You are on page 1of 48

This is the l"lAffidavit of Kim Rossmo in this case and was made on the r{lttsy s1 October,2012.

Action No. 5112969 Vancouver Registry


IN SUPREME COURT OF BRITSH COLUMBIA

Between:

Amanda Elizabeth Ladas


Plaintiff And:

Apple Inc,
Defendant

"Brought under the Class Proceedings Act, RSBC 1996, c. 50"


AFFIDAVIT

l, Kim Rossmo, Professor and Geographic


THAT:

Profiler, c/o Suite 302-1224 Hamilton

Street, in the City of Vancouver, Province of British Columbia, MAKE OATH AND SAY

1.

Attached hereto and marked as Exhibit "4" to this my affidavit is a true copy of

my expert report herein dated September 2012.

SWORN BEFORE ME at the Citv of

et:+.L, '-f{. Kn<

jn

tre
,

grff)
z$l-

this

day of

October, 2012.

Kim Rossmo

tu

MICHELE MUNIZ

i.XtS vy'commisionExpires ;i':ls Morch 20,20]3

Notary Public, State of Texas

GenLiA9ST2laff#1 of Kim Rossmo

Introduction
This report was prepared by Dr. Kim Rossmo of Austin, Texas. My areas of expertise
include geographic profiling and investigations. A curriculum vit, outlining my qualifications,
employment, and education experience in my areas of expertise, is attached.

Instructions Provided and Nature of Opinion Sought

I was asked to prepare a report setting out possible

uses, misuses and ramifications related to

and arising from the collection and storage of locational and other data on Apple smart devices,
as demonstrated

by Francis Graf in connection with the Plaintiff s claims made in the Action.

This opinion relates to the issue of damages in this proceeding.

Opinion My opinion and findings are laid out in the Consequences section below.

Reasons for Opinion Assumptions

This report assumes that an Apple smart device (e.g., iPhone) running the iOS4x operating
system generates an unencrypted backup file containing location and date/time information for a

one-year period stored

in a consolidated.db database file (re iOS4x Location Based Services

Analysis Report, June 6, 2012, by Francis Graf).

Methodologv

This report discusses possible misuses of the unencrypted backup file on Apple smart
devices running the iOS4x operating system, focusing on the loss of privacy implications for the

user. The likelihood of these misuses is not evaluated. The references used in the preparation
this report are listed at the end.

of

dvice and Certification

I certifu that I afirawate of my duty to assist the court and not bo an advocate for any party,
that I have made this report in conformity with that duty; and that I will, or written testimony, give that testimony in conformity with that duty.

if

called on to give oral

I am responsible for the contents of this report.


Respeetfu lly submitted,

D. Kim Rossmo, PhD

Introduction
Our daily routines, travels, and destinations say much about our lives. Many of our personal

activities can be inferred from where we go, when we travel, and how long we stay somewhere. Just as we wish to keep our private conversations, financial status, and credit card purchases private, we also do not want to be electronically "shadowed." Unfortunately,

it

appears that an

Apple smart device, such as the iPhone, which uses the iOS4x operating system, generates an
unencrypted backup

file containing location and date/time information for a one-year period


file (Graf, 2012).

stored in a consolidated.db database

The potential loss of privacy consequences to the user from this backup file depend upon

two factors: (1) the information that can be derived from the file's data (a function of
measurement precision, data comprehensiveness, and analic potential); and (2) from who can
access that data (exposure).

1.

Information

The more information that can be derived from the data in the backup file,

the greater the loss of privacy. The information potential depends on the precision and
comprehensiveness of the data and on its analyic potential.

a.

Precision

The more precisely an iPhone or similar Apple smart device determines

the position of a user, and the more precisely the time is recorded for when a user
was at a given position, the greater the loss of privacy.

b.

Comprehensiveness

- The higher the proportion

of a user's movements recorded in

the backup file, the greater the privacy loss. Similarly, the longer the recording
period, the greater the privacy loss.

c.

Analytic Potential

Location and time data can be mapped, measured, and analyzed


measures.

in a number of different ways, and can be used to generate derivative

The greater the analytic potential of this information for inferring actions of the
user, the greater his or her privacy loss.

2.

Exposure

The potential privacy loss consequences depend on who (i.e., individuals,

companies, and organizations) can access the user's Apple device backup file.
These factors are discussed in more detail below.

Information
Precision

The backup file contains the locations of cellular telephone towers and V/iFi sites that are
near the device when

it is

used, not the exact location of the device itself (Apple Press,

20ll).

This results in a loss of precision as there is almost always some distance between a device and
even the nearest cell tower or WiFi

site. Furthermore, in an urban

area, there are usually a

number of different cell towers and V/iFi sites within range of a device. Depending on how long

a device was operated in a given area, multiple locations


distances

in different directions and varying

- will be recorded. The level of geographic

accracy therefore depends on the density

of both cell phone towers and V/iFi locations in the surrounding atea, and on the street pattern or highway network during travel.
Each location entry in the backup file includes the date and time the consolidated.db file was updated; consequently, a large number of entries have the same date and

time. The exact date


(it is not

and time a position was recorded by the device is apparently not available from the f,rle

known

if

Apple has a way of accurately determining date/time information). Therefore,

temporal precision is

low. Only a date-time interval

can be determined, equal to the lag between

updates. The more often this happens, the narrower will be this range.

Comprehensiveness

The proportion of a user's movements recorded in the backup file appears to be related to how often the Apple device is used and how it is used. An individual who frequently uses his or her iPhone, especially while traveling,
recorded in the file.

will have a greater proportion of his or her movements

The recording period for the backup file is one year. An individual engages in many
activities and much travel in a year, so consequently the file provides a great deal of personal information about a user (Graf, 2012).

Anal)tic Potential Even with the precision limitations discussed above, certain analyic techniques exist that
can improve geographic and temporal accuracy. For a stationary device, measures of geographic

central tendency such as the spatial mean, the spatial median, or the centre of minimum distance.

Figure 1 shows these measures for the WiFi sites from an Apple iPhone user's backup file (the
red circles are WiFi sites, the black triangle is the spatial mean, the white triangle is the spatial
median, and the yellow triangle is the centre of minimum distance). All three measures fall very

close to the user's offrce at 612 View Street, Victoria, British Columbia (marked with a blue
square), where she used her iPhone. Figure 2 shows the same measures for cell tower locations.

In this case, proximity to the user's office is lower, most likely because there were fewer towers and their backcloth (i.e., their distribution

in

space)

is less uniform. However,

geographic

profiling, a more robust technique that is less sensitive to skewed spatial distributions, located
the user's office

within

a block (see Figures 3 and 4).

ooo
son St

oo

Cormoranl Sl

i.. *t

:':

tsandoa

ye

Pan

a
a a

soe St

a a

oo
a

I
aa .
oa

e
s,
.lD

to 1.. t.o a

.t.
a

t.

. ' ,.

vtew S

oa

Vrclona Harour . /,laler Aerodrome 4

^i gr

tZ'

I .
ro

.t.t

a ?

Figure 1. Measures of geographic central tendency for WiFi sites.

q
r
h.*4,
a
Andeon Pak

G*F46

+
.f
rdve
t,

Rd l

a
a

Commmity Grrden

a
tllbri
Sr

B-fsr

)$

s

(J
u)

t'

anrbraAve

Johnh"
t I

af
Fairf
D

el(a

Figure

2. Measures of cental tendency for cell phone towers.

I
Figure

:-zView St.

3. Geoprofle of cell phone towers.

Figure

4. Geoprofile eak

1%) of cell phone towers.

A moving device has only

a couple

of seconds to make a connection to a cell phone tower or

WiFi site. Consequently, there are fewer entries in a given arcaand it is much easier to discern
the user's movement, direction of travel, and often specific route (see Graf,2072).

Even though only the date and time the consolidated.db database file was updated is
recorded, it appears the locations are recorded in the file in chronological order. For example, all

the entries for an iPhone user's travel along British Columbia Highway 4 Parksville

from Port Albemi to

show a date-time stamp of 11/18/1

6:25 pm (Graf, 2012). However, as can be seen

in Figure 5, moving from west to east the row number of the entry increases (e.g., 4685,4692,
4693, 4700,4709). Consequently, even though individual entries do not have an accurate time

10

stamp, they are listed in chronological order. This is consistent with the offrcial description

of

how the iPhone operates (Apple Press, 20lI).

lrl
a

Figure 5. iPhone user's travel route on British Columbia Highway 4.

A location entry can therefore be both

placed in chronological order in relationship to the

other location entries in the file, and bracketed by date and time (before or equal to its recorded date-time and after the date-time of the prior update). This means that longer movements (i.e.,
greater than the median distance to nearby

'WiFi

sites, or approximately 100-200 meters in an

urban core) by the user can usually be detected from the consolidated.db update

file.

Finally,

logical inferences regarding starting times and speed allow for funher temporal accuracy. For
example,

if a user traveled from his work site to abar, the arrival time

can be estimated from

knowing when he usually left work, the distance between his work site and the bar, and the speed

limit.

11

It may be possible to use the location data in the consolidated.db update file to make several
inferences:

the location of the user's home - the location the user most commonly visited, at
daily intervals, and where the user typically spends the night
the location of the user's work

the location regularly visited during business hours,

on weekdays but not weekends, typically involving no movement for several hours

the locations where the user's relatives, relationships, and friends reside

residential

locations regularly visited, particularly during the evenings or on weekends the location(s) of the user's significant relationships

residential locations regularly

visited, particularly during the evenings, on weekends, or ovemight

o o o

the locations where the user engages in social activities

locations visited outside

of

work hours, particularly during the evenings or on weekends


other locations the user has visited

travel and commuting routes.

