March 23, 2023 (Austin, TX) We are proud to announce that Case Closed Software™ has achieved TX-RAMP Certification, a prestigious recognition that demonstrates our commitment to providing secure and reliable software solutions for our clients.
The Texas Risk Assessment and Mitigation Program (TX-RAMP) certification is awarded to companies that have met strict security standards and have implemented robust risk assessment and mitigation processes. This certification recognizes our dedication to providing our clients with the highest level of security and reliability in our software solutions.
At Case Closed Software, we deliver unparalleled case management software for law enforcement and we understand the importance of protecting sensitive data and confidential information. That’s why we have invested heavily in developing a secure software platform that meets the rigorous security standards required by TX-RAMP certification.
We believe that this certification is a testament to our commitment to providing our clients with the best possible software solutions while maintaining the highest level of security and reliability. We are proud to have achieved this certification and look forward to continuing to provide our clients with the best possible service.
Billy the Kid carved his name into history through his exploits during and after the Lincoln County War. In a career filled with almost impossible escapes and daring acts in battle, the “Kid” nevertheless found himself on the losing side of the war and, in its aftermath, was branded the West’s most notorious and wanted desperado.
Reportedly killed by Sheriff Pat Garrett in 1881, rumors persisted that the Kid survived, and new evidence developed by Cold West Detective Agency may prove that the Kid lived well into the Atomic Age.
Cold West Detective Agency takes a different and unique approach to history. While historians like to ‘study’ it, Cold West detectives actually ‘investigate’ it as a cold case. Working with law enforcement, Cold West detectives bring distinctive and rare expertise to the investigation of historical cold cases.
Blending old-west footwork with leading-edge investigation case management technologies from Texas-based Case Closed Software, Cold West detectives perform robust investigations at these century-old crime scenes.
Cold West picks up where history left off, and that can make some historians uncomfortable. It’s been said that “dead men tell no tales”, but when Cold West’s group of hardened investigators combine their expertise and curiosity with Case Closed Software, these investigations come back alive, and history begins to speak its secrets.
Cold West uses the “posse method”, utilizing experts from any and every field required to move the case forward. They work hand-in-hand with local Sheriffs, police, tech experts, federal agents, historians, and other experts, using cutting edge modern crime scene investigative methods (CSI) to develop never before seen and court-accepted evidence that changes history.
“Case Closed Software has been a game-changer for us”, said Steve Sederwall the co-founder of Cold West and former federal criminal investigator. “Our ability to blend all of our new investigation findings with all of those historical records helps us identify and develop new tips on our historical cases.”
Recently, Cold West – in the midst of investigating another famous old west crime – used Case Closed to develop previously unknown information that could completely change history’s view of the case. That investigation continues today.
“I like to think about how Jesse James or Billy The Kid would react to seeing how the accepted narrative of their demise is being changed through the work of Cold West detectives using modern and leading-edge technology”, added Case Closed Software’s president Douglas Wood.
The Exodus Road, a global organization dedicated to fighting human trafficking, announced today that they have adopted the industry leading investigation case management system from Austin, TX based Case Closed Software.
The Exodus Road fights human trafficking by sending national and foreign operatives to suspected human trafficking locations to gather intelligence and evidence. To date, their organization has been directly involved in the rescue of nearly 1500 victims of human trafficking and the arrests of almost 600 criminals in six different countries. Using Case Closed Software, the company expects to improve these global operations and manage cases more effectively, ultimately resulting in the rescue of more and more victims.
The Exodus Road began through the work of co-founders Matt and Laura Parker who, in 2010, operated a children’s home in rural Northern Thailand. During that time, Matt and Laura were exposed to marginalized people groups – targets for human trafficking. Eventually, Matt began networking with news media and local police to learn about the problem at the ground level. After a period of research, he was deputized by police and started working personally to find those trapped in slavery. Today, they lead a team of 70 staff members, many of whom are national operatives who work closely with vetted police partners.
“With operatives and investigators around the world, we needed a truly powerful and multi-jurisdictional investigation management system,” said Ryan Hill, director of Global Operations at The Exodus Road. “We chose the Case Closed Software solution because of its impressive feature set, multi-language support, and ease of use for our field operatives. Case Closed Software will allow us to stay organized and share case files electronically with local law enforcement agencies around the world. We can even plan rescue operations directly within the system.”
