands free technology feature.

27

Fig2.1 shows GPS data acquisition model.

Page 28: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

6. Marine GPS. This is specifically designed for marine use and comes with plotting

functionality. It is equipped with special marine database and navigational aids such as

sound signals, buoys and day beacons among others.

2.12 Application of GPS to Crime Activities

Currently in Kenya, the use of GPS in crime monitoring and response is not yet fully developed.

Much of the work done using the assistance of the GPS technology is mainly navigation and

surveying. Companies that install car tracking systems are coming up; in this manner the GPS

gadget is fixed on the vehicle such that wherever the vehicle moves it can be monitored. In case

the vehicle gets stolen the GPS gadget will assist the police in tracking the vehicles movement.

Globally, one of the most recent developments has been fleet management through AVL

(automatic vehicle locator).The system provides efficiency of response and helps to ensure an

officers safety. By comparing GPS and the roads coordinates, AVL becomes a navigational

guide, thus facilitating the police officers with accurate information concerning the best response

route to an incident. It also facilitates resource allocation e.g. the immediate dispatch of the

closest patrol officers to the site.

2.13 CCTV Surveillance Systems

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a

specific place, on a limited set of monitors. It differs from broadcast television in that the

signal is not openly transmitted, though it may employ point to point (P2P), point to

multipoint, or mesh wireless links. Though almost all video cameras fit this definition,

the term is most often applied to those used for surveillance in areas that may need

monitoring such as banks, casinos, airports, military installations, and convenience stores.

A more advanced form of CCTV, utilizing digital video recorders (DVRs), provides

recording for possibly many years, with a variety of quality and performance options and

extra features (such as motion-detection and email alerts). More recently, decentralized

IP-based CCTV cameras, some equipped with megapixel sensors, support recording

directly to network-attached storage devices, or internal flash for completely stand-alone

operation.

28

Page 29: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

There is strong anecdotal evidence that CCTV aids in detection and conviction of offenders;

indeed UK police forces routinely seek CCTV recordings after crimes. (Google, inc. 2013).

Moreover CCTV has played a crucial role in tracing the movements of suspects or victims and is

widely regarded by antiterrorist officers as a fundamental tool in tracking terrorist suspects.

Large-scale CCTV installations have played a key part of the defenses against terrorism since the

1970s. Cameras have also been installed on public transport in the hope of deterring crime, and

in mobile police surveillance vans, often with automatic number plate recognition. Video

Content Analysis (VCA) is the capability of automatically analyzing video to detect and

determine temporal events not based on a single image. As such, it can be seen as the automated

equivalent of the biological visual cortex.

A system using VCA can recognize changes in the environment and even identify and compare

objects in the database using size, speed, and sometimes colour. The camera’s actions can be

programmed based on what it is “seeing”. For example; an alarm can be issued if an object has

moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected,

or if running people are detected, or if fallen people are detected and if someone has spray

painted the lens, as well as video loss, lens cover, defocuses and other so called camera

tampering events.VCA analytics can also be used to detect unusual patterns in a videos

environment. The system can be set to detect anomalies in a crowd of people, for instance a

person moving in the opposite direction in airports where passengers are only supposed to walk

in one direction out of a plane or in a subway where people are not supposed to exit through the

entrances.

VCA also has the ability to track people on a map by calculating their position from the images.

It is then possible to link many cameras and track a person through an entire building or area.

This can allow a person to be followed without having to analyze many hours of film. Currently

the cameras have difficulty identifying individuals from video alone, but if connected to a key-

card system, identities can be established and displayed as a tag over their heads on the video.

Facial recognition system is a computer application for automatically identifying or verifying a

person from a digital image or a video frame from a video source. One of the ways to do this is

by comparing selected facial features from the image and a facial database. The combination of

29

Page 30: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

CCTV and facial recognition has been tried as a form of mass surveillance, but has been

ineffective because of the low discriminating power of facial recognition technology and the

very high number of false positives generated. This type of system has been proposed to compare

faces at airports and seaports with those of suspected terrorists or other undesirable entrants.

On average, CCTV cameras have a field of view of about 150 feet (Google, inc. 2013) which

translates to about 50 metres. However there are special case cameras e.g. those used in military

bases and highly secured armory. Below are examples of CCTV cameras that can be annexed to

various surfaces.

Super Shock Proof Armored Ruggedized High Speed 1/4" Sony EX-View HAD 530TVL WDR Day/Night PTZ, IP66 weatherproof, IR up to

300 ft, 3.4-122mm lens

Sony 1/4" EX-View 6" High Speed Day/Night WDR PTZ CCTV camera, 36x optical 12x digital (420X zoom), NTSC/PAL option/tilt speed 0-1200 per sec/tilt range 1800 with tilt flip/pan speed 0-3000 per sec/picture elements 380,000 pixels.

As an optical zoom example, a man of 5’2” tall at 200 feet away, would be 118% of the screen

and the FOV would be 5.9’wide x 4.5’ tall.

30

Fig 2.3

Fig 2.2

Page 31: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

2.14 Application of CCTVs in Kenya

Installation of CCTVS in Kenya is mostly done in public places and buildings in order to

monitor large crowds of people. It can be said that most of the cameras are targeted at places

where there are entrances and exit doors. For example, banking halls and ATMs have cameras

that are strategically mounted in various locations especially facing the counters where money is

delivered. Busy shopping malls are also common areas for CCTV installation, supermarkets,bus

and train terminals included. Other places include car parks, busy streets and even libraries. It is

interesting that nowadays even churches have been placed under surveillance.

2.15 CCTV Site Rationalization

Rationalization means choosing the most efficient and effective means of accomplishing a task.

CCTV rationalization therefore means the effective use of CCTVS to accomplish the task of

crime monitoring. Rationalization also means the optimum selection of the best sites for making

the best use of the available resources in monitoring crime. For instance, instead of using three

surveillance cameras over three crime hotspots, two of them may be used (considering some

factors like areas of overlap) to monitor that place effectively. In essence rationalization can be

said to be making the best out of the available resources to exhaustively deliver the desired

objectives.

31

Page 32: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fig 2.4 Rotating CCTV cameras

The cameras above can rotate 3600.This type is more preferable for installation especially at open

places like bus stations, markets and road junctions.

CHAPTER THREE

3.0 METHODOLOGY

3.1 Study Area

Nairobi is the most populous city in East Africa, with a current estimated population of about 3.5

million. According to the 2009 Census, in the administrative area of Nairobi, 3,138,295

inhabitants lived within 696 km2 (269 sq mi). Nairobi is currently the 12th largest city in Africa,

32

Page 33: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

including the population of its suburbs. Nairobi lies between the latitudes 1010’S and1025’S and

longitudes 360 40’E and 37010’E.