The addresses and dates/times in the consolidated.db update file are not isolated data. The

file's total knowledge potential must be

understood

in the context of

other geographic

information and existing spatial databases. Maplnfo (2004), a geographic information system (GIS) company, claims that over
addresses
85%o

of data has a geographic component. In other words, the

in the consolidated.db update file are not isolated points. Rather, they are points that within the context of such other geographic information
as land

can be placed on a map and seen

use, zoning, and nearby businesses, facilities, and residences. Additional knowledge can be gained from any available ancillary information, such as telephone calls, websites visited, and historical travel and behaviour patterns. Furthermore, patterns of movements and places visited

l2

over time reveal more about an individual than isolated locations. Such patterns extend over both space and time. Under certain conditions, it is even possible to make future predictions
behaviour from such data. The lack of precision limits the accuracy of the inferences that can be made from the data in

of

the consolidated.db

file.

However, much can still be determined about a user, especially one

who often uses his Apple smart device, by employing various analic techniques. The length
the backup

of

file (one year) increases this analic potential.


emerges from the ambiguity

An important issue

of user movement

caused by

this lack of
a

precision. Situations will arise where erroneous information incorrectly suggests a user visited
problematic location.

If

a user's backup

file falls into the hands of individuals or agencies that

react on the basis of probabilities or suspicion, this could result in such negative consequences as

relationship strain, divorce, loss of employment or advancement opportunity, media allegations,

or unwarranted attention from law enforcement or govenment intelligence agencies (see the
discussion in the Government subsection below).

Exposure
The nature and extent ofprivacy loss and consequent injury depends on who can gain access

to a uset's backup
access could occur

file. Access

to the file can occur either physically or electronically. Physical

by a spouse, family member, friend, roommate, housekeeper, work colleague,

boss, secretary, subordinate, burglar, or

thief. Electronic

access could occur by

Apple (assuming

Apple can access a user's backup file; see Smith, 2010, 2012) or by a hacker or network
eavesdropper (see Henry, 2012). Once an outsider has obtained a copy, the frle can be passed on

to anyone including advertisers, "trusted third parties," (i.e., Apple's partner companies), private

13

detectives, divorce lawyers, industrial espionage agents, debt collectors, police, goverrment, and

intelligence agencies.
Some potential misuses are discussed

below. These should be seen as possibilities, not

necessarily probabilities. However, given a large enough group of Apple users, it would not be

surprising

to

see many

of these

misuses eventually

occur. Also, this is by no means

comprehensive list.

Personal

Indiscriminate access

to a user's backup file could have significant

consequences for

familial, personal, and romantic relationships.

It

gives an individual the ability to track the

movements of his or her spouse in marital disputes, custody battles, and divorces. Visits to certain locations (e.g., an ex-girlfriend) might cause strains in an engagement. A person could use such information to undermine their siblings in an effort to influence the deliberations of their parents regarding wills or inheritances. Some families

of certain cultures

engage

in

comprehensive background checks

of their
as

children's prospective husbands and wives. Apple smart device backup files could be used
part of such a vetting.

V/ork
Some businesses have required

job applicants to provide

access

to their Facebook accounts

(Maltais, 2012). "It's become standard practice for employers and schools to peruse potential applicants' Facebook profiles. But in some cases, they are going even further: Some have
demanded applicants hand over their passwords so they can view individual's restricted profiles"

14

(Stem, 2012). Similarly, companies could ask prospective employees to provide the backup files

from their Apple smart devices. Software could easily evaluate the data for potential personnel
problems based on such warning signs as:

time away from work


frequent visits to problematic places (e.g., bars, nightclubs, racetracks, casinos, brothels,

vice districts, etc.).

In such situations, the onus would be on the job applicant to justify their behaviour.

A user who sometimes backs up his or her Apple device on an office computer exposes their
backup file

to employers,

supervisors, colleagues, employees, and administrative assistants.

Under certain conditions, loss

of this information to the wrong person could jeopardize

promotion, cause loss of employment, or even result in organizational blackmail.

Government

For obvious reasons, individuals engaged in criminal behavior do not want the backup files of their Apple smart devices inspected by police. However, it is not just law breakers that might
have cause for concem. Intelligence and homeland security organizations operate on the basis

of

possibilities and probabilities.

If

government agencies can gain access to a users' backup file

through Apple or an intermediate entity, an individual who was in

or even near

- the wrong

place at the wrong time, could find themselves scrutinized by police or by an intelligence service. Mere suspicion has been sufficient in the past for some people to be questioned, placed
on a watch list or do-not-fly registry, or refused entry into a country. Governments have also used private data-mining companies to determine how public and

private records might be analyzed for certain security or military objectives. For example,

15

marketing services business called Acxiom (http://www.acxiom.com/) sold demographic data on


a group of airline passengers to a U.S. Department of Defense contractor (U.S. should prosecute

JetBlue, 2003). Acxiom provided data on gender, home owner/renter status, years at residence,
income, number of children, Social Security numbers, occupation, and vehicle information

If Acxiom was an Apple "trusted third party,"l it


backup

could do much with the data in users'

files. Analysis and sale of such information is not restricted to person-based questions;

rather,

it

could just as easily be location or time based. For example, a request by a data

customer might be of the following nature:

1.

Provide the identity of every Apple user within 100 meters of this particular address on this particular date.

2. Filter that dataset by the following

user characteristics (obtainable from individual

identifying information; see Smith,2010,2012): (1) gender; (2) age; (3) ethnicity; and
(4) occupation.

3.

Cross-compare that result with the following govemment databases. . ..

Businesses

There are many ways that private businesses and companies could exploit the data in Apple backup files, not all of them to the user's benefit. Targeted advertising is the most obvious one.

Marketing companies already use an individual's home address and the demographics of his or
her neighbourhood for delivery of direct ("junk")

mail. Knowledge of

a person's movements

and routine travels would open up a new world of invasive advertising possibilities.

This phrase "trusted third party" raises the question, trusted by whom? different answer to this question than would Apple.

user might well have a very

T6

More problematic is how insurance companies might use such information. Knowledge of a user's movements could provide insight into an applicant's eating and drinking habits through

information on restaurants and bars frequented

which ones, how often, and for how long.

Automobile insurance companies may even be able to detect a user's risky driving behaviour
such as speeding.

The information in the Apple smart device backup files of key employees, managers, and executives is valuable industrial espionage and could be exploited to advantage by business
competitors.

Criminals

Criminal access to a user's backup file, either through theft or by hacking, increases his or
her exposure to victimization. More sophisticated criminal groups could use this information to
determine when someone was likely to be present or away from certain locations such as their

home. Such knowledge could then be used to assist in the perpetration of fraud, identify theft, or

burglary. It would be disastrous

if

a user's backup file fell into the hands of a stalker. For

certain individuals, at risk of extortion, kidnapping, or terrorism because of their social, work, or

political position, the implications of a stolen file are even more sinister.

Other

The data in the backup hle of an Apple device owned by a movie celebrity, sports star, politician, or other famous person would prove to be a bonanza of information and innuendo for
media outlets, tabloids, and scandal magazines. Similarly, the data could prove to be a potent
weapon in the hands of a rival candidate in any political election.

l7

Possible Misuses with Advanced Accuracy

The details of the exact data available to Apple (and through Apple, other businesses and
organizations) is not known. If Apple has methods for obtaining accurate location and time data

from the backup file, then the loss of user privacy is tremendous. With such information, it

would be possible to accurately generate what is c.alled a geospatial lifeline, defined as

"continuous set of positions oceupied in space over some time period" (Mark, 1998, p. l2). Figure 6 shows a typical example of an individual's one-month geospatial lifeline (Grengs,

W*g, & Kostyniuk,

2008).

18

Legend
Destlnatlon Vlslt Frequency 22-41 12-21 4-11 1-3

Route Visit Frequency

Figure 6. One-month geospatial lifeline.

Much can be derived from a person's lifeline. "Such individual lifelines presage a new era

of movement analysis ... in which scientists from various research fields previously hampered
by sparse and random movement observations can now be hard on the heels of their subjects as they move in space and time" (Laube, Dennis, Forer,

&

'Walker,

2007,

p.

a8\.

Specialized

computer software, such

as GeoTime developed by the

Canadian company Oculus

l9

(nttp:www.geotime.c ), now exists for analyzing geospatial lifelines. Figure 7 shows


example of a geospatial lifeline displayed in GeoTime.

an

-lat
Fle kft h
Toa lle

Nqlf,ilEq:;Ileo1+rl^tr

liiHe !qi\ sI"DiTiFld |;;;;--lj,",t,

?"",4.iu+''[il]

f.lir ti

i@' j'J0

Ordnance 5urvey GCrown Copyright. All rights reserued Geore softwre ud courtesy of Oculus lnfo lnc All Geo-ire rights lesrvd.

Figure 7. Geospatial lifeline displayed in GeoTime.

A geospatial lifeline obviously provides information on a user's position (location and time)
and movement (speed and direction). However, those who work in the field of Moving Object Databases (MOD) have also developed complex models and query languages

for analyzing

geospatial lifelines. For example, some of the existing context operators and standardization techniques include location, interpolated locations, speed, acceleration, movement azimuth,

20

sinuosity, tortuosity, straightness, path entropy, navigational displacement, absolute and


standardized approaching rates, first derivatives, interval standard deviation, time series analysis, path time and distance analyses, equal duration and track wrapping, spatial and temporal distance analyses, bipolar analysis, and spatial variance analysis (Laube et al.,

2007). Much can be

inferred from these measures.

