EACA Annual Conference 2024 - Abstracts

Most of our speakers provided us more details about their topics:

 

Day 1 - 14th October

 

Keynote: Fighting Crime with Criminal Network Analysis
Paolo Campana
University of Cambridge

Paolo Campana is a University Associate Professor in Criminology and Complex Networks at the University of Cambridge (UK). Paolo's work specialises in organised crime and criminal networks. He has explored issues related to the working of organised crime groups both locally and transnationally, human trafficking, people smuggling, gangs, violence and the impact of technology on criminal activities. His work has appeared in leading international journals and has been translated into Chinese, French and Italian. He has acted as an external expert for various international organisations and provided training to several police forces. 

In this talk, Dr Campana will discuss the use of social network analysis techniques to improve the fight against crime, including organised crime and violence, by leveraging existing evidence more effectively. 

 

Let the Data Talk - Did London's Stop and Search really deter Crimes? 
Yijing Li
Associate Professor, King's College London

The project explored London's Stop and Search practices from 2019 to 2023 on monthly basis, upon creating a disproportionality index to evaluate its efficiency deterring local crimes at both borough and LSOA levels, in the aim to evidence the public concerns of whether Stop and Search really play a role in combating the city's crimes. Furthermore, relevant demographic and socio-economic factors had been investigated upon utilising Bayesian Hierarchical regression and Geographically weighted neural network analysis, to identify the potential driving or mediating factors' influences over space. It is expected to be able to provide data-driven evidence to local policing practitioners towards better equitable services.

 

The Balkan Underworld in Europe
Saša Đorđević
Senior Analyst, Global Initiative Against Transnational Organized Crime

Over 800 criminal networks, comprising over 25,000 members, operate within the European Union, with involvement from members of the Western Balkans, particularly from Albania, Bosnia and Herzegovina and Serbia. Analysis of these groups reveals a complex and dynamic underworld that supplies illicit goods and relies on technology. Albanian-speaking networks are involved primarily in drug trafficking and arms smuggling, while mixed networks led by Serbs and Montenegrins focus on cocaine and cannabis trafficking.

These networks also exert significant influence in Latin America, controlling cocaine supply chains. Despite reported decreases in the number of criminal organisations in Montenegro, North Macedonia and Serbia, this may indicate consolidation and increased operational efficiency rather than a reduction in criminal activity. This research will contribute to developing more effective policies and strategies to combat organized crime by providing a deeper understanding of the structure and operations of criminal networks from the Western Balkans.

 

Using the entire Toolbox - OSINT meets Old School
Sally Rawlings
PenLink, formerly Jefferson County Sheriff's Office & Broomfield PD

Over the years, the field and technology in Crime & Intelligence Analysis has progressed immensely. The criminals have cutting edge technology; and we must answer that with advanced methods and techniques aling the steadfast practices that have shown to be actionable throughout the years. This presentation will highlight the top tips and tricks from the old school technology such as crime mapping and temproal analysis, to utlizing social media, AI, and forensic smart device analysis. Items such as infotainment systems in vehicles, ring doorbell videos and good old fashioned police work can produce the best results in catching the bad guy.

 

Developing a Power-BI Visualization Tool for Tactical and Strategic Intelligence Insights of International Trafficking
Sarah Stoner
Criminal Intelligence Analysts, GO INSIGHT

The illegal trade and trafficking of wildlife, fish, and plants have escalated into a form of transnational organised crime. This illicit industry generates substantial profits, funding criminal activities, causing severe environmental damage and threats to national security. Despite the severity of this issue, the skills and expertise needed to address this are seldom applied.

To counteract this growing threat, the application of intelligence analysis is crucial. While there have been improvements in the application of intelligence across the world in this field, it is not yet a common practice. At the same time, a situation exists where efforts are being made by many to collect valuable information and data, but not as much effort is going into analysing that data or sharing it further. We wanted to overcome this.

At Go Insight, we have built a sophisticated Power-BI dashboard that can bridge this gap specifically for assessing the trafficking of high-value wildlife products deriving from tigers, lions and jaguars and the interconnectivity of these crimes. We have developed a methodology to analyse and categorise changes in criminality and demand by weighting and assessing disparate data sources (including intelligence, crime data and investigative findings).

Our goal was to transform fragmented data into a comprehensive visualisation tool that highlights the data's value and engages users. We also wanted to show that intelligence has merit on a tactical and strategic level, as many working on illegal trade are more familiar with operational intelligence. Additionally, we compiled anecdotal information on trader perceptions, consumer demographics, and the impact of enforcement and policy interventions. This approach sought to identify patterns from past events, such as major seizures, law enforcement actions, and legislative changes, and their effects. The Power BI dashboard is just the output which will be free for those in the field to utilise, we do not nor will not derive any financial benefit from it as it is funded by several donors.

We adopt a holistic supply chain approach, integrating all critical components of the problem. For example, we aim to better illuminate the relationship between poaching, trade, and trafficking, thus informing partners about necessary interventions to mobilize resources effectively and to catalyse cooperation.

