Category Archives: law enforcement software

Georgia ICAC Task Force Deploys Case Closed Software for Statewide Triage of CyberTips and Investigation Case Management

Atlanta, Georgia – (January 2, 2024) The Georgia Internet Crimes Against Children (ICAC) Task Force, housed within the Georgia Bureau of Investigation (GBI), has announced the deployment of Case Closed Software™ to enhance its efforts in combating online child predators. The software will play a pivotal role in streamlining the handling of CyberTips from the National Center for Missing & Exploited Children (NCMEC), enabling law enforcement professionals to prioritize and investigate cases with greater precision and effectiveness.

The software’s powerful features provide invaluable support in the fight against child exploitation, ultimately making the community safer for everyone. Key features of the Case Closed Software include:

1. CyberTip Triage: The software allows for the efficient categorization of CyberTips received from NCMEC, ensuring that each tip is promptly reviewed and acted upon.

2. Case Management: It facilitates the seamless organization and tracking of investigations, digital evidence, physical evidence, supplemental reports, and entity management, making it easier for law enforcement agencies to manage their ICAC caseloads.

3. Data Analysis: The software offers advanced analytical tools, which can help identify patterns and connections among cases, aiding in the identification and capture of perpetrators.

4. User-Friendly Interface: Designed with the end user in mind, the software offers an intuitive and user-friendly interface, ensuring that law enforcement personnel can maximize its capabilities without extensive training.

The Georgia ICAC Task Force, under the leadership of GBI Director Chris Hosey, is committed to protecting children from online predators. The adoption of Case Closed Software’s innovative solution will enable the task force to better triage CyberTips from NCMEC, determine any connections across disparate CyberTips, and assign the cases to appropriate investigators and affiliates for investigative management purposes.

For more information about Case Closed Software, please visit https://www.caseclosedsoftware.com/icac

 

Frederick County Sheriff’s Office Enhances Fight Against Child Predators with Case Closed Software

FOR IMMEDIATE RELEASE

[Frederick County, MD] — [October 19, 2023] — The Internet Crimes Against Children (ICAC) Task Force , housed within Frederick County Sheriff’s Office, announced today that it has deployed specialized investigation technology from Case Closed Software™ to bolster their efforts in combating online child predators. The groundbreaking software will play a pivotal role in enhancing the efficiency and effectiveness of investigations into child sexual abuse materials (CSAM), sextortion, and other heinous crimes.

In a relentless pursuit of justice, law enforcement agencies worldwide are facing a mounting challenge in dealing with the increasing prevalence of crimes against children, particularly in the digital realm. To address this critical issue head-on, the Frederick County Sheriff’s Office is proud to announce the adoption of Case Closed Software’s innovative solution.

The software is specifically designed to streamline the handling of CyberTips from the National Center for Missing & Exploited Children (NCMEC), enabling law enforcement professionals to prioritize and investigate cases with greater precision and effectiveness. The software’s powerful features provide invaluable support in the fight against child exploitation, ultimately making the community safer for everyone.

Key features of the Case Closed Software include:

1. CyberTip Triage: The software allows for the efficient categorization of CyberTips received from NCMEC, ensuring that each tip is promptly reviewed and acted upon.

2. Case Management: It facilitates the seamless organization and tracking of investigations, making it easier for law enforcement agencies to manage their caseloads.

3. Data Analysis: The software offers advanced analytical tools, which can help identify patterns and connections among cases, aiding in the identification and capture of perpetrators.

4. User-Friendly Interface: Designed with the end user in mind, the software offers an intuitive and user-friendly interface, ensuring that law enforcement personnel can maximize its capabilities without extensive training.

Case Closed Software’s Douglas Wood speaks last month to ICAC Commanders about the use of technology in the fight against CSAM.

 

Case Closed Software’s CEO, Douglas Wood, commented, “We are honored to support the Frederick County Sheriff’s Office in their mission to combat child exploitation. Our software empowers law enforcement to efficiently investigate cases involving child predators, ensuring that justice is served and children are kept safe from harm.”

The adoption of Case Closed Software’s specialized investigation software by the Frederick County Sheriff’s Office exemplifies their commitment to employing cutting-edge technology to protect the community from the grave threat of child predators.

For more information about Case Closed Software™ and their advanced investigative solutions, please visit www.caseclosedsoftware.com/icac

About Case Closed Software:
Case Closed Software is a leading provider of investigative case management and advanced analytics software for law enforcement agencies. The company is dedicated to delivering innovative solutions that help law enforcement professionals solve crimes, protect communities, and ensure justice is served.