A study on the geographic

pattems of reoffending criminals illustrates the potential uses

of

geospatial lifeline analysis. Parolees who reoffended while on an electronic monitoring (EM)
and global positioning system (GPS) program were identified and their movements for a period

of eight days prior to the new crime then mapped and analyzed (Rossmo, Lu, & Fang, 2011).
The objective was to study their spatial activity pattems prior to, during, and after offending in
order to distinguish routine travel from criminal movement. For example, the normal routine

of

one particular parolee consisted

of a single daily trip to a location northwest of his

home.

However, three days before his re-offence he began to visit a commercial area to the northeast of his home that was charactezed by restaurants, bars, motels, and parking lots. His movements
here exhibited hunting behaviour, as shown by the numerous stops and turns in this new part

of

his geospatial lifeline. On his third trip to the commercial area he reoffended and sexually
assaulted a woman in a parking lot (see Figures 8 and 9).

2l

Legend

I I O

ofiense location
Home location GPS recorded poinls Unban areas
V\fater areas

Trajectory 29th Speed (mi/hr)

---- 0.00-500 ----5.01 -15.00 rr 15.01 -45.00 r r. r 45.0l - 95.16

Figure 8. Parolee's movements on offense day.

22

Legend

! I O

offense location
Home location GPS recorded points Unban areas

Trajectory 29th Speed (mi/hr)

---- 000-s.00 ----5.01 -15.00 ..r 1501-4500 rrrr 45.01 -9516

ffMites 0 01 02

04

06

08

ll

:ll

Figure 9. Parolee's movements near crime site on offense day.

An analysis of this parolee's geospatial lifeline showed: (1) departure from nolmal routine;

(2)

repeated visits

to a new aea; and. (3) high movement density2 (i.e., much travel back

and

forth within a small region, indicative of search behaviour). These spatial aberrations,3
integrated with information on the area's land use and knowledge of the parolee's previous

Spatial activity patterns can also be categorized by such measures as total daily distance traveled, peak and mean hourly velocity, momentum (changes in velocity over time), peak and mean density (travel within areal units), directional changes per hour, movement length between direction changes, and other indicators of search and hunt behavior as opposed to purposeful travel. Also important are type of area (e.g., land use, zoning, crime generators and attractors, etc.) traveled through and prior offender modus operandi factors.

A review of another EM program found the most common rule violation involved detours (Gibbs & King, 2003). In contrast, if the routine movements of a pedophile intersects with locations frequented by children schools, playgrounds, parks, daycare centers - he has a higher chance ofrecidivism (Ouimet & Proulx, I 994).
23

criminal behaviour, suggested a high probability of reoffending. The study concluded "It may be possible to use electronic monitoring and global positioning system program data to assist in offender risk evaluation during supervision. Differences in the movement patterns of offending
parolees could provide community supervision agents with an early warning tool to facilitate

timely interventions and help prevent new crimes" (Rossmo, Lu,

&, Fang,

20ll,p.4l).

Multiple User and Social Network Analysis

Apple and its "trusted third parties" could have the ability to examine the intersection of
backup file data from multiple users, opening the door to powerful group analyses. Eagle and
Pentland (2006) demonstrated "the ability to use standard Bluetooth-enabled mobile telephones

to measure information access and use in different contexts, rccognize social patterns in daily
user activity, infer relationships, identiSr socially significant locations, and model organizational

rhythms.... The data these devices have returned to us is unprecedented in both magnitude and

depth. The applications we have presented include ethnographic studies of device

usage,

relationship inference, individual behavior modeling, and group behavior analysis" (pp. 255,
267).

It is possible to determine

existence and type

of relationship from the intersection of

geospatial lifelines using such variables as context, proximity, time of day and day of week of

proximity, time length of proximity, and repetition of proximity. Models have been developed
that can accurately discern friends, acquaintances, and workplace colleagues on this basis (Eagle

& Pentland,2006;

see Figure 10).

24

*4^*
u
U

a LF . o^

o o

a n

O\

\n nh^l
^"

o AOAa

Figure 10. Friendship and daily proximity networks.

Conclusion
Smart phones provide great functionality and

utility. However, by the very

use of this wide-

ranging functionality, an individual reveals much about their personal preferences, choices, and behaviours. This information must be protected and a user's privacy maintained.

There

is

great value

in this personal data for Apple

and other businesses; however,


be giving

individuals are not paid for

it and they do not realize they might

it away. No one
purchase

would want indiscriminate disclosure of their banking information or credit card

history. Similarly, few who understand the full implications of sharing the information in their
backup file would willingly agree to do so.

The sensitivity to the loss of privacy regarding our personal movements can be seen in the

reactions

to a study on individuals'

movements which only used aggregated (i.e., not location-tracking data from 100,000

individualized, like the data

in an Apple backup file)

cellphones in Europe (Gonzez, Hidalgo, & Barabsi, 2008):

The use of cellphones to track people, even anonymously, has implications for privacy that make this "a troubling study," said Marc Rotenberg, a founder of the Electronic Privacy

25

Information Center in V/ashington. The study, Mr. Rotenberg said, "raises questions about the protection of privacy in physical spaces, when devices make possible the capture locational data."

of

There are serious ethical issues as well, said Arthur Caplan, director of the Center for
Bioethics at the University of Pennsylvania. While researchers are generally free to observe people in public places without getting permission from them or review from institutional
ethics boards, Mr. Caplan said, "your cellphone is not something

I would consider a public

entity." (Schwartz, 2008) In 1984, the world was introduced to the Apple Macintosh computer by a now famous
Super

Bowl commercial which depicted a female heroine resisting the tyranny of Big Brother. In
George Orwell's dystopian novel,

Big Brother was the omniscient head of a

totalitarian

government. In 2012, we must be careful that Big Business does not take the place of Big
Brother.

26

References

Apple Press Info. (2017, April2T). Apple Q&A on location data. Retieved July 30,2012 from
the World V/ide Web: Data.html.

Brantingham, P. J.,

&

Brantingham, P. L. (Eds.). (1981). Environmental uiminology. Beverly

Hills:

Sage.

Brantingham, P. J., & Brantingham, P. L. (1984). Patterns in crime. New York: Macmillan.

Clarke, R.

V,, & Felson, M.

(Eds.). (1993). Routine activity and rational choice. New

Brunswick, NJ: Transaction. Cox, K. R., & Golledge, R. G. (Eds.). (1969). Behavioral problems in geography.Evansfon, IL:
Northwestem University Press. Eagle, N.,
P ers

&

Pentland,

A. (2006). Reality mining:


C omputing, I

Sensing complex social systems. Journal

of

onal and Ubiquitous

0, 25 5 -268.

Fenton, W. (2011, April 22). How to see the secret tracking data in your iPhone. PC Magazine.

Retrieved July

30,

2012 from

the

Word Wide

V/eb:

Gibbs, A., &

Krg, D. (2003). The electronic ball and chain? The operation

and impact of home

detention with electronic monitoring in New Zealand. The Australian and New Zealand Journal of Criminolo g,t, 3 6, l
-17
.

Golledge, R. G.,
Routledge. Gonzlez,

&

Stimson, R. J. (1987). Analytical behavioural geography. New York:

M. C., Hidalgo, C. ,A.., & Barabsi, A.-L. (2008). Understanding individual human
45

mobility pattems. Nature,

3, 779-7 82.

27

Gould, P., & White, R. (1986). Mental maps (2"d ed.). London: Routledge.

Grat F. (2012). iOS4x location


BC. Grengs, J.,
'Wang,

based services analysis report. Unpublished report. Vancouver,

X., & Kostyniuk, L. (2003). Using GPS data to understand driving behavior.

Journal of Urban Technolo gy, I 5 (2), 33-53.

Henry, A. (2012, September 4). 1 million Apple device IDs leaked, 12 million total stolen.

Lifehacker. Retrieved September

5, 2012 from the V/orld Wide

V/eb:

Jakle, J.

4., Brunn, S., & Roseman, C. C. (1976). Human spatial behavior: A social geography.
IL:
'Waveland
Press.

Prospect Heights,

Laube, P., Dennis, T., Forer, P.,

&

Walker,

M. (2007). Movement beyond the snapshot -

Dynamic analysis of geospatial lifelines. Computers, Environment and Urban Systems,3I,


481-s01
.

Maltais, M. (2012, March 20). Asking job applicants for Facebook password, fair or legal? Los
Angeles Times. Retrieved JuIy 25,2012 from the World V/ide Web:

facebook-20120320.

Maplnfo (2004). Technology Provider Opportunities with Mapln in Insurance. Retrieved July 25,2012 from the World Wide Web:

portunties.pdf.

Mark, D. M. (1998). Geospatial lifelines. Integrating spatial and temporal databases,


9847

Vol.

L Dagstuhl

Seminars.

28

Ouimet, M.,

&

Proulx, J. (1994, November). Spatial and temporal behaviour of pedophiles:

Their clinical usefulness as to the relapse prevention model. Paper presented at the meeting of the American Society of Criminology, Miami, FL.
Rossmo, D. K. (2000). Geographic

profiling. Boca Raton, FL: CRC

Press.

Rossmo, D. K., Lu, Y., &.Fang,T. (2011). Spatial-temporal crime paths. In M. A. Andresen

&

J.

B. Kinney (Eds.), Patterns, prevention, and geometry of crime (ry. 16-42). London:
Routledge.

Schmitz, P.

M. U., Rossmo, D. K., de Jong, T., & Cooper, A. (2007, March). Determining

criminal activity space using mobile phone technology. Paper presented at the NIJ Mapping
and Public Safety Conference, Pittsburgh, PA.

