Tag Archives: crime technology

Crime Hot Spots and Risk Terrain Modeling

abmpegasus-intelligence-led-policing
A typical ‘hot spot’ in crime analytics

By Tyler Wood, Operations Manager at Crime Tech Solutions.
One of the many functions crime analysis performs is the identification of “hot spots”, or geographical areas that seem to be hubs for criminal activity. Identifying these hot spots through best practices in geospatial crime mapping allows law enforcement to focus their efforts in areas that need them most. The trouble that law enforcement and crime analysts have encountered is displacement – the fact that once a hot spot is “cleared”, crime seems to pop up again in a different location. The good news is that the displacement is never 100%, so policing hot spots is important – it’s just not a magic bullet.
To solve this problem, a team at Rutgers University’s School of Criminal Justice set out to develop new methodologies that would result in peaceful outcomes that are built to last instead of merely temporary.
The difference between the old approach and the new approach is stark. Where police and analysts used to focus solely on geographical concentration of crimes, Risk Terrain Modeling examines the factors that contribute to such dense concentrations to begin with. Rutgers team have identified several characteristics of any given geographical location which may attract or generate crime. Their technology takes these characteristics, which include socioeconomic data, physical layout, types of local businesses, etc… and uses them to calculate the likelihood crime occurring in the area. This allows law enforcement to be proactive in the prevention of crime in these areas.
CrimeMapLite
Advanced crime analytics show statistically significant risk factors.

The technique seems to be highly effective. After a trial run in New Haven, CT, police were able to identify sixteen “statistically significant risk factors that underlie violent crime occurrences.” A high percentage of violent crime in New Haven during the test period occurred in locations already identified by the concept of risk terrain modeling. Though the technology is still new, it is clearly showing impressive results already.
Shutting down hot spots is important policing, and risk terrain modeling technology allows analysts and law enforcement officers to be even more proactive in their prevention of crime.
The author, Tyler Wood, is head of operations at Austin, TX based Crime Tech Solutions – an innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Crime Tech Solutions Acquires Case Closed Software

June 1, 2016 (Austin, TX)   Crime Tech Solutions, LLC, a leading provider of analytics and investigation software for law enforcement and commercial markets, today announced that it has acquired Cleveland, TN based Case Closed Software in a cash transaction. The terms of the deal were not released, but according to Crime Tech Solutions’ founder and president Douglas Wood, the acquisition brings together two dynamic and fast-growing software companies with an unparalleled complement of technologies.
For Crime Tech Solutions, the opportunity to add Case Closed Software into the fold was too good to pass up” said Mr. Wood. “We think that the technology offered by Case Closed helps to further differentiate us in the market as the price performance leader for this type of investigative solution.PNG
Crime Tech Solutions, based in the city of Leander, TX, delivers advanced analytics and investigation software to commercial investigators and law enforcement agencies across the globe. Their solution suite includes criminal intelligence software, sophisticated crime analytics with geospatial mapping, and powerful link analysis and visualization software. The company says that the addition of Case Closed Software expands those offerings even further.
Case Closed Software develops and markets investigative case management software specifically designed for law enforcement agencies. The suite is built around four primary software products including best-in-class investigative case management software, property and evidence tracking, a gang database tool, and an integrated link analysis and data visualization tool. The company also plans to release the solution as Case Closed Cloud for cloud-based access.
Case Closed couldn’t be happier than to be joining Crime Tech Solutions,” said Keith Weigand, the company’s founder. “The blending of our technologies creates a suite that will add tremendous value to our mutual customers, and will be hard for others to duplicate.
According to both Mr. Weigand and Mr. Wood, the name Case Closed will continue on as the product brand, given its widespread popularity and loyal customer base. Crime Tech Solutions is expected to retain all Case Closed employees, with Mr. Weigand joining as the company’s chief technical officer.
Crime Tech Solutions says it expects continued growth via ongoing software sales and strategic acquisitions.
About Crime Tech Solutions
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Predictive Policing: Two experts debate

JPGThis is a must-read for law enforcement analysts and investigators. Great article from the Wall Street Journal. Read it HERE.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)
 

