Tag Archives: law enforcement software

Police Data: Beyond 'black' and 'white'?

Analytics
Beyond ‘black’ and ‘white’?

Published by Crime Tech Solutions

The notion of predictive policing is hotly debated. Some suggest that the technology removes the elements of racial bias in policing. Others claim that it does little to improve public safety. In fact, the predictive policing world took a hit recently when Milpita Police Department in California canceled a contract with software provider PredPol, suggesting that the tool offered little in way of ROI.

Predictive policing refers to the usage of mathematical, predictive and analytical techniques in law enforcement to identify potential criminal activity. Pulling in data from a variety of sources such as arrest records, calls for service, and geospatial (location) data, the promise of predictive policing offers law enforcement a statistical probability that a crime may occur in a particular location within a particular period of time.

crime-analysisAdvocates say ‘Great, let’s prevent the crime from happening’. Opponents say ‘The output is only as good as the input’. In other words, there are claims that a reliance upon historical data unduly influences the prediction. The position suggests that if police have tended to make arrests in Location A, then of course predictive policing will suggest patrolling Location A.

That argument has some holes, however; not the least of which is the very simple fact that historical data is the only kind of data that can ever exist. It has to happen before it’s data. The best indicator of future behavior is past behavior, says the pro-predictive policing side.

We think RAND Corporation puts it best when they state:

Predictive policing methods are not a crystal ball: they cannot foretell the future. They can only identify people and locations at increased risk of crime … the most effective predictive policing approaches are elements of larger proactive strategies that build strong relationships between police departments and their communities to solve crime problems.

5WThis same RAND statement was printed today by Dan Verton at MeriTalk. In an article entitled “Policing Data Sees Beyond Black and White“, Mr. Verton does an excellent job of discussing predictive policing in the context of current racial tensions in many US cities. The backdrop for the MeriTalk story is a new book by Manhattan Institute fellow Heather Mac Donald who, in her book “The War on Cops: How the New Attack on Law and Order Makes Everyone Less Safe“, uses data and data analytics to counter the argument that America’s police departments are engaged in a campaign of racial bias.

Our take is that predictive policing has merit. It is an important part of the law enforcement arsenal. Unfortunately, the term ‘Predictive Policing’ has also become a buzzword used by software vendors who aim to stake their claim in the law enforcement data analytics game. As a result of the gross overuse of the term, the predictive policing waters have become muddied.

Disagree? We entered the term into Google today and found about 350,000 unique pages.

We also think that the lack of ROI cited in Milpitra PD’s cancellation with PredPol is largely a result of costs. The promise of predictive policing, coupled with the over-hyped flame fanning of advocates (mostly vendors) has made the software relatively expensive.

Crime analytics Mapping Predicitive PolicingNevertheless, it’s hard for law enforcement to deliver a strong predictive policing ROI if they were over sold on its’ merits to begin with. The good news is that the hype is on the downswing and reality is setting in: Predictive policing is not the next greatest thing. Instead, as we suggest, it is an important tool that law enforcement can use to combat and prevent crime.

__

Crime Tech Solutions  is a low price / high performance innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence managementmobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.

black version

Crime Hot Spots and Risk Terrain Modeling

abmpegasus-intelligence-led-policing
A typical ‘hot spot’ in crime analytics

By Tyler Wood, Operations Manager at Crime Tech Solutions.
One of the many functions crime analysis performs is the identification of “hot spots”, or geographical areas that seem to be hubs for criminal activity. Identifying these hot spots through best practices in geospatial crime mapping allows law enforcement to focus their efforts in areas that need them most. The trouble that law enforcement and crime analysts have encountered is displacement – the fact that once a hot spot is “cleared”, crime seems to pop up again in a different location. The good news is that the displacement is never 100%, so policing hot spots is important – it’s just not a magic bullet.
To solve this problem, a team at Rutgers University’s School of Criminal Justice set out to develop new methodologies that would result in peaceful outcomes that are built to last instead of merely temporary.
The difference between the old approach and the new approach is stark. Where police and analysts used to focus solely on geographical concentration of crimes, Risk Terrain Modeling examines the factors that contribute to such dense concentrations to begin with. Rutgers team have identified several characteristics of any given geographical location which may attract or generate crime. Their technology takes these characteristics, which include socioeconomic data, physical layout, types of local businesses, etc… and uses them to calculate the likelihood crime occurring in the area. This allows law enforcement to be proactive in the prevention of crime in these areas.
CrimeMapLite
Advanced crime analytics show statistically significant risk factors.