Schwartz, J. (2008). Cellphone tracking study shows we're creatures of habit. The New York

Times. Retrieved August 22, 2012 from the World Wide

Web:

Sistla, A. P., Wolfson, O., Chamberlain, S.,

& Dao, S. (1997). Modeling and querying moving

objects. Proceedings of the l3th International Conference on Data Engineering (ICDEI3)

(pp.422-432). Birmingham, UK: University of Birmingham. Smith, E. (2010). iPhone applications & privacy issues: An analysis of application transmission of iPhone Unique Device ldentifiers (UDIDs). Unpublished report. Lewisburg, PA. Smith, E. (2012). iOS4x operating system privacy issues: An analysis of data transmitted from
an Apple device to the Apple Corporation. Unpublished report. Lewisburg, PA.

Stem, J. (2012, March 26). Demanding Facebook passwords may break law, say senators.

IBC
Web:

World News. Retrieved August 24, 2012 from the World V/ide

29

" t-

Taylor, P. J. (1977). Quantitative methods in geograp,hy. Prospect Heights, IL: Waveland Press.

UK National Statistics Online. (2003). The UK 2000 Time Use Survey. Retrieved July 25,20O4
from the World Wide V/eb: U.S. should prosecute JetBlue, privacy group says. (September 22,2003). USA Today. Retrieved

August

24,

2012

from

the

World

Wide

Web:

Walmsley, D. J.,
Longman.

& Lewis, G. J. (1984). Human geography: Behavioural

approaches. London:

Wolfson, O., & Mena, E. (2005). Applications of moving objects databases. In Y. Manolopoulos,

A. Papadopoulos, & M. Vassilakopoulos (Eds.), Spatial databases: technologies, techniques


and trends (pp. 186-203). Hershey, PA: Idea Group Publishing.

30

D. Kim Rossmo Curriculum Vit

Summary of Professional Background Dr. Kim Rossmo is the University Endowed Chair in Criminology, and the Director of the Center for Geospatial Intelligence and Investigation in the School of Criminal Justice at Texas State University. He has a PhD in criminology from Simon Fraser University, and has researched and published in the areas of environmental criminology, the geography of crime, and criminal investigations. Dr. Rossmo was formerly a management consultant with the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and the Director of Research for the Police Foundation in Washington, DC. Before that, he was the Detective Inspector in charge of the Vancouver Police Department's Geographic Profiling Section, which provided investigative support for the intemational law enforcement community. Dr. Rossmo is a member of the Intemational Association of Chiefs of Police (IACP) Advisory Committee for Police Investigative Operations and is an Adjunct Professor at Simon Fraser University. He sits on the editorial board for Homicide Studies and is a Full Fellow of the Intemational Criminal Investigative Analysis Fellowship (ICIAF). Recently, Dr. Rossmo completed projects studying the geospatial structure of terrorist cells, geographic profiling applications in counter-insurgency, and patterns of illegal border crossings. He has also analyzed the spatial dynamics of animal foraging, including white shark predation and the origins of infectious diseases. He has published books on geographic profiling and criminal investigative failures. In 2000, Dr. Rossmo was awarded the Governor General of Canada Police Exemplary Service Medal. He was appointed to the City of Austin Public Safety Commission in 2009.

Employment Texas State University University Endowed Chair in Criminology, School of Criminal Justice (2007-present) Director, Center for Geospatial Intelligence and Investigation (2004-present) Research Professor, School of Criminal Justice (2003 - present)
Simon Fraser University Associate Scholar, Institute for Canadian Urban Research Studies (2004-present) Adjunct Professor, School of Criminology (1996-present) Sessional Instructor, School of Criminology (1988-1995)

Environmental Criminology Research Inc. Chief Scientist ( 1 996-present)


Bureau of Alcohol, Tobacco, Firearms and Explosives Management Consultant (2003 -2005)

Police Foundation Director of Research (2001-2003)

Vancouver Police Department Detective Inspector, i/c Geographic Profiling Section (1995-2000) Constable, Patrol, Expo 86, Community Liaison, CLEU Intel, Crime Prevention (1980-1995) Communications Operator, Communications Centre ( 1 978-2000)

Education
Degrees

PhD (Criminology, 1996), Simon Fraser University Dissertation: Geographic Profiling: Target Patterns of Serial Murderers M.A. (Criminology, 1988), Simon Fraser University Thesis: Fugitive Migration Patterns B.A. (Sociology, 1978), University of Saskatchewan
Certifi cates and Certifications Advanced Police Studies, General Police Studies; Canadian Police College Police Advanced Certificate of Education, Police Studies Certificate Program; Justice Institute British Columbia POST certified, Califomia TCLEOS certified, Texas

of

Publications
Books Rossmo, D. K. (2000). Geographic profiling. Boca Raton, FL: CRC Press. 'Watanabe, Rossmo, D. K. (2002). Geographic profiling (S. Watanabe, K. M. Suzuki, & T. Shimada, Trans.). Kyoto: Kitaohji Shobo. (Original work published 2000). Rossmo, D. K. (2007). Geographic profiling (M. Lee, Trans.). Beijing: Chinese Public Security University Press. (Original work published 2000). Rossmo, D. K. (2009). Criminal investigative failures. Boca Raton, FL: Taylor & Francis.

Book Chapters Beauregard,E., & Rossmo, D. K. (2007). Profilage gographique et analyse des tactiques de chasse chez les agresseurs sexuels sriels. In M. St-Yves & M. Tanguay (Eds.), Psychologie de I'enqute criminelle: La recherche de la vrit (pp. 577-605). Cowansville, Qubec: Les Editions Yvon Blais. Beauregard,E., & Rossmo, D. K. (2008). Geographic profiling and analysis of the hunting process used by serial sex offenders. In M. St-Yves & M. Tanguay (Eds.), The psychology of criminal investigations: The searchfor the truth (ry. 529-55a) (J. Miller, Trans.). Toronto: Carswell. (Original work published 2007). Beauregard, E., Rossmo, D. K., & Proulx, J. (2011). A descriptive model of the hunting process of serial sex offenders: A rational choice approach. In M. Natarajan (Ed.), Crime opportunity theories: Routine activity, rational choice qnd their variants. Surrey, UK: Ashgate. Holmes, R. M., & Rossmo, D. K. (2002). Geography, profiling, and predatory criminals. In R. M. Holmes & S. T. Holmes, Profitngviolent imes; An investigative tool (3'd ed.) p. 20S222). Thousand Oaks, CA: Sage.

Rossmo, D. K. (1995). Multivariate spatial profiles as a tool in crime investigation. In C. R. Block, M. Dabdoub, & S. Fregly (Eds.), Crime analysis through computer mapping (pp. 6597). Washington, DC: Police Executive Research Forum. Rossmo, D. K. (1995). Place, space, and police investigations: Hunting serial violent criminals.

In J. E. Eck & D. L. Weisburd (Eds.), Crime and place: Crime prevention studies, Vol. 4 (pp.2I7-235). Monsey, NY: Criminal Justice Press. Rossmo, D. K. (1995). Strategic crime patteming: Problem-Oriented policing and displacement. In C. R. Block, M. Dabdoub, & S. Fregly (Eds.), Crime analysis through computer mapping p. 1-1a). Washington, DC: Police Executive Research Forum. Rossmo, D. K. (1996). Targeting victims: Serial killers and the urban environment. In T. O'Reilly-Fleming (Ed.), Serial and mass murder: Theory, research and policy p. 133153). Toronto: Canadian Scholars' Press. Rossmo, D. K. (1997). Geographic profiling. In J. L. Jackson & D. A. Bekerian (Eds.), Offender profiling: Theory, research and practice (pp. 159-175). Chichester: John Wiley & Sons. Rossmo, D. K. (1997). Geographic prof,rling. In J. L. Jackson & D. A. Bekerian (Eds.), Offender profiling. Theory, research and practice (Japanese translation). Rossmo, D.K. (1997). Place, space, and police investigations: Hunting serial violent criminals. In D. V. Canter &,L. J. Alison (Eds.), Criminal detection and the psychology of uime (pp. 507 -525). Aldershot, Hants : Ashgate Publishing (reprint). Rossmo, D. K. (2003). Maps, technology, and the search for treasure. In M. R. Leipnik & D. P. Albert (Eds.), GIS in law enforcement: Implementation issues and case studies (pp.xii-xiv). London: Taylor & Francis. Rossmo, D. K. (2004). Geographic profiling. In Q. C. Thurman &, J. Zhao (Eds.), Contemporary policing: Controversies, challenges, and solutions (pp.274-284). Los Angeles: Roxbury Publishing (reprint). Rossmo, D. K. (2004). Geographic prof,rling as problem solving for serial crime. In Q. C. Thurman &, J.D. Jamieson (Eds.), Police problem solving p. 121-131). Cincinnati: Anderson Publishing. Rossmo, D. K. (2004). Geographic profiling update. In J. H. Campbell & D. DeNevi (Eds.), Profilers: Leading investigators take you inside the criminal mind (pp.29I-312). Amherst, NY: Prometheus Books. Rossmo, D. K. (2005). The deadlier of the species. In H. Scott, The female serial murderer: A sociological study of homicide and the " gentler sex" (ry. i-iii). Lewiston, NY: Edwin Mellen Press. Rossmo, D. K. (2005). Geographical profiling. In M. Strano &,R.Bnnzone (Eds.), Psychological uiminal profiling: Manuale operativo (chap. 4). Florence: Societa Editrice
Europea. Rossmo, D. K. (2006). Geographic profiling in cold case investigations. In R. Walton(Ed.), Cold case homicides: Practical investigative techniques (pp. 537-560). Boca Raton, FL: CRC
Press.

Rossmo, D. K. (2008). Geographic profiling. In

M. Strano (Ed.), Manuale di investigazione criminale (pp. a07-al7). Rome: International Crime Analysis Association. Rossmo, D. K. (2008). Place, space, and police investigations: Hunting serial violent criminals. In D. V. Canter & D. Youngs (Eds.), Principles of geographical offender profiling (pp. A9I 63). Aldershot, Hampshire : Ashgate Publishing.

