Grid Policing All Crime stems from invasion by foreign militaries that cause the local populace stress. 1. History of Policing and inabilities 2. Todayâs Policing and its inabilities 3. Crime as Invasion by Foreign military 4. Basic tools of police units to fight foreign military invasion 5. City grids as analogized to computer mother boards 6. Open Date source collection on city grids 7. Crime analogized to viral and anti viral programming (Data Sequences) 8. The Daily officer criminal research program 9. How to Use Grid Policing as a legal treaties 10. Further studies, use of this material and ways to expand the invasion mindset. âCrime is Just invasion, a social program element of deletion of a culture.â Chapter 1 History of Policing and its Inabilities Idea to show sequence of evolution of policing. Find historical elements of policing do an evolutionary evolution of problems officers had to deal with when enforcing codes. The Evolving Strategy of policing https://ncjrs.gov/pdffiles1/nij/114213.pdf The History of the Police http://www.sagepub.com/upm-data/50819_ch_1.pdf The History of Crime Mapping and Its Use by American Police Departments http://justice.uaa.alaska.edu/forum/23/3fall2006/a_crimemapping.html History of Problem-Oriented Policing http://www.popcenter.org/about/?p=history The Early Days of American Law Enforcement http://www.nleomf.org/museum/news/newsletters/online-insider/2012/April-2012/early-days-american-law-enforcement-april-2012.html History of Urban policing http://www.umass.edu/legal/Benavides/Spring2005/397G/Readings%20397G%20Spring%202005/6Monnkonen.pdf The Evolution and Development of Police Technology http://www.police-technology.net/id59.html American Police Equipment: A Guide to Early Restraints, Clubs and Lanterns http://books.google.com/books?id=OHgh0mHgrWYC&printsec=frontcover&dq=police+tools&hl=en&sa=X&ei=Pwu3UsS5IpHxoATJjYLABw&ved=0CEAQ6AEwAA#v=onepage&q=police%20tools&f=false Chapter 2 Todayâs Policing and its inabilities The Darkness History of policing is based on the idea of structuring society around a system that will allow folks to move through the grid. Without it the grid would be constantly impassable. The system is a structure of lines of communication. Today Police officers are not taught analogies of war or computer programming. They see the world through the windshield or a form piece of paper. It is very difficult for officers to stop foreign militaries from taken over their grids. As they canât understand what it is that is happening to them. Problem Oriented Policing http://www.cops.usdoj.gov/Default.asp?Item=2559 Crime, Corruption and Cover-ups http://www.uic.edu/depts/pols/ChicagoPolitics/policecorruption.pdf Measuring the Performance of Law Enforcement Agencies - Part 1 of a 2-Part article http://www.calea.org/calea-update-magazine/issue-83/measuring-performance-law-enforcement-agencies-part-1of-2-oart-articl Mapping Crime Principle and Practice https://www.ncjrs.gov/pdffiles1/nij/178919.pdf INTRODUCTION: CRIME MAPPING AND CRIME PREVENTION http://www.popcenter.org/library/crimeprevention/volume_08/01-Introduction.pdf INTRODUCTORY GUIDE TO CRIME ANALYSIS AND MAPPING http://www.cops.usdoj.gov/Publications/introguidecrimeanalysismapping.pdf Fundamentals of Crime Mapping: Principles and Practice