The technique seems to be highly effective. After a trial run in New Haven, CT, police were able to identify sixteen “statistically significant risk factors that underlie violent crime occurrences.” A high percentage of violent crime in New Haven during the test period occurred in locations already identified by the concept of risk terrain modeling. Though the technology is still new, it is clearly showing impressive results already.
Shutting down hot spots is important policing, and risk terrain modeling technology allows analysts and law enforcement officers to be even more proactive in their prevention of crime.
The author, Tyler Wood, is head of operations at Austin, TX based Crime Tech Solutions – an innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

Crime Tech Solutions Acquires Case Closed Software

June 1, 2016 (Austin, TX)   Crime Tech Solutions, LLC, a leading provider of analytics and investigation software for law enforcement and commercial markets, today announced that it has acquired Cleveland, TN based Case Closed Software in a cash transaction. The terms of the deal were not released, but according to Crime Tech Solutions’ founder and president Douglas Wood, the acquisition brings together two dynamic and fast-growing software companies with an unparalleled complement of technologies.
For Crime Tech Solutions, the opportunity to add Case Closed Software into the fold was too good to pass up” said Mr. Wood. “We think that the technology offered by Case Closed helps to further differentiate us in the market as the price performance leader for this type of investigative solution.PNG
Crime Tech Solutions, based in the city of Leander, TX, delivers advanced analytics and investigation software to commercial investigators and law enforcement agencies across the globe. Their solution suite includes criminal intelligence software, sophisticated crime analytics with geospatial mapping, and powerful link analysis and visualization software. The company says that the addition of Case Closed Software expands those offerings even further.
Case Closed Software develops and markets investigative case management software specifically designed for law enforcement agencies. The suite is built around four primary software products including best-in-class investigative case management software, property and evidence tracking, a gang database tool, and an integrated link analysis and data visualization tool. The company also plans to release the solution as Case Closed Cloud for cloud-based access.
Case Closed couldn’t be happier than to be joining Crime Tech Solutions,” said Keith Weigand, the company’s founder. “The blending of our technologies creates a suite that will add tremendous value to our mutual customers, and will be hard for others to duplicate.
According to both Mr. Weigand and Mr. Wood, the name Case Closed will continue on as the product brand, given its widespread popularity and loyal customer base. Crime Tech Solutions is expected to retain all Case Closed employees, with Mr. Weigand joining as the company’s chief technical officer.
Crime Tech Solutions says it expects continued growth via ongoing software sales and strategic acquisitions.
About Crime Tech Solutions
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence management, mobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.)

April 29/16 Five Craziest Crimes of the Week

Enjoy! Here are the five craziest crimes of the week,blog-headlines courtesy of Newser and Crime Tech Solutions!
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)
 

Why is Oregon conducting Intelligence work?

The headline on OPB.org is rather silly, actually….

Why Is The State Of Oregon Conducting Intelligence Work?

Well, you know, because Intelligence work is kind of important. The question isn’t ‘why’… the question is ‘how’. Read on…
criminalThe article is an excellent read, and outlines precisely why compliance with Federal regulation 28 CFR Part 23 is important. The regulation outlines standards for operating federally grant-funded multijurisdictional criminal intelligence systems. It specifically provides guidance in five primary areas: submission and entry of criminal intelligence information, security, inquiry, dissemination, and review-and-purge process.
See a robust 28 CFR Part 23 compliant criminal intelligence system from Crime Tech Solutions HERE.
What follows is a cut-and-paste of the article as it appears originally.
“The Oregon Department of Justice recently commissioned a review into why state investigators were scrutinizing Oregonians who used the hashtag #BlackLivesMatter on social media, including tweets by the head of the agency’s own Civil Rights Division. The resulting report suggests that two employees potentially broke state laws with their searches, but ultimately acted on their own volition.The state investigators who conducted the searches are part of an intelligence unit at the DOJ’s Terrorism Information Threat Assessment Network Fusion Center, part of a criminal intelligence unit at the DOJ. The Fusion Center is designed to prevent criminal activity and monitor public safety and specifically, terrorism threats in Oregon. The center collects data and shares information up and down the chain between federal, state and local law enforcement agencies.The Black Lives Matter investigation has raised questions about the role of the Oregon Fusion Center and the cultural competency of its employees. OPB decided to take a closer look at this criminal intelligence unit:Who Works At The Fusion Center, And What Exactly Do They Do?The state-run center has been part of the DOJ’s Criminal Justice Division since 2007 and consists of eight employees, mostly research analysts. Some of those employees also work on other criminal cases. But Fusion Center work is often focused on producing terrorism threat assessments. Analysts research potential threats in advance of major events, such as the governor’s inauguration. Those assessments are used by law enforcement for event preparation and security. In an interview with OPB’s John Sepulvado, Oregon Attorney General Ellen Rosenblum said the center is essential to public safety.

