Training Event 2016 - Presentations

  • 28 CFR Part 23 and Its Impact on Criminal Intelligence Collection

    This session will begin with an overview of this Federal legislation and its impact on state and local law enforcement agencies.  It will then move into an interactive discussion on the practical application of 28 CFR on investigative situations faced by intelligence officers and the information they collect. 

    Robert D. Fowler
  • Analytical Techniques for Anonymous Bloggers: A Case Study

    Research on cyberbullying in the higher education setting is limited and potential violations of criminal statues are typically only investigated following a direct and substantiated threat; even then, investigators often find the anonymous nature to be burdensome.  This presentation is based off a scholarly paper currently under review by the Journal of Intelligence Analysis and seeks to explore if structured analytic techniques, namely a force field and network analysis, yield valuable investigative information to identify the author of an anonymous blog. Through a case study participants will learn how to construct a forensic profile using expert identification and then translate their model via the simple hypothesis generation method. Too, this case will review how victims were selected for interviews and how to model a social network in Gephi through open source intelligence (OSINT). The implications of this network analysis helped investigators focus on the suspect that suspected had the highest degree and betweenness centrality.

    Matthew Woodward
  • Attacking Violent Crime & Identifying Career Criminals Through the Use of Crime Gun Inteligence

    It seems that every day you pick up the newspaper there is an article about gun violence.  In many communities across the country law enforcement is looking to implement new programs to combat violent crime.  This class will provide information on the crime gun process, the challenges of identifying and targeting criminal shooters and their sources of crime guns and layering gun intelligence to other sources of information to find “persons of interest.” The National Integrated Ballistic Information Network (NIBIN) will be discussed as a tool to identify, target, and prosecute “shooters” and determine their sources of crime guns.  Time will be spent on documentation for purchasing a firearm and why some purchasers are denied.  The value of information developed based on that process and its potential use in prosecution. We are going to look at guns, gangs, social media and money and the targeting ability that layered information can provide.   

    Edward Feingold
  • Automating Excel & Command Center Automation and Lead Management of High Profile Criminal Incidents (Sponsor Training)

    Automating Excel: Learn how to automate repetitive tasks, turn a 20 step process in to a single mouse click. Spend less time in front of the computer. For example it used to take me 6-8 hours to do the monthly stats. Once I created macros automating all the steps into a few menu choices it only took 1-2 hours.

    Command Center Automation & Lead Management of High Profile Criminal Incidents:Is your agency prepared to handle the hundreds of leads that could be generated daily by a single high profile criminal incident?  Examples include child kidnappings, homicides, terrorism events, etc. Leonard W. Leedy III, retired detective, now working with ACISS Systems, will discuss the procedures involved in managing and disseminating incoming information--from receipt of the initial tip, through distribution, analysis, assignment, response, and case management.  High profile criminal incidents are those loathsome crimes that generate citizen outrage, fear, and apprehension, and a sense of community vulnerability.  These crimes usually receive widespread media attention by their nature or celebrity status.  These type of incidents place a high expectation and demand that law enforcement authorities solve these crimes quickly with arrest and prosecution.  Typically, law enforcement authorities seek assistance through the media and citizens for information that can generate a tremendous volume of tips.  This information needs to be managed and will task agency resources.  Attendees will receive a draft of a "Information Management of High Profile Criminal Incidents Action Plan" that could be tailored into an SOP for their agency.  The ACISS Tips & Tasks module is the core of the ACISS Counter Terrorism Toolkit which allows agencies to collect Suspicious Activity Reports (SARS). ACISS provides integration with several data sharing initiatives, including a 2-way GJXDM compliant interface with the RISS DES system, support for the National Virtual Pointer System (NVPS), and NIEM and LEXS compliant integration with the Nationwide SAR Initiative (NSI) Shared Space for fully automated electronic SAR submission.

