Tag Archives: law enforcement

Must Read: The Rise of Big Data Policing

_KOK1002_RTCC+(3)Here’s an excellent, must-read article from Andrew Guthrie Ferguson, a Professor of Law at the UDC David A. Clarke School of Law and author of the book The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement (NYU Press 2017).

“The big data policing revolution has arrived. The singular insight of this innovation is that data-driven predictive technologies can identify and forecast risk for the future. Risk identification is also the goal of this book — to forecast the potential problems of big data policing as it reshapes law enforcement.”

Read the full article HERE.

In the meantime, imageedit_12_9184783838Case Closed Software™ reminds you that, as the only true alternative to Palantir®, we specialize in big data investigation analytics combined with the industry’s most robust investigative case management solution.

We are “Palantir® without the price tag and data-lock”.

 

Contact us for more information below:

Big Data Investigation Analytics: A Difference Maker for Law Enforcement

How Investigative Agencies do More with Less!

The investigative units of law enforcement agencies all around the world face many of the same challenges. Chief among those challenges is the fact that budgets are tightening, while resources are becoming more and more scarce. Even in the face of reduced funding, investigators are asked to deliver higher levels of service in their quest to solve and deter crime.

The key to doing ‘more’ with ‘less’ in law enforcement is really no different than in any other industry. That is, deploying resources in the most effective manner possible for the maximum value possible. The trick is using what the agency already knows to determine what the future may hold. What that all boils down to is Big Data Investigation Analytics.

Data in Law Enforcement comes in many forms, and is typically stored in disparate silos. Arrest records, calls for service, criminal intelligence, field reports, human resource data, telephone records, case management files, and so on. Together, the data from those systems can represent a virtual goldmine of investigative information if used correctly.

gotbigdata‘Correctly’ is the operative term, of course. The ability to turn these large data stores into actionable investigation intelligence requires more than a simple data warehouse or data mining tool, and for the most part police departments recognize this need. They understand that their data holds the key to understanding the hidden connections between people, places, and things – the lynchpin of any successful investigation.

For years, law enforcement agencies and commercial organizations have built data mining tools and data warehouses. Unfortunately, these analytical techniques are no longer sufficient in an age of rapidly growing data. Moreover, much of the data that investigators need to access is unstructured text – word processing documents, narratives, search warrants, witness statements, email text, and more. By applying big data text analytics, investigators can begin to extract actionable insights from both structured and unstructured data.

VisalloBig Data Investigation Analytics – such as those provided by Virginia based Visallo and California’s Palantir Technologies – are two examples that provide a powerful indexing architecture allowing investigators to find non-textual data, including multimedia files such as 911 calls, interrogation videos, and images. This architecture helps investigators find things that they simply could not find otherwise.

Finally, world-class investigation analytics provide a flexible graph visualization tool, as well. This user interface allows investigators to organize data through a variety of layout options, find hidden and non-obvious relationships between entities, and perform a variety of what-if scenarios.

ctsWhen paired with the robust investigative case management and criminal intelligence systems available from Crime Tech Solutions, big data investigation analytics build a foundation upon which investigators can solve more crimes, more quickly.

Without advanced investigation analytics, agencies often find themselves looking for a needle in a haystack. In fact, too often the needle is broken into several pieces spread across multiple haystacks. To simplify these tasks, investigative agencies must deploy the correct analytical technologies which have become a key element of doing more with less in the global investigation market. For more information on how Crime Tech Solutions and Visallo are changing the law enforcement analytics landscape, please contact us below!

A Look at Digital Policing

For law enforcement and other police service agencies, the ability to rapidly manage and interpret massive amounts of data is of paramount importance. Front line officers require timely and accurate data that enables intelligence-led decision making, and officers must be deployed proactively in order to deter and prevent criminal behavior.

abmpegasus-intelligence-led-policingAs we have written before, the true lifeblood of effective policing is data. With disparate and poorly integrated systems, however, the intelligence that can be gleaned from that data is mitigated. The information is too often hidden or lost.

In order to better utilize data – coming from sources such as Records Management Systems, Computer Aided Dispatch, Criminal Intelligence Systems, and other such repositories – innovative law enforcement agencies turn to technology-agnostic, scalable analytics platforms which blend historical and real-time data to both solve today’s crimes and predict tomorrow’s. Supported by purpose-built law enforcement analytics, agencies can keep pace with growing volumes of data and stay one step ahead of the criminals via actionable insights.

