Find a Security Clearance Job!



This program is listed in the DTIC Records for Automated Information Systems with no additional identifying information. Based on other similar records in this list, such as ANCHORY, GISTER, HARMONY and WRANGLER, it was evident that this program was an intelligence related automated information system.

Using the University of Maryland's Baltimore/ Washington High Intensity Drug Trafficking Area program as an initial test site, the Law Enforcement Data Mining Analytical Tool grant by the National Institutes of Justice, Office of Science and Technology managed large volumes of data conversion and develop fully a text search, retrieval, and a link analysis software application to analyze information contained in law enforcement databases and large volumes of scanned search and seizure documents.

This has been accomplished by three one-year phases. The final goal is to develop a proof-of-concept system capable of handling 100,000 images from a Prince George's County drug and fraud related document seizure to mirror the four step analytical process used in law enforcement (data collection, evaluation, analysis and product dissemination).

The Phase One system integrated commercial-off-the-shelf software (data mining, scanning, optical character recognition and conversion, full text storage and retrieval, online analytical processing, graphing, and handwriting and voice recognition) and government-off-the-shelf software (National Security Agency's "Propeller" link analysis tool) software into a workable architecture, a common user interface, and a reporting structure.

Phase Two built on the system developed in Phase One. Phase Two simulated multi-user scenarios, evaluated system stress, and increased the system's capability to handle more than 1,000,000 images (up from 100,000 in Phase One). Phase Two integrated facial recognition, mapping, and telephone number relational technologies, investigated better ways to convert existing documentation (voice, handwriting, and forms), and incorporated appropriate security features.

Phase Three (awarded in 2001) implemented the Data Mining for Law Enforcement (DMLE) system to include a data smart function and a set of software tools designed to access the law en-forcement data warehouse. The initial data warehouse concentrated on a design that incorporates case data as well as strategic law enforcement data types from a variety of law enforcement sources.

Join the mailing list

Unconventional Threat podcast - Threats Foreign and Domestic: 'In Episode One of Unconventional Threat, we identify and examine a range of threats, both foreign and domestic, that are endangering the integrity of our democracy'

Page last modified: 28-07-2011 00:50:37 ZULU