    Lenny Leedy
  • Complete Privacy & Security During Investigations

    Investigators have been using the internet to search for evidence about their targets for years. Today, these suspects can learn a lot about you through the weak privacy and security protocols that we all use on a daily basis. Your computer shares a lot about your search history to the websites that it visits and discloses technical details that could compromise your investigation. Tech-savvy criminals now have the capability to watch you while you are watching them. Some have downloaded malicious software to your computers by simply visiting their website. This session will present a new and easy solution for conducting online research with a fresh operating system every time. You will see how custom Linux operating systems that boot from fast USB drives make you and your computer almost untraceable. At the end of the session, each attendee will receive an online link with instructions to build their own, and a copy of a pre-configured system that includes Michael Bazzell's custom investigation browser. For the cost of an $8 USB drive, you can literally have a new computer every day. Viruses will no longer be a concern, and you can replicate this entire method in less than 10 minutes. Due to the sensitive nature of Michael's work and presentations, please refrain from photography or video recording at this event.

    Michael Bazzell
  • Criminal Intelligence Unit Officer-in-Charge

     This breakout session will involve discussions on the problems and effective solutions in operating an intelligence unit and is focused on the "new" intelligence supervisor.  Discussions will include issues relating to establishing a successful intelligence unit.  This workshop will utilize attendees’ concerns as a basis for the course content.  Its topics range from unit evaluations to file management.  This workshop is restricted to unit managers and supervisors only. 

    Bob Morehouse
  • Cyber Espionage Techniques & Advanced Persistent Threats

    It seems almost weekly that the media is broadcasting stories of cyber attacks, hacks, or crimes within the United States. The cyber realm has been brought even more into the forefront of the American public’s consciousness when an alleged Russian solider recently posted photos on a social media platform in east Ukraine, where Russia has repeatedly denied having troops. Cyberspace has a massive appeal to adversaries for collecting intelligence. The risk of being caught is low, the payoff of success is great, and the tactics are faster and cheaper than other methods of espionage.  Clearly cybercrime pays, but how well? Cyber espionage at its core can be tasked to a spy of any skill level and will progress as a threat over time.Further, some nation states consider economic espionage a tool to achieving wealth and have developed pervasive cyber operations, often called advanced persistent threats. Both China and Russia can be grouped into this category as they belligerently collect U.S. information. This presentation will cover three broad areas: first, a review of the main tactics and counters used in cyber espionage will inform the second section, regarding case studies. In section two, modern cases of cyber espionage will be reviewed at the individual/group and national state level. The final section will highlight some theoretical espionage techniques and outline future threats.

    Matthew Woodward
  • Domestic Terrorism in the Homeland: An Ideological Examination (LAW ENFORCEMENT SENSITVE)

    This presentation focuses particularly on how domestic terrorismis conceptualized by the federal government and issues involved in assessing this threat’s significance. The presentation will detail the national level patterns, trends, and criminal tactics of the various domestic terrorism threats to the homeland supported with case studies from around the country. The presentation will also discuss recent examples of collaboration between DHS and state and local partners, including collaboration on joint products that address domestic terrorism.  The domestic terrorism ideologies that will be covered include the white supremacist extremist movement – neo-Nazis, racist skinheads, traditional white supremacists, Christian Identity and racist prison gangs; sovereign citizen extremists, militia extremists, black separatist extremists, anti-abortion extremists, animal/environmental rights extremism, and anarchist extremism.  The session will also include a presentation on the identifying symbols used by these groups and individuals, and available training and resources for state and local partners. 

    Patrick Manz
  • Facial Recognition: Overview, Challenges, & Best Practices for Public Safety

    This workshop will focus on an overview of facial recognition technology, best practices in this emerging technology, and identify the challenges faced by public safety professionals. Through demonstrations, the instructors will show how to take uncontrolled images and make the enhancements needed to generate positive facial recognition results. They will present case studies, taken from real life investigations, involving images acquired from CCTV, bank ATM’s, social media, and other sources. The primary focus will be off-axis or poor resolution images, images where portions of the face are covered, and other real life issues investigators face regarding probe images in criminal investigations. The instructors will show you how to enhance these images to meet the criteria for facial recognition using relatively simple tools and techniques. This workshop will be informative and educational for anyone considering the uses of facial recognition in public safety. 

