You are on page 1of 14

THE CRIME INTELLIGENCE STATION Access Management Analysis Of Firearms-Related Crime Information

www.defensetechs.com info@defensetechs.com

About our partner


WHAT OUR PARTNER DO:
Since its inception in 1999, our partner provides police, prosecutors, policy makers and advocates the knowledge, tools and techniques necessary to successfully reduce violent crime. They work with city law departments, State Attorney General Offices, major police departments, and advocacy groups to assist them in acquiring, analyzing, and utilizing their communitys crime-gun information, which has been collected by the Federal government. Our partner has provided training on their unique tools and techniques of using gun information to reduce firearms-related violent crime in jurisdictions nationwide.

WHAT WE OFFER:
Decades of top-level law enforcement and firearm industry experience developing highly successful firearm-related violent crime reduction programs. Provides unique consulting services designed to assist law enforcement, policy makers and public safety advocates in developing tactics, techniques and public policy proposals aimed at real solutions to our nations gun violence and gun crime epidemic. Our partners have a proven track record of developing programs that have produced important crime fighting techniques currently used by federal, state and local authorities in the fight against of all types of gun crime.

WHY WE ARE NEEDED:


Often overlooked by policy makers and law enforcement is the dynamics of the legitimate firearms market and the influence it has on feeding violent crime. By making use of our partner extensive knowledge of the firearms industry, the marketing and distribution of firearms and the diversion of crime-guns from the legitimate market to the illegal market, policy advocates can develop intervention strategies that attack gun crime at its very source. Understanding the early warning signs that criminals leave when acquiring crime-guns and using them in their deadly trade is invaluable information necessary in any gun violence reduction strategy. By utilizing proven techniques developed by them, public safety advocates can tailor their programs to compliment and supplement current gun crime reduction initiatives and strategies.

www.defensetechs.com info@defensetechs.com

CONCEPT
The CRIME INTELLIGENCE STATION (CIS) is a methodology designed solution

This unique collaboration provides:

Access

Management

Analysis

of different crime information to law enforcement investigators and enhances prosecutorial success. A CRIME INTELIGENCE STATION can be a one-stop platform for increasing investigating proficiency. It has solutions for:

Intelligence, Combating Terrorism, Border Security, Criminal Investigations, Narcotics, Trafficking, Money Laundering, Telephone Toll Analysis

www.defensetechs.com info@defensetechs.com

CISs Crime Intelligence Station


The following details the capabilities and benefits of the CRIME INTELLIGENCE STATION as well as the need for such an analytical instrument by law enforcement.

Capabilities:
Recognizes and links many sources of crime-guns, ballistic, and intelligence information that is available in any jurisdiction and can be employed to provide leads for any type criminal act. Is a local and centralized repository for integrating all firearmsrelated critical information that is readily accessible to investigators while in the field or office, efficiently integrating and analyzing available date that will generate critical investigative leads. Includes link analysis with visual representations and pre-models (queries) of CISs indicators as well as allowing the investigator to model data in any fashion determined necessary. For example: link previously unknown individuals to criminal activity identify potential targets for investigation identify individuals that provide the source of firearms to violent areas of a community as well as their suppliers identify patterns and trends of criminal activity identify previously unknown associates and conspirators Provides an automated tool that investigation and prosecution of cases assists throughout the

Allows for the control of all data with the station owner CRIME INTELLIGENCE STATION internal software allows for easy importing of data from various informational systems

Benefits
Increased Officer Safety Agencies can improve situational encounters with armed violators through a closer examination of crime-gun information. Persons involved in gun trafficking as well as illegal possession and use, including associates, criminal

www.defensetechs.com info@defensetechs.com

group affiliations, and other criminal users can be identified when officers encounter suspects in the field. Crime Reduction Agencies can achieve earlier apprehensions of repeat offenders with use of crime-gun information. When investigating robbery, homicide, non-fatal shootings, and the like, early identification of purchasing patterns leads to early apprehensions and interruption of sources of guns to criminals. With a small number of sources of guns, patterns can be identified; many times intervention soon after the sale can prevent crimes from occurring. Increase in Available Intelligence Investigators can receive leads from immediate crime -gun station analysis. By conducting the standard queries found within the crime-gun station, investigators will have the capability to accurately identify viable suspects for follow-up and include suspects last known and best addresses, vehicles owned or utilized, as well as criminal and other affiliations

