Forensics Journal - Stevenson University 2015 | Page 50
STEVENSON UNIVERSITY
utilized by government agencies for surveillance, communication
interception, and to trace the online presence of terrorist groups.
The IBM SPSS aids law enforcement and government agencies in
anticipating and preventing terrorist activities both before and in
real-time, rather than after the fact.
The FinCEN database includes all banking and money-laundering
SARs and personal information such as bank account numbers,
known addresses, business associates, and potential criminal activity
(U.S. Dept. of Justice, 2014).
INFORMATION SHARING
Probability Grid Method (PGM)
Paul Catalono, Brennan Long, and Bryan Hill developed the
Probability Grid Method (PGM), a tool that predicts criminal
activity before it occurs. In Phoenix, Arizona, law enforcement
agencies used PGM methodology in criminal cases involving arson,
burglary, and theft. PGM works together with ArcGIS software to
analyze data from different sources to distinguish spatial patterns,
trends, and future events. PGM enables law enforcement to utilize
statistical methods along with practical experience in a particular
area of interest. PGM software would be beneficial in aiding law
enforcement agencies with predicting and tracking terrorist activities.
Government agencies may have had information about a possible
terror attack leading to the 9/11 terrorist attacks. “According to the
9/11 Commission Report the biggest impediment to…connecting
the dots is the human or systemic resistance to sharing information”
(“National Commission,” 2004). The following is “an FBI agent’s
reaction after 9/11 on discovering the CIA possessed information
relevant to the investigation of al-Qa’idah” (Lamb & Staine-Pyne,
2014).
For about a minute, I stared at the pictures and the report,
not quite believing what I had in my hands. We had asked the
CIA repeatedly during the USS Cole investigation if they knew
anything about why Khallad had been in Malaysia…. Each
time we had asked—in November 2000, April 2001, and July
2001—they had said that they knew nothing. But[sic] here in
the file was a very different answer: they had in fact known….
I walked out of the room, sprinted down the corridor to the
bathroom, and fell to the floor next to a stall. There I threw
up…. The same thought kept looping back: If they had all this
information since January 2000, why the hell didn’t they pass it
on (Lamb, Christopher, & Staine-Pyne).
Risk Terrain Modeling (RTM)
Law enforcement agencies continuously look for efficient ways to
anticipate unlawful behavior. During peak times of criminal activity,
law enforcement agencies could use predictive analytic tools, such as
Risk Terrain Modeling (RTM) for greater proficiency in monitoring
and anticipating criminal movement. RTM creates a high-risk map
by inputting data of past behavior, physical qualities, and criminal
wrongdoings for a particular geographical area. Law enforcement
agencies are then able to determine the risk factors of particular
criminal activity occurring over time. For example, law enforcement
agencies utilize the RTM technology to assign more officers to areas
with a higher amounts of criminal activity during specific times of
the day. RTM technology is one method law enforcement agencies
utilize to determine possible terrorist activity in the United States
mass transit system. Armed with RTM predictive analytic technology,
law enforcement agencies are better equipped to protect U.S. citizens
from violent acts of terror.
The 9/11 Commission Report discussed the many levels of hierarchy
required for interagency collaboration. These levels of hierarchy led
to wasted time in implementing and responding to terror threats.
Members of the 9/11 Commission Report stated, “we had to fight
to get access to documents we needed, fight to get people we needed
to testify to make our cases. Nothing was easy” (Grumet, Hamilton,
& Kean, 201
K