Covering a large area, Nairobi area is divided into different divisions and units in order to curb

crime effectively. In October 2004 Nairobi was extended to a Greater Nairobi covering Magadi,

Mlolongo, Syokimau, Kiamumbi and Kinoo taking up parts of Rift valley, Eastern and Central

provinces respectively. Currently we have a total of nine Police divisions, which include:

1. Gigiri Police Division

2. Langata Police Division

3. Ngong Police Division

33

Fig 3.1 Showing Nairobi Area

Page 34: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

4. Kasarani Police Division

5. Embakasi Police Division

6. Central Police Division

7. Kayole Police Division

8. Buruburu Police Division

9. Kasarani Police Division

3.2 Data Collection

3.2.1 Data Identification Process

This refers to the identification, collection, digitization and correction of errors for the necessary

data used to build GIS databases. It is the most expensive and critical phase for the success of

any GIS project. Both primary and secondary geographic data may be obtained in digital or

analog format. Analog data for example the crime incidences recorded at the police station for

this case required to be entered in computer spreadsheets. Analog maps were scanned and then

imported to ArcGIS as geographic database. Before importing into GIS environment

considerable formatting and restructuring may be required. The datasets required for this

particular study were collected and their sources identified as follows.

Table1: Datasets and their sources

DATASETS DATA DESCRIPTION DATA SOURCE

34

Page 35: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Topographic Maps and

Administrative Maps

Kenya admin. Maps at

scale1:50000 and Nairobi

topomaps at scales 1:5000

and 1:20000

Survey of Kenya(SOK)

JICA, Japanese International

Corporation Agency

Crime Incidence and Reports Crime incidences and reports

as recorded in the Police

occurrence book. The type of

crime, date and time of attack

and gender of victim

Nairobi Central Police Division.

Crime Hotspots Locations. Geographic Coordinates Picked using a hand held GPS,

Garmin, Model

GPSMAP60CSX

The maps that were acquired were in hard copy and therefore they were scanned and also

georeferenced. The crime incidence reports were recorded in the daily occurrence book and later

transferred into large book files. Despite of the manual record keeping, the files were arranged in

a chronological manner thus making an easier access to those needed for the study.

3.2.2 Attribute Data Entry

The lowest level at which the user interacts with a geospatial database is object class normally

referred to as a layer or feature class.

The data obtained was actually recorded as statements stating the place of crime, gender of the

victim, type of crime ,date and time of occurrence .It was necessary to summarize that

information first in Microsoft Excel spreadsheets then into tables as shown by the sample below.

This data was then imported as delimited text file formats into ArcGIS working environment.

35

Page 36: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

3.2.3 Geographic Data Acquisition

The geographic data obtained was in form of a digital topographic map covering Nairobi area.

The maps were of scale 1:5000 and also 1:50000.Since the area of study only covered the

Central Business District and the environs it was necessary to crop out that area of interest using

the Global Mapper. These maps were georeferenced and digitized to show the major road

arteries and buildings. For map unit symbols and features, they were directly uploaded into the

ArcGIS environment since they could be selected in the view window to see if that hotspot was

located within the base map by entering its symbol or identity in a dialog box.

36

Table2: Showing tabulated crime data

Page 37: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Planning

Evaluation

Editing Digitizing

Preparation

3.2.4 GPS Receiver Operation.

There are several GPS receivers currently in the market one being the Germin 60CSX handheld

GPS. While picking the actual features for this case study, the GPS which uses the common dry

cells as power source, was switched on at the actual sites of the crime hotspots and held for about

five minutes to allow it acquire maximum satellite detection. The GPS automatically picked the

geographical coordinates and altitude of the point which was entered and saved as waypoints.

The date and time of recording was also stored. Later the whole set of marked points was on a

computer, exported and displayed as point overlays on the base map.

Table 3: Shows an excerpt of the geographic data collected

PLACE CODE DATE/TIME LONGI/LATIT ALTITUDE

Ambassador Amba1 3/27/2013 12:37 37 M 257997 9858095 1672 m

Central bus

station Cbs1 3/27/2013 15:18 37 M 258320 9857944 1648 m

Cbs2 3/27/2013 15:19 37 M 258285 9858008 1649 m

Cbs3 3/27/2013 15:22 37 M 258262 9858014 1654 m

Cbs4 3/27/2013 15:29 37 M 258248 9858017 1666 m

Central Police Cent 2/28/2013 8:23 37 M 256139 9858718 1732 m

37

Figure3.2. data collection workflow

Page 38: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Station

City Hall Cityh1 3/27/2013 16:37 37 M 257727 9858026 1660 m

Cityh2 3/27/2013 16:39 37 M 257625 9858007 1658 m

Cityh3 3/27/2013 16:42 37 M 257549 9857944 1658 m

Police Control

Room contrl 3/26/2013 17:01 37 M 255935 9856803 1736 m

Cross Road Cros1 3/27/2013 14:14 37 M 258507 9858344 1672 m

Cros2 3/27/2013 14:17 37 M 258388 9858414 1690 m

Cros5 3/27/2013 14:22 37 M 258212 9858545 1695 m

Cros6 3/27/2013 14:23 37 M 258176 9858554 1693 m

Gaberone

Gab1 3/27/2013 14:53 37 M 258163 9858318 1643 m

Globe

Roundabout Glb1 3/27/2013 12:02 37 M 257553 9858842 1704 m

Glb2 3/27/2013 12:04 37 M 257590 9858886 1698 m

Glb3 3/27/2013 12:07 37 M 257525 9858976 1695 m

Glb4 3/27/2013 12:10 37 M 257437 9858970 1699 m

Glb5 3/27/2013 12:13 37 M 257375 9858854 1698 m

Gen Post Office Gpo 3/28/2013 10:35 37 M 257244 9858062 1711 m

Haile Selassie Hai1 3/27/2013 12:55 37 M 258319 9857761 1666 m

Hai2 3/27/2013 12:59 37 M 258491 9857857 1675 m

Hai3 3/27/2013 13:02 37 M 258610 9857923 1681 m

Kencom Bus

station Ken1 3/28/2013 10:18 37 M 257495 9858209 1695 m

Ken10 3/28/2013 10:29 37 M 257045 9858028 1723 m

Ken11 3/28/2013 10:32 37 M 257157 9858037 1719 m

Ken3 3/27/2013 16:31 37 M 257805 9858113 1665 m

Ken4 3/27/2013 16:32 37 M 257813 9858109 1665 m

Kenc1 3/27/2013 16:28 37 M 257909 9858092 1666 m

Kimathi Street Kim1 3/28/2013 9:31 37 M 257788 9858187 1689 m

Kim2 3/28/2013 9:32 37 M 257769 9858193 1693 m

Kim3 3/28/2013 9:34 37 M 257648 9858309 1695 m

3.3 Geocoding the Map

38

Page 39: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

This was done in order to assign the particular tabular data to its specific location on the earth’s

surface in order to visualize the spatial characteristics of the features for which in this case were

entered as shape files i.e. name of roads and avenues and also magnitudes of crime in the

hotspots. Normally in geocoding procedure, addresses and zip codes are used but in this case

features have been identified using their name labels.

3.4 Database Creation

The type of data determines how it is going to be stored in a GIS database i.e. Attribute or

geographic. However, interrelated geographical and attribute tables can equally be handled by a

relational database. Unlike hierarchical or network DBMS, relational structures do not have

pointers or hierarchy. RDBMS were preferably used in this project because it was flexible to

handle real world geographical objects as well as its flexibility in handling queries. A search

would be made on any tables using any of the attribute fields and even a combination of them.

