Girl Dies, 2 Others Injured Crossing Street In SF Tenderloin


CBS San Francisco

SAN FRANCISCO (CBS SF) — One child was killed and a woman and child injured Tuesday night in San Francisco’s Tenderloin neighborhood when a vehicle struck three pedestrians crossing the street, according to police.

Police were first called to Polk and Ellis streets around 8 p.m. on a report of an injury collision, according to Officer Gordon Shyy.

A vehicle there had struck three pedestrians crossing the street, including one adult female and two young juveniles, Shyy said.

[worldnow id=9686657 width=435 height=270 type=video]

All three were transported to San Francisco General Hospital, but one of the children, a girl, has died from her injuries, Shyy said.

The adult female is in life threatening condition and the boy is expected to survive.

The driver remained on the scene and is cooperating with police.

Drugs and alcohol do not appear to be a factor in the collision, Shyy said.

Copyright 2013 by…

View original post 21 more words


Stay Connected in 2014


COVOR Fact #4: Knowledge is Power | The Redwine Model



COVOR Fact #4: Knowledge is Power | The Redwine Model.

Making certain your children are safe is priority number one.  A valuable source of information designed to aid in child abduction prevention can be found on the Illinois State Police (ISP) website.

Application of Web Analytic Techniques to Law Enforcement

By CRAIG BYRNES employs analytical techniques in each and every facet of the consumer experience.  Their predictive algorithms bring together association rules, cluster modeling, and a vast array of consumer usage data to bring each customer an experience meant to be uniquely theirs.  Alternatively, it comes together to ease the shopper experience.  These same analytical techniques can be adapted in order to serve law enforcement at every level, but most notably by taking advantage of the same techniques in regard to social media analytics.

Social media analytics can pick out patterns and information paramount to the security of a community, an event or a public figure.  This process is already in place in Medford, Oregon where gangs have begun to utilize social media for their recruitment and retention efforts (Cauguiran, 2012).  Police officers monitor postings based on keywords on Facebook, Twitter, YouTube and the like, and solidify their efforts with targeted opinion, network and text mining.  As a result valuable intelligence is gained and the otherwise unquantifiable is quantified.

This same concept was demonstrated in the finance sector by Capital One (Davenport & Harris, 2007).  This company decided to compete on analytics with the aim of getting to know who their ideal customer would be.  By discovering they were able to target their market thus resulting in heightened service.  Careful attention to detail in determining classifications and global attributes required for gaming future scenarios make this technology and subsequent fact-based analysis more likely to succeed in mitigating the number of decisions and predictions based on intuition theoretically resulting in a more accurate forecasting an ideal candidate for committing a crime or an ideal sector where a crime may be committed.

A recent article written by Dale Peet on the subject points out that this capability, “is still new territory to law enforcement and emergency management personnel,” but goes on to say, “it can’t remain new for long,” (City, 2012.)  A plethora of data exists in open source to which analytical tools such as sentiment analysis can be applied.  This is an intrinsically useful analysis for an array of businesses like and Wal-Mart, but is equally of worth to law enforcement.  That said, it is important to note that actively scrutinizing social media for likely instances of ‘e-Thugging’ is not the only advantageous feature of this analytical tool (Cauguiran, 2012).

“Social media analysis tools, such as sentiment analysis technology, also can be useful in cases where threats have been made against public figures and other people,” (City, 2012).  Peet explains that in January 2011 Jared Loughner, the person responsible for shooting Arizona Congresswoman Gabrielle Giffords, posted anti-government rants on social media sites before the assassination attempt,” (City, 2012).  It is a stretch to presume preventative interdiction would have been possible simply as a result of these postings being scooped up in a data mining operation, but it is a step in the right direction setting the groundwork for prediction.

Law enforcement can also make sizeable steps toward a safer society by applying the same analytic techniques used by usually tied to areas of market research.  Swarm analysis and swarm-based opinion prediction can potentially lead to the development of realistically conceivable preventative strategies of crime prevention leading to enhanced public safety (Bodendorf, 2011).  This method should yield early warning of situations deemed critical to public safety or security by putting in place a systematic process of data collection governed by proper classifications and coding (Bodendorf, 2011).

What emerges is a more intelligible picture of relationships that bring patterns to light yielding trends that can be monitored for anomalies.  By thinking outside normal parameters, and putting into place data mining techniques based on predictive and customized algorithms a safer community can be obtained.

Note: There will always, “be a trade-off between privacy and utility or, in other words, between disclosure risk and information loss,” when dealing with data mining activities and information sharing across the Internet be it open source or not.  It will be interesting to see how the line progresses as the technologies and capabilities evolve (Torra, 2012).


Bodendorf, P. D. (2011, January 23-28). Social Media Analytics. Retrieved from GlobeNet 2011:

Cauguiran, C. (2012, March 26). Gang activity is popping up on social media. Medford, Oregon, United States.

City, A., & Contributor, C. (2012). Viewpoint: To aid emergency management, turn to social media. The American City & County, , n/a. Retrieved from

Davenport, T. H., & Harris, J. G. (2007). Competing on Analytics: The New Science of Winning. United States of America: Harvard Business School of Publishing Corporation.

Torra, G. N.-A. (2012). Privacy-preserving data-mining through micro-aggregation for web-based e-commerce. Bellaterra, Spain: Artificial Intelligence Research Institute.



Man Survives 60 Hours Under Water in Atlantic Ocean

A Nigerian man was able to survive for 60 hours at the bottom of the Atlantic by breathing oxygen from an air pocket before he was rescued by South African rescue divers.

Read more: 2013 Most Heart-Warming, Feel-Good, Positive News Videos |

OSINT Concepts and Contributions (TRM-COVOR)

OSINT Questions

By Craig S. Byrnes

A lack of resources and understanding leaves most law enforcing agencies in a tight spot when it comes to predictive analytics. Open-source intelligence (OSINT) is often overlooked though it is often more reliable than some classified data sources.

The Redwine Model (TRM-COVOR) uses crowd-source enhanced collection streams in order to offer alternative predictive analysis on a variety of subjects. This collective analytic strategy operationalizes and fuses various analytic frameworks, so as to generate a predictive model aimed to combat cognitive bias, frivolous speculation, and nonsensical character assaults. This leads to a greater understanding of nuance, resulting in consistently comprehensive, quantifiable, and relevant OSINT products containing sound and transparent analytic judgments.

Situational awareness and an open-mind willing to force objective thinking are preconditions to actionable intelligence. TRM-COVOR goes a step further and supplements relevancy and timeliness by collecting opinions and thoughts bolstered by complicity within a structured thinking environment.

Visit to see the COVOR-DR system in action.

Participation is safe, rewarding, and easy for everyone. Just look for the #Polls Tag or follow @OSINT981 on Twitter for the questions to appear in your news feed. No sign-in required. No personal or private information will ever be asked for or collected. Better yet, why not give it a shot and weigh in on the Dennis Rodman/North Korea relationship by answering a Yes/No question?

Daily Talker: How Do You Get The Best Deals And Protect Your Money During The Holiday Season?

CBS Boston

It’s Christmas Eve. Only a few more hours until you exchange presents.  Are you done shopping? Be honest. Are you really done shopping?  Or do you need to run out today to pick up a few more things?

It’s not completely your fault. With Thanksgiving so late this year, you had six fewer days to shop.

We want to know, are you a last-minute shopper?

In the wake of the massive security breach at Target stores across the country, are you concerned about the purchases you made this holiday season?

How do you get the best deals and protect your money during the holiday season?

View original post

News, Intelligence, and Analysis from the Open-Source

%d bloggers like this: