Category Archives: law enforcement

Managing Major Cases Part Four: Operational Structures

In the first chapters of this series, Managing Major Cases, I focused on what defines a major case… and what are some of the unique problems associated with different major case ‘types’. For reference, you can find our previous chapters below:

Managing Major Cases: Part One

Managing Major Cases: Part Two

Managing Major Cases: Part Three

In this chapter, I want to overview the operational structure of Major Case Management.

The Command Triangle

Many Commonwealth countries (and some larger US jurisdictions) define Major Case Management roles within what’s called a “Command Triangle”. Specifically, per the diagram below, jurisdictions within countries such as Great Britain, and Canada define three (3) primary roles – a Major Case Manager who is responsible for the effective governance of the investigation, a Primary Investigator who reports to the Major Case Manager, and a File Coordinator who is responsible for coordination for internal communication and case file management.

Let’s take a look at the responsibilities of each role:

MCMT

 

As part of this Command Triangle, the Major Case Manager is accountable for the overall investigation. He or She determines investigation strategies, identifies and manages investigative resources, conducts case reviews, and all other high-level management functions.

The Primary Investigator typically reports to the Major Case Manager and is responsible for tasks including preparation of the case file for status meetings, ensuring that assignments are completed in a timely fashion, identification of resources required for the investigation, and report any major case updates to the Major Case Manager.

Also reporting to the Major Case Manager is the File Coordinator. Their job is also multi-faceted, and includes tasks such as scrutinizing the documents created during the process of the investigation to ensure the completeness and quality, ensuring that tips and leads are assigned and managed, ensuring the security of the case file(s), ensuring that all case actions are logged into the investigative case management software, and more.

Within these three roles are any number of supervisors and line staff that perform interviews, collect evidence, communicate with the media, and so on. Not to beat a dead horse here, but I’ll point out again that all of these roles may be performed by just a few people in some jurisdictions.

The Command Triangle vs. The Major Case Framework

I believe in The Command Triangle model but also strongly support a more US-centric model – The Major Case Framework. Perhaps the differences are subtle, but a Triangle is a hard shape with defined lengths and known, predictable angles. A Framework, however, is just that – a frame which, by nature, allows for additional flexibility than a hard shape. A frame is designed to support a structure, not confine it.

It’s this flexibility that makes the Major Case Framework ideally suited for the U.S. market. By that, I mean there are 200 or 300 law enforcement agencies in Canada, the majority of which have dozens or hundreds of officers. Down here, there are over 18,000 law enforcement agencies ranging in size from NYPD (More than 50,000 Officers) to Frenchtown, New Jersey (3 Officers). This type of variance requires the flexibility of a framework.

So, what is the Major Case Framework?

As noted in discussing The Command Triangle, managing major cases generally consists of organizational groups that perform different, but equally important, roles. The Major Case Framework, however, better recognizes the true nature of investigations by acknowledging from the outset that many, and sometimes all, of the roles are performed by only a small number of individuals and that role flexibility is part of day to day investigation work.

MCMF3_1
There are four main organizational groups within the Major Case Framework. They are defined as:

  1. Command: Personnel who establish standard operating procedures, guidelines, and policies, along with the direction that ensures departmental compliance with mandates and laws. The responsibility for the specific directions that a MCM Team takes falls into the hands of those in the Command role. Some examples of Command roles include Chiefs of Police, Sheriffs, Task Force Commanders, and Commissioners.
  2. Command Staff: Personnel who are charged with the high-level implementation of the policies driven by those in the Command role. CID unit heads, divisional Captains, and task force Directors are examples of the roles that fall into this group.
  3. Supervisor: Personnel who manage, control, and direct the actual resources of the MCM Team. There are any number of ranks that fill this important role, including Lieutenants and Sergeants, but – in general – the Supervisor is the individual who holds responsibility for the actual control of the personnel involved in the daily activities of the investigation.
  4. Line/Support: Personnel who perform the day to day tasks related to the investigation. These are the Detectives, Investigators, Technicians, Deputies, Analysts, and a host of other titles that are working the investigation at the ground level. The success of this organizational group.

As noted in the MCM Framework diagram, in many organizations ‘Commanders’ will find themselves performing Line/Support functions, and Supervisors will often find themselves doing the roles defined in ‘Command Staff’. American Law Enforcement, particularly small and medium-sized agencies and task forces, require the flexibility of the framework in order to succeed.