China building big data platform for pre-crime

Re-posted by Crime Tech Solutions – Your Source for Investigation Software
It’s “precrime” meets “thoughtcrime.” China is using its substantial surveillance apparatus as the basis for a “unified information environment” that will allow authorities to profile individual citizens based upon their online behaviors, financial transactions, where they go, and who they see. The authorities are watching for deviations from the norm that might indicate someone is involved in suspicious activity. And they’re doing it with a hand from technology pioneered in the US.
Tiananmen_Square_Beijing_China_1988_1-640x447As Defense One’s Patrick Tucker reports, the Chinese government is leveraging “predictive policing” capabilities that have been used by US law enforcement, and it has funded research into machine learning and other artificial intelligence technologies to identify human faces in surveillance video. The Chinese government has also used this technology to create a “Situation-Aware Public Security Evaluation (SAPE) platform” that predicts “security events” based on surveillance data, which includes anything from actual terrorist attacks to large gatherings of people.
The Chinese government has plenty of data to feed into such systems. China invested heavily in building its surveillance capabilities in major cities over the past five years, with spending on “domestic security and stability” surpassing China’s defense budget—and turning the country into the biggest market for security technology. And in December, China’s government gained a new tool in surveillance: anti-terrorism laws giving the government even more surveillance powers and requiring any technology companies doing business in China to provide assistance in that surveillance.
The law states that companies “shall provide technical interfaces, decryption and other technical support and assistance to public security and state security agencies when they are following the law to avert and investigate terrorist activities”—in other words, the sort of “golden key” that FBI Director James Comey has lobbied for in the US. For obvious reasons, the Chinese government is particularly interested in the outcome of the current legal confrontation between the FBI and Apple over the iPhone used by Syed Farook.
Bloomberg reports that China is harnessing all that data in an effort to perform behavioral prediction at an individual level—tasking the state-owned defense contractor China Electronics Technology Group to develop software that can sift through the online activities, financial transactions, work data, and other behavioral data of citizens to predict which will perform “terrorist” acts. The system could watch for unexpected transfers of money, calls overseas by individuals with no relatives outside the country, and other trigger events that might indicate they were plotting an illegal action. China’s definition of “terrorism” is more expansive than that of many countries.
At a news conference in December, China Electronics Technology Group Chief Engineer Wu Manqing told reporters, “We don’t call it a big data platform, but a united information environment… It’s very crucial to examine the cause after an act of terror, but what is more important is to predict the upcoming activities.”
__
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)

Link Analysis and Crime – An examination.

