Crime Analysis and Intelligence Analysis Term Paper

Total Length: 2204 words ( 7 double-spaced pages)

Total Sources: 12

Page 1 of 7

" (Business Wire, 2007) Ms. Osborne states: "The potential of IxReveal is clear to me," Osborne stated, as "it will transform the capacity of law enforcement and homeland security agencies to more effectively analyze data and promote collaboration with fewer security risks." IxReveal "will be the mining tool that turns data into gold," she added, "by generating relevant insights and collaboration, rather than simply creating more work." (Business Wire, 2007) IxReveal is stated to be: "...a leading text analytics software company that transcends current search and business intelligence technologies. The company's solution-based products are unique in their capacity to transform large volumes of unstructured and structured data into actionable intelligence. IxReveal's award-winning product lines, uReveal (TM) and uReka (TM) (www.ureka.info),also allow researchers to collaboratively share concepts and findings. Clients include leading multinational corporations, financial institutions, law-enforcement agencies, universities, health organizations, and major federal agencies with data-intensive mandates in areas such as intelligence, security, finance, health-care, homeland security, and crime/fraud prevention." (Business Wire, 2007)

The work of Johnston (2005) entitled: "Analytic Culture in the U.S. Intelligence Community" defines intelligence as a "secret state of group activity to understand or influence foreign or domestic entities." (2005) Johnston defines 'intelligence analysis' as the "application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. " (2005) Johnston defines 'intelligence errors' as factual inaccuracies in analysis resulting from poor or missing data: intelligence failure is systemic organizational surprise resulting from incorrect, missing, discarded, or inadequate hypothesis." (2005) Johnson states that "secrecy and efficacy conflict." (2005) the reason given by Johnston is that secrecy "interferes with analytic effectiveness by limiting access to information and sources that may be necessary for accurate or predictive analysis.

Stuck Writing Your "Crime Analysis and Intelligence Analysis" Term Paper?

" (2005) Johnston claims that somewhere in the middle of "these two extremes, there is some notional point where secrecy and openness converge to create an optimal performance tradeoff." (2005)

GIS for Law Enforcement

GIS software makes use of geographical and computer-generated maps that interface for integration of and accessing "massive amounts of location-based information." (ESRI, 2007) the software enables law enforcement and criminal justice personnel to "effectively plan for emergency response, determine mitigation priorities, analyze historical events, and predict dire future events. GIS can also be used to get critical information to emergency responders upon dispatch or while en route to an incident to assist in tactical planning and response." (ESRI, 2007)

Homeland Security states as its' three primary objectives being to:

prevent future terrorist attacks;

reduce the nation's vulnerability; and minimize the damage and recovery from attacks that occur. (Chen and Wang, 2005)

Critical mission areas for Homeland Security have been identified as:

1) intelligence and warning;

2) border and transportation security;

3) Domestic Counterterrorism;

4)Protecting critical infrastructure and key assets;

5) defending against catastrophic terrorism; and 6) emergency-preparedness and responses. (Chen and Wang, 2005)

The Homeland Security Department highlights information sharing as the primary focus for the future.

SUMMARY and CONCLUSION

It is clear that future policing and homeland security initiatives will be greatly reliant upon information sharing in order to gain more effectiveness. The varying aspects of criminal intelligence, tactical intelligence and others are on the path to integration as evidenced by the literature reviewed in this report......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Crime Analysis And Intelligence Analysis" (2007, November 20) Retrieved May 11, 2024, from
https://www.aceyourpaper.com/essays/crime-analysis-intelligence-analysis-34137

Latest MLA Format (8th edition)

Copy Reference
"Crime Analysis And Intelligence Analysis" 20 November 2007. Web.11 May. 2024. <
https://www.aceyourpaper.com/essays/crime-analysis-intelligence-analysis-34137>

Latest Chicago Format (16th edition)

Copy Reference
"Crime Analysis And Intelligence Analysis", 20 November 2007, Accessed.11 May. 2024,
https://www.aceyourpaper.com/essays/crime-analysis-intelligence-analysis-34137