IACA Resource Center

Welcome to the IACA resource center. All resources such as jobs, articles, books, tips & tricks and software are here. Choose an item from below or a category from the right. IACA members can not only view but comment on resources (members must be logged in to comment).

First | Previous | 5 | 6 | 7 | 8 | 9 | [ 10 ] | 11 | 12 | 13 | 14 | Next | Last ( 432 Resources)


Reviving The Cold Case: An Analytical Approach To Case Closure (Article)

Dobbs, Mark R. and Michael T. Voss (2009). Crime analysts are always trying to find new ways to apply their skills and hone their craft. The vast majority of us are thinkers; we are curious problem solvers who believe that our ability to benefit our agencies is limited only by the latitude we are given. It is understandable then that we should seek out more opportunities to apply our skills and make more positive impacts within our jurisdictions. It is this general attitude that led us to get involved in investigating cold cases.

Transitioning to Office 2007 - Where'd That Button Go? (Tip)

So IT just loaded Office 2007 on your computer, and you have no idea what this ribbon thingy is? Having trouble finding a particular button in an Office 2007 program? No problem!

This site contains an Excel workbook for each Office application that lists the old location and the new location for every feature:


Each tab represents a menu in Office 2003. Go to a tab, look for the feature on the left, and it will tell you where to find that feature in Office 2007. Very handy reference for learning Office 2007!

Police Crime Analyst Uses New Programs (Success Stories)

…the department crime analyst now has new computer programs to pinpoint high-crime areas, which are immediately fed into a laptop in a patrol car. Officers can find on-screen warrant information, the Return Home Registry for missing persons, where active parolees live and up-to-date crime bulletins. "Previously, officers got all of their information in briefing," Sellers said. "But when it's on the computer, it's in their face."

GPD Crime Analyst, Student are Honored (Success Stories)

A crime analyst at the Gainesville Police Department was honored for her dedication to an international professional association….

CRIMEMAP (Email List)

This group is the updated forum from the old Crime Mapping listserv. It reflects the changes and advancements in the field over the last 10 years to include visualization, statistical analysis and the respective geographic principles and theories.. Host Organization: Crime Mapping Research Center. Contact:

Custom Time Range Function For Excel (Article)

Steve Miller, Ventura County Sheriff's Dept (2010). This PDF explains how to create a custom Excel function that converts time to a range (i.e. 5:20 becomes 5:00 to 6:00).

Rounded Time and Range (Tip)

If you have a time in Excel and want a time range that respects 24-hour format time, here is a custom function. Tested in Excel 2000 and 2003.

if you need help adding the code to Excel, please see the related article here: http://www.iaca.net/Articles.asp?AID=95

Rem TimeRange - return a time +/- the number of hours from a specified time
Rem Parameters:
Rem intime - the base time
Rem hrange - the value to add and subtract to get the time range
Function TimeRange(intime As Date, hrange As Integer) As String
Dim ret As String
Dim h As Integer 'Hour of intime, beginning of the time range
Dim range_end As Integer 'High end of the range
' Calculate range start
h = Hour(intime) 'Get the hour from the base time to use as the range's starting time (we don't really need the minutes)
str_h = Trim(Str(h)) 'Convert hour to a string
If Len(str_h) = 1 Then str_h = "0" & str_h 'Make sure starting hour is 2 digits (so mornings < 10 AM have a leading 0)
'Calculate range end
range_end = h + hrange
If range_end > 24 Then range_end = range_end - 24 'Wrap the hour around to the next day if it exceeds midnight
st_range_end = Trim(Str(range_end))
If Len(st_range_end) = 1 Then st_range_end = "0" & st_range_end 'Make sure ending hour is 2 digits (so mornings < 10 AM have a leading zero)
ret = str_h & ":00 to " & st_range_end & ":00" 'Construct the string with the time range
TimeRange = ret
End Function

Police Investigation: Importance In A Globalized World (Article)

HERBERT GONÇALVES ESPUNY (2008). This article deals with the importance of the criminal investigation in the context of a globalized world.

Schedule Access Macros to Run While You Sleep (Tip)

The tip below will allow you to automatically run a macro in Microsoft Access. While you can automatically run a macro when Access opens just by naming it autoexec (see http://www.iaca.net/AnalystToolbox.asp?TID=106) , the approach described here allows you to run a macro by any name. Best of all, you can schedule it to run whenever you want!