###

The Wilson Ruling: What it Means for ICAC Investigators

Case Closed Software™ recently worked on a project with the City of San Diego Police Department’s Internet Crimes Against Children (ICAC) Task Force.

 

San Diego ICAC

The project arose out of a need for a sophisticated tool to help the multi-jurisdictional ICAC unit effectively triage and investigate criminal activity involving child sexual abuse materials (CSAM). In particular, we needed to come up with an investigation tool that would work around evolving laws and The Wilson Ruling of 2021.

Note: CSAM has previously been referred to as ‘Child Pornography’, but has evolved into a more accurate depiction of the abuse committed upon unwilling victims.

At the root of Wilson Ruling, which we will discuss in depth below, is the 2008 Protect Our Children Act sponsored by then-Senator Joe Biden and signed by then-President George W. Bush. The law requires “electronic communication service providers to notify the National Center for Missing and Exploited Children (NCMEC) when they discover apparent violations of laws prohibiting CSAM.

NCMEC then creates and distributes CyberTips to appropriate law enforcement agencies and specially-trained agents.

The Anatomy of a NCMEC CyberTip for ICAC Units

Without getting too granular, a CyberTip is made up of several sections. There’s a front page, and Sections A through D. The front page will contain the date it was received, its assigned report number, and an executive summary. The executive summary will say what type of incident the report refers to, such as “Apparent Child Pornography”, and the number of files that were uploaded.

The first section of a CyberTip, Section A, has information about the reporting agency – Google, Facebook, TikTok and so on. It will also include a brief incident description, the time of the incident, the webpage involved, and the email, username, and IP address of the person reported.

Spoiler Alert… Here’s a key to The Wilson Ruling: For each file, this section says whether the reporting ESP actually viewed the file and whether the file was publicly available. We’re going to come back to this shortly.

Section B is geolocation information for the offending IP address given in the report. This helps NCMEC know which ICAC Task Force should get the tip. The ISP who owns or controls the IP address will also be listed.

Section C is for any additional information and may reference other CyberTips that are associated with the same username or IP address.

Here’s another key point related to The Wilson Ruling. The images or videos associated with the CyberTip are provided to the appropriate agency along with a PDF report, but they are NOT shown in the body of the report.

Why the CyberTip Matters

The point of describing the CyberTip here is to reinforce just how much unstructured data exists on them and foreshadow some of the pain points that ICAC teams experience in getting these CyberTips triaged.

That’s a significant component of the partnership that Case Closed Software has developed with San Diego Police Department… how to manage, de-conflict, and triage the overwhelming volume of CyberTips that each ICAC task force or investigator receives.

The other significant component of what we’ve worked on together from a technology perspective is related to how courts have applied Fourth Amendment doctrines to CSAM investigations. The Fourth Amendment, of course, is an important piece of our Bill of Rights and is supposed to protect all of us from unreasonable searches and seizures by the government.

The ICAC Investigation into Luke Noel Wilson

Let’s look at The Wilson Ruling of 2021. This came out of the court’s application of the Fourth Amendment in the case of defendant Luke Noel Wilson who, in June 2015, attached several images containing CSAM to an email on his Gmail account. Google’s screening system –  which scans uploaded images and checks for identical matches in a database of confirmed CSAM – immediately flagged Wilson’s attachments as “apparent child pornography”.

Without having an employee review the attachments first, Google’s system then sent an automated report to NCMEC that included the images. As is standard policy for ESPs, the report contained information about the date and time Wilson uploaded the images, along with his email address, login information, and the IP address of the device he used to upload the images.

NCMEC subsequently forwarded the report to local law enforcement – in this case, the fine team at San Diego ICAC – where an agent reviewed the NCMEC CyberTip and inspected each of the images, confirming that they were indeed CSAM.

Relying on Google’s report and his personal observations, the agent then applied for – and obtained – a search warrant for Wilson’s email account. The agent’s affidavit accompanying the search warrant request included descriptions of the images but didn’t specifically contain any mention of matching hash values, nor any description of Google’s screening process for CSAM.

When, with search warrant in hand, the agent searched Wilson’s email account, he discovered several email exchanges in which Wilson received and sent CSAM and additionally offered to pay a woman to molest and exploit children.

Law Enforcement then obtained a search warrant for Wilson’s residence and vehicle where they discovered devices containing thousands of images of CSAM including the original four attachments. Wilson’s alleged attempt at throwing a backpack over his balcony was noticed by assisting agents and was found to contain a thumb drive full of additional Child Sexual Abuse Materials.

It was later estimated that Wilson possessed 500 videos and 11,000 images of child sexual abuse, and – a few months later – he was arrested and charged with Distribution and Possession of Child Sexual Abuse Materials.

