Networks open to participants outside of law enforcement: the influence of local security partnerships on intelligence analysis

1975 ◽  
Vol 19 (2) ◽  
pp. 232-238
Author(s):  
Douglas H. Harris

Criminal intelligence is a law enforcement function that supports investigators, decision-makers, and policymakers in their attempt to prevent and control crime. This paper describes recent efforts to improve the effectiveness of criminal intelligence through the development and implementation of analytical methods. The intelligence analysis cycle is defined, programs to enhance analytical capabilities within law enforcement agencies are summarized, and a new computer-based program for intelligence analysis is described.


2016 ◽  
Vol 22 (1) ◽  
pp. 78-86
Author(s):  
Iulian Martin ◽  
Antonio Dan-Şuteu

Abstract The education and lifelong learning of the intelligence analysts will provide the right ingredients to evolve into incredible and increasingly operational environment characterized by uncertainty and complex challenges. Based on diagnosis of the current ways of education and training in the field of intelligence analysis, there seems to be only a few higher education programs that focuses exclusively on law enforcement intelligence community. Most education and training programs are based on intelligence courses that incorporate multidisciplinary topics and a broad theoretical approach to intelligence issues. An efficient program should not only educate students by enabling them to learn how to perform an intellectual process for having analytical products, but it should also train them by teaching them the structures, techniques, and procedures associated with the intelligence process.


2017 ◽  
Vol 24 (3) ◽  
pp. 393-411 ◽  
Author(s):  
Mark Lawrence Ashwell

Purpose The purpose of this paper is to highlight the potential of digital transformation and innovation opportunities for intelligence analysis. Its focus is the development of individuals to exploit data and information technologies to better understand and counter organised criminal networks. Design/methodology/approach The methodology adopted consisted of an extensive literature review and interview with practitioners in digital technology and transformation focused on intelligence, crime and terrorism, plus practical experience and field study. Findings Phenomena including the World Wide Web, social media and interconnectedness are influencing all aspects of human activity. Effective digital transformation, focusing on data, information technologies and people bestows significant competitive advantage upon those who have transformed. Applications are making previously complex processes and tasks easier for individuals to understand and exploit. An activity-based intelligence (ABI) model provides a platform for intelligence transformation. ABI provides a foundation from which to better fuse and share data to understand and resolve complex human (wicked) problems. To counter increasingly fast-moving organised crime networks, law enforcement needs to quickly transform. Originality/value This paper serves as a guide to alert and educate law enforcement professionals of the potential of digital transformation and associated evolving intelligence processes. It offers an appreciation of the nature of organisations, and the role of innovation within those organisation, required to better appreciate and tackle complex, human network challenges such as organised crime. It reveals the emergence and importance of an increasingly applications-based culture and the potential of this culture to simplify and exploit previously complex, expert-based processes.


2018 ◽  
Vol 7 (1) ◽  
pp. 95 ◽  
Author(s):  
Saurabh Singh ◽  
Shashikant Verma ◽  
Akhilesh Tiwari

Terrorist network analysis is vital for intelligence analysis and for deriving useful information from available raw data. Computer Science and Graph Theory provide instructive tools for the study and graphical interpretation of these networks. In this paper, we examine the 26/11 Mumbai attack terrorist network dataset and employ the Preference Ranking Organization Method for Enrichment of Evaluation (PROMETHEE) for identification of key node on the terrorist network. PROMETHEE is an effective multi-criteria decision-making model. It provides a framework to find the most suitable alternative by integrating the quantitative and qualitative factors to the decision problem and facilitates easy computation. From the 26/11 Mumbai attacks data set of terrorist network. It is found that out of several terrorists in the network “Wassi” was the focal actor. Based on the PROMETHEE framework, it is resolved that the obtained terrorist nodes can be instrumental for the intelligence and law enforcement agencies to confine their focus on important members of the terrorist network which can deter the functioning of these networks.