Case Closed Software’s founder and CEO, Douglas Wood, commented “When we first met the folks at The Exodus Road, we were shocked to learn how widespread this criminal activity is. Human traffickers operate in a shadowy underworld that knows no borders and has no mercy for its victims. Case Closed Software is a perfect fit for anti-human trafficking investigations. Our software allows operatives to collect and share intelligence and evidence and helps track the people, locations and other entities involved in these horrendous crimes.”
The Case Closed Software investigation management platform deployed by The Exodus Road includes end-to-end case management with a configurable workflow, tips and leads management, evidence tracking, operations planning, multi-language support, and a host of other powerful features including entity deconfliction and visualization.
About The Exodus Road
For more information, https://theexodusroad.com or email: press@theExodusRoad.com
About Case Closed Software
For more information, https://www.caseclosedsoftware.com or email: info@CaseClosedSoftware.com
Several times each week, I receive an inquiry from a PD, task force, or Sheriff’s office asking if my investigation case management software, Case Closed Software, can interface with a particular Records Management System (RMS). The question stems from the investigation unit’s desire to have a purpose-built, flexible solution designed to help their agents stay organized and work more efficiently.
Let’s face it… RMS software, by and large, is not designed for managing major cases. Agencies know it, and the RMS vendors know it. For them, the notion of managing the complexities of major case investigations is an afterthought at best.
(The answer I give to these inquiries, by the way, is that any good investigation management software should have capabilities to ingest data from other law enforcement products, including RMS).
The more important point, however, is recognizing that criminal investigators gather vasts amounts of information during the course of an investigation. Witness statements, interviews, interrogations, tips, leads, informant statements, audio files, video files, photos, and much more. Too often, agents must rely on their RMS systems which, per above, are not purpose-built for investigations. Investigators also rely heavily on paper files and file cabinets full of notes, search warrants, and physical evidence.
Fortunately, there is an alternative… purpose built investigation case management software that utilizes what I call ‘Case Actions’ as the underlying workflow. Case Actions are the individual actions that an investigation unit takes in pursuit of closing a case. These are the investigative supplemental reports. Case Actions are expansive in nature, and include:
Crime Scene Visits
Interviews
Interrogations
Knock ‘n Talks
Surveillance
DNA
Search Warrants
Affidavits
Controlled Buys
Arrests
… and much, much more. You get the idea, though.
By effectively logging each Case Action in a particular Case, the investigators (and management) are able to quickly and visually recognize the status of the case, and what further actions should be taken. Each Case Action leads to new information… which leads to new Case Actions. And the beat goes on. Hopefully, sooner rather than later, enough information is garnered to close the case. That’s the power of Case Action based workflow.
With the Case Action based approach, each Case Action is tied to Persons, Locations, Vehicles, etc. As a result, robust dossiers of these things are built without the individual agent(s) even realizing it.
By utilizing an investigation case management solution that is based upon Case Actions, law enforcement can leverage information from previously-entered data such as telephone numbers, evidence items, addresses, persons, gang members, etc. The Case Actions feed themselves – and each other – to build a valuable repository of investigative information.
An example: A detective has received a tip that Doug Wood is involved in a particular criminal activity. By accessing her Case Action-based system, she quickly learns that Doug Wood has been a Suspect in Case 1 (belonging to an entirely different investigator), and a Witness in Case 2 (belonging to a third investigator).
She also learns (via Case Actions performed by the Gang Unit) that Doug Wood shares an address with a confirmed Gang Member and goes by the nickname ‘Woody’. She also sees Doug’s previous addresses, telephone numbers, work history, social media accounts and so on… each of which has been logged as part of completely unique Case Actions.
That is the power of Case Actions based investigation management software. Because each previous Case Action involving Doug Wood was logged, the current investigator has a goldmine of information at her fingertips.
Case Closed Software is the leading provider of Case Action based investigation case management software for law enforcement. Contact Us for a demo today!
Several times each week, I receive an inquiry from a PD, task force, or Sheriff’s office asking if my investigation case management software, Case Closed Software, can interface with a particular Records Management System (RMS). The question stems from the investigation unit’s desire to have a purpose-built, flexible solution designed to help their agents stay organized and work more efficiently.
Let’s face it… RMS software, by and large, is not designed for managing major cases. Agencies know it, and the RMS vendors know it. For them, the notion of managing the complexities of major case investigations is an afterthought at best.
(The answer I give to these inquiries, by the way, is that any good investigation management software should have capabilities to ingest data from other law enforcement products, including RMS).
