Category Archives: case management software

Georgia ICAC Task Force Deploys Case Closed Software for Statewide Triage of CyberTips and Investigation Case Management

Atlanta, Georgia – (January 2, 2024) The Georgia Internet Crimes Against Children (ICAC) Task Force, housed within the Georgia Bureau of Investigation (GBI), has announced the deployment of Case Closed Software™ to enhance its efforts in combating online child predators. The software will play a pivotal role in streamlining the handling of CyberTips from the National Center for Missing & Exploited Children (NCMEC), enabling law enforcement professionals to prioritize and investigate cases with greater precision and effectiveness.

The software’s powerful features provide invaluable support in the fight against child exploitation, ultimately making the community safer for everyone. Key features of the Case Closed Software include:

1. CyberTip Triage: The software allows for the efficient categorization of CyberTips received from NCMEC, ensuring that each tip is promptly reviewed and acted upon.

2. Case Management: It facilitates the seamless organization and tracking of investigations, digital evidence, physical evidence, supplemental reports, and entity management, making it easier for law enforcement agencies to manage their ICAC caseloads.

3. Data Analysis: The software offers advanced analytical tools, which can help identify patterns and connections among cases, aiding in the identification and capture of perpetrators.

4. User-Friendly Interface: Designed with the end user in mind, the software offers an intuitive and user-friendly interface, ensuring that law enforcement personnel can maximize its capabilities without extensive training.

The Georgia ICAC Task Force, under the leadership of GBI Director Chris Hosey, is committed to protecting children from online predators. The adoption of Case Closed Software’s innovative solution will enable the task force to better triage CyberTips from NCMEC, determine any connections across disparate CyberTips, and assign the cases to appropriate investigators and affiliates for investigative management purposes.

For more information about Case Closed Software, please visit https://www.caseclosedsoftware.com/icac

 

Frederick County Sheriff’s Office Enhances Fight Against Child Predators with Case Closed Software

FOR IMMEDIATE RELEASE

[Frederick County, MD] — [October 19, 2023] — The Internet Crimes Against Children (ICAC) Task Force , housed within Frederick County Sheriff’s Office, announced today that it has deployed specialized investigation technology from Case Closed Software™ to bolster their efforts in combating online child predators. The groundbreaking software will play a pivotal role in enhancing the efficiency and effectiveness of investigations into child sexual abuse materials (CSAM), sextortion, and other heinous crimes.

In a relentless pursuit of justice, law enforcement agencies worldwide are facing a mounting challenge in dealing with the increasing prevalence of crimes against children, particularly in the digital realm. To address this critical issue head-on, the Frederick County Sheriff’s Office is proud to announce the adoption of Case Closed Software’s innovative solution.

The software is specifically designed to streamline the handling of CyberTips from the National Center for Missing & Exploited Children (NCMEC), enabling law enforcement professionals to prioritize and investigate cases with greater precision and effectiveness. The software’s powerful features provide invaluable support in the fight against child exploitation, ultimately making the community safer for everyone.

Key features of the Case Closed Software include:

1. CyberTip Triage: The software allows for the efficient categorization of CyberTips received from NCMEC, ensuring that each tip is promptly reviewed and acted upon.

2. Case Management: It facilitates the seamless organization and tracking of investigations, making it easier for law enforcement agencies to manage their caseloads.

3. Data Analysis: The software offers advanced analytical tools, which can help identify patterns and connections among cases, aiding in the identification and capture of perpetrators.

4. User-Friendly Interface: Designed with the end user in mind, the software offers an intuitive and user-friendly interface, ensuring that law enforcement personnel can maximize its capabilities without extensive training.

Case Closed Software’s Douglas Wood speaks last month to ICAC Commanders about the use of technology in the fight against CSAM.

 

Case Closed Software’s CEO, Douglas Wood, commented, “We are honored to support the Frederick County Sheriff’s Office in their mission to combat child exploitation. Our software empowers law enforcement to efficiently investigate cases involving child predators, ensuring that justice is served and children are kept safe from harm.”

The adoption of Case Closed Software’s specialized investigation software by the Frederick County Sheriff’s Office exemplifies their commitment to employing cutting-edge technology to protect the community from the grave threat of child predators.

