1 / 27

Software Tools For Law Enforcement

Software Tools For Law Enforcement. Crime Analysis Data Mining Information Sharing. Goals and Objectives.

mohammed
Télécharger la présentation

Software Tools For Law Enforcement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Software Tools For Law Enforcement Crime Analysis Data Mining Information Sharing

  2. Goals and Objectives To enable the State and local Criminal Justice Community to better address crime by enabling interoperability between Federal, State, and local Agencies, with appropriate privacy and security.

  3. What Tools Do Law Enforcement Officers Need? How Much Information Is Enough?

  4. At the IACP/LEIM NIJ day, 7 out of the 13 OST Projects reviewed contained an information sharing or data mining component. Clearly, law enforcement has signaled that this technology is an important tool. OST approach is to involve LE practitioners in developing a needs assessment BEFORE a decision is made to purchase a new tool.

  5. Background • Numerous data analysis and data mining (DA/DM) applications are available focused on the needs of Criminal Justice (CJ), business and DoD intelligence. Many of these applications may be of benefit to the CJ Community. • With increased volumes of computer stored data, the CJ community requires data mining tools to enable the value of this information for officer safety and investigation flags.

  6. Crime Analyses and Data Mining Tools Assessment A Program Overview

  7. Crime Analysis/Data Mining State of the Art • The applications are very sophisticated and require appropriate amount of expense and effort to configure, operate and maintain. DA/DM can easily cost in excess of $100K. • How can the CJ community make informed choices regarding features and functions of a Data Mining tool set?

  8. Wisdom Knowledge Information Data Goal Enhance capability of Criminal Justice Agencies to gain wisdom through analysis of data Decision Support Knowledge Engineering Information Engineering Data Engineering

  9. Overview Purpose Enhance capability of CJ agencies to gain wisdom through analysis of data. Products The regional governance effort has started and over 70 data mining tool sets have been identified with over 30 crime analysis tool sets. Innovative Research Thrusts Application of industry accepted standards to the assessment of data mining/crime analysis tools.

  10. Objectives • Establish a repeatable process for selecting data mining and analysis tools for Criminal Justice organizations • Assess and test selected data mining and analysis tools • Expected outcomes • Provide situational awareness to officers • Enhance/enable investigations • Understand crime and disorder problem • Perform Gap Analysis against baseline requirements • Assess potential for impact on productivity

  11. Key Benefits • Criminal Justice (CJ) Organizations will have a consolidated list of Crime Analysis tools and Data Mining Applications that, when implemented, improve productivity, analysis capability, and access to critical CJ Information. • A published method for evaluating and selecting Crime Analysis/Data mining CADM tools. • Common template for assessment of CADM tools in the CJ domain. • Single Repository of User Requirements for Crime Analysis and Data Mining Tools

  12. Achieving the Goal • Process: A Comparative Evaluation Process (CEP) will be followed to select and assess commercial of the shelf (COTS), government off the shelf (GOTS), and custom software products for use in CJ agencies. The CEP is organized in to five activities: • Scope Evaluation Effort • Search and Screen Candidate Software Packages • Define Evaluation Criteria • Evaluate Application Alternatives • Analyze Evaluation Results • Publish Results.

  13. Technical Approach and Significant Activities • Software Productivity Consortium ‘s (SPC) Comparative Evaluation Process (CEP) adapted to establish program procedures. Process will be repeated and modified for each governance. • Program is divided into four CJ Governances: • Regional (municipal, state and local) • Municipal • Municipal Federation • Federal/Local Operations Center ( i.e. HIDTA)

  14. Down Selection of ProductsCrime Analyst Priorities • Over 30 Crime Analysis Products requires a structured evaluation methodology to select the tool or tool suite that best fits the Analyst needs. • NIJ is sponsoring the development of a methodology to meet this need for the Law Enforcement Community. • Participation from Law Enforcement is a critical element in the Methodology • The Crime Analysis effort collected and prioritized the San Diego Crime Analyst’s Product Feature and Requirements Priorities. • Product Feature Determination • Two sources • Literature Search vs product requirements • Vendor Survey vs product requirements • Down Selection • Application of Analyst Priorities vs Product Features using Comparison Evaluation Process (Statistical Weighting)