http://books.google.com/books?id=LcW35wDU1_cC&pg=PT21&lpg=PT21&dq=history+of+crime+mapping&source=bl&ots=9wAVcvJHXs&sig=cvl-mm7O7ZFPE1_CtMnfrvrlJek&hl=en&sa=X&ei=zAS3UuXDHorqoASRxYKwCA&ved=0CF4Q6AEwCDgK#v=onepage&q=history%20of%20crime%20mapping&f=false Chapter 3 Crime as Invasion by Foreign military http://en.wikipedia.org/wiki/List_of_Crime_Invasion_episodes A LITTLE PHILOSOPHY ON POPULATION AND CRIME! http://belize1.com/BzLibrary/trust359.html An Excursus on the Population Size-Crime Relationship http://wcr.sonoma.edu/v5n2/manuscripts/chamlin.pdf Immigration and crime http://en.wikipedia.org/wiki/Immigration_and_crime Mexico 'Invades' Texas: 33 Soldiers Cross Border in Humvees http://abcnews.go.com/Blotter/mexico-invades-texas-33-soldiers-cross-border-humvees/story?id=14173304 U.S. ABP & U.S. drones flying over Mexico detecting military drug/human trafficking camps http://www.renewamerica.com/columns/webster/110401 H. J. Anslinger, NARCOTIC DRUGS AND GENOCIDE Editor, American Journal of Psychiatry: (07/09/2013 5:53), http://ajp.psychiatryonline.org/article.aspx?articleID=143615 Lee Morgan II, USA: Reapers Line - Life and Death on the Mexican Border, (07/09/2013 5:53), http://www.amazon.com/Reapers-Line-Death-Mexican-Border/dp/1933855576 Linda Bentley, Paving the way to Aztlan with propaganda, politics, racism Planned Invasion continues (07/09/2013 5:53), http://www.americanpatrol.com/REFERENCE/Aztlan-PavingWayTo.html Mexican Consulate, MEXICAN ARMY CORRUPTED AND NOW LARGEST DRUG CARTEL IN MEXICO (07/09/2013 5:53), http://www.mexico-consulate.org/news/mexican-army-corrupted-and-now-largest-drug-cartel-in-mexico.html?utm_source=twitterfeed&utm_medium=twitter Mexican Military invading the United States, (07/09/2013 5:53), http://www.youtube.com/watch?v=zYeRs0g3Vf4 Randal C. Archibold, Home Invasions and Kidnappings from the Mexican Drug War Explode into the U.S. (07/09/2013 5:53), http://www.alternet.org/story/134380/home_invasions_and_kidnappings_from_the_mexican_drug_war_explode_into_the_u.s. Reconquista Mexican Consulate Claims US belongs to Mexico! (07/09/2013 5:53), http://www.youtube.com/watch?v=XmqxRF81g0k âPFP Nab Military Officer Doubling as Alien Smuggler in Tabasco State,â El Liberal del Sur. March 18, 2004. FBIS LAP20040318000105 http://flag.blackened.net/revolt/mexico/reports/amc_rfm_confront_aug99.html U.S. soldiers accepting cash, drugs for Mexican drug cartel contract hits http://www.nydailynews.com/news/national/drug-cartels-mexico-hire-u-s-soldiers-assassins-article-1.1454851 Unrestricted Warfare http://en.wikipedia.org/wiki/Unrestricted_Warfare http://mesharpe.metapress.com/app/home/contribution.asp?referrer=parent&backto=issue,3,4;journal,50,250;linkingpublicationresults,1:110924,1 What Causes Crime? http://www.lawlink.nsw.gov.au/lawlink/bocsar/ll_bocsar.nsf/vwFiles/cjb54.pdf/$file/cjb54.pdf Chapter 4 Basic Tools of Police units to fight invasion Visual Analytics Law Enforcement Toolkit http://www.purdue.edu/discoverypark/vaccine/assets/pdfs/publications/pdf/Visual%20Analytics%20Law%20Enforcement%20Toolkit.pdf Police Innovation: Contrasting Perspectives http://books.google.com/books?id=QA04JQBh__sC&pg=PA290&dq=police+tool+kits&hl=en&sa=X&ei=8Qq3Upa4Jo7foASekoCoDQ&ved=0CFoQ6AEwBA#v=onepage&q=police%20tool%20kits&f=false Police Powers and Accountability in a Democratic Society: http://books.google.com/books?id=cVAOfvU1o-wC&pg=PA94&dq=police+tools&hl=en&sa=X&ei=Pwu3UsS5IpHxoATJjYLABw&ved=0CEUQ6AEwAQ#v=onepage&q=police%20tools&f=false International Police Cooperation: Emerging Issues, Theory and Practice http://books.google.com/books?id=eMImuZGVPPMC&pg=PT116&dq=police+tools&hl=en&sa=X&ei=Agy3UsyFEsX9oATy4oCIBA&ved=0CEMQ6AEwATgU#v=onepage&q=police%20tools&f=false Intelligent Control: Developments in Public Order Policing in Canada http://books.google.com/books?id=7_orShuXhHIC&pg=PA299&dq=police+tools&hl=en&sa=X&ei=Agy3UsyFEsX9oATy4oCIBA&ved=0CGkQ6AEwBzgU#v=onepage&q=police%20tools&f=false Police Administration http://books.google.com/books?id=ywUkdOg-gyAC&pg=RA1-PT25&dq=police+tools&hl=en&sa=X&ei=Agy3UsyFEsX9oATy4oCIBA&ved=0CHAQ6AEwCDgU#v=onepage&q=police%20tools&f=false Security Banking Social Engineering: A Record of Things Done by American Industrialists http://books.google.com/books?id=z2vq5tvnn-EC&printsec=frontcover&dq=social+engineering&hl=en&sa=X&ei=CxW3Utz_HtTCoATJ8oDADQ&ved=0CFwQ6AEwCA#v=onepage&q=social%20engineering&f=false Crimefighting with Cash http://tvtropes.org/pmwiki/pmwiki.php/Main/CrimefightingWithCash Get rich fighting crime! Save the girl â and make big money doing it â by correcting one simple error in your thinking. http://selfadoration.com/get-rich-fighting-crime/5366 Fighting crime through superior steak http://www.economist.com/blogs/democracyinamerica/2013/10/asset-forfeiture Strategic Finance for Criminal Justice Organizations http://books.google.com/books?id=oVw8b_67vBsC&pg=PT98&dq=fighting+crime+with+asset+seizures&hl=en&sa=X&ei=1BXKUt6YMs36oATrxYHwBA&ved=0CFQQ6AEwBA#v=onepage&q=fighting%20crime%20with%20asset%20seizures&f=false http://books.google.com/books?id=IWL-0TFA600C&pg=PA39&dq=fighting+crime+with+asset+seizures&hl=en&sa=X&ei=ERbKUqvdK83coATYwoDYBw&ved=0CD8Q6AEwADgU#v=onepage&q=fighting%20crime%20with%20asset%20seizures&f=false Fighting Corruption in Transition Economies Fighting http://books.google.com/books?id=Q9grT-0irUgC&pg=PA125&dq=fighting+crime+with+asset+seizures&hl=en&sa=X&ei=ERbKUqvdK83coATYwoDYBw&ved=0CF4Q6AEwBjgU#v=onepage&q=fighting%20crime%20with%20asset%20seizures&f=false Economic and Financial Analysis for Criminal Justice Organizations http://books.google.com/books?id=pYNFAQAAQBAJ&pg=PA443&dq=funding+criminal+justice&hl=en&sa=X&ei=shbKUtT6K8P6oASd84CYBg&ved=0CEoQ6AEwAjge#v=onepage&q=funding%20criminal%20justice&f=false non profits and crime fighting ideas http://www.arnoldfoundation.org/our-team spoils of war Military use Civilian Contractors under Military Law http://www.army.mil/professionalWriting/volumes/volume5/november_2007/11_07_4.html The Privatization of War: Mercenaries, Private Military and Security Companies http://www.globalresearch.ca/the-privatization-of-war-mercenaries-private-military-and-security-companies-pmsc/21826 The Long Arm of the Law: The Military Extraterritorial Jurisdiction Act http://www.aca.org/fileupload/177/ahaidar/McCarron.pdf Unarmed but How Dangerous? Civilian Augmentees, the Law of Armed Conflict, and the Search for a More Effective Test for Permissible Civilian Battlefield Function http://jnslp.com/wp-content/uploads/2010/08/02_cornJCS111008-PR.pdf Department of Defense Citizen Services http://www.cpms.osd.mil/Subpage/Services/ Military police work alongside civilian police aboard air station http://www.3rdmaw.marines.mil/News/NewsArticleDisplay/tabid/8112/Article/158855/military-police-work-alongside-civilian-police-aboard-air-station.aspx The Armed Citizen Project Hopes to Fight Crime by Giving Out Free Guns http://www.psmag.com/navigation/politics-and-law/nonprofit-hopes-to-fight-crime-by-giving-out-free-guns-60543/ How to Make a Citizen's Arrest http://www.wikihow.com/Make-a-Citizen%27s-Arrest Groups strategies Find Crime & Law Nonprofits and Charities http://greatnonprofits.org/categories/view/crime-and-law Criminal Justice Non Profits http://www.guidestar.org/SearchResults.aspx Criminal Justice Programs http://www.criminaljusticeprograms.com/states/california/ JOURNALS WITH CRIMINAL JUSTICE, SOCIOLOGY, AND SOCIAL SCIENCE RELATED ARTICLES http://www.faculty.umb.edu/william.holmes/cjjour.htm National Criminal Justice Reference Services https://www.ncjrs.gov/tutorial/scanperiodical.html International Criminal Justice Institutes, Organizations, and Resources http://www.acjs.org/pubs/167_2105_13933.cfm Criminal Division Organizations http://www.justice.gov/criminal/about/list.html Professional Organizations http://www.unco.edu/criminaljustice/professional_organizations.html The Campbell Association http://www.campbellcollaboration.org/crime_and_justice/index.php Chapter 5 City grids as analogized to computer mother boards Relational Database Design and Implementation: Clearly Explained http://books.google.com/books?id=O3Qdc2yb_JoC&pg=PA331&dq=malware+virus+explained&hl=en&sa=X&ei=rA63UpDrDsPooASA3YLwBw&ved=0CF0Q6AEwBQ#v=onepage&q=malware%20virus%20explained&f=false Recent Advances in Intrusion Detection: http://books.google.com/books?id=tgkLPU0aYukC&pg=PA83&dq=malware+virus+explained&hl=en&sa=X&ei=kA3UunYEpLZoAThi4DAAg&ved=0CEkQ6AEwAjgK#v=onepage&q=malware%20virus%20explained&f=false Data Mining Tools for Malware Detection http://books.google.com/books?id=TqXXRj4R8SwC&pg=PT250&dq=malware+virus+explained&hl=en&sa=X&ei=FRC3Up-sJdDroATz_ICYAQ&ved=0CD8Q6AEwADgU#v=onepage&q=malware%20virus%20explained&f=false PC Hardware in a Nutshell http://books.google.com/books?id=kG8LcWfruOAC&pg=PT19&dq=how+the+motherboard+works&hl=en&sa=X&ei=fxC3Ure9BcvwoATniYLwAw&ved=0CFEQ6AEwBg#v=onepage&q=how%20the%20motherboard%20works&f=false Social Ecological Mapping of Physical Activity Behaviours and Health Outcomes in Deprived Inner-city Communities http://www.staffs.ac.uk/schools/sciences/geography/links/IESR/projects_mrc.shtml The Science of the City: Statistical Mapping in Paris and London, c1840-1940 http://www.gla.ac.uk/schools/socialpolitical/research/urbanstudies/projects/science%20of%20the%20city/ The Social-Ecological Model: A Framework for Violence Prevention http://www.cdc.gov/violenceprevention/pdf/sem_framewrk-a.pdf Developer's Guide to Social Programming: http://books.google.com/books?id=1n0Znj0QlTQC&printsec=frontcover&dq=understanding+social+programming&hl=en&sa=X&ei=vBO3UsHXMJD2oAST-oHIAg&ved=0CD0Q6AEwAw#v=onepage&q=understanding%20social%20programming&f=false Saving Souls, Serving Society http://books.google.com/books?id=wD9o4rYo1SYC&pg=PA100&dq=understanding+social+programming&hl=en&sa=X&ei=vBO3UsHXMJD2oAST-oHIAg&ved=0CE8Q6AEwBg#v=onepage&q=understanding%20social%20programming&f=false