For more information about Case Closed Software™ and their advanced investigative solutions, please visit www.caseclosedsoftware.com/icac

About Case Closed Software:
Case Closed Software is a leading provider of investigative case management and advanced analytics software for law enforcement agencies. The company is dedicated to delivering innovative solutions that help law enforcement professionals solve crimes, protect communities, and ensure justice is served.

###

Case Closed Software™ to Sponsor Internet Crimes Against Children Conference

FOR IMMEDIATE RELEASE

Austin, Texas (September 19, 2023)

Case Closed Software™, a leading provider of investigative case management software, is proud to announce its sponsorship of the 2023 NW Regional Internet Crimes Against Children (ICAC) Conference. The conference will be held in Seattle from October 2 through 6, 2023.

ICAC is a national network of 61 coordinated task forces, representing over 5,400 federal, state, and local law enforcement and prosecutorial agencies. The primary objective of the ICAC program is to investigate, prosecute, and develop effective responses to internet crimes against children.

The NW Regional ICAC Conference is an annual event that brings together professionals from law enforcement, prosecution, and child protection agencies to share knowledge and best practices in the fight against internet crimes against children. This year’s conference will feature a wide range of presentations and workshops on topics such as digital forensics, online safety education, and investigation management.

Case Closed Software is dedicated to providing innovative solutions that help law enforcement agencies streamline their investigative processes and improve collaboration. Their software automates the triage of CyberTips from the National Center for Missing & Exploited Children (NCMEC) and includes powerful functionality for multi-jurisdictional investigation case management.

CyberTips are produced through the NCMEC CyberTipline, the nation’s centralized reporting system for the online exploitation of children. When a tip is submitted to the CyberTipline, NCMEC staff review each tip and work to find a potential location for the incident reported. The CyberTip is then made available to the appropriate law enforcement agency for possible investigation. Without the software from Case Closed Software, the process of managing and triaging these CyberTips is typically slow and costly.

By sponsoring the NW Regional ICAC Conference, Case Closed Software reaffirms its commitment to supporting the important work done by ICAC task forces across the country.

“We are thrilled to be sponsoring the 2023 NW Regional ICAC Conference,” said Douglas Wood, CEO of Case Closed Software. “This conference plays a crucial role in fostering collaboration and knowledge sharing among professionals working to protect children from online exploitation.”

Law enforcement agencies attending the conference will have the opportunity to learn more about Case Closed Software’s suite of CyberTips Triage and investigative case management solutions at their booth in the exhibition hall. Representatives from Case Closed Software will be available to provide live demonstrations and answer any questions about their software.

For more information about Case Closed Software and their suite of investigative case management solutions, please visit www.caseclosedsoftware.com.

 

Enhancing the Fight Against Crimes Against Children

Crimes against children are among the most heinous and heartbreaking offenses in society. The need for swift and effective investigations to protect and seek justice for the youngest and most vulnerable members of our community is of utmost importance. In recent years, advances in technology have significantly impacted the realm of law enforcement and investigation. One such technological breakthrough is investigation case management software, a powerful tool that has revolutionized how law enforcement agencies tackle crimes against children.

In this article, we will explore the significance of investigation case management software in combatting these heinous crimes, drawing on insights from the upcoming Crimes Against Children Conference in Dallas.

The Prevalence of Crimes Against Children

Before delving into the impact of investigation case management software, it is essential to understand the gravity of crimes against children. Sadly, these offenses encompass a wide range of abuse, including physical abuse, sexual exploitation, child trafficking, and online predation. According to the National Center for Missing and Exploited Children, there were more than 1.6 million reports of child exploitation in 2021 alone, highlighting the need for robust investigative tools.

The Role of Investigation Case Management Software

Investigation case management software, such as the one offered by Case Closed Software™, has emerged as a game-changer in the fight against crimes targeting children. This advanced software solution provides law enforcement agencies with a comprehensive platform to manage and streamline investigations, making it easier for investigators to track, analyze, and act on critical information.

Streamlined Data Management and Collaboration

One of the primary challenges faced by law enforcement agencies when dealing with crimes against children is the vast amount of data involved in these investigations. From witness statements to digital evidence, the sheer volume can overwhelm investigators. Investigation case management software allows for centralized data storage, facilitating seamless collaboration among multiple departments and agencies. This streamlined data management ensures that investigators have quick access to all relevant information, leading to faster case resolutions.