“The Pendleton Round-Up, I know they’ve used the Fusion Center to do threat assessments to ensure safety of those who come to Pendleton for the event,” Rosenblum said. She also cited Oregon’s frequent hosting of international track meets: “I know we have participated there to ensure the safety of the participants and the community.”The Fusion Center also distributes safety and informational bulletins to other law enforcement agencies. Department of Justice spokeswoman Kristina Edmunson pointed to a 2014 example in which a center’s bulletin helped identify a rape suspect. The Port of Portland Police Department requested the Fusion Center distribute information about a rape at a hotel near Portland International Airport. The suspect’s description was distributed statewide and to the National Fusion Center Network, which DOJ officials said led to the identification and eventual arrest of the suspect.
Why Is The State Engaged In This Level Of Security And Intelligence Work?
Oregon’s Fusion Center is one of more than 70 such criminal intelligence centers across the country. President George W. Bush approved the establishment of fusion centers in 2006 with the goal of having local law enforcement and U.S. Department of Homeland Security authorities collaborate and share information. The Salem office is the only one of its kind in Oregon. The Department of Homeland Security describes fusion centers as “information sharing hubs that provide comprehensive and appropriate access, analysis, and dissemination that no other single partner can offer.” “The TITAN Fusion Center is highly regarded throughout Oregon, and highly relied upon by entities throughout the state that have events, for example, where they want to make ensure the safety of the participants,” Rosenblum said.  A core concept of these centers is that employees may have local knowledge or context that federal authorities lack. So, hypothetically, if the Department of Homeland Security learned of a terrorism threat in, say, Eugene, federal investigators could forward that threat to Oregon’s Fusion Center. Research analysts could investigate that threat in partnership with Eugene-area law enforcement officials, and provide local context. “The whole point of a fusion center is to fuse information,” said Portland attorney Sean Riddell, who was chief of the DOJ’s Criminal Justice Division from 2009-2011 and oversaw Oregon’s Fusion Center.

“Say for instance, a law enforcement agency in Medford calls, says ‘We’re looking at this house and this person for trafficking of narcotics, and we don’t want to trip over another agency,” Riddell said. “They’d ask, ‘Is somebody else looking at him?’” The Fusion Center could then examine the files of other law enforcement agencies, such as the U.S. Drug Enforcement Agency. If the DEA did in fact have an open file on that individual, the center could facilitate the sharing of information about the two investigations between agencies.

How Is The Fusion Center Funded?
Five Fusion Center positions are funded by the state legislature in the amount of $1.3 million for the 2015-2017 biennia. The other three staffers are paid via grants or federal money, according to the DOJ.
What Kinds Of Information Can Oregon’s Fusion Center Collect And Analyze?
The Fusion Center has access to an array of criminal and law enforcement records including criminal histories, suspicious activity reports and case records from federal, local and state agencies. They can research individuals, locations or organizations based on “reasonable suspicions.” The center may follow-up on tips and reports that come from individuals as well as other law enforcement agencies.  
Fusion Centers have been criticized by the American Civil Liberties Union and other organizations for excessive secrecy standards that may limit public oversight, data collection that could threaten individual privacy, and ambiguous lines of authority.
The Oregon center is not allowed to seek out information about an individual on the basis of religious, political, racial or social views, per state law. They’re also not supposed to investigate people based on their participation in a particular non-criminal organization or event.
So it’s possible that Fusion Center investigators violated state law by conducting social media searches for #BlackLivesMatter on Twitter.
Rosenblum wouldn’t speak to whether the DOJ investigators involved broke the law. She said the DOJ plans to require diversity and bias training among staff in the future.
Carolyn Walker, an employment attorney with Portland law firm Stoel Rives prepared the DOJ report looking into the incident. She determined that intelligence unit staff need cultural competency training to help separate potential threats from everyday social media traffic.
The report shows that a DOJ employee was concerned that Erious Johnson Jr., who heads the Oregon Department of Justice’s Civil Rights Division, “constituted a potential threat to police,” citing several of Johnson’s tweets. One tweet the employee referenced included the lyrics “Consider yourself warned,” and a logo from the 1980s rap group Public Enemy. The investigators apparently didn’t understand the cultural reference.
“The Intelligence Unit as a whole would benefit from clear and consistent leadership and direction,” Walker wrote in her report, “specifically with respect to electronic monitoring of social media.””
__
Crime Tech Solutions  is a low price / high performance innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include sophisticated Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful link analysis software, evidence managementmobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.

