Tag Archives: police software

The benefits of investigation case management software

You needn’t be a criminal investigator for particularly long before beginning to feel overwhelmed. Even the most seasoned detectives can be torn between competing priorities such as internal briefings, public scrutiny, phone calls, emails, and the general business that police officers experience every day.
Causing even more grief – and consuming additional time and resources – are the routine tasks of managing investigation case files, documents, interviews, supplemental reports, as well as preparing for DA meetings, court dates, and so on. The manual effort of attempting to locate specific pieces of evidence or paper documents, and then trying to determine how they fit together and disseminating the conclusions is massive.
Managing a criminal investigation becomes more and more difficult each day, given the sheer amount of information generated. Evidence and clues must be garnered from things such as call detail records, body cam video, crime scene photos, arrest records, calls for service data, search warrant results, physical evidence management, and so on… and they all combine to make management of individual cases nearly impossible without the appropriate resources
In an era where senior law enforcement officials are being asked to do ‘more’ with ‘less’, however, those resources can rarely come by way of additional staff. Instead, there are technology solutions, thankfully, that ease the pain that lies in the process of managing criminal investigations.
Investigation Case Management Software (ICMS) such as Case Closed Software provides investigation units with a solution that reduces the paper chase, keeps everything in order, and helps investigators close more cases, more quickly. Case Closed is also available via the cloud with Case Closed Cloud.
From a resource utilization perspective, effective ICMS automates the time-consuming tasks of:

  • Storing and retrieving documents such as witness statements, complaints, and supplemental reports
  • Locating and managing important audio and video files
  • Tracking physical evidence
  • Effectively communicating with counterparts
  • Keeping up with assigned tasks
  • Managing incoming tips and leads
  • Developing and understanding connections across incidents and cases
  • And much, much more.

From a productivity perspective, the benefits are also wide and varied:

  • ICMS saves everything in real time. Detectives never have to worry about losing important documents.
  • Allows case data to be entered anywhere – in the office, in the field, or at home.
  • Makes everything searchable. People. Places. Things… everything is cross-indexed and easily ‘findable’.
  • Provides real-time alerts to notify agents when and if information matches something already in the system.
  • Generates standard reports with a few keystrokes based on information in the system.
  • Easy preparation for internal status update meetings.
  • Allows investigators to share case files internally – or externally to the DA.
  • Etcetera, etcetera, etcetera!

Many agencies are still operating investigations on paper files or antiquated, unfriendly systems because they believe the cost of implementing ICMS is prohibitive. Nothing could be further from the truth. The cost of effective software is now well within reach of the vast majority of law enforcement agencies. More importantly, the benefits far outweigh these costs.
Spend less. Solve more cases. Case Closed Software. Download a free brochure.

Save a tree… Go digital for investigation case management!

 

save-paper-save-tree-be-digital
Time to move past paper files for case management. Case Closed Software: A tree’s best friend

 
paper filesPosted by Tyler Wood, Director of Operations at Case Closed Software.
Investigation Case Management (ICM) and Major Case Management (MCM) for law enforcement have always required a great deal of effort. Keeping track of every lead, every record, every relevant piece of information always takes time and manpower. Especially if the agency is stuck using paper-based files, cluttered file cabinets, and disorganized evidence rooms.
Modern case management technology allows the complex task of filing and organizing to be done in a simple piece of software, allowing the job to be done more quickly and with less risk of error. Unfortunately, many law enforcement agencies today are still using the traditional method of case management, even though a software approach has several distinct advantages:
Simplicity. Managing all the relevant paperwork and information for criminal investigations is labor intensive and susceptible to human error. A person must file all documentation such as witness reports, suspect information, crime scene reports, etc… into a file cabinet to be retrieved manually when needed. This creates a likelihood that something will eventually be placed in the wrong folder and an investigation could be weakened or compromised. A powerful case management software, however, will store all this data electronically on a central database. Data is able to be searched for and retrieved instantaneously by any authorized investigator. This streamlines the investigation process and makes document filing safer and less prone to error.
Cross-referencing. Paper copies of data, obviously, cannot be automatically searched through. If evidence from Investigation A happens to also be relevant to Investigation B, then with a traditional filing system and investigator would have to recall that information from memory then physically search through the files in order to find the relevant data. An electronic system will come with a powerful search function and the ability to cross reference against other investigation files with the click of a button. This allows law enforcement to more quickly gather relevant data.
In addition, law enforcement can also instantly share data between agencies. The sharing of data across agencies makes law enforcement across the nation more effective. Cross-referencing is a very important feature to have, especially when dealing with gangs and other organized crime in which evidence may be spread out among several related suspects.
28-cfr-cop
Control. Using a secure electronic case management system, a supervisor can know exactly who accessed which data at what time. They can limit access to certain investigators in order to keep prying eyes out of the files. These features let supervisors rest easy knowing that their case files are kept digitally under their control.
Law enforcement agencies in the 21st century cannot afford to live in the past as far as case management goes. The convenience, simplicity, powerful features, and security of an electronic case management system is invaluable to investigators across the globe. In a world where criminals are becoming increasingly reliant on cutting edge technology, law enforcement must also make use of technology to make sure they are combating crime as effectively as possible. The case is closed on that discussion.
For information on our feature-rich and affordable ICM and MCM technologies, please visit Case Closed Software.

