Crime Inteligence Station Capabilities Defensetechs

download Crime Inteligence Station Capabilities Defensetechs

of 14

Transcript of Crime Inteligence Station Capabilities Defensetechs

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    1/14www.defensetechs.com [email protected]

    THE CRIMEINTELLIGENCE STATION

    Access Management Analysis

    Of Firearms-Related Crime Information

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    2/14

    www.defensetechs.com [email protected]

    About our partnerWHAT OUR PARTNER DO:

    Since its inception in 1999, our partner provides police, prosecutors, policy

    makers and advocates the knowledge, tools and techniques necessary to

    successfully reduce violent crime. They work with city law departments,

    State Attorney General Offices, major police departments, and advocacy

    groups to assist them in acquiring, analyzing, and utilizing their

    communitys crime-gun information, which has been collected by the

    Federal government. Our partner has provided training on their unique

    tools and techniques of using gun information to reduce firearms-related

    violent crime in jurisdictions nationwide.

    WHAT WE OFFER:

    Decades of top-level law enforcement and firearm industry experiencedeveloping highly successful firearm-related violent crime reduction programs.

    Provides unique consulting services designed to assist law enforcement, policymakers and public safety advocates in developing tactics, techniques and publicpolicy proposals aimed at real solutions to our nations gun violence and guncrime epidemic.

    Our partners have a proven track record of developing programs that haveproduced important crime fighting techniques currently used by federal, stateand local authorities in the fight against of all types of gun crime.

    WHY WE ARE NEEDED:

    Often overlooked by policy makers and law enforcement is the dynamics ofthe legitimate firearms market and the influence it has on feeding violentcrime. By making use of our partner extensive knowledge of the firearmsindustry, the marketing and distribution of firearms and the diversion ofcrime-guns from the legitimate market to the illegal market, policy advocatescan develop intervention strategies that attack gun crime at its very source.Understanding the early warning signs that criminals leave when acquiringcrime-guns and using them in their deadly trade is invaluable informationnecessary in any gun violence reduction strategy. By utilizing proven

    techniques developed by them, public safety advocates can tailortheir programs to compliment and supplement current guncrime reduction initiatives and strategies.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    3/14

    www.defensetechs.com [email protected]

    CONCEPT

    The CRIME INTELLIGENCE STATION (CIS) is a

    methodology designed solution

    This unique collaboration provides:

    Access Management Analysis

    of different crime information to law enforcement

    investigators and enhances prosecutorial

    success.

    A CRIME INTELIGENCE STATION

    can be a one-stop platform for increasing investigating

    proficiency.It has solutions for:

    Intelligence, Combating Terrorism, Border

    Security, Criminal Investigations,

    Narcotics, Trafficking, Money Laundering,

    Telephone Toll Analysis

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    4/14

    www.defensetechs.com [email protected]

    CISs Crime Intelligence Station

    The following details the capabilities and benefits of the CRIMEINTELLIGENCE STATION as well as the need for such an analyticalinstrument by law enforcement.

    Capabilities:

    Recognizes and links many sources of crime-guns, ballistic, andintelligence information that is available in any jurisdiction andcan be employed to provide leads for any type criminal act.

    Is a local and centralized repository for integrating all firearms-related critical information that is readily accessible toinvestigators while in the field or office, efficiently integrating

    and analyzing available date that will generate criticalinvestigative leads. Includes link analysis with visualrepresentations and pre-models (queries) of CISs indicators aswell as allowing the investigator to model data in any fashiondetermined necessary.For example:

    link previously unknown individuals to criminal activity identify potential targets for investigation identify individuals that provide the source of firearms to

    violent areas of a community as well as their suppliers identify patterns and trends of criminal activity identify previously unknown associates and conspirators

    Provides an automated tool that assists throughout theinvestigation and prosecution of cases

    Allows for the control of all data with the station owner CRIME INTELLIGENCE STATION internal software allows for easy

    importing of data from various informational systems

    Benefits

    Increased Officer Safety Agencies can improve situationalencounters with armed violators through a closer examination of

    crime-gun information. Persons involved in gun trafficking as

    well as illegal possession and use, including associates, criminal

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    5/14

    www.defensetechs.com [email protected]

    group affiliations, and other criminal users can be identified

    when officers encounter suspects in the field.

    Crime Reduction Agencies can achieve earlier apprehensions ofrepeat offenders with use of crime-gun information. When

    investigating robbery, homicide, non-fatal shootings, and the

    like, early identification of purchasing patterns leads to early

    apprehensions and interruption of sources of guns to criminals.With a small number of sources of guns, patterns can be identified;

    many times intervention soon after the sale can prevent crimes

    from occurring.