It is important that any agency’s case management systems and processes allow for the flexibility of both the Command Triangle and the Command Framework.

In Part Five of this series, I’ll examine the topic of “What Do Investigators Do?”

New Doug4Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.

 

Managing Major Cases Part Three: Multi-Incident Major Cases

In Part One of this series, I overviewed a generally-accepted definition of Major Cases, and discussed some of the attributes that define them.

In Part Two, I began to probe the ‘types’ of Major Cases – specifically, Single-Incident Major Cases. These are cases that may, under different circumstances, not be Major Cases but for the identity of the victim, the identity of the suspect, the location of the incident, and/or the uniqueness of the crime.

Here in Part Three, I want to discuss the second ‘type’ of Major Cases – Multi-Incident Major Cases and – specifically – the problems associated with trying to investigate a case while related crimes are still occurring. (Spoiler Alert: It’s stressful)

Based upon interviews I have conducted with CID Commanders, Sheriffs, District Attorneys, and other law enforcement experts, there are several types of Multi-Incident Major Cases. Based on the patterns of the crimes, Multi-Incident Major Cases are classified into three basic categories – Mass crimes, Spree crimes, and Serial crimes

Mass Crimes – A Major Case mass crime involves multiple victims at one location during one continuous period of time, whether it is done within a few minutes or over a period of days. The term ‘mass murder’ springs to mind, and invokes images of Dylann Roof(Emanuel African Methodist Episcopal Church in South Carolina), James Holmes (2012 Aurora, CO. shooting in which he killed 12 people and injured 70 others at a movie theater), and James Loughner (2011 Tuscon, AZ shooting that killed 6 people and severely wounded US Representative Gabrielle Giffords).

massmurderers
Dylann Roof, James Holmes, and James Loughner

There are other types of Major Case mass crimes, however, including mass assault, mass human smuggling, and other horrible crimes that need no further illustration here.

Spree Crimes – Spree criminals commit two or more serious crimes with two or more victims, but at more than one location. An important distinction about spree crimes is that there is no ‘cooling off’ period between the crimes.

markbarton
Mark Barton

An unfortunate example of a spree crime is that of Mark Barton. On July 29th, 1999, he walked into his office at Momentum Securities and opened fire, killing four people. Then he went next door to another company and killed five more people. Earlier in the day he had also murdered his wife and their two children. Multiple crimes in multiple locations with no cooling off.

 

Another example of a spree crime is the armed robber who hits a slew of pre-chosen banks on the same day, terrorizing employees in the process. The examples here are too numerous to mention, but they become Major Cases by virtue of their spree qualities. Again, this shows multiple crimes in multiple locations with no cooling off.

Serial Crimes – Serial criminals commit multiple crimes with multiple victims. Unlike spree criminals, however, serial criminals commit their crimes on distinctly separate occasions. There is a cooling off period between crimes.

Uniquely, serial criminals tend to plan their crimes meticulously and pre-select their victims and locations. Unlike mass crimes and spree crimes, serial crimes are differentiated in that the perpetrator tends to carefully select their victims, have cooling-off periods between crimes, and plan them carefully. Examples of serial criminals (especially serial killers) are far too easy to find and include The Zodiac Killer (in California in the late 1960s), Ted Bundy (confessed to killing 30 women), and Dennis Raider (The BTK Murderer who killed 10 people in Wichita between 1974 and 1991

A unique problem with Multiple Incident Major Cases

The major problem for law enforcement investigating Multiple Incident Major Cases, especially those that fall in the ‘serial’ category, is that new crimes are committed even as the investigation is underway. Resources can be stretched to their thinnest when a new crime is added to the serial list, and the public pressure for an arrest can overwhelm even the hardest of investigators. Hello, stress.

stress

A common attribute of the successful serial crime investigators that I have spoken with is their ability to separate the pressure from the work. The crimes and their timing are unpredictable, the public demand for a resolution is powerfully serious, and ‘interested parties’ (think politicians) are breathing down the investigators’ necks. That’s a lot of pressure.

Just as in any profession, untreated stress can lead to major consequences. These consequences not only affect the individual investigator, but also those with whom he or she has daily contact, including family and friends. The investigators I have spoken with help alleviate the pressure through:

  • Taking care of themselves physically,
  • Ensuring that workload is spread as evenly as possible, and
  • Taking time to partake in leisure and family.