Standard query language was then used to retrieve information like the crime hotspots that had

incidences beyond a certain value based on the matching of attribute data entries. The key entry

in the relational tables was the type of crime committed.

Below is a summary of data extraction and manipulation process.

39

Page 40: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

DATA IDENTIFICATION

DATA COLLECTION AND DATA CAPTURE

NON SPATIAL DATASPATIAL DATA

DATA PROCESSING AND VERIFICATION Georeferencing, Editing, Topology

GIS DATABASE

RESULTS AND ANALYSIS

DATA CORRECT?

Fig 3.4 Data flow diagram

3.5 Georeferencing

40

YES

NO

Page 41: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Its obvious that all features on the earth surface are attached to a specific location

(coordinates).Without locations, data are said to be non spatial and would be of very little help in

a Geographic Information System. The act of assigning locations to features is called

georeferencing. In this project four control points were identified near the corners of the image.

Most of the control points were identified from outstanding map features like the centres of

roundabouts and the corners of major buildings. The software used to georeference Nairobi map

for this case was the Global Mapper 10. Each identified point was zoomed into and the

corresponding coordinates were entered in the ground control point entries. The software

provides for the adjustments of the projection and the datum. Universal Transverse Mercator and

Arc 1960 were used as projection and datum respectively.

Fig3.5.1 Georeferencing in Progress

Table4: The coordinates used for georeferencing are shown in the table below

41

Page 42: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

EASTING NORTHING POINT DESCRIPTION

249468.14 9863599.32 Top left corner of Nairobi map

265343.70 9866361.50 Top right corner of map

265355.55 9853854.71 Bottom right corner of map

249495.85 9853841.71 Bottom left corner of map

3.6 Map Digitization Process

The features on the topographical map were digitized as point, line or polygon features as

follows:

The datasets such as the digital topographic maps were loaded into the file location of the

computer as a folder in drive C.

The Arc catalog in the ArGIS software was then used to create shape files which were

then loaded in ArcMap ready for digitization.

The shape files created were buildings, roads, open grounds, rivers and crime hotspots.

Since buildings were in geometrical shapes, they were then digitized as polygons by use

of the digitizer tool from the editor catalog by simply tracing the outermost bounds of the

buildings. A similar procedure was done for open grounds .Roads and rivers were

digitized as line features by tracing along them.

The hotspots had been picked by the GPS as coordinate points and were then exported

and overlaid in the map as point features.

Each time features in a shape file were being digitized, the specific shape file was

activated and before moving to digitize the next, all edited features were saved. The

errors identified included undershoots, overshoots, dangling lines and sliver polygons.

The following are the tools and software used in the data editing process.

Table5: Tools and software used

42

Page 43: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Apart from editing the shape files, the necessary attributes could be added to them using the add

fields option. This would allow the entry of sufficient information which would enable the

database to be queried adequately. The figure below shows how the attributes were added to

crime hotspots shape file.

43

Tool Specifications Purpose

Desktop

Computer

Processor Intel(R)

Pentium 4,2.5GHz

2 GB RAM

Data And Information Processing

ArcGIS Version 10.1 Vectorization, Database Query And

Analysis

Global Mapper Version 10.0 Georeferencing and Clipping

Scanner Hp Scanner

deskjet

Scanning Topographic Maps

Page 44: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fig3.6: Addition of attributes to a shape file

3.7 GIS Database Query

All the shape files created were attached to an attribute table showing all the details about it. For

example the crime hotspots were attributed to the place names, the time of occurrence, type of

victim and the number of recorded incidences. In ArcGis software program, query expressions

were created to derive the desired information from the map and the attribute tables. If the query

was directed to display the locations of highest crime, they would then be displayed on the map

depending on the set parameters. The querying of the database was done by activating the theme

by clicking on it on the table of contents showing different shape files. Simple queries could be

performed by using the identity tool whereby you simply click on any feature e.g. the hotspot

and would display its name and any other information about that feature as long as it is in the

attribute table. An example of a query was the selection of hotspots with more than forty crime

incidences which would be appropriate for CCTV coverage.

3.8 Cartographic Display and Visualization

Maps as an interface to GIS were created so that they could enable viewing, querying and also

analysis of events. From the ArcMap window, the layout view option enabled the creation of

maps by inserting the legend, north arrow bars scale and neat line. Map symbols were then used

to represent various features which were created as shape files from the topographical base map.

Red circular point symbols were used to show the crime hotspots, line symbols for roads and

polygon features for buildings and open grounds.

3.8.1 Thematic Mapping

In the representation of features various visual variables were used for data display. They

included the variation of hue, value, chroma, size, texture, shape and pattern. For instance a

yellow color was used in buffering the crime hotspots as it stands out from the red colour. Base

map features were digitized using desaturated colours e.g. brown for the roads and light blue for

the river. It is on the derived base map that the crime hotspots and CCTV sites were overlaid.

3.8.2 Graduated Maps

44

Page 45: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Graduated/proportional/quantitative point symbols have long been used in thematic mapping

(Njoroge T, 2013).In this case of study, geometric symbols e.g. circles of different sizes were

used to show data at specific locations. This was done by first digitizing the base map features

like major roads, buildings and drainage system in order to give a map user some orientation of

the map. Proportional point symbols show relative magnitudes of crime at various locations. The

features of interest were displayed by freezing the base map itself leaving the digitized features

active on the ArcMap window.

. 3.9 Site Selection for CCTV Installation

Two criteria were used in the identification of CCTV sites. One of them was the use of the

cluster analysis obtained from the database query using the query builder either by attributes or

location. Database interrogation involved pointing at the feature using identity tool, typing and

by the use of a formal Structured Query Language (SQL). Some of the queries performed were

to;

Find the most committed type of crime.

Find the places that have more than forty crime incidences.

Find all the crime hotspots along Ronald Ngala.

Places with the highest number of crime incidences were allocated more values /weight in terms

of site identification since they would require more surveillance. Regions covered by the radial

buffer of fifty five metres would require a surveillance system. Where the buffers overlapped, it

was an indication of clustered hotspots which would require more surveillance. Since the

interest was in out-door surveillance most of the perpetrators would use roads and avenues as

escape routes; it was therefore essential for all the road junctions in those areas to be put under

surveillance. For instance, a hit and run vehicle tries to escape after killing an individual along

Moi Avenue and tries to exit through Haile Selassie it must go through a junction at some point

and would be probably detected by at least one of the cameras. The locations where the buffers

overlapped gave an ideal location for CCTV installation i.e. rationalization. This means that the

more the overlaps the higher the necessity for installation. Considering the high cost of these

cameras, building sites were given the first priority so as to keep them not easily identifiable by

the public. This would assist in maintenance of the cameras as well because they would not be

45

Page 46: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

subject to easy vandalism. Open places were also mapped as proposed sites after all other factors

e.g. no adjacency to buildings or structures were considered. City council of Nairobi took an

initiative to light open areas e.g. markets and streets by tower lamps and these were also

considered as installation sites.