    Increase in Available Intelligence Investigators can receiveleads from immediate crime -gun station analysis. By conductingthe standard queries found within the crime-gun station,

    investigators will have the capability to accurately identify viablesuspects for follow-up and include suspects last known and bestaddresses, vehicles owned or utilized, as well as criminal and other

    affiliations

    Enhanced Prosecution Rates Agencies will not only increasetheir solution rates, but importantly their conviction rates by

    including all pieces of evidence that link the suspect to the

    firearm and others involved in the criminal act. An additional by-

    product will be the enhancing the creditability of arresting officers

    testimony by adding supporting evidence outside of the arrest

    incident.

    Improvement of Intelligence-Led and Problem Orienting Policing State and local supervisors and managers will also possess the

    capability to institute prevention and intervention strategies by

    performing analysis of the data found within the Crime-Gun

    Station. The combining of visual analysis software to the CRIME

    INTELLIGENCE STATION provides an efficient method of

    determining patterns and trends for performing

    predictive analysis to determine optimum

    deployment of resources and identifying the most advantageous

    strategies.

    Improved Public Relations - Agency executives will now possessthe capability of providing the most current facts and statistics,

    at any given time, regarding firearms-related violent crime issues

    for public consumption.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    6/14

    www.defensetechs.com [email protected]

    Intelligence

    The Security / Intelligenceexamples discuss howCRIME INTELLIGENCESTATION providesinvaluable tools for assisting

    government agencies intheir mission to securehomeland, infrastructuresand national security.

    Developing effectiveintelligence solutions iscritical for governmentorganizations dealing withnational security issuesincluding military operationsand various proliferation

    concerns. It also effectscommercial organizationsfocused on theft, espionage, or competitive intelligence activities.

    Proactively exposing the underlying patterns and behaviors pertaining tosecurity-related areas helps ensure decisive and pre-emptive actions can takeplace. The intelligence community has long employed advanced technologies tosift through vast amounts of data looking for connections, relationships, andcritical links among their targets.

    Patterns are often derived from non-traditional data sources ranging from free-text documents and message intercepts to video clips and audio streams. Thesystems typically used by the intelligence community are comprehensive and

    extremely specialized. They are often built with external support and combineclassified information with open-source data to yield better patterns.

    The CRIME INTELLIGENCE STATION IntelligenceSolution

    The CRIME INTELLIGENCE STATION (CIS) is a must have tool for accessinglarge volumes of diversely formatted data for supporting advanced analyticsand information collaboration. The CIS solution provides more timely, accurate,and detailed information by which to initiate communication activities, monitorevents, and perform tasks in support of intelligence operations including:

    Exposing dominant, weak, or vulnerable entities within a network

    Examining the frequency of connections among target entities

    Discovering isolated entities within a network

    Detecting missing or inconsistent information

    Reviewing the commonalities among different entities;

    Exposing additional, unknown relationships from multiple sources

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    7/14

    www.defensetechs.com [email protected]

    Combating Terrorism

    Terrorism is a global threat influencing the attitude and behavior of a targetgroup by threatening - orcarrying out - devastatingactions. These actions, aswe have seen, can and doinclude the use of

    conventional weapons,biological, chemical, ornuclear agents.

    Today's terrorism alsothreatens our economicand informationresources. Ourvulnerability to terroristattacks expands with ourgrowing reliance oninformation technologies.

    Increased access toinformation and thecentralization of vital components of local, national, and global infrastructurethreaten both local and national security.

    Investigating today's terrorist groups requires inter-agency communicationand collaboration. It is essential that law enforcement agencies and task forcesbe able to collect and analyze data from multiple data sources in order tomonitor, penetrate, infiltrate, and prevent terrorist activity. Terrorism is apremeditated act that requires detectable preparations including moneytransfers, material purchases and personnel movement. Intelligence worksagainst terrorism.

    The CRIME INTELLIGENCE STATION CombatingTerrorism Solution

    The CRIME INTELLIGENCE STATION (CIS) is specifically designed toretrieve information from varied formats and sources to expose hiddenactivity and behavior patterns.

    Using the advanced information retrieval capabilities to extract informationfrom multiple data sources simultaneously and the powerful data mining,visualization and analysis capabilities of CIS allows you to:

    Identify Relationships - uncover interactions and relationships betweenterrorist groups and their members.

    Link Group Members - understand formal and informal organizationalstructures.

    Connect Networks - expose connections between group members, outsideindividuals, other organizations, locations, facilities and communicationnetworks.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    8/14

    www.defensetechs.com [email protected]

    Expose Group Operations - show shared assets, materials and supplies forcarrying out terrorist missions.

