Results-Focused Solutions

Contact Us

Data Collection, Management, and Analysis

Data Collection and Analysis

Intelligence is the process by which information data is collected, compared, refined and managed. Intelligence often clarifies your knowledge of a particular Police issues and intelligence results in preventive and enlightened Public Policy. In this class, the mystic of Law enforcement intelligence is revealed. Learn how to recognize and resolve complex Police problems more efficiently and effectively by utilizing proven techniques and strategies. Intelligence results in preventive and enlightened Public Policy. Intelligence is a necessity for the successful investigation of today’s Terrorist actors, Kidnappers and other sophisticated criminals and an invaluable asset for Police managers for making informed decisions concerning tomorrow’s police problems.

Ever wonder what an L.E intelligence is…. Do I have access to L.E intelligence?
How do I develop intelligence? What type of intelligence do I get? Where do I fit in?
How will this make me a better Police Officer? These questions and many more are answered in this class.

Introduction to Law enforcement intelligence will benefit everyone from Patrol officers to seasoned intelligence officers. It offers a blend of “Old School” tips, techniques and methodology combined with the most advance up to date tools and resources currently available to the Policing industry. The data repositories revealed in this class will amaze even the mast savvy investigators. Uniform officers can immediately put aspects of this course to work as effectively as the detectives, drug investigators, gang officers, criminal intelligence collectors, and crime analysts. In essence, this class tends to teach attendees how to work smarter and not harder.

This course is ideal for Patrol Officers, Terrorism unit officers, Criminal and Drug investigators, detectives, analysts, intelligence practitioners, gang investigators, intelligence unit managers and supervisors.

I² Security Group offers specialist courses aimed at Crime Analysts, Terrorism Experts, Intelligence Analysts, Tactical Analysts, Administrative Analysts, Strategic Analysts, Crime & Intelligence Researchers, Law Enforcement Officers [and other Officials] involved in Crime & Intelligence Analysis, Criminal Justice Students and Crime Analysis Volunteers.

Other areas include:

  • Introduction to Law Enforcement Intelligence
  • The Intelligence Cycle
  • Intelligence Analysis: Core Competencies
  • Introduction to Intelligence Analysis
  • Legal Issues for Intelligence Analysts
  • Intelligence Plans
  • Digital Officer Safety & Operations Security (OPSEC)
  • External Information Sources
  • Electronic Sources of Information for Law Enforcement
  • Analytical Methods & Techniques
  • Report Writing for Analysts
  • Introduction to Electronic Worksheets and Graphs
  • Financial Aspects of Criminal Investigations
  • Geographic Information Systems and Geographical Profiling
  • Analytical Products and Presentations
  • Practical Exercise Laboratory, Preparation and Presentation

Community Policing/Intelligence-Led Policing

community policing

Intelligence collecting and analyzing have been around since even Biblical times and is often referred to as the second oldest profession. Since the early 1900s, law enforcement officials have begun to utilize the value of the intelligence collection methods. One of the first well-known uses of intelligence by law enforcement was during the “Black Hand” investigations, which lasted from 1905 to 1909. The investigations resulted in the deportation of 500 people and arrest of thousands of others.

In the 1920s and 1930s, intelligence was used to collect information on citizens thought to be anarchists and mobsters, and by the 1940s and 1950s; law enforcement agencies began to utilize intelligence methods in the fight against organized crime. By 1967, the U. S President’s Commission on Organized Crime helped to develop the Racketeering Influenced and Corrupt Organization (RICO). In 1986, the heads of five Mafia families were convicted of violating the RICO. Other types of activities that intelligence is used against are outlaw motorcycle gangs, Russian and Asian organized crime, and street gangs.

Introduction

Intelligence is the process by which information data is collected, compared, refined and managed. Intelligence often clarifies your knowledge of a particular Police issues and intelligence results in preventive and enlightened Public Policy. In this class, the mystic of Law enforcement intelligence is revealed. Learn how to recognize and resolve complex Police problems more efficiently and effectively by utilizing proven techniques and strategies. Intelligence results in preventive and enlightened Public Policy. Intelligence is a necessity for the successful investigation of today’s Terrorist actors, Kidnappers and other sophisticated criminals and an invaluable asset for Police managers for making informed decisions concerning tomorrow’s police problems.

Ever wonder what an L.E intelligence is…. Do I have access to L.E intelligence?

How do I develop intelligence? What type of intelligence do I get? Where do I fit in?

How will this make me a better Police Officer? These questions and many more are answered in this class.

Introduction to Law enforcement intelligence will benefit everyone from Patrol officers to seasoned intelligence officers. It offers a blend of “Old School” tips, techniques and methodology combined with the most advance up to date tools and resources currently available to the Policing industry. The data repositories revealed in this class will amaze even the mast savvy investigators. Uniform officers can immediately put aspects of this course to work as effectively as the detectives, drug investigators, gang officers, criminal intelligence collectors, and crime analysts.

I² Security Group offers specialist courses aimed at Crime Analysts, Terrorism Experts, Intelligence Analysts, Tactical Analysts, Administrative Analysts, Strategic Analysts, Crime & Intelligence Researchers, Law Enforcement Officers [and other Officials] involved in Crime & Intelligence Analysis, Criminal Justice Students and Crime Analysis Volunteers.

Counterterrorism

counter terrorism

I² Security Group’s modular Counter-Terrorism Preparedness program provides enterprise-wide security and continuity planning against a terrorist attack or other catastrophic event. I² Security Group’s goal is to close potential security gaps, optimize emergency response capability, and significantly lower risk and liability in the event of a catastrophic emergency.

