08 Nov 2019

Security & Investigation using incident and crime analytical mapping

Incident and crime mapping software is used to comprehend the big picture by viewing the analytics to search for the a syndicated threat or a distinct issue in theater and crime pattern.

A few experienced practitioners may venture further to identify and comprehend the pattern of crime or terror, the evolving formation of a syndicate, the structure of a syndicate or the syndicate networking in concert with others. Furthermore, taking this deeper by identifying the beginning of new crime, evolving copycat crime, who is involved, how are they involved, who is participating and why they are involved

Who collects the data

Security and Investigation Management success depends on the level of situational awareness of the people on the ground (decision-makers) and their reaction speed. When the people on the ground have no idea of what, where, how and why to seek and identify crime, then insufficient and unreliable information will recorded.

There is a difference between security and crime investigators. Crime investigators are called in after the incident. Security Investigators are also summoned after an incident, but, they do more. They have to uncover new crime, crime in theater that they are unaware of, or evolving copycat crime. Their biggest nightmare is not knowing what is truly happening on the ground, therefore, their knowledge and skill-sets are designed to identify where, how and why to find data, vet the known and uncover the unknown

Consequently, security and criminology knowledge along with the appropriate skill-sets are required to comprehend the narrative, dissect the narrative to know where to find and gather the information besides obtaining truthful and all-the-information.

Who knows how to use and understand the data

The investigation manager and the team needs to search the index of analytics by asking questions. They may not ask pertinent questions to comprehend the big picture because they did not believe the questions were relevant or they did not know what question to ask that would be highly relevant.

The security and criminology investigation manager knows that the knowledge of the structure of syndicated crime, culture of crime and methods gives indications on what to look for and how to identify such by asking the right questions.

Consequently, it is a thought pattern of critical thinking that needs to be mastered. Some may call it meta-thinking, design thinking, creative thinking, out-of-the-box thinking, but for criminology, security and risk investigation – it is called critical thinking. The research below in the manuscripts outline the character traits, the knowledge and the skill-sets that must be acquired to read the situation and the people involved.

The software may not be the problem – it is how the software is used, who uses the software besides, who actually knows how to understand the analytics and use the knowledge

Consequently, the analytic software will only be as good as the investigators on the ground that collects reliable and all-the-information. Furthermore, it is the data installers that must know what, how and why to code the data.

Data collection

There is a saying in the computer programming world, ‘’garbage in and garbage out’’. This describes the point that when insufficient, unreliable or contaminated information is inserted into the mapping software, then the results are garbage. One could have bought into the graphic design or the bells and whistles of the software, but it has no value when the information is unreliable, insufficient, tainted or the person that captures or codes the data or codes is uneducated.

Subsequently, the analytic software will only be as good as the information collected and analysed. Reading and understanding the data is reliant on knowledge and certain skill-sets, such as critical thinking situational awareness, knowledge of the location, the field of interest and the ability to ask the right questions. 

The issue is that all incidents that have been identified or occurred must be recorded. One may not realize the importance of recording some information or incident but, it may turn out to be very important to uncover a new new crime or assist in discovering a damning issue.

Solutions

Shortly, ISIO will be presenting suppliers of technology and software that is used in investigation today.

Today’s Master Investigator has evolved and must know that the threats are in line with the fast changing vulnerability landscape. Furthermore, technology is used to secure the evidence capture and handing over the custody of evidence. Consequently, the MI uses hybrid domain experts.

Tools

  • Tools [What you know]

All stakeholders should consider the easiest and most effective way (15 minutes a day) This is to critical think by priming and steering their thought pattern to read the situation and the people involved.

There may be instances when one has to out-think and outsmart the constantly thinking criminal and terrorist. This issue is that they may read the investigator better while the investigator is reading them, so how could an investigator obtain reliable information?

Further, included in the tool are guidance articles and manuscripts to know where and how to use the skill-craft

No alt text provided for this image
No alt text provided for this image
  • Interacting live with group meetings in-house or with like-minded practitioners [Who you know]

All of this knowledge, the skill-sets and more is shared in the 1-hour virtual group meetings.

HIM endorsed by ISIO and IFPO, hosts 1-hour virtual group meetings on distinct topics for all sectors based on security and criminology investigation management

No alt text provided for this image

The Knowledge

Reviews

No alt text provided for this image

By Prof. Rommel Manwong PhD, CST,CSP

This is a great resource manuscript – for sure!

By Dr Katerina Poustourli

An important addition to this field

By Jean-Pierre Roux MPhil

Cutting the fat and building the muscle in the security industry

Reviews

By Lawrence J. Fennelly

To all security managers I say, “it’s a must read”

By Orlando ‘’Andy’’ Wilson

With the spread of international organized crime this book is relevant whether you are working in Beijing, Bogota or Birmingham!

By Errol Peace

This is an exciting new approach to the investigation of crime, and very importantly to discovery of criminal activities.

Reviews

Critical Thinking the X Factor in Criminology, Security and Risk provides an in-depth source of knowledge and literature for criminologists, security and risk investigation practitioners. So far, it is the only material in this field that comprehensively discussed various specific techniques for all types of investigative works. The author (Juan Kirsten) took the initiative to lay down the ground rules for the modern and future investigators, analysts and field operators. This book is a must read! By Professor Rommel Manwong PhD

”I have found the way in which the training is the delivered and the transfer of learning to be very intuitive. By Dr Declan Garrett (based review on experiencing the training)DSyRM, MSc, H.Dip.Sec. Man, M.Sec.I.I. Training & Education

The approach of developing situational awareness is more important now than ever before. Being mindful and knowing how to evaluate someone’s behavior is a life skill that everyone should develop!By Dr Gavriel (Gav) Schneider FIS (SA), FGIA, FIML, AARPI, MAIPIO, CPP Doctor of Criminology (Security) Degree  (based review on using the tool)

ISIO is an International Brand for Security and Criminology in one. It promotes the highest standard for critical thinking, analysis, and investigation like no other group has thought of. Be part of ISIO and experience the difference!”

By Prof Rommel Manwong