    Kyle Hoertsch
  • Geospatial Intelligence

    The workshop on Geospatial Intelligence provides a foundation for applied research efforts to engage public and private sector partners to test and model geospatial intelligence initiatives.  By strategically linking multiple domains, including civilian and law enforcement, these tools bridge sentiment, language, geographic, socio-psychological and various other human-involved barriers that often pose unique challenges to traditional mitigation efforts.   The session explores geographic information technology for intelligence gathering and civil protection while providing data-driven solutions for assessing threats, proactive planning, responsive training, and strategic operational support.           

    Akshay Pottathil
  • Getting the Most out of your Predictive Policing Strategy (Sponsor Training)

    Predictive Policing is not a fleeting academic term, coined to describe a methodology so abstract that practitioners cannot put it into action. Predictive Policing is not some incredibly complex and advanced concept that is only useful for the largest of agencies.  On the contrary, predictive policing has turned into a methodology used to find, analyze and respond successfully to crime problems by law enforcement agencies nationwide. Agencies at the local, county and state level are embracing predictive analytics to deploy resources in response to emerging patterns, series and trends. This presentation will discuss how successful Predictive Policing programs have been implemented in more than a dozen agencies throughout the country.  These programs have been both incredibly successful and also they have been complete failures.  What makes the difference between a successful and unsuccessful predictive policing implementation?  Come to this informative presentation to find out and leave with a clear understanding of how to effectively and efficiently bring predictive policing to your agency.

    Josh Levin
  • Human Trafficking

    The Clearwater Police Department Intelligence Unit continually gathers information on human trafficking organizations located within the city as well as surrounding regions. Early in 2011, information was surfacing from sources and confidential informants reference a human trafficking organization operating in multiple jurisdictions throughout the Clearwater/Tampa Bay Area. Tampa Police detectives shared information reference the unidentified head of the organization. This information was cross checked with narcotics intelligence information and the suspect was positively identified. Clearwater Police narcotics detectives provided further information on the suspect known as Peter Kitt (AKA “Dread”), along with a confidential informant who was tied to this organization and later identified as a victim of human trafficking.  Detectives from affected agencies compiled all the information available reference this suspect and his known criminal associates. This lead to four agencies conducting a prostitution reverse in order to verify information provided by informants. This sting was successful arresting Peter Kitt for prostitution related charges, recovering a victim of human trafficking, recovering a firearm, and several cell phones/smart phones vital to his daily operations. The victim recovered during the reverse cooperated with law enforcement and was able to provide further information on the daily operations and co-conspirators. Search warrants for the cell phones recovered valuable evidence and data that was placed into Penlink software to further show the organizational structure. Subsequent to this operation the Chiefs of Police for four different jurisdictions were briefed on the violent criminal organization. They each pledged full assistance to the investigation and approximately thirty detectives were assigned to the case with Clearwater Police Detective James McBride as the lead investigator and Sergeant Steven Sears as the lead supervisor. The Statewide prosecutors office assigned two prosecutors to assist with the case and subsequent RICO prosecution. The 16 month  investigation utilized around the clock surveillance, global positioning device warrants, cell phone search warrants/subpoenas, court ordered pen registers, subpoenas for email/backpage advertisements/financial records, the first State of Florida RICO case using human trafficking as a predicate act and the first State of Florida wiretap for a human trafficking organization. Three suspects were arrested and given a one million dollar bond.  They were prosecuted for RICO and Conspiracy to commit RICO and were adjudicated guilty by a jury after a month long trial. The defendant was sentenced to 30 years in state prison.  A total of eight victims of trafficking were recovered and five agreed to testify in court.  Detective James McBride and AAG Julie Sercus could provide valuable insight to investigators on the following: how to collect human trafficking intelligence, make that intelligence actionable, conduct a human trafficking investigation using all investigative methods, manage an organized crime investigation as it relates to human trafficking, successfully prosecute a human trafficking organization, and work as a team within a multi-jurisdictional investigation.   

