The Memex Covert Intelligence Solution is based upon Memex’s market-leading Law Enforcement Platform which comprises a number of recently enhanced and updated components.
The solution consists of five modules:
• Telecoms Data Authorities
• RIPA Surveillance Authorities
• CHIS Management
• and Asset Management
With the exception of Asset Management, these modules are all in use with UK Police Forces having been developed in partnership.
Sitting above the modules is a common set of Core Records based upon POLE Methodology allowing information from all five business areas to be linked to a single set of records. The solution also contains a module of common tools including the Memex MoPI tool, which allows all information to be managed within the solution in accordance with MoPI guidance as part of the day-to-day management of intelligence.
An Intelligence Management System first; a Compliance System second
Our Covert Intelligence and Authority Management solution is not a compliance system employed within a covert intelligence context. It is specifically designed to enable organisations to improve the way that they collate, evaluate, risk assess, analyse, share and interpret sensitive information and covert intelligence, in order to better target limited resources and to achieve greater impact whilst guaranteeing compliance.
Best of Breed
Memex’s solution has been designed in conjunction with both serving and retired practitioners possessing many years expertise in the areas of intelligence, CHIS management and RIPA applications. Our CHIS solution was designed in partnership with a national agency. Its central design philosophy is that covert intelligence must be fully exploited, shared safely with the wider Force and used to significant effect.
Reduce Cost of Ownership and Compliance
Memex employs data import tools, search technology and a variety of analytical, workflow, visualisation, security and risk management tools developed over many years in conjunction with leading covert intelligence practitioners. Because it is easy to use, staff require a minimum of training and can easily access the system even if they are occasional users. Even if users are not familiar with RIPA requirements, the Memex solution is rich in help functionality and generates quality assured applications.
The Memex covert solution developed permits the automated transmission of sanitized intelligence from Dedicated Source Units to Force Intelligence Bureaus, without any requirement for re-keying of data. This helps to maximise the value derived from covert intelligence and sensitive information, protects sources and sensitive information, keeps Forces compliant, reduces errors and maximises efficiency.
Measure Value for Money
Memex Covert Intelligence system is the first system, especially when integrated with a Force Intelligence system, to offer qualitative rather than quantitative information about CHIS. In other words it allows you to view your most effective informants, to track the effectiveness of their intelligence in terms of operational policing outcomes, and establish the level of value for money. It audits the full nature of tasking requests, the number actioned and those where viable information was obtained.
It allows identification of areas where tasking requests are received and lack of CHIS in a given area prevents tasking. But more importantly it provides an aid to addressing the newly identified gap. Put simply – in terms of business uplift – Memex will enable your agency to:-
• Consider CHIS tasking as one of a range of options, in dealing with any Policing Problem, and make best use of their resources accordingly.
• Audit the information trail from Request to disposal, and reduce risk as a consequence.
• Ascertain the cost effectiveness of the use of CHIS by comparing results to costs, which is helpful in an environment of scarce funding.
Create Corporate Memory
Retaining a record of Covert Operations within the Memex Solution would provide an easily searchable ‘Corporate Memory’. This will allow ready identification of previous subjects but more importantly allow an assessment of which tactics were most successful in any given scenario.
This business benefit is achievable within this solution because it is possible to search across all free text and attachments within the system, not merely searching structured fields. As it is often not clear today what you will be searching for in the future, this facility is a major benefit of any modern intelligence solution.
Prevent ‘Blue on Blue’
Holding all covert modules on a single platform with links to common core records ensures that any links between operations are identified at an early stage. This ensures that officer safety and integrity is not compromised by operations coming together.
The security model ensures that only those with relevant authorities see these links and prevents the compromise of intelligence and operations.