Integration of Advanced Analytical Tools

Case Closed Software integrates cutting-edge analytical tools, such as link analysis and data visualization, that aid investigators in connecting the dots between seemingly unrelated pieces of information. These tools are particularly invaluable in complex cases involving child exploitation networks and online predators. By analyzing and mapping relationships between suspects, victims, and key pieces of evidence, investigators can build stronger cases and identify criminal patterns more efficiently.

Improved Case Visibility and Accountability

With investigation case management software, supervisors and administrators gain real-time visibility into ongoing cases. This enhanced oversight enables them to monitor progress, allocate resources effectively, and ensure accountability throughout the investigative process. As a result, law enforcement agencies can better prioritize cases involving children, giving these cases the attention they deserve.

Crimes Against Children Conference (CACC)

 

The Crimes Against Children Conference in Dallas (August 6 – 10, 2023)  provides a platform for law enforcement professionals to share knowledge, best practices, and experiences related to investigating crimes against children. Incorporating investigation case management software into these discussions allows attendees to understand the software’s practical application and the advantages it offers. Moreover, it facilitates the exchange of valuable insights, enabling agencies to optimize their use of the software for more effective investigations.

Conclusion

Investigation case management software has emerged as a powerful ally in the fight against crimes against children. Its ability to streamline data management, facilitate collaboration, integrate advanced analytical tools, and support digital forensics has significantly improved the efficacy of law enforcement investigations. As we continue to battle the heartbreaking crimes committed against our children, the integration of technology, like the software offered by Case Closed Software, ensures that law enforcement agencies have the necessary tools to bring perpetrators to justice and protect the innocent.

By leveraging technology and fostering knowledge-sharing platforms like the Crimes Against Children Conference in Dallas, we can collectively work towards a safer and more secure future for our children.

Waco Police Department Selects Case Closed Software for Gang and Narcotics Investigations.

Waco, Texas – The City of Waco Police Department has selected specialized criminal investigation software from Case Closed Software™ to manage investigations into gangs and narcotics crimes. The new software will provide officers with the tools they need to effectively investigate and track criminal activity in these areas, allowing them to more efficiently gather and analyze data to build strong cases.

“Gang and narcotics crimes are two of the most serious challenges facing law enforcement agencies in Waco and across the country”, said Case Closed Software’s CEO Douglas Wood. “These crimes often involve complex networks of individuals and can be difficult to investigate and prosecute. The new software  will help better identify and track criminal activity, and build stronger cases against those who would do harm.”

According to recent data from the Waco Police Department, narcotics-related offenses have been on the rise in recent years, with a particular increase in the abuse of opioids and other prescription drugs. The department has also reported a rise in gang activity, with several local gangs being linked to drug trafficking and other serious crimes.

Case Closed Software is a leading provider of CJIS-compliant, cloud-based criminal investigation software and has been deployed by law enforcement agencies across the country. The software is designed specifically to help investigators manage complex cases involving gangs and narcotics, providing tools for gang analysis, investigation management, and organizational reporting.

The new software is expected to be implemented in the coming weeks, and officers will receive training on how to use it effectively. The City of Waco Police Department remains committed to providing the highest level of service to the community and will continue to explore new technologies and tools to support its mission.

Case Closed Software has also recently announced that its software was being deployed for Baldwin County (GA) Sheriff’s Office.

For more information on Case Closed Software, please visit their website at www.caseclosedsoftware.com.

Hope For Justice Selects Case Closed Software to Enhance Anti-Human Trafficking Investigations

Nashville, TN (January 2, 2023) – Hope For Justice, a leading international non-profit organization dedicated to ending modern slavery, announced today that it has selected Case Closed Software to enhance its anti-human trafficking investigations.

Hope For Justice is dedicated to rescuing and supporting victims of human trafficking and bringing perpetrators to justice. The organization has a long history of success in investigations and has rescued thousands of victims. However, with the increasing complexity of human trafficking, Hope For Justice has recognized the need for a more advanced technology solution to support its efforts.