CHAPTER 4

4.0 RESULTS AND ANALYSIS

Spatial analysis was necessary because it includes all to do with transformations, manipulation

and other methods that were needed to add value to all geographic data collected. That in turn

would assist in informed decision making since the situations are displayed as they are on the

ground. Some examples of spatial analysis used for this case study include querying and

reasoning, measurements and transformations.

The results obtained from the spatial data analysis reveal that criminal activities are not evenly

distributed within the CBD and its environs but are rather concentrated at certain places than

others. From the geostatistical results as displayed on the point pattern maps we find that

clustering of the incident points increases towards the northern part of the city towards the lower

outskirts of the town as one approaches Ngara, Kariokor, Kamkunji and Muthurwa.

46

Page 47: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

4.1 Generation of Crime Distribution Maps.

47

Page 48: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

48

Figure 4.1.1 thematic map showing crime hotspots in various locations of the city

Page 49: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fi

g 4.

1.2

show

s crim

e ho

tspo

ts b

uffer

ed a

t 55

met

res r

adiu

s

49

Page 50: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

50

Fig4

.1.3

show

s crim

e bu

ffers

at 6

0met

re ra

dius

Page 51: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fig 4.1.4 Showing Nairobi proposed CCTV sites

Fig 4.1.5: Shows the position of Crime Hotspots and CCTV sites.

51

Page 52: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

52

Fig

4.1.

6 G

radu

ated

crim

e ho

tspo

ts

Page 53: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

53

Page 54: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fig 4.1.7 Buffered CCTV Sites

The crime hotspots were buffered at a radius of 50 metres so as to show how well the hotspots

would be covered by the CCTV cameras. Initially the ArcGIS buffering command was to cover

each identified region. It is evident that there are places with overlapping buffers meaning that

the place is under intense surveillance because of the clustered crime patterns. This could assist

the police in allocating or giving more attention to those areas.

4.2 CRIME STATISTICAL ANALYSIS BY OTHER ATTRIBUTES

4.2 .1 Crime Incidences by Months of the Year

It is evident from the graph that stealing was the most common crime committed throughout the

year. In the months of Jan to March robbery with violence, car jacking, assault and fraud were

the highest crimes compared to other months. Stealing, felony, burglary and drugs were the

highest committed crimes in the months of April to June but recorded the least number of car

jacking. Stealing and pretence were the most committed crimes in July to September and the

least recorded was forgery.

STEALIN

G

ROBBERY W

ITH VIO

CAR JACKING

FRAUD

DRUGS

FORGER

Y

ASAULT

BURGLARY

PRETENCE

FELONY

FIGHTS

0

10

20

30

40

50

60

70

80

90

JAN-MARCH 2011APRIL-JUNE 2011JULY-SEPT 2011

54

Page 55: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Fig 4.2.1 Showing different crime rates.

Crime Incidences by Time from January -March 2011

7.00AM-11.48AM

11.48AM-4.36PM

4.36PM-9.24PM

9.24PM-2.12AM

2.12AM-7.00AM

0

5

10

15

20

25

30

35

40

45

JAN-MARCH 2011

JAN-MARCH

Fig 4.2.2

It is evident from the graph above that the highest number of crime incidences from Jan to March

2011 took place in the day especially morning hours until noon and afternoon. From evening

around 5 p.m. there was a drop in the reported cases and a very few of them were reported in the

night around 10 p.m. and 7 a.m.

55

Page 56: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Crime Incidences by Time from April-June 2011

7.00AM-11.48AM

11.48AM-4.36PM

4.36PM-9.24PM

9.24PM-2.12AM

2.12AM-7.00AM

0

5

10

15

20

25

30

35

40

APRIL-JUNE 2011

APRIL-JUNE

Time

Fig 4.2.3

From April to June 2011 most crime incidences were reported to have occurred from noon to the

early evening around 5p.m.There were relatively more incidences in the morning and fewer

incidences were reported from 5pm until late night. Incidences started increasing slightly

towards morning hours.

56

Page 57: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Crime Incidences by Time from July-September 2011

7.00AM-11.48AM

11.48AM-4.36PM

4.36PM-9.24PM

9.24PM-2.12AM

2.12AM-7.00AM

0

10

20

30

40

50

60

JULY-SEPT 2011

JULY-SEPT

Fig 4.2.4

In the months of July to September 2011 most crime incidences occurred from morning till noon.

There was a successive drop of crime incidences from the afternoon till morning.

57

Time

Page 58: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Crime Incidences by Gender by Months of the Year

JUNE-AUGT JAN-MARCH APRIL-JUNE JULY-AUGST0

20

40

60

80

100

120

140

MALE

FEMALE

Number of victims

Fig 4.2.5

The graph displays the crime incidence by gender victimization and shows that most victims

were male people. The months of June to August 2010 recorded the highest number of male

victims whereas the months of January to March 2011 recorded the highest number of female

victims. Apparently, there was less victimization to both genders between the months of April to

June 2011.

58

Page 59: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Crime Incidences at Place of Occurrence

RIVER ROAD

LANDHIES

ROAD

LUTH

ULI

MACHAKOS C BUS

RACE COURSE

RONALD NGALA

MUTHURWA

NEW PUMWANI

TOM M

BOYA

MOI AVEN

UE

CENTR

AL BUS S

TATN

KIRINYAGA ROAD

0

10

20

30

40

50

60

70

JAN-MARCH 2011APRIL-JUNE 2011JULY-SEPT 2011TOTAL ENTRIES

Fig 4.2.6

4.3 DISCUSSION

Figures 4.2.1,4.2.3,4.2.4and 4.2.5 show the crime incidences reported between the months of

January and September 2011.There are six major crime hotspots identified in hierarchy of crime

prevalence namely Race Course, River Road, Machakos Country Bus, Luthuli, Muthurwa,

Landhies Road. River Road exhibited the highest number of reported case from January to

March 2011. Between April and June 2011, Race Course had the highest number of reported

incidences. From July to September 2011 it was Muthurwa that had the highest reports of crime.

The most recurrent incident was stealing during the day and this could be attributed to the fact

that most people are busy trading and there is a heavy cash flow exchanging hands for example

in River Road and Muthurwa market. Most of the perpetrators around Muthurwa barely escape

59

Page 60: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

alive when the hands of the angry mob lay on them! Robbery with violence is most prominent in

the CBD owing to the presence of high profile businesses like commercial banks and also tourist

hotels. Cases of carjacking mostly occur towards the outskirts of the towns and in poorly lit

places and places next to bushes like Quarry Road. Much of the assault and mugging happen in

places near bank ATMs and poorly lit avenues, dark alleys and corridors. People should be

advised to avoid fly-overs, underpasses and bridges especially during evenings and late night

hours.