_KOK1002_RTCC+(3)

For disparate data to be transformed to actionable insights, law enforcement agencies must deal with several challenges:

  • Timeliness – Unlike fine wine, data tends to lose value over time. Crime happens in real time, and what was the case six months ago may not be the case today.
  • Reliability – The data absolutely must be trusted by the officers entrusted with using it.
  • Fragmentation – If the data is overly fragmented or otherwise unavailable, it becomes cumbersome to use and holds little value.
  • Auditability – Without a clear and recognized audit trail, agencies are not able to effectively track the decisions made in the field versus what the analytics pointed to.

5WAn analytics solution helps blend data from disparate sources in order to provide officers with a trusted, single view of the truth. Simply put, the right analytics software will help agencies manage the challenges above.

While there has been a ton of negative news related to predictive policing, recently, using an analytics platform approach allows agencies to consolidate, analyze, and utilize ALL of their data. This analysis can – and does – help agencies become more efficient and more effective.

What’s with all the “Creepy Clowns”?

It had to be in the weeks running up to Halloween, of course.

killerclownsUnless you’ve been hiding under a big red nose and novelty wig, you probably know that there has been a rash of ‘creepy clown’ sightings in communities across the country. These creepy clowns – and the related threats they seem to pose – seem to range from crazy hoaxes to credible events. So what in the name of big, floppy shoes is going on here?

Some arrests have been made. Schools have sent out warning letters. Social media is crawling with creepy, homemade clown videos. And the subject even came up at the White House media briefing this week.

We need an explanation for why, all of a sudden, there are creepy clowns running around our neighborhoods and – in some cases – our wild imaginations.

CNN posted six possibilities in an attempt to answer that very question. It’s a very good article and accompanying video. The possibilities, according to the folks they’ve interviewed range from folklore to viral marketing, and more. Of interest is the viewpoint of Benjamin Radford, author of the book “Bad Clowns“.

As the Los Angeles Times points out in an article HERE, the stupidity began in South Carolina with upsetting accounts of clowns attempting to lure children into the woods. (Those accounts seem to have proven false, by the way.) That said, the craze has expanded and, according to the same LA Times article, clown sightings were reported in Modesto, CA prompting police to issue a notice to residents that read: “If you see anything or anyone suspicious, including individuals dressed as clowns, to avoid contact and report the circumstances to us immediately.”

icp
Insane Clown Posse

Even the Insane Clown Posse has weighed in on the subject. The Detroit-based hip-hop duo suggests the phenomenon is “basically nothing more than mass hysteria and moral panic.”

“Believe it or not, the same thing happened in 1981, too. Long before social media, Stephen King wrote (the horror classic) ‘It’ and Insane Clown Posse were in GRADE SCHOOL at the time! So there ARE no ‘killer clowns’ — it’s just jackasses being jackasses. Everyone relax!”, they posted.

In an article posted at Michigan Live HERE, it is pointed out that Loren Coleman, a cryptozoologist who studies the folklore behind mythical beasts such as Bigfoot and the Loch Ness Monster, came up with something called “The Phantom Clown Theory,” which attributes the proliferation of clown sightings to mass hysteria.

After some thorough research, it seems that the prevailing thought is that there are no credible threats from Creepy Clowns. Fuelling the hysteria, of course, are utterly false reports that continue to make the rounds in social media. Snopes, the myth debunking (or confirming) website talks about a report that creepy clowns are responsible for two dozen murders in Canada. Spoiler alert: It’s not true.

killerclowns2Perhaps the biggest concern is that these creepy clowns take it too far, a la the snowball effect. We should be concerned that someone could be legitimately hurt as the trend grows. It’s even more possible that someone will take one of these creepy clowns as a legitimate threat and take matters into their own hands. We hope neither of those things happen, but we’d sure love to see a lot less of this clowning around.

About the Author

Tyler Wood is Operations Director of Austin, TX based Crime Tech Solutions (www.crimetechsolutions.com). The company develops and deploys low price / high performance software for law enforcement including Case Closed investigative case management software, sophisticated Sentinel Visualizer link analysis and data visualization software, and CrimeMap Pro advanced crime analytics. The company also develops the popular GangBuster gang database, and IntelNexus criminal intelligence software for 28 CFR Part 23 compliance.

 

Intelligent Gang Intelligence

The backbone of any functioning criminal intelligence unit is the strength of its intel files and/or gang records. Best practices for gang intelligence suggests that agencies should regularly update and contribute gang intelligence to a specialized gang intelligence system (aka gang database). These intelligence systems can manage and store thousands or millions of records of gangs, their activities, and their members.