Author(s):  
Yu-Hao Lee ◽  
Norah E. Dunbar ◽  
Claude H. Miller ◽  
Elena Bessarabova ◽  
Matthew Jensen ◽  
...  

Making accurate, unbiased decisions is critical in high-stakes professions such as law enforcement, intelligence analysis, and medicine, since the decisions can have severe consequences. In this chapter, we discuss what makes persuasive games effective for training professionals to recognize their cognitive biases, improve their knowledge about decision-making biases, and learn ways of mitigating bias. We describe our experience designing three games for professional training in cognitive biases and deception detection. This chapter focuses on the combination of decisionmaking, education, and game theories that drives our design. This is then followed by a discussion of our experiments and measurements for testing the effectiveness of our designs.


Subject Bill C-59 and Canadian national security legislation. Significance Canada’s governing Liberals have introduced Bill C-59, omnibus national security legislation that promises to be the most significant overhaul of the national security and intelligence architecture since the creation of the Canadian Security and Intelligence Service (CSIS) in 1984. The proposed legislation follows through on a campaign promise by Prime Minister Justin Trudeau to remove unpopular elements from Bill C-51, a legacy of the Conservative government of former Prime Minister Stephen Harper that drew criticism on rights grounds for sweeping powers granted to law enforcement and intelligence to assiste counterterrorism efforts. Impacts Privacy concerns will be a persistent obstacle to Ottawa increasing cyber cooperation with the United States. The bureaucratic overhaul is likely to improve the efficacy of surveillance operations and intelligence analysis. China following through on its recent pledge not to hack Canadian commercial secrets probably depends on bilateral ties warming.


2018 ◽  
Vol 10 (4) ◽  
pp. 108-117 ◽  
Author(s):  
Xuan Zhang ◽  
KP Chow

This article describes how the Dark Web is usually considered the dark side of the World Wide Web. Cyber criminals usually use specialized tools, e.g. TOR, to access the hidden services inside the Dark Web anonymously. Law enforcement officers have difficulty tracing the identity of these cyber criminals using traditional network investigation techniques that are based on IP addresses. The information available in the Dark Web, which includes BitCoin wallets, email addresses, hyperlinks, images and user behavior profiles, can be used for further analysis, such as a correlation analysis. Present within this artcile is a threat intelligence analysis framework to help analyze the crimes and criminals in the Dark Web and the framework is realized by the implementation of the Dark Web Threat Intelligence Analysis (DWTIA) Platform.


Author(s):  
Douglas H. Harris

Criminal intelligence is a law-enforcement function that supports investigators, decision-makers, and policy-makers in their attempt to prevent and control crime. This paper describes recent efforts to enhance the capability of criminal intelligence analysts through the development and implementation of computer-based routines. The intelligence analysis cycle is defined, analytical concepts are discussed, and the development, features, and operation of the Organized Crime Analysis Program(*OCAP*) are described.


Author(s):  
H. M. Sagara ◽  
S. A. Schliebe ◽  
M. C. Kong

Particle analysis by scanning electron microscopy with energy-dispersive x- ray analysis is one of the current methods used in crime laboratories to aid law enforcement in identifying individuals who have recently fired or handled a firearm. During the discharge of a firearm, the high pressure caused by the detonation of the cartridge materials forces a portion of the generated gases through leaks in the firing mechanism of the weapon. These gases contain residues of smokeless powder, primer mixture, and contributions from the projectile itself. The condensation of these hot gases form discrete, micrometer-sized particles, which can be collected, along with dry skin cells, salts, and other hand debris, from the hands of a shooter by a simple adhesive lift technique. The examination of the carbon-coated adhesive lifts consist of time consuming systematic searches for high contrast particles of spherical morphology with the characteristic elemental composition of antimony, barium and lead. A detailed list of the elemental compositions which match the criteria for gunshot residue are discussed in the Aerospace report.


Sign in / Sign up

Export Citation Format

Share Document