Rossmo, D. K. (2009). Geographic profiling in serial rape investigations. In R. R. Hazelwood & A. W. Burgess (Eds.), Practical aspects of rape investigation: A multidisciplinary approach (4th ed.). Boca Raton, FL: CRC Press. Rossmo, D. K., & Fisher, D. K. (2004). Problem solving prostitution in a problem neighborhood. In Q. C. Thurman & J. D. Jamieson (Eds.), Police problem solving (pp. 87-96). Cincinnati: Anderson Publishing. Rossmo, D. K., Laverty, I., & Moore, B. (2005). Geographic profiling for serial crime investigation. In F. Wang (Ed.), Geographic inrmation systems and uime analysis (pp. 102-117). Hershey, PA: Idea Group Publishing. Rossmo, D. K., Lu, Y., &.Fang, T. (2011). Spatial-temporal crime paths. In M. A. Andresen & J. B. Kinney (Eds.), Patterns, prevention, and geometry of crime (pp. 16-42). London: Routledge. Rossmo, D. K., & Rombouts, S. (2008). Geographic profiling: An investigative application of environmental criminology. In R. Wortley & L. Mazerolle, Environmental criminology and crime analysis (pp. 136-1a9). Cullompton, Devon: Willan Publishing. Rossmo, D. K., & Velarde, L. (2008). Geographic profiling analysis: Principles, methods, and applications. In S. Chainey & L. Tompson (Eds.), Crime mapping case studies: Practice and research p. 35-a3). Chichester: John V/iley & Sons. Saville, G. J., & Rossmo, D. K. (1995). 'striking a balance': Lessons from problem-oriented policing in British Columbia. In K. M. Hazlehurst (Ed.), Perceptions ofjustice: Issues in indigenous and community empowerment (pp. 119-I4l). Aldershot, England: Avebury. Refereed Journal Articles Beauregard, E., Proulx, J., Rossmo, D. K., Leclerc, 8., & Allaire, J.-F. (2007). Script analysis of the hunting process of serial sex offenderc. Criminal Justice and Behavior, 34,1069-1084. Beauregard, E., Rebocho, M. F., & Rossmo, D. K, (2010). Target selection patterns in rape. Journal of Investigative Psychology and Offender Profiling, 7, I37 -I52. Beauregard, E., Rossmo, D. K., & Proulx, J. (2007). A descriptive model of the hunting process of serial sex offenders: A rational choice approach. Journal of Family Violence, 22, 449463. Blair, J.P., &, Rossmo, D. K. (2010). Evidence in context: Bayes' Theorem and investigations. Police Quarterly, I 3, 123-I35. Le Comber, S. C., Nicholls, 8., Rossmo, D. K., & Racey, P. A. (2006). Geographic profiling and animal foraging. Journal of The or etical Biolo gy, 2 4 0, 233 -240. Le Comber, S. C., Rossmo, D. K., Hassan, A. N., Fuller, D. O., & Beier, J. C. (2011). Geographic profrling as a novel spatial tool for targeting infectious disease control. International Journal of Health Geographics, 10,35-42. Martin, R. 4., Rossmo, D. K., & Hammerschlag, N. (2009). Hunting pattems and geographic profiling of white shark predation. Journal of Zoolo gt, 2 7 9, 1 1 1 - 1 1 8. Raine, N. E., Rossmo, D. K., & Le Comber, S. C. (2009). Geographic profiling applied to testing models of bumble-bee foraging. Journal of the Royal Society Interface,6,307-319. Rossmo, D. K. (1993). Target patterns of serial murderers: A methodological model. American Journal of Criminal Justice, 17(2),1-2I. Rossmo, D. K. (1994). A primer on criminal geographic targeting. IALEIA Journal,9(l),l-12. Rossmo, D. K. (2005). Geographic heuristics or shortcuts to failure?: Response to Snook et al. Applied Cognitive Psycholog,,, I 9, 651-654.

Rossmo, D. K. (2005). Geographical profiling. Forze civili: Dialogo cultura per la legalita [Official Review of the Italian Police Offrcers Association], 3(1), 13-16. Rossmo, D. K. (2006). Criminal investigative failures: Avoiding the pitfalls. FBI Law Enrcement Bulletin, 7 5 (9), | -8. Rossmo, D. K. (2006). Criminal investigative failures: Avoiding the pitfalls (Part two). FBI Law Enforcement Bulletin, 7 5 (10), 12-19. Rossmo, D. K. (2011). Evaluating geographic prof,rling. Crime Mapping: A Journal of Research and Practice,3,42-65. Rossmo, D. K. (2011). A reality response to Bridges' "A structured geospatial analytic method and pedagogy for the intelligence community." IALEIA Journal,20(l),91-106. Rossmo, D.K. (2012). Recent developments in geographic prohling. Policing: A Journal of Policy and Practice, 6, 144-1 50. Rossmo, D. K., & Harries, K. D. (2011). The geospatial structure of terrorist cells. Justice Quarterly, 28, 221 -248. Rossmo, D.K., & Routledge, R. (1990). Estimating the size of criminal populations. Journal of Quantitative Criminolo g!, 6, 293 -3 14. Rossmo, D. K., & Saville, G. J. (1991). Policing Challenge 2000: Riding the winds of change. Canadian Journal of Criminology, 33,543-549. Rossmo, D. K., Thurman, Q. C., Jamieson, J. D., & Egan, K. (2008). Geographic pattems and profiling of illegal crossings of the southern U.S. border. Security Journal, 21,29-57 . Schmitz, P., Cooper, 4., de Jong, T., & Rossmo, K. (submitted for publication). Mapping criminal activity space using cellular (mobile) telephone data. Professional Geographer. Stevenson, M. D., Rossmo, D. K., Knell, R. J., & Le Comber, S. C. (2012). Geographic profiling as a novel spatial tool for targeting the control of invasive species. Ecography, 35. Taylor, 8., Brooks, J., Phanidis, J., & Rossmo, D. K. (1991). Services for Vancouver street youth: An integrated delivery model. Journal of Child and Youth Care,6(3),49-61.

Non-Referred Articles Boyd, N., & Rossmo, D. K. (1994, February). David Milgaard, the Supreme Court and Section 690: A wrongful conviction revisited. Canadian Lawyer,pp.28-29,32. Fleming, 2., & Rossmo, D. K. (1996). Optimizing patrol resources: Vancouver's 4lll eam model. RCMP Gazette, 5 8(6), 2-9. Rossmo, D. K. (1991). After the use of deadly force: What you should be aware of. Blue Line Magazine, 3(4),19-20. Rossmo, D. K. (1999, March). Geographic profiling system helps catch criminals. GeoWorld,p. 41. Rossmo, D. K. (2009, October). Failures in criminal investigation. The Police Chief pp.54-66. Rossmo, D. K. (2010). Criminal investigative failures. RCMP Gazette, T2(l),30-31. Rossmo, D. K., & Davies, A. (2001). Stealth predator pattems. Crime Mapping News, 3(4),6-7. Rossmo, D. K., & Filer, S. (2005). Analysis versus guesswork: The case for professional geographic profiling. Blue Line Magazine, l7(7),24-25. Rossmo, D. K., Filer, S., & Sesely, C. (2005). Geographic profiling debate - round four: The big problem with Bennell, Snook and Taylor's research. Blue Line Magazine, 17(9),28-29. Rossmo, D. K., & Fisher, D. K. (1993). Problem-Oriented policing: A cooperative approach in Mount Pleasant, Vancouver. RCMP Gazette, J5(1), 1-9.

Reports Boyd, N., & Rossmo, D. K. (1992). Milgaardv. The Queen: Finding justice - Problems and process. Burnaby, BC: Criminology Research Centre, Simon Fraser University. Brown, R. O., Rossmo, D. K., Sisak, T., Trahern, R., Jarret, J., & Hanson, J. (2005). Geographic profiling military capabilities. Final report submitted to the Topographic Engineering Center, Department of the Army, Fort Belvoir, VA. Hotel, C, & Rossmo, D. K. (1993). Creating a safer Vancouver: Safer City Task Force questionnaire results. In Safer City Task Force: Final report (pp.3a9476). Vancouver: Author. Rossmo, D. K. (2005). Geographic Profilingfor Military Applications: Report on Sofh,vare Evaluation for the National Technology Alliance (NTA). Rossmo, D. K. (2008). Geographic profilingfor military applications. Final report submitted to the Topographic Engineering Center, Department of the Army, Fort Belvoir, VA. Rossmo, D. K. (2009). Criminal hunting paths: An analysis of the spatial behavior of recidivists. Final report submitted to the Bureau of Justice Assistance, Office of Justice Programs. Rossmo, D. K., Davies, A., & Patrick, M. (2004). Exploring the geo-demographic and distance relationships between stranger rapists and their offinces (Special Interest Series: Paper 16). London: Research, Development and Statistics Directorate, Home Office. Rossmo, D. K., Thurman, Q. C., & Jamieson, J. D. (2005). Geographic patterns and profiling of illegal crossings of the southern U.S. border. Office of Science and Technology, National Institute of Justice (NIJ). Rossmo, D. K., &,Egan, K. (2007). Illegal U.S. land border crossings by American citizens. Bureau of Justice Assistance, Office of Justice Programs.