Wilson was convicted and sentenced to 45 years in prison.

So, this seems at this point like a fairly standard ICAC case. What then happened that fundamentally changed the way ICAC units operated to triage and investigate CyberTips?

The Motion to Suppress

After his trial, Wilson filed a motion to suppress the four original attachments (the ones included in the original CyberTip) AND all evidence subsequently seized from his email account and residence, arguing that San Diego ICAC’s initial review of his attachments was a warrantless search in violation of the Fourth Amendment.

The District Court denied his motion, however, reasoning that the government does not perform a ‘search’ within the context of the Fourth Amendment when it inspects something that is ‘virtually certain’ to contain contraband.

Wilson subsequently appealed that decision to The Ninth Circuit which reversed the lower court’s decision, concluding that the agent’s viewing of the attachments violated Wilson’s 4th Amendment rights and rejecting the position that there was ‘virtual certainty’.

Basically, the Ninth Circuit said that Google’s initial report specified only the ‘general’ age of the child and the ‘general’ nature of the acts shown, and had not been viewed by any Google employee.
By viewing the four attachments without a search warrant, therefore, the higher court concluded that law enforcement unlawfully obtained new, critical information, and then used that new information to obtain warrants to search Wilson’s home and email account.

Of key importance in the ruling was the assessment that, even though Google employees viewed images identical to Wilson’s to create Google’s database of suspected CSAM, they had not viewed the actual image itself.

By contrast, after viewing the images, law enforcement could describe “the number of minors depicted, their identity, the number of adults depicted alongside the minors, the setting, and the actual sexual acts depicted.”  So, even though Google’s algorithm had flagged Wilson’s attachments to a mathematical certainty that his images were “bit-for-bit” duplicates of images identified by its employees as CSAM within their database, Wilson’s motion to suppress was granted.

The Fallout

The fallout for ICAC Task Forces has been tremendous because of this ruling. How are ICAC units and their respective affiliates, supposed to expeditiously review, triage, and investigate a massive and growing number of CyberTips while tip-toeing around an individual’s 4th Amendment rights?

Case Closed Software for ICAC

Last year, San Diego ICAC approached Case Closed Software™ with this exact set of problems and we began work on a tool designed to systematically process CyberTips – one that automates what is currently a time-consuming chain of events.

The Trouble with Triage

For most ICAC Units, individual CyberTips must be downloaded as zip files via NCMEC or IDS. Those zip files contain PDF files with unstructured text that lists:

• Reporting Agencies
• Usernames
• Email Addresses
• Telephone Numbers
• IP Addresses
• Hash Values
• Physical Addresses
• Sender IDs
• Recipient IDs
• Suspect Names
• Victim Names
• … and much more.

Triage administrators must:

  1. Download each CyberTip locally
  2. Unzip the file
  3. Begin a long process of putting those data elements together to create a connected view of those data elements to determine solvability
  4. And then assign to an investigator – internal or affiliate.

Oh, and then do the same for the next CyberTip… and the next one… and the next one after that.

Problem Solving for ICAC

Working with San Diego ICAC, we created a tool that allows administrators to save CyberTips directly a CJIS-Compliant ‘black box’ server instead of downloading them locally. That black box contains proprietary logic that systematically opens those zip files, pulls all of those data elements from the PDFs, grabs all of the attachments and underlying hash values, and links them into a single interface for the administrator. Important to note is that this process happens quickly and virtually eliminates the manual efforts in existence now.

CyberTips Triage and Case Management

 

We have essentially created a unique, user-friendly system where investigators cannot view attachments until they purposely elect to.
They can see usernames, IP Addresses, filenames, and an array of other information… but not the images. Images cannot be revealed until investigators have proper authority in compliance of the Wilson Ruling. It’s a simple but brilliant addition to the process that protects all parties.

Just to tie a bow around Mr. Wilson, he was eventually convicted of child molestation on the Stateside and sentenced to 25 years. He was subsequently charged and convicted of possession and distribution of CSAM on the federal side and received an additional ten years. He is where he should be, but his entire case was thrown into jeopardy when one agent viewed four files that one court felt violated his rights.

The Proposed Solution: Case Closed Software™

At its core, Case Closed Software is a multi-jurisdictional investigation case management system for complex criminal investigations.

The ICAC-specific functionality that was added to the system takes what was once a CyberTip and, using what we call our ‘One Page Case Management’ methodology, helps turn it into a conviction.

