Menu
Home
Log in / Register
 
Home arrow Law arrow Crime and intelligence analysis: an integrated real-time approach
Source

Step 3: Processing Stage

In examining the social media page, the analyst found no photos of actual people on the page, and no information indicating who the account belonged to. However, the analyst was able to locate a post from the previous year where the account holder referred to an actual “named person” as mom, and it was stated in a social medium posting that she would see “mom” on a street within the jurisdiction of the police agency in which the analyst worked.

The analyst now had an actual name to work with. The analyst was able to research that name in multiple databases and was able to locate a female with the same name who lived on the street mentioned in the social media posting. The analyst then researched the background of this female and found her to have two daughters.

In this step, the tactical analyst not only collected intelligence, but also processed it for relevance. It was found to be very relevant.

Step 4: Analysis Stage

The analyst researched both daughters and found one to have a local arrest history. The analyst also located a police-documented field interview form (FIF). This is a form in which a police officer documents street contacts they had during their shifts. The daughter was listed on the FIF, along with a male cousin of hers. The officer also documented on the FIF the male cousin’s prior local jail inmate number. The analyst researched the cousin’s history and found that he had spent five years in state prison for drug possession, and that he also had a violent arrest history.

The collected information was analyzed for relevance and converted into actual intelligence that could be used for investigative purposes.

Step 5: Dissemination Stage

The information collected and analyzed by the tactical analyst was enough to indicate to the analyst that the now-identified female with the social media account and the nickname Jeannie had a real name, and she had contact with individuals prone to violence and narcotics activity. With the collected and documented intelligence, the analyst created an intelligence product that also included a police jail photograph of the female taken from a previous local arrest. The analysis report was sent to the out-of-state police investigator.

The out-of-state investigator contacted the analyst and confirmed with her that the intelligence and identification was, in fact, the second murder suspect who had previously been known only by Jeannie. The investigator also confirmed that this female was also a major narcotics dealer in her state, thus further tying her into the drug-related double murder.

 
Source
Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Mathematics
Political science
Philosophy
Psychology
Religion
Sociology
Travel