IACA Resource Center

Welcome to the IACA resource center. All resources such as jobs, articles, books, tips & tricks and software are here. Choose an item from below or a category from the right. IACA members can not only view but comment on resources (members must be logged in to comment).

First | Previous | 3 | 4 | 5 | 6 | 7 | [ 8 ] | 9 | 10 | 11 | 12 | Next | Last ( 431 Resources)


Simon Fraser University Institute for Canadian Urban Research Studies (Website)

Interdisciplinary research centre with a focus on increasing knowledge and research studies, and on the development of new analysis tools for the study of crime in an urban environment. ICURS focuses on crime reduction policy, crime analysis and computational criminology. Its goal is to work thematically across the disciplines of criminology, computing science, geography, economics, and applied mathematics to make advances in understanding and modeling of the complex urban environment, and with these models better understand how to improve approaches to crime reduction and the use of informatics in criminological research.

The University College London Jill Dando Institute (Website)

The UCL Jill Dando Institute of Security and Crime Science brings together 30 top research departments/groups across UCL, all with a working interest in the field of security and crime. Research is concentrated on new ways to cut crime and increase security, drawing upon UCL's vast experience in related disciplines, including architecture, economics, engineering, geography, medicine, psychology, statistics and town planning. The JDI aims to promote multidisciplinary research in crime and security and also promote multidisciplinary conferences, events, training and short courses in these fields.

CrimeSolutions.gov (Website)

This new website is a central, credible resource to inform practitioners and policymakers about what works in criminal justice, juvenile justice, and crime victim services. The site includes information on more than 150 justice-related programs and assigns "evidence ratings" - effective, promising, or no effects - to indicate whether there is evidence from research that a program achieves its goals.

Comparing Lists of Values in Microsoft Excel (Tip)

This blog post lists all Excel formulas used to compare lists and provides examples of each one. This is useful for many reasons, such as comparing lists of case numbers, phone numbers, suspects, etc.

Dabbleboard - Free Online Whiteboard Tool (Website)

Dabbleboard is an online collaboration application that’s centered around the whiteboard. With a new type of drawing interface that's actually easy and fun to use, Dabbleboard gets out of your way and just lets you draw. Finally the whiteboard enters the digital age!

Online Charting and Diagramming Tool (Website)

Use this free online diagramming tool to create association charts and more!

Free Online Traffic Crash Diagramming Tool (Website)

Use this online tool to create accident sketches.

Redact your Microsoft Word Bulletins with this Free Add-In (Tip)

The Word 2007 Redaction Tool can be used to hide text within Microsoft Office Word documents. You can mark text to redact and then create a new, redacted version of the document in which the marked text is replaced with a black bar that cannot be converted back to the original text.

Visit: http://redaction.codeplex.com for the Word 2007 or 2010 version or http://tinyurl.com/42qpool for the word 2003 version. Note: you may have to run the installation process twice to sucessfully install it.

PowerCase (Software)

Vendor: XANALYS Telephone: +44-161-9417792 Description: PowerCase is a software system that provides investigative agencies with a complete end-to-end platform for conducting large scale investigations. Using a standardised methodology that encourages a consistent and accountable approach to data collection, evidence review, and action management, PowerCase ensures that not only is every bit of data relevant to your case at your fingertips, but also guarantees your investigative process withstands the closest scrutiny.
From setting up an Incident and assigning staff to specific roles, through to building a brief of evidence of your completed case for presentation to court, PowerCase will manage all aspects of your team’s activities through the entire investigative life-cycle.

HunchLab (Software)

Vendor: Azavea Telephone: 215-925-2600 Description: HunchLab provides law enforcement agencies with easy-to-use tools for crime mapping and analysis delivered via the web browser. It is an ideal solution for local, state, and national law enforcement agencies as well as fusion centers. HunchLab provides capabilities that extend far beyond basic crime visualization tools. Through geographic data mining and risk forecasting, HunchLab provides actionable intelligence that agencies can use to more effectively deploy resources.

Key features:
- Crime Analysis: intelligence dashboard, clustered incident maps, trend identification and animation, temporal analysis
- Early Warning: statistical and threshold-based alerting
- Risk Forecasting: near repeat pattern analysis and incident load forecasting

Palantir Government (Software)

Vendor: Palantir Technologies, Inc. Telephone: 650-815-0200 Description: Palantir Government is an intelligence and investigations platform. Palantir allows officers, investigators, and detectives to fuse multiple data sets, discover non-obvious links, conduct geographic searches, collaborate across agencies, and conduct case management using Palantir’s Workflow Application. Palantir Government is also an open platform, with open APIs and a flexible data model that allows you to integrate with existing software tools and import data in any format. The Palantir Platform is widely deployed across police departments and fusion centers across the United States, as well as within the US Intelligence and Defense Communities.