Posted by Tyler Wood, Operations Manager at Crime Tech Solutions
Pic003The topic of fraud is widely discussed, and the focus of thousands upon thousands of articles. Television shows such as Crime, Inc and American Greed have become popular due, in part, to our fascination with the topic of fraud.
The organizations that are affected by fraud are also fascinated… but for entirely different reasons. Some estimates suggest that the US economy loses 11 trillion dollars each year due to one form of fraud or another. It’s little wonder, therefore, that the companies most frequently defrauded have been heavily investing in anti-fraud technologies at an increasing rate over the past decade or more.
The biggest problem with fraud, of course, is that it is always evolving in a very Darwinian fashion. Like a living, breathing entity, fraud schemes change over time in order to survive. As the targets of fraud schemes put new policies, procedures and/or systems to deter the activities, the schemes modify and find new ways to survive.
v1
So, since the nature of criminal activity is such that they constantly change, how do investigators find a fool proof methodology to ensure they are 100% safe from them? The answer, of course, is that they can’t. They never will; at least not until we live in a world such as the one depicted in the 2002 film Minority Report, starring Tom Cruise. In that movie, criminals are arrested prior to committing a crime based upon the predictions of psychics called ‘Precogs’. Corporations and individual targets of fraud can only wish.
Nope, there are no Precogs running around locking up would-be practitioners of fraud that would protect banks, insurance companies, Medicaid and Medicare programs, victims of Ponzi schemes, victims of identity theft, and countless others. Instead, organizations rely upon skilled knowledge workers using purpose-built crime and fraud analytics technology that can detect anomalies in patterns, suspicious transactions, hotspot mapping, networks of fraudsters, and other sophisticated data analytics tools.
v4
Crime and fraud analytics
Any discussion of analytics and investigation software must touch upon the topic of ‘big data’. No longer just a buzz word, big data literally fuels the insights gathered by organizations in every area of business. Naturally, then, organizations who have been traditionally targeted by fraudsters have increasingly invested in crime technology such as investigation software and analytics in order to exploit the phenomenon.
gotbigdata.pngOf course, big data in and by itself does nothing. It just sits there. Nobody has ever yelled “Help! We’ve been defrauded! Call the big data!” Big data is only useful when it can be transformed into ‘smart data’. In other words, understanding the big picture of costly fraudulent activities is not akin to understanding the specifics of ‘who’ is defrauding you, and ‘how’ they are doing it.
Those questions can best be answered through the powerful data mining and link analysis software tools offered by Austin, TX based Crime Tech Solutions in partnership with Sterling, VA based Visallo. Effective link analysis complements big data analytics platforms, helping to expose previously undetected fraud, and the entities (people or organizations) committing it.
Link Analysis – Transforming big data into smart data
By definition, link analysis is a data analysis technique that examines relationships among people, places, and things. As a visual tool, link analysis provides users a powerful method to quickly understand and ‘see’ what is happening. Because of this, it is widely used by financial institutions such as banks and insurance companies to uncover criminal networks, improve fraud investigations, detect insider fraud, and expose money laundering schemes. Similarly, government agencies use link analysis to investigate fraud, enhance screening processes, uncover terrorist networks and investigate criminal activities.
At Crime Tech Solutions, we liken the question of how to detect and deter fraud to ‘How do you eat an elephant?’ The answer, of course, is one bite at a time. If big data is the elephant, comprehensive link analysis software is part of the one ‘bite’ at a time. Or should we say ‘byte’.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of investigation software and analytics for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, an industry-leading investigation case management solution, and criminal intelligence database management systems.)

Professor urges increased use of technology in fighting crime

risk_terrain_modeling_resizedPosted by Crime Tech Solutions
This article originally appeared HERE in Jamaica Observer. It’s an interesting read…
A University of the West Indies (UWI) professor is calling for the increased use of technology by developing countries, including Jamaica, to assist in the fight against crime.
Professor Evan Duggan, who is Dean of the Faculty of Social Sciences, said there have been “amazing advancements” in information and communications technologies (ICT), over the past six decades, which offer great potential for improving security strategies.
The academic, who was addressing a recent National Security Policy Seminar at UWI’s Regional Headquarters, located on the Mona campus, pointed to Kenya as a developing country that has employed the use of inexpensive technology in its crime fighting initiatives.
“Potential applications and innovations have been implemented through the use of powerful but not very expensive technologies that have allowed law enforcers to make enormous leaps in criminal intelligence, crime analysis, emergency response and policing,” he said.
He pointed to the use of a variety of mobile apps for crime prevention and reporting, web facilities, and citizen portals for the reporting of criminal activity.
Professor Duggan said that in order for Jamaica to realise the full benefit of technology in crime fighting, national security stakeholders need to engage local application developers.
“I would enjoin our stakeholders to engage the extremely creative Jamaican application developers, who now produce high quality apps for a variety of mobile and other platforms. I recommend interventions to assist in helping these groups to cohere into a unified force that is more than capable of supplying the applications we need,” he urged.
The UWI Professor pointed to the Mona Geoinformatic Institute as one entity that has been assisting in fighting crime, through analyses of crime data as well as three dimensional (3D) reconstruction of crime scenes; and mapping jurisdictional boundaries for police posts and divisions, as well as the movement of major gangs across the country.
In the meantime, Professor Duggan called for “purposeful activism” in the fight against crime and lawlessness which, he said, are “serious deterrents to economic development and national growth prospects” and could derail the national vision of developed country status by 2030.
“In the current global landscape where security challenges are proliferating across borders and have taken on multifaceted physiognomies, all hands on deck are vital,” he stressed.
“We need to …consolidate pockets of research excellence in this area …to provide the kinds of insight that will lead to more fruitful and productive collaborative engagements that are required to help us better understand the security challenges and threats from crime in order to better inform our national security architecture and direction,” he added.