SoCal City Selects Crime Tech Solutions for Link Analysis.

SoCalCrime Tech Solutions, LLC – a fast growing, vibrant software company based in Leander, TX today announced that a large, coastal city in California has selected them to provide sophisticated link and social network analysis software.
Crime Tech Solutions was awarded the contract based upon its price/performance leadership in the world of big data analytics for law enforcement and other investigative agencies.
Link analysis software is used by investigators to visualize hidden connections between people, places, and things within large and disparate data sets.
20150817-daryn-visual-analysis-1
“Our link analysis software gives investigators an edge in the way they analyze data”, said Crime Tech Solutions’ CEO, Doug Wood. “By finding and displaying those hard to find connections and anomalies that reside in different data stores, our software helps investigative agencies more clearly see how networks of entities exist.”
Crime Tech Solutions said that the software implementation is already underway, and that the software will make life a little more miserable for criminals in the Southern California city.
The company also develops investigative case management and criminal intelligence software for law enforcement agencies of all sizes.
 

Compliance with CFR 28 Part 23 Criminal Intelligence Systems Operating Policies

28-cfr-part-23
As a guide for those interested in criminal intelligence systems such as IntelNexus™, Crime Tech Weekly is publishing the following overview of Title 28, Part 23 of the Code of Federal Regulations (CFR 28 Part 23). The policy reads as follows:

CFR 28 PART 23–CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES
1. Purpose.
2. Background.
3. Applicability.
4. Operating principles.
5. Funding guidelines.
6. Monitoring and auditing of grants for the funding of intelligence systems.

