Category Archives: Crime Technology Solutions

Crime Hot Spots and Risk Terrain Modeling

abmpegasus-intelligence-led-policing
A typical ‘hot spot’ in crime analytics

By Tyler Wood, Operations Manager at Crime Tech Solutions.
One of the many functions crime analysis performs is the identification of “hot spots”, or geographical areas that seem to be hubs for criminal activity. Identifying these hot spots through best practices in geospatial crime mapping allows law enforcement to focus their efforts in areas that need them most. The trouble that law enforcement and crime analysts have encountered is displacement – the fact that once a hot spot is “cleared”, crime seems to pop up again in a different location. The good news is that the displacement is never 100%, so policing hot spots is important – it’s just not a magic bullet.
To solve this problem, a team at Rutgers University’s School of Criminal Justice set out to develop new methodologies that would result in peaceful outcomes that are built to last instead of merely temporary.
The difference between the old approach and the new approach is stark. Where police and analysts used to focus solely on geographical concentration of crimes, Risk Terrain Modeling examines the factors that contribute to such dense concentrations to begin with. Rutgers team have identified several characteristics of any given geographical location which may attract or generate crime. Their technology takes these characteristics, which include socioeconomic data, physical layout, types of local businesses, etc… and uses them to calculate the likelihood crime occurring in the area. This allows law enforcement to be proactive in the prevention of crime in these areas.
CrimeMapLite
Advanced crime analytics show statistically significant risk factors.

The technique seems to be highly effective. After a trial run in New Haven, CT, police were able to identify sixteen “statistically significant risk factors that underlie violent crime occurrences.” A high percentage of violent crime in New Haven during the test period occurred in locations already identified by the concept of risk terrain modeling. Though the technology is still new, it is clearly showing impressive results already.
Shutting down hot spots is important policing, and risk terrain modeling technology allows analysts and law enforcement officers to be even more proactive in their prevention of crime.
The author, Tyler Wood, is head of operations at Austin, TX based Crime Tech Solutions – an innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Crime Tech Solutions Acquires Case Closed Software

June 1, 2016 (Austin, TX)   Crime Tech Solutions, LLC, a leading provider of analytics and investigation software for law enforcement and commercial markets, today announced that it has acquired Cleveland, TN based Case Closed Software in a cash transaction. The terms of the deal were not released, but according to Crime Tech Solutions’ founder and president Douglas Wood, the acquisition brings together two dynamic and fast-growing software companies with an unparalleled complement of technologies.
For Crime Tech Solutions, the opportunity to add Case Closed Software into the fold was too good to pass up” said Mr. Wood. “We think that the technology offered by Case Closed helps to further differentiate us in the market as the price performance leader for this type of investigative solution.PNG
Crime Tech Solutions, based in the city of Leander, TX, delivers advanced analytics and investigation software to commercial investigators and law enforcement agencies across the globe. Their solution suite includes criminal intelligence software, sophisticated crime analytics with geospatial mapping, and powerful link analysis and visualization software. The company says that the addition of Case Closed Software expands those offerings even further.
Case Closed Software develops and markets investigative case management software specifically designed for law enforcement agencies. The suite is built around four primary software products including best-in-class investigative case management software, property and evidence tracking, a gang database tool, and an integrated link analysis and data visualization tool. The company also plans to release the solution as Case Closed Cloud for cloud-based access.
Case Closed couldn’t be happier than to be joining Crime Tech Solutions,” said Keith Weigand, the company’s founder. “The blending of our technologies creates a suite that will add tremendous value to our mutual customers, and will be hard for others to duplicate.
According to both Mr. Weigand and Mr. Wood, the name Case Closed will continue on as the product brand, given its widespread popularity and loyal customer base. Crime Tech Solutions is expected to retain all Case Closed employees, with Mr. Weigand joining as the company’s chief technical officer.
Crime Tech Solutions says it expects continued growth via ongoing software sales and strategic acquisitions.
About Crime Tech Solutions
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

NBC News gets rare look at NYPD CompStat meeting

Posted by Tyler Wood, Operations Manager at Crime Tech Solutions.
NYPD
NBC News was recently allowed a rare opportunity to sit in on a CompStat (computer statistics) meeting with the New York Police Department and they shared their experience with their viewers.
Watch the short video HERE.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)

