Big Data Surveillance: The Case of Policing

Posted by Douglas Wood, CEO of Case Closed Software – a leader in investigation software  and analytics for law enforcement. Headquartered here in Central Texas, I recently had an opportunity to have coffee with Dr. Sarah Brayne, Assistant Professor, Department of Sociology at The University of Texas at Austin. Ms. Brayne had just published an interesting article in … More Big Data Surveillance: The Case of Policing

Criminal Intelligence Management: Best Practices

Criminal intelligence analysts provide a key element of effective law enforcement, at both the tactical and strategic levels. Analysts study information related to suspects, trends, known criminals, and more. Through a process of gathering evaluating this information, trained intelligence analysts identify associations across various illegal activities over many locations. Government decisions and policies are heavily … More Criminal Intelligence Management: Best Practices

Compliance with CFR 28 Part 23 Criminal Intelligence Systems Operating Policies

As a guide for those interested in criminal intelligence systems such as IntelNexus™, Crime Tech Weekly is publishing the following overview of Title 28, Part 23 of the Code of Federal Regulations (CFR 28 Part 23). The policy reads as follows: CFR 28 PART 23–CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES 1. Purpose. 2. Background. 3. Applicability. … More Compliance with CFR 28 Part 23 Criminal Intelligence Systems Operating Policies

Criminal Intelligence Databases: Violations of privacy rights are the exception, not the rule.

The notion that law enforcement fusion centers regularly violate individuals’ privacy rights as they capture intelligence on gangs, terrorist activities, organized crime, and other threats to public safety is simply not true. That, according to a study published in the Journal of Police and Criminal Psychology. The paper, “Law Enforcement Fusion Centers: Cultivating an Information Sharing Environment while Safeguarding … More Criminal Intelligence Databases: Violations of privacy rights are the exception, not the rule.

The CalGang Audit: Lessons Learned for Law Enforcement.

The following article is a continuation, of sorts, to our article ‘Intelligent Gang Intelligence’ on September 28… CalGang is a California statewide database that law enforcement agencies use to store and disseminate information about gang activities and suspected gang members. The system has been in place for more than ten years, but has remained largely hidden … More The CalGang Audit: Lessons Learned for Law Enforcement.

Intelligent Gang Intelligence

The backbone of any functioning criminal intelligence unit is the strength of its intel files and/or gang records. Best practices for gang intelligence suggests that agencies should regularly update and contribute gang intelligence to a specialized gang intelligence system (aka gang database). These intelligence systems can manage and store thousands or millions of records of … More Intelligent Gang Intelligence

Crime Tech Solutions’ continued growth fuels management team expansion

September 13, 2016 – (Leander, TX)  Crime Tech Solutions, a fast-growing provider of low cost crime fighting software and analytics today announced the appointment of Kevin Konczal as Vice President of Sales. The company created the position in response to rapid growth in market share for crime analysis and investigative case management software. Mr. Konczal … More Crime Tech Solutions’ continued growth fuels management team expansion

Report: California ‘Gang Intelligence Database’ fails to ensure individual privacy

Here is another great reason why it is important for agencies to follow best practices in intelligence data management. The regulations behind DOJ 28 CFR Part 23 are meant to help agencies walk the line between effective intelligence gathering and the right to an individual’s privacy. 28 CFR Part 23 compliant intelligence management software is available … More Report: California ‘Gang Intelligence Database’ fails to ensure individual privacy