Crime Inteligence Station Capabilities Defensetechs
-
Upload
defensetechs -
Category
Documents
-
view
219 -
download
0
Transcript of Crime Inteligence Station Capabilities Defensetechs
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
1/14www.defensetechs.com [email protected]
THE CRIMEINTELLIGENCE STATION
Access Management Analysis
Of Firearms-Related Crime Information
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
2/14
www.defensetechs.com [email protected]
About our partnerWHAT OUR PARTNER DO:
Since its inception in 1999, our partner provides police, prosecutors, policy
makers and advocates the knowledge, tools and techniques necessary to
successfully reduce violent crime. They work with city law departments,
State Attorney General Offices, major police departments, and advocacy
groups to assist them in acquiring, analyzing, and utilizing their
communitys crime-gun information, which has been collected by the
Federal government. Our partner has provided training on their unique
tools and techniques of using gun information to reduce firearms-related
violent crime in jurisdictions nationwide.
WHAT WE OFFER:
Decades of top-level law enforcement and firearm industry experiencedeveloping highly successful firearm-related violent crime reduction programs.
Provides unique consulting services designed to assist law enforcement, policymakers and public safety advocates in developing tactics, techniques and publicpolicy proposals aimed at real solutions to our nations gun violence and guncrime epidemic.
Our partners have a proven track record of developing programs that haveproduced important crime fighting techniques currently used by federal, stateand local authorities in the fight against of all types of gun crime.
WHY WE ARE NEEDED:
Often overlooked by policy makers and law enforcement is the dynamics ofthe legitimate firearms market and the influence it has on feeding violentcrime. By making use of our partner extensive knowledge of the firearmsindustry, the marketing and distribution of firearms and the diversion ofcrime-guns from the legitimate market to the illegal market, policy advocatescan develop intervention strategies that attack gun crime at its very source.Understanding the early warning signs that criminals leave when acquiringcrime-guns and using them in their deadly trade is invaluable informationnecessary in any gun violence reduction strategy. By utilizing proven
techniques developed by them, public safety advocates can tailortheir programs to compliment and supplement current guncrime reduction initiatives and strategies.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
3/14
www.defensetechs.com [email protected]
CONCEPT
The CRIME INTELLIGENCE STATION (CIS) is a
methodology designed solution
This unique collaboration provides:
Access Management Analysis
of different crime information to law enforcement
investigators and enhances prosecutorial
success.
A CRIME INTELIGENCE STATION
can be a one-stop platform for increasing investigating
proficiency.It has solutions for:
Intelligence, Combating Terrorism, Border
Security, Criminal Investigations,
Narcotics, Trafficking, Money Laundering,
Telephone Toll Analysis
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
4/14
www.defensetechs.com [email protected]
CISs Crime Intelligence Station
The following details the capabilities and benefits of the CRIMEINTELLIGENCE STATION as well as the need for such an analyticalinstrument by law enforcement.
Capabilities:
Recognizes and links many sources of crime-guns, ballistic, andintelligence information that is available in any jurisdiction andcan be employed to provide leads for any type criminal act.
Is a local and centralized repository for integrating all firearms-related critical information that is readily accessible toinvestigators while in the field or office, efficiently integrating
and analyzing available date that will generate criticalinvestigative leads. Includes link analysis with visualrepresentations and pre-models (queries) of CISs indicators aswell as allowing the investigator to model data in any fashiondetermined necessary.For example:
link previously unknown individuals to criminal activity identify potential targets for investigation identify individuals that provide the source of firearms to
violent areas of a community as well as their suppliers identify patterns and trends of criminal activity identify previously unknown associates and conspirators
Provides an automated tool that assists throughout theinvestigation and prosecution of cases
Allows for the control of all data with the station owner CRIME INTELLIGENCE STATION internal software allows for easy
importing of data from various informational systems
Benefits
Increased Officer Safety Agencies can improve situationalencounters with armed violators through a closer examination of
crime-gun information. Persons involved in gun trafficking as
well as illegal possession and use, including associates, criminal
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
5/14
www.defensetechs.com [email protected]
group affiliations, and other criminal users can be identified
when officers encounter suspects in the field.
Crime Reduction Agencies can achieve earlier apprehensions ofrepeat offenders with use of crime-gun information. When
investigating robbery, homicide, non-fatal shootings, and the
like, early identification of purchasing patterns leads to early
apprehensions and interruption of sources of guns to criminals.With a small number of sources of guns, patterns can be identified;
many times intervention soon after the sale can prevent crimes
from occurring.