    James McBride
  • HVE Mobilization Indicators

    In December the National Intelligence Management - Counterterrorism (NIM-CT) released a list of HVE mobilization behavioral indicators. The intention of this list is to provide state and local partners with observable behaviors, ranked into three tiers of diagnosticity, which can inform these partners whether individuals or groups are preparing to engage in violent extremist activities.  This list was developed with the assistance of DCTC, DHS/I&A, DOE, FBI, NCTC, NSA, and cleared representatives of state and local law enforcement. Members of these agencies are currently providing briefings across the country where they will explain the evolving HVE threat, highlight several indicators, and discuss the real-world applicability of these indicators.   

    Abigail Williams
  • IBM i2 Analyst's Notebook Tips and Techniques (Sponsor Training)

    Analyst Notebook is a visual intelligence analysis environment that can optimize the value of massive amounts of information collected by government agencies and businesses. With an intuitive and contextual design it allows analysts to quickly collate, analyze and visualize data from disparate sources while reducing the time required to discover key information in complex data. IBM i2 Analyst’s Notebook delivers timely, actionable intelligence to help identify, predict, prevent and disrupt criminal, terrorist and fraudulent activities.

    Dallas Ryan
  • Increasing the Value of Intelligence in Local Law Enforcement

    The advances in technology have forever changed the face of modern law enforcement investigations.  Today’s intelligence analyst is more equipped than ever to provide actionable, real time, and accurate intelligence that can drive investigations and provide investigators with the information they need to solve cases.  The presenter will give an analysts view and describe how the Ventura County Sheriff’s Office transformed its Crime Analysis and Intelligence Unit into an invaluable resource that’s used regionally on a daily basis.  Topics include: establishing credibility within the department, entrenching analysts with investigators, training, software, work products, and finally, real world cases that provide a story on how the two units were combined to create a valuable regional resource. The cases that will be covered will discuss signal intelligence, open source information, GPS enabled data sets, and other investigative tools. Cases include homicides, Human Trafficking, burglaries, fuel thefts, fraud and a variety of others. 

    Jennifer LaMoure
  • ISIS/Foreign Fighters and Emerging Threats

    The training seminar is for local, state and federal officers confronting the issue of ISIS and foreign fighters. The seminar will provide investigative observations and techniques for officers to identify individuals who may be looking to join a terrorist group or commit a terrorist act. Local and State Law Enforcement Officers come in to contact with millions of individuals on a daily basis - what indicators of ISIS and foreign recruitment should they be aware off. The seminar focuses on specific things that officers can identify and observe that will help their investigations into violent extremism. Local, State and Federal officers all have a role in identifying and mitigating any violent extremist. The ISIS threat is moving more towards mobile and random one on one attacks. How can officers stay safe and continue to protect their communities from returning foreign fighters or local individuals looking to martyr themselves. Officers will walk away with a greater understanding of: Terrorist groups and the degree of threat to the U.S., U.S. citizen involvement in the groups, Updated methods of attack, Indicators of plan to join foreign fighters, State and Local officer’s role in prevention, and Survival issues.

    Foria Younis
  • Location Analytics and Global Security (Sponsor Training)

    This presentation will discuss how GIS is essential to identifying threats and assessing vulnerabilities to develop mitigation and protection procedures for at risk facilities and at risk communities. At the same time, we will show how GIS is essential for creating a spatial data infrastructure and provide the analytics supporting global security mission objectives – intelligence collection/analysis, incident response, crisis management, and national security. Workflows involving demographics, social media, human intelligence and drone technology will be discussed. 

    Carl A. Walter
  • N-DEx: A Tool for Criinal Justice Investigative Analysts

     During this workshop, criminal justice analysts will be provided an introduction to N-DEx, the powerful investigative tool for sharing incident and case reports; arrest, incarceration, and booking data; and probation and parole data. This free-to-access criminal justice information sharing system, operated by the FBI’s CJIS Division, provides its users with unique features for sifting through volumes of data from disparate databases. The presentation will include a demonstration of system functionalities that are most valuable for realizing linkages between seemingly unrelated data. Emphasis will be placed on the benefits of discovering non-obvious relationships hidden within the data and their impact on making informed decisions, avoiding risks, and gaining investigative advantages. Following the presentation, attendees will have opportunity to log on and explore the system. Due to accessing criminal justice information, this workshop will be restricted to law enforcement personnel only.  