With gang intelligence software, authorized users may read and update specific files, search and retrieve photos/videos/audio, and generally utilize the solution to assist investigation efforts. An example of some attributes stored within a gang intelligence system are:

  • Activitiesgang
  • Locations
  • Names
  • Vehicles
  • Addresses
  • Tattoos
  • Marks and Scars
  • Incidents
  • Reports
  • Tips
  • Aliases

Properly utilized, the gang intelligence system should allow the collection, analysis, storage and retrieval of data that qualifies as criminal intelligence. The data should only be disseminated to agency members with a specific need, and that need should be logged as part of the dissemination.

Gang Intelligence Integrity

With a gang intelligence database, agencies must preserve the integrity of the system through security and access restriction from unauthorized users – internal and external – because of constitutional protection for individuals whose personal information is contained within the system.

Importantly, for gang intelligence, a rigid purging process must be adhered to as this ensures the integrity and credibility of the data. If, for example, a record has not been reviewed or appended for a period of five years, best practices suggest that the record be purged.

Access governance is also critical to gang intelligence systems to ensure integrity of the data entered and maintained and, importantly, to comply with applicable regional, state, and federal laws.

Gang / Criminal Intelligence and U.S. Law

us-constitutionThe United States Constitution prohibits the criminalization of mere membership in a gang (or other similar organization). There is nothing illegal about being a gang member, according to our country’s laws. However, it is perfectly legal for agencies to add gang members to the database even if no crime has been committed by that member.

The tracking and storage of this data is widely criticized, however. Opponents suggest that agencies are profiling or targeting groups that are not engaged in criminal activities, and/or installing a ‘guilt by association’ mentality by tracking those members.

Conversely, advocates of gang intelligence database systems know that law enforcement has a legitimate interest in monitoring the individuals and groups engaged in ‘group criminal behavior’.

The back-and-forth between sides creates tension between the rights of society to be protected by law enforcement, and the individual privacy expectations of gang members.

CFR 28 Part 23

The result of these competing interests is something called Code of Federal Regulations, Title 28, Part 23 (CFR 28 Part 23) which details the requirements for gathering, entering, storing, and disseminating information about individuals and organizations (gangs) into an intelligence system.

28-cfr-part-2328 CFR Part 23 was designed as a regulation specific to multi-jurisdictional intelligence systems that have received federal grant funds for the development or purchase of the gang database. It is, however, an excellent guide for individual agencies, as the regulation attempts to fairly balance the intelligence needs of law enforcement against individual privacy requirements. In other words, it helps agencies get their jobs done without violating individual rights.

Compliance with 28 CFR Part 23 in Gang Intelligence

Gang and criminal intelligence data is defined within 28 CFR Part 23 as “data which has been evaluated to determine that:

A) it is relevant to the identification of, and the criminal activity engaged in by, an individual who – or an organization which – is reasonably suspected of involvement in criminal activity, and

B) meets criminal intelligence system submission criteria

The ‘submission criteria’ is essentially the basis for something to be entered into the gang intelligence system. The criteria include the following:

  • A reasonable suspicion that an individual is relevant to the criminal activity
  • Prospective information to be entered is relevant to the criminal activity
  • Information does not include data related to political, religious, or social views unless that information related directly to the criminal activity that formed the basis for focus on the gang or group
  • Information was not obtained in violation of any federal, state, or local law or ordinance
  • Information establishes sufficient facts to give trained law enforcement officials a basis to believe that an individual or gang/organization is involved in a definable criminal activity
28-cfr-cop
28 CFR Part 23 compliant software

As referenced above, 28 CFR Part 23 also indicates that information contained within a compliant database or criminal intelligence system must be reviewed and evaluated for relevance and importance every five years. Data that is deemed to be irrelevant and unimportant should be purged from the system. This is true even if the data is discovered to be noncompliant before five years.

Perhaps the most important element of a gang database system complying with 28 CFR Part 23 is that no information whatsoever from the database should be disseminated without a legitimate law enforcement reason, such as criminal investigation cases and charges being filed against a suspect.

Conclusion

If managing a gang intelligence system seems intimidating, it ought not be. If an agency desires to comply with 28 CFR Part 23, the rules for managing such as system are clearly spelled out. If an agency simply wants to collect and manage data outside of the federal guidelines – and has not accepted federal grant monies for such a program – they are free to do so as long as the system meets the security and ‘common sense’ guidelines that protect an individual’s right to privacy.