1) Create a macro in Access and add whatever actions you want to run.
2) Make sure that the very first action is SetWarnings = Off. In Access 2007, you must make sure the database is in a trusted location, then click the "Show All Actions" button from the design tab before the Set Warnings action will be available to use in a macro.
3) Make sure the last two actions are SetWarnings = On, followed by Exit.
4) Also remove any MsgBox actions if you have them.
5) Open Notepad and enter the following code:

cd\Program Files\Microsoft Office\Office11
Msaccess.exe C:\MyFolder\MyDatabase.mdb /x MyMacro

Where C:\MyFolder is the location of the database, MyDatabase is the name of the database, and MyMacro is the name of the macro within the database.

If the database is on a server share, you would use something like this:

Z:\MyServerFolder\ MyDatabase.mdb /x MyMacro (if the Z drive is mapped)


\\CityServer1\Police\ MyServerFolder\ MyDatabase.mdb /x MyMacro (if there is not a mapped drive)

6) In Notepad, go to File | Save As. Change the “Save as type” to ‘All Files’ and name the file with a .’bat’ extension. For example, “MyImporter.bat” or “Scheduler.bat”. You do not have to save the file in the same folder, but it need to be on the same drive.
7) Almost done! At this point, you can double click the batch file (*.bat) to open Access, run the macro, and exit. There is one final step to automate it – you need to schedule a task which calls the batch file, which in turn calls the Access Macro.
8) Open Windows Task Scheduler (Start | Programs | Accessories | System Tools | Scheduled Tasks).
9) Create a new task. When prompted to choose the program to run, click the browse button and browse to the bat file you just created. Specify a run time & frequency.
10) That’s it! On the day(s) and time(s) specified in the task, the batch file will open Access and fire off the macro, and then everything will close when it is complete.

ATLAS.ti (Software)

Vendor: ATLAS.ti Scientific Software Development GmbH Telephone: +49 30 31 99 88 971 Description: ATLAS.ti helps you to uncover the complex phenomena hidden in your data. ATLAS.ti offers a powerful and intuitive work environment designed to keep your focus centered on your material.

Starlight Visual Information System (Software)

Vendor: Future Point Systems, Inc Telephone: 650-931-8660 Description: Starlight Visual Information System™ is a comprehensive visual analytics platform that transforms mountains of data into actionable intelligence. We provide software for visually managing, understanding, and deriving new knowledge from massive quantities of heterogeneous information.

Starlight tames information overload and enables users to extract new value from data of all types. We automatically organize and summarize large collections of information and present the results in easily interpretable graphical formats. In essence, Starlight is a “force multiplier”, enabling investigators and analysts to do more work with greater efficiency, accuracy, and higher levels of productivity. Using Starlight, analysts rapidly attain high-value results leading to faster time-to-decision.

First Predictive Policing Symposium Report (Article)

Lance Heivilin (2009). 100 people from law enforcement and the academic/research communities were brought together to formally discuss the concept of “Predictive Policing.” I was fortunate enough to be one of the participants in this symposium, to see the official beginning of a new type of thought in

American law enforcement and how we need to do business in the future. Participants were asked to share what they learned with others.

New program Sparks Drop in Crime (Success Stories)

SAINT JOHN - Using the power of computers to look for trends in criminal activity has allowed the Saint John Police Force to achieve double-digit drops in car thefts and break and enters this year.

Police: Thefts from Unlocked Cars Spike (Success Stories)

NASHUA – Police are warning residents to lock their car doors after a third month of increased motor vehicle break-ins. Seventy-one mostly unlocked cars were rifled through and stolen from in November. That’s up from 46 break-ins in October and 37 in September, according to Dawn Reeby, Nashua Police Department’s crime analyst.

Link Your Addresses (Tip)

Whenever you are publishing a bulletin, sending an email, making a brochure, why not include a map? Consider these examples:

An invitation to a meeting: the address of the meeting location is formatted as a hyperlink. Clicking the address opens a map showing that location.

An intelligence bulletin: the offender's address is a hyperlink. Clicking the address opens a map showing an aerial photo of the location.

This is easy to do using Google Maps. Enter the address, get the map set up the way you like it, then look for the website address at the top of the page. Copy that and use it as the hyperlink in your document.

Inteligência Policial Nas Delegacias Seccionais De São Paulo (Article)

Herbert Gonçalves Espuny (2009). This article discusses points of reflection regarding the development and deployment of units of the Police Intelligence base. Take for example, the CIPS - Center of Intelligence Police, the Police Sectional Sao Paulo. The Civil Police of Sao Paulo (Brazil) may be the most organized institution in order to provide a framework for the activity of police intelligence.
This article was writen in Portuguese.