China building big data platform for pre-crime

Re-posted by Crime Tech Solutions – Your Source for Investigation Software
It’s “precrime” meets “thoughtcrime.” China is using its substantial surveillance apparatus as the basis for a “unified information environment” that will allow authorities to profile individual citizens based upon their online behaviors, financial transactions, where they go, and who they see. The authorities are watching for deviations from the norm that might indicate someone is involved in suspicious activity. And they’re doing it with a hand from technology pioneered in the US.
Tiananmen_Square_Beijing_China_1988_1-640x447As Defense One’s Patrick Tucker reports, the Chinese government is leveraging “predictive policing” capabilities that have been used by US law enforcement, and it has funded research into machine learning and other artificial intelligence technologies to identify human faces in surveillance video. The Chinese government has also used this technology to create a “Situation-Aware Public Security Evaluation (SAPE) platform” that predicts “security events” based on surveillance data, which includes anything from actual terrorist attacks to large gatherings of people.
The Chinese government has plenty of data to feed into such systems. China invested heavily in building its surveillance capabilities in major cities over the past five years, with spending on “domestic security and stability” surpassing China’s defense budget—and turning the country into the biggest market for security technology. And in December, China’s government gained a new tool in surveillance: anti-terrorism laws giving the government even more surveillance powers and requiring any technology companies doing business in China to provide assistance in that surveillance.
The law states that companies “shall provide technical interfaces, decryption and other technical support and assistance to public security and state security agencies when they are following the law to avert and investigate terrorist activities”—in other words, the sort of “golden key” that FBI Director James Comey has lobbied for in the US. For obvious reasons, the Chinese government is particularly interested in the outcome of the current legal confrontation between the FBI and Apple over the iPhone used by Syed Farook.
Bloomberg reports that China is harnessing all that data in an effort to perform behavioral prediction at an individual level—tasking the state-owned defense contractor China Electronics Technology Group to develop software that can sift through the online activities, financial transactions, work data, and other behavioral data of citizens to predict which will perform “terrorist” acts. The system could watch for unexpected transfers of money, calls overseas by individuals with no relatives outside the country, and other trigger events that might indicate they were plotting an illegal action. China’s definition of “terrorism” is more expansive than that of many countries.
At a news conference in December, China Electronics Technology Group Chief Engineer Wu Manqing told reporters, “We don’t call it a big data platform, but a united information environment… It’s very crucial to examine the cause after an act of terror, but what is more important is to predict the upcoming activities.”
__
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)

CrimeView and TriTech – Concerned? Maybe you should be.

Posted by Tyler Wood, Operations Manager at Crime Tech Solutions
keep-calm-and-investigate-on-7In the release of a not so well-kept industry secret, Trimble (NASDAQ: TRMB) finally announced this week (February 29, 2016)  that it has sold The Omega Group assets to TriTech Software Systems, a leading provider of public safety software. The Omega Group is a large provider of crime mapping software, known for its popular CrimeView™ desktop software and the www.crimemapping.com™ website which allows agencies to present crime statistics to the public in a heat map format.
According to the press release, TriTech intends to grow the acquired business as part of its public safety portfolio. Financial terms of the sale were not disclosed.
So, TriTech continues its acquisition strategy… having already acquired Visionair, Tiburon and Information Management Corp (IMC) over the past decade. Visionair and Tiburon were providers of Records Management Systems (RMS) and Computer Aided Dispatch (CAD) systems for law enforcement.
The previous acquisitions made a great deal of sense for TriTech, as well as the companies being acquired. Most importantly, those acquisitions had no negative affect on the most important group of all – the users and customer base. The acquisition of The Omega Group and CrimeView, however, not so much.
The Omega Group has long been close partners with ESRI®, by far and away the leading developer of GIS mapping technology anywhere. That relationship with ESRI had helped Omega grow into the market force it has become. Of equal importance to that success, however, was the positioning that Omega Group – and their suite of crime map products – were data agnostic and would work with a wide variety of RMS and CAD systems.
Under TriTech’s ownership, however, I don’t see how that ‘impartiality’ continues. TriTech’s previous acquisitions have quickly blended into part of an overall powerful suite of tools – perhaps second to none in the industry – that they market so successfully. Why would we not expect CrimeView et al to follow the same path?
If you’re a current TriTech customer, the acquisition probably has little or no affect on you. Perhaps there’s even an upside as they work to integrate the crime mapping offerings into their other solutions further.
If you’re NOT a TriTech customer, however… well, this is not so good for you. It’s not unreasonable to expect that the company will continue to support third party RMS and CAD implementations for some period of time, but I expect the crime map products to grow in functionality specifically in line with TriTech’s own product set.
Here are our concerns:

