Category Archives: gang intelligence

Waco Police Department Selects Case Closed Software for Gang and Narcotics Investigations.

Waco, Texas – The City of Waco Police Department has selected specialized criminal investigation software from Case Closed Software™ to manage investigations into gangs and narcotics crimes. The new gang investigation software will provide officers with the tools they need to effectively investigate and track criminal activity in these areas, allowing them to more efficiently gather and analyze data to build strong cases.

“Gang and narcotics crimes are two of the most serious challenges facing law enforcement agencies in Waco and across the country”, said Case Closed Software’s CEO Douglas Wood. “These crimes often involve complex networks of individuals and can be difficult to investigate and prosecute. The new system, which includes confidential informant management software  will help better identify and track criminal activity, and build stronger cases against those who would do harm.”

According to recent data from the Waco Police Department, narcotics-related offenses have been on the rise in recent years, with a particular increase in the abuse of opioids and other prescription drugs. The department has also reported a rise in gang activity, with several local gangs being linked to drug trafficking and other serious crimes.

Case Closed Software is a leading provider of CJIS-compliant, cloud-based criminal investigation software and has been deployed by law enforcement agencies across the country. The software is designed specifically to help investigators manage complex cases involving gangs and narcotics, providing tools for gang analysis, investigation management, and organizational reporting.

The new software is expected to be implemented in the coming weeks, and officers will receive training on how to use it effectively. The City of Waco Police Department remains committed to providing the highest level of service to the community and will continue to explore new technologies and tools to support its mission.

Case Closed Software has also recently announced that its software was being deployed for Baldwin County (GA) Sheriff’s Office.

For more information on Case Closed Software, please visit their website at www.caseclosedsoftware.com.

THE EXODUS ROAD TURNS TO CASE CLOSED SOFTWARE TO INVESTIGATE GLOBAL HUMAN TRAFFICKING.

AUSTIN, TEXAS (PRWEB) OCTOBER 16, 2020

The Exodus Road, a global organization dedicated to fighting human trafficking, announced today that they have adopted the industry leading investigation case management system from Austin, TX based Case Closed Software.

The Exodus Road fights human trafficking by sending national and foreign operatives to suspected human trafficking locations to gather intelligence and evidence. To date, their organization has been directly involved in the rescue of nearly 1500 victims of human trafficking and the arrests of almost 600 criminals in six different countries. Using Case Closed Software, the company expects to improve these global operations and manage cases more effectively, ultimately resulting in the rescue of more and more victims.

The Exodus Road began through the work of co-founders Matt and Laura Parker who, in 2010, operated a children’s home in rural Northern Thailand. During that time, Matt and Laura were exposed to marginalized people groups – targets for human trafficking. Eventually, Matt began networking with news media and local police to learn about the problem at the ground level. After a period of research, he was deputized by police and started working personally to find those trapped in slavery. Today, they lead a team of 70 staff members, many of whom are national operatives who work closely with vetted police partners.

“With operatives and investigators around the world, we needed a truly powerful and multi-jurisdictional investigation management system,” said Ryan Hill, director of Global Operations at The Exodus Road. “We chose the Case Closed Software solution because of its impressive feature set, multi-language support, and ease of use for our field operatives. Case Closed Software will allow us to stay organized and share case files electronically with local law enforcement agencies around the world. We can even plan rescue operations directly within the system.”

Case Closed Software’s founder and CEO, Douglas Wood, commented “When we first met the folks at The Exodus Road, we were shocked to learn how widespread this criminal activity is. Human traffickers operate in a shadowy underworld that knows no borders and has no mercy for its victims. Case Closed Software is a perfect fit for anti-human trafficking investigations. Our software allows operatives to collect and share intelligence and evidence and helps track the people, locations and other entities involved in these horrendous crimes.”

The Case Closed Software investigation management platform deployed by The Exodus Road includes end-to-end case management with a configurable workflow, tips and leads management, evidence tracking, operations planning, multi-language support, and a host of other powerful features including entity deconfliction and visualization.

About The Exodus Road
For more information, https://theexodusroad.com or email: press@theExodusRoad.com

About Case Closed Software
For more information, https://www.caseclosedsoftware.com or email: info@CaseClosedSoftware.com

 

http://www.prweb.com/releases/the_exodus_road_turns_to_case_closed_software_to_investigate_human_trafficking_globally/prweb17465486.htm

Case Actions – The Baseline For Productive Investigation Units

Several times each week, I receive an inquiry from a PD, task force, or Sheriff’s office asking if my investigation case management software, Case Closed Software, can interface with a particular Records Management System (RMS). The question stems from the investigation unit’s desire to have a purpose-built, flexible solution designed to help their agents stay organized and work more efficiently.

Let’s face it… RMS software, by and large, is not designed for managing major cases. Agencies know it, and the RMS vendors know it. For them, the notion of managing the complexities of major case investigations is an afterthought at best.