1 Purpose.
The purpose of this regulation is to assure that all criminal intelligence systems operating through support under the Omnibus Crime Control and Safe Streets Act of 1968 are utilized in conformance with the privacy and constitutional rights of individuals.
2 Background.
It is recognized that certain criminal activities including but not limited to loan sharking, drug trafficking, trafficking in stolen property, gambling, extortion, smuggling, bribery, and corruption of public officials often involve some degree of regular coordination and permanent organization involving a large number of participants over a broad geographical area. The exposure of such ongoing networks of criminal activity can be aided by the pooling of information about such activities. However, because the collection and exchange of intelligence data necessary to support control of serious criminal activity may represent potential threats to the privacy of individuals to whom such data relates, policy guidelines for Federally funded projects are required.
3 Applicability.
(a) These policy standards are applicable to all criminal intelligence systems operating through support under the Omnibus Crime Control and Safe Streets Act of 1968.
(b) As used in these policies: Criminal Intelligence System or Intelligence System means the arrangements, equipment, facilities, and procedures used for the receipt, storage, interagency exchange or dissemination, and analysis of criminal intelligence information; Inter-jurisdictional Intelligence System means an intelligence system which involves two or more participating agencies representing different governmental units or jurisdictions; Criminal Intelligence Information means data which has been evaluated to determine that it: (i) is relevant to the identification of and the criminal activity engaged in by an individual who or organization which is reasonably suspected of involvement in criminal activity, and (ii) meets criminal intelligence system submission criteria; Participating Agency means an agency of local, county, State, Federal, or other governmental unit which exercises law enforcement or criminal investigation authority and which is authorized to submit and receive criminal intelligence information through an inter-jurisdictional intelligence system. A participating agency may be a member or a nonmember of an inter-jurisdictional intelligence system; Intelligence Project means the organizational unit which operates an intelligence system on behalf of and for the benefit of a single agency or the organization which operates an inter-jurisdictional intelligence system on behalf of a group of participating agencies; and Validation of Information means the procedures governing the periodic review of criminal intelligence information to assure its continuing compliance with system submission criteria established by regulation or program policy.
us-constitution4 Operating principles.
(a) A project shall collect and maintain criminal intelligence information concerning an
individual only if there is reasonable suspicion that the individual is involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.
(b) A project shall not collect or maintain criminal intelligence information about the political, religious or social views, associations, or activities of any individual or any group, association, corporation, business, partnership, or other organization unless such information directly relates to criminal conduct or activity and there is reasonable suspicion that the subject of the information is or may be involved in criminal conduct or activity.
(c) Reasonable Suspicion or Criminal Predicate is established when information exists which establishes sufficient facts to give a trained law enforcement or criminal investigative agency officer, investigator, or employee a basis to believe that there is a reasonable possibility that an individual or organization is involved in a definable criminal activity or enterprise. In an inter-jurisdictional intelligence system, the project is responsible for establishing the existence of reasonable suspicion of criminal activity either through examination of supporting information submitted by a participating agency or by delegation of this responsibility to a properly trained participating agency which is subject to routine inspection and audit procedures established by the project.
(d) A project shall not include in any criminal intelligence system information which has been obtained in violation of any applicable Federal, State, or local law or ordinance. In an inter-jurisdictional intelligence system, the project is responsible for establishing that no information is entered in violation of Federal, State, or local laws, either through examination of supporting information submitted by a participating agency or by delegation of this responsibility to a properly trained participating agency which is subject to routine inspection and audit procedures established by the project.
(e) A project or authorized recipient shall disseminate criminal intelligence information only where there is a need to know and a right to know the information in the performance of a law enforcement activity.
(f) (1) Except as noted in paragraph (f) (2) of this section, a project shall disseminate criminal intelligence information only to law enforcement authorities who shall agree to follow procedures regarding information receipt, maintenance, security, and dissemination which are consistent with these principles. (2) Paragraph (f) (1) of this section shall not limit the dissemination of an assessment of criminal intelligence information to a government official or to any other individual, when necessary, to avoid imminent danger to life or property.
28-cfr-cop
(g) A project maintaining criminal intelligence information shall ensure that administrative, technical, and physical safeguards (including audit trails) are adopted to insure against unauthorized access and against intentional or unintentional damage. A record indicating who has been given information, the reason for release of the information, and the date of each dissemination outside the project shall be kept. Information shall be labeled to indicate levels of sensitivity, levels of confidence, and the identity of submitting agencies and control officials. Each project must establish written definitions for the need to know and right to know standards for dissemination to other agencies as provided in paragraph (e) of this section. The project is responsible for establishing the existence of an inquirer’s need to know and right to know the information being requested either through inquiry or by delegation of this responsibility to a properly trained participating agency which is subject to routine inspection and audit procedures established by the project. Each intelligence project shall assure that the following security requirements are implemented: (1) Where appropriate, projects must adopt effective and technologically advanced computer software and hardware designs to prevent unauthorized access to the information contained in the system; (2) The project must restrict access to its facilities, operating environment and documentation to organizations and personnel authorized by the project; (3) The project must store information in the system in a manner such that it cannot be modified, destroyed, accessed, or purged without authorization; (4) The project must institute procedures to protect criminal intelligence information from unauthorized access, theft, sabotage, fire, flood, or other natural or manmade disaster; (5) The project must promulgate rules and regulations based on good cause for implementing its authority to screen, reject for employment, transfer, or remove personnel authorized to have direct access to the system; and (6) A project may authorize and utilize remote (off-premises) system data bases to the extent that they comply with these security requirements.