San Diego (ICAC) Task Force aids development of technology in the fight against child pornography and child sexual assault material

August 1, 2022 (San Diego, CA)  The National Center for Missing and Exploited Children (NCMEC) is on the front lines of the fight against online crimes against children. Their ‘CyberTipline’ is the country’s centralized system for reporting the online exploitation of children.

According to NCMEC’s website, “Concerned individuals and organizations make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, and unsolicited obscene materials sent to a child.

A full report of the CyberTipline can be found on the NCMEC website.

Working with Law Enforcement

In this important work, NCMEC works closely with The Internet Crimes Against Children (ICAC) Task Force Program. That program was created to help law enforcement agencies enhance their ability to investigate offenders who use online communication systems to sexually exploit children.

In the United States, there are over 60 regional ICAC Task Force agencies representing almost 5,500 individual agencies.

San Diego’s ICAC task force simplifies the triage and investigation of CSAM and crimes against children incidents.

Sergeant Garrick Nugent is commander of the San Diego ICAC Task Force. His task force consists of roughly 33 different agencies that endeavor to work together to investigate cybercrimes against children in San Diego, Imperial, and Riverside Counties. According to Nugent, most investigations begin with NCMEC, which contacts San Diego ICAC when it believes there’s a local case. These tips, referred to as CyberTips, number in the thousands each year for San Diego ICAC alone. And that number has risen consistently over the past five years.

“I truthfully believe there are more cases,” said Nugent in a 2020 interview with a CBS affiliate in San Diego. “I wish I could say we are (keeping up with the volume). We have both children and predators that are at home. They have unprecedented access to the internet. They’ve got lots and lots of time on their hands and therefore I think we’re seeing the increase as a result.”

Dealing With Growing Volume

With each CyberTip comes a host of investigation intelligence including perpetrator usernames, unique IP addresses, suspect information, Internet Service Provider details, and much more. CyberTips also include disturbing multimedia evidence of child sexual assault materials (CSAM) that must be verified by the task force. Each CyberTip must be downloaded, opened, reviewed, verified, prioritized, and assigned to investigators who already maintain a full plate of cases to investigate. To say the problem is overwhelming is an understatement.

Case Closed Software™ and San Diego ICAC’s Investigation Software for ICAC Units

Since 2020, however, Nugent’s ICAC task force has worked in partnership with Texas-based Case Closed Software to develop innovative new systems designed to simplify and speed up the entire process of triaging and managing CyberTips.

The new system was implemented last year and now, according to Nugent, “greatly helps his ICAC task force to efficiently triage the NCMEC CyberTips and to control, direct, organize, review, and track our multi-agency investigations into child abuse and exploitation.”

Working Hand in Hand to Solve Problems

A quote from Nugent on Case Closed Software’s website states “This software is a must-have for ICAC units.”

Douglas Wood is the founder and CEO of Case Closed Software. According to Wood, his company has unique functionality to allow near-instant triage of CyberTips.

“As a result of our unique partnership with San Diego ICAC, users can simply save CyberTips to our CJIS-compliant cloud service, and moments later view all pertinent information for quick and effective triage”, says Wood. “They can then be assigned to any task force case agent who can use the ICAC investigation case management system to work more efficiently through investigations and prosecutions.”

The Crimes Against Children Conference

In a joint announcement, Case Closed Software and San Diego ICAC Task Force stated support for the upcoming 34th annual Crimes Against Children Conference (CACC) in Dallas, TX beginning August 8, 2022.

According to Case Closed Software, conference attendees will be able to see the ICAC task force software in action at the Exhibitor’s Hall. CCAC is presented annually by the Dallas Children’s Advocacy Center and provides training to agencies in the fields of law enforcement, social work, child protective services, child advocacy, therapy, and medicine who work directly with child victims of crime.

What is Investigation Case Management Software?

Today’s complex criminal and serious investigations cannot be effectively managed with thumb drives, SharePoint, cloud folders, paper forms, and sticky notes. Times have changed and the introduction of investigation management and case investigation software is now an integral part of any specialized investigative agency.

What is Investigation Software?

Investigation case management software such as that from Case Closed Software™ is a purpose-built system that assists investigators triage investigative cases, track the involved entities, record supplemental reports and case actions, and generally help users close cases faster and more efficiently.

Investigation software (aka case management software) is specifically designed to help users collaborate and work efficiently with team members – whether they are across the aisle, or across the globe.

Investigation management software is more than fancy graphs and big data analytics. It’s also more than simple incident tracking. Many vendors will try to convince you otherwise because they lack true case management functionality.

True investigation case management software allows agencies of any type to triage new tips and leads, assign them to appropriate agents, track all related case entities such as people, places, and things (vehicles, evidence, organizations, IP Addresses, etc) in an easy-to-use and intuitive fashion.