Enhanced Prosecution Rates Agencies will not only increase their solution rates, but importantly their conviction rates by including all pieces of evidence that link the suspect to the firearm and others involved in the criminal act. An additional byproduct will be the enhancing the creditability of arresting officers testimony by adding supporting evidence outside of the arrest incident. Improvement of Intelligence-Led and Problem Orienting Policing State and local supervisors and managers will also possess the capability to institute prevention and intervention strategies by performing analysis of the data found within the Crime-Gun Station. The combining of visual analysis software to the CRIME INTELLIGENCE STATION provides an efficient method of determining patterns and trends for performing predictive analysis to determine optimum deployment of resources and identifying the most advantageous strategies.

Improved Public Relations - Agency executives will now possess the capability of providing the most current facts and statistics, at any given time, regarding firearms-related violent crime issues for public consumption. www.defensetechs.com info@defensetechs.com

Intelligence
The Security / Intelligence examples discuss how CRIME INTELLIGENCE STATION provides invaluable tools for assisting government agencies in their mission to secure homeland, infrastructures and national security. Developing effective intelligence solutions is critical for government organizations dealing with national security issues including military operations and various proliferation concerns. It also effects commercial organizations focused on theft, espionage, or competitive intelligence activities. Proactively exposing the underlying patterns and behaviors pertaining to security-related areas helps ensure decisive and pre-emptive actions can take place. The intelligence community has long employed advanced technologies to sift through vast amounts of data looking for connections, relationships, and critical links among their targets. Patterns are often derived from non-traditional data sources ranging from freetext documents and message intercepts to video clips and audio streams. The systems typically used by the intelligence community are comprehensive and extremely specialized. They are often built with external support and combine classified information with open-source data to yield better patterns.

The CRIME INTELLIGENCE STATION Intelligence Solution


The CRIME INTELLIGENCE STATION (CIS) is a must have tool for accessing large volumes of diversely formatted data for supporting advanced analytics and information collaboration. The CIS solution provides more timely, accurate, and detailed information by which to initiate communication activities, monitor events, and perform tasks in support of intelligence operations including:
Exposing dominant, weak, or vulnerable entities within a network Examining the frequency of connections among target entities Discovering isolated entities within a network Detecting missing or inconsistent information Reviewing the commonalities among different entities; Exposing additional, unknown relationships from multiple sources

www.defensetechs.com info@defensetechs.com

Combating Terrorism
Terrorism is a global threat influencing the attitude and behavior of a target group by threatening - or carrying out - devastating actions. These actions, as we have seen, can and do include the use of conventional weapons, biological, chemical, or nuclear agents. Today's terrorism also threatens our economic and information resources. Our vulnerability to terrorist attacks expands with our growing reliance on information technologies. Increased access to information and the centralization of vital components of local, national, and global infrastructure threaten both local and national security. Investigating today's terrorist groups requires inter-agency communication and collaboration. It is essential that law enforcement agencies and task forces be able to collect and analyze data from multiple data sources in order to monitor, penetrate, infiltrate, and prevent terrorist activity. Terrorism is a premeditated act that requires detectable preparations including money transfers, material purchases and personnel movement. Intelligence works against terrorism.

The CRIME INTELLIGENCE STATION Combating Terrorism Solution


The CRIME INTELLIGENCE STATION (CIS) is specifically designed to retrieve information from varied formats and sources to expose hidden activity and behavior patterns. Using the advanced information retrieval capabilities to extract information from multiple data sources simultaneously and the powerful data mining, visualization and analysis capabilities of CIS allows you to:
Identify Relationships - uncover interactions and relationships between terrorist groups and their members. Link Group Members - understand formal and informal organizational

structures.
Connect Networks - expose connections between group members, outside individuals, other organizations, locations, facilities and communication networks.

www.defensetechs.com info@defensetechs.com

Expose Group Operations - show shared assets, materials and supplies for carrying out terrorist missions. Track Technologies - track different types of technologies used as components for manufacturing terrorist weapons. Understand Behaviors - track and analyze group behaviors for early detection

of potential threats.
Assess Vulnerabilities - evaluate funding resources, recruiting methods,

communication networks, storage facilities and other resources to uncover potential vulnerabilities.

