20140613-194000-CA
Crime Analysis
This website is under construction. Please send questions or comments to bjanttac@usdoj.gov.
Crime Analysis
The Tactical Probation Officer, and Natural Response Control Tactics available through Community Corrections Institute.
Violation of victim rights, civil rights discrimination, family law court services of alameda county city of Oakland. Father 4children equal protection 14amendment due process. 10+ yrs local agencies fcs fvlu opd cps conflict state voc#A08-0908129. Father/victim forced to create victim advocacy group self help, no resources available. Work through DOJ 8+ yrs and FBI 3/10. Case#rf03095015 now confidential, no more family law in Oakland, still illegal practices and patterns of corrupt behavior. Contact justice dept and FBI as well as attorney general California.
I am a new Chief of Police to this organization. I need assistance with statistically capturing our crime rates, and I also need assistance with planning and implementing a data driven organization. In essence, I need help with finding what our problems are, and then finding the hardware, software, and training so that we can effectively allocate our manpower.
Our agency is is the process of implementing a resource deployment model, "Data Driven Approcahes to Crime and Traffic Safety" (DDACTS). This model relies heavily on crime analysis and intelligence led policing. We are requesting assistance for training and education in the crime analysis field,
* Referral via Justice Global Information Sharing Initiative's Sheriff Michael Milstead and worked with NTTAC's Suzette McLeod *
We are beginning an upgrade of our computer-aided dispatch (CAD) and Mobile systems for the Mesa Police Dept (PD) and the Mesa Fire Dept (FD). Both the PD and FD use a shared CAD system. Because it's a shared system, a major issue we are having is trying to define, specifically, what needs to be done with the CAD/Mobile from a FBI CJIS Security perspective - i.e. what configuration, both software security and/or infrastructure, must be in place to meet CJIS Security compliance?