Book Reviews Rossmo, D. K. (1993). fReview of Violence and public anxiety: A Canadian casel. Culture, I3(2),109-1 10. Rossmo, D. K. (2006). fReview of Policing illegal drug markets: Geographic approaches to crime reduction]. Canadian Journal of Criminologt and Criminal Justice,4S(6),943.
Other Rossmo, D. K. (1993). Strategic crime patteming: Problem-Oriented policing and displacement. In C. R. Block & M. Dabdoub (Eds.), Worl<shop on crime analysis through computer mapping; Proceedings: 1993 (pp. 5-20). Chicago: Illinois Criminal Justice Information

Authority. Rossmo, D. K. (1993). Multivariate spatial profiles as a tool in crime investigation. In C. R. Block & M. Dabdoub (Eds.), Workshop on uime analysis through computer mapping,' Proceedings: 1993 p. 89-126). Chicago: Illinois Criminal Justice Information Authority. Rossmo, D. K. (1993). Geographic profiling: Locating serial killers. In D. Zafun & P. F. Cromwell (Eds.), Proceedings of the International Seminar on Environmental Criminology and Crime Analysis (ry.1a-29). Coral Gables, FL: Florida Criminal Justice Executive Institute. Rossmo, D. K. (1994, Fall). STAC tools: The Crime Site Probability Program. STAC News,pp. 9, 14. Rossmo, D. K. (2003). Geographic profiling. In E. W. Hickey (Ed.), Encyclopedia of murder and violent uime (pp.205-209). Thousand Oaks, CA: Sage.

Rossmo, D. K. (2004). A day in the life: Geographic profiler. In C. H. Wecht, Crime scene investigation: Crack the case with realJife experts. Pleasantville, NY: Reader's Digest Association. Rossmo, D. K. (2005). An evaluation of NIJ's evaluation methodologtr geographic profiling software. Retrieved March 8,2007 from the World Wide Web: http ://www.ojp.usdoj. gov/ni/maps/gp.html. Rossmo, D. K. (2005). Geographic profiling. InThe Serial Murder Symposium: Collected Readings. Quantico, VA: National Center for the Analysis of Violent Crime: Quantico, VA.
Scholarl) Presentations Beauregard, E., Leclerc, 8., Rossmo, K., & Proulx, J. (2005, November). A script analysis of patterns in the hunting process of serial sex offenders. Paper presented at the meeting of the American Society of Criminology, Toronto, ON. Beauregard, E., Proulx , J., & Rossmo, D. K. (2005, Decemb er). An investigation of scripts of the hunting process in serial sex offenders: Implications r geographic profiling. Paper presented at the meeting of the 8th Intemational Investigative Psychology Seminar, London,

UK.
Beauregard, 8., Rossmo, D. K., & Proulx, J. (2005, October). A descriptive model of the hunting strategies of serial sex offinders: A rational choice approach (Modle descriptif des tactiques de chasse des agresseurs sexuels sriels: Une approche de choixrationnel). Paper presented at the 3'd International Francophone Meeting on Sexual Aggression, October,

Hull, QC. Boyd, N., & Rossmo, D. K. (1993, February). Interpreting homicide patterns. Paper presented at the conference of the Vy'estem Society of Criminology, Berkeley, CA. Boyd, N., & Rossmo, D. K. (2000, February). Awrongful murder conviction: The relevance of geographic profiling. Paper presented at the conference of the Western Society of Criminology, Kona, HI. Cooper, A. K., Schmitz, P. M. U., Byleveld, P., & Rossmo, D. K. (2000, December). Using GIS and digital aerial photography to assist in the conviction of a serial killer. Paper presented
at the meeting of the Crime Mapping Research Center, San Diego, CA. Fang, T., Lu, Y., Rossmo, D. K., Blair, P. (2010, April). Recidivism route analysis with GPS data: A case study. Paper presented at the meeting of the Association of American

Geographers, Washinglon, DC. Glackman, W., & Rossmo, D. K. (199i, November). Job perceptions in a policing organization. Paper presented at the meeting of the American Society of Criminology, San Francisco, CA. Martin, R. 4., Rossmo, D. K., & Hammerschlag, N. (2006, July). Geographic profiling of white shark predation.Paper presented at the meeting of the American Elasmobranch Association, New Orleans, LA. Moore, B. J., & Rossmo, D. K. (1999, November). Geographic profiling. Paper presented at the meeting of the American Society of Criminology, Toronto, ON. Otn del Castillo, J. M., Rossmo, D. K., & Summers, L. (2011, November). Anlisis de vinculacin y perfiles geogrficos: Un estudio de caso sobre robos de domicilio seriales en Zaragoza fCrime linknge and geographic profiling: A case study of serial residential burglary in Saragoss]. Paper presented at the II Seminario Internacional de Investigacin Criminal, Valladolid, Spain.

Quinet, K., &. Rossmo, D. K. (2004,November). Estimating missing persons as serial murder victims. Paper presented at the meeting of the American Society of Criminology, Atlanta, GA. Rossmo, D. K. (1990). Thefuture of policing. Police: Challenge 2000 Conference, Vancouver, BC. Rossmo, D. K. (1990, March). The impact of space on urban crime: Vancouver's Skid Row. Paper presented at the meeting of the Canadian Association of Geographers, Vancouver, BC. Rossmo, D. K. (1990, November). Fugitive migration patterns: An application of the destination-specific gravity model. Paper presented at the meeting of the American Society of Criminology, Baltimore, MD. Rossmo, D. K. (199I). Geographic profiling in arson investigation.B.C. Fire Investigation Seminar, Victoria, BC. Rossmo, D. K. (1991). Privatization in policing.Westem Negotiators Conference, Vancouver, BC. Rossmo, D. K. (1991, February). Police predatory range and uiminal migration.Paper presented at the conference of the Western Society of Criminology, Berkeley, CA. Rossmo, D. K. (1992, November). Chaos theory and criminologt. Paper presented at the meeting of the American Society of Criminology, New Orleans, LA. Rossmo, D. K. (1992). Geographic profiles of serial murder.International Conference on Serial and Mass Murder, Windsor, ON. Rossmo, D. K. (1992). Target patterns of serial murderers. American Society of Criminology meeting, New Orleans, LA. Rossmo, D. K. (1993, May). Geographic profiling: Locating serial killers. Paper presented at the Intemational Seminar on Environmental Criminology and Crime Analysis, Miami, FL. Rossmo, D. K. (1993, August). Multivariate spatial profiles as a tool in crime investigation. Paper presented at the V/orkshop on Crime Analysis Through Computer Mapping, Chicago,

IL.
Rossmo, D. K. (1993, August). Strategic crime patterning: Problem-Oriented policing and displacement.Paper presented at the V/orkshop on Crime Analysis Through Computer Mapping, Chicago, IL. Rossmo, D. K. (1993, October). Beyond the crime scene tape: Analyzing geographic clues. Paper presented at the meeting of the American Society of Criminology, Phoenix, AZ. Rossmo, D. K. (1994, March). Investigative geographic profiling: Validity, reliability, and utility. Paper presented at the meeting of the Academy of Criminal Justice Sciences, Chicago, IL. Rossmo, D. K. (1994, June). Geographic profiling. Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Newark, NJ. Rossmo, D. K. (1994, September). Geographic profiling and investigative information management.Paper presented at the meeting of the Intemational lnvestigative Psychology Seminar, Liverpool, UK. Rossmo, D. K. (1994, November). Cognitive maps and geographic fingerprints of serial criminals. Paper presented at the meeting of the American Society of Criminology, Miami, FL. Rossmo, D. K. (1995, February). Hunting patterns of serial violent offenders. Paper presented at the conference of the'Westem Society of Criminology, San Diego, CA.

Rossmo, D. K. (1995, July). Human raptors; Criminql hunting behaviour and crime site choice. Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Cambridge, UK. Rossmo, D. K. (1995, November). Raptors, stalkers, and trappers: Hunting styles of serial killers. Paper presented at the meeting of the American Society of Criminology, Boston,

MA.
Rossmo, D. K. (1996, February). Learning, displcement, and the geography of serial murder. Paper presented at the conference of the Westem Society of Criminology, Sonoma, CA. Rossmo, D. K. (1996, July). Probability surfaces and the geography profiling of serial killers. Paper presented at the Third International Conference on Forensic Statistics, Edinburgh,

UK.
Rossmo, D. K. (1996, September). Geographic profiling. Paper presented at the meeting of the International Investigative Psychology Seminar, Liverpool, UK. Rossmo, D. K. (1996, November). Spatial patterns ofjourneys to crime. Paper presented at the meeting of the American Society of Criminology, Chicago, IL. Rossmo, D.K. (1997, February). Paper presented at the conference of the Westem Society of Criminology, Honolulu, HI. Rossmo, D. K. (1997, June). GIS and police investigation: From data to lcnowledge. Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Oslo, Norway. Rossmo, D. K. (1997, October). Geographic profiling. Paper presented at the meeting of the Crime Mapping Research Center, Denver, CO. Rossmo, D. K. (1997, November). "Murder Alley": The ecologt of dangerous places. Paper presented at the meeting of the American Society of Criminology, San Diego, CA. Rossmo, D.K. (1997, November). Rigel: The new geographic profiling sofh,vare. Paper presented at the meeting of the American Society of Criminology, San Diego, CA. Rossmo, D. K. (1998, February) . Criminal predcttors, victims, and mean streets. Paper presented 'Western at the conference of the Society of Criminology, Newport Beach, CA. Rossmo, D. K. (1998, June). Estimating criminal population sizes with cpture-recapture analysis. Paper presented at the Intemational Seminar on Environmental Criminology and Crime Analysis, Barcelona, Spain. Rossmo, D. K. (1998, December). Case studies in geographic profiling. Paper presented at the meeting of the Crime Mapping Research Center, Arlington, VA. Rossmo, D. K. (1999, February). Clues in crime maps: The Manhattan East Side Rapisl. Paper presented at the conference of the Western Society of Criminology, Oakland, CA. Rossmo, D. K. (1999, June). Geographic profiling in cases of extended serial rape.Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Pretoria, South Africa. Rossmo, D. K. (1999, December). Environmental criminology: Criminal investigative praxis. Paper presented at the meeting of the Crime Mapping Research Center, Orlando, FL. Rossmo, D. K. (2000, February). Charting a course through graduate school. Paper presented at the conference of the Western Society of Criminology, Kona, HI. Rossmo, D. K. (2000, June). Geographic profiling and crime parsing. Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Perth, Australia.