  1. As a user of Omega Group products do you have reason to be concerned that support and development for you will slowly phase out? I’d think so, as TriTech is in the business of selling RMS and CAD solutions.
  2. If you’re ESRI, can you continue your cozy relationship with a company and product set now owned by a large entity who, by definition, has no interest in growing the non-TriTech base?
  3. If you’re a competitor to TriTech, can you continue to work with someone who would much prefer to take away your install base than partner with you on the crime map side?

There are low-end, inexpensive competitors to CrimeView but frankly they don’t compare to the functionality and are designed for the very smallest of agencies. CrimeMap from Crime Tech Solutions, on the other hand, is also a partner with ESRI and has a vested interest in remaining agnostic as to the RMS or CAD systems in place. It’s how the company does business.
CrimeMap is a top-tier desktop solution that includes all of the functionality you’d expect, PLUS includes advanced crime analytics, integration with our powerful criminal intelligence database system, and an incredibly useful connectivity to our price/performance leading link analysis solution.
One has to admire TriTech for their continued growth and execution of a solid acquisition strategy. In this acquisition of Omega Group, however, they have put ESRI, end-users, and competitive vendors in an awkward spot.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime mapping and predictive policing, and criminal intelligence database management systems.)
 

Is the Most Dangerous Company in America?

Posted by Tyler Wood, Operations Manager at Crime Tech Solutions
ciaThis is a very interesting read about the current big data analytics darling, Palantir Technologies. The article from GS Early appears on the Personal Liberty website HERE.
The original article follows…
I was reading my newsfeeds and I came across a very interesting story about this highly secretive company that is apparently buying up as much Palo Alto, California real estate as it can get its hands on.
But that isn’t even the most interesting thing about them. What piques my interest is how this start-up that just added another $450 million to its funding — it now has about $20 billion in funding — got its money.
The company is called Palantir Technologies. If the name sounds familiar, it’s because it comes from JRR Tolkein’s trilogy of fantasy novels. In The Fellowship of the Ring, Saruman the wizard uses the Palantir of Orthanc, an indestructible sphere of dark crystal, to see into the future and communicate across the world.
That sounds geeky and innocuous enough, no?
But Palantir the company’s biggest clients are the FBI, SEC and the CIA. It is a Big Data company that also has corporate clients, but much of the work — from what anyone can tell — comes from hush-hush projects for the U.S. intelligence community.
This crystal ball of a company sounds less like a quaint fantasy than a key element of the “thought police” in Philip K. Dick’s dark science fiction tale “The Minority Report.”
In “The Minority Report,” the police used computers to predict when and where a crime would occur and apprehend the perpetrator before he actually committed the crime.
The crazy thing is, we’re now living in a world where Big Data makes that possible.
First, let me explain what Big Data is. Basically, now that our lives are completely recorded in various media — traffic cameras, debit card transactions, loyalty cards, phone calls, television shows watched, internet, social media, SMS texts, etc. — computers are powerful enough now to sort through all this data from all these sources and come up with predictive patterns for individuals and groups.
This is a very hot area for retail stores. But it also has enormous implications in a variety of industries; and many of them are helpful.
It is certainly a tool that law enforcement and our intelligence services would find valuable to root out potential terrorists or groups that are planning some terrorist act. It is also useful to find people who are attempting to elude authorities. And being able to get ahead of the some of the more devious players on Wall Street and their illegal trading schemes would be nice.
But you can see where this could be turned on Americans, just as easily as the NSA turned its endeavors on to less than righteous paths.
Palantir is raising eyebrows in the epicenter of digital startups because most companies, once they reach a certain size, move out of Palo Alto and build a campus in some surrounding town.
Not Palantir. It now owns about 10-15 percent of all the available space in Palo Alto, more than 250,000 square feet. It is the fourth most valuable venture backed company in the world.
The irony in the article was, the concern wasn’t about its biggest client or what it’s doing for the CIA, it was the fact that it’s eating up all the available commercial space in Palo Alto and not leaving room for new startups.
My concern is a bit deeper. The CIA could have quietly gone to one of the major Big Data firms like Accenture or IBM and worked with them on whatever it is they needed. But instead they essentially built their own company, where there are much fewer people to throw up roadblocks to the work being done. I have no problem with government using Big Data to protect us; my concern is when intelligence and enforcement agencies have unfettered use of it.
But, there’s no turning back the clock. We are in the Big Data, cybersecurity age and plenty of these companies already exist. Usually their goal is help their clients sell more lavender soap in February or figure out what kind of salad greens a 37-year-old mother of two prefers to buy at 7 p.m. on a Wednesday evening.
On a fundamental level, it’s best to keep your digital footprint light. Make sure you have secure passwords that aren’t just 1234 or your pet’s name. Most browsers have an “incognito” mode that won’t track your browser history. But truth be told, if someone really wants your history, they can get it.
If you’re more serious about hiding your footprints, look into encrypted services like Tor (www.torproject.com) that will protect against traffic analysis (browser history, instant messaging, etc.). It’s free and very good.
Transactions in bitcoins is a way to keep your footprint light in the marketplace.
And if you’re looking to make money on the trend, there are any number of companies that are at the forefront of cybersecurity (Palo Alto Networks, FireEye, Synamtec) and Big Data (Accenture, IBM, Teradata, Oracle).
–GS Early
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime mapping and predictive policing, and criminal intelligence database management systems.)

