SlideShare a Scribd company logo
Analytic Information
Data Exchange
TIM COLLINS
MOTOROLA SOLUTIONS
JULY 30, 2014
BRING UNCONNECTED DATA TOGETHER TO CREATE MORE
INTELLIGENT AND ACTIONABLE INFORMATION
Create a solution which allows police departments to increase
the number of criminal cases solved
Connect government information to uncover criminal
relationships
Create an advanced intelligent policing solution which will
provide law enforcement with criminal insights and a
geographic guide to uncover criminal hot spots
OUR GOAL
© 2014 Motorola Solutions, Inc.
Source: The Metropolitan Washington Council of Governments’ (MWCOG) Annual Report on Crime & Crime Control: 2011
http://www.mwcog.org/uploads/pub-documents/oF5dXFY20120912145153.pdf
METROPOLITAN WASHINGTON COG
2011 ANNUAL CRIME REPORT
Property crime
makes up 87% of
MWCOG crime
Budget pressures are
having an impact on
resources available to
fight crime
PERCENTAGE OF CRIMES
SOLVED NATIONWIDE
• A high % of property crimes
are not being solved
• Property crimes lead to
gateway crimes
• This has a serious effect on
safety and the local
communities
12.7
21.5
11.9
28.7
41.2
56.9
64.8
0
10
20
30
40
50
60
70
Property Crime Violent Crime Source: FBI 2011 uniform report
CRIMINALS TAKE ADVANTAGE OF GEOPOLITICAL
BOUNDARIES
CRIMINAL ACTIVITY CROSSES
GEOGRAPHIC BOUNDARIES
Polk County
03:28:95
Bob Jones
DOB 11:20:59
Sally Smith
DOB 05:09:77
555-1212
Bob Jones
Speeding
Karen Nash
DOB 03:28:82
ENABLE SAFER CITIES, THRIVING COMMUNITIES
ELIMINATE BOUNDARIES WITH
MULTI-JURISDICTIONAL DATA
Polk County
03:28:95
Bob Jones
DOB 11:20:59
Sally Smith
DOB 05:09:77
555-1212
Bob Jones
Speeding
Karen Nash
DOB 03:28:82
POLICE DATA CHALLENGES
• Resources are becoming more
budget constrained
• Outdated information hidden in
multiple places
• Public and private databases
are not connected
• Inability for agencies and
retailers to share information
securely
• Criminals are becoming more
sophisticated
8
COST OF PROPERTY CRIME
Source:
NRF presentation at NEORCA Symposium
September 19, 2013
ORGANIZED RETAIL CRIME
LEADS TO:
• Drugs
• Murder
• Gangs
• Terrorism
• Prostitution
• Identity Theft
9
INTELLIGENT LED INVESTIGATION
EXAMPLE: ESTABLISH WHO A FENCE IS
• Private enterprise case
management system initiates
investigation (ALPR, images,
address, etc.)
DATABASES
Private Public (Federal/Local) Open
Hot Items
Court Records(civil,
criminal,
probate,bankruptcy)
Marriage /Divorce
Employee Criminal history
Phone numbers and
address
Suspect photo Arrest Records Bankruptcy
Suspect Description Business license Fraud
Credit Card Business assets Social Media
Address Bankruptcy Crimestoppers
Shrinkage Scars, marks, tattoos Facial recog
Plate number Blueline(PS social) Neighbors
Warrants New articles
Traffic
Public records
(Clerk, Library, Post
Office)
Data Source Used
10
INTELLIGENT LED INVESTIGATION
EXAMPLE: ESTABLISH WHO A FENCE IS
• Private enterprise case
management system initiates
investigation (ALPR, images,
address, etc.)
• Public records used to
determine business viability,
ownership, violations,
permits, etc.
• Open sources used to
corroborate names, phone
numbers, relationships,
proceeds, etc.
Private Public (Federal/Local) Open
Hot Items Court Records(civil,
criminal,
probate,bankruptcy)
Marriage /Divorce
Employee Criminal history Phone numbers and
address
Suspect
(photo,plates) Arrest Records
Bankruptcy
Height, weight, sex,
items taken) Business license
Fraud
Credit Card Business assets Social Media
Address Bankruptcy Crimestoppers
Shrinkage Scars, marks, tattoos Facial recog
Blueline(PS social) Neighbors