(A quick point of clarity and a disclaimer: Any discussion around the differences between mass criminals, spree criminals, and serial criminals is going to be lively, and is an ongoing source for debate among criminologists. This posting will undoubtedly include characteristics and definitions that some readers may not entirely agree with.)

In Part 4 of this special series Managing Major Cases, I will examine the operational structures involved in managing major investigations.

New Doug4Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.

Managing Major Cases Part Two: What puts the ‘Major’ in Major Cases?

In Part One of this series, I provided my definition of Major Cases and went into some detail about some of the attributes that differentiate a Case from a Major Case. Moving ahead now, I want to take a look at the different ‘types’ of Major Cases.

One of the problems in dealing with Major Cases is that, because of the varying types of cases, there’s no firm blueprint for investigating them. Major Cases move in real time, and – based upon interviews I have conducted with Major Case Investigators – can generally fall into one of two categories – Single Incidents and Multiple (serial) Incidents.

This article tackles Single Incident Major Cases.

Single incident Major Cases are defined by one single criminal act so abhorrent to the socio-economic environment, that it alone creates intense pressure to apprehend the perpetrator(s). What makes the incident so abhorrent ranges from factors such as:

The identity of the victim: In September of 1996, at the height of tensions between The Bloods and The Crips, a 25 year old African American man is shot in a drive-by shooting on the streets of Las Vegas and dies a few days later. Unfortunately, young black men die far too frequently in times of gang tensions, and few of these cases ever elevate to the status of a Major Case. The victim here, however, was Tupac Shakur.

Tupac was an American rapper and actor who came to embody the 1990s gangsta-rap aesthetic, and was a key figure in the feud between West Coast and East Coast hip hop artists. Simply put… he was famous as hell. Hence, a far-too-routine shooting became a Major Case in the blink of an eye. The case remains unsolved.

The identity of the suspect(s): “We the jury in the above entitled action find the defendant, Orenthal James Simpson, not guilty of the crime of murder.” Thus ended the double murder trial of former NFL player and Heisman Award winner OJ Simpson. In what was deemed ‘The Trial of the Century”, Simpson had been charged with the June 13, 1994 killings of his ex-wife Nicole Brown Simpson, and her friend Ron Goldman.

After weeks of testimony, and a clear nation-wide division between those who believed Simpson to be innocent and those who believed him guilty, Simpson was acquitted of the murders on October 3, 1995.

While the case of two relatively young and affluent Caucasians being killed in the generally safe area of Brentwood may have been newsworthy, it was the identity of the suspect that was the catalyst in this becoming one of the most famous single-incident Major Cases in American history.

The location of the crime: When a half-naked corpse, covered in cuts, bruises and bite marks, is found behind the Metropolitan Museum of Art in New York’s Central Park, you have the makings of a Major Case. The corpse was that of 18-year-old Jennifer Dawn Levin. Levin was murdered during the early morning hours of August 26, 1986.

The ‘Met’, as the museum is known, is one of the most-visited and famous museums on the entire planet. Murders don’t happen in world-famous places like this, and the case became the top story on the evening news for months and months. That is one major single-incident Major Case.

After an investigation into what the press dubbed “The Preppie Murder”, college student Robert Chambers was charged and tried for murder. The jury, however, remained deadlocked for nine days and a plea bargain was struck. (Chambers’ defense, you may recall, was that he had killed Ms. Levin during consensual ‘rough sex’.)

The uniqueness of the crime itself: Six year old girls in upscale Colorado neighborhoods aren’t supposed to die. They’re certainly not supposed to be murdered… especially in their own home while the rest of the family slept. Uniqueness has always surrounded the December, 1996 killing of young beauty queen JonBenét Ramsey in Boulder, CO.

On the morning of December 26, 1996, John Ramsey found his daughter’s body with duct tape over her mouth and a cord twisted around her neck in the basement of the family home. John’s wife, Patsy, says she found a ransom note demanding $118,000 for JonBenét’s return – an amount that is purported to match exactly a recent work-related bonus that John Ramsey had received. Despite these odd circumstances, the couple retained lawyers and were not formally interviewed by police for over 4 months. (The case has never been solved, and Boulder Police have cleared the couple of any wrongdoing.)