The more important point, however, is recognizing that criminal investigators gather vasts amounts of information during the course of an investigation. Witness statements, interviews, interrogations, tips, leads, informant statements, audio files, video files, photos, and much more. Too often, agents must rely on their RMS systems which, per above, are not purpose-built for investigations. Investigators also rely heavily on paper files and file cabinets full of notes, search warrants, and physical evidence.
Fortunately, there is an alternative… purpose built investigation case management software that utilizes what I call ‘Case Actions’ as the underlying workflow. Case Actions are the individual actions that an investigation unit takes in pursuit of closing a case. Case Actions are expansive in nature, and include:
Crime Scene Visits
Interviews
Interrogations
Knock ‘n Talks
Surveillance
DNA
Search Warrants
Affidavits
Controlled Buys
Arrests
… and much, much more. You get the idea, though.
By effectively logging each Case Action in a particular Case, the investigators (and management) are able to quickly and visually recognize the status of the case, and what further actions should be taken. Each Case Action leads to new information… which leads to new Case Actions. And the beat goes on. Hopefully, sooner rather than later, enough information is garnered to close the case. That’s the power of Case Action based workflow.
WIth the Case Action based approach, each Case Action is tied to Persons, Locations, Vehicles, etc. As a result, robust dossiers of these things are built without the individual agent(s) even realizing it.
By utilizing an investigation case management solution that is based upon Case Actions, law enforcement can leverage information from previously-entered data such as telephone numbers, evidence items, addresses, persons, gang members, etc. The Case Actions feed themselves – and each other – to build a valuable repository of investigative information.
An example: A detective has received a tip that Doug Wood is involved in a particular criminal activity. By accessing her Case Action-based system, she quickly learns that Doug Wood has been a Suspect in Case 1 (belonging to an entirely different investigator), and a Witness in Case 2 (belonging to a third investigator).
She also learns (via Case Actions performed by the Gang Unit) that Doug Wood shares an address with a confirmed Gang Member and goes by the nickname ‘Woody’. She also sees Doug’s previous addresses, telephone numbers, work history, social media accounts and so on… each of which has been logged as part of completely unique Case Actions.
That is the power of Case Actions based investigation management software. Because each previous Case Action involving Doug Wood was logged, the current investigator has a goldmine of information at her fingertips.
Case Closed Software is the leading provider of Case Action based investigation case management software for law enforcement. Contact Us for a demo today!
Here in Part Three, I want to discuss the second ‘type’ of Major Cases – Multi-Incident Major Cases and – specifically – the problems associated with trying to investigate a case while related crimes are still occurring. (Spoiler Alert: It’s stressful)
Based upon interviews I have conducted with CID Commanders, Sheriffs, District Attorneys, and other law enforcement experts, there are several types of Multi-Incident Major Cases. Based on the patterns of the crimes, Multi-Incident Major Cases are classified into three basic categories – Mass crimes, Spree crimes, and Serial crimes
Mass Crimes – A Major Case mass crime involves multiple victims at one location during one continuous period of time, whether it is done within a few minutes or over a period of days. The term ‘mass murder’ springs to mind, and invokes images of Dylann Roof(Emanuel African Methodist Episcopal Church in South Carolina), James Holmes (2012 Aurora, CO. shooting in which he killed 12 people and injured 70 others at a movie theater), and James Loughner (2011 Tuscon, AZ shooting that killed 6 people and severely wounded US Representative Gabrielle Giffords).
There are other types of Major Case mass crimes, however, including mass assault, mass human smuggling, and other horrible crimes that need no further illustration here.
Spree Crimes – Spree criminals commit two or more serious crimes with two or more victims, but at more than one location. An important distinction about spree crimes is that there is no ‘cooling off’ period between the crimes.
An unfortunate example of a spree crime is that of Mark Barton. On July 29th, 1999, he walked into his office at Momentum Securities and opened fire, killing four people. Then he went next door to another company and killed five more people. Earlier in the day he had also murdered his wife and their two children. Multiple crimes in multiple locations with no cooling off.
Another example of a spree crime is the armed robber who hits a slew of pre-chosen banks on the same day, terrorizing employees in the process. The examples here are too numerous to mention, but they become Major Cases by virtue of their spree qualities. Again, this shows multiple crimes in multiple locations with no cooling off.
Serial Crimes – Serial criminals commit multiple crimes with multiple victims. Unlike spree criminals, however, serial criminals commit their crimes on distinctly separate occasions. There is a cooling off period between crimes.