Drug trafficking and other psychotropic substances were mostly reported in Muthurwa, Landhies

Road and Kariokor market. Drugs like cannabis sativa/bhang were mostly brought from the rural

areas. It is worth mentioning that police dogs have played a major role in curbing drug

trafficking

The issue of fraud, bad cheques and forgery were mostly prominent in the city center which is a

herb of large commercial activities. In city hall, several cases were reported concerning

individuals who forged documents to get employed (mystery of the ghost workers), or to acquire

City Council’s assets with intention to steal or misuse for self interest. Fake currency notes have

also been witnessed and all these call for much scrutiny and careful verification of documents

wherever possible.

60

Page 61: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

CHAPTER 5

5.0 CONCLUSION

It is evident from this analysis that indeed crime can happen anywhere although there are those

particular places where several crime events seem to occur more frequently than others and such

places are called crime hotspots. Most crimes occur mostly during the day in the CBD mainly

because it is a hub of commercial activities and Nairobi being the capital city of Kenya as well as

administrative headquarters. Stealing, fraud and robbery with violence were displayed as the

most recurrent crimes. These observations concur with the crime place theories that offenders

make rational decisions with respect to committing a crime influenced by disposing factors

between motivated perpetrators, victims and targets in space and time.

The use of Geographic Information System in study of crime patterns and distribution has proven

much efficient over the traditional manual methods. Through the spatial analysis of real time

events other technological considerations have been implemented for example selection of

CCTV sites based on the GIS analysis which proved important in meeting the objectives of this

study.

Amongst the aims of the project was to analyze the trends of crime in the CBD and use the

information thereafter to assist the security firms and also create awareness to the public to avoid

uncompromising situations which could land them as victims of crime. Thematic maps produced

assisted in integrating various layers of information which enabled quick onscreen display of the

desired features. The buffered crime hotspots assisted in the site selection of CCTV installation

sites and also in the allocation of resources in the most effective manner.

The Kenya police headquarters at Vigilance house has made efforts to embrace GIS in their

crime analysis however implementation of GIS in various police stations is not yet fully

considered.

Statistical analysis done for all crimes revealed that places at the northern and eastern part of the

city recorded more crime events more than the CBD itself because of various reasons below.

61

Page 62: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

The CBD constitutes mainly of administration offices and large commercial businesses

such as banks which are guarded by heavily armed police officers and are under 24hr

CCTV surveillance. The reported crimes mostly took place outside the buildings along

the streets.

In the north eastern part of the city along River Road and Race Course roads, most

business premises lacked security personnel and in any case they were only armed with

clubs which were not efficient to confront perpetrators armed with guns and pistols.

Apart from that, most of the premises had no coverage of surveillance systems.

Most people go to the CBD to work during the day and later commute back to their

places of residence in the evening. These residential places are located in the outskirts

towards the northern and eastern parts of the city. Many cases reported involved people

either going home on foot or walking to a bus station.

There is little public awareness on where to avoid when walking home and at what time

of the day.

There was no clear indication of the exact time when these crimes were committed but from

the graphical analysis, it was found that most of the crime incidences took place within the

day. At day time less serious crimes like stealing and pretence were reported as opposed to

mugging, burglary, robbery with violence and car jacking which mostly occurred in the late

evenings and at night.

Through the statistical graph displays, the crime hotspots have been successfully identified

and this would give informed decision on where to increase security vigilance.

62

Page 63: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

RECOMMENDATIONS

1. All the Governmental and non-Governmental organizations handling security issues should

incorporate GIS technology by setting up and maintaining GIS departments to help in better

management and close monitoring of particular crime hotspots and also in predictive crime

pattern analysis.

2. Keen recording of crime incidences should be particulate with respect to the exact point of

occurrence to avoid generalization of places like in this case of study most crimes were only

associated with roads and avenues without the name of exact place consequently spending

more time in conducting oral interviews. Exhaustive information collection should therefore

be inquired from the victim when entering them in the occurrence books at the police

stations.

3. The CCTV cameras should be installed strategically at various places of the city. This would

be a real time witness and the prosecution processes in courts are speculated to take shorter

periods, which would otherwise be spent on looking for eye witnesses.

4. All the CCTVS should be integrated at a central monitoring unit by the police with

appropriate computer mechanisms to enable a link-up between police immediate response,

the magnitude of crime and the exact crime sites.

5. Public awareness should be created concerning the trends of crime to reduce crime

victimization. They should also be educated about community policing to assist security

officers concerning crime matters.

6. Proper street lighting and refurbishment of the same should be implemented to discourage

criminal activities.

7. The information obtained from the crime analysis by whichever means should be used in

resource allocation. Examples are where to assign more police on patrol, police bases and

where to increase street lights to reduce crime bottlenecks.

63

Page 64: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

REFERENCES

1. Aki, Stavrou (2002): UN Habitat: United Nations Development Programme: Crime in

Nairobi-Results of Citywide Victim Survey.

2. Alexander, M. and Xiang, W. N (1994): Crime pattern analysis using GIS.

3. Arnoff, S (1989): Geographic Information Systems.

4. Chaney S,and Ratcliffe, J.( 2004): GIS and Crime Mapping.

5. Getis A, Ord J K (1992): Hotspot Analysis.

6. Gimode, E. A. (2001): An Anatomy of Violent Crime and Insecurity in Kenya:the case of

Nairobi 1985-1999.Research Findings on City/Street Crimes in Nairobi.

7. GPS.gov (2013): Official US Government Information about the Global Positioning

System and Related Topics. http://www.gps.gov/systems/gps/space[accessed in 23rd April

2013].

8. Hirschfield A, Bowers A, Pease K. (1995): Use of GIS on Crime Mapping.

9. Kenya Police. (2011): Annual Crime Report.

10. Mulaku, G. C. (2012): Land Information Systems Notes (Unpublished).

11. Njoroge, T. M (2012): Cartographic Map And Design Notes (Unpublished).

12. Playfair, G.( 1957): Crime In Our Century.

13. Ratcliffe, J. (2004): Use of GIS on Crime and Intelligence Analysis.

14. Ratcliffe, J. H. and M. J. Mc Cullagh (1998): Perceptions of Crime Hotspots.

15. Reckless, W. C (1973): The Crime Problem. ``A New Theory Of Delinquency And Crime”

Published By Russell Sage Foundation.

16.United Nations Report. (2007): United Nations Office on Drugs and Crime, "Marred By

Violence and Fraud.”

17.Wecom CCTV Surveillance Systems (2013):http://www.wecusurveillance.com[Accessed

on 23rd April 2013].