Crime analysts winning 'chess game' against criminals in Surrey (Success Stories)

The analysts sift through the daily complaint files, crunch down the info and enter it into a database, then map things out, searching for common themes. If everything works out, voila! A trend is identified...

Link Explorer (Software)

Vendor: Xanalys Limited Telephone: +44 161 941 7792 Description: Link Explorer is a desktop software application that allows you to apply powerful query and analysis techniques to your data, presenting the answers in a range of visualisations such as link charts, time lines, maps and reports.

By modelling data as set of objects (people, places, events, etc.) and the associations that exist between them, Link Explorer provides clarity to complex data sets.

Connect directly to an existing database or use Link Explorer's import features to collate data from different sources. Link Explorer will allow you slice and dice your data, pulling interesting sets of results from one chart into another, or drilling into key objects to reveal associated information.

Knoxville Police Chief Praises Crime Analysis (Success Stories)

In this TV10 interview, Knoxville Chief Sterling Owen discusses crime decreases in the city of Knoxville and attributes some of their success to the crime analysis unit.

Sorting Access Crosstab Columns (Tip)

Have you ever created a Access crosstab (crime by month, for example), and the columns ended up sorted alphabetically as April, August, December...instead of January, February, March?

This quick tip shows you an easy way to fit it:


This works in Access 2003 and up.

Use A Digital Certificate To Encrypt Your Personal E-Mail (Article)

Michael Chesbro (2010). Instructions on how to obtain a personal digital certificate and use it to encrypt e-mail.

A digitally signed and encrypted e-mail confirms that the message actually came from you, that it has not been altered during transmission, and because it's encrypted it can only be read by the intended recipient (i.e. the person whose digital certificate you used to encrypt the message).

Fast and Easy Search for your Outlook Email (Tip)

In the search bar in Microsoft Outlook 2007, you can enter keywords and Outlook will search for those words in the current folder. But you can also add other filters without having to do an advanced search (which takes longer).

For example, you can go to your sent items folder and enter this into the search box:

to:joe smith contents: robbery bulletin

To retrieve emails that you sent to Joe Smith pertaining to a robbery bulletin.

Or you can search your inbox, read mail, or other folders for:

from: susan davis subject: survey

To get emails from susan about that survey you were supposed to complete for her.

This Microsoft website lists all of the available options: http://tinyurl.com/22mpdlx for doing quick searches in Outlook 2007.

Split time from dates and times in multiple fields (Tip)

Use this function to split time from date/time fields

Function ACalcSTime(d1 As Range, t1 As Range, d2 As Range, t2 As Range) As String
Dim dt_start As Date
Dim dt_end As Date

'Make sure the start time has a colon separating hours and minutes
foo = t1.Value
If Len(foo) = 4 Then foo = Left(foo, 2) & ":" & Right(foo, 2)
dt_start = d1.Value & " " & foo

'Make sure the end time has a colon separating hours and minutes
foo = t2.Value
If Len(foo) = 4 Then foo = Left(foo, 2) & ":" & Right(foo, 2)
dt_end = d2.Value & " " & foo

dt_split = ((dt_end - dt_start) / 2) + dt_start

ACalcSTime = dt_split
End Function

Sort by font color in Excel 2007 (Tip)

This quick tip: http://tinyurl.com/4rlrlq2
shows you how to sort Excel data by font color.

Problem Analysis In Policing (Book)

Rachel Boba (2003). ISBN: . Description: This report introduces and defines problem analysis and provides guidance on how problem analysis can be integrated and institutionalized into modern policing practices. This report is not a “how to” guide on conducting problem analysis, but is a summary of ideas and recommendations about what problem analysis is, what skills and knowledge are necessary to conduct it, and how it can be advanced by the police community, academia, the federal government, and other institutions. The ideas and recommendations in this report come primarily from a two-day forum conducted in February 2002 by the Police Foundation and the US Department of Justice’s Office of Community Oriented Policing Services (COPS Office), in which a group of academics, practitioners, and policy makers came together to discuss problem analysis and make recommendations for its progress. This report is a culmination of the concepts and ideas that were discussed in the forum and includes specific, relevant statements made by participants.