Uniquely, serial criminals tend to plan their crimes meticulously and pre-select their victims and locations. Unlike mass crimes and spree crimes, serial crimes are differentiated in that the perpetrator tends to carefully select their victims, have cooling-off periods between crimes, and plan them carefully. Examples of serial criminals (especially serial killers) are far too easy to find and include The Zodiac Killer (in California in the late 1960s), Ted Bundy (confessed to killing 30 women), and Dennis Raider (The BTK Murderer who killed 10 people in Wichita between 1974 and 1991
A unique problem with Multiple Incident Major Cases
The major problem for law enforcement investigating Multiple Incident Major Cases, especially those that fall in the ‘serial’ category, is that new crimes are committed even as the investigation is underway. Resources can be stretched to their thinnest when a new crime is added to the serial list, and the public pressure for an arrest can overwhelm even the hardest of investigators. Hello, stress.
A common attribute of the successful serial crime investigators that I have spoken with is their ability to separate the pressure from the work. The crimes and their timing are unpredictable, the public demand for a resolution is powerfully serious, and ‘interested parties’ (think politicians) are breathing down the investigators’ necks. That’s a lot of pressure.
Just as in any profession, untreated stress can lead to major consequences. These consequences not only affect the individual investigator, but also those with whom he or she has daily contact, including family and friends. The investigators I have spoken with help alleviate the pressure through:
Taking care of themselves physically,
Ensuring that workload is spread as evenly as possible, and
Taking time to partake in leisure and family.
(A quick point of clarity and a disclaimer: Any discussion around the differences between mass criminals, spree criminals, and serial criminals is going to be lively, and is an ongoing source for debate among criminologists. This posting will undoubtedly include characteristics and definitions that some readers may not entirely agree with.)
Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.
In Part One of this series, I provided my definition of Major Cases and went into some detail about some of the attributes that differentiate a Case from a Major Case. Moving ahead now, I want to take a look at the different ‘types’ of Major Cases and an overview of major case management.
One of the problems in dealing with Major Cases is that, because of the varying types of cases, there’s no firm blueprint for investigating them. Major Cases move in real time, and – based upon interviews I have conducted with Major Case Investigators – can generally fall into one of two categories – Single Incidents and Multiple (serial) Incidents.
This article tackles Single Incident Major Cases.
Single incident Major Cases are defined by one single criminal act so abhorrent to the socio-economic environment, that it alone creates intense pressure to apprehend the perpetrator(s). What makes the incident so abhorrent ranges from factors such as:
The identity of the victim: In September of 1996, at the height of tensions between The Bloods and The Crips, a 25 year old African American man is shot in a drive-by shooting on the streets of Las Vegas and dies a few days later. Unfortunately, young black men die far too frequently in times of gang tensions, and few of these cases ever elevate to the status of a Major Case. The victim here, however, was Tupac Shakur.
Tupac was an American rapper and actor who came to embody the 1990s gangsta-rap aesthetic, and was a key figure in the feud between West Coast and East Coast hip hop artists. Simply put… he was famous as hell. Hence, a far-too-routine shooting became a Major Case in the blink of an eye. The case remains unsolved.
The identity of the suspect(s): “We the jury in the above entitled action find the defendant, Orenthal James Simpson, not guilty of the crime of murder.” Thus ended the double murder trial of former NFL player and Heisman Award winner OJ Simpson. In what was deemed ‘The Trial of the Century”, Simpson had been charged with the June 13, 1994 killings of his ex-wife Nicole Brown Simpson, and her friend Ron Goldman.
After weeks of testimony, and a clear nation-wide division between those who believed Simpson to be innocent and those who believed him guilty, Simpson was acquitted of the murders on October 3, 1995.
While the case of two relatively young and affluent Caucasians being killed in the generally safe area of Brentwood may have been newsworthy, it was the identity of the suspect that was the catalyst in this becoming one of the most famous single-incident Major Cases in American history.
The location of the crime: When a half-naked corpse, covered in cuts, bruises and bite marks, is found behind the Metropolitan Museum of Art in New York’s Central Park, you have the makings of a Major Case. The corpse was that of 18-year-old Jennifer Dawn Levin. Levin was murdered during the early morning hours of August 26, 1986.
The ‘Met’, as the museum is known, is one of the most-visited and famous museums on the entire planet. Murders don’t happen in world-famous places like this, and the case became the top story on the evening news for months and months. That is one major single-incident Major Case.
After an investigation into what the press dubbed “The Preppie Murder”, college student Robert Chambers was charged and tried for murder. The jury, however, remained deadlocked for nine days and a plea bargain was struck. (Chambers’ defense, you may recall, was that he had killed Ms. Levin during consensual ‘rough sex’.)