About the Author

Tyler Wood is Operations Director of Austin, TX based Crime Tech Solutions (www.crimetechsolutions.com). The company develops and deploys low price / high performance software for law enforcement including Case Closed investigative case management software, sophisticated Sentinel Visualizer link analysis and data visualization software, and CrimeMap Pro advanced crime analytics. The company also develops the popular GangBuster gang database, and IntelNexus criminal intelligence software for 28 CFR Part 23 compliance.

Crime Tech Solutions Acquires Case Closed Software

June 1, 2016 (Austin, TX)   Crime Tech Solutions, LLC, a leading provider of analytics and investigation software for law enforcement and commercial markets, today announced that it has acquired Cleveland, TN based Case Closed Software in a cash transaction. The terms of the deal were not released, but according to Crime Tech Solutions’ founder and president Douglas Wood, the acquisition brings together two dynamic and fast-growing software companies with an unparalleled complement of technologies.
For Crime Tech Solutions, the opportunity to add Case Closed Software into the fold was too good to pass up” said Mr. Wood. “We think that the technology offered by Case Closed helps to further differentiate us in the market as the price performance leader for this type of investigative solution.PNG

Crime Tech Solutions, based in the city of Leander, TX, delivers advanced analytics and investigation software to commercial investigators and law enforcement agencies across the globe. Their solution suite includes criminal intelligence software, sophisticated crime analytics with geospatial mapping, and powerful link analysis and visualization software. The company says that the addition of Case Closed Software expands those offerings even further.

CaseClosed1Case Closed Software develops and markets investigative case management software specifically designed for law enforcement agencies. The suite is built around four primary software products including best-in-class investigative case management software, property and evidence tracking, a gang database tool, and an integrated link analysis and data visualization tool.

Case Closed couldn’t be happier than to be joining Crime Tech Solutions,” said Keith Weigand, the company’s founder. “The blending of our technologies creates a suite that will add tremendous value to our mutual customers, and will be hard for others to duplicate.

According to both Mr. Weigand and Mr. Wood, the name Case Closed will continue on as the product brand, given its widespread popularity and loyal customer base. Crime Tech Solutions is expected to retain all Case Closed employees, with Mr. Weigand joining as the company’s chief technical officer.

Crime Tech Solutions says it expects continued growth via ongoing software sales and strategic acquisitions.

About Crime Tech Solutions

(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Professor urges increased use of technology in fighting crime

risk_terrain_modeling_resizedPosted by Crime Tech Solutions

This article originally appeared HERE in Jamaica Observer. It’s an interesting read…

A University of the West Indies (UWI) professor is calling for the increased use of technology by developing countries, including Jamaica, to assist in the fight against crime.

Professor Evan Duggan, who is Dean of the Faculty of Social Sciences, said there have been “amazing advancements” in information and communications technologies (ICT), over the past six decades, which offer great potential for improving security strategies.

The academic, who was addressing a recent National Security Policy Seminar at UWI’s Regional Headquarters, located on the Mona campus, pointed to Kenya as a developing country that has employed the use of inexpensive technology in its crime fighting initiatives.

“Potential applications and innovations have been implemented through the use of powerful but not very expensive technologies that have allowed law enforcers to make enormous leaps in criminal intelligence, crime analysis, emergency response and policing,” he said.

He pointed to the use of a variety of mobile apps for crime prevention and reporting, web facilities, and citizen portals for the reporting of criminal activity.

Professor Duggan said that in order for Jamaica to realise the full benefit of technology in crime fighting, national security stakeholders need to engage local application developers.

“I would enjoin our stakeholders to engage the extremely creative Jamaican application developers, who now produce high quality apps for a variety of mobile and other platforms. I recommend interventions to assist in helping these groups to cohere into a unified force that is more than capable of supplying the applications we need,” he urged.

The UWI Professor pointed to the Mona Geoinformatic Institute as one entity that has been assisting in fighting crime, through analyses of crime data as well as three dimensional (3D) reconstruction of crime scenes; and mapping jurisdictional boundaries for police posts and divisions, as well as the movement of major gangs across the country.

In the meantime, Professor Duggan called for “purposeful activism” in the fight against crime and lawlessness which, he said, are “serious deterrents to economic development and national growth prospects” and could derail the national vision of developed country status by 2030.

“In the current global landscape where security challenges are proliferating across borders and have taken on multifaceted physiognomies, all hands on deck are vital,” he stressed.

“We need to …consolidate pockets of research excellence in this area …to provide the kinds of insight that will lead to more fruitful and productive collaborative engagements that are required to help us better understand the security challenges and threats from crime in order to better inform our national security architecture and direction,” he added.