Tragically, it’s estimated that over 1500 children are murdered each year in America. JonBenét’s case may have been just another number in that truly sad statistic were it not for unique circumstances that surrounded it; it occurred in an upscale neighborhood, the victim was a young beauty queen, the ransom note matching the bonus, a possible crime scene contamination by father John, and ‘seemingly’ uncooperative parents that made this a single-incident Major Case.

In Part Three of this series, we examine some examples and problems associated with Multiple Incident Major Cases.

 

Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.

Managing Major Cases: Part One

This is Part 1 of a series dedicated to the science (and art) of  managing Major Criminal Cases in law enforcement. In order to begin a discussion on this subject, though, it’s important to define what makes an investigation a Major Case Investigation in the first place.

My friend, Chief Dan McDevitt, defines a Major Case in his popular book ‘Major Case Management: A Guide for Law Enforcement Managers‘ as follows:

“A Major Case is a real or suspected crime of such severity that it creates an intense public demand for identification, apprehension, and prosecution of the offender(s).”

– Chief Daniel McDevitt

Irrespective of how your own definition may vary from Chief Dan’s, this much is simple; Major Cases are serious criminal matters. The degree of ‘seriousness’, however, is almost entirely relative. A stabbing in Chicago may not, by itself, be ‘serious’ as viewed by the public at large. Conversely, a sexual assault on a small University Campus may be extremely ‘serious’.

Make no mistake… neither are good or acceptable, and both are, of course, unthinkable violations. The point here is that cases may be Major Cases (or not) by virtue of the relative socio-economic environment in which they are being investigated.

Attributes of a Major Case. You probably have a Major Case when..

All of that said, there are several attributes which are common in major case investigations:

  1. Resource Requirements – The amount of resources that an investigation unit must devote to a Major Case is substantial… far more than the average investigative case. This would include additional officers, overtime, forensics work, and the like. If your budget is shot in one fell swoop… you probably have a Major Case on your hands.
  2. Big Brother is Watching – Maybe the Mayor is involved. Maybe the ACLU. Black Lives Matter? The NRA, even. Major Cases are often associated with major non-law enforcement interest from groups claiming to be stakeholders. If Al Sharpton, Wayne LaPierre, or AG Jeff Sessions have chimed in… you probably have a Major Case on your hands.
  3. All Hands on Deck – Major Cases tend to redefine titles and organizational roles. Many of the Chiefs and Sheriffs I have interviewed on this topic describe pulling all types of duty assignments. Patrol officers become Detectives, who become Media Relations, and so on. If the chief cook is washing bottles… you probably have a Major Case on your hands.
  4. Media Attention – Many Major Cases capture the attention of the public and, subsequently, the media. In many cases, a local case can turn viral and suddenly there’s a CNN mobile satellite truck parked outside. What makes an investigation viral isn’t always clear, but it’s discussed HERE in some detail. If Wolf Blitzer calls your investigation ‘Breaking News’… you probably have a Major Case on your hands.
  5. There are Multiple Jurisdictions Involved – Because of the possible complexities of Major Cases, they quite often involve multiple agencies. Task Forces are regularly utilized in Major Cases, and are comprised of any number of people from across different law enforcement agencies, making the problem of staying organized even harder. Perhaps the City PD is working to support the local Sheriff’s Office – or vice versa. Maybe the State Bureau of Investigation is involved. Maybe the FBI. If you need ‘Hello My Name Is…” stickers during your case review… you probably have a Major Case on your hands.

Having placed some parameters around what defines a Major Case, we will look deeper into the unique problems associated with these types of investigations. Stay tuned for Part Two of this series.

Douglas Wood is CEO of Crime Technology Solutions | Case Closed Software, a leading provider of serious investigation software to law enforcement, state bureaus, DA offices, and other investigative units. Doug can be reached directly HERE.

 

Case Closed Software user HCSO featured on Investigation Discovery Network

When the sleepy town of Mooresburg, TN receives news that beloved teacher Margaret Jack Sliger is murdered on her farm, Hawkins County detectives are charged with finding the sinister perpetrator to bring their community justice.
ID Network (Investigation Discovery) recently aired an episode of the popular program “Murder Comes To Town” featuring Hawkins County Sheriff’s Office (HCSO) in Tennessee. The story surrounds the 2015 murder death of 79 year old Margaret Sliger in Mooresburg, TN and the 2 year effort to solve and prosecute the crime.
Case Closed Software® is proud to be the investigation case management software provider for HCSO, and to be associated with the agency.
If you subscribe to ID Network, you can view the episode HERE.
 