    Sarah G. Wilson
  • Omar Shafik Hammami: Alabama to Al-Shabaab

    Omar Hammami was born in Daphne, Alabama, to a Syrian father and American mother. He enjoyed a fairly typical Southern childhood and was even baptized in a local Baptist church.  This presentation explores Omar’s biography and life choices to discover how he went from this all-American background to becoming the international face of Al-Shabaab, an Islamist terrorist organization fighting a guerilla war in Somalia.  It draws information from press reporting, interviews of the people in Omar’s life, and Omar’s own words to paint a picture of his path to radicalization.  It closes with a brief discussion of the radicalization mindset, demonstrating to the audience that there are experiences in everyday life that give us a glimpse into those facets of human nature that drive radicals like Omar Hammami.The goal of the presentation is to give the audience an understanding of one young person’s journey into radicalization.  Omar did not fit the stereotype many people have of a poverty-stricken social outcast forced into radicalization by desperate circumstances.  There is no more a single, defining profile of a radical than there is of an active shooter; individuals ultimately choose this path for their own reasons.  This goal of understanding (and ultimately interdicting) radicalization is even more important in light of the recent increase in young people attempting to travel to join ISIS/ISIL/IS or conduct attacks in the homeland on behalf of the organization.

    Greg Armes
  • Open Source Intelligence (OSINT) Update

    For the past three years, Michael Bazzell has presented unique general sessions about Open Source Intelligence (OSINT) techniques identifying and demonstrating several online resources that can aid researchers and analysts in solving both technical and non-technical investigations. Participants have been shown how to "dig" deep into the vast resources available online for researching personal information about any target; and methods for searching "hidden" content through mobile device applications will be demonstrated live. The audience learned how they could easily replicate an anonymous Android environment on any computer for investigative purposes; opening many new investigation possibilities for any incident.  This session is an update to this course and will demonstrate several new online search methods that have never been presented before. While the exact content will evolve until the day of the presentation, you are guaranteed to add a new search method to your investigation toolbox.    

    Michael Bazzell
  • Operation Strong Safety-Intelligne-driven Border Security

    In June of 2014, the State of Texas began a large-scale effort to prevent Mexican criminal cartels from exploiting the Texas border for narcotics and human smuggling.  More than just flooding the area with law enforcement officers and sensors, this became a true intelligence-led policing event, with criminal intelligence analysts driving daily operations through data-driven recommendations on tactics and targets.  This ongoing operation is changing the culture in a large law enforcement agency with mass exposure to new techniques and philosophies rooted in documented success. 

    Andrew Mellon
  • Photoshop Tips and Tricks for Law Enforcement

    This talk will cover tips and tricks for using photo enhancement tools such as Photoshop in support of Intelligence and Law Enforcement investigations.  The session will be conducted live and walk the attendees through the basics of enhancing photos.  The session will also cover the real world limitations of digital imagery and an understanding of file formats and current best practices. 

    Brian Gray
  • Picking Up the Digital Breadcrumbs

    Runaway juvenile investigations are often the precursor to much more serious felony crimes such as violent sexual assaults or even human trafficking. Learn how to overcome common obstacles inherent in these cases and develop actionable investigative leads using a variety of online resources. This presentation will cover techniques to best prepare your agency for the successful and safe recovery of runaway juveniles or at-risk missing adults, gain additional information about their online footprint, and identify indicators that can be used to properly identify potential cases of human trafficking that are deserving of additional investigation. Participants will learn how to identify and preserve digital evidence that can be used to corroborate a victim’s statement and provide compelling evidence against anyone willing to exploit this vulnerable population. Specific resources will also be shared and discussed along with case samples.  

