Category Archives: Law Enforcement Technology

Waco Police Department Selects Case Closed Software for Gang and Narcotics Investigations.

Waco, Texas – The City of Waco Police Department has selected specialized criminal investigation software from Case Closed Software™ to manage investigations into gangs and narcotics crimes. The new gang investigation software will provide officers with the tools they need to effectively investigate and track criminal activity in these areas, allowing them to more efficiently gather and analyze data to build strong cases.

“Gang and narcotics crimes are two of the most serious challenges facing law enforcement agencies in Waco and across the country”, said Case Closed Software’s CEO Douglas Wood. “These crimes often involve complex networks of individuals and can be difficult to investigate and prosecute. The new system, which includes confidential informant management software  will help better identify and track criminal activity, and build stronger cases against those who would do harm.”

According to recent data from the Waco Police Department, narcotics-related offenses have been on the rise in recent years, with a particular increase in the abuse of opioids and other prescription drugs. The department has also reported a rise in gang activity, with several local gangs being linked to drug trafficking and other serious crimes.

Case Closed Software is a leading provider of CJIS-compliant, cloud-based criminal investigation software and has been deployed by law enforcement agencies across the country. The software is designed specifically to help investigators manage complex cases involving gangs and narcotics, providing tools for gang analysis, investigation management, and organizational reporting.

The new software is expected to be implemented in the coming weeks, and officers will receive training on how to use it effectively. The City of Waco Police Department remains committed to providing the highest level of service to the community and will continue to explore new technologies and tools to support its mission.

Case Closed Software has also recently announced that its software was being deployed for Baldwin County (GA) Sheriff’s Office.

For more information on Case Closed Software, please visit their website at www.caseclosedsoftware.com.

San Diego (ICAC) Task Force aids development of technology in the fight against child pornography and child sexual assault material

August 1, 2022 (San Diego, CA)  The National Center for Missing and Exploited Children (NCMEC) is on the front lines of the fight against online crimes against children. Their ‘CyberTipline’ is the country’s centralized system for reporting the online exploitation of children.

According to NCMEC’s website, “Concerned individuals and organizations make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, and unsolicited obscene materials sent to a child.

A full report of the CyberTipline can be found on the NCMEC website.

Working with Law Enforcement

In this important work, NCMEC works closely with The Internet Crimes Against Children (ICAC) Task Force Program. That program was created to help law enforcement agencies enhance their ability to investigate offenders who use online communication systems to sexually exploit children.

In the United States, there are over 60 regional ICAC Task Force agencies representing almost 5,500 individual agencies.

San Diego’s ICAC task force simplifies the triage and investigation of CSAM and crimes against children incidents.

Sergeant Garrick Nugent is commander of the San Diego ICAC Task Force. His task force consists of roughly 33 different agencies that endeavor to work together to investigate cybercrimes against children in San Diego, Imperial, and Riverside Counties. According to Nugent, most investigations begin with NCMEC, which contacts San Diego ICAC when it believes there’s a local case. These tips, referred to as CyberTips, number in the thousands each year for San Diego ICAC alone. And that number has risen consistently over the past five years.

“I truthfully believe there are more cases,” said Nugent in a 2020 interview with a CBS affiliate in San Diego. “I wish I could say we are (keeping up with the volume). We have both children and predators that are at home. They have unprecedented access to the internet. They’ve got lots and lots of time on their hands and therefore I think we’re seeing the increase as a result.”

Dealing With Growing Volume

With each CyberTip comes a host of investigation intelligence including perpetrator usernames, unique IP addresses, suspect information, Internet Service Provider details, and much more. CyberTips also include disturbing multimedia evidence of child sexual assault materials (CSAM) that must be verified by the task force. Each CyberTip must be downloaded, opened, reviewed, verified, prioritized, and assigned to investigators who already maintain a full plate of cases to investigate. To say the problem is overwhelming is an understatement.