Warrants New articles
Traffic Public records
(Clerk, Library, Post
Office)
Data Source Used
DATABASES
11
INTELLIGENT LED INVESTIGATION
EXAMPLE: ESTABLISH WHO A FENCE IS
• Private enterprise case
management system initiates
investigation (ALPR, images,
address, etc.)
• Public records used to
determine business viability,
ownership, violations,
permits, etc.
• Open sources used to
corroborate names, phone
numbers, relationships,
proceeds, etc.
Private Public (Federal/Local) Open
Hot Items Court Records(civil,
criminal,
probate,bankruptcy)
Marriage /Divorce
Employee Criminal history Phone numbers and
address
Suspect
(photo,plates) Arrest Records
Bankruptcy
Height, weight, sex,
items taken) Business license
Fraud
Credit Card Business assets Social Media
Address Bankruptcy Crimestoppers
Shrinkage Scars, marks, tattoos Facial recog
Blueline(PS social) Neighbors
Warrants New articles
Traffic Public records
(Clerk, Library, Post
Office)
Data Source Used
DATABASES
12
INTELLIGENT LED INVESTIGATION
EXAMPLE: ESTABLISH WHO A FENCE IS
• Currently it is difficult to
initiate/build successful cases
• Multiple databases needed
• Databases are not connected
Private Public (Federal/Local) Open
Hot Items
Court Records(civil,
criminal,
probate,bankruptcy)
Marriage /Divorce
Employee Criminal history
Phone numbers and
address
Suspect photo Arrest Records Bankruptcy
Suspect Description Business license Fraud
Credit Card Business assets Social Media
Address Bankruptcy Crimestoppers
Shrinkage Scars, marks, tattoos Facial recog
Plate number Blueline(PS social) Neighbors
Warrants New articles
Traffic
Public records
(Clerk, Library, Post
Office)
Data Source Used
DATABASES
Public and private data across
jurisdictions, cities and states results in
more criminal activity being uncovered
© 2014 Motorola Solutions, Inc.
3 MINS
CRIMINAL INVESTIGATIONS
3 MONTHS
CURRENT AFTER
© 2014 Motorola Solutions, Inc.Data Sharing Increases Situational Awareness
Incident Beat
Agency
Gang Association
Location
Vehicle Model
Vehicle Plate
Offense Category
Offense Description
Offense Statute
Public Safety
Filters
10
120
74
95
CRIMINAL ACTIVITY SEARCH
ANALYTIC INTELLIGENT DATA EXCHANGE MAKES
DETECTIVES LIVES EASIER
15
HOW DATA EXCHANGE
CHANGES INVESTIGATIONS
BEFORE
AFTER
Officers
Phone &
Email
Public/Private
Databases
• Long and tedious process
• Questions answered in
days to weeks
• Data potentially insecure
• Streamlined process
• Questions answered in
minutes
• Information protected
DATA SHARING SOLUTION
• Bring multiple data sources
together
• Free up people to spend time
analyzing the data
• Make government more
efficient and collaborative
• Encourage economic
development through safer
communities
ALLOWS POLICE TO SHARE DATA PERTINENT TO
CRIMINAL INVESTIGATIONS
HIGH LEVEL CONCEPTUAL
DIAGRAM
Public
Safety
CJIS +
De-confliction
Analytics
Local Police
RMS/
Databases
State RMS/
DatabasesState RMS/
Databases
Fusion
Centers
Private Data
Systems
Geographic
Information
Open Data
Systems
State RMS/
DatabasesState RMS/
DatabasesState RMS/
Databases
State RMS/
DatabasesState RMS/
DatabasesFederal
Databases
CJIS SECURITY POLICY
• Information is powerful—
it needs to be secured
• Data lifecycle controls
• CJI data handling
guidelines
• Applies to everyone
19
PROPOSED APPROACH
• Create CJIS compliant national data
sharing infrastructure
• Partner with public and private data
suppliers
• Partner with leading law enforcement
agencies, NARC & COG’s across
nation
• A platform for making connections
across the nation
• Enhance analytics by enabling
additional analytic algorithm partners
20