(h) All projects shall adopt procedures to assure that all information which is retained by a project has relevancy and importance. Such procedures shall provide for the periodic review of information and the destruction of any information which is misleading, obsolete or otherwise unreliable and shall require that any recipient agencies be advised of such changes which involve errors or corrections. All information retained as a result of this review must reflect the name of the reviewer, date of review and explanation of decision to retain. Information retained in the system must be reviewed and validated for continuing compliance with system submission criteria before the expiration of its retention period, which in no event shall be longer than five (5) years.
(i) If funds awarded under the Act are used to support the operation of an intelligence system, then: (1) No project shall make direct remote terminal access to intelligence information available to system participants, except as specifically approved by the Office of Justice Programs (OJP) based on a determination that the system has adequate policies and procedures in place to insure that it is accessible only to authorized systems users; and (2) A project shall undertake no major modifications to system design without prior grantor agency approval.
audit-400x400(j) A project shall notify the grantor agency prior to initiation of formal information exchange procedures with any Federal, State, regional, or other information systems not indicated in the grant documents as initially approved at time of award.
(k) A project shall make assurances that there will be no purchase or use in the course of the project of any electronic, mechanical, or other device for surveillance purposes that is in violation of the provisions of the Electronic Communications Privacy Act of 1986, Public Law 99-508, 18 U.S.C. 2510-2520, 2701-2709 and 3121-3125, or any applicable State statute related to wiretapping and surveillance.
(l) A project shall make assurances that there will be no harassment or interference with any lawful political activities as part of the intelligence operation.
(m) A project shall adopt sanctions for unauthorized access, utilization, or disclosure of
information contained in the system.
(n) A participating agency of an inter-jurisdictional intelligence system must maintain in its agency files information which documents each submission to the system and supports compliance with project entry criteria. Participating agency files supporting system submissions must be made available for reasonable audit and inspection by project representatives. Project representatives will conduct participating agency inspection and audit in such a manner so as to protect the confidentiality and sensitivity of participating agency intelligence records.
(o) The Attorney General or designee may waive, in whole or in part, the applicability of a particular requirement or requirements contained in this part with respect to a criminal intelligence system, or for a class of submitters or users of such system, upon a clear and convincing showing that such waiver would enhance the collection, maintenance or dissemination of information in the criminal intelligence system, while ensuring that such system would not be utilized in violation of the privacy and constitutional rights of individuals or any applicable state or federal law.
federal-funds5 Funding guidelines.
The following funding guidelines shall apply to all Crime Control Act funded discretionary assistance awards and Bureau of Justice Assistance (BJA) formula grant program subgrants, a purpose of which is to support the operation of an intelligence system. Intelligence systems shall only be funded where a grantee/subgrantee agrees to adhere to the principles set forth above and the project meets the following criteria:
(a) The proposed collection and exchange of criminal intelligence information has been
coordinated with and will support ongoing or proposed investigatory or prosecutorial activities relating to specific areas of criminal activity.
(b) The areas of criminal activity for which intelligence information is to be utilized represent a significant and recognized threat to the population and: (1) Are either undertaken for the purpose of seeking illegal power or profits or pose a threat to the life and property of citizens; and (2) Involve a significant degree of permanent criminal organization; or (3) Are not limited to one jurisdiction.
(c) The head of a government agency or an individual with general policy making authority who has been expressly delegated such control and supervision by the head of the agency will retain control and supervision of information collection and dissemination for the criminal intelligence system. This official shall certify in writing that he or she takes full responsibility and will be accountable for the information maintained by and disseminated from the system and that the operation of the system will be in compliance with the principles set forth in 23.20.
(d) Where the system is an inter-jurisdictional criminal intelligence system, the governmental agency which exercises control and supervision over the operation of the system shall require that the head of that agency or an individual with general policymaking authority who has been expressly delegated such control and supervision by the head of the agency: (1) assume official responsibility and accountability for actions taken in the name of the joint entity, and (2) certify in writing that the official takes full responsibility and will be accountable for insuring that the information transmitted to the inter-jurisdictional system or to participating agencies will be in compliance with the principles set forth in 23.20. The principles set forth in 0 23.20 shall be made part of the by-laws or operating procedures for that system. Each participating agency, as a condition of participation, must accept in writing those principles which govern the submission, maintenance and dissemination of information included as part of the inter-jurisdictional system.
(e) Intelligence information will be collected, maintained and disseminated primarily for State and local law enforcement efforts, including efforts involving Federal participation.
6 Monitoring and auditing of grants for the funding of intelligence systems.
(a) Awards for the funding of intelligence systems will receive specialized monitoring and audit in accordance with a plan designed to insure compliance with operating principles as set forth in 23.20. The plan shall be approved prior to award of funds.
(b) All such awards shall be subject to a special condition requiring compliance with the
principles set forth in 23.20.
(c) An annual notice will be published by OJP which will indicate the existence and the objective of all systems for the continuing inter-jurisdictional exchange of criminal intelligence information which are subject to the 28 CFR Part 23 Criminal Intelligence Systems Policies.
___________
black versionCrime Tech Solutions is a leading provider of criminal intelligence database management software for 28 CFR Part 23 compliance. The company also develops Case Closed™ investigation case management software, sophisticated link analysis software, and advanced crime analytics.