Attack of the Drones

Police drones are becoming more and more commonly utilized by law enforcement agencies across the world. As of 2017 there were 347 American police departments using unmanned aerial technology. This number represents a 518% increase over a two year time period. Police are quickly catching on to how drone technology can help make police work easier and safer.
police-droneOne of the ways drones are being utilized is in surveillance. Drones have the ability to reach vantage points that would either be impossible for an officer to reach, or expose the officer to danger. A drone can get to a great vantage point without having to compromise the safety of an officer. This ability is especially useful in an active shooter scenario, where the lives of the law enforcement officers are on the line.
Being able to view and assess threats remotely not only minimizes risk, but allows police to formulate a strategy. Drones can also minimize risk to bystanders. If a suspect were to commit a crime then run into a crowd of people, a drone would be able to track the suspect through the crowd rather than have officers run after and risk harm to an innocent bystander. The video footage from the droid can make an important addition to an investigation case management platform.
Drones are also being used in crime scene analysis. By combining drone technology with 3D mapping technology, police are able to make a navigable rendering of the crime scene based on aerial photographs. This can be used to recreate scenarios such as traffic accidents, or to search for previously unnoticed details in a crime scene.
police-drones-latimes-2011Search and rescue missions are also aided by drone technology. When lives are on the line, time is of the essence. A drone can cover large areas in a short amount of time, and with a thermal imaging camera attached, it can more easily spot a person than human eyes can – especially in the dark. Drones can also be used to monitor large crowds, not only to observe any possible criminal actions, but also to see if any person in the crowd needs medical assistance but cannot signal for it.
Drones are an extremely useful technology and are only becoming better and more affordable. Law enforcement can utilize them not only to better prevent crime, but to reduce the risk that officers take in the field every day. And in a situation where officers are putting their lives on the line, it’s good to have a friend than can fly.

Big Data Surveillance: The Case of Policing

Posted by Douglas Wood, CEO of Case Closed Software – a leader in investigation software  and analytics for law enforcement.
Headquartered here in Central Texas, I recently had an opportunity to have coffee with Dr. Sarah Brayne, Assistant Professor, Department of Sociology at The University of Texas at Austin. Ms. Brayne had just published an interesting article in The American Sociological Review. The article is titled Big Data Surveillance: The Case of Policing.
The article examines the intersection of two emerging developments: the increase in surveillance and the massive exploration of “big data.” Drawing on observations and interviews conducted within the Los Angeles Police Department, Sarah offers an empirical account of how the adoption of big data analytics does—and does not—transform police surveillance practices.
She argues that the adoption of big data analytics facilitates may amplify previous surveillance practices, and outlines the following findings:

  1. Discretionary assessments of risk are supplemented and quantified using risk scores.
  2. Data tends to be used for predictive, rather than reactive or explanatory, purposes. (Here, Crime Tech Weekly would want to differentiate between predictive analytics and investigation analytics)
  3. The proliferation of automatic alert systems makes it possible to systematically surveil an unprecedentedly large number of people.
  4. The threshold for inclusion in law enforcement databases (gang databases, criminal intelligence data, etc) is lower, now including individuals who have not had direct police contact. (Here again, Crime Tech Weekly would point out that adherence to criminal intelligence best practices vastly reduces this likelihood)
  5. Previously separate data systems are merged, facilitating the spread of surveillance into a wide range of institutions.

Based on these findings, Sarah develops a theoretical model of big data surveillance that can be applied to institutional domains beyond the criminal justice system. Finally, she highlights the social consequences of big data surveillance for law and social inequality.
The full PDF report can be downloaded via Sage Publishing by clicking here. Or, if you have general comments or questions and do not wish to download the full version, please feel free to contact us through the form below. Crime Tech Weekly will be happy to weigh in.