More Related Content

What's hot

FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14
Kerri Lorch
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
 
Sheehan Law, PLLC by Farren Sheehan on Citymaps
Sheehan Law, PLLC by Farren Sheehan on CitymapsSheehan Law, PLLC by Farren Sheehan on Citymaps
Sheehan Law, PLLC by Farren Sheehan on Citymaps
AblazeExistence020
 
2016 Cyber Presentation
2016 Cyber Presentation2016 Cyber Presentation
2016 Cyber Presentation
Todd Rowe
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
How the Police Can Take Your Cash and Never Charge You With a Crime
How the Police Can Take Your Cash and Never Charge You With a CrimeHow the Police Can Take Your Cash and Never Charge You With a Crime
How the Police Can Take Your Cash and Never Charge You With a Crime
Evergreen Buzz
 
MADWD - Opendata in crime and justice
MADWD - Opendata in crime and justiceMADWD - Opendata in crime and justice
MADWD - Opendata in crime and justice
Mypolice
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
Colin Bartram
 
Public Safety - Canada - March 2017
Public Safety - Canada - March 2017Public Safety - Canada - March 2017
Public Safety - Canada - March 2017
paul young cpa, cga
 
Public safety - Canada
Public safety - Canada Public safety - Canada
Public safety - Canada
paul young cpa, cga
 

What's hot (10)

FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14FADV_Its a Crime Guide 4 09 25 14
FADV_Its a Crime Guide 4 09 25 14
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
 
Sheehan Law, PLLC by Farren Sheehan on Citymaps
Sheehan Law, PLLC by Farren Sheehan on CitymapsSheehan Law, PLLC by Farren Sheehan on Citymaps
Sheehan Law, PLLC by Farren Sheehan on Citymaps
 
2016 Cyber Presentation
2016 Cyber Presentation2016 Cyber Presentation
2016 Cyber Presentation
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
How the Police Can Take Your Cash and Never Charge You With a Crime
How the Police Can Take Your Cash and Never Charge You With a CrimeHow the Police Can Take Your Cash and Never Charge You With a Crime
How the Police Can Take Your Cash and Never Charge You With a Crime
 
MADWD - Opendata in crime and justice
MADWD - Opendata in crime and justiceMADWD - Opendata in crime and justice
MADWD - Opendata in crime and justice
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Public Safety - Canada - March 2017
Public Safety - Canada - March 2017Public Safety - Canada - March 2017
Public Safety - Canada - March 2017
 
Public safety - Canada
Public safety - Canada Public safety - Canada
Public safety - Canada
 

Viewers also liked

Dasar dasar komputer
Dasar dasar komputerDasar dasar komputer
Dasar dasar komputer
Dikyritiduian
 
Resume_of_Design
Resume_of_DesignResume_of_Design
Resume_of_Design
henil ghedia
 
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_social
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_socialDurkheim grandes cientistas_sociais_divis�o_do_trabalho_social
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_social
Aline de Andrade
 
Moción urgente metro julio 2016
Moción urgente metro    julio 2016Moción urgente metro    julio 2016
Moción urgente metro julio 2016
Grupo PP Ayuntamiento de Málaga
 
Historia de farmacologia
Historia de farmacologiaHistoria de farmacologia
Historia de farmacologia
Julisa Gonzalez
 
Tik (pertemuan 1 dan 2) for Class X in high school
Tik (pertemuan 1 dan 2) for Class X in high schoolTik (pertemuan 1 dan 2) for Class X in high school
Tik (pertemuan 1 dan 2) for Class X in high school
Arie Rahadiansyah
 
Mediterranean diet
Mediterranean dietMediterranean diet
Mediterranean diet
Conestoga Valley High School
 
Dasar dasar komputer
Dasar dasar komputerDasar dasar komputer
Dasar dasar komputer
Dikyritiduian
 
Taller de power point 1 y 2
Taller de power point 1 y 2Taller de power point 1 y 2
Taller de power point 1 y 2
humbertocano034
 
Enfermedades inmunes
Enfermedades inmunesEnfermedades inmunes
Enfermedades inmunes
yaelizabeth
 
Moción Derechos Sociales Comisión de Pleno de enero 2016
Moción Derechos Sociales Comisión de Pleno de enero 2016Moción Derechos Sociales Comisión de Pleno de enero 2016
Moción Derechos Sociales Comisión de Pleno de enero 2016
Grupo PP Ayuntamiento de Málaga
 
MelissaPruitt MarineQuest Portfolio
MelissaPruitt MarineQuest PortfolioMelissaPruitt MarineQuest Portfolio
MelissaPruitt MarineQuest Portfolio
Melissa Pruitt
 
1 historia de la farmacología
1   historia de la farmacología1   historia de la farmacología
1 historia de la farmacología
Hamilton DL
 
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENTNEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
László Árvai
 
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
V i P Consulting Group - Brand Building, Exclusive Luxury Branding Strategy Lectures, Branding Events, Charity Branding
 