Selecting The Best Analyst For The Job: A Model Crime Analyst Assessment Process For Law Enforcement Agencies (Book)

Karen L. Amendola and Greg Jones (2010). ISBN: . Description: The rapid growth in applications and usage of crime mapping and analysis in law enforcement agencies in recent years has increased job opportunities for new analysts. As crime analysis has become an established profession, there is a need for consensus about the specific knowledge, skills, abilities, and other characteristics and the extent of formalized training necessary for new analysts. Through various discussion channels, including in-house forums, focus groups, visits with crime analysis units, and participation at annual crime mapping conferences, the Police Foundation’s Crime Mapping and Problem Analysis Laboratory recognized the importance of creating hiring standards and a systematic and comprehensive hiring process for selecting highly capable crime analysts. This publication and accompanying appendices on CD-ROM focus on defining the job of a crime analyst and on a model procedure for selecting the best possible crime analyst for a law enforcement agency

Integrated Intelligence And Crime Analysis: Enhanced Information Management For Law Enforcement Leaders (Book)

Jerry H. Ratcliffe (2007). ISBN: . Description: Data and information about the criminal environment and criminal activity abound: the challenge is to corral this wealth of data into knowledge that can enhance decision making, improve strategies to combat crime, and increase crime prevention benefits. In other words, the aim is to convert data and information into actionable intelligence. This report is designed to identify the key challenges limiting criminal intelligence sharing, the aims of the integrated analysis model, and the way that all police departments, big or small, can work individually and collectively towards the new intelligence-led policing paradigm of modern policing.

Troopers Use Science, Geography to Target Drunk Drivers (Success Stories)

…Analysts like Marcia Marsh chart each crash, then overlays that with other data such as where 911 calls come in reporting suspected drunks. Using that, enforcement strategies are plotted, so troopers can be in position around these hot spots to intercept drunk drivers, before they crash and kill...

View Analysts Notebook Charts for Free (Tip)

Download the free ChartReader application from here:


to view charts creating using i2's Analysts's Notebook.

It Strategic And Operational Controls (Book)

John Kyriazoglou, CICA, M.S., B.A (Hons) (2010). ISBN: . Description: BOOK SYNOPSIS

This book is about Information Technology (IT) Strategic and Operational Controls. IT controls enable and support all management levels of the organization (top, middle, and lower) to accomplish the IT strategic and operational goals of the organization. The book covers all the IT areas and is structured in ten chapters and a set of appendices, as noted below:


Vital information on how to systematically implement IT strategic and operational controls to support and enhance your organisation!

Nowadays, integrated information systems can significantly magnify the accrued benefits of a given project and greatly strengthen an organisation, but such benefits are balanced by a serious risk. If IT systems are not used in a disciplined manner they can create havoc and they frequently bring about unexpected results and catastrophe, as shown by the rise in security incidents and computer-based crimes.

Master IT controls concepts and issues. Written with practicality and convenience in mind, this book is an ideal tool for those without specialised technical expertise seeking to understand IT controls and their design, implementation, monitoring, review and audit issues.

Minimise risk and maximise benefits. This book provides a comprehensive guide to implementing an integrated and flexible set of IT controls in a systematic way. It can help organisations to formulate a complete culture for all areas which must be supervised and controlled; allowing them to simultaneously ensure a secure, high standard whilst striving to obtain the strategic and operational goals of the company.

Benefits to business include:
(1) Understand and control the associated risks of IT systems. This book contains practical advice and illustrates solutions to the
tremendously complicated problems of designing, implementing and auditing new and existing systems, making use of practical and easily customisable examples.
(2) Increase management’s aptitude to achieve operational goals. With well-controlled, integrated and robust IT systems, you can gain a comparative advantage in a
competitive environment, whilst ensuring that information is relevant, accurate and timely.
(3) Ensure high standards within your IT systems. For each covered aspect of control, this book provides audit programmes and checklists to help management and auditors
carry out reviews and audits. As an additional aid, there is an appendix comprising guidelines and examples of ‘how to enhance’ IT security, IT policies and ethical code.
Auditors will find reference to a large number of very relevant tools for use in auditing and reviewing IT operations.

Making use of a clear and pragmatic presentation, this book provides a thorough description of all elements of IT controls in a systematic and detailed way,
allowing managers, IT professionals, practitioners and auditors to customise examples to their own specific purpose. It is a comprehensive tool for anyone who
wishes to cement their understanding of IT controls and, most importantly, for those who aim to realise the full capacity of information systems, whilst rigorously controlling the concomitant risks.

First | Previous | 3 | 4 | 5 | 6 | 7 | [ 8 ] | 9 | 10 | 11 | 12 | Next | Last


Filter by Category

Search Resources


Submit a Resource



IACA members can subscribe to the RSS Resource Center. Members can receive notifications of all new resources, specific resources, all new comments, or comments only on a specific item.

If you are not member, click here to apply.