Border Security
Protection of national borders is a critical task in the United States defense plan. The United States shares 5,525 miles of border with Canada and 1,989 miles of border with Mexico. The U.S. maritime border includes 95,000 miles of shoreline, and a 3.4 million square mile exclusive economic zone. Every year, more than 500 million people cross our borders to enter the United States. Some 330 million of these people are non-citizens. Securing the borders requires the cooperation of several federal agencies including those responsible for transportation security, immigration control, border patrol, customs, and maritime security - in support of the overall goal of providing Homeland Security. The ability to research and share information among and between these agencies is mission-critical.

www.defensetechs.com info@defensetechs.com

The CRIME INTELLIGENCE STATION Border Security Solution


The Crime Intelligence Station (CIS) is an ideal tool for searching through a wide range of data sources to extract, analyze and visually expose patterns of activity. Using the advanced information retrieval capabilities to extract information from multiple data sources simultaneously and the powerful data mining, visualization and analysis capabilities of CIS allows you to:
Share Information - give every agent the ability to retrieve information from any and every data source available with a single search. Visualize Mass Data - expose patterns by reviewing and analyzing thousand of

records.
Summarize - quickly produce frequency counts and statistical information. Track and Correlate - compare data values such as names, IDs and addresses to track and identify individuals. Identify Routes - use geographic data to pinpoint and plot entrance routes.

Developing effective intelligence solutions is critical for government organizations dealing with national security issues, including military operations and various proliferation concerns. It also effects commercial organizations focused on theft, espionage, or competitive intelligence activities. Proactively exposing the underlying patterns and behaviors pertaining to security-related areas helps ensure decisive and pre-emptive actions can take place. The intelligence community has long employed advanced technologies to sift through vast amounts of data looking for connections, relationships, and critical links among their targets. Patterns are often derived from non-traditional data sources ranging from freetext documents and message intercepts to video clips and audio streams. The systems typically used by the intelligence community are comprehensive and extremely specialized. They are often built with external support and combine classified information with open-source data to yield better patterns.

www.defensetechs.com info@defensetechs.com

Criminal Investigations
Developing effective intelligence solutions is critical for government organizations dealing with national security issues including military operations and various proliferation concerns. It also effects commercial organizations focused on theft, espionage, or competitive intelligence activities. Proactively exposing the underlying patterns and behaviors pertaining to security-related areas helps ensure decisive and pre-emptive actions can take place. The intelligence community has long employed advanced technologies to sift through vast amounts of data looking for connections, relationships, and critical links among their targets. Patterns are often derived from non-traditional data sources ranging from free- text documents and message intercepts to video clips and audio streams. The systems typically used by the intelligence community are comprehensive and extremely specialized. They are often built with external support and combine classified information with open-source data to yield better patterns.

The CRIME INTELLIGENCE STATION Criminal Investigation Solution


The CRIME INTELLIGENCE STATION (CIS) is an ideal tool for searching through vast amounts of data to extract, analyze and visually expose patterns of activity. Using the advanced information retrieval capabilities of CIS to extract information from multiple data sources simultaneously and the powerful data mining, visualization and analysis capabilities of CIS allows you to: Access Data - search any and every data source available with a single search. Visualize Mass Data - work with thousands of data records with no size limitations. Identify Relationships - expose interactions and relationships between all types of data, including suspects, organizations, ID numbers, vehicles, etc. Find Networks - visually display and analyze clusters of related data. Summarize Data - produce statistical information on the fly. Track and Correlate - compare data values, such as names, using Soundex and other matching algorithms. Share Data - rapidly respond to inter-agency data requests.

www.defensetechs.com info@defensetechs.com

Narcotics Trafficking

Law enforcement initiatives attempt to attack drug trafficking organizations at every level through a careful coordination of local, state and federal efforts. Law enforcement officials must constantly adapt to new situations, make greater use of intelligence, stay current with technology, and expand cooperation between agencies to be effective in their drug control efforts. All levels of law enforcement must employ operational (reactive) and strategic (proactive) analysis methods that focus on both short-term and long-term goals. In order to effectively perform both types of analysis, law enforcement agents must be able to access a wide range of information to uncover hidden links between cases which would normally seem unrelated.