    Nancy Aguirre
  • Project Roadmaster (LAW ENFORCEMENT SENSITVE)

    Project Roadmaster developed from a Niagara Regional Police Service (NRPS) Intelligence Probe into a Niagara area group including males with ties to Traditional Organized Crime (mafia) in Toronto and LCN in Buffalo that were suspected of trafficking in cocaine at the kilogram level.This Probe eventually grew into a much larger investigation of an organized network led by a group in the Toronto area with further links to Traditional Organized Crime in Montreal and a Mexican Cartel (believed to be the Sinaloa Cartel).The investigation became a Joint Forces Operation named "Project Roadmaster" in March 2014 when the NRPS partnered with the RCMP, Peel Regional Police Service, Ontario Provincial Police, Canada Border Services Agency and FINTRAC. The project utilized four 60-day wiretap authorizations, General Warrant searches ("Sneek & Peeks"), 3 in-depth Proceeds of Crime/Money Laundering investigations and numerous searches upon takedown in September of 2014. Evidence obtained from this project shows that this group was importing thousands of kilograms of cocaine by concealing it in granite boulders and shipping the boulders from Mexico, either overland through the United States or by sea, via Brazil, into Canada. The boulders were shipped to a factory/warehouse in the Niagara area where they were cut open and the cocaine extracted to be distributed in the Greater Toronto and Niagara areas.The presentation summarizes the benefits of the early Intelligence Probe that developed into a full-blown project that exposed how a Mexican Cartel now has a presence in Canada and is working directly with Traditional Organized Crime in order to import and distribute cocaine at the highest levels and subsequently launder their criminal proceeds. The presentation speaks to best practices for running large and complex cases and also  updates the status of the prosecution against the accused (currently 4 accused have plead guilty). 

  • Source Recruitment in the 21st Century

    This course covers the unique methodology of non-coercive techniques for recruiting, developing and handling human sources.  These techniques are similar to those used by intelligence agencies around the world but have been modified to apply to the needs of local law enforcement agencies. Traditional law enforcement recruitment usually relies on the “Hammer”, i.e. working off an arrest or for payment.  Although these techniques can work, they are not nearly as successfully or reliable as non-coercive techniques.  Learn persuasion not compliance.

    John Williams
  • Targeting the Criminal Use of Encrypted Communications (LAW ENFORCEMENT SENSITVE)

    Organized Crime (OC) groups are constantly seeking new methods of secure communications to conduct their activities. This constant evolvement represents a challenge for law enforcement agencies to lawfully intercept and decipher their communications. In their pursuit of a more secure method of mobile communication, the usage of a freeware encryption software called “Pretty Good Privacy”, or PGP, became more prevalent. To date, PGP is a completely legal method of secure communication. Currently there are no government regulations in place which restrict the use of PGP, making its use extremely appealing to OC groups worldwide. 

    Francisco Chaves
  • The Felony Lane Gang: Closing the Gap In Cell Phone Data Analysis and Information Sharing in Cross-Agency Collaborations