Case Closed Software™ and San Diego ICAC’s Investigation Software for ICAC Units

Since 2020, however, Nugent’s ICAC task force has worked in partnership with Texas-based Case Closed Software to develop innovative new systems designed to simplify and speed up the entire process of triaging and managing CyberTips.

The new system was implemented last year and now, according to Nugent, “greatly helps his ICAC task force to efficiently triage the NCMEC CyberTips and to control, direct, organize, review, and track our multi-agency investigations into child abuse and exploitation.”

Working Hand in Hand to Solve Problems

A quote from Nugent on Case Closed Software’s website states “This software is a must-have for ICAC units.”

Douglas Wood is the founder and CEO of Case Closed Software. According to Wood, his company has unique functionality to allow near-instant triage of CyberTips.

“As a result of our unique partnership with San Diego ICAC, users can simply save CyberTips to our CJIS-compliant cloud service, and moments later view all pertinent information for quick and effective triage”, says Wood. “They can then be assigned to any task force case agent who can use the ICAC investigation case management system to work more efficiently through investigations and prosecutions.”

The Crimes Against Children Conference

In a joint announcement, Case Closed Software and San Diego ICAC Task Force stated support for the upcoming 34th annual Crimes Against Children Conference (CACC) in Dallas, TX beginning August 8, 2022.

According to Case Closed Software, conference attendees will be able to see the ICAC task force software in action at the Exhibitor’s Hall. CCAC is presented annually by the Dallas Children’s Advocacy Center and provides training to agencies in the fields of law enforcement, social work, child protective services, child advocacy, therapy, and medicine who work directly with child victims of crime.

Case Actions – The Baseline For Productive Investigation Units

Several times each week, I receive an inquiry from a PD, task force, or Sheriff’s office asking if my investigation case management software, Case Closed Software, can interface with a particular Records Management System (RMS). The question stems from the investigation unit’s desire to have a purpose-built, flexible solution designed to help their agents stay organized and work more efficiently.

Let’s face it… RMS software, by and large, is not designed for managing major cases. Agencies know it, and the RMS vendors know it. For them, the notion of managing the complexities of major case investigations is an afterthought at best.

(The answer I give to these inquiries, by the way, is that any good investigation management software should have capabilities to ingest data from other law enforcement products, including RMS).

The more important point, however, is recognizing that criminal investigators gather vasts amounts of information during the course of an investigation. Witness statements, interviews, interrogations, tips, leads, informant statements, audio files, video files, photos, and much more. Too often, agents must rely on their RMS systems which, per above, are not purpose-built for investigations. Investigators also rely heavily on paper files and file cabinets full of notes, search warrants, and physical evidence.

Fortunately, there is an alternative… purpose built investigation case management software that utilizes what I call ‘Case Actions’ as the underlying workflow. Case Actions are the individual actions that an investigation unit takes in pursuit of closing a case. Case Actions are expansive in nature, and include:

  • Crime Scene Visits
  • Interviews
  • Interrogations
  • Knock ‘n Talks
  • Surveillance
  • DNA
  • Search Warrants
  • Affidavits
  • Controlled Buys
  • Arrests

… and much, much more. You get the idea, though.

By effectively logging each Case Action in a particular Case, the investigators (and management) are able to quickly and visually recognize the status of the case, and what further actions should be taken. Each Case Action leads to new information… which leads to new Case Actions. And the beat goes on. Hopefully, sooner rather than later, enough information is garnered to close the case. That’s the power of Case Action based workflow.

WIth the Case Action based approach, each Case Action is tied to Persons, Locations, Vehicles, etc. As a result, robust dossiers of these things are built without the individual agent(s) even realizing it.

By utilizing an investigation case management solution that is based upon Case Actions, law enforcement can leverage information from previously-entered data such as telephone numbers, evidence items, addresses, persons, gang members, etc. The Case Actions feed themselves – and each other – to build a valuable repository of investigative information.