Importantly, investigation software and incident management software allows agencies including law enforcement, anti-human trafficking groups, drug task forces, national police agencies, federal agencies, internet crimes against children (ICAC) task forces and more can quickly log and analyze all investigative case materials with built-in flexible workflow for approvals.

Top 20 Things to Look For When Procuring a Case Management System

When considering investigation case management software, agencies should look for the following must-haves:

  1. A proven and delighted install base.
  2. Tips and Leads management with the ability to promote them to a full investigation.
  3. Master databases (fully searchable) of all case entities
  4. Organizations and gang databases for organized crime
  5. Multi-Jurisdictional capabilities
  6. Real time multi-language functionality
  7. 28 CFR Part 23 compliant Criminal Intelligence
  8. Evidence management including full chain of custody
  9. Customizable workflow
  10. Case Visualization and Link Analysis
  11. Confidential Informants and whistleblower management
  12. Criminal charges and statutes functionality
  13. Operations planning
  14. Task and Assignments management
  15. Criminal Justice Information Systems (CJIS) Compliance
  16. Photo lineup functionality
  17. Remote Case Review (For sharing with prosecutors or LE)
  18. Multimedia attachments
  19. Customizable case reports
  20. World-class support and system maintenance

In short, investigation management software helps you conduct more efficient and, effective investigations. Case Closed Software is the leader in the investigation case management industry.

U.S. based Case Closed Software™ is a recognized leader in the development of investigation case management software and is a true investigation software company.

Best Practices for NGO Investigations Into Human Trafficking

Introduction

The investigation of human trafficking – and the rescue of victims – is a complex undertaking with many moving parts.

Investigations of human traffickers, and the subsequent rescue of victims, is a very complex undertaking. Unlike more traditional criminal investigations, there is rarely ‘one suspect’, ‘one victim’, or ‘one location’.

Instead, the crime of human trafficking takes place in a shady world that consists of multiple entities. Multiple perpetrators who work for multiple criminal organizations. Multiple victims who are trafficked by multiple pimps in multiple locations. These variables can make human trafficking a hidden crime that is difficult to investigate. The cost of not investigating, however, is the loss of lives, the loss of freedom, and the loss of innocence.

One particularly complicating feature of human trafficking investigations is the relationships between victims and traffickers. Traffickers initially use force, fraud, or coercion to lure their victims and force them into labor or commercial sexual exploitation. They seek out victims who may be susceptible to their lies for a variety of reasons including economic hardship, psychological or emotional instability, or other socio-economic disadvantages.

Victims of human trafficking are often helpless to call out for help, making the crime even more difficult to investigate.

Once lured by the traffickers, victims rarely have an opportunity to speak out or call for help. Language barriers, fear of their attackers, lack of a social safety net, and a general feeling of helplessness overwhelm the victims. Thus, the crime becomes difficult to investigate.

But investigate we must. The cost of turning our backs on this global problem is simply too high.

This overview will focus on some best practices for managing investigations into human trafficking, the capture of perpetrators, and the rescue of victims. A haphazard approach to these sensitive and complex investigations is likely to cause more harm than good, and these best practices are designed to help your organization maximize your productivity and safely rescue more victims.

Best Practice #1 – Stay Organized

The first best practice we need to discuss is ‘Staying Organized’. What might start off as a Tip that a young girl is being sold for sex in a local hotel may quickly grow in scope to include multiple victims, multiple locations, multiple pimps, and multiple abusers. These criminal enterprises thrive in the dark and, like cockroaches, simply scatter and disappear once light is shone. The practice of staying organized helps ensure that no intelligence or evidence falls through the cracks, giving the traffickers time to scatter and hide.

Using investigation case management software, such as that provided by Case Closed Software™, helps human trafficking investigators plan and stay organized.

Use investigation case management software. There are simply too many ‘moving parts’ within a human trafficking enterprise to attempt to stay organized without a purpose-built database. Spreadsheets, notes, cloud folders… these are all yesterday’s tools that cannot adequately manage today’s investigations.

With your case management software, track every tip that you receive. Some tips may be stronger than others. Some may lead to full-blown investigations, and some may not. In any case, track and store each tip that you receive as you never, ever know when information from those tips may become relevant to your ongoing investigations.

Triage every tip you can. Spend a moment to search your case management system to determine if anything about a tip relates to any current or past investigation. You can’t do this with paper files or spreadsheets. Perform some online research on the subject(s) of the tips to gauge how reliable the information might be. If the tip initially lacks the actionable or credible information to assign resources, keep the data in the case management system for future use. If the tip does contain actionable and credible information, use the case management system to prepare an actual Investigative Case and assign resources immediately.