Marketo Partner Engagement webinar - API Integration
Marketo Partner Engagement webinar - API IntegrationMarketo Partner Engagement webinar - API Integration
Marketo Partner Engagement webinar - API Integration
Sharleen Tuite
 
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
V i P Consulting Group - Brand Building, Exclusive Luxury Branding Strategy Lectures, Branding Events, Charity Branding
 
Citoesqueleto ppt
Citoesqueleto pptCitoesqueleto ppt
Citoesqueleto ppt
Renato Machado
 

Viewers also liked (19)

Dasar dasar komputer
Dasar dasar komputerDasar dasar komputer
Dasar dasar komputer
 
Resume_of_Design
Resume_of_DesignResume_of_Design
Resume_of_Design
 
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_social
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_socialDurkheim grandes cientistas_sociais_divis�o_do_trabalho_social
Durkheim grandes cientistas_sociais_divis�o_do_trabalho_social
 
Moción urgente metro julio 2016
Moción urgente metro    julio 2016Moción urgente metro    julio 2016
Moción urgente metro julio 2016
 
Historia de farmacologia
Historia de farmacologiaHistoria de farmacologia
Historia de farmacologia
 
Tik (pertemuan 1 dan 2) for Class X in high school
Tik (pertemuan 1 dan 2) for Class X in high schoolTik (pertemuan 1 dan 2) for Class X in high school
Tik (pertemuan 1 dan 2) for Class X in high school
 
Mediterranean diet
Mediterranean dietMediterranean diet
Mediterranean diet
 
Dasar dasar komputer
Dasar dasar komputerDasar dasar komputer
Dasar dasar komputer
 
Taller de power point 1 y 2
Taller de power point 1 y 2Taller de power point 1 y 2
Taller de power point 1 y 2
 
Enfermedades inmunes
Enfermedades inmunesEnfermedades inmunes
Enfermedades inmunes
 
Moción Derechos Sociales Comisión de Pleno de enero 2016
Moción Derechos Sociales Comisión de Pleno de enero 2016Moción Derechos Sociales Comisión de Pleno de enero 2016
Moción Derechos Sociales Comisión de Pleno de enero 2016
 
MelissaPruitt MarineQuest Portfolio
MelissaPruitt MarineQuest PortfolioMelissaPruitt MarineQuest Portfolio
MelissaPruitt MarineQuest Portfolio
 
1 historia de la farmacología
1   historia de la farmacología1   historia de la farmacología
1 historia de la farmacología
 
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENTNEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
NEW STANDARDS ON ASSET SERVICING AND LIQUIDITY MANAGEMENT
 
Bruner發現學習論
Bruner發現學習論Bruner發現學習論
Bruner發現學習論
 
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
02 Brand Consultancy The Facebook Marketing For Luxury Brands Emily Yt Chen09...
 
Marketo Partner Engagement webinar - API Integration
Marketo Partner Engagement webinar - API IntegrationMarketo Partner Engagement webinar - API Integration
Marketo Partner Engagement webinar - API Integration
 
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
02_Brand Consultancy_Burberry By Emily Chen, Oct 06 2009 With Comments Of Pro...
 
Citoesqueleto ppt
Citoesqueleto pptCitoesqueleto ppt
Citoesqueleto ppt
 

Similar to Analytic Information Data Exchange

How scanning and digitizing police records help fight crimes at the earliest (1)
How scanning and digitizing police records help fight crimes at the earliest (1)How scanning and digitizing police records help fight crimes at the earliest (1)
How scanning and digitizing police records help fight crimes at the earliest (1)
Managed Outsource Solutions
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
Neo4j
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
Cellebrite
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
ouldparis
 
Introduction to chicago crime data with hive and pig
Introduction to chicago crime data with hive and pigIntroduction to chicago crime data with hive and pig
Introduction to chicago crime data with hive and pig
Gregg Barrett
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
Heta Parekh
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
National Crime Prevention Council
 
Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docx
makdul
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
webb00704
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
Case IQ
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
whbrown5
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Steve Werby
 
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer WebinarCollecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Michael Riedijk
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
christiandean12115
 
Taylor2 ppt ch3
Taylor2 ppt ch3Taylor2 ppt ch3
Taylor2 ppt ch3
SUNY Ulster
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Shawn Tuma
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
Tracy Clark
 
A Public Safety Organisation
A Public Safety OrganisationA Public Safety Organisation
A Public Safety Organisation
IBM Big Data and Analytics UK
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
Norman W. Mayes, CISSP, MCSE, ITIL
 