Case Closed Software provides a comprehensive case management solution designed specifically for anti-human trafficking investigations. With its purpose-built counter-human trafficking capabilities, Hope For Justice will be able to streamline its investigations, identify new leads and track the progress of its cases more effectively.

“We are honored to be working with Hope For Justice and its mission to end modern slavery,” said Douglas Wood, CEO of Case Closed Software. “We believe that our technology will be a valuable asset in the fight against human trafficking and we look forward to supporting Hope For Justice in its important work.”

About Hope For Justice: Hope For Justice is a leading international non-profit organization dedicated to ending modern slavery by rescuing victims, restoring lives, and reforming society. Founded in 2008, Hope For Justice has operations in the United Kingdom, United States, Cambodia, and Nigeria.

About Case Closed Software: Case Closed Software is a leading provider of technology solutions for anti-human trafficking and other criminal investigations. The company’s comprehensive case management solution is designed specifically to support the needs of anti-trafficking organizations and law enforcement agencies.

For more information, please contact:

Douglas Wood, CEO Case Closed Software dwood@crimetechsolutions.com

The Wilson Ruling: What it Means for ICAC Investigators

Case Closed Software™ recently worked on a project with the City of San Diego Police Department’s Internet Crimes Against Children (ICAC) Task Force.

 

San Diego ICAC

The project arose out of a need for a sophisticated tool to help the multi-jurisdictional ICAC unit effectively triage and investigate criminal activity involving child sexual abuse materials (CSAM). In particular, we needed to come up with an investigation tool that would work around evolving laws and The Wilson Ruling of 2021.

Note: CSAM has previously been referred to as ‘Child Pornography’, but has evolved into a more accurate depiction of the abuse committed upon unwilling victims.

At the root of Wilson Ruling, which we will discuss in depth below, is the 2008 Protect Our Children Act sponsored by then-Senator Joe Biden and signed by then-President George W. Bush. The law requires “electronic communication service providers to notify the National Center for Missing and Exploited Children (NCMEC) when they discover apparent violations of laws prohibiting CSAM.

NCMEC then creates and distributes CyberTips to appropriate law enforcement agencies and specially-trained agents.

The Anatomy of a NCMEC CyberTip for ICAC Units

Without getting too granular, a CyberTip is made up of several sections. There’s a front page, and Sections A through D. The front page will contain the date it was received, its assigned report number, and an executive summary. The executive summary will say what type of incident the report refers to, such as “Apparent Child Pornography”, and the number of files that were uploaded.

The first section of a CyberTip, Section A, has information about the reporting agency – Google, Facebook, TikTok and so on. It will also include a brief incident description, the time of the incident, the webpage involved, and the email, username, and IP address of the person reported.

Spoiler Alert… Here’s a key to The Wilson Ruling: For each file, this section says whether the reporting ESP actually viewed the file and whether the file was publicly available. We’re going to come back to this shortly.

Section B is geolocation information for the offending IP address given in the report. This helps NCMEC know which ICAC Task Force should get the tip. The ISP who owns or controls the IP address will also be listed.

Section C is for any additional information and may reference other CyberTips that are associated with the same username or IP address.

Here’s another key point related to The Wilson Ruling. The images or videos associated with the CyberTip are provided to the appropriate agency along with a PDF report, but they are NOT shown in the body of the report.

Why the CyberTip Matters

The point of describing the CyberTip here is to reinforce just how much unstructured data exists on them and foreshadow some of the pain points that ICAC teams experience in getting these CyberTips triaged.

That’s a significant component of the partnership that Case Closed Software has developed with San Diego Police Department… how to manage, de-conflict, and triage the overwhelming volume of CyberTips that each ICAC task force or investigator receives.

The other significant component of what we’ve worked on together from a technology perspective is related to how courts have applied Fourth Amendment doctrines to CSAM investigations. The Fourth Amendment, of course, is an important piece of our Bill of Rights and is supposed to protect all of us from unreasonable searches and seizures by the government.

The ICAC Investigation into Luke Noel Wilson

Let’s look at The Wilson Ruling of 2021. This came out of the court’s application of the Fourth Amendment in the case of defendant Luke Noel Wilson who, in June 2015, attached several images containing CSAM to an email on his Gmail account. Google’s screening system –  which scans uploaded images and checks for identical matches in a database of confirmed CSAM – immediately flagged Wilson’s attachments as “apparent child pornography”.