A key to a successful investigation and rescue is tracking all of the actions being taken and sharing that information with the appropriate team members.

Importantly, in terms of Staying Organized, use your case management process to track each action being taken on the investigation. Did someone perform some Open Source Intelligence on the suspected location? Log that information electronically so that it does not fall through the cracks.

Has an agent visited the suspected location to determine if there are likely victims there? Log that into the system. Store any videos or photographs that the investigator made and attach them right to that case.

Log and maintain notes and related files on every action taken on your human trafficking cases. Make them safe, secure, and easy to access by other team members.

Organization is the KEY to any criminal investigation, and even more so for investigations into human trafficking.

Best Practice #2 – Securely Share Information in Real-Time

Investigations into human trafficking and victim rescues are complex and cannot occur in a vacuum. Much like the criminal enterprises themselves have multiple roles such as kidnappers, transporters, handlers, and pimps for example, so must your investigation team have specialized roles. Your undercover ‘john’ cannot be the same as your public-facing advocate, for example.

Sharing information across jurisdictions, cultures, and languages can be difficult. Use case management software from Case Closed Software™ to facilitate understanding.

The key to ensuring that everyone involved in the investigation is successful is sharing information. In an environment where traffickers are always on the lookout for potential risks to their operation, it’s of utmost importance that your operational team all be on the same page so that no missteps occur.

This type of alerting and information sharing cannot be done by text messages or word-of-mouth. It must occur within a fool-proof system of secure information sharing where there is no room for ambiguity. Lives depend upon it.

All of the actions and intelligence that is gathered during an investigation should be securely stored in your case management system. The moment a member of the investigation team submits new information, all other permitted team members should have secure, online access to the new information whether they are notes, videos, photographs or other file types. The removal of ambiguity or misinterpretation is key to ensuring that all team members are aware of the case status at all times.

Human trafficking is a global problem. Language barriers should not stand in the way of investigations and rescues.

As an aside, for multi-jurisdictional investigations, teams should ensure that individual members can view the information in the language of their choice in real-time. If the information was entered by an investigator in Brazil using Portuguese, that information should immediately be readable to a team member in Colombia who understands only Spanish. Always focus on ensuring your team members have access to accurate information in real-time. When time is lost, the cockroaches scatter.

Ensuring that sensitive data is available only to those with proper permissions is vital to keeping human trafficking investigations on track.

In those unique situations where individual team members do NOT require access to the information, perhaps because an investigation is particularly sensitive or involves public officials, your case management system should have capabilities to disallow them from viewing the update. This keeps information in the correct hands, while still furthering the integrity of the data-sharing requirement.

Only when information is shared in real-time can managers and team leaders best determine the next steps for the investigation and rescue of victims.

Best Practice #3 – Maintain Investigation Privacy and Integrity

As mentioned above, human trafficking organizations are like cockroaches. The moment they sense something is going to shine a light on them, they disappear into the woodwork. This most tragic of outcomes is painful for both the investigators and victims alike.

Keeping the investigation lights off, therefore, must be a strategic goal of human trafficking investigations. Assigning roles to your team, and ensuring that all members are adhering to those roles, is one way to keep your actions covert and secure. If a team member’s role is to pose as an interested buyer of sex, that team member should probably not also be involved in general reconnaissance of crime scenes where he or she may be recognized.

Policies and procedures exist for a reason. Ensure that they are followed. Even seemingly small mistakes can cause an investigation to derail.

Another way to ensure privacy and integrity is to utilize cutting-edge access policies to ensure that information is not accessed by outsiders or, worse yet, an insider to your team. Ensure, therefore, that EVERY SINGLE KEYSTROKE into your case management system is logged and reviewable. If your suspect organization packed up and left mere days before your major rescue and arrest operation, its important to know how that happened. Who accessed the information in your case management system, and why?

Make sure that the information your team is electronically storing is secure. Very secure. Use globally recognized and proven data security standards to protect all data and access to it. Ensure that all team members are trained and well-versed on any systems you are using for investigations.

There can never be too much integrity in a human trafficking investigation, and there can never be too much privacy. Loose lips sink ships. The same goes for loose investigation procedures. The line between a rescued victim and a lost opportunity is thin. Use investigation privacy and integrity to walk that line more effectively.

Best Practice #4 – Share Information with Senior Law Enforcement or Trusted Partners

As a team of human trafficking investigators, you recognize the seriousness and horror of human beings – like you, like me, like our daughters, sons, and grandchildren – being bought and sold for pleasure. You understand the misery of the victims and feel compelled to help. Good. That makes you a good person.