Criminal Intelligence Databases: Violations of privacy rights are the exception, not the rule.

privacyThe notion that law enforcement fusion centers regularly violate individuals’ privacy rights as they capture intelligence on gangs, terrorist activities, organized crime, and other threats to public safety is simply not true. That, according to a study published in the Journal of Police and Criminal Psychology.
The paper, “Law Enforcement Fusion Centers: Cultivating an Information Sharing Environment while Safeguarding Privacy,” was authored by Jeremy Carter, an assistant professor of  Public and Environmental Affairs at Indiana University-Purdue University Indianapolis. His article carefully addresses the privacy-rights issue of criminal intelligence gathering, among others.
fusion_centers_mapThere are approximately 80 fusion centers in the United States. They were created in response to the 9/11 terrorist attacks. The attacks exposed the requirement for greater information sharing and improved intelligence capabilities at all law enforcement levels.  According to the article’s author, the idea was to have the key pieces of data funneled into fusion centers so that highly trained analysts could stay atop of threats and correspond with local law enforcement agencies on these potential threats.
Designed with a view to enhance information-sharing among agencies, fusion centers act as ‘hubs’ of data and intelligence on gang activities, terrorist cells, organized crime, and other public safety threats. Vast amounts have data has been collected, and concerns about individual privacy and civil rights have ensued. The very legitimacy of these fusion centers has been called into question.
bigbrotherThe notion that law enforcement fusion centers represent ‘Big Brother’, and that data is being stored and disseminated about people irrespective of whether they are suspected of criminal activity is simply wrong, according to Professor Carter.
Still, concerns remain about who can access the data, and for what purpose. However, a survey of fusion centers across the country suggests that they take appropriate steps to safeguard individual privacy via something called Federal Regulatory Code CFR 28 Part 23.
28-cfr-part-23“Fusion centers are following the federal regulatory code, 28 CFR Part 23, that is the legal standard for collecting information,” Carter said. “That code says you have to establish a criminal predicate, basically probable cause, to keep information on identifiable individuals.”
Additionally, the majority of the fusion centers have implemented strong controls that provide built-in safeguards that protect the privacy of individuals. The fusion centers are also regularly audited to ensure that only the correct type of data is gathered, and that is stored and disseminated in a need-to-know basis.
black versionCrime Tech Solutions develops and markets a suite of crime fighting software including IntelNexus™, a criminal intelligence database system that complies with the above mentioned code 28 CFR Part 23. The company also provides software for investigation case management, advanced crime analytics, and link/social network analysis.

The Case for Software as a Service in Law Enforcement

 

Police officers protesting against budget cuts join public sector workers striking over pensionsState and local law enforcement agencies face a growing number of challenges due to lack of resources and the ever-dwindling public coffers. As a result of  legacy technologies that compound costs – through maintenance fees, implementation expenses, hardware purchases, and software upgrades – agencies are constantly challenged to do more with less.

 

To reduce cost and increase flexibility, more and more law enforcement departments are motivated to try cloud computing- Software as a service (SaaS). The benefits of SaaS to law enforcement agencies are many and varied.

 

Reduced Investment in Software Setup

 

shutterstock-cloud-computingThe majority of the law enforcement organizations already have the needed IT infrastructure to access SaaS applications. The essential requirement is a secure and stable Internet connection with devices that can access the web.

 

Cloud Computing Lessens Technical Effort

 

With SaaS solutions, agencies can easily store data or run applications which are accessible from any web-connected device at anywhere and anytime. Instead of investing in capital expenses such as software and computer servers, departments can effectively rent these on a variable payment plan.

 

Rapid Deployment

 

SaaS is typically ready-baked for its adopters. Through SaaS, agencies eliminate much of the delays of a traditional software deployment. Once subscribed, users can literally begin enjoying the benefit of the platform immediately. Contrast that to standard software deployments which can take weeks or months to spin up.