An example: A detective has received a tip that Doug Wood is involved in a particular criminal activity. By accessing her Case Action-based system, she quickly learns that Doug Wood has been a Suspect in Case 1 (belonging to an entirely different investigator), and a Witness in Case 2 (belonging to a third investigator).

She also learns (via Case Actions performed by the Gang Unit) that Doug Wood shares an address with a confirmed Gang Member and goes by the nickname ‘Woody’. She also sees Doug’s previous addresses, telephone numbers, work history, social media accounts and so on… each of which has been logged as part of completely unique Case Actions.

That is the power of Case Actions based investigation management software. Because each previous Case Action involving Doug Wood was logged, the current investigator has a goldmine of information at her fingertips.

Case Closed Software is the leading provider of Case Action based investigation case management software for law enforcement. Contact Us for a demo today!

Managing Major Cases Part Four: Operational Structures

In the first chapters of this series, Managing Major Cases, I focused on what defines a major case… and what are some of the unique problems associated with different major case ‘types’. For reference, you can find our previous chapters below:

Managing Major Cases: Part One

Managing Major Cases: Part Two

Managing Major Cases: Part Three

In this chapter, I want to overview the operational structure of Major Case Management.

The Command Triangle

Many Commonwealth countries (and some larger US jurisdictions) define Major Case Management roles within what’s called a “Command Triangle”. Specifically, per the diagram below, jurisdictions within countries such as Great Britain, and Canada define three (3) primary roles – a Major Case Manager who is responsible for the effective governance of the investigation, a Primary Investigator who reports to the Major Case Manager, and a File Coordinator who is responsible for coordination for internal communication and case file management.

Let’s take a look at the responsibilities of each role:

MCMT

 

As part of this Command Triangle, the Major Case Manager is accountable for the overall investigation. He or She determines investigation strategies, identifies and manages investigative resources, conducts case reviews, and all other high-level management functions.

The Primary Investigator typically reports to the Major Case Manager and is responsible for tasks including preparation of the case file for status meetings, ensuring that assignments are completed in a timely fashion, identification of resources required for the investigation, and report any major case updates to the Major Case Manager.

Also reporting to the Major Case Manager is the File Coordinator. Their job is also multi-faceted, and includes tasks such as scrutinizing the documents created during the process of the investigation to ensure the completeness and quality, ensuring that tips and leads are assigned and managed, ensuring the security of the case file(s), ensuring that all case actions are logged into the investigative case management software, and more.

Within these three roles are any number of supervisors and line staff that perform interviews, collect evidence, communicate with the media, and so on. Not to beat a dead horse here, but I’ll point out again that all of these roles may be performed by just a few people in some jurisdictions.

The Command Triangle vs. The Major Case Framework

I believe in The Command Triangle model but also strongly support a more US-centric model – The Major Case Framework. Perhaps the differences are subtle, but a Triangle is a hard shape with defined lengths and known, predictable angles. A Framework, however, is just that – a frame which, by nature, allows for additional flexibility than a hard shape. A frame is designed to support a structure, not confine it.

It’s this flexibility that makes the Major Case Framework ideally suited for the U.S. market. By that, I mean there are 200 or 300 law enforcement agencies in Canada, the majority of which have dozens or hundreds of officers. Down here, there are over 18,000 law enforcement agencies ranging in size from NYPD (More than 50,000 Officers) to Frenchtown, New Jersey (3 Officers). This type of variance requires the flexibility of a framework.

So, what is the Major Case Framework?

As noted in discussing The Command Triangle, managing major cases generally consists of organizational groups that perform different, but equally important, roles. The Major Case Framework, however, better recognizes the true nature of investigations by acknowledging from the outset that many, and sometimes all, of the roles are performed by only a small number of individuals and that role flexibility is part of day to day investigation work.