(The answer I give to these inquiries, by the way, is that any good investigation management software should have capabilities to ingest data from other law enforcement products, including RMS).

The more important point, however, is recognizing that criminal investigators gather vasts amounts of information during the course of an investigation. Witness statements, interviews, interrogations, tips, leads, informant statements, audio files, video files, photos, and much more. Too often, agents must rely on their RMS systems which, per above, are not purpose-built for investigations. Investigators also rely heavily on paper files and file cabinets full of notes, search warrants, and physical evidence.

Fortunately, there is an alternative… purpose built investigation case management software that utilizes what I call ‘Case Actions’ as the underlying workflow. Case Actions are the individual actions that an investigation unit takes in pursuit of closing a case. Case Actions are expansive in nature, and include:

  • Crime Scene Visits
  • Interviews
  • Interrogations
  • Knock ‘n Talks
  • Surveillance
  • DNA
  • Search Warrants
  • Affidavits
  • Controlled Buys
  • Arrests

… and much, much more. You get the idea, though.

By effectively logging each Case Action in a particular Case, the investigators (and management) are able to quickly and visually recognize the status of the case, and what further actions should be taken. Each Case Action leads to new information… which leads to new Case Actions. And the beat goes on. Hopefully, sooner rather than later, enough information is garnered to close the case. That’s the power of Case Action based workflow.

WIth the Case Action based approach, each Case Action is tied to Persons, Locations, Vehicles, etc. As a result, robust dossiers of these things are built without the individual agent(s) even realizing it.

By utilizing an investigation case management solution that is based upon Case Actions, law enforcement can leverage information from previously-entered data such as telephone numbers, evidence items, addresses, persons, gang members, etc. The Case Actions feed themselves – and each other – to build a valuable repository of investigative information.

An example: A detective has received a tip that Doug Wood is involved in a particular criminal activity. By accessing her Case Action-based system, she quickly learns that Doug Wood has been a Suspect in Case 1 (belonging to an entirely different investigator), and a Witness in Case 2 (belonging to a third investigator).

She also learns (via Case Actions performed by the Gang Unit) that Doug Wood shares an address with a confirmed Gang Member and goes by the nickname ‘Woody’. She also sees Doug’s previous addresses, telephone numbers, work history, social media accounts and so on… each of which has been logged as part of completely unique Case Actions.

That is the power of Case Actions based investigation management software. Because each previous Case Action involving Doug Wood was logged, the current investigator has a goldmine of information at her fingertips.

Case Closed Software is the leading provider of Case Action based investigation case management software for law enforcement. Contact Us for a demo today!

Big Data Surveillance: The Case of Policing

Posted by Douglas Wood, CEO of Case Closed Software – a leader in investigation software  and analytics for law enforcement.
Headquartered here in Central Texas, I recently had an opportunity to have coffee with Dr. Sarah Brayne, Assistant Professor, Department of Sociology at The University of Texas at Austin. Ms. Brayne had just published an interesting article in The American Sociological Review. The article is titled Big Data Surveillance: The Case of Policing.
The article examines the intersection of two emerging developments: the increase in surveillance and the massive exploration of “big data.” Drawing on observations and interviews conducted within the Los Angeles Police Department, Sarah offers an empirical account of how the adoption of big data analytics does—and does not—transform police surveillance practices.
She argues that the adoption of big data analytics facilitates may amplify previous surveillance practices, and outlines the following findings:

  1. Discretionary assessments of risk are supplemented and quantified using risk scores.
  2. Data tends to be used for predictive, rather than reactive or explanatory, purposes. (Here, Crime Tech Weekly would want to differentiate between predictive analytics and investigation analytics)
  3. The proliferation of automatic alert systems makes it possible to systematically surveil an unprecedentedly large number of people.
  4. The threshold for inclusion in law enforcement databases (gang databases, criminal intelligence data, etc) is lower, now including individuals who have not had direct police contact. (Here again, Crime Tech Weekly would point out that adherence to criminal intelligence best practices vastly reduces this likelihood)
  5. Previously separate data systems are merged, facilitating the spread of surveillance into a wide range of institutions.

Based on these findings, Sarah develops a theoretical model of big data surveillance that can be applied to institutional domains beyond the criminal justice system. Finally, she highlights the social consequences of big data surveillance for law and social inequality.
The full PDF report can be downloaded via Sage Publishing by clicking here. Or, if you have general comments or questions and do not wish to download the full version, please feel free to contact us through the form below. Crime Tech Weekly will be happy to weigh in.
[contact-form][contact-field label=”Name” type=”name” required=”1″ /][contact-field label=”Email” type=”email” required=”1″ /][contact-field label=”Website” type=”url” /][contact-field label=”Comment” type=”textarea” required=”1″ /][/contact-form]

Criminal Intelligence Databases: Violations of privacy rights are the exception, not the rule.