Law Enforcement agencies, however, do not typically act as emotional human beings. They have full caseloads involving homicides, drugs, corruption, and a host of other traditional crimes. Too often, they view human trafficking as merely ‘prostitution’. If a person wants to sell his or her body in exchange for money, there are no victims and, therefore, these cases can often receive a very low priority. Many times, they are dismissed out of hand.

The job of the human trafficking investigation team, therefore, is to get the attention of senior local law enforcement partners in a direct and meaningful manner… one that compels the officers to work with your team in rescues and arrests.

When meeting with Law Enforcement partners, be prepared.

Our history and background suggest that engaging senior law enforcement ‘too early’ adds risk to the investigation. Remember, loose lips sink ships, and these cases are often viewed as unimportant.

Sadly, our experience also shows that involving senior partners ‘too late’ is problematic as police departments are often reluctant to become involved in situations that they have not directly controlled and cannot easily verify the integrity of the work done prior to their involvement.

So, the answer of when to involve your senior partners is unique to each case and each situation. That decision can’t be covered in detail here. Instead, the method used to involve local senior law enforcement – whenever that transpires – is a factor that you can and should control to maximize the potential for a successful operation.

Sharing a full case file with Law Enforcement is vital to achieving their assistance. Wherever possible, use specific statutes and violation codes to help your partners understand the work you’ve put in.

Going in to meet with your prospective law enforcement partner should be a pleasant experience. Your team has built a good case and you’re ready to involve the authorities to help finalize the operation. Going in unprepared, however, will result in disappointment or disaster. As advocates for the prosecution of these types of crimes, you’re full of passion. Best practices, however, show that it is equally important to be full of actionable facts, evidence, and proof.

Therefore, best practices suggest that you build a ‘case file’ as you prepare to meet with law enforcement or senior management. On television, they sometimes call the visual representation of this case file a ‘murder board’. Make sure you have one. Make sure your case file lists ALL of the entities involved in your case. Make sure it includes all of the specific actions you’ve taken. Make sure it includes all of the audio, video, photos, and other evidence you’ve gathered.

Make sure the case file clearly shows the human trafficking operation. Who is in charge? Who are victims? What locations are involved? Who are the supporting witnesses?

Without an easy-to-digest case file, your chance of getting senior law enforcement’s attention diminishes quickly. So, utilize your case management system to very clearly outline the case in a compelling and thorough manner.

Best Practice #5 – Plan, Plan, and Plan Again

The final best practice is Operational Planning. Not to overstate it, but as I’ve said earlier human traffickers are cockroaches. At the first sign of light, you’ll lose them. Every time.

The final best practice for investigating human trafficking is perhaps the most important. Plan.

The biggest key to a successful human trafficking investigation boils down to three elements: Plan, Plan, and Plan Again!

Plan, then plan again, and then plan once more. Plan your response to every initial tip. Plan your initial investigation work into every case. Plan the tasks and mission of every operative involved in your case. Plan how to get case information into the hands of those who need it in real-time. Plan to keep the investigation quiet so as not to risk the cockroaches running.

Plan every covert operation as if lives depended upon it. They might. Plan in advance what the ‘panic’ word is. Plan in advance what hand signals your operative might use if audio fails. Plan in advance to know where the nearest trauma center is. Plan in advance to know what other risks are present. Dogs? Security? Children?

Plan and make that plan available to everyone who needs to see it. Share that plan in your case management system and know when every user has read it.

Finally, plan to present your case in a compelling manner to senior law enforcement officials. And then work with them on a plan to successfully pull victims out of harm’s way and arrest the bad guys.

Summary of Best Practices

Software from Case Closed Software™ helps NGO’s and other parties manage successful investigations into human trafficking.

We have covered some of the key ingredients to a successful human trafficking investigation and rescue. Of course, no operation ever goes exactly as you expect, but by ensuring that you are following these best practices – staying organized, sharing internal information, maintaining investigation integrity, effectively engaging with senior law enforcement officials, and conducting meticulous planning – you greatly increase the likelihood that your efforts will result in the wonderful rescue of victims and the prosecution and incarceration of the perpetrators.

By Douglas Wood, entrepreneur and investigation management professional.

Copyright 2021 Case Closed Software™

Managing Multi-Jurisdictional Investigations

Multi-Jurisdictional Drug Task Forces, Cold Case task forces, Anti-Human Trafficking task forces, Internet Crimes against Children Task Forces, Wildlife Protection task forces, and the like… they all share a common problem.