What is Geospatial Crime Mapping?

Geospatial4Posted by Crime Tech Solutions with information gathered from Wikipedia.
Here’s a fact: Any understanding of where and why crimes occur can help prevent future crimes.
Mapping crime can help law enforcement protect citizens more effectively. Simple maps that display the locations where crimes or concentrations of crimes have occurred can be used to help direct patrols to places they are most needed. Policymakers can use more complex maps to observe trends in criminal activity; such maps can prove invaluable in solving criminal cases. For example, detectives can use maps to better understand the hunting patterns of serial criminals and to hypothesize where these offenders might live.
Products like CrimeMap Pro™ from Crime Tech Solutions are used by analysts in law enforcement agencies to map, visualize, and analyze crime incident patterns. It is a key component of crime analysis and the CompStat policing strategy. Mapping crime, using Geographic Information Systems (GIS), allows crime analysts to identify crime hot spots, along with other trends and patterns.CrimeMapLite

Using GIS, crime analysts can overlay other datasets such as census demographics, locations of pawn shops, schools, etc., to better understand the underlying causes of crime and help law enforcement administrators to devise strategies to deal with the problem. GIS is also useful for law enforcement operations, such as allocating police officers and dispatching to emergencies.

Crime analysts use crime mapping and analysis to help law enforcement management (e.g. the police chief) to make better decisions, target resources, and formulate strategies, as well as for tactical analysis (e.g. crime forecasting, geographic profiling). New York City does this through the CompStat approach, though that way of thinking deals more with the short term. There are other, related approaches with terms including Information-led policing, Intelligence-led policing, Problem-oriented policing, and Community policing. In some law enforcement agencies, crime analysts work in civilian positions, while in other agencies, crime analysts are sworn officers.
From a research and policy perspective, crime mapping is used to understand patterns of incarceration and recidivism, help target resources and programs, evaluate crime prevention or crime reduction programs (e.g. Project Safe Neighborhoods, Weed & Seed and as proposed in Fixing Broken Windows), and further understanding of causes of crime.
The boom of internet technologies, particularly web-based geographic information system (GIS) technologies, is opening new opportunities for use of crime mapping to support crime prevention. Research indicates that the functions provided in web-based crime mapping are less than in most traditional crime mapping software. In conclusion, existing works of web-based crime mapping focus on supporting community policing rather than analytical functions such as pattern analysis and prediction.

How Can Crime Analysis Help Police Reduce Crime?

Pic005Posted by Crime Tech Solutions
The following article was published just over a year ago HERE by Dr. Laura Wyckoff, a Fellow at Bureau of Justice Assistance. We think it is worth exploring:
“Focusing resources on high-crime places, high-rate offenders, and repeat victims can help police effectively reduce crime in their communities. Doing so reinforces the notion that the application of data-driven strategies, such as hotspots policing, problem-oriented policing, and intelligence-led policing, work. Police must know when, where, and how to focus limited resources, as well as how to evaluate the effectiveness of their strategies. Sound crime analysis is paramount to this success.
What is crime analysis exactly? Crime analysis is not simply crime counts or the change in crime counts—that is just information about crime and not an analysis of crime. Crime analysis is a deep examination of the relationships between the different criminogenic factors (e.g., time, place, socio-demographics) surrounding crime or disorder that helps us understand why it occurs. Sound crime analysis diagnoses problems so a response may be tailored to cure it, or reduce the frequency and severity of such problems.
Data-driven policing and associated crime analysis are still in their infancy and are not typically integrated into the organizational culture as well as traditional policing strategies. Many agencies are still not aware of the advantages of an effective crime analysis unit, and others may not have the resources or knowledge to effectively integrate one. Of those that do employ crime analysis, many may not fully understand or accept this approach, or use it to its potential.
Additionally, police command staff typically are not analysts, so they may be unaware of how to guide this work to provide “actionable” crime analysis products that can be helpful for crime reduction efforts. At the same time, analysts are usually not police officers and may not be aware of how police respond to crime problems (both tactically and strategically), or what types of products will be most useful.
To be more effective at combating crime using data-driven strategies, we need to overcome these barriers and knowledge gaps. That is why the Bureau of Justice Assistance (BJA) established the Crime Analysis on Demand initiative. This initiative has a number of training and technical assistance opportunities focused on increasing crime analysis capacity in agencies across the nation. BJA’s National Training and Technical Assistance Center (NTTAC) is providing police agencies access to crime analysis experts that provide recommendations, training, and technical assistance to help agencies improve their application of crime analysis.
Additionally, the Police Foundation’s recent Crime Mapping and Analysis News publication provides a synopsis of the different services offered through this initiative. Other resources for crime analysis can be found on the International Association of Crime Analysts and the International Association of Law Enforcement Intelligence Analysts’ web sites.”
 