Without having an employee review the attachments first, Google’s system then sent an automated report to NCMEC that included the images. As is standard policy for ESPs, the report contained information about the date and time Wilson uploaded the images, along with his email address, login information, and the IP address of the device he used to upload the images.

NCMEC subsequently forwarded the report to local law enforcement – in this case, the fine team at San Diego ICAC – where an agent reviewed the NCMEC CyberTip and inspected each of the images, confirming that they were indeed CSAM.

Relying on Google’s report and his personal observations, the agent then applied for – and obtained – a search warrant for Wilson’s email account. The agent’s affidavit accompanying the search warrant request included descriptions of the images but didn’t specifically contain any mention of matching hash values, nor any description of Google’s screening process for CSAM.

When, with search warrant in hand, the agent searched Wilson’s email account, he discovered several email exchanges in which Wilson received and sent CSAM and additionally offered to pay a woman to molest and exploit children.

Law Enforcement then obtained a search warrant for Wilson’s residence and vehicle where they discovered devices containing thousands of images of CSAM including the original four attachments. Wilson’s alleged attempt at throwing a backpack over his balcony was noticed by assisting agents and was found to contain a thumb drive full of additional Child Sexual Abuse Materials.

It was later estimated that Wilson possessed 500 videos and 11,000 images of child sexual abuse, and – a few months later – he was arrested and charged with Distribution and Possession of Child Sexual Abuse Materials.

Wilson was convicted and sentenced to 45 years in prison.

So, this seems at this point like a fairly standard ICAC case. What then happened that fundamentally changed the way ICAC units operated to triage and investigate CyberTips?

The Motion to Suppress

After his trial, Wilson filed a motion to suppress the four original attachments (the ones included in the original CyberTip) AND all evidence subsequently seized from his email account and residence, arguing that San Diego ICAC’s initial review of his attachments was a warrantless search in violation of the Fourth Amendment.

The District Court denied his motion, however, reasoning that the government does not perform a ‘search’ within the context of the Fourth Amendment when it inspects something that is ‘virtually certain’ to contain contraband.

Wilson subsequently appealed that decision to The Ninth Circuit which reversed the lower court’s decision, concluding that the agent’s viewing of the attachments violated Wilson’s 4th Amendment rights and rejecting the position that there was ‘virtual certainty’.

Basically, the Ninth Circuit said that Google’s initial report specified only the ‘general’ age of the child and the ‘general’ nature of the acts shown, and had not been viewed by any Google employee.
By viewing the four attachments without a search warrant, therefore, the higher court concluded that law enforcement unlawfully obtained new, critical information, and then used that new information to obtain warrants to search Wilson’s home and email account.

Of key importance in the ruling was the assessment that, even though Google employees viewed images identical to Wilson’s to create Google’s database of suspected CSAM, they had not viewed the actual image itself.

By contrast, after viewing the images, law enforcement could describe “the number of minors depicted, their identity, the number of adults depicted alongside the minors, the setting, and the actual sexual acts depicted.”  So, even though Google’s algorithm had flagged Wilson’s attachments to a mathematical certainty that his images were “bit-for-bit” duplicates of images identified by its employees as CSAM within their database, Wilson’s motion to suppress was granted.

The Fallout

The fallout for ICAC Task Forces has been tremendous because of this ruling. How are ICAC units and their respective affiliates, supposed to expeditiously review, triage, and investigate a massive and growing number of CyberTips while tip-toeing around an individual’s 4th Amendment rights?

Case Closed Software for ICAC

Last year, San Diego ICAC approached Case Closed Software™ with this exact set of problems and we began work on a tool designed to systematically process CyberTips – one that automates what is currently a time-consuming chain of events.

The Trouble with Triage

For most ICAC Units, individual CyberTips must be downloaded as zip files via NCMEC or IDS. Those zip files contain PDF files with unstructured text that lists:

• Reporting Agencies
• Usernames
• Email Addresses
• Telephone Numbers
• IP Addresses
• Hash Values
• Physical Addresses
• Sender IDs
• Recipient IDs
• Suspect Names
• Victim Names
• … and much more.

