Law Enforcement Technology

NOV 2013

Issue link: https://let.epubxp.com/i/206367

Contents of this Issue

Navigation

Page 36 of 43

TALKING POI NTS combine it in a useful way to get the insights you need. Criminal investigators and analysts need quicker and more accurate searching and querying across data sources (RMS, computer aided dispatch [CAD], gang or other intelligence databases, case files, Field Interview cards, link charts, emails, suspicious activity reports [SARs], FBI databases like ViCAP and NCIC, homeland security bulletins, Internet/open source-Flickr, Twitter, YouTube, Google, etc.) to identify leads, support investigative and intelligence activities, identify hot spots of activity, find patterns and trends across criminal incidents, etc. As part of this, it's important to be able to look at information geospatially and temporally, and find links and associations across all your data. One of the things often seen is a mismatch between what a software vendor says they will provide, and what the customers think they are getting. Don't get me wrong, I believe most vendors are honest, but the English language often leaves vast grey areas ripe for misinterpretation. You need access to all your data across silos, including all the good stuff that's in the text/report narrative. Missing data can mean the difference between catching the bad guy or not. And, you need real-time processing on all your information; there's no time to wait for IT to write a report to get data out of your RMS, or utilize pre-canned reports that give you information that might be a month old, or remember that there was some e-mail you got a month ago with a notice to look out Can data be made safely available to others outside your department and limited just to the specific data that those organizations or individuals should be seeing? for the same type of suspicious activity you're observing right now. You need to be able to immediately incorporate and utilize new information to help catch the bad guys faster. And, you need a way to share information securely with other departments or agencies, while ensuring civil liberties and privacy are protected. Is this even possible? One of the things I've often seen is a mismatch between what a software vendor says they will provide, and what the customers think they are getting. Don't get me wrong, I believe most vendors are honest, but the English language often leaves vast grey areas ripe for misinterpretation. I recommend that you KILLS BED BUGS DISINFECTS ® 800 359-4913 • STERIFAB.COM VIRICIDE BACTERICIDE SANITIZER FUNGICIDE INSECTICIDE DEODORANT GERMICIDE MILDEWCIDE BACTERIOSTATIC FUNGISTATIC KILLS DUST MITES COCKROACHES CAT FLEAS TICKS SALMONELLA CHOLERAESUIS PROTEUS MIRABILIS PSEUDOMONAS AERUGINOSA PENICILLIUM VARIABLE STAPHYLOCOCCUS AUREUS TRICHOPHYTON MENTAGROPHYTES INTERDIGITALE HERPES SIMPLEX II VACCINIA VIRUS ASPERGILLUS NIGER Circle 23 on Reader Service Card www.officer.com November 2013 Law Enforcement Technology 37

Articles in this issue

Links on this page

Archives of this issue

view archives of Law Enforcement Technology - NOV 2013