18. William, L. Marshall, Clark, L. (1970): Sociology of Crime and Delinquency.

64

Page 65: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

APPENDIX A: Attribute table for reported crime incidences per locations

PLACE

JUNE-AUG

2010

JAN-MARCH

2011

APRIL-JUNE

2011

JULY-SEPT

2011

TOTAL

ENTRIES

RIVER ROAD 15 18 12 10 55

NEW

PUMWANI 9 8 7 7 31

LANDHIES

ROAD 9 14 10 8 41

TOM MBOYA 7 15 4 6 32

LUTHULI 17 11 6 8 42

KARIOKOR 4 5 8 7 24

MACHAKOS C

BUS 16 8 15 13 52

CENTRAL BUS

STATN 6 9 7 7 29

KIRINYAGA

ROAD 7 7 6 9 29

RACE

COURSE 11 16 20 11 58

HAILLE

SELASIE 7 9 12 6 34

RONALD

NGALA 9 10 10 11 40

KOINANGE 3 6 2 4 15

CITY HALL 12 9 5 4 30

MOI AVENUE 13 8 6 7 34

MUTHURWA 7 9 10 15 41

CROSS ROAD 6 8 4 4 22

GLOBE

ROUNDABOU

T 7 8 4 5 24

NGARA STAGE 4 2 2 4 12

CITY SQUARE 4 5 6 10 25

65

Page 66: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

MFANGANO 5 9 7 3 24

MUINDU

MBINGU 3 7 3 4 17

AMBASSADOR 3 4 2 2 11

KENCOM 5 4 5 4 18

AFYA CENTRE 6 5 5 3 19

NAKUMATT 3 5 2 2 12

ACCRA ROAD 4 5 5 7 21

PARKLANDS

ROAD 8 6 5 6 25

UHURU

HIGHWAY 7 5 9 5 26

GPO 4 2 0 2 8

APPENDIX B: Attribute table for total crime incidences per months of the year

CRIME JUNE-AUG 2010

JAN-MARCH

2011

APRIL-JUNE

2011 JULY-SEPT

TOTAL

INCIDENCES

STEALING 79 82 62 65 288

ROBBERY

WITH VIO 15 9 6 9 39

CAR JACKING 27 15 7 11 60

FRAUD 28 19 7 5 59

DRUGS 12 9 13 8 42

FORGERY 9 11 8 4 32

ASAULT 17 23 13 20 73

BURGLARY 18 10 16 13 47

PRETENCE 4 9 11 18 42

FELONY 7 6 11 5 29

FIGHTS 4 3 5 5 17

66

Page 67: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

APPENDIX C: Attribute table for some reported crimes at police stations

CRIME PLACE SEX/VICTIM

CRIME

COMMITTED DATE TIME

RACE COURSE F STEALING 2/1/2011 2.00PM

LUTHULI M FELONY 2/1/2011 1.30PM

CITY SQURE F PRETENCE 3/1/2011 10.00AM

NGARA STAGE M FIGHTS 3/1/2011 5.30PM

KARIOKOR M STEALING 3/1/2011 8.00AM

RACE COURSE M DRUGS 4/1/2011 4.40PM

RIVER ROAD M BURGLARY 4/1/2011 3.00AM

GPO F

ROB WIT

VIOLENCE 5/1/2011 8.30PM

NYAMAKIMA M ASSAULT 5/1/2011 10.00PM

MUTHURWA F DRUGS 6/1/2011 3.45PM

RACE COURSE F STEALING 7/10/2011 2.00PM

RIVER ROAD F CAR JACK 7/1/2011 6.00PM

NEW

PUMWANI M PRETENCE 7/1/2011 11.30AM

MACHAKOS

BUS F FELONY 7/1/2011 12.00 PM

RING ROAD M STEALING 8/1/2011 1.00PM

KOINANGE M FRAUD 8/1/2011 9.00AM

RONALD

NGALA M FORGERY 9/1/2011 8.00AM

LUTHULI F

ROB WIT

VIOLENCE 9/1/2011 11.00PM

NEW

PUMWANI M FIGHTS 9/1/2011 10.00AM

RING ROAD M DRUGS 10/1/2011 5.00PM

RACE COURSE F STEALING 10/1/2011 12.00PM

RAILWAYS M FIGHTS 11/1/2011 7.35AM

MUNYU ROAD F FORGERY 11/1/2011 8.10AM

LANDHIES M RORGERY 11/1/2011 6.30PM

67

Page 68: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

ROAD

LANDHIES

ROAD M STEALING 11/1/2011 5.40PM

CITY HALL F PRETENCE

13/01/201

1 2.00PM

HARAMBE

AVEN M CAR JACK 13/1/2011 1.00AM

EMBASY

HOUSE F ASSAULT 14/1/2011 3.00PM

SERENA

HOTEL F DRUGS 14/1/2011 4.00PM

AFYA CENTER M STEALING 14/1/2011 4.00PM

MFANGANO M BURGLARY

15/01/201

1 10.00PM

RIVER ROAD M PRETENCE 15/1/2011 11.00AM

OTC BUS STA F STEALING 16/1/2011 7.10AM

RONALD

NGALA M FELONY 16/1/2011 2.40PM

LUTHULI M

ROB WIT

VIOLENCE 17/1/2011 8.00PM

MUINDU

MBINGU M BURGLARY 17/1/2011 10.00PM

HARAMBEE

AVEN F STEALING 17/1/2011 11.00AM

MOI AVENUE M DRUGS 18/1/2011 7.00PM

TOM MBOYA F STEALING 18/1/2011 9.00AM

GIKOMBA M STEALING 18/1/2011 7.00AM

TEA ROOM

ACCRA F PRETENCE 19/1/2011 1.00PM

HAKATI F ASSAULT 19/1/2011 3.00AM

CITY HALL M FORGERY 20/1/2011 8.50AM

NEW

PUMWANI M CAR JACK 20/1/2011 3.00PM

TOM MBOYA F DRUGS 20/1/2011 4.00AM

68

Page 69: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

LANDHIES

ROAD M STEALING 21/1/2011 12.10PM

ACCRA ROAD F FRAUD 21/1/2011 10.30AM

TOM MBOYA F FORGERY 23/1/2011 9.00AM

ACCRA ROAD M FRAUD 23/1/2011 5.00PM

KIMATHI M FIGHTS 23/1/2011 5.40AM

ACCRA ROAD M STEALING 23/1/2011 9.00PM

LANDHIES

ROAD F STEALING 24/1/2011 4.45PM

MUTHURWA F FRAUD 24/1/2011 8.15PM

LUTHULI M

ROBBERY

WIT VIO 25/1/2011 9.00PM

MUNYU ROAD M STEALING 25/1/2011 12.00MIDNIGHT

HAILE

SELASSIE M STEALING 26/1/2011 6.00AM

ACCRA ROAD M STEALING 26/1/2011 7.45AM

CROSSROAD F CAR THEFT 27/1/2011 4.00PM

TOM MBOYA F FRAUD 27/1/2011 9.00AM

LANDHIES

ROAD F MURDER 27/1/2011 3.40AM

GIKOMBA

MARKET M FIGHTS 28/1/2011 1.00AM

OTC BUS STA F FELONY 29/1/2011 6.30PM

LANDHIES

ROAD F STEALING 29/1/2011 4.40AM

GIKOMBA F STEALING 29/1/2011 3.20PM

RIVER ROAD F STEALING 30/1/2011 1.50PM

RONALD

NGALA M ASSAULT 30/1/2011 5.15PM

TEA ROOM