Technology and the fight against terrorism

Posted by Crime Tech Solutions
From CNN…
Terrorist-picture-scan-750x500http://money.cnn.com/2015/11/24/technology/targeting-terror-intelligence-isis/index.html?iid=ob_lockedrail_bottomlarge&iid=obnetwork
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime mapping and predictive policing, and criminal intelligence database management systems.)

What is Link / Social Network Analysis?

Posted by Crime Tech SolutionsPic003

Computer-based link analysis is a set of techniques for exploring associations among large numbers of objects of different types. These methods have proven crucial in assisting human investigators in comprehending complex webs of evidence and drawing conclusions that are not apparent from any single piece of information. These methods are equally useful for creating variables that can be combined with structured data sources to improve automated decision-making processes. Typically, linkage data is modeled as a graph, with nodes representing entities of interest and links representing relationships or transactions. Links and nodes may have attributes specific to the domain. For example, link attributes might indicate the certainty or strength of a relationship, the dollar value of a transaction, or the probability of an infection.

Some linkage data, such as telephone call detail records, may be simple but voluminous, with uniform node and link types and a great deal of regularity. Other data, such as law enforcement data, may be extremely rich and varied, though sparse, with elements possessing many attributes and confidence values that may change over time.
Various techniques are appropriate for distinct problems. For example, heuristic, localized methods might be appropriate for matching known patterns to a network of financial transactions in a criminal investigation. Efficient global search strategies, on the other hand, might be best for finding centrality or severability in a telephone network.
Link analysis can be broken down into two components—link generation, and utilization of the resulting linkage graph.
Link Generation
Link generation is the process of computing the links, link attributes and node attributes. There are several different ways to define links. The different approaches yield very different linkage graphs. A key aspect in defining a link analysis is deciding which representation to use.
Explicit Links
A link may be created between the nodes corresponding to each pair of entities in a transaction. For example, with a call detail record, a link is created between the originating telephone number and the destination telephone number. This is referred to as an explicit link.
Aggregate Links
A single link may be created from multiple transactions. For example, a single link could represent all telephone calls between two parties, and a link attribute might be the number of calls represented. Thus, several explicit links may be collapsed into a single aggregate link.
Inferred Relationships
Links may also be created between pairs of nodes based on inferred strengths of relationships between them. These are sometimes referred to as soft links, association links, or co-occurrence links. Classes of algorithms for these computations include association rules, Bayesian belief networks and context vectors. For example, a link may be created between any pair of nodes whose context vectors lie within a certain radius of one another. Typically, one attribute of such a link is the strength of the relationship it represents. Time is a key feature that offers an opportunity to uncover linkages that might be missed by more typical data analysis approaches. For example, suppose a temporal analysis of wire transfer records indicates that a transfer from account A to person X at one bank is temporally proximate to a transfer from account B to person Y at another bank. This yields an inferred link between accounts A and B. If other aspects of the accounts or transactions are also suspicious, they may be flagged for additional scrutiny for possible money laundering activity.