The uniqueness of the crime itself: Six year old girls in upscale Colorado neighborhoods aren’t supposed to die. They’re certainly not supposed to be murdered… especially in their own home while the rest of the family slept. Uniqueness has always surrounded the December, 1996 killing of young beauty queen JonBenét Ramsey in Boulder, CO.
On the morning of December 26, 1996, John Ramsey found his daughter’s body with duct tape over her mouth and a cord twisted around her neck in the basement of the family home. John’s wife, Patsy, says she found a ransom note demanding $118,000 for JonBenét’s return – an amount that is purported to match exactly a recent work-related bonus that John Ramsey had received. Despite these odd circumstances, the couple retained lawyers and were not formally interviewed by police for over 4 months. (The case has never been solved, and Boulder Police have cleared the couple of any wrongdoing.)
Tragically, it’s estimated that over 1500 children are murdered each year in America. JonBenét’s case may have been just another number in that truly sad statistic were it not for unique circumstances that surrounded it; it occurred in an upscale neighborhood, the victim was a young beauty queen, the ransom note matching the bonus, a possible crime scene contamination by father John, and ‘seemingly’ uncooperative parents that made this a single-incident Major Case.
In Part Three of this series, we examine some examples and problems associated with Multiple Incident Major Cases.
Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.
This is Part 1 of a series dedicated to the science (and art) of managing Major Criminal Cases in law enforcement. In order to begin a discussion on this subject, though, it’s important to define what makes an investigation a Major Case Investigation in the first place.
“A Major Case is a real or suspected crime of such severity that it creates an intense public demand for identification, apprehension, and prosecution of the offender(s).”
– Chief Daniel McDevitt
Irrespective of how your own definition may vary from Chief Dan’s, this much is simple; Major Cases are serious criminal matters. The degree of ‘seriousness’, however, is almost entirely relative. A stabbing in Chicago may not, by itself, be ‘serious’ as viewed by the public at large. Conversely, a sexual assault on a small University Campus may be extremely ‘serious’.
Make no mistake… neither are good or acceptable, and both are, of course, unthinkable violations. The point here is that cases may be Major Cases (or not) by virtue of the relative socio-economic environment in which they are being investigated.
Attributes of a Major Case. You probably have a Major Case when..
All of that said, there are several attributes which are common in major case investigations:
Resource Requirements – The amount of resources that an investigation unit must devote to a Major Case is substantial… far more than the average investigative case. This would include additional officers, overtime, forensics work, and the like. If your budget is shot in one fell swoop… you probably have a Major Case on your hands.
Big Brother is Watching – Maybe the Mayor is involved. Maybe the ACLU. Black Lives Matter? The NRA, even. Major Cases are often associated with major non-law enforcement interest from groups claiming to be stakeholders. If Al Sharpton, Wayne LaPierre, or AG Jeff Sessions have chimed in… you probably have a Major Case on your hands.
All Hands on Deck – Major Cases tend to redefine titles and organizational roles. Many of the Chiefs and Sheriffs I have interviewed on this topic describe pulling all types of duty assignments. Patrol officers become Detectives, who become Media Relations, and so on. If the chief cook is washing bottles… you probably have a Major Case on your hands.
Media Attention – Many Major Cases capture the attention of the public and, subsequently, the media. In many cases, a local case can turn viral and suddenly there’s a CNN mobile satellite truck parked outside. What makes an investigation viral isn’t always clear, but it’s discussed HERE in some detail. If Wolf Blitzer calls your investigation ‘Breaking News’… you probably have a Major Case on your hands.
There are Multiple Jurisdictions Involved – Because of the possible complexities of Major Cases, they quite often involve multiple agencies. Task Forces are regularly utilized in Major Cases, and are comprised of any number of people from across different law enforcement agencies, making the problem of staying organized even harder. Perhaps the City PD is working to support the local Sheriff’s Office – or vice versa. Maybe the State Bureau of Investigation is involved. Maybe the FBI. If you need ‘Hello My Name Is…” stickers during your case review… you probably have a Major Case on your hands.
Having placed some parameters around what defines a Major Case, we will look deeper into the unique problems associated with these types of investigations. Stay tuned for Part Two of this series.
Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.
According to Jeff Kunkle, President of Visallo, the partnership enhances his company’s suite of easy-to-use, web-based data visualization tools for investigative link analysis, data discovery, crime analytics and geospatial analysis with Crime Tech Solutions’ powerful and flexible Case Closed investigation case management software.