    The Felony Lane Gang (FLG) is a nationwide organized crime group with several hundred members originating in Fort Lauderdale, Florida, and has been operating for well over a decade. The “Felony Lane Gang” was coined by the banks. It’s the bank’s nickname for the drive thru lane furthest from the teller.  It is called the Felony Lane because it was the lane that was commonly used when someone didn’t want to be seen very well by the teller. The “Felony Lane Gang” IS NOT a typical gang; however, it meets the requirements of many state gang laws; The FLG is an organized network of criminals operating throughout the United States, stealing MILLIONS of dollars from financial institutions, and is responsible for hundreds of millions in losses throughout at least 40 states.   FLG teams travel throughout the United States and target vehicles at fitness centers, day- care centers, and parks where victims leave their purses in plain view.  Teams utilize rental vehicles with heavily tinted windows as part of their operation. Their method of operation is as follows: Teams use a window punch to enter the vehicle and steal check books, driver’s licenses, social security cards, credit, and debit cards.  Teams use prostitutes, homeless people, and drug addicts to assist with immediately using the victim’s credit cards, and cashing checks. White females are preferred to conduct the bank withdrawal from the victim’s bank account, and wigs and make-up are used to match up to the stolen identity.  Stolen credit cards will also be used immediately to buy gas and food.   Prior to cashing checks at the victim’s bank, license plates are changed with fake, or stolen plates, immediately before and shortly after cashing the check at the bank to avoid law enforcement detection.  Teams will stay in an area motel for days or weeks, depending on their success.   In 2014, a working group consisting of over 300 local, state, and federal agencies located across the United States was created to piece together the criminal activities of the Felony Lane Gang. The collaboration amongst so many agencies in the Felony Lane Gang Working Group highlighted the disparities in how call detail records, cell site and GPS data is being collected and analyzed from agency to agency and also created challenges in the sharing of data among working group members.  Location awareness was critical in developing the big picture for the case and connecting both known and unknown suspects of the Felony Lane Gang. The ability to map CDR records, GPS data and other location based information for rapid visualization, analysis and presentation would be key to a successful collaboration.  In an effort to standardize data formats and enhance their analytical capabilities, the Felony Lane Gang Working Group, implemented the 3D visual analysis and mapping tool, GeoTime.  The Working Group was able to produce a detailed, animated view of where and when events were taking place, highlighting suspect meetings, placing targets at the crime, and connecting Felony Lane Gang members across the country. Using examples of products generated in the Felony Lane Gang case, this presentation will begin with an overview of methods used by the working group to import and analyze phone location, GPS and other location based data, and will also cover how analyzing Call Detail Records using animation and 3-D visualization can enhance law enforcement investigations.   

    Gerard Devine
  • The Harm of Violent Street Gangs

    Violent street gangs across America are largely known for two things – violence and drugs. Given that the number of street gangs in the country far outstrips our capacity to target and address them all, what additional (and more discerning) criteria could help decide which gangs should be the focus of law enforcement intervention? This presentation builds on the idea of harm-focused policing, which aims to inform policing priorities by weighing the harms of criminality together with data from beyond crime and disorder, in order to focus police resources in furtherance of both crime and harm reduction. The presentation starts by presenting evidence from Operation Thumbs Down, an FBI-led gang takedown in South Central Los Angeles which shows a long-term benefit to gang interventions. It then reports on the results of focus groups with various FBI gang task forces collating the community impacts of gangs, and quantitative results from a nationwide survey of over 300 FBI gang unit task force officers. The results might help intelligence analysts attending the meeting think about their jurisdiction’s priorities and decisions about which gangs they target, and why. 

    Jerry Ratcliffe
  • The Realities of Caribbean Security and Insecurity and Its Potential Impact on the USA in Era of the "Third World War--Terrorism"

    The Caribbean is the USA’s third and most porous and complex border. It comprises a multiplicity of small vulnerable Island States with very strong self-identity, independence and sovereignty, and with very limited resources and lacks the political will. It has well established and known Islamist extremist groups, such as the Jamaat al-Muslimeen of Trinidad and Tobago, which attempted to overthrow the Government in a bloody coup in 1990. Over 100 nationals of the Region have been to Syria in recent times. The Region has been one of the three major drug trafficking routes to the North America and Europe and it being a safe haven for Organized Crime Groups involved in human trafficking, drug trafficking, money laundering and cyber crime/credit card fraud/lottery scam. The new practice of “Citizenship for Hire”, by some of the Island States, whereby persons from Middle Eastern and other countries buy their citizenship, potentially poses very serious threat to the region’s security. The presentation  will seek to assess the security threats posed to the Caribbean Region as a result of the larger reach, appeal and access to resources of radical Muslim groups throughout the world have accrued recently; and to evaluate our strengths, weaknesses, vulnerabilities against the aforementioned context. The author also intends to explore how the Caribbean’s vulnerabilities to terrorist threats could have an effect on the Region and North America.  The emphasis of this presentation will surround inter alia; Terrorism threats in the Region; and the potential for increased terrorist activities in the current era in which the USA and Europe fight the Islamic State of Iraq and Syria (ISIS) and Al-Qaida. Additionally, the presentation will seek to explore the imminent threat to the Western Hemisphere from radical Muslim groups and how this will affect the USA’s and Canada’s large scale investments and businesses in the Region as well as targeting of US Tourist within the Region (80% of the Regions Tourists are from North America).   Major Anderson will seek to illustrate how partnership with IALEIA and LEIU towards the development of; Analysts, Intelligence Officers and Intelligence Led Policing along with other already existing law enforcement and criminal Justice programmes with the USA and Canada can create a proactive policy and strategy to reduce and thwart where possible the imminent terrorism threat to the Region. Examples of prior cooperation between the USA and the Region’s Intelligence and Analyst professionals will be shown as a guide towards the purported coalition against Terrorism in the region.  