Collecting, storing, and disseminating investigative information is difficult enough in any complex investigation unit. Imagine the compounded problems of investigating cases in multiple jurisdictions, across different countries, in multiple languages, with multiple sets of rules and case workflows!

 

Case Closed Software™ produces software to assist people with this process, making it easier to generate, store, and retrieve information over the course of investigating a case, whether that case is across the city or halfway around the world.

When international users investigate cases, they need to be able to collect and store data in a useful and meaningful way so that they can access it later AND to make information available to other people who might have an interest in the case.

Historically, investigative case management required people to start paper files to store witness statements, track evidence, collect and record the outcome of various lines of inquiry, and so forth. Today, Case Closed Software replaces the paper files, allowing people to quickly record and access data.

Investigative case management facilitates the recovery of data at every step of the investigation, along with supporting references, digital images, and other electronic material that can be stored in a computer case file. It is often also necessary to store physical evidence and provide information to help people find it through evidence handling and chain-of-custody records.

The ability to know where EVERY case is, where EVERY piece of evidence is, and what EVERY agent is working on is vital to multi-jurisdictional investigation units.

Active information sharing – across remote jurisdictions and disparate languages – also allows people to do things like connect related cases, identify persons of interest, track organized crime, work with informants, and increase productivity.

CJIS-Compliant and globally-recognized systems from Case Closed Software streamlines the process and simplify data entry so that users can enter materials to quickly and easily, rather than days or weeks later when the information may be less useful.

Case Closed Software solutions for multi-jurisdictional investigations are currently used by customers across the globe to investigate drugs and narcotics, animal cruelty, child sexual abuse, human trafficking, and a host of more traditional criminal investigations.

For more information please visit us at www.caseclosedsoftware.com

Contributed by Douglas Wood, CEO at Case Closed Software™

GA Sheriff’s Office Deploys Case Closed Software™ for Investigation Case Management

(April 6, 2021)  Austin, TX – Case Closed Software™, a leading provider of investigation case management software to specialized investigation unit, today announced that a large Georgia Sheriff’s Office has signed a multi-year contract for their secure, cloud-based systems.

The Peach State county, serving tens of thousands of residents, selected Case Closed Software after speaking with existing users and testing the functionality with their own data.  Case Closed Software will help the county’s Sheriff’s Office and associated Multi-Jurisdictional Drug Task Force work investigations more efficiently with a goal to close criminal cases more quickly.

According to Douglas Wood, President of Case Closed Software, the county selected his company’s offering due to the flexibility and overall feature set it offers.

Case Closed Software is powerful and feature-rich software for specialized investigation units.

 

“We’re thrilled to add this new law enforcement client to our delighted customer base”, said Mr. Wood. “We very proudly focus on specialized investigation units which include state bureaus of investigation, fugitive recovery agents, anti-human trafficking investigators, drug task forces, internet crimes against children units, and local law enforcement.”

Case Closed Software has begun implementation of the software and expects the County to be fully installed and trained by April 30, 2021.

Year long Ohio drug task force investigation leads to arrests on drug and weapons charges

According to Commander Justin Conley of the Brown County Drug and Major Crimes Task Force, the people arrested are allegedly responsible for distributing more than 100 pounds of methamphetamine and several firearms in the area.

Read the impressive story HERE.

Case Closed Cloud adds Multi-State Natural Resources Task Force

(September 20, 2018) Austin, TX – Case Closed Software® announced today that a 5 State Natural Resources/Law Enforcement Task Force has begun working on the Case Closed Cloud™ platform for advanced investigative case management.

imageedit_1_5054046854.pngThe task force – consisting of natural resources law enforcement agents from Illinois, Tennessee, Ohio, Indiana, and Missouri – selected Case Closed Cloud due to its ease-of-use, quick deployment model, and cost-effective pricing.

 

“We are thrilled to add another big name multi-jurisdictional task force to our group of cloud customers,  said Douglas Wood, CEO of Case Closed Cloud’s parent company Crime Technology Solutions, LLC. “Our SaaS offering is now used by agencies, security firms, drug task forces, and other investigative organizations both here in the U.S. and overseas”,

Case Closed Cloud is an ultra secure, CJIS-compliant investigation case management system designed for investigative agencies that want to stay organized and manage cases more easily. The browser-based system includes functionality for tracking cases, investigator actions and supplemental reports, evidence (both physical and electronic), reporting, tips and leads, and much more.

“Cloud software has so many benefits for law enforcement. It is the fastest growing segment of the market by far.” added Mr. Wood.
cloud-computing-benefit

For more information on how Case Closed Cloud can help you revolutionize your investigative unit, visit https://www.caseclosedcloud.com