Similar to Analytic Information Data Exchange (20)

How scanning and digitizing police records help fight crimes at the earliest (1)
How scanning and digitizing police records help fight crimes at the earliest (1)How scanning and digitizing police records help fight crimes at the earliest (1)
How scanning and digitizing police records help fight crimes at the earliest (1)
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Introduction to chicago crime data with hive and pig
Introduction to chicago crime data with hive and pigIntroduction to chicago crime data with hive and pig
Introduction to chicago crime data with hive and pig
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Collecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer WebinarCollecting Social Media as Digital Evidence - PageFreezer Webinar
Collecting Social Media as Digital Evidence - PageFreezer Webinar
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
 
Taylor2 ppt ch3
Taylor2 ppt ch3Taylor2 ppt ch3
Taylor2 ppt ch3
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
A Public Safety Organisation
A Public Safety OrganisationA Public Safety Organisation
A Public Safety Organisation
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 

Analytic Information Data Exchange

  • 1. Analytic Information Data Exchange TIM COLLINS MOTOROLA SOLUTIONS JULY 30, 2014
  • 2. BRING UNCONNECTED DATA TOGETHER TO CREATE MORE INTELLIGENT AND ACTIONABLE INFORMATION Create a solution which allows police departments to increase the number of criminal cases solved Connect government information to uncover criminal relationships Create an advanced intelligent policing solution which will provide law enforcement with criminal insights and a geographic guide to uncover criminal hot spots OUR GOAL
  • 3. © 2014 Motorola Solutions, Inc. Source: The Metropolitan Washington Council of Governments’ (MWCOG) Annual Report on Crime & Crime Control: 2011 http://www.mwcog.org/uploads/pub-documents/oF5dXFY20120912145153.pdf METROPOLITAN WASHINGTON COG 2011 ANNUAL CRIME REPORT Property crime makes up 87% of MWCOG crime Budget pressures are having an impact on resources available to fight crime
  • 4. PERCENTAGE OF CRIMES SOLVED NATIONWIDE • A high % of property crimes are not being solved • Property crimes lead to gateway crimes • This has a serious effect on safety and the local communities 12.7 21.5 11.9 28.7 41.2 56.9 64.8 0 10 20 30 40 50 60 70 Property Crime Violent Crime Source: FBI 2011 uniform report
  • 5. CRIMINALS TAKE ADVANTAGE OF GEOPOLITICAL BOUNDARIES CRIMINAL ACTIVITY CROSSES GEOGRAPHIC BOUNDARIES Polk County 03:28:95 Bob Jones DOB 11:20:59 Sally Smith DOB 05:09:77 555-1212 Bob Jones Speeding Karen Nash DOB 03:28:82
  • 6. ENABLE SAFER CITIES, THRIVING COMMUNITIES ELIMINATE BOUNDARIES WITH MULTI-JURISDICTIONAL DATA Polk County 03:28:95 Bob Jones DOB 11:20:59 Sally Smith DOB 05:09:77 555-1212 Bob Jones Speeding Karen Nash DOB 03:28:82
  • 7. POLICE DATA CHALLENGES • Resources are becoming more budget constrained • Outdated information hidden in multiple places • Public and private databases are not connected • Inability for agencies and retailers to share information securely • Criminals are becoming more sophisticated
  • 8. 8 COST OF PROPERTY CRIME Source: NRF presentation at NEORCA Symposium September 19, 2013 ORGANIZED RETAIL CRIME LEADS TO: • Drugs • Murder • Gangs • Terrorism • Prostitution • Identity Theft
  • 9. 9 INTELLIGENT LED INVESTIGATION EXAMPLE: ESTABLISH WHO A FENCE IS • Private enterprise case management system initiates investigation (ALPR, images, address, etc.) DATABASES Private Public (Federal/Local) Open Hot Items Court Records(civil, criminal, probate,bankruptcy) Marriage /Divorce Employee Criminal history Phone numbers and address Suspect photo Arrest Records Bankruptcy Suspect Description Business license Fraud Credit Card Business assets Social Media Address Bankruptcy Crimestoppers Shrinkage Scars, marks, tattoos Facial recog Plate number Blueline(PS social) Neighbors Warrants New articles Traffic Public records (Clerk, Library, Post Office) Data Source Used