IACA Discussion List (Email List)

The IACA Discussion list is provided to IACA members as a forum to discuss IACA business, IACA projects, and current issues in crime analysis. Only current members of the International Association of Crime Analysts may subscribe.

Postings to the list, visible to everyone subscribed, should be sent to IACAList@iaca.net. Your posting will be delivered to the moderators for posting to all subscribers.

If you want to manage your subscription, send a message to IACAList-request@iaca.net with the word "help" in the subject or memo fields to get a set of instructions.

If you have questions or problems, write to IACAList-owner@iaca.net.


The IACA Discussion List is moderated, meaning one of a group of moderators must review and approve each postings. Postings that violate these guidelines will be rejected:

1. Messages should be related to the IACA, crime analysis, or law enforcement.

2. The IACA Discussion List is not secure, and not all subscribers are members of law enforcement agencies. Please do not share sensitive or confidential information over the list.

3. Instead of using the list for driver's license requests or "I need a contact in..." postings, use the online membership directory to find contacts in various jurisdictions. EVERYONE subscribed to the list is also in the membership directory.

4. Avoid sending postings that simply hyperlink to a web site or a news article. If the web site or the news article are somehow related to crime analysis, offer them to the list along with your insights or analysis.

5. Consider carefully before submitting a reply to the entire list. There are many instances when it’s more appropriate to send e-mail directly to the individual who posted.

6. Maintain respect for other list members and their inboxes. No insults, profanity, inane postings, flooding of mailboxes, nor anything that continually annoys the list subscribers.

7. The IACA Discussion List is a membership benefit. Please do not allow non-member analysts to get this benefit, without joining the IACA, by forwarding their messages. You may, however, forward messages from non-analysts (such as police executives) who would not otherwise be expected to join the IACA.

8. You may post messages about upcoming training (corporate, nonprofit, or otherwise) to the list, but please only ONE message for each training.

9. Corporate members may post ONE message about a product or service. Advertising messages should not exceed one per month per corporation.

10. Avoid "Thanks to all who responded" messages; instead, actually thank those who responded. An exception is if you are attaching a summary of the responses, or otherwise providing additional information, in the message.


Topics that generate a large number of postings may be moved, at the discretion of the moderators, to an online Discussion Forum instead of the list. If this happens, list subscribers will be notified by e-mail.

. Host Organization: International Association of Crime Analysts. Contact: If for some reason you were not subscribed automatically, write to listadmin@iaca.net to subscribe.

CiteLink (Software)

Vendor: MindCite Telephone: +972-72-2509200 Description: CiteLink: Link Analysis solution for uncovering complex relationships hidden inside targeted information sources using Semantic technology. CiteLink enables users to visually identify, navigate and explore connected data at the click of a button. Investigators and analysts can visually investigate the connections among the relevant entities. CiteLink can drill down into unlimited levels, filtering out unwanted information in order to analyze only relevant information. With CiteLink's powerful graphical user interface, investigators and researchers can analyze links from multiple perspectives and navigate through a visualized map to reveal increasingly complex relationships, including groups, cliques, hierarchies and circles of acquaintances. The elaborate connections revealed by CiteLink are used by organization to produce actionable intelligence and make high level operational, tactical and strategic decisions. CiteLink includes strong built-in security features, which allow the security policies of an organization to be applied to the access to and use of CiteLink.

Automatically Delay Sending Bulletins with Outlook Rules (Tip)

Ever send out an email (or specifically, a bulletin) to the entire department, only to discover that you forgot a key piece of information? using the Rules feature of Outlook, you can mitigate this issue.

Go to Tools - Rules. Set up a new, blank rule with the following choices:

Apply this rule after I send the message

with _______ in the subject

and which has an attachment

defer delivery by ___ minutes

So your completed rule might look something like this:

Apply this rule after I send the message

with CAU BULLETIN in the subject

and which has an attachment

defer delivery by 5 minutes

You can choose other options (if you do not always some consistent text in the subject, or if you do not send bulletins via attachment), but the important setting is the last one. If you defer delivery by 5 minutes, the email will sit in your outbox until the time has passed, then it will be delivered. this gives you some time to catch potential mistakes and correct them before the email goes out.

This approach is not readily apparent because the Outlook rule specifies that it will be applied, "after I send the message". To most users, this means once it has been delivered, but they are actually two different actions. Using this approach, you can add a delay between "send" and "delivery". Bulletins are the most obvious use, but you can apply this (and other) rules to an infinite set of circumstances!