Is "Minority Report" pure fiction?

Minority-Report-editPosted by Douglas Wood.
Journalist Raj Shekhar had an interesting article in the Times of India this week.
It’s like PreCrime, only four decades early. The “predictive policing” system seen in the Tom Cruise blockbuster Minority Report is now taking shape in Delhi. But instead of the three slime-immersed psychic “Precogs” that system relied on, Delhi Police’s crime prediction will be based on cold, hard data.
Once Enterprise Information Integration Solution or ‘EI2S’—a system that puts petabytes of information from more than a dozen crime databases at police staff’s fingertips—is ready, Delhi Police will be able to implement its ‘Crime Forecast’ plan to predict when and where criminals will strike.
The technology is not as fanciful as it seems at first and is already being tried out in many important cities, including New York, Los Angeles, London and Berlin. Officers associated with the plan say the software will analyze police data for patterns, compare it with other data from jails, courts and other crime-fighting agencies, and alert police to the likely threats. Data will be available not only on the suspects but also their likely victims.
A global tender has been floated for the project and Delhi Police is in talks with various firms for the technology.
According to the article, the system can help pre-empt many situations. For example, a violent clash between two gangs. It can identify individuals who are likely to join gangs or take to crime in an area based on the analyses of their behaviour and network. It can also curb domestic violence by identifying a pattern and predicting the next attack, the article said.
It all boils down to spotting patterns in mountains of data using tremendous computing power. A police document about the plan states that investigators should be able to perform crime series identification, crime trend identification, hot spot analysis and general analysis of criminal profiles. Link analysis will help spot common indicators of a crime by establishing associations and non obvious relationships between entities.
Using neighbourhood analysis, police will be able to understand crime events and the circumstances behind them in a small area as all the crime activity in a neighbourhood will be available for analysis. Criminal cases will be classified into multiple categories to understand what types of crime an area is prone to and the measures needed to curb them. Classification will be done through profiles of victims, suspects, localities and the modus operandi.
Another technique, called proximity analysis, will provide information about criminals, victims, witnesses and other people who are or were within a certain distance of the crime scene. By analyzing demographic and social trends, investigators will be able to understand the changes that have taken place in an area and their impact on criminality.
Network analysis will also be a part of this project to identify the important characteristics and functions of individuals within and outside a network, the network’s strengths and weaknesses and its financial and communication data.
While the system could help fight crime and rid Delhi of its ‘crime capital’ tag, it is bound to raise concerns over privacy and abuse as no predictive system can be foolproof.

Swoop 'n Squat, Army strong, and major case management: This week's Crime Technology headlines:

Posted by Douglas Wood, Editor.Newspaper
Swoop and Squat…
http://www.propertycasualty360.com/2015/03/09/swoop-squat-beware-of-these-insurance-fraudsters
Army strong analytics…
http://www.military.com/daily-news/2015/03/27/army-improves-systems-testing-to-deliver-more-capability-to-figh.html
Investigative Case Management…
http://www.mvariety.com/cnmi/cnmi-news/local/75212-commonwealth-bureau-of-investigation-has-a-new-building
WorksafeBC introduces new Major Case Management (MCM) protocols…
http://www.workerscompensation.com/compnewsnetwork/workers-comp-blogwire/20898-worksafe-bc-posts-update-on-safety-review-plan.html