 

cloud-computing-benefit

System Maintenance is Automatic

 

Maintenance costs for SaaS subscribers are almost free. As part of their subscription fee, the SaaS provider manages upgrades, bandwidth adjustment, and bug fixes. It removes many of the headaches that an agency’s IT group experiences with new software versions and updates.

 

Traditional Policies Can Confound Adoption

 

Even though many US agencies are already using – or considering – cloud computing, adoption of SaaS is still a tricky decision for law enforcement. Because of the need to safeguard sensitive and confidential information that is saved offsite, the pace is slower than other market segments. That tide, however, is turning.

Case Closed Software is a leading provider of investigative case management software for law enforcement agencies across the country.

 

Tennessee county turns to Case Closed for investigation management

(March 27, 2017) Case Closed™ Software, a division of crime fighting software leader Crime Tech Solutions, LLC, announced today that they have signed contract with a large well-known and historic county in Tennessee.
tennesseeThe mid-sized Sheriff’s Department in the Volunteer State chose Case Closed Software after a long, thorough search for a solution provider capable of delivering “a feature-rich, affordable solution for managing investigations and the investigative unit”. The core modules of the software include Investigative Case Management, Link Analysis, Confidential Informants Management, Property & Evidence, Gang Tracking, and Departmental Reporting. According to a company spokesperson, the software also includes a mobile application for investigators in the field, and real-time alerting designed to help agencies solve crimes faster.
Case Closed Software said that the solution is being installed immediately, and that the agency will be fully implemented by April 30, 2017.
For more information on Case Closed, visit www.caseclosedsoftware.com
newcclogocropped

The Case for Investigative Case Management

Lost in the news of the recent demise of New Zealand based crime-fighting software developer Wynyard Group, is an interesting report published just weeks before the company ceased operations.

55According to the study, just 55% of U.S. law enforcement agencies currently utilize investigative case management software (CMS), and the majority of users are unhappy with their current systems.

Thirty-seven percent of the study respondents are not currently using any type of automated system, and rely mainly on paper files and spreadsheets to manage their investigations.

Investigative case management software has long been the domain of larger agencies and departments, and is only now truly affordable for smaller departments. The software allows investigators to manage the investigation process from start to finish. The more robust software allows agencies to assign cases and tasks, manage deadlines, store and maintain physical and multimedia evidence, and to search for relevant information across disparate databases.

According to a press release issued at the time, the survey queried users on how likely they would be to recommend their current system to another agency. While most users were unhappy with their current investigative case management system, there was a clear difference between agencies using commercial-off-the-shelf (COTS) software and those using home grown, legacy systems. The latter fared very poorly in the survey results.

The survey also measured the use of smart devices by front-line officers. Forty three percent indicated that they currently utilize smart phones and tablet computers, and 23% indicated they had neither device.

The most-desired features in investigative management software include:

  • Management Dashboards
  • Reports – Standard and ad hoc
  • Case Assignment and Reminders
  • Actions and Incident Management
  • Mobile and Front-Line Case Access
  • Evidence Management and Chain-of-Custody
  • Multimedia Handling
  • Audit Logs
  • Collaboration
  • Gangs and Organized Crime Management
  • Data Visualization and Link Analysis
  • Case Closure / Evidence Brief

An investigative case management system for law enforcement and commercial investigation agencies is rapidly becoming a ‘must-have’. In an era of shrinking budgets and competing resources, a high value is placed on getting the biggest ‘bang for the buck’. The study indicates that agencies are looking to maximize the value of their investigative case management software by incorporating a robust feature set with an affordable price.

Case Closed Software, a division of Crime Tech Solutions, is a powerful and affordable investigative case management solution for law enforcement agencies. Case Closed is also available via the cloud with the innovative Case Closed Cloud. Created by former law enforcement investigators, the COTS software is designed with ease-of-use in mind. The software is deployed in agencies – large and small – across the country.

Hunting for D.B. Cooper – A study in analytics.