Rossmo, D. K. (2000, November). Routine activities andforaging theory: The influence of motivqtion on size of criminal hunting area.Paper presented at the meeting of the American

Society of Criminology, San Francisco, CA. Rossmo, D. K. (2001, February). Beyond "Round up the usual suspects": Geographic profiling, suspect prioritization, andforensic science. Paper presented at the meeting of the American Academy of Forensic Sciences, Seattle,'WA. Rossmo, D. K. (2001, February). Geographic profiling, crime location sets, and child murder. Paper presented at the conference of the Westem Society of Criminology, Portland, OR. Rossmo, D. K. (2001, June). An empirical evaluation of the geographic profiling program. Paper presented at the International Seminar on Environmental Criminology and Crime Analysis, Liverpool, UK. Rossmo, D. K. (2001, November). Evaluation of geographic profiling search strategies. Paper presented at the meeting of the American Society of Criminology, Atlanta, GA. Rossmo, D. K. (2002, November). Stranger rape and geo-demographics.Paper presented at the meeting of the American Society of Criminology, Chicago, IL. Rossmo, D. K. (2002, December). Geographic profiling.Paper presented at the National Conference of State Legislatures, Washington, DC. Rossmo, D. K. (2003, February) . Stealth predator early warning methods updated: The Pig Farm serial murder case.Paper presented at the conference of the Western Society of Criminology, Vancouver, BC. Rossmo, D. K. (2003, June). Some reflections on the journey to crime. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Cincinnati, OH. Rossmo, D. K. (2003, August). Geographic profiling of predatory violent and sexual uime. Paper presented at the XIII World Congress of the Intemational Society for Criminology, Rio de Janerio, Brazil. Rossmo, D. K. (2004, February). The who andwhere of stranger rape: Using geo-demographics in offender profiling. Paper presented at the conference of the Western Society of Criminology, Long Beach, CA. Rossmo, D. K. (2004, March). The geo-demographics of stranger rape. Paper presented at the meeting of the Academy of Criminal Justice Sciences, Las Vegas, NV. Rossmo, D. K. (2004, April). Criminal investigative failures. Paper presented at the NIJ Crime Mapping Research Conference, Boston, MA. Rossmo, D. K. (2005, March). New developments in geographical profiling.Paper presented at The Role of Psychology in Criminal Investigation - International Conference, Rome, Italy. Rossmo, D. K. (2005, November). A journey-to-crime meta-analysis. Paper presented at the meeting of the American Society of Criminology, Toronto, ON. Rossmo, D. K. (2006, February). Criminal investigative failures. Keynote luncheon speech, Western Society of Criminology, Seattle, WA. Rossmo, D. K. (2006, February). Illegal border crossing population estimation. Paper presented at the conference of the Westem Society of Criminology, Seattle, WA. Rossmo, D. K. (2006, November). Geographic patterns and profiling of illegal uossings of the southern U.S. border. Paper presented at the meeting of the American Society of Criminology, Los Angeles, CA. Rossmo, D. K. (2007, February). A meta-analysis ofjourney-to-crime research. Paper presented at the conference of the'Western Society of Criminology, Scottsdale, AZ.

10

Rossmo, D. K. (2007, March). The error in error distance: Some conceptual and analytic problems in crime mapping. Paper presented at the NIJ Crime Mapping Research Conference, Pittsburgh, PA. Rossmo, D. K. (2007, March). Illegal border crossings by American citizens. Paper presented at the NIJ Crime Mapping Research Conference, Pittsburgh, PA. Rossmo, D. K. (2007, April). Geographic patterns of illegal crossings of the southern U.S. border. Paper presented at the Symposium on Illegal Immigration, Crime, and Public Policy,

Phoenix, AZ. Rossmo, D.K. (2007, May). Geographic profiling: Recent developments in property uime investigation.Paper presented at UK National Crime Mapping Conference, London, UK. Rossmo, D. K. (2007, June). Geographic profiling of stranger murder. Paper presented at the International Congress on Law and Mental Health, Padua, Italy. Rossmo, D.K. (2007, July). Using geographic profilingr volume crime detection. Paper presented at the pre-ECCA Conference, London, UK. Rossmo, D. K. (2008, October). Geospatial patterns of terrorist cells.Paper presented at the meeting of the Southwestem Association of Criminal Justice, Denver, CO. Rossmo, D. K. (2008, November). Criminal investigative failures. Paper presented at the meeting of the American Society of Criminology, St. Louis, MO. Rossmo, D. K. (2009, February). The geospatial structure of urban tercorist cells.Paper presented at the conference of the Westem Society of Criminology, San Diego, CA. Rossmo, D. K. (2009, March). Criminal investigative failures. Paper presented at the meeting of the Academy of Criminal Justice Sciences, Boston, MA. Rossmo, D. K. (2009, July). Geographic profiling. Paper presented at the pre-ECCA Conference, Brasilia, Brazil. Rossmo, D. K. (2009, July). Criminal hunting paths - An analysis of offender GPS track data. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Brasilia, Brazil. Rossmo, D. K. (2009, November). Probability eruors in criminal investigative failures. Paper presented at the meeting of the American Society of Criminology, Philadelphia, PA. Rossmo, D. K. (2010, February). Geographic Profiling. Workshop presented at the meeting of the Academy of Criminal Justice Science, San Diego, CA. Rossmo, D. K. (2010, June). The Chqndra Levy Case: Afailure in homicide investigation.Paper presented at the meeting of the Homicide Research Working Group, Baltimore, MD. Rossmo, D. K. (2010, July). Geographic profiling: Border security and countertenorism. Paper presented at the post-ECCA Conference, Brisbane, Australia. Rossmo, D. K. (2010, July). Military applications of environmental uiminology and crime analysis. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Brisbane, Australia. Rossmo, D. K. (2010, October). Criminal investigative failures and the Missing Women / Pig Farm serial murder case. Paper presented at the meeting of the Southwestern Association of Criminal Justice, Little Rock, AR. Rossmo, D. K. (2010, November). The deconstruction of a crime journey.Paper presented at the meeting of the American Society of Criminology, San Francisco, CA. Rossmo, D. K. (2011, February). An Analysis of the iminal investigative failure of the Missing Ilomen/Pig Farm Serial Murder Case. Paper presented at the conference of the Western Society of Criminology, Vancouver, BC.

11

Rossmo, D. K. (2011, March). Criminal investigative foilures in the Missing Women/Pig Farm Serial Murder Case. Paper presented at the meeting of the Academy of Criminal Justice Science, Toronto, ON. Rossmo, D. K. (2010, November). The deconstruction of a crime journey.Paper presented at the meeting of the American Society of Criminology, San Francisco, CA. Rossmo, D. K., Allen, J., & Hom, P. (2011, October). The geography of terrorism and the Madrid Train Bombings. Paper presented at the NIJ Crime Mapping Research Conference, Miami, FL. Rossmo, D.K., &Baeza, J. J. (1998, November). The Upper East Side Serial Rapist: A case study in geographic profiling. Paper presented at the meeting of the American Society of Criminology, Washington, DC. Rossmo, D. K., & Carreon, J . (2009, October). Geospatial patterns of reported cryptid sightings in East Texas. Paper presented at the meeting of the Southwestem Association of Criminal Justice, Laredo, TX. Rossmo, D. K., Davies, A., & Warraker, B. (2000, July). Beyond " Round up the usual suspects ": Behavioural science, physical evidence, and suspect prioritization in Operation Lynx.Paper presented at the meeting of the Forensic Science Services, York, UK. Rossmo, D.K., &.Filipuzzi, N. (2012, February). An environmental criminologt analysis of a prison halfway house location. Paper presented at the conference of the Western Society of Criminology, Newport Beach, CA. Rossmo, D. K., & Glackman, W. (1991, November). Police organizational surveys: LabourManagement diagnostic tools. Paper presented at the meeting of the American Society of Criminology, San Francisco, CA. Rossmo, D.K., Hammerschlag, N., & Martin, R. A. (2007, July). Environmental criminology and optimal raging models: Spatial analysis and geographic profiling of white shark predation. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, London, UK. Rossmo, D. K., & Harries, K. (2009, August). The geospatial structure of terrorist cells. Paper presented at the NIJ Crime Mapping Research Conference, New Orleans, LA. Rossmo, D. K., Hanies, K., &. Allen, J. (2011, November). The terror of place: Geoprofiling and the Madrid Train Bombings. Paper presented at the meeting of the American Society of Criminology,'Washington, DC. Rossmo, D.K., Harries, K., Allen, J., & Stafford, M. (2011, July). The geography of tetorism and the Madrid Train Bombings. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Durban, South Africa. Rossmo, D. K., Harries, K., McGarrell, E., Teymur, S., & Thurman, Q. (2008, March). The geospatial structure of terrorist cells. Paper presented at the Seminar on Environmental Criminology and Crime Analysis I,Izmir, Turkey. Rossmo, D. K., Harries, K., McGarrell, E., & Thurman, Q. C. (2007, June). The geography of terrorist qttaclrs in Turkey. Paper presented at the Conference on Democracy and Global Security, Istanbul, Turkey. Rossmo, D.K., Harries, K., McGarrell, E., & Thurman, Q. (2008, July). The geospatial structure of teruorist cells.Paper presented at the Seminar on Environmental Criminology and Crime Analysis II, Anchorage, AK.