Increase in Available Intelligence Investigators can receiveleads from immediate crime -gun station analysis. By conductingthe standard queries found within the crime-gun station,
investigators will have the capability to accurately identify viablesuspects for follow-up and include suspects last known and bestaddresses, vehicles owned or utilized, as well as criminal and other
affiliations
Enhanced Prosecution Rates Agencies will not only increasetheir solution rates, but importantly their conviction rates by
including all pieces of evidence that link the suspect to the
firearm and others involved in the criminal act. An additional by-
product will be the enhancing the creditability of arresting officers
testimony by adding supporting evidence outside of the arrest
incident.
Improvement of Intelligence-Led and Problem Orienting Policing State and local supervisors and managers will also possess the
capability to institute prevention and intervention strategies by
performing analysis of the data found within the Crime-Gun
Station. The combining of visual analysis software to the CRIME
INTELLIGENCE STATION provides an efficient method of
determining patterns and trends for performing
predictive analysis to determine optimum
deployment of resources and identifying the most advantageous
strategies.
Improved Public Relations - Agency executives will now possessthe capability of providing the most current facts and statistics,
at any given time, regarding firearms-related violent crime issues
for public consumption.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
6/14
www.defensetechs.com [email protected]
Intelligence
The Security / Intelligenceexamples discuss howCRIME INTELLIGENCESTATION providesinvaluable tools for assisting
government agencies intheir mission to securehomeland, infrastructuresand national security.
Developing effectiveintelligence solutions iscritical for governmentorganizations dealing withnational security issuesincluding military operationsand various proliferation
concerns. It also effectscommercial organizationsfocused on theft, espionage, or competitive intelligence activities.
Proactively exposing the underlying patterns and behaviors pertaining tosecurity-related areas helps ensure decisive and pre-emptive actions can takeplace. The intelligence community has long employed advanced technologies tosift through vast amounts of data looking for connections, relationships, andcritical links among their targets.
Patterns are often derived from non-traditional data sources ranging from free-text documents and message intercepts to video clips and audio streams. Thesystems typically used by the intelligence community are comprehensive and
extremely specialized. They are often built with external support and combineclassified information with open-source data to yield better patterns.
The CRIME INTELLIGENCE STATION IntelligenceSolution
The CRIME INTELLIGENCE STATION (CIS) is a must have tool for accessinglarge volumes of diversely formatted data for supporting advanced analyticsand information collaboration. The CIS solution provides more timely, accurate,and detailed information by which to initiate communication activities, monitorevents, and perform tasks in support of intelligence operations including:
Exposing dominant, weak, or vulnerable entities within a network
Examining the frequency of connections among target entities
Discovering isolated entities within a network
Detecting missing or inconsistent information
Reviewing the commonalities among different entities;
Exposing additional, unknown relationships from multiple sources
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
7/14
www.defensetechs.com [email protected]
Combating Terrorism
Terrorism is a global threat influencing the attitude and behavior of a targetgroup by threatening - orcarrying out - devastatingactions. These actions, aswe have seen, can and doinclude the use of
conventional weapons,biological, chemical, ornuclear agents.
Today's terrorism alsothreatens our economicand informationresources. Ourvulnerability to terroristattacks expands with ourgrowing reliance oninformation technologies.
Increased access toinformation and thecentralization of vital components of local, national, and global infrastructurethreaten both local and national security.
Investigating today's terrorist groups requires inter-agency communicationand collaboration. It is essential that law enforcement agencies and task forcesbe able to collect and analyze data from multiple data sources in order tomonitor, penetrate, infiltrate, and prevent terrorist activity. Terrorism is apremeditated act that requires detectable preparations including moneytransfers, material purchases and personnel movement. Intelligence worksagainst terrorism.
The CRIME INTELLIGENCE STATION CombatingTerrorism Solution
The CRIME INTELLIGENCE STATION (CIS) is specifically designed toretrieve information from varied formats and sources to expose hiddenactivity and behavior patterns.
Using the advanced information retrieval capabilities to extract informationfrom multiple data sources simultaneously and the powerful data mining,visualization and analysis capabilities of CIS allows you to:
Identify Relationships - uncover interactions and relationships betweenterrorist groups and their members.
Link Group Members - understand formal and informal organizationalstructures.
Connect Networks - expose connections between group members, outsideindividuals, other organizations, locations, facilities and communicationnetworks.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
8/14
www.defensetechs.com [email protected]
Expose Group Operations - show shared assets, materials and supplies forcarrying out terrorist missions.