  • Tracking Sex Offenders in a Regional Datamart Environment

    MO templates have been used by law enforcement agencies across the world for many years as an aid in collecting and tracking attributes relating to certain types of crimes. Although this is not a new concept, such templates have historically been built into local stand-alone RMS programs or national databases such as ViCLAS or ViCAP. While such systems allow investigators to query for similar cases, this is typically done within the confines of a silo’d database which does not connect or interact with local RMS information. The result is that several key details relating to known offenders quickly become outdated and irrelevant. For example – an offender who committed a sexual assault involving a certain MO a number of years ago may have been driving a different vehicle at the time; he may have changed his appearance (hair style, weight, tattoos); or he may have relocated to a different part of the city.    The integration of MO templates within CRIME (Consolidated Records & Intelligence Mining Environment) – a multi-sourced relational datamart – at a regional level has enabled the Vancouver Police Department to use state-of-the-art techniques to analyse offenders’ MO information in conjunction with real-time regional RMS information. This initiative – which was developed by the VPD Sex Crimes Unit in 2011 has proven to be highly effective in identifying suspects which otherwise would not have been located via traditional analytical or intelligence means. The integration of MO templates into a regional datamart which are then subsequently analysed with the use of iBase, Analyst Notebook and ArcGIS (all of which have interactive functionality with the Datamart) have significantly enhanced analytical functions and efficiencies at both a tactical and strategic level by allowing the analyst to develop complex multi-layered queries which are not possible in a traditional RMS environment.    The use of MO templates within the CRIME Datamart has been so effective that the concept has been adopted to track offender’s MOs not just through their previous local sexual assaults, but also by ‘tagging’ offenders who committed their offences in other parts of the country (or world) and have been checked in the area. This means that even though a non-local offender may not be on file as having committed a crime within the region, queries using Offender MO Templates within the Datamart environment would allow the analyst to identify subjects known for a certain unique MO who have been checked certain areas. These enhanced searching capabilities have changed the way in which sex crimes are tracked and investigated at the VPD by facilitating analytical driven processes which were never previously possible.  The use of iBase MO templates to track sexual assaults and sex offenders has proven to be so successful over the past 5 years that the VPD has recently adopted the use of similar MO templates to track property crime & robbery incidents and is now used to enhance the department’s offender management strategies. The proposed presentation will demonstrated the use of MO templates within the VPD’s CRIME Datamart which combines the capabilities of ESRI ArcGIS & IBM’s i2 products into an analytical software suite which enables complex spatial, temporal and intelligence-driven analysis. 

    Linh Riddick
  • Using Social Networking Analysis Strategically to Combat Organized Crime

    The outcome of employing Social Network Analysis (SNA) routinely is a more strategic approach to intelligence targeting, and subsequent enforcement. Instead of ad hoc targeting, key strategic facilitators can be taken out of a given network, disrupting drug lines or opportunities for money laundering. Drawing from several cases studies of applied SNA employed in the province of Alberta, within Criminal Intelligence Service Alberta, this presentation will outline the theory, approach and outcome of leveraging this analytical technique.  

    Andrew Wright