  15. ABM America, Inc. Alta Analytics Anacapa Sciences Analysis Central Systems askSam Bair Software CISCO CI Technologies COPLINK Corona Solutions Crime Analysis Associates Crime Mapping Technology Center Crossroads Software i2 Imagis Technologies Indico Integrated Systems Research Corporation - Returned Intelligence Technologies Intergraph InvestigAide Software – Foreign No US Address ISYS Institute of Police Tech. & Mgt Memex – Did not Complete Survey Motorola, Inc Netstorm Technologies - Foreign No US Address New Technologies Open Software Solutions, Inc. Orion Scientific Systems Precision Computing Raytheon Seagate Software Softscape SpeedTrack Templar Inc. ThinkSpark Threat Analysis Group VA Inst. for Justice Info Systems VisionAIR Vista WinSHAPES Software CA Vendors

  16. ADI Technology Corporation Advanced Software Applications AI Software - Foreign No US Address Angos Software Corp. - Foreign No US Address ASR Data Attar Software Attrasoft Autonomy Automated Learning Group AZMY - Returned Bayesware BayTSP Clear Forest Crisp-DM Cygron Datalinx Electronic Warfare Associates (EWA) Insight Analytics ISYS Hoffman Technologies (HTI) IBM Information Builders Information Discovery, Inc. - Returned Information Technology and Systems Center Integrated Solutions Group (ISG) Isoft - Foreign No US Address iWay Software Kalido KANA Knowledge ExtractionEngines(KXEN) Knowledge Miner SPSS Laboratory for Information Technologies Lau Defense Systems Magnify Mantas MarketMiner, Inc. Megaputer Metamatrix Mindleaf Modulant Interoperability Solutions Software DM Vendors • NetMap Analytics • Network Associates • Oracle • Orincon • Pilot Software • Presearch • Quadstone • SAIC • Salford Systems, Inc. • SAS - Declined • Semantic Research • Sentient Machine Research - Foreign No US Address • Spotfire • Teradata • The Modeling Agency • Unica • Unisys • Veridian • Virginia Institute for Justice Information Systems • Virtual Gold • Visual Analytics Inc. • Ward Systems Group • WebTAS • Xanalys

  17. Crime Analyst Weighting CA - Features

  18. Lessons Learned • Allow at least 30 days for extensions to Vendor Surveys • Consider not all Vendors will respond when asked • Setup Test Bed to Install products for verification of features for all products • Requirements Automation Tools need to be available at outset. Ability to add/delete requirements as Vendor Responses received must be included in methodology and a plan to refresh with participating vendors • Schedule needs to allow for slip in gathering requirements and prioritizing • Cost models will not be accurately filled out or only include “Contact Vendor”. Down Select will need to consider Cost Thresholds after Ranking. • Allow additional time to contact or locate US sources for foreign owned software • Ensure Survey / Request for Information includes electronic media and hard copy for all forms and documents .

  19. Do not focus on mechanisms. • Support – who, what and how? • Who can and should contribute?

  20. Information Sharing/Data Mining Initiatives • Data Mining • Develop/Evaluate Data Mining Tools that will meet the unique classification needs of both State/Local and Federal Leas: • Sensitive Information For State/Local LEA’s • Classified Information For Federal LEA’s • Information Sharing • San Diego’s ARJIS - State, Local, Fed • ARJIS iPac Hand Held Wireless Prototype • CRIMES Hampton Roads, VA – State and Local (expanding) • Intrastate Policies for Sharing Information • W/B HIDTA DMLE – State, Local, Fed

  21. Where to Find Information • OJP Web Site • www.it.ojp.gov • Where to get help • NIJ OST • BJA Non-profit • The NIJ Practitioner Resource Group (PRG) • The NIJ Center System • Bruce J. Baicar, Senior Technology Program Assistant, (202) 305-4626, baicarb@ojp.usdoj.gov

  22. Thank you for your time… When it comes to NIJ! NIJ Is Working for You!

  23. Crime Analyst Weighting Query/Search Requirements

  24. Crime Analyst Weighting Trend/Pattern Analysis Requirements

  25. Crime Analyst Weighting Summary Analysis Requirements

  26. Crime Analyst Weighting I/O & Report Requirements

  27. CA Vendor – Composite ScoresLiterature Search and Vendor Survey

More Related