The CRIME INTELLIGENCE STATION Narcotics Trafficking Solution


The Crime Intelligence Station (CIS) is an ideal tool designed to retrieve information from varied formats and sources to expose hidden activity and behavioral patterns. Using the advanced information retrieval capabilities of CIS to extract information from multiple data sources simultaneously and the powerful data mining, visualization and analysis capabilities of THE CIS solution allows you to:
Share Information - give every agent the ability to retrieve information from any and every data source available. Identify Relationships - uncover interactions and relationships between perpetrators and organizations. Visualize Mass Data - expose patterns reviewing and analyzing huge amounts

www.defensetechs.com info@defensetechs.com

of data, with no size limit.


Discover Patterns - quickly plot and analyze geographic and chorological data. Summarize - quickly produce frequency counts and statistical information. Track and Correlate - compare data values such as names, IDs and addresses to track and identify individuals.

Money Laundering

Criminals launder money to hide criminal activity everything from drug trafficking to tax evasion that generates the money. It is the means that criminals use to legitimize the money. Although the exact amount of money laundered yearly is still not known, experts estimate that money laundering schemes are in the billions of dollars possibly as high as $100 billion. Money launderers operate through layers of activities designed to hinder the detection, investigation and prosecution of their activities. This is often accomplished by structuring transactions, establishing businesses specifically for the purposes of manipulating accounts, or simply coercing individuals into ignoring reporting regulations. Additionally, launderers may physically smuggle money out of the country to evade tracking.

The CRIME INTELLIGENCE STATION Money Laundering Solution


The CRIME INTELLIGENCE STATION (CIS) is an indispensable toolset for highlighting and tracking suspicious transactions that can expose illegal financial activity. Using the advanced information retrieval capabilities of CIS to extract information from multiple data sources simultaneously and the powerful data

www.defensetechs.com info@defensetechs.com

mining, visualization and analysis capabilities of THE CIS solution allows you to:
Access Data - search through and extract information from a wide variety of data sources at once. Visualize Mass Data - review thousands of financial transactions to identify questionable behaviors and unusual filing patterns. Expose Structures - identify and display relationships that exist between individuals and organization involved in criminal activities. Examine Accounts - reveal associations between accounts and people, banks,

organizations, or other accounts.


Identify Duplicates - discover indirect relationships that show addresses, accounts or ID numbers with multiple users. Analyze Transactions - uncover different types of transactions used by

criminals.
Pinpoint Exchanges - use chronological and geographic data to target asset

seizures.

Telephone Toll Analysis

Telephone toll analysis is often underutilized in criminal investigations due to the sheer volume of data to be processed. When properly conducted, the analysis of telephone activity can single-handedly expose a variety of deceitful behaviors including long distance and cellular phone fraud and drug trafficking patterns, as well as validate associations between people and organizations. Data mining technologies allow investigators to uncover linkages between telephone numbers and people/organizations to expose complex communication networks, identify investigative targets, and track chronological or sequential calling patterns.

www.defensetechs.com info@defensetechs.com

The CRIME INTELLIGENCE STATION Telephone Toll Analysis Solution


The Crime Intelligence Station (CIS) ideally suited to identifying suspicious patterns of telephone activity. Using the powerful data mining, visualization and analysis capabilities of the GCS solution allows you to:
Display Intense Activity - show any type of connection between telephone numbers to expose the commonality, pathways and networks that form between large collections of numbers. Develop Frequency Counts - summarize the volume of calls from and between

telephone numbers.
Plot Telephone Activity - use proven placement techniques to visually reveal

multiple patterns.
Consolidate Registered Numbers - merge or "alias" telephone numbers to view any organization, geographic area, or phone exchange as a single element. Analyze Relationships - discover existing and emerging networks and their

relationships.
Organize Calls - group telephone number by area codes, exchanges, subscribers, or any other characteristic to display patterns and trends.

www.defensetechs.com info@defensetechs.com

www.defensetechs.com info@defensetechs.com

You might also like