A specific instance of inferred relationships is identifying two nodes that may actually correspond to the same physical entity, such as a person or an account. Link analysis includes mechanisms for collapsing these to a single node. Typically, the analyst creates rules or selects parameters specifying in which instances to merge nodes in this fashion.
Utilization
Once a linkage graph, including the link and node attributes, has been defined, it can be browsed, searched or used to create variables as inputs to a decision system.
Visualization
In visualizing linking graphs, each node is represented as an icon, and each link is represented as a line or an arrow between two nodes. The node and link attributes may be displayed next to the items or accessed via mouse actions. Different icon types represent different entity types. Similarly, link attributes determine the link representation (line strength, line color, arrowhead, etc.).
Standard graphs include spoke and wheel, peacock, group, hierarchy and mesh. An analytic component of the visualization is the automatic positioning of the nodes on the screen, i.e., the projection of the graph onto a plane. Different algorithms position the nodes based on the strength of the links between nodes or to agglomerate the nodes into groups of the same kind. Once displayed, the user typically has the ability to move nodes, modify node and link attributes, zoom in, collapse, highlight, hide or delete portions of the graph.
Variable Creation
Link analysis can append new fields to existing records or create entirely new data sets for subsequent modeling stages in a decision system. For example, a new variable for a customer might be the total number of email addresses and credit card numbers linked to that customer.
Search
Link analysis query mechanisms include retrieving nodes and links matching specified criteria, such as node and link attributes, as well as search by example to find more nodes that are similar to the specified example node.
A more complex task is similarity search, also called clustering. Here, the objective is to find groups of similar nodes. These may actually be multiple instances of the same physical entity, such as a single individual using multiple accounts in a similar fashion.
Network Analysis
Network analysis is the search for parts of the linkage graph that play particular roles. It is used to build more robust communication networks and to combat organized crime. This exploration revolves around questions such as:

  • Which nodes are key or central to the network?
  • Which links can be severed or strengthened to most effectively impede or enhance the operation of the network?
  • Can the existence of undetected links or nodes be inferred from the known data?
  • Are there similarities in the structure of subparts of the network that can indicate an underlying relationship (e.g., modus operandi)?
  • What are the relevant sub-networks within a much larger network?
  • What data model and level of aggregation best reveal certain types of links and sub-networks?
  • What types of structured groups of entities occur in the data set?

Applications
Link analysis tools such as those provided by Crime Tech Solutions are increasingly used in law enforcement investigations, detecting terrorist threats, fraud detection, detecting money laundering, telecommunications network analysis, classifying web pages, analyzing transportation routes, pharmaceuticals research, epidemiology, detecting nuclear proliferation and a host of other specialized applications. For example, in the case of money laundering, the entities might include people, bank accounts and businesses, and the transactions might include wire transfers, checks and cash deposits. Exploring relationships among these different objects helps expose networks of activity, both legal and illegal.

What is Geospatial Crime Mapping?