The output which we can demo, provides practitioners working in conservation, wildlife law enforcement, and intelligence with tools to quickly and efficiently gain insights on big cat trade trends and flag areas for further investigation and to support evidence-based conservation. To unleash the power of data and to open up new areas of interrogation to the community to ensure investments in data and intelligence analysis improves.

We hope to be able to present a novel approach which is due to be rolled out to partners, including governments and intergovernmental organisations in November 2024

 

Combating Illicit Trafficking of Small Arms and Light Weapons into the EU through the Western Balkans Route
Kristina Angelevska
Researcher - Research and Policy Analysis Division, Boston/USA

A Network Analysis of INTERPOL, OSCE and United Nations Office of Drugs and Crime (UNODC)

The illicit trafficking and misuse of conventional weapons has been a global challenge for decades, especially during armed conflicts and in the aftermath of wars. It is widely known that proliferation, illicit trafficking, and diversion of small arms and light weapons (SALW) worldwide leads to considerable threats to the peace and security landscape at a national, regional, and global level (Small Arms Light Weapons – SALW, International Center for Counterterrorism, n.d.).  

More so, the illicit flow of SALW can significantly destabilize social progress, economic advancement, democratic governance, and sustainable development, especially in post-conflict countries of the Western Balkans. For that reason, in the aftermath of the conflicts in Bosnia and Herzegovina, Serbia, Kosovo, and North Macedonia, the international community and the state governments made considerable efforts to pass laws to control the flow of small arms not just in the region but across Europe.  

However, despite the considerable efforts undertaken by the international community, intergovernmental organizations, and the governments in the Western Balkans, this illicit trafficking remains an omnipresent concern, especially after the wars in the 1990s and early 2000s. Many civilians and veterans own many small arms, specifically handguns and automatic rifles that are illegally smuggled into the European Union through a so-called Western Balkans route.   

Arms trafficking is a prominent concern for multiple stakeholders, especially the European Union since illicit trafficking of SALW seriously impacts the security sector reforms in the Western Balkans countries that have been aspiring to join the EU family for a long time now. Additionally, the illicit smuggling of SALW into the EU member states, especially Western Europe, poses a significant threat to the collective security and democracy established in the EU, and it can lead to security destabilization, increased crime, and terrorism.  

Therefore, the aim of this research project is to help me better understand how international organizations such as INTERPOL and the OSCE are handling the illicit trafficking of SALW compared to other international entities. More concisely, I endeavor to understand what their angles of perspective are about this matter and to what extent are they interconnected in fighting the illicit possession of SALW, misuse and exploitation of SALW and in what capacity they collaborate among themselves and with the governments in the Western Balkans in enhancing law enforcement’s capacities for crime prevention and crime analysis.  

Finally, through this research analysis, I endeavor to comprehend the reasons behind the involvement of the UNODC and UNDP over the United Nations Office of Disarmament Affairs and the involvement of the International Criminal Police Organization (INTERPOL) versus the European Union Agency for Law Enforcement Cooperation (EUROPOL) and the European Union Agency for Law Enforcement Training (CEPOL) in the control of the illicit trafficking of SALW into the European Union.

 This phenomenon leads to another question: Are these organizations in the realm of global and regional crime prevention fragmented, polycentric, or have their own distinct complexities and, therefore, different approaches in the realm of criminal justice? To obtain answers to these complexities, I draw upon Rakhyun E. Kim’s Analytical Essay: Is Global Governance Fragmented, Polycentric, or Complex in this research proposal? The State of the Art of the Network Approach. 

Ultimately, this research will help me decipher how these international regimes are shaped to work on issues related to crime analysis and crime prevention a larger web-like architecture of global governance.  As a result, I will be able to better comprehend how they are functionally linked to each other while being fragmented, polycentric, and complex within their structures and functionalities – especially in the sphere of global and regional governance.  

 

Day 2 - 15th October

 

Promoting the Profession - The Analyst is a Salesperson!
Noemi Eckhoff
Analyst at the NCA Corporation in Texas/USA

The purpose of this presentation is to discuss what we ‘sell’ as Analysts. Why we need to sell our products, and who our customers are. Once we identify who our customers and stakeholders are, how can we effectively market ourselves and our products, and cater to them. What sales tactics are applicable in our field, to successfully market our role as Analysts, and sell high quality well-tailored products. The presentation will also touch on the need to advocate for ourselves and our role as Analysts and advocating for our peers as well. Why we should be motivated to invest in our own professional development, and advocate for our stakeholders to invest in Analysts. Coming out of your shell (or office cubicle) as a professional, and why that is important to effectively market your products. Why you should consider building your own ‘brand’, and tips to get started on that. The importance of networking – a salesperson is only worth as much as their rolodex after all! How your network can help market you, help you gain new perspectives and develop ideas, contribute to your professional development, etc. 