The following article originally appeared at In Public Safety, and is a highly recommended read. It was written by Erik Kleinsmith at American Military University.
Crime Tech Weekly is posting the article in its entirety for our readers’ convenience…
By Erik Kleinsmith
Staff, Intelligence Studies, American Military University
On November 24, 1971, a man using the name Dan Cooper purchased a $35 one-way airline ticket from Portland, Oregon, to Seattle, Washington. Not long after takeoff, he hijacked Northwest Orient Flight 305 and demanded $200,000 in cash along with two parachutes, which he received upon landing in Seattle. He then ordered the plane to take off and fly to Mexico City; during that flight, he jumped from the aircraft into the Oregon wilderness, securing his place as the only unsolved case in FAA history.
db-cooper
In early 2011, following a host of other investigations — both private and government-led — Tom Colbert picked up the trail of the man now known as D.B. Cooper. As an investigative reporter and producer living in Southern California, Colbert was tipped off by a source in the illicit drug trade who had credible — albeit circumstantial — evidence that D.B. Cooper was alive and living in California. Over the next few years, Colbert invested incredible amounts of time and personal resources toward tackling a 45-year-old mystery that so many other investigators before him had failed to solve.

A New Approach to Finding D.B. Cooper

Colbert assembled a large group of leading private investigators, detectives, attorneys, profilers and other subject matter experts into a group he called the “Cold Case Team.” He also knew he needed the expertise of intelligence professionals to help him organize and analyze all the evidence related to this case. While intelligence analysts almost always focus on using their skills for predictive analysis predictive analysis (i.e., what’s going to happen), Colbert knew having people proficient in intelligence collection and analysis would provide unique insight into a case that was decades old.
In December 2011, Colbert elicited my help while I was involved in an Army intelligence training contract. We had been associates and friends for a few years and he knew about my involvement in the Able Danger program. As a student, practitioner, developer and instructor of intelligence methodology, I was interested in his investigation because it was another chance for me to adapt intelligence analytical methods to a cold (very cold) case. I immediately agreed to support his efforts; he sent me a copy of a dossier on the man he suspected was D.B. Cooper.
It contained photos, maps, interview summaries and many other pieces of evidence connecting this man to the D.B. Cooper incident. Much of the initial information was secondhand and circumstantial, so Colbert was using it to provide further investigative leads for the Cold Case Team members.
Here is where I make my quick disclaimer: Collecting information on U.S. persons for intelligence purposes is prohibited by several federal regulations with very few specific exceptions. Even though I would be supporting a private investigation, I was working as a defense contractor at the time and therefore felt it was important to follow the spirit of these restrictions by creating products based only upon what the Cold Case Team provided. Neither myself nor my colleague independently searched for or collected any additional information for any part of this investigation.
That being said, it was an exceptional opportunity to use analytical intelligence techniques to assist in this investigation.

Using Link Analysis Techniques in the Investigation

In his meetings with various law enforcement officials, Colbert had grown frustrated that no one was taking the time to look through the dossier and consider the evidence. I gave it to one of my senior instructors, David D’Alessio, and asked him to make a link chart of associations using one of the best link analysis software programs available to us. A link chart is a graphic representation of the people, events, and significant items of interest (such as a bank account or address) associated with a particular subject.  The key to these charts are the associations or “links” between each of the people, events and items in it.
 

20150817-daryn-visual-analysis-1
Link Analysis software helps investigators and analysts visualize non-obvious relationships between entities

 
Creating this chart was a painstaking process because D’Alessio had to go through each paragraph line by line, identify the relative linkages between entities and enter them into the software program. The initial link chart started with the main suspect and then drew graphic linkages to all his known associates their connections to third parties, and a host of other associations to events, locations, aliases and specific pieces of physical evidence. Working with D’Alessio and Colbert over several iterations of this chart, we ended up with a 3×2 foot poster that, to the untrained eye, looked a lot like charts shown in court or on television shows like Law and Order. There were hundreds of links to the main suspect, the many aliases he used over the years to include military records and associations that placed him in the vicinity of the Portland, Oregon area during the time of the hijacking.
The benefit of link analysis charts is that they do more than just show connections between entities. A link chart tells a comprehensive visual story and conveys a dynamic and detailed summary of information from the document supporting it. This technique proved immensely successful, as the visual representation helped capture attention and interest from outside parties.