12

& Thurman, Q. C. (2005, February). Geographic patterns and profiling of illegal land border crossings. Paper presented at the conference of the Westem Society of Criminology, Honolulu, HI. Rossmo, D. K., & Kringen, A. L. (2012, June). Spatial and temporal patterns in serial crime.
Rossmo, D. K., Jamieson, J. D., Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Stavern,

Norway. Rossmo, D. K., &,Leahy, S. (2004, November). Using research to assist the police investigation of serious crime . Paper presented at the meeting of the American Society of Criminology, Atlanta, GA. Rossmo, D. K., Lu, Y., &,Blair, J. P. (2009, August). An analysis of criminal search paths using GPS track data. Paper presented at the NIJ Crime Mapping Research Conference, New Orleans, LA. Rossmo, D.K., &Pagaling-Hagan, S. (2008, February). The Zodiac Killer Case: Historic profiling of an unsolved serial murder mystery. Paper presented at the meeting of the Vy'estern Society of Criminology, Sacramento, CA. Rossmo, D. K., Pollock, J., & Blair, J. P. (2008, March). Criminal hunting paths: An analysis of spatial behavior of recidivisls. Paper presented at the meeting of the Academy of Criminal Justice Sciences, Cincinnati, OH. Rossmo, D. K., & Quinet, K. (2004,November). Spatial and temporal patterns of serial murder in the United States. Paper presented at the meeting of the American Society of Criminology, Atlanta, GA. Rossmo, D. K., & Thurman, Q. C. (2005, June). Geographic patterns and profiling of illegal land border crossings. Paper presented at the Conference on Democracy and Global Security, Istanbul, Turkey. Rossmo, D. K., & Thurman, Q. C. (2005, September). Geographic patterns and profiling of illegl land border crossings. Paper presented at the Crime Mapping Research Conference, Savannah, GA. Rossmo, D. K., & Thurman, Q. C. (2007, October). The geospatial structure of terrorism.Paper presented at the meeting of the Southwestern Academy of Criminal Justice, Corpus Christi, TX. Rossmo, D.K., Thurman, Q. C., & Jamison, J.D. (2004, October). Geographic patterns and profiling of illegal uossings of the Texas border. Paper presented at the meeting of the Southwestern Academy of Criminal Justice, Houston, TX. Rossmo, D.K., Thurman, Q. C., & Jamison, J.D. (2005, July). Geographic patterns and profiling of illegal land border uossings. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Santiago, Chile. Rossmo, D. K., Thurman, Q. C., & Jamison, J. D. (2006, July). Geographic profiling of illegal land border crossings; Final results. Paper presented at the Seminar on Environmental Criminology and Crime Analysis, Vancouver, BC. Rossmo, D. K., Thurman, Q. C., & Jamison, J. D. (2007, March). Border control policy: Population, permeability, and displacement.Paper presented at the meeting of the Academy of Criminal Justice Sciences, Seattle, WA. Schmitz, P. M. U., Rossmo, D. K., de Jong, T., & Cooper, A. (2007, March). Determining criminal activity spqce using mobile phone technology.Paper presented at the NIJ Crime Mapping Research Conference, Pittsburgh, PA.

13

Invited Presentations (Selected) Universidade Fernando Pessoa (Porto, Portugal: Iuly 2012) Austin Regional Intelligence Center (ARIC) (Austin, TX; September 2011) Austin/Travis County Health Department (Austin, TX; August2}Il) Kansas Bureau of Investigation (Topeka, KS; January 20ll) ESzu European Conference, with The Netherlands Ministry of Defence (Delft, The Netherlands; September 2010) Colorado Association of Sex Crimes Investigators (Snowmass, CO; September 2010) California Police Offlrcers Association (Los Angeles, CA; May 2010) Danish National Police, Organized Crime Unit, and Danish Security and Intelligence Service (Copenhagen, Denmark; April 20 1 0) Instituto Superior da Maia (Porto, Portugal; April2010) University of Texas-Austin, Geography Department (Austin, TX; April2010) Oklahoma State Bureau of Investigation (Edmond, OK; March 2010) The Netherlands Ministry of Defence (Epe, The Netherlands, March 2010) Vancouver Police Department, Major Crimes Section (Vancouver, BC; February 2010) Minneapolis Bureau of Criminal Apprehension (Minneapolis, MN; January 2010) Police Academy, Justice Institute of British Columbia (I.{ew Westminster, BC; October 2009, November 2004) Simon Fraser University, School of Criminology (Burnaby, BC; October 2009) Wrongful Convictions Expert Panel, International Association of Chiefs of Police (IACP) Annual Meeting (Denver, CO; October 2009) Association of State Criminal Investigative Agencies (Albuquerque, NM; September 2009) American Psychological Association (APA), invited plenary speaker (Toronto, ON; August 200e) University of Texas-Austin, Mathematics Department (Austin, TX; October 2008) International Crime Science Conference (London, UK; July 2008) National Summer Institute for Statistical & GIS Analysis of Crime & Justice Data, University of Regina (Regina, SK; June 2008, June 2006, June 2005). Radford University (Radford, VA; March 2008). Califomia Association of Crime Laboratory Directors (Sacramento, CA; November 2007) International Association of Law Enforcement Intelligence Analysts (Vancouver, BC; April 2007) Georgia Bureau of Investigation (Forsyth, GA; March 2007) Los Angeles Police Department (Los Angeles, CA; December 2006) Chinese Ministry of State Security University (Beijing, Hangzhou, and Shanghai, China; September 2006) International Association of Women Police (Saskatoon, SK; September 2006) Metropolitan Police Department (Washington, DC; March 2006) Texas State University, Anthropology Department, Body Recovery Conference (San Marcos, TX; March 2006) Canadian Information Processing Society (CIPS) (Edmonton, AB; November 2005) Texas Rangers (Austin, TX; September 2005) Federal Bureau of Investigation, Serial Murder Symposium (San Antonio, TX; August 2005) Universit de Montral, cole de criminologie (Montral, QC; June 2005) Army Topographical Engineering Center (TEC) (Fort Belvoir, VA; March 2005)

14

International Crime Analysis Association Investigative Psychology Conference (Rome, Italy; March 2005) California Robbery Investigators Association Conference (Las Vegas, NV; February 2005) University of Virginia Psychology Department (Charlottesville, VA; October 2004) Forensics Department, British Columbia Institute of Technology (Vancouver, BC; June 2004) National Institute of Justiceederal Bureau of Investigation/American Psychology Association, The Nature and Influence of Intuition in Law Enforcement (Arlington, VA; June 2004) National Technology Alliance, Pentagon J3DDIO, and National Geospatial-Intelligence Agency (Arlington, VA; June 2004) University of Texas College of Engineering (Austin, TX; February 2004) FBI Major Crime Training Seminar (Baton Rouge, LA; December 2003) Alberta Crown Attorney's Association Meeting (Banff, AB; September 2003) Greater Austin Crime Commission (Austin, TX; August2003)
Joumal Editorial Boards Homicide Studi es ( 1 997-present) International Journal of Police Strategies & Management (2011-present) Inv e s t i g at iv e P sy c h o I o 9,, and Offe n d e r P r ofi I in g (20 07 -20 I 0) Professional Memberships IACP Advisory Committee for Police Investigation Operations (1997-present) Canadian Association of Violent Crime Analysts, Vice-President (1997-2002) Westem Society of Criminology, Executive Counselor (1999-2002) American Society of Criminology Academy of Criminal Justice Sciences Homicide Research Working Group International Association of Law Enforcement Intelligence Analysts Intemational Association of Crime Analysts (1997-2010) International Criminal Investigative Analysis Fellowship South Carolina Research Authority Integrated Solutions Group Advisory Board (2004-2009) Canadian Police Association, Executive Vice-President and Chief Financial Ofhcer (1995-1997) Vancouver Police Union, Vice-President and Director (1988-1994)

Legal Recognized in the Superior Court of Ontario as an expert in "the geography of crime, the hunting patterns ofserial offenders, and appropriate investigative strategies" (1997) Recognized by the British Columbia Missing'Women Commission of Inquiry as an expert in "serial murder and criminal investigations" (2012) Testified at the Missing Women Commission of Inquiry (Vancouver, BC; January and May 2012) Testif,red at the Commission of Inquiry into the Wrongful Conviction of David Milgaard (Saskatoon, SK;2006)
Consultancies Sunalta/Scarboro Community Associations Halfway House Location Evaluation (2007) Zodiac Killer geographic profile, Phoenix Pictures (2007) Policing in British Columbia Commission of Inquiry community policing research project (1994)

15

David Milgaard murder conviction independent review (1992) Japan-Canada comparative community policing research proj ect

( 1 99

Community Service Commissioner and Vice Chairman, Austin Public Safety Commission, and Chair, Police Subcommittee (2009-present) Geographic profiling assistance for major crime investigations provided to international and national police agencies Cold case review of the 1975 Sheryl Norris homicide for the San Marcos Police Department Case review of the John Jerome V/hite wrongful conviction for the Georgia Bureau of Investigation Case review of the Benjamin LaGuer conviction for State Representative, Commonwealth of
Massachusetts

Media Interviews (Selected) ABC20120, Nightline

Al

Jazeera

Associated Press Austin American- Statesman

BBC Blue Line Magazine


Canadian Press

CBC CKNW CNN CTV V/5 Dallas Morning News Dateline NBC De Limburger (The Netherlands) Der Spiegel (German) Financial Post GeoV/orld Globe and Mail Il Tempo (Italy; Journal de Montral London Times (UK) Maclean's National Post New Zealand Radio Popular Science Reader's Digest Regina Leader-Post San Antonio Express-News USA Today Vancouver Sun Washington Post

T6

You might also like