Track Technologies - track different types of technologies used as componentsfor manufacturing terrorist weapons.
Understand Behaviors - track and analyze group behaviors for early detection
ofpotential threats.
Assess Vulnerabilities - evaluate funding resources, recruiting methods,communication networks, storage facilities and other resources to uncoverpotential vulnerabilities.
Border Security
Protection of nationalborders is a critical task in
the United States defenseplan.
million of these people are non-citizens.
The United States shares5,525 miles of border with
Canada and 1,989 miles ofborder with Mexico. TheU.S. maritime borderincludes 95,000 miles ofshoreline, and a 3.4million square mileexclusive economic zone.
Every year, more than 500million people cross ourborders to enter the
United States. Some 330
Securing the borders requires the cooperation of several federal agencies -including those responsible for transportation security, immigration control,border patrol, customs, and maritime security - in support of the overall goal ofproviding Homeland Security.
The ability to research and share information among and between theseagencies is mission-critical.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
9/14
www.defensetechs.com [email protected]
The CRIME INTELLIGENCE STATION Border SecuritySolution
The Crime Intelligence Station (CIS) is an ideal tool for searchingthrough a wide range of data sources to extract, analyze and visuallyexpose patterns of activity.
Using the advanced information retrieval capabilities to extract informationfrom multiple data sources simultaneously and the powerful data mining,
visualization and analysis capabilities of CIS allows you to:
Share Information - give every agent the ability to retrieve information fromany and every data source available with a single search.
Visualize Mass Data - expose patterns by reviewing and analyzing thousand ofrecords.
Summarize - quickly produce frequency counts and statistical information.
Track and Correlate - compare data values such as names, IDs and addressesto track and identify individuals.
Identify Routes - use geographic data to pinpoint and plot entrance routes.
Developing effective intelligence solutions is critical for governmentorganizations dealing with national security issues, including militaryoperations and various proliferation concerns. It also effects commercialorganizations focused on theft, espionage, or competitive intelligenceactivities.
Proactively exposing the underlying patterns and behaviors pertaining tosecurity-related areas helps ensure decisive and pre-emptive actions can takeplace. The intelligence community has long employed advanced technologies to
sift through vast amounts of data looking for connections, relationships, andcritical links among their targets.
Patterns are often derived from non-traditional data sources ranging from free-text documents and message intercepts to video clips and audio streams. Thesystems typically used by the intelligence community are comprehensive andextremely specialized. They are often built with external support and combineclassified information with open-source data to yield better patterns.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
10/14
www.defensetechs.com [email protected]
Criminal Investigations
Developing effectiveintelligence solutions iscritical for governmentorganizations dealing withnational security issuesincluding military operationsand various proliferation
concerns. It also effectscommercial organizationsfocused on theft, espionage,or competitive intelligenceactivities.
Proactively exposing theunderlying patterns andbehaviors pertaining tosecurity-related areas
helps ensure decisive and pre-emptive actions can take place. The intelligence
community has long employed advanced technologies to sift through vast amounts of
data looking for connections, relationships, and critical links among their targets.
Patterns are often derived from non-traditional data sources ranging from free- textdocuments and message intercepts to video clips and audio streams. The systemstypically used by the intelligence community are comprehensive and extremelyspecialized. They are often built with external support and combine classifiedinformation with open-source data to yield better patterns.
The CRIME INTELLIGENCE STATION CriminalInvestigation Solution
The CRIME INTELLIGENCE STATION (CIS) is an ideal tool for searching through
vast amounts of data to extract, analyze and visually expose patterns of activity.
Using the advanced information retrieval capabilities of CIS to extract informationfrom multiple data sources simultaneously and the powerful data mining, visualization
and analysis capabilities of CIS allows you to:
Access Data - search any and every data source available with a single
search.
Visualize Mass Data - work with thousands of data records with no sizelimitations.
Identify Relationships - expose interactions and relationships between all types
of data, including suspects, organizations, ID numbers, vehicles, etc.
Find Networks - visually display and analyze clusters of related data.
Summarize Data - produce statistical information on the fly.
Track and Correlate - compare data values, such as names, using Soundex and
other matching algorithms.
Share Data - rapidly respond to inter-agency data requests.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
11/14
www.defensetechs.com [email protected]
Narcotics Trafficking
Law enforcement initiatives attempt to attack drug trafficking organizations atevery level through a careful coordination of local, state and federal efforts.
Law enforcement officials must constantly adapt to new situations, makegreater use of intelligence, stay current with technology, and expandcooperation between agencies to be effective in their drug control efforts.