Threat Analysis – Every organization has a unique threat profile. This is defined by many factors, including location, operational activities, public profile, client base, etc. I² Security Group identifies only the relevant, credible threats that align with the client organization’s unique threat profile. Using advanced analysis and forecasting techniques I² Security Group analyzes the levels of risk and exposure for each threat, and provides the client with a detailed understanding of potential areas of risk.

Vulnerability Assessment – I² Security Group evaluates enterprise vulnerability to the direct or indirect impact of a terrorist attack. Using a scorecard approach, we provide three levels of assessment and recommendations for mitigation.

Vulnerability Report Card provides a clear overview of three basic areas of exposure: Facility and Environment, Key Processes, and Emergency Protocols; and identifies key vulnerabilities in each area.

Critical Systems Assessment provides in-depth coverage of five key systems that are most likely to harbor inherent vulnerabilities. This includes IT Security and Personnel Training programs in addition to the areas covered by the Vulnerability Report Card.

Premium Assessment is I² Security Group ‘s most comprehensive analysis. It provides an in-depth assessment of the entire enterprise, including Operational Processes, Supply and Delivery Chains, Communications Protocols, and Human Resources, in addition to what is covered in Critical Systems Assessment.

Counter Piracy/Maritime Counterterrorism

Counter Piracy Maritime

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Security Forces Training

Security Forces Training

Basic Security Training courses:

I² Security Group provides the most accurate and timely, situation specific, real world investigations and analysis to enable its clients to make informed decisions especially in areas of Anti / Counter Terrorism Consulting.

  • How to effectively profile – Acceptable rational for profiling
  • Participation in evacuation of areas endangered by explosive or toxic gases, liquids, chemical hazards or other spilled materials.
  • Participation in evacuation of buildings and surrounding areas in response to threat of explosion, e.g. bomb, natural gas, radiological, etc.
  • Recognition of impaired drivers
  • Occupant protection: Seat Belt; Child Safety harnesses
  • Law enforcement data driven approaches to crime prevention.
  • Drivers Licenses for teenagers and inherent risk factors
  • Technical assistance
  • Speed Assistance guidelines and training
  • Legal issues: impaired drivers; safety belt laws; what to look for in crashes
  • How to spot a stolen car
  • On the street: Aim for Peace – Prepare for War.
  • Look at and recognize vehicle placard and use appropriate resources, e.g. DOT Emergency Response Guide to identify hazardous material being transported.
  • Use fire extinguishing equipment to put out fires.
  • Participate in large scale area search and rescue operations.
  • Respond to and control scene involving barricaded subject.
  • Conduct search of area or building to locate bomb or other explosive device.
  • Basic training on terrorism; motivations, mode of terror attacks and how to look out.
  • Observe and report possible terrorist activity. Instruction on how to recognize the indicators of a criminal / terrorist incident or threat and understand the methods of how to properly deploy and respond to the crisis and if necessary preserve evidence that could be used to convict the responsible parties.
    Respond to and control critical incident, e.g. shooting, hazmat, terrorist event, natural disaster, etc.

Infrastructure/Site Security

Infrastructure Site Security

I2 Security Group developed a Comprehensive Security Strategy which offers an overview of a multi-phased approach to enhancing the physical security measures of assets/facilities within organizations, building competent security response forces, and protecting citizens. I2 Security Group, acting as Project Manager, will provide 100 percent of planning and oversight, material and equipment procurement, infrastructure development, construction management, and security forces training services. I2 Security Group believes that Action is Essential, so you can be assured that we, and our partners, stand ready to perform, and that we look forward to supporting your efforts to build increased security in Nigeria, now and in the future

Personal Security

Personal Security

Personal security is a general condition that results after adequate steps are taken to (a) deter, (b) delay, and (c) provide warning before possible crime, (d) if such warnings occur, to summon assistance, and (e) prepare for the possibility of crime in a constructive manner. Reasonable efforts to execute these five tasks can greatly reduce security risks, sometimes to negligible levels.

A caution: all suspected criminals and terrorists must be considered highly dangerous. Only police teams are equipped to deal with them. Pre-emptive action by other people often puts them at physical and legal risk, endangers bystanders, destroys key evidence, and obstructs police. Unless acting in self-defense or an official capacity, therefore, your general role in personal security is only to execute passive measures, stay alert, summon help, avoid confrontations – and let police teams do their job.

I² Security Group trains its clients on personal protection, look out strategies, hand combat etc.

Law Enforcement Solutions

Law Enforcement Solutions

Enormous amounts of law enforcement data are generated on a daily basis. Managing and tracking the related records can be daunting if not properly controlled with technology that effectively streamlines the process.

Our software increases the effectiveness and efficiency of law enforcement by centralizing records for people, property, places and related information into a single database.

The Law Enforcement Records Management Software is an easy-to-use comprehensive case management software tool for recording and retrieving internal and external law enforcement documents and data. Historical and current law enforcement records are retrievable through a user friendly web based software system.

The Law Enforcement Records Management Software is designed to provide Police Officers and other Law Enforcement personnel with instant on-line access to the real-time data they need to process case information and solve criminal and civil disputes.

The software combines multiple modules to achieve a comprehensive records management and data tracking system. The Law Enforcement Records Management Software will simplify the records management and retrieval process for Law Enforcement Agencies; supporting the Force’s ability to uphold and reinforce judgments, solve crimes, retrieve and input real-time data while building a comprehensive database containing historical and relevant data.

Implementing a web based automated records management software solution relieves personnel from administrative tasks to concentrate on police-related duties and provides a consistent picture of law enforcement activities to multiple users in an instant. Law enforcement services are optimized, increasing the Force’s effectiveness.

I² Security Group believes that data collection and management for Law Enforcement Agencies is critical and an efficient way for solving crimes that in many ways are multi-faceted.

Back to top