Geospatial4Posted by Crime Tech Solutions with information gathered from Wikipedia.
Here’s a fact: Any understanding of where and why crimes occur can help prevent future crimes.
Mapping crime can help law enforcement protect citizens more effectively. Simple maps that display the locations where crimes or concentrations of crimes have occurred can be used to help direct patrols to places they are most needed. Policymakers can use more complex maps to observe trends in criminal activity; such maps can prove invaluable in solving criminal cases. For example, detectives can use maps to better understand the hunting patterns of serial criminals and to hypothesize where these offenders might live.
Products like CrimeMap Pro™ from Crime Tech Solutions are used by analysts in law enforcement agencies to map, visualize, and analyze crime incident patterns. It is a key component of crime analysis and the CompStat policing strategy. Mapping crime, using Geographic Information Systems (GIS), allows crime analysts to identify crime hot spots, along with other trends and patterns.CrimeMapLite

Using GIS, crime analysts can overlay other datasets such as census demographics, locations of pawn shops, schools, etc., to better understand the underlying causes of crime and help law enforcement administrators to devise strategies to deal with the problem. GIS is also useful for law enforcement operations, such as allocating police officers and dispatching to emergencies.

Crime analysts use crime mapping and analysis to help law enforcement management (e.g. the police chief) to make better decisions, target resources, and formulate strategies, as well as for tactical analysis (e.g. crime forecasting, geographic profiling). New York City does this through the CompStat approach, though that way of thinking deals more with the short term. There are other, related approaches with terms including Information-led policing, Intelligence-led policing, Problem-oriented policing, and Community policing. In some law enforcement agencies, crime analysts work in civilian positions, while in other agencies, crime analysts are sworn officers.
From a research and policy perspective, crime mapping is used to understand patterns of incarceration and recidivism, help target resources and programs, evaluate crime prevention or crime reduction programs (e.g. Project Safe Neighborhoods, Weed & Seed and as proposed in Fixing Broken Windows), and further understanding of causes of crime.
The boom of internet technologies, particularly web-based geographic information system (GIS) technologies, is opening new opportunities for use of crime mapping to support crime prevention. Research indicates that the functions provided in web-based crime mapping are less than in most traditional crime mapping software. In conclusion, existing works of web-based crime mapping focus on supporting community policing rather than analytical functions such as pattern analysis and prediction.

IBM Crime Analytics: Missing the mark? CTS Hits the bullseye!

quote-one-may-miss-the-mark-by-aiming-too-high-as-too-low-thomas-fuller-10-41-63Posted by Crime Tech Solutions – Your source for analytics in the fight against crime and fraud.
September 7, 2015. IBM announced this week a major update to its IBM i2 Safer Planet intelligence portfolio that includes a major overhaul of the widely used Analyst’s Notebook product. The product, which has become increasingly abandoned by its user base over the past five years, is now being positioned as ‘slicker‘ than previous versions.
IBM suggests that the new version scales from one to 1,000 users and can ingest petabytes of information to visualize. (A single petabyte roughly translates to 20,000,000 four-drawer filing cabinets completely filled with text).
That’s a lot of data. Seems to me that analysts are already inundated with data… now they need more?
This all begs the question: “Where is IBM headed with this product?”
The evidence seems to point to the fact that IBM wants this suite of products to compete head-to-head with money-raising machine and media darling Palantir Technologies. If I’m IBM, that makes sense. Palantir has been eating Big Blue’s lunch for a few years now, particularly at the lucrative US Federal market level. Worse yet, for IBM i2, is the recent news of a new competitor with even more powerful technology.
If I’m a crime or fraud analyst, however, I have to view this as IBM moving further and further away from my reality.
The reality? Nobody has ever yelled “Help! I’ve been robbed. Call the petabytes of ‘slick’ data!”  No, this tiring ‘big data’ discussion is not really part of the day to day work for the vast majority of analysts. Smart people using appropriate data with intuitive and flexible crime technology solutions… that’s the reality for most of us.
So, as IBM moves their market-leading tool higher and higher into the stratosphere, where does the industry turn for more practical desktop solutions with realistic pricing? For more and more customers around the world, the answer is a crime and fraud link analytics tool from Crime Tech Solutions.
No, it won’t ingest 20,000,000 four-drawer filing cabinets of data, and it’s more ‘efficient‘ than ‘slick‘. Still, the product has been around for decades as a strong competitor to Analysts Notebook, and is well-supported by a network of strategic partners around the world. Importantly, it is the only American made and supported alternative. Period. It’s also, seemingly, the last man standing in the market for efficient and cost-effective tools that can be used by real people doing their real jobs.