    Track Technologies - track different types of technologies used as componentsfor manufacturing terrorist weapons.

    Understand Behaviors - track and analyze group behaviors for early detection

    ofpotential threats.

    Assess Vulnerabilities - evaluate funding resources, recruiting methods,communication networks, storage facilities and other resources to uncoverpotential vulnerabilities.

    Border Security

    Protection of nationalborders is a critical task in

    the United States defenseplan.

    million of these people are non-citizens.

    The United States shares5,525 miles of border with

    Canada and 1,989 miles ofborder with Mexico. TheU.S. maritime borderincludes 95,000 miles ofshoreline, and a 3.4million square mileexclusive economic zone.

    Every year, more than 500million people cross ourborders to enter the

    United States. Some 330

    Securing the borders requires the cooperation of several federal agencies -including those responsible for transportation security, immigration control,border patrol, customs, and maritime security - in support of the overall goal ofproviding Homeland Security.

    The ability to research and share information among and between theseagencies is mission-critical.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    9/14

    www.defensetechs.com [email protected]

    The CRIME INTELLIGENCE STATION Border SecuritySolution

    The Crime Intelligence Station (CIS) is an ideal tool for searchingthrough a wide range of data sources to extract, analyze and visuallyexpose patterns of activity.

    Using the advanced information retrieval capabilities to extract informationfrom multiple data sources simultaneously and the powerful data mining,

    visualization and analysis capabilities of CIS allows you to:

    Share Information - give every agent the ability to retrieve information fromany and every data source available with a single search.

    Visualize Mass Data - expose patterns by reviewing and analyzing thousand ofrecords.

    Summarize - quickly produce frequency counts and statistical information.

    Track and Correlate - compare data values such as names, IDs and addressesto track and identify individuals.

    Identify Routes - use geographic data to pinpoint and plot entrance routes.

    Developing effective intelligence solutions is critical for governmentorganizations dealing with national security issues, including militaryoperations and various proliferation concerns. It also effects commercialorganizations focused on theft, espionage, or competitive intelligenceactivities.

    Proactively exposing the underlying patterns and behaviors pertaining tosecurity-related areas helps ensure decisive and pre-emptive actions can takeplace. The intelligence community has long employed advanced technologies to

    sift through vast amounts of data looking for connections, relationships, andcritical links among their targets.

    Patterns are often derived from non-traditional data sources ranging from free-text documents and message intercepts to video clips and audio streams. Thesystems typically used by the intelligence community are comprehensive andextremely specialized. They are often built with external support and combineclassified information with open-source data to yield better patterns.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    10/14

    www.defensetechs.com [email protected]

    Criminal Investigations

    Developing effectiveintelligence solutions iscritical for governmentorganizations dealing withnational security issuesincluding military operationsand various proliferation

    concerns. It also effectscommercial organizationsfocused on theft, espionage,or competitive intelligenceactivities.

    Proactively exposing theunderlying patterns andbehaviors pertaining tosecurity-related areas

    helps ensure decisive and pre-emptive actions can take place. The intelligence

    community has long employed advanced technologies to sift through vast amounts of

    data looking for connections, relationships, and critical links among their targets.

    Patterns are often derived from non-traditional data sources ranging from free- textdocuments and message intercepts to video clips and audio streams. The systemstypically used by the intelligence community are comprehensive and extremelyspecialized. They are often built with external support and combine classifiedinformation with open-source data to yield better patterns.

    The CRIME INTELLIGENCE STATION CriminalInvestigation Solution

    The CRIME INTELLIGENCE STATION (CIS) is an ideal tool for searching through

    vast amounts of data to extract, analyze and visually expose patterns of activity.

    Using the advanced information retrieval capabilities of CIS to extract informationfrom multiple data sources simultaneously and the powerful data mining, visualization

    and analysis capabilities of CIS allows you to:

    Access Data - search any and every data source available with a single

    search.

    Visualize Mass Data - work with thousands of data records with no sizelimitations.

    Identify Relationships - expose interactions and relationships between all types

    of data, including suspects, organizations, ID numbers, vehicles, etc.

    Find Networks - visually display and analyze clusters of related data.

    Summarize Data - produce statistical information on the fly.

    Track and Correlate - compare data values, such as names, using Soundex and

    other matching algorithms.

    Share Data - rapidly respond to inter-agency data requests.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    11/14

    www.defensetechs.com [email protected]

    Narcotics Trafficking

    Law enforcement initiatives attempt to attack drug trafficking organizations atevery level through a careful coordination of local, state and federal efforts.

    Law enforcement officials must constantly adapt to new situations, makegreater use of intelligence, stay current with technology, and expandcooperation between agencies to be effective in their drug control efforts.