Criminal Intelligence Management: Best Practices

Criminal intelligence analysts provide a key element of effective law enforcement, at both the tactical and strategic levels. Analysts study information related to suspects, trends, known criminals, and more. Through a process of gathering evaluating this information, trained intelligence analysts identify associations across various illegal activities over many locations.
ciaGovernment decisions and policies are heavily influenced by the insights provided by the criminal intelligence analyst, and police investigations use the intelligence in support of their missions. To that end, the main functions of criminal intelligence analysts include:

  • Supporting law enforcement activities and large-scale investigations
  • Providing an ongoing analysis of potential threats to public safety
  • Helping senior officials and policy makers to deal with ever-evolving challenges and uncertainty

There are both tactical and strategic elements to the role of the criminal intelligence analyst. These categories differ with respect to the minutia of details, and the ‘customer’ or end-user of the intelligence.
A. Tactical Criminal Intelligence
Criminal intelligence of a tactical nature attempts to achieve a specific outcome related to law enforcement. Perhaps a disruption of organized criminal groups, a search warrant, seizure of assets, or an arrest.
Tactical criminal intelligence includes:

  1. The identification of potential connections between people, places, and other entities of interest… and their potential involvement in unlawful activities;
  2. Recognizing and reporting important gaps in intelligence data;
  3. Designing and creating detailed dossiers of suspected or confirmed criminals.

strategy tacticsB. Strategic Criminal Intelligence
Strategic analysis of criminal intelligence is expected to continuously educate policy makers and senior officials about current and evolving criminal activities and patterns. The benefits of strategic analysis tend to be realized over a longer period of time than does tactical analysis.
Emerging criminal trends and activities sit at the core of strategic intelligence analysis. The intelligence can provide advanced warning of potential threats, and can provide law enforcement officials with the information required to prepare their agencies for emerging illegal actions.
Strategic criminal intelligence analysis includes the recognition and documentation of:

  • Evolving trends and patterns of illegal activities
  • Developing threats
  • Modus operandi
  • The possible effect of demographics, technologies, and evolving socio-economic factors on criminal activities

privacyD. Abuse and Misuse of Criminal Intelligence
The misuse and/or improper storage and unauthorized access to sensitive criminal intelligence data has always been a concern of civil liberty advocates, and has recently been brought to light again with stories regarding misuse of California’s CalGang database. Given the diverse and growing requirements of criminal intelligence management, certain best-practices and policies have evolved in order to help law enforcement agencies collect, store, and disseminate this important criminal intelligence without invading individual rights to privacy.
E. Best Practices for Criminal Intelligence Management
28-cfr-part-23Specifically, 28 CFR Part 23 is a federal regulation that provides guidance to law enforcement agencies on the standards for implementing and operating federally funded criminal intelligence systems that cross jurisdictions. The protection of individual constitutional rights and civil liberties sits at the core of 28 CFR Part 23. Every American, of course, is afforded a reasonable expectation of privacy. The guidelines outline specific methods to gather, store, disseminate, review, and purge criminal intelligence data.
Recommending the use of these guidelines is The National Criminal Intelligence Sharing Plan (NCISP). NCISP suggests that the regulations ensure that the operations of a criminal intelligence system protect the rights and privacy of individuals and organizations. Importantly, The NCISP suggests that criminal intelligence groups adhere to 28 CFR Part 23, irrespective of whether or not the system was implemented using federal funds and grants.
The criminal intelligence guidelines prescribed by 28 CFR Part 23 have been identified as the minimal policies and rules for sharing data across law enforcement agencies.

28-cfr-cop
28 CFR Part 23 outlines best practices for secure criminal intelligence management

The best practices prescribed within the regulation include specific guidelines related to:

  • Proper procedures for querying, reviewing, sharing, validating, and purging of criminal intelligence data.
  • Multi-jurisdictional memorandums and participation agreements (if applicable).
  • The gathering and submission of criminal intelligence information.
  • The definition of key criminal intelligence terminology, including ‘the right to know’ and ‘the need to know’.
  • The specific activities that may or may not be maintained within the criminal intelligence system.
  • Individual rights to access the criminal intelligence systems.
  • Security requirements including the auditing and inspection of data.

F. An Excellent Solution
IntelNexus_logo_v1IntelNexus™ from software developer Crime Tech Solutions is an affordable, yet powerful criminal intelligence management system that complies with the regulations and best practices set forth in 28 CFR Part 23. Whether or not an agency (or agencies) absolutely require compliance to 28 CFR Part 23, the software lays out a framework and enforces the principles that should be incorporated into the criminal intelligence database. IntelNexus offers the foundation for gathering, storing, maintaining, sharing, authenticating, and purging criminal intelligence while ensuring the privacy and civil rights afforded to us all.
The company also develops the popular Case Closed™ investigation case management software, and provides a suite of advanced crime analytics and link analysis software.