ACCRA M ASSAULT 1/2/2011 5.35AM

SHEIKH

KARUME F STEALING 1/2/2011 7.00AM

69

Page 70: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

RIVER ROAD F ASSAULT 2/2/2011 8.00PM

MFANGANO M STEALING 2/2/2011 12.25PM

RONALD

NGALA F STEALING 2/2/2011 4.50AM

TEA ROOM

ACCRA F STEALING 3/2/2011 6.30AM

GABERONE M STEALING 3/2/2011 5.15PM

LUTHULI M STEALING 4/2/2011 6.00AM

MACHAKOS

BUS M

ROBBERY

WITH VIO 4/2/2011 3.45AM

LANDHIES

ROAD M

STEALING

ASSAULT 5/2/2011 7.30PM

RIVER ROAD F STEALING 6/2/2011 9.20AM

TOM MBOYA F DRUGS 6/2/2011 10.00AM

LANDHIES

ROAD M CAR THEFT 6/2/2011 11.00AM

MUTHURWA M FIGHTS 6/2/2011 1.00PM

NEW

PUMWANI M FORGERY 7/2/2011 12.00AM

KENYA NAT

THEATRE M FRAUD 7/2/2011 1.00PM

NEW

PUMWANI F DRUGS 8/2/2011 6.45AM

QUARRY

ROAD F STEALING 8/2/2011 4.00PM

LUTHULI M ASSAULT 9/2/2011 7.00AM

UHURU PARK M STEALING 10/2/2011 6.30AM

TWIGA

TOWERS F FRAUD 10/2/2011 4.00PM

ACCRA ROAD F THEFT 10/2/2011 7.00PM

CHESTER

HOUSE F STEALING 10/2/2011 9.40PM

MFANGANO F DRUGS 11/2/2011 11.00AM

70

Page 71: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

HAILE

SELASSIE M FRAUD 11/2/2011 7.00AM

KIRINYAGA

ROAD M STEALING 12/2/2011 7.00AM

NEW

PUMWANI M FRAUD 12/2/2011 8.00PM

GIKOMBA F FRAUD 12/2/2011 9.00PM

RIVER ROAD M STEALING 13/2/2011 10.00AM

LUTHULI F ASSAULT 13/2/2011 1.00PM

RONALD

NGALA F CHEATING 14/2/2011 12.00NOON

KIRINYAGA

ROAD M BURGLARY 14/2/2011 3.00PM

CITYHALL M FRAUD 14/2/2011 4.00PM

MACHAKOS

BUS M FRAUD 15/2/2011 7.30PM

OLD MUTUAL M PRETENCE 15/2/2011 8.00PM

TEA ROOM

ACCRA M STEALING 15/2/2011 10.00PM

EQUITY

NGARA F STEALING 15/2/2011 10.30PM

EQUITY RACE

COURSE F FORGERY 16/2/2011 8.00AM

MACHAKOS

BUS M ASSAULT 16/2/2011 10.0AM

CITYHALL F PRETENCE 16/2/2011 1.00AM

AMBASSADOR F

ROBBERY

WIT VIO 17/2/2011 8.00PM

LANDHIES

ROAD M ROBBERY 17/2/2011 11.00AM

TAMWORTH

ROAD M STEALING 18/2/2011 9.45PM

EQUITY RACE

COURSE F STEALING 18/2/2011 7.45AM

71

Page 72: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

KUMASI ROAD M FRAUD 18/2/2011 3.00PM

CITYHALL F ASSAULT 19/2/2011 7.40PM

UON HOSTELS F STEALING 19/2/2011 10.00PM

LANDHIES

ROAD F MURDER 19/2/2011 11.00PM

MACHAKOS

BUS F FRAUD 20/2/2011 8.00AM

RACE COURSE M FORGERY 20/2/2011 10.00AM

CITYHALL M FORGERY 20/2/2011 8.00PM

CITYHALL M CHEATING 21/2/2011 10.00AM

CITYHALL M STEALING 21/2/2011 4.00PM

ACCRA ROAD M STEALING 21/2/2011 4.30PM

TEA ROOM

ACCRA F MURDER 22/2/2011 9.00PM

KIRINYAGA

ROAD M ASSAULT 22/2/2011 3.0AM

HAILE

SELASSIE M BURGLARY 23/2/2011 4.00AM

GIKOMBA F STEALING 23/2/2011 10.00AM

CROSSROAD M ASSAULT 24/2/2011 12.00 NOON

RONALD

NGALA M STEALING 24/2/2011 7.00AM

KICC F

CAR

JACKING 24/2/2011 7.30AM

JOGOO

HOUSE F CAR THEFT 25/2/2011 11.40 AM

PARAMOUNT

PLAZA M BURGLARY 25/2/2011 2.14PM

WAKULIMA

MKT M PRETENCE 26/2/2011 11.25AM

KARIOKOR

CEMETERY M

ROBBERY

WIT VIO 26/2/2011 9.30PM

KIRINYAGA

ROAD M STEALING 27/2/2011 6.30AM

72

Page 73: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

NEW

PUMWANI M FIGHTS 27/2/2011 12.30PM

COMMERCIAL

HOUSE F PRETENCE 28/2/2011 6.00AM

MOI AVENUE F

CAR

JACKING 1/2/2011 8.30PM

UKWALA F FRAUD 1/3/2011 9.50AM

HAKATI ROAD M STEALING 1/3/2011 10.00PM

GIKOMBA F STEALING 2/3/2011 12.30PM

TURKANA

LANE F FELONY 2/3/2011 1.00PM

RACE COURSE M STEALING 3/3/2011 4.00AM

MOI AVENUE M STEALING 3/3/2011 11.0AM

MACHAKOS

BUS F PRETENCE 3/3/2011 5.30PM

TOM MBOYA M FORGERY 3/3/2011 12.45PM

KARIOKOR

MKT M STEALING 4/3/2011 10.30AM

HAKATI LANE F CAR THEFT 4/3/2011 11.00AM

MUTHURWA F BURGLARY 4/3/2011 3.30AM

LUTHULI M STEALING 5/3/2011 1.00AM

MACHAKOS

BUS M STEALING 5/3/2011 8.00PM

RACE COURSE M STEALING 6/3/2011 6.45AM

KIRINYAGA

ROAD M STEALING 6/3/2011 5.50PM

MOI AVENUE M ASSAULT 6/3/2011 2.00PM

HAILE

SELASSIE F

ROBBERY

WIT VIO 6/3/2011 8.00AM

NEW

PUMWANI M MURDER 7/3/2011 2.00PM

RACE COURSE F STEALING 8/3/2011 1O.05AM

NYAMAKIMA F STEALING 8/3/2011 12.32PM

73

Page 74: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

KOINANGE M FORGERY 8/3/2011 11.00AM

KIJABE M STEALING 9/3/2011 5.30PM

KIRINYAGA

ROAD M

STEALING

BURGLARY 9/3/2011 6.00PM

CENTRAL BUS

STA M STEALING 10/3/2011 6.00AM

NEW

PUMWANI M STEALING 10/3/2011 10.00AM

MACHAKOS

BUS M FELONY 11/3/2011 3.00PM

GIKOMBA F FORGERY 12/3/2011 8.40AM

RIVER ROAD M DRUGS 12/3/2011 9.0PM

MOI AVENUE M DRUGS 12/3/2011 11.20AM

PARLIAMENT

ROAD F CHEATING 13/3/2011 4.45PM

MOI AVENUE M STEALING 13/3/2011 6.00PM

CENTRAL BUS

STA M STEALING 14/3/2011 11.00AM

RIVER ROAD F DRUGS 14/3/2011 8.45PM