 

Warning to Disrupt Targeted Violence
Magnus Andersson
Project Manager Intelligence Analysis, Swedish Police Authority/Lund University

Hits in the criminal environment, attacks on government officials, school shootings and terrorist attacks are different forms of targeted violence. These forms of violent crimes, arguably, share a similar attack process from planning and preparation to execution and escape. Targeted violence are attacks where a potentially knowable attacker targets a specific person or place, and where there is a planning and preparation process (Borum et al 1999; Fein et al 1995; Vossekuil et al 2015). An ongoing planning and preparation process of a violent crime leaves traces that are observable and can therefore be detected by law enforcement, making disruption possible.

This study aims to present the preliminary findings of how police intelligence analysts make the decision to warn in cases of violent and other serious crimes. The preliminary findings are based on interviews with police intelligence analysts. Warnings that lead to the successful prevention of violent attacks require detailed and specific information about the crime being planned and prepared, as well as decision maker receptivity (Dahl 2011; Dahl 2013). The presentation will concern the Warning Decision Mechanism and show how intelligence analysts transforms detailed and specific intelligence about an attack into a warning. I posit that the mechanism of the decision to warn is the interpretation of the content of the detailed and specific information that creates the meaning and insight required to decide whether or not to warn. The study relies on naturalistic decision making (Klein 1999) and the data-frame theory of sense making (Klein et al 2007; Moore and Hoffman 2011) to explain how police intelligence analysts succeed and become better at making correct warnings. In essence, the preliminary results indicate what specific intelligence content should be collected and analyzed in order to successfully warn before an attack is initiated. Furthermore, the preliminary results show the importance of being able to situate the intelligence and crime prevention process in relation to the threat’s operational attack process, and how these two event sequences effect each other in a strategic interaction (Goffman 1969) of moves and counter moves that create the contextual conditions of the Warning Decision Mechanism.

 

Integrating Digital Forensics with OSINT and Proprietary Data Using AI
Adam Bednar
GraphAware

Adam Bednar, GraphAwares Technical Sales Engineer, will demonstrate how to process and integrate digital forensics data (such as phone dumps) at scale, offering unparalleled flexibility and efficiency.

This approach allows for seamless integration with other resources both within and outside your organisation, including proprietary data and OSINT.

By employing knowledge graphs, Large Language Models, and automatic translations, he will showcase how using GraphAware Hume - a connected data analytics platform - enables data fusion across digital forensics data and other sources, enhancing your ability to derive meaningful insights.

 

Digital evidence integrity assessment: a comprehensive overview of image and video authentication
Andrea Frisina
Amped Software

In the ever-evolving landscape of digital forensics, ensuring the authenticity and integrity of images and videos is paramount for law enforcement agencies worldwide. This 
presentation aims to equip attendees with some of the indispensable skills, insights and knowledge required to be able to perform the intricate task of distinguishing between 
genuine and tampered media. 


During the presentation, the main challenges of integrity and authentication analysis will be outlined, together with possible solutions to tackle them.
Drawing upon principles of image processing and forensic analysis, we'll adopt a multifaceted approach to image and video authentication, encompassing integrity 
verification, processing history analysis, tampering detection and camera identification. Our ultimate goal will be to show investigators how to uncover traces of tampering or 
forgery, while making sure to deliver reliable, reproducible and forensically sound results that stand the test of scrutiny in the courtroom..

Introducing Intelligence Analysis in a Post War Environment (Iraq)
Ammi Virk and Majd Hindi
AandIS

The International Organization for Migration (IOM) has provided many different solutions for specific problems in Iraq. As part of this ongoing work and under the auspices of Community Engagement and Policing program intense efforts have been made to improve the strategic, tactical and operational efforts of policing, with a clear aim to demilitarize the police and increase the efficacy of the police service in the post-ISIS conflict era.

For this presentation the facilitators will present how they used a qualitative approach to introduce intelligence led-policing approaches to the Iraqi police and how these measurements were used to develop long-term positive changes through a community policing approach under the umbrella term of procedural justice, through which trust is built and maintained between the police and the public as information is fed into the intelligence analysis process by members of the public to prevent and reduce neighborhood crimes.

The model consists of a series of steps and measures starting down from the community level up to the police management and decision-making level through a multi-actor and level approach.

The project operated over many years with experts developing and providing specific workshops, doctrine guidance and feedback for the Iraqi Police.

The qualitative approach was critical in evaluating needs, delivery methods and results to ensure that operational needs were met, and that progress was being made.

The presentation will detail the methodology, results challenges faced by the project.

Introduction to Artificial Intelligence - The Future of AI in Law Enforcement
Merial Shkurtaj
University of Leoben/Austria

The basics of AI, how AI works, different types of AI (A solid foundation for understanding ), use cases of AI in crime analysis. An overview of current use of AI in crime analysis. Examples include pattern recognition, crime prediction, and big data analysis.

Ethical considerations when using AI in crime analysis. Potential biases and ethical challenges will be discussed (privacy, transparency, and accountability….)

Future of AI in crime analysis:

A look at emerging trends and technologies is taken. Topics such as advanced machine learning, real-time analytics, and predictive policing are highlighted. Case studies of successful AI implementations. Concrete examples of how law enforcement agencies have used AI effectively are presented. Examples show the solving of crimes, the acceleration of investigations and the efficient allocation of resources.

User