“Visallo is designed for intelligence analysts, law enforcement investigators, and fraud analysts who need easy to use tools to help them discover and visualize complex relationships within vast amounts of data without resorting to time-consuming, ad-hoc, and error-prone manual processes,” said Mr. Kunkle. “These are analysts that want to make sure they don’t miss important non-obvious insights during their investigations, want to produce more accurate, thorough, and defensible conclusions, and ultimately seek to be more accomplished investigators able to tackle the toughest cases.”
Tyler Wood, VP of Operations at Crime Tech Solutions added, “Where Visallo does much of the big data analytics, the Case Closed software is specifically designed for investigative process and major case management. The software manages the entire investigation workflow from start to finish and includes functionality such as task management, alerting, communications, evidence management, and a great deal more.”
Until now, investigative agencies had to turn to multi-million dollar solutions from behemoth multinational companies for this combined functionality. The partnership is designed to give customers more investigation functionality at a price point that can scale down to smaller groups. “For years, only the largest law enforcement and federal agencies could afford to purchase these types of advanced tools,” added Mr. Kunkle. “The partnership between Visallo and Crime Tech Solutions changes that reality.”
The companies have indicated that integration efforts are already underway to ensure a seamless and user-friendly experience.
About Visallo Visallo helps investigators of all types produce more accurate, thorough, and timely analysis with a software platform to help them discover, visualize, and understand complex relationships hidden in massive amounts of data. Visallo’s all-in-one suite of easy-to-use, web-based, visualization tools and machine learning data analysis algorithms augment the investigator’s hard-earned experience and intuition with data-driven insights that would be difficult, if not impossible, to discover otherwise.
About Crime Tech Solutions Crime Tech Solutions develops and markets a robust suite of powerful software solutions designed for intelligence and investigation teams. Their flagship products include the popular Case Closed™ investigation platform and IntelNexus™, an advanced criminal intelligence management software.
The investigative units of law enforcement agencies all around the world face many of the same challenges. Chief among those challenges is the fact that budgets are tightening, while resources are becoming more and more scarce. Even in the face of reduced funding, investigators are asked to deliver higher levels of service in their quest to solve and deter crime.
The key to doing ‘more’ with ‘less’ in law enforcement is really no different than in any other industry. That is, deploying resources in the most effective manner possible for the maximum value possible. The trick is using what the agency already knows to determine what the future may hold. What that all boils down to is Big Data Investigation Analytics.
Data in Law Enforcement comes in many forms, and is typically stored in disparate silos. Arrest records, calls for service, criminal intelligence, field reports, human resource data, telephone records, case management files, and so on. Together, the data from those systems can represent a virtual goldmine of investigative information if used correctly.
‘Correctly’ is the operative term, of course. The ability to turn these large data stores into actionable investigation intelligence requires more than a simple data warehouse or data mining tool, and for the most part police departments recognize this need. They understand that their data holds the key to understanding the hidden connections between people, places, and things – the lynchpin of any successful investigation.
For years, law enforcement agencies and commercial organizations have built data mining tools and data warehouses. Unfortunately, these analytical techniques are no longer sufficient in an age of rapidly growing data. Moreover, much of the data that investigators need to access is unstructured text – word processing documents, narratives, search warrants, witness statements, email text, and more. By applying big data text analytics, investigators can begin to extract actionable insights from both structured and unstructured data.
Big Data Investigation Analytics – such as those provided by Virginia based Visallo and California’s Palantir Technologies – are two examples that provide a powerful indexing architecture allowing investigators to find non-textual data, including multimedia files such as 911 calls, interrogation videos, and images. This architecture helps investigators find things that they simply could not find otherwise.
Finally, world-class investigation analytics provide a flexible graph visualization tool, as well. This user interface allows investigators to organize data through a variety of layout options, find hidden and non-obvious relationships between entities, and perform a variety of what-if scenarios.
When paired with the robust investigative case management and criminal intelligence systems available from Crime Tech Solutions, big data investigation analytics build a foundation upon which investigators can solve more crimes, more quickly.
Without advanced investigation analytics, agencies often find themselves looking for a needle in a haystack. In fact, too often the needle is broken into several pieces spread across multiple haystacks. To simplify these tasks, investigative agencies must deploy the correct analytical technologies which have become a key element of doing more with less in the global investigation market. For more information on how Crime Tech Solutions and Visallo are changing the law enforcement analytics landscape, please contact us below!