privacyThe notion that law enforcement fusion centers regularly violate individuals’ privacy rights as they capture intelligence on gangs, terrorist activities, organized crime, and other threats to public safety is simply not true. That, according to a study published in the Journal of Police and Criminal Psychology.
The paper, “Law Enforcement Fusion Centers: Cultivating an Information Sharing Environment while Safeguarding Privacy,” was authored by Jeremy Carter, an assistant professor of  Public and Environmental Affairs at Indiana University-Purdue University Indianapolis. His article carefully addresses the privacy-rights issue of criminal intelligence gathering, among others.
fusion_centers_mapThere are approximately 80 fusion centers in the United States. They were created in response to the 9/11 terrorist attacks. The attacks exposed the requirement for greater information sharing and improved intelligence capabilities at all law enforcement levels.  According to the article’s author, the idea was to have the key pieces of data funneled into fusion centers so that highly trained analysts could stay atop of threats and correspond with local law enforcement agencies on these potential threats.
Designed with a view to enhance information-sharing among agencies, fusion centers act as ‘hubs’ of data and intelligence on gang activities, terrorist cells, organized crime, and other public safety threats. Vast amounts have data has been collected, and concerns about individual privacy and civil rights have ensued. The very legitimacy of these fusion centers has been called into question.
bigbrotherThe notion that law enforcement fusion centers represent ‘Big Brother’, and that data is being stored and disseminated about people irrespective of whether they are suspected of criminal activity is simply wrong, according to Professor Carter.
Still, concerns remain about who can access the data, and for what purpose. However, a survey of fusion centers across the country suggests that they take appropriate steps to safeguard individual privacy via something called Federal Regulatory Code CFR 28 Part 23.
28-cfr-part-23“Fusion centers are following the federal regulatory code, 28 CFR Part 23, that is the legal standard for collecting information,” Carter said. “That code says you have to establish a criminal predicate, basically probable cause, to keep information on identifiable individuals.”
Additionally, the majority of the fusion centers have implemented strong controls that provide built-in safeguards that protect the privacy of individuals. The fusion centers are also regularly audited to ensure that only the correct type of data is gathered, and that is stored and disseminated in a need-to-know basis.
black versionCrime Tech Solutions develops and markets a suite of crime fighting software including IntelNexus™, a criminal intelligence database system that complies with the above mentioned code 28 CFR Part 23. The company also provides software for investigation case management, advanced crime analytics, and link/social network analysis.

Crime Tech Solutions’ continued growth fuels management team expansion

September 13, 2016 – (Leander, TX)  Crime Tech Solutions, a fast-growing provider of low cost crime fighting software and analytics today announced the appointment of Kevin Konczal as Vice President of Sales. The company created the position in response to rapid growth in market share for crime analysis and investigative case management software.
aaeaaqaaaaaaaaecaaaajdixztq5zgfkltliodctndi4ns05ztfjltzhowyxymjhmmu5maMr. Konczal is a seasoned start-up and marketing expert with over 30 years of diversified business management, marketing and start-up experience in information technology and consumer goods. Additionally, Konczal has over two decades of Public Safety service as a police officer, Deputy Sheriff and Special Agent.
Most recently, he held the position as a Regional Sales Manager for TriTech Software Systems, a leading provider of public safety software.
“Kevin is a seasoned executive with a combination of public service and information technology expertise”, said Crime Tech Solutions’ chief technology officer Keith Weigand. “The management team is looking forward to adding his leadership within the sales organization.”
In addition to his executive career, Konczal serves on several advisory boards, commissions and boards of directors.  He attended Oakland College studying Criminal Justice and completed the Dallas Police Academy. Notably, he was awarded the Police Commendation Award for saving the lives of fellow officers in a deadly force cblack versiononfrontation.
“The exciting thing about Crime Tech Solutions”, added Konczal “is their clear position as a fast-growing company dedicated to low price and high performance software for law enforcement.”
“I’m looking forward to working with a company that delivers true value to customers with comprehensive investigative case management software, sophisticated link analysis tools, criminal intelligence management software, and crime mapping technology that includes what I think are the industry’s best analytics and reporting capabilities”, he added.
Earlier this year, Crime Tech Solutions acquired Tennessee based Case Closed Software (www.caseclosedsoftware.com).
About Crime Tech Solutions
Crime Tech Solutions (www.crimetechsolutions.com) is a fast-growing U.S. based provider of low cost / high performance investigation software and crime analytics. The company proudly supports the International Association of Crime Analysts (www.iaca.net), International Association of Chiefs of Police (www.iacp.org), the National Sheriff’s Association (www.sheriffs.org), and the association of Law Enforcement Intelligence Units (www.leiu.org).
The company’s products include Case Closed investigative case management software, link and social network analytics, 28 CFR Part 23 compliant criminal intelligence management software, enterprise search for law enforcement, and crime analytics with mapping, reporting, and predictive policing.