Computer Applications in the Social Sciences http://books.google.com/books?id=5KtoPaM6r9EC&pg=PA68&dq=understanding+social+programming&hl=en&sa=X&ei=vBO3UsHXMJD2oAST-oHIAg&ved=0CFYQ6AEwBw#v=onepage&q=understanding%20social%20programming&f=false Intervention Research : Developing Social Programs: Developing Social Programs http://books.google.com/books?id=QEh5dD-a-EgC&pg=PA95&dq=understanding+social+programming&hl=en&sa=X&ei=vBO3UsHXMJD2oAST-oHIAg&ved=0CGIQ6AEwCQ#v=onepage&q=understanding%20social%20programming&f=false Social Engineering: The Art of Human Hacking http://books.google.com/books?id=9LpawpklYogC&printsec=frontcover&dq=understanding+social+programming&hl=en&sa=X&ei=tBS3UvmkOo_noAS1l4GwDA&ved=0CFcQ6AEwBzgK#v=onepage&q=understanding%20social%20programming&f=false Making Men Moral: Social Engineering During the Great War http://books.google.com/books?id=Ib9pqyUEIOkC&printsec=frontcover&dq=social+engineering&hl=en&sa=X&ei=CxW3Utz_HtTCoATJ8oDADQ&ved=0CEoQ6AEwBQ#v=onepage&q=social%20engineering&f=false The Art of Deception: Controlling the Human Element of Security http://books.google.com/books?id=OIy4F-8b_uEC&printsec=frontcover&dq=social+engineering&hl=en&sa=X&ei=CxW3Utz_HtTCoATJ8oDADQ&ved=0CFUQ6AEwBw#v=onepage&q=social%20engineering&f=false Hacking the Human: Social Engineering Techniques and Security Countermeasures http://books.google.com/books?id=U1IihJpdrGwC&printsec=frontcover&dq=social+engineering&hl=en&sa=X&ei=CxW3Utz_HtTCoATJ8oDADQ&ved=0CEQQ6AEwBA#v=onepage&q=social%20engineering&f=false Engineering and Social Justice http://books.google.com/books?id=7B9heYIbIosC&printsec=frontcover&dq=software+engineering+and+social+engineering&hl=en&sa=X&ei=rxe3UoayLsqEogToiYDoDg&ved=0CEsQ6AEwAg#v=onepage&q&f=false Citizen Engineer: A Handbook for Socially Responsible Engineering http://books.google.com/books?id=Qia6bLQE0g0C&printsec=frontcover&dq=software+engineering+and+social+engineering&hl=en&sa=X&ei=rxe3UoayLsqEogToiYDoDg&ved=0CGgQ6AEwBw#v=onepage&q&f=false Putting Fear of Crime on the Map: Investigating Perceptions of Crime Using http://books.google.com/books?id=9KOnDYq3QTEC&pg=PA97&dq=city+engineering+and+crime&hl=en&sa=X&ei=axi3Ur2dIYLtoATlwIGgBg&ved=0CC0Q6AEwAA#v=onepage&q=city%20engineering%20and%20crime&f=false City of Suspects: Crime in Mexico City http://books.google.com/books?id=IrMbd8Ip5rEC&pg=PA11&dq=city+engineering+and+crime&hl=en&sa=X&ei=axi3Ur2dIYLtoATlwIGgBg&ved=0CEMQ6AEwBA#v=onepage&q=city%20engineering%20and%20crime&f=false Chapter 6 Open Data source collection on city grids Chapter 7 Crime analogized to viral and anti viral programming (Data Sequences) Malware: Fighting Malicious Code http://books.google.com/books?id=TKEAQmQV7O4C&printsec=frontcover&dq=malware+virus+explained&hl=en&sa=X&ei=rA63UpDrDsPooASA3YLwBw&ved=0CEAQ6AEwAA#v=onepage&q=malware%20virus%20explained&f=false Digital Forensics Explained http://books.google.com/books?id=fummOICB9IgC&pg=PA52&dq=malware+virus+explained&hl=en&sa=X&ei=rA63UpDrDsPooASA3YLwBw&ved=0CFgQ6AEwBA#v=onepage&q=malware%20virus%20explained&f=false Malware Protection: Protection and Removal of Malware http://books.google.com/books?id=-wwJ-BcHx8UC&pg=PA29&dq=malware+virus+explained&hl=en&sa=X&ei=rA63UpDrDsPooASA3YLwBw&ved=0CGMQ6AEwBg#v=onepage&q=malware%20virus%20explained&f=false