  • 10. 10 INTELLIGENT LED INVESTIGATION EXAMPLE: ESTABLISH WHO A FENCE IS • Private enterprise case management system initiates investigation (ALPR, images, address, etc.) • Public records used to determine business viability, ownership, violations, permits, etc. • Open sources used to corroborate names, phone numbers, relationships, proceeds, etc. Private Public (Federal/Local) Open Hot Items Court Records(civil, criminal, probate,bankruptcy) Marriage /Divorce Employee Criminal history Phone numbers and address Suspect (photo,plates) Arrest Records Bankruptcy Height, weight, sex, items taken) Business license Fraud Credit Card Business assets Social Media Address Bankruptcy Crimestoppers Shrinkage Scars, marks, tattoos Facial recog Blueline(PS social) Neighbors Warrants New articles Traffic Public records (Clerk, Library, Post Office) Data Source Used DATABASES
  • 11. 11 INTELLIGENT LED INVESTIGATION EXAMPLE: ESTABLISH WHO A FENCE IS • Private enterprise case management system initiates investigation (ALPR, images, address, etc.) • Public records used to determine business viability, ownership, violations, permits, etc. • Open sources used to corroborate names, phone numbers, relationships, proceeds, etc. Private Public (Federal/Local) Open Hot Items Court Records(civil, criminal, probate,bankruptcy) Marriage /Divorce Employee Criminal history Phone numbers and address Suspect (photo,plates) Arrest Records Bankruptcy Height, weight, sex, items taken) Business license Fraud Credit Card Business assets Social Media Address Bankruptcy Crimestoppers Shrinkage Scars, marks, tattoos Facial recog Blueline(PS social) Neighbors Warrants New articles Traffic Public records (Clerk, Library, Post Office) Data Source Used DATABASES
  • 12. 12 INTELLIGENT LED INVESTIGATION EXAMPLE: ESTABLISH WHO A FENCE IS • Currently it is difficult to initiate/build successful cases • Multiple databases needed • Databases are not connected Private Public (Federal/Local) Open Hot Items Court Records(civil, criminal, probate,bankruptcy) Marriage /Divorce Employee Criminal history Phone numbers and address Suspect photo Arrest Records Bankruptcy Suspect Description Business license Fraud Credit Card Business assets Social Media Address Bankruptcy Crimestoppers Shrinkage Scars, marks, tattoos Facial recog Plate number Blueline(PS social) Neighbors Warrants New articles Traffic Public records (Clerk, Library, Post Office) Data Source Used DATABASES Public and private data across jurisdictions, cities and states results in more criminal activity being uncovered
  • 13. © 2014 Motorola Solutions, Inc. 3 MINS CRIMINAL INVESTIGATIONS 3 MONTHS CURRENT AFTER
  • 14. © 2014 Motorola Solutions, Inc.Data Sharing Increases Situational Awareness Incident Beat Agency Gang Association Location Vehicle Model Vehicle Plate Offense Category Offense Description Offense Statute Public Safety Filters 10 120 74 95 CRIMINAL ACTIVITY SEARCH
  • 15. ANALYTIC INTELLIGENT DATA EXCHANGE MAKES DETECTIVES LIVES EASIER 15 HOW DATA EXCHANGE CHANGES INVESTIGATIONS BEFORE AFTER Officers Phone & Email Public/Private Databases • Long and tedious process • Questions answered in days to weeks • Data potentially insecure • Streamlined process • Questions answered in minutes • Information protected
  • 16. DATA SHARING SOLUTION • Bring multiple data sources together • Free up people to spend time analyzing the data • Make government more efficient and collaborative • Encourage economic development through safer communities
  • 17. ALLOWS POLICE TO SHARE DATA PERTINENT TO CRIMINAL INVESTIGATIONS HIGH LEVEL CONCEPTUAL DIAGRAM Public Safety CJIS + De-confliction Analytics Local Police RMS/ Databases State RMS/ DatabasesState RMS/ Databases Fusion Centers Private Data Systems Geographic Information Open Data Systems State RMS/ DatabasesState RMS/ DatabasesState RMS/ Databases State RMS/ DatabasesState RMS/ DatabasesFederal Databases
  • 18. CJIS SECURITY POLICY • Information is powerful— it needs to be secured • Data lifecycle controls • CJI data handling guidelines • Applies to everyone
  • 19. 19 PROPOSED APPROACH • Create CJIS compliant national data sharing infrastructure • Partner with public and private data suppliers • Partner with leading law enforcement agencies, NARC & COG’s across nation • A platform for making connections across the nation • Enhance analytics by enabling additional analytic algorithm partners
  • 20. 20