Overland Park senior crime analyst Jamie May joins Crime Tech Solutions

September 16, 2016 – (Leander, TX)  Crime Tech Solutions, a fast-growing provider of low cost / high performance crime fighting software and analytics is delighted to announce the addition of Jamie May as senior analyst and strategic advisor to the company.

jamiemayMs. May has spent over 17 years as a crime and intelligence analyst for Overland Park Police Department in Kansas, and is a recognized expert in crime analysis, mapping, and criminal intelligence. She has sat on critical crime analysis committees including the International Association of Crime Analysts’ Ethics Committee (IACA) and is a past Vice President / Secretary at Mid American Regional Crime Analyst Network (MARCAN).

“Jamie brings an incredible amount of user experience and innovation to the company”, said Kevin Konczal, Crime Tech Solutions’ VP of Sales. “She’s been active in this community for years, and co-authored the ground-breaking guide, GIS in Law Enforcement: Implementation Issues and Case Studies.”

“To me, Crime Tech Solutions represents a truly innovative company that understands how to develop and market very good technology at prices that most agencies can actually afford”, said Ms. May. “I’m looking forward to being part of the continued growth here.”

In her role with the company, Ms. May will interact with customers and prospects to help align the company’s solution strategy with market and user requirements.

black versionCrime Tech Solutions, who earlier this year acquired TN based Case Closed Software, delivers unique value to customers with comprehensive investigative case management software, sophisticated link analysis tools, criminal intelligence management software, and crime mapping technology that includes some of the industry’s best analytics and reporting capabilities.

 
 
 
 

Using crime analysis solutions to take a ‘Byte’ out of crime

_KOK1002_RTCC+(3)Posted by Crime Tech Solutions 
Law enforcement agencies everywhere are tasked with reducing and investigating crime with fewer and fewer resources at their disposal. “To protect and serve” is the highest responsibilities one can sign up for, particularly in light of recent well-publicized criticisms of police by activists in every city.
That responsibility weighs even heavier in a world with no shortage of criminals and terrorists. There’s never enough money in the budget to adequately deal with all of the issues that face an individual agency on a daily basis. Never enough feet on the street, as they say.
New Tools for Age-Old Problems
Perhaps that’s why agencies everywhere are moving to fight crime with an evolving 21st century weapon – law enforcement software including investigative case management, link and social network analysis, and, importantly, crime analytics with geospatial and temporal mapping.
analyticscity
Crime analytics and investigation software have proven themselves to be valuable tools in thwarting criminal activity by helping to better define resource allocation, target investigations more accurately, and enhancing public safety,
According to some reports, law enforcement budgets have been reduced by over 80% since the early 2000s. Still, agencies are asked to do more and more, with less and less.
Analytics in Policing

Analytics
Predictive Analytics for Policing

Analytics in law enforcement  play a key role in helping law enforcement agencies better forecast what types of crimes are most likely to occur in a certain area within a certain window of time. While no predictive analytics solution offers the clarity of a crystal ball, they can be effective in affecting crime reduction and public safety.
Predictive analysis, in essence, is taking data from disparate sources, analyzing them and then using the results to anticipate, prevent and respond more effectively to future crime. Those disparate data sources typically include historical crime data from records management systems, calls for service/dispatch information, tip lines, confidential informant information, and specialized criminal intelligence data.
The Five W’s of Predictive Analytics
Within this disparate data lie the 5 W’s of information that can be used by crime analysis software to build predictions. Those key pieces include:

  1. Arrest records – who committed crimes
  2. Geospatial data – where crimes have occurred
  3. Temporal data – when crimes have occurred
  4. Statistical data – what crimes have occurred
  5. Investigation data – why (and how) the crimes occurred

5W
Using the 5 W’s, agencies are able to gain insight and make predictions about likely future criminal behavior. For example, if a certain type of crime (what) tends to occur in ‘this’ area (where) at ‘this’ time (when), and by ‘this’ type of individual (who) for ‘this’ reason (why)… it would be wise to deploy resources in that area at that time in order to prevent the incidents from ever occurring. This, of course, is a dramatic over-simplification of the types of analytics that make up predictive policing, but illustrates the general concept well.
Although criminals will always try to be one step ahead of the law, agencies deploying predictive analytics are able to maximize the effectiveness of its staff and other resources, increasing public safety, and keeping bad guys off the street.
More about Crime Tech Solutionsblack version
Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and temporal reporting, and 28 CFR Part 23 compliant criminal intelligence database management systems.