October 16, 2009 in California
San Diego Police Department
- 55 pages
- Law Enforcement Sensitive
- September 21, 2009
• What happens when an investigator leaves the unit…? Information goes with him!
• We are missing a boat load of data – Wire Conversations, Pen Registers, LPR…
• Lack the ability to data mine
IN EFFECT WE ARE DATA RICH BUT INFORMATION POOR
• Strategic Intelligence: Helps decision makers define a vision and hold managers accountable.
• Operational Intelligence: Gives managers adequate information to develop operational plans and adjust resources.
• Tactical Intelligence: Allows line personnel the ability to focus their efforts on solving problems and targeting the right people.
• Pen Registers: Hundreds of phone numbers, times, dates and locations
• Intercepts: Conversations, names, location, key words, language
• MySpace, Facebook, Bebo, Know Gangs,
• Cell phone downloader
• CCTV (Multiple sources)
• ISYS: Searches all CRMS reports, F.I.’s, Arrests, in a Google search format
• PD Intel Database: A custom built intelligence database that allows detectives to access all CI debriefings in a searchable format. (being built)
• CalGang, Gangnet, RISS, COPLink, NIN
• GIS Mapping Systems
• Hot Spot Identification
• Series Identification
• Research Environmental Criminology
• Develop visual representations of crime problems
• Research expert into what works
• Statistical probability
• Not a crime accounting unit!
• Hundreds of sources: Media (Papers, TV, Cable, Industry Associations)
• Academic Papers: DOJ, Cal DOJ, PERF
• Other Governments: Home Office, Australia, New Zealand (ILP) and others
Related Material From the Archive:
- Office of the Director of National Intelligence Data Mining Report
- Low Probability Cartel Violence Will Affect Seven County Area in Near Term
- Evaluation of the Programme for Mainstreaming Gender in Poverty Reduction in Asia
- The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress
- Côte d’Ivoire Interim Poverty Reduction Strategy Paper
- NSA Using Cloud Model For Intelligence Sharing
- FMI 2-22.9: Open Source Intelligence
- Unauthorized Disclosures, Security Violations, and Other Compromises of Intelligence Information