All levels of law enforcement must employ operational (reactive) and strategic(proactive) analysis methods that focus on both short-term and long-termgoals. In order to effectively perform both types of analysis, law enforcementagents must be able to access a wide range of information to uncover hiddenlinks between cases which would normally seem unrelated.
The CRIME INTELLIGENCE STATION Narcotics Trafficking Solution
The Crime Intelligence Station (CIS) is an ideal tool designed to retrieveinformation from varied formats and sources to expose hidden activity andbehavioral patterns.
Using the advanced information retrieval capabilities of CIS to extractinformation from multiple data sources simultaneously and the powerful datamining, visualization and analysis capabilities of THE CIS solution allows youto:
Share Information - give every agent the ability to retrieve information fromany and every data source available.
Identify Relationships - uncover interactions and relationships betweenperpetrators and organizations.
Visualize Mass Data - expose patterns reviewing and analyzing huge amounts
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
12/14
www.defensetechs.com [email protected]
of data, with no size limit.
Discover Patterns - quickly plot and analyze geographic and chorological data.
Summarize - quickly produce frequency counts and statistical information.
Track and Correlate - compare data values such as names, IDs and addressesto track and identify individuals.
Money Laundering
Criminals launder moneyto hide criminal activity -everything from drugtrafficking to tax evasion -that generates the money.
It is the means thatcriminals use to legitimizethe money.
billion.
Although the exact amountof money laundered yearlyis still not known, expertsestimate that moneylaundering schemes are inthe billions of dollars -possibly as high as $100
Money launderers operate through layers of activities designed to hinder thedetection, investigation and prosecution of their activities. This is oftenaccomplished by structuring transactions, establishing businesses specificallyfor the purposes of manipulating accounts, or simply coercing individuals intoignoring reporting regulations.
Additionally, launderers may physically smuggle money out of the country toevade tracking.
The CRIME INTELLIGENCE STATION Money LaunderingSolution
The CRIME INTELLIGENCE STATION (CIS) is an indispensable toolset forhighlighting and tracking suspicious transactions that can expose illegalfinancial activity.
Using the advanced information retrieval capabilities of CIS to extractinformation from multiple data sources simultaneously and the powerful data
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
13/14
www.defensetechs.com [email protected]
mining, visualization and analysis capabilities of THE CIS solution allows youto:
Access Data - search through and extract information from a wide variety ofdata sources at once.
Visualize Mass Data - review thousands of financial transactions to identifyquestionable behaviors and unusual filing patterns.
Expose Structures - identify and display relationships that exist betweenindividuals and organization involved in criminal activities.
Examine Accounts - reveal associations between accounts and people, banks,organizations, or other accounts.
Identify Duplicates - discover indirect relationships that show addresses,accounts or ID numbers with multiple users.
Analyze Transactions - uncover different types of transactions used bycriminals.
Pinpoint Exchanges - use chronological and geographic data to target asset
seizures.
Telephone Toll Analysis
Telephone toll analysis isoften underutilized in criminalinvestigations due to the
sheer volume of data to beprocessed.
When properly conducted, theanalysis of telephone activitycan single-handedly expose avariety of deceitful behaviorsincluding long distance andcellular phone fraud and drugtrafficking patterns, as wellas validate associationsbetween people andorganizations.
Data mining technologies
allow investigators to uncover linkages between telephone numbers andpeople/organizations to expose complex communication networks, identifyinvestigative targets, and track chronological or sequential calling patterns.
-
7/31/2019 Crime Inteligence Station Capabilities Defensetechs
14/14
www.defensetechs.com [email protected]
The CRIME INTELLIGENCE STATION Telephone Toll AnalysisSolution
The Crime Intelligence Station (CIS) ideally suited to identifying suspiciouspatterns of telephone activity.
Using the powerful data mining, visualization and analysis capabilities of theGCS solution allows you to:
Display Intense Activity- show any type of connection between telephonenumbers to expose the commonality, pathways and networks that formbetween large collections of numbers.
Develop Frequency Counts - summarize the volume of calls from and betweentelephone numbers.
Plot Telephone Activity- use proven placement techniques to visually revealmultiple patterns.
Consolidate Registered Numbers - merge or "alias" telephone numbers to viewany organization, geographic area, or phone exchange as a single element.
Analyze Relationships - discover existing and emerging networks and theirrelationships.
Organize Calls - group telephone number by area codes, exchanges,subscribers, or any other characteristic to display patterns and trends.
www.defensetechs.com