    All levels of law enforcement must employ operational (reactive) and strategic(proactive) analysis methods that focus on both short-term and long-termgoals. In order to effectively perform both types of analysis, law enforcementagents must be able to access a wide range of information to uncover hiddenlinks between cases which would normally seem unrelated.

    The CRIME INTELLIGENCE STATION Narcotics Trafficking Solution

    The Crime Intelligence Station (CIS) is an ideal tool designed to retrieveinformation from varied formats and sources to expose hidden activity andbehavioral patterns.

    Using the advanced information retrieval capabilities of CIS to extractinformation from multiple data sources simultaneously and the powerful datamining, visualization and analysis capabilities of THE CIS solution allows youto:

    Share Information - give every agent the ability to retrieve information fromany and every data source available.

    Identify Relationships - uncover interactions and relationships betweenperpetrators and organizations.

    Visualize Mass Data - expose patterns reviewing and analyzing huge amounts

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    12/14

    www.defensetechs.com [email protected]

    of data, with no size limit.

    Discover Patterns - quickly plot and analyze geographic and chorological data.

    Summarize - quickly produce frequency counts and statistical information.

    Track and Correlate - compare data values such as names, IDs and addressesto track and identify individuals.

    Money Laundering

    Criminals launder moneyto hide criminal activity -everything from drugtrafficking to tax evasion -that generates the money.

    It is the means thatcriminals use to legitimizethe money.

    billion.

    Although the exact amountof money laundered yearlyis still not known, expertsestimate that moneylaundering schemes are inthe billions of dollars -possibly as high as $100

    Money launderers operate through layers of activities designed to hinder thedetection, investigation and prosecution of their activities. This is oftenaccomplished by structuring transactions, establishing businesses specificallyfor the purposes of manipulating accounts, or simply coercing individuals intoignoring reporting regulations.

    Additionally, launderers may physically smuggle money out of the country toevade tracking.

    The CRIME INTELLIGENCE STATION Money LaunderingSolution

    The CRIME INTELLIGENCE STATION (CIS) is an indispensable toolset forhighlighting and tracking suspicious transactions that can expose illegalfinancial activity.

    Using the advanced information retrieval capabilities of CIS to extractinformation from multiple data sources simultaneously and the powerful data

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    13/14

    www.defensetechs.com [email protected]

    mining, visualization and analysis capabilities of THE CIS solution allows youto:

    Access Data - search through and extract information from a wide variety ofdata sources at once.

    Visualize Mass Data - review thousands of financial transactions to identifyquestionable behaviors and unusual filing patterns.

    Expose Structures - identify and display relationships that exist betweenindividuals and organization involved in criminal activities.

    Examine Accounts - reveal associations between accounts and people, banks,organizations, or other accounts.

    Identify Duplicates - discover indirect relationships that show addresses,accounts or ID numbers with multiple users.

    Analyze Transactions - uncover different types of transactions used bycriminals.

    Pinpoint Exchanges - use chronological and geographic data to target asset

    seizures.

    Telephone Toll Analysis

    Telephone toll analysis isoften underutilized in criminalinvestigations due to the

    sheer volume of data to beprocessed.

    When properly conducted, theanalysis of telephone activitycan single-handedly expose avariety of deceitful behaviorsincluding long distance andcellular phone fraud and drugtrafficking patterns, as wellas validate associationsbetween people andorganizations.

    Data mining technologies

    allow investigators to uncover linkages between telephone numbers andpeople/organizations to expose complex communication networks, identifyinvestigative targets, and track chronological or sequential calling patterns.

  • 7/31/2019 Crime Inteligence Station Capabilities Defensetechs

    14/14

    www.defensetechs.com [email protected]

    The CRIME INTELLIGENCE STATION Telephone Toll AnalysisSolution

    The Crime Intelligence Station (CIS) ideally suited to identifying suspiciouspatterns of telephone activity.

    Using the powerful data mining, visualization and analysis capabilities of theGCS solution allows you to:

    Display Intense Activity- show any type of connection between telephonenumbers to expose the commonality, pathways and networks that formbetween large collections of numbers.

    Develop Frequency Counts - summarize the volume of calls from and betweentelephone numbers.

    Plot Telephone Activity- use proven placement techniques to visually revealmultiple patterns.

    Consolidate Registered Numbers - merge or "alias" telephone numbers to viewany organization, geographic area, or phone exchange as a single element.

    Analyze Relationships - discover existing and emerging networks and theirrelationships.

    Organize Calls - group telephone number by area codes, exchanges,subscribers, or any other characteristic to display patterns and trends.

    www.defensetechs.com

    [email protected]