Malware Forensics: Investigating and Analyzing Malicious Code http://books.google.com/books?id=lRjO8opcPzIC&pg=PR23&dq=malware+virus+explained&hl=en&sa=X&ei=kA-3UunYEpLZoAThi4DAAg&ved=0CFsQ6AEwBjgK#v=onepage&q=malware%20virus%20explained&f=false The Hidden Face of Terrorism: The Dark Side of Social Engineering, http://books.google.com/books?id=fcS_JAhHSREC&printsec=frontcover&dq=social+engineering&hl=en&sa=X&ei=Aha3UqKzA4ntoASjsIDYDQ&ved=0CGEQ6AEwCDgK#v=onepage&q=social%20engineering&f=false Crime Control Community http://books.google.com/books?id=RfDog7wF1l4C&pg=PT58&dq=Social+engineering+and+crime&hl=en&sa=X&ei=PRe3UrmNAcqEoQTqm4HgDw&ved=0CCwQ6AEwADgU#v=onepage&q=Social%20engineering%20and%20crime&f=false Chapter 8 The Daily Officer Criminal Research Program Chapter 9 How to use Grid policing as legal treaties Chapter 10 Further Studies, use of this material expand mindset. Extra citations Crime Mapping Best Practices Manual Applications of Mapping  Malm, Aili E., Kinney, J. Bryan, & Pollard, Nahanni R. (2008). Social Network and Distance Correlates of Criminal Associates Involved in Illicit Drug Production. Security Journal, Vol. 21, p. 77-94. Ratcliffe, Jerry H. & Rengert, George F. (2008). Near-Repeat Patterns in Philadelphia Shootings. Security Journal, Vol. 21, p58-76. Rossmo, D. Kim, Thurman, Quint C., Jamieson, J.D., & Egan, Kristine. (2008).Geographic Patterns and Profiling of Illegal Crossings of the Southern U.S. Border.Security Journal, Vol. 21, p. 29-57. Smith, Martha J. (2008). Addressing the Security Needs of Women Passengers on Public Transport. Security Journal, Vol. 21, p. 117-133. Johnson, Shane D., Birks, Daniel J., McLaughlin, Lindsay, Bowers, Kate J., & Pease Ken. (2007). Prospective Crime Mapping in Operational Context, Final Report. Home Office Online Report. Schultz, Chief Paul. (2007). Crime Mapping Used as Effective Crime Prevention Tool.Big Ideas for Smaller Police Departments, p. 1-3. Groff, E. & McEwen, T. (2006). Exploring the Spatial Configuration of Places Related to Homicide Events. National Institute of Justice. Weisel, D. Smith, W, Garson, G, Pavlichev, A, & Wattrell, J. (2006). Motor Vehicle Theft: Crime and Spatial Analysis of a Non-Urban Region. Special Report, Washington D.C: National Institute of Justice. Bhati, A. (2004). Robust Spatial Analysis of Rare Crimes, Final Report. Mapping and Analysis for Public Safety Program, National Institute of Justice. Anselin, L., Cohen, J., Cook, D., Gorr, W., & Tita, G. (2000). Measurement and Analysis of Crime and Justice: Spatial Analyses of Crime. Criminal Justice 2000, Vol. 4. Washington, D.C.: National Institute of Justice, pp. 213-262. Defensible Space Malleson, N., A. Evans, et al. (2009). An agent-based model of burglary. Environment and Planning B: Planning and Design 36(6): 1103-1123. Geocoding Zandbergen, Paul A., & Green, Joseph W. (2007). Error and Bias in Determining Exposure Potential of Children at School Locations using Proximity-Based GIS Techniques. Environmental Health Perspectives, Vol. 115, p. 1363-1370. Leipnik, Dr. Mark R. & Lorca, Jennifer R. (2005). Addressing and Geocoding of Demographic Data on a Global Basis. ESRI Training and Education Library. Nicoara, Greta. (2005). Exploring the Geocoding Process: A Municipal Case Study using Crime Data. The