How Intelligence Analysis Aided in the Investigation

Besides taking text-based information and turning it into a graphic visualization for presentation purposes, a link chart also helped the investigation in other ways. First, Colbert and his team were able to see gaps in the information where investigators needed to dig deeper. He could also see which links were strong and which were weak or tenuous. The team could then plan their investigations more effectively by identifying which gaps needed to be filled and prioritize how to best use their limited resources.
This chart also had a psychological value to the Cold Case Team. In 2013, one of the team’s private investigators presented it directly to the suspect and asked him to come forward. The hope was that once the suspect knew there was a vast amount of information on the identity of D.B. Cooper (not to mention it featured his picture right at the center). Revealing this chart helped Colbert enter into negotiations with the suspect’s lawyer and he came very close to a deal that would potentially involve an admission. Unfortunately, Colbert and the Cold Case Team were turned down at the last minute due to what we believe was his fear of being connected to other illicit activities.

Why Law Enforcement Must Partner More Often with Intelligence Agencies

_KOK1002_RTCC+(3)Ultimately, this case demonstrates that intelligence analysis can play a crucial part in law enforcement investigations, both as a predictive asset as well as an investigative one. The D.B. Cooper investigation is decades old, but there are many other cases that are not. Other law enforcement agencies can use the techniques tested in this case to assist with other unsolved crimes, missing persons and patterns of criminal activity. It’s important for law enforcement authorities to remember that analysts in the intelligence field bring with them a toolkit that provides both unique and specialized analytical methods that can offer new perspectives. Bringing intelligence analysts into the fold of law enforcement can enhance a crime-solving team.
The federal government has awesome capabilities in intelligence collection and investigation but they are not alone. There is an equally awesome, yet untapped capability, in the commercial sector and among academia to support investigations like this and other more current cases. There are uncounted numbers of undergraduate and graduate students in criminal justice, data analysis and intelligence studies courses who would be eager to support a future case. In addition, there are also many retired law enforcement and intelligence professionals who would be eager to lend their experience and subject matter expertise to similar cases and problem sets, if only to satisfy the investigative bug still within them.
While the FBI officially closed its investigation in the D.B. Cooper case earlier this year, it has not been closed in the eyes of the Cold Case Team. This team continues to move forward with its own investigation, relying on intelligence analysis methods to support them and continue to evaluate every bit of evidence in new ways.
 

black version
Crime Tech Solutions provides affordable, high performance software for crime analysts and investigation units.

 
 

Wynyard Group's slow, painful death arrives. Now, what about the customers?

October 28, 2016 – Crime Tech Solutions, a fast-growing and vibrant investigation software company based in Austin, TX, today announced a migration path for software users affected by the recent failure of New Zealand based Wynyard Group. Wynyard had positioned itself as a ‘leader in crime fighting software’, but never did find traction in the markets they coveted.

wynyardfailPer Wynyard Group officials, the company has placed itself in voluntary administration as it battles crippling losses and missed revenue forecasts, leaving customers in the dark as to the future of their investment in the crime fighting technology.

For users of the Wynyard Group case management software, Crime Tech Solutions has introduced a comprehensive ‘path forward’ that includes, in some cases, a license-cost-free replacement of the Wynyard Group system with the popular and robust Case Closed™ investigative case management solution for law enforcement and commercial investigation agencies.

Case Closed Software was developed by investigation professionals and for investigation professionals, and is widely used by investigative agencies across North America.

ccscreenshot1

“The objective”, said Crime Tech Solutions’ CTO Keith Weigand, “is to provide Case Closed software licenses to interested customers in exchange for the monies they already pay in annual maintenance and support.”

Tyler Wood, Operations Manager at Crime Tech Solutions, added “In essence, it’s a way to put what we think is better case management software into customers’ hands without the need to pay for expensive new software licenses.” While Wood acknowledges that there are internal costs associated with converting to any new solution, he feels that the intuitive and flexible nature of Case Closed is designed to mitigate those costs as much as possible.

About Crime Tech Solutions

black version
Case Closed Software is developed and supported by fast-growing Crime Tech Solutions

 

Crime Tech Solutions  is a low price / high performance innovator in crime analytics and law enforcement crime-fighting software. The clear price/performance leader for crime fighting software, the company’s offerings include Case Closed™ investigative case management and major case management, GangBuster™ gang intelligence software, powerful Sentinel Visualizer link analysis software, evidence managementmobile applications for law enforcement, comprehensive crime analytics with mapping and predictive policing, and 28 CFR Part 23 compliant criminal intelligence database management systems.