Triage administrators must:

  1. Download each CyberTip locally
  2. Unzip the file
  3. Begin a long process of putting those data elements together to create a connected view of those data elements to determine solvability
  4. And then assign to an investigator – internal or affiliate.

Oh, and then do the same for the next CyberTip… and the next one… and the next one after that.

Problem Solving for ICAC

Working with San Diego ICAC, we created a tool that allows administrators to save CyberTips directly a CJIS-Compliant ‘black box’ server instead of downloading them locally. That black box contains proprietary logic that systematically opens those zip files, pulls all of those data elements from the PDFs, grabs all of the attachments and underlying hash values, and links them into a single interface for the administrator. Important to note is that this process happens quickly and virtually eliminates the manual efforts in existence now.

CyberTips Triage and Case Management

 

We have essentially created a unique, user-friendly system where investigators cannot view attachments until they purposely elect to.
They can see usernames, IP Addresses, filenames, and an array of other information… but not the images. Images cannot be revealed until investigators have proper authority in compliance of the Wilson Ruling. It’s a simple but brilliant addition to the process that protects all parties.

Just to tie a bow around Mr. Wilson, he was eventually convicted of child molestation on the Stateside and sentenced to 25 years. He was subsequently charged and convicted of possession and distribution of CSAM on the federal side and received an additional ten years. He is where he should be, but his entire case was thrown into jeopardy when one agent viewed four files that one court felt violated his rights.

The Proposed Solution: Case Closed Software™

At its core, Case Closed Software is a multi-jurisdictional investigation case management system for complex criminal investigations.

The ICAC-specific functionality that was added to the system takes what was once a CyberTip and, using what we call our ‘One Page Case Management’ methodology, helps turn it into a conviction.

What is Investigation Case Management Software?

Today’s complex criminal and serious investigations cannot be effectively managed with thumb drives, SharePoint, cloud folders, paper forms, and sticky notes. Times have changed and the introduction of investigation management and case investigation software is now an integral part of any specialized investigative agency.

What is Investigation Software?

Investigation case management software such as that from Case Closed Software™ is a purpose-built system that assists investigators triage investigative cases, track the involved entities, record supplemental reports and case actions, and generally help users close cases faster and more efficiently.

Investigation software (aka case management software) is specifically designed to help users collaborate and work efficiently with team members – whether they are across the aisle, or across the globe.

Investigation management software is more than fancy graphs and big data analytics. It’s also more than simple incident tracking. Many vendors will try to convince you otherwise because they lack true case management functionality.

True investigation case management software allows agencies of any type to triage new tips and leads, assign them to appropriate agents, track all related case entities such as people, places, and things (vehicles, evidence, organizations, IP Addresses, etc) in an easy-to-use and intuitive fashion.

Importantly, investigation software and incident management software allows agencies including law enforcement, anti-human trafficking groups, drug task forces, national police agencies, federal agencies, internet crimes against children (ICAC) task forces and more can quickly log and analyze all investigative case materials with built-in flexible workflow for approvals.

Top 20 Things to Look For When Procuring a Case Management System

When considering investigation case management software, agencies should look for the following must-haves:

  1. A proven and delighted install base.
  2. Tips and Leads management with the ability to promote them to a full investigation.
  3. Master databases (fully searchable) of all case entities
  4. Organizations and gang databases for organized crime
  5. Multi-Jurisdictional capabilities
  6. Real time multi-language functionality
  7. 28 CFR Part 23 compliant Criminal Intelligence
  8. Evidence management including full chain of custody
  9. Customizable workflow
  10. Case Visualization and Link Analysis
  11. Confidential Informants and whistleblower management
  12. Criminal charges and statutes functionality
  13. Operations planning
  14. Task and Assignments management
  15. Criminal Justice Information Systems (CJIS) Compliance
  16. Photo lineup functionality
  17. Remote Case Review (For sharing with prosecutors or LE)
  18. Multimedia attachments
  19. Customizable case reports
  20. World-class support and system maintenance

In short, investigation management software helps you conduct more efficient and, effective investigations. Case Closed Software is the leader in the investigation case management industry.

U.S. based Case Closed Software™ is a recognized leader in the development of investigation case management software and is a true investigation software company.