Predictive Policing: Two experts debate

JPGThis is a must-read for law enforcement analysts and investigators. Great article from the Wall Street Journal. Read it HERE.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)
 

NBC News gets rare look at NYPD CompStat meeting

Posted by Tyler Wood, Operations Manager at Crime Tech Solutions.
NYPD
NBC News was recently allowed a rare opportunity to sit in on a CompStat (computer statistics) meeting with the New York Police Department and they shared their experience with their viewers.
Watch the short video HERE.
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)

Best Practices in Facial Recognition

facialPosted by Tyler Wood, Operations Manager at Crime Tech Solutions.
As a crime analyst or investigator, you or someone you know are often asked to compare images (typically faces) to determine if they match. You may or may not have facial recognition software, but those programs tend to lead to more false positives than anything else.  What’s an analyst to do? Good question…
Crime Tech Solutions – Your Source for Investigation Software – recommends this Facial Identification Best Practices Guideline available from the Facial Identification Scientific Working Group (FISWG). It’s completely free and can be downloaded for printing or ongoing reference.
We hope you find this resource helpful!
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensivecrime analytics with mapping and predictive policing, and criminal intelligence database management systems.)

China building big data platform for pre-crime

Re-posted by Crime Tech Solutions – Your Source for Investigation Software
It’s “precrime” meets “thoughtcrime.” China is using its substantial surveillance apparatus as the basis for a “unified information environment” that will allow authorities to profile individual citizens based upon their online behaviors, financial transactions, where they go, and who they see. The authorities are watching for deviations from the norm that might indicate someone is involved in suspicious activity. And they’re doing it with a hand from technology pioneered in the US.
Tiananmen_Square_Beijing_China_1988_1-640x447As Defense One’s Patrick Tucker reports, the Chinese government is leveraging “predictive policing” capabilities that have been used by US law enforcement, and it has funded research into machine learning and other artificial intelligence technologies to identify human faces in surveillance video. The Chinese government has also used this technology to create a “Situation-Aware Public Security Evaluation (SAPE) platform” that predicts “security events” based on surveillance data, which includes anything from actual terrorist attacks to large gatherings of people.
The Chinese government has plenty of data to feed into such systems. China invested heavily in building its surveillance capabilities in major cities over the past five years, with spending on “domestic security and stability” surpassing China’s defense budget—and turning the country into the biggest market for security technology. And in December, China’s government gained a new tool in surveillance: anti-terrorism laws giving the government even more surveillance powers and requiring any technology companies doing business in China to provide assistance in that surveillance.
The law states that companies “shall provide technical interfaces, decryption and other technical support and assistance to public security and state security agencies when they are following the law to avert and investigate terrorist activities”—in other words, the sort of “golden key” that FBI Director James Comey has lobbied for in the US. For obvious reasons, the Chinese government is particularly interested in the outcome of the current legal confrontation between the FBI and Apple over the iPhone used by Syed Farook.
Bloomberg reports that China is harnessing all that data in an effort to perform behavioral prediction at an individual level—tasking the state-owned defense contractor China Electronics Technology Group to develop software that can sift through the online activities, financial transactions, work data, and other behavioral data of citizens to predict which will perform “terrorist” acts. The system could watch for unexpected transfers of money, calls overseas by individuals with no relatives outside the country, and other trigger events that might indicate they were plotting an illegal action. China’s definition of “terrorism” is more expansive than that of many countries.
At a news conference in December, China Electronics Technology Group Chief Engineer Wu Manqing told reporters, “We don’t call it a big data platform, but a united information environment… It’s very crucial to examine the cause after an act of terror, but what is more important is to predict the upcoming activities.”
__
(NOTE: Crime Tech Solutions is an Austin, TX based provider of crime and fraud analytics software for commercial and law enforcement groups. We proudly support the Association of Certified Fraud Examiners (ACFE), International Association of Chiefs of Police (IACP), Association of Law Enforcement Intelligence Units (LEIU) and International Association of Crime Analysts (IACA). Our offerings include sophisticated link analysis software, comprehensive crime analytics with mapping and predictive policing, and criminal intelligence database management systems.)