LEAnalyst (Email List)

The primary purpose of this list is to provide a place where Law Enforcement employees (sworn and non-sworn), Academia (Instructors and Students), and businesses providing products and/or services to Law enforcement can meet and exchange information, methods, and ideas regarding the analysis of crime. However, we do allow other Law Enforcement related postings in order to keep a free flow of questions and answers regarding all sorts of Law Enforcement problems.

To subscribe to LEANALYST mailing list on Google Groups you need to setup a GMAIL Account with any email address i.e. your work address, visit https://mail.google.com to sign up/create an account. If you need help go to Google help at http://mail.google.com/support/?ctx=about&hl=en. Host Organization: GoogleGroups. Contact: Sal Perri, List Administrator

Fundamentals Of Crime Mapping (Book)

Dr Rebecca Paynich and Mr. Bryan Hill (2009). ISBN: . Description: Written by a Criminal Justice academic (Paynich) and a well known crime analyst (Hill), Fundamentals of Crime Mapping walks readers through the research, theories, and history of GIS in law enforcement. This accessible text explains the day-to-day practical application of crime analysis for mapping. Factual data from real crime analysis is included to reflect actual crime patterns, trends, series and what an officer or analyst can expect to see when he or she sits down to analyze and apply concepts learned. Special topics discussed include: an up-to-date discussion of the current crime trends in rural and urban areas, the major ecological theories of crime, the notion of geographic profiling, empirical research using crime mapping tools, basic mapping terminology, and more.

Key Features:

Provides jargon-free language, over 30 practical exercises, and a large assortment of varied data from the City of Glendale, Arizona, that can be used for additional exercises to maximize reader comprehension.
Packaged with a DVD that contains every chapter exercise along with full-color screenshots and images.
Contains a tutorial on the basics of using MS Excel 2003 for specific crime analysis applications as an addendum for those who are unfamiliar with MS Excel.

Add a Picture to MS Excel Comments (Pop-Up) (Tip)

A MS Excel comment is a pop-up box that appears when you hover over the cell with your mouse.

Cells containing comments are indicated by a red triangle in the upper right corner.

Right-click the cell where you want to add the comment/photo and select "Insert Comment".

Make sure the comment block is blank (i.e. contains no text).

With the blank comment block added to the cell, right-click the cell again and select "Show Comment". This will keep the comment block open.

Click on the comment block and then right-click on the border of the comment block, and select "Format Comment".

On the "Format Comment" pop-up select the "Colors and Lines" tab.

On that tab, select "Fill" and "Color", and then in that pallet select "Fill Effects" (at the bottom).

On the "Fill Effects" pop-up select the "Picture" tab. Now use the "Select Picture" button to choose the picture you want to add to the comment block in your cell. Click "OK" to add picture.

Finally go back to the cell (on the MS Excel spreadsheet) that you selected for the photo and right-click and select "Hide Comment".

Now when you hover over this cell with your mouse the picture you selected will pop-up.

Adding picture pop-ups to your MS Excel worksheet allows you to include (for example) individual photos with identification information, or property photos with an inventory list.

Pipl.com - FREE Search Tool (Tip)

pipl.com is another great & FREE people search engine.

Working The Web: Using Internet And Intranet Technology (Article)

Julie Wartell (2009). This is Chapter 19 of the IACA's 2009 publication, "Exploring Crime Analysis," second edition. Written by Julie Wartell, it describes strategies for maximizing the use of Internet resources for crime analysis. The chapter concludes with a list of valuable links to different Web resources.

The Criminal Intelligence Function In The Us Army (Article)

Michael Chesbro, CCIA (Editor) (2009). Success in effecting law and order relies upon the acquisition, processing, and application of certain essential information. The purpose of gathering this information is to identify individuals or groups of individuals in an effort to anticipate, prevent, or monitor criminal activity and to provide intelligence to the Commander / Provost Marshal, and support to enforcement and investigative agencies. – This is the basis of the criminal intelligence function in the U.S. Army.

First | Previous | 5 | 6 | 7 | 8 | 9 | [ 10 ] | 11 | 12 | 13 | 14 | Next | Last


Filter by Category

Search Resources


Submit a Resource



IACA members can subscribe to the RSS Resource Center. Members can receive notifications of all new resources, specific resources, all new comments, or comments only on a specific item.

If you are not member, click here to apply.