MUNYU ROAD M CARJACKING 15/3/2011 10.30PM

CROSS ROAD F STEALING 16/3/2011 9.45AM

TOM MBOYA M ASSAULT 16/3/2011 10.30PM

MFANGANO M BURGLARY 16/3/2011 3.50AM

RIVER ROAD F

CAR

JACKING 17/3/2011 4.30AM

CITYHALL M CAR THEFT 17/3/2011 10.35AM

RIVER ROAD M FORGERY 17/3/2011 7.00AM

BANDA

STREET M DRUGS 17/3/2011 10.30AM

RONALD

NGALA M PRETENCE 18/3/2011 10.30AM

RACE COURSE F STEALING 18/3/2011 6.25PM

ACCRA ROAD M FRAUD 18/3/2011 5.10PM

RACE COURSE M STEALING 19/3/2011 5.00PM

74

Page 75: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

LUTHULI M FIGHTS 19/3/2011 11.50AM

QUARRY

ROAD M ASSAULT 20/3/2011 9.30AM

RACE COURSE F STEALING 20/3/2011 11.20AM

G.P.O F STEALING 20/3/2011 2.58PM

ZIWANI M BURGLARY 21/3/2011 10.00AM

NYAMAKIMA F STEALING 21/3/2011 1.00PM

MUTHURWA M DRUGS 22/3/2011 5.00PM

GIKOMBA M CAR JACK 22/3/2011 10.30PM

U O N F STEALING 23/3/2011 11.00AM

TEMPLE

ROAD M DRUGS 23/3/2011 6.00PM

LANDHIES

ROAD M PRETENCE 23/3/2011 8.00PM

KIONANGE M FRAUD 23/3/2011 8.30PM

RONALD

NGALA F FORGERY 24/3/2011 9.40AM

CROSS TOADS M PRETENCE 25/3/2011 9.00AM

TOM MBOYA F STEALING 25/3/2011 11.00AM

TOM MBOYA F STEALING 25/3/2011 4.30PM

AMBASSADOR M PRETENCE 26/3/2011 6.00AM

APPENDIX D: Attribute table for crime hotspot locations

PLACE CODE DATE/TIME LONG/LATIT ALTITUDE

Ambassador Amba1 3/27/2013 12:37 37 M 257997 9858095 1672 m

Central bus

station Cbs1 3/27/2013 15:18 37 M 258320 9857944 1648 m

Cbs2 3/27/2013 15:19 37 M 258285 9858008 1649 m

Cbs3 3/27/2013 15:22 37 M 258262 9858014 1654 m

Cbs4 3/27/2013 15:29 37 M 258248 9858017 1666 m

75

Page 76: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Central Police

Station Cent 2/28/2013 8:23 37 M 256139 9858718 1732 m

City Hall Cityh1 3/27/2013 16:37 37 M 257727 9858026 1660 m

Cityh2 3/27/2013 16:39 37 M 257625 9858007 1658 m

Cityh3 3/27/2013 16:42 37 M 257549 9857944 1658 m

Police Control

Room contrl 3/26/2013 17:01 37 M 255935 9856803 1736 m

Cross Road Cros1 3/27/2013 14:14 37 M 258507 9858344 1672 m

Cros2 3/27/2013 14:17 37 M 258388 9858414 1690 m

Cros5 3/27/2013 14:22 37 M 258212 9858545 1695 m

Cros6 3/27/2013 14:23 37 M 258176 9858554 1693 m

Gaberone

Gab1 3/27/2013 14:53 37 M 258163 9858318 1643 m

Globe Round

about Glb1 3/27/2013 12:02 37 M 257553 9858842 1704 m

Glb2 3/27/2013 12:04 37 M 257590 9858886 1698 m

Glb3 3/27/2013 12:07 37 M 257525 9858976 1695 m

Glb4 3/27/2013 12:10 37 M 257437 9858970 1699 m

Glb5 3/27/2013 12:13 37 M 257375 9858854 1698 m

General Post

Office GPO 3/28/2013 10:35 37 M 257244 9858062 1711 m

Haile Sellasie Hai1 3/27/2013 12:55 37 M 258319 9857761 1666 m

Hai2 3/27/2013 12:59 37 M 258491 9857857 1675 m

Hai3 3/27/2013 13:02 37 M 258610 9857923 1681 m

Kencom Bus

Station Ken1 3/28/2013 10:18 37 M 257495 9858209 1695 m

Ken10 3/28/2013 10:29 37 M 257045 9858028 1723 m

Ken11 3/28/2013 10:32 37 M 257157 9858037 1719 m

Ken3 3/27/2013 16:31 37 M 257805 9858113 1665 m

Ken4 3/27/2013 16:32 37 M 257813 9858109 1665 m

Kenc1 3/27/2013 16:28 37 M 257909 9858092 1666 m

Kimathi Sreet Kim1 3/28/2013 9:31 37 M 257788 9858187 1689 m

Kim2 3/28/2013 9:32 37 M 257769 9858193 1693 m

Kim3 3/28/2013 9:34 37 M 257648 9858309 1695 m

76

Page 77: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

Kim4 3/28/2013 9:38 37 M 257492 9858472 1692 m

Machakos Bus

M

cb1 3/27/2013 13:11 37 M 258940 9858071 1648 m

Mcb3 3/27/2013 13:13 37 M 258988 9858031 1651 m

Mcb4 3/27/2013 13:14 37 M 259041 9858031 1655 m

Mcb5 3/27/2013 13:16 37 M 258995 9858088 1661 m

Kirinyaga Road Kiri1 3/27/2013 11:37 37 M 258606 9858483 1677 m

Kiri2 3/27/2013 11:40 37 M 258457 9858492 1687 m

Kiri5 3/27/2013 11:53 37 M 257662 9858732 1675 m

Kiri6 3/27/2013 11:56 37 M 257572 9858782 1687 m

Koinange Street Koi1 3/28/2013 10:39 37 M 257183 9858258 1701 m

Koi3 3/28/2013 10:42 37 M 257120 9858392 1692 m

New Pumwani Pumu 3/27/2013 13:48 37 M 258623 9858127 1660 m

Pumu 3/27/2013 13:49 37 M 258577 9858160 1667 m

Pumu 3/27/2013 13:50 37 M 258551 9858163 1675 m

Pumu 3/27/2013 13:52 37 M 258611 9858116 1679 m

Landhies Road Land1 3/27/2013 13:27 37 M 259402 9858203 1656 m

Land2 3/27/2013 13:31 37 M 259359 9858178 1667 m

Land4 3/27/2013 13:34 37 M 259248 9858119 1673 m

Land5 3/27/2013 13:41 37 M 258813 9858120 1663 m

77

Page 78: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

78

Page 79: Theft and banditry - Latest News in Geospatial and Space ...geospatial.uonbi.ac.ke/sites/default/files/cae... · Web viewA project report submitted to the Department of Geospatial

79


Recommended