MCMF3_1
There are four main organizational groups within the Major Case Framework. They are defined as:

  1. Command: Personnel who establish standard operating procedures, guidelines, and policies, along with the direction that ensures departmental compliance with mandates and laws. The responsibility for the specific directions that a MCM Team takes falls into the hands of those in the Command role. Some examples of Command roles include Chiefs of Police, Sheriffs, Task Force Commanders, and Commissioners.
  2. Command Staff: Personnel who are charged with the high-level implementation of the policies driven by those in the Command role. CID unit heads, divisional Captains, and task force Directors are examples of the roles that fall into this group.
  3. Supervisor: Personnel who manage, control, and direct the actual resources of the MCM Team. There are any number of ranks that fill this important role, including Lieutenants and Sergeants, but – in general – the Supervisor is the individual who holds responsibility for the actual control of the personnel involved in the daily activities of the investigation.
  4. Line/Support: Personnel who perform the day to day tasks related to the investigation. These are the Detectives, Investigators, Technicians, Deputies, Analysts, and a host of other titles that are working the investigation at the ground level. The success of this organizational group.

As noted in the MCM Framework diagram, in many organizations ‘Commanders’ will find themselves performing Line/Support functions, and Supervisors will often find themselves doing the roles defined in ‘Command Staff’. American Law Enforcement, particularly small and medium-sized agencies and task forces, require the flexibility of the framework in order to succeed.

It is important that any agency’s case management systems and processes allow for the flexibility of both the Command Triangle and the Command Framework.

New Doug4Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.

 

Case Closed Software user HCSO featured on Investigation Discovery Network

When the sleepy town of Mooresburg, TN receives news that beloved teacher Margaret Jack Sliger is murdered on her farm, Hawkins County detectives are charged with finding the sinister perpetrator to bring their community justice.
ID Network (Investigation Discovery) recently aired an episode of the popular program “Murder Comes To Town” featuring Hawkins County Sheriff’s Office (HCSO) in Tennessee. The story surrounds the 2015 murder death of 79 year old Margaret Sliger in Mooresburg, TN and the 2 year effort to solve and prosecute the crime.
Case Closed Software® is proud to be the investigation case management software provider for HCSO, and to be associated with the agency.
If you subscribe to ID Network, you can view the episode HERE.
 

Attack of the Drones

Police drones are becoming more and more commonly utilized by law enforcement agencies across the world. As of 2017 there were 347 American police departments using unmanned aerial technology. This number represents a 518% increase over a two year time period. Police are quickly catching on to how drone technology can help make police work easier and safer.
police-droneOne of the ways drones are being utilized is in surveillance. Drones have the ability to reach vantage points that would either be impossible for an officer to reach, or expose the officer to danger. A drone can get to a great vantage point without having to compromise the safety of an officer. This ability is especially useful in an active shooter scenario, where the lives of the law enforcement officers are on the line.
Being able to view and assess threats remotely not only minimizes risk, but allows police to formulate a strategy. Drones can also minimize risk to bystanders. If a suspect were to commit a crime then run into a crowd of people, a drone would be able to track the suspect through the crowd rather than have officers run after and risk harm to an innocent bystander. The video footage from the droid can make an important addition to an investigation case management platform.
Drones are also being used in crime scene analysis. By combining drone technology with 3D mapping technology, police are able to make a navigable rendering of the crime scene based on aerial photographs. This can be used to recreate scenarios such as traffic accidents, or to search for previously unnoticed details in a crime scene.
police-drones-latimes-2011Search and rescue missions are also aided by drone technology. When lives are on the line, time is of the essence. A drone can cover large areas in a short amount of time, and with a thermal imaging camera attached, it can more easily spot a person than human eyes can – especially in the dark. Drones can also be used to monitor large crowds, not only to observe any possible criminal actions, but also to see if any person in the crowd needs medical assistance but cannot signal for it.
Drones are an extremely useful technology and are only becoming better and more affordable. Law enforcement can utilize them not only to better prevent crime, but to reduce the risk that officers take in the field every day. And in a situation where officers are putting their lives on the line, it’s good to have a friend than can fly.