University of Texas at Dallas. Whitsel, Eric A., Rose, Kathryn M., Wood, Joy L., Henley, Amanda C., Liao, Duanping, & Heiss, Gerardo. (2004). Accuracy and Repeatability of Commercial Geocoding. American Journal of Epidemiology, Vol. 160, p. 1023-1029. Cayo, Michael R. & Talbot, Thomas O. (2003). Positional Error in Automated Geocoding of Residential Addresses. International Journal of Health Geographics, Vol. 2. Mills, Jack. Tainât Necessarily So: Address Geocoding in the Real World. Hotspots Grubesic, T. H. (2010). Sex offender clusters. Applied Geography 30(1): 2-18. Maciejewski, R., S. Rudolph, et al. (2010). A Visual Analytics Approach to Understanding Spatiotemporal Hotspots. Visualization and Computer Graphics, IEEE Transactions on 16(2): 205-220. Filbert, Katie. (2008) Targeting Crime in Hot Spots and Hot Places. Geography & Public Safety, Vol. 1, 4-7. Chainey, Spencer, Tompson, Lisa, & Uhlig, Sebastian. (2008). The Utility of Hotspot Mapping for Predicting Spatial Patterns of Crime. Security Journal, Vol. 21, p. 4-28. Eck, John E., Chainey, Spencer, Cameron, James G., Leitner, Michael, & Wilson, Ronald E. (2005). Mapping Crime: Understanding Hot Spots. NIJ, Special Report. Washington D.C.: National Institute of Justice. Background Information Chamard, S. (2006). The History of Crime Mapping and Its Use by American Police Departments. Alaska Justice Forum. Implementing & Using a Mapping Program (General) Mielke, Philip. (2008). Using ModelBuilder for Geographic Information System Tasks.Geography & Public Safety, Vol. 1, 8-10. Burnett, Ed. (2007). Crime Analysis Reporting and Mapping for Small Agencies: A Low-Cost and Simplified Approach. FBI Law Enforcement Bulletin, Vol. 76, p. 15-22. Bichler, G, Balchak, S., & Christie, J. (2004). Address Matching Bias: Ignorance is not Bliss. Presented at the 12th International Symposium of Environmental Criminology and Crime Analysis. (July 1-42004). New Zealand. Stoe, Debra A., Watkins, Carol R., Kerr, Jeffrey, Rost, Linda, & Craig, Theodosia. (2003). Using Geographic Information Systems to Map Crime Victim Services. U.S. Department of Justice, Office of Justice Programs, Office for Victims of Crime. Travis, Lawrence F., III, & Hughes, Col. Kenneth D. (2002). Mapping in Police Agencies: Beyond this Point There by Monsters. Overcoming the Barriers: Crime Mapping in the 21st Century. Washington D.C.: Police Foundation. Garson, G.D., & Vann, I.B. (2001). Geographic Information Systems for Small and Medium Law Enforcement Jurisdictions. Raleigh, North Carolina: Governorâs Crime Commission. Boba, R. (2000). Guidelines to Implement and Evaluate Crime Analysis and Mapping in Law Enforcement Agencies. Washington D.C.: Police Foundation. Harries, K. (1999). Mapping Crime: Principle and Practice. Washington D.C.: National Institute of Justice. Sharing Data Across Jurisdictions Eck, John E. (2002). Crossing the Borders of Crime: Factors Influencing the Utility and Practicality of Interjurisdictional Crime Mapping. Overcoming the Barriers: Crime Mapping in the 21st Century, Washington, D.C.: Police Foundation. Wartrell, J. & McEwen, Thomas. (2001). Privacy in the Information Age: A Guide for Sharing Crime Maps and Spatial Data. Washington D.C.: U.S. Department of Justice. Crime Mapping News, Vol. 2, Issue 3, Summer 2000.