Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

How to Build a Better Ballistics Analysis Strategy

Three key components every law enforcement agency needs to ensure a successful workflow, identify and apprehend suspects, and prevent the next shooting.

By Sam Rabadi
police1-900px.jpg
April 16, 2018

One of the biggest challenges currently facing law enforcement is the continuing epidemic of gun violence afflicting many communities across our country. Gun crime impacts almost every major city in the United States. Unfortunately, as of late, it seems to be permeating more and more of the surrounding suburban and rural areas of those cities.

Urban police departments are struggling to keep pace with rising levels of gun crime, focusing their strained resources to address systemic violence associated with feuding drug gangs or criminal organizations battling over turf. While, in many instances, the availability of illegal firearms in the hands of violent criminals continues to fuel the surge in gun violence across neighborhoods in so many of our communities.

An analysis of shooting incidents in some of our most vulnerable communities by various research groups is also showing an even sharper uptick in gun-related violent crimes in various cities across the U.S. Currently, the Chicago Police Department’s most pressing priority continues to be the gun violence perpetrated by localized street gangs and career offenders in furtherance of their criminal activities. Even though it’s a high priority for the police department, the city continues to experience pockets of extreme firearms-related violence and, in many instances, encountering crime scenes with evidence of multiple shooters utilizing multiple firearms. Oftentimes, these crime scenes are littered with dozens of fired cartridge cases strewn about alongside victims, some innocent bystanders caught in the crossfire.   

From practical experience, one thing is clear: unless we can collect and analyze timely intelligence related to ballistic evidence recovered at different crime scenes, we cannot begin to apply effective law enforcement programs and design new strategies to address the problem. Without comprehensive collection of ballistic evidence and timely dissemination of crime gun intelligence, we are destined to use inefficient work processes, resulting in misdirected and wasted resources. Agencies must rethink their strategy for gun-related crime investigations, which starts with ensuring a proper ballistics analysis workflow. Ballistics analysis is integral to connecting crimes and getting violent criminals off the streets. And in order to create a successful strategy, a law enforcement agency needs to include three crucial components to be successful.

Comprehensive Collection

Comprehensive collection – the foundation on which a successful ballistics analysis program is built – means that every fired cartridge case (FCC) recovered at any crime scene must be entered into a ballistics imaging system operated by a law enforcement agency. The entry of ballistic evidence into an imaging database should not be prioritized by the type of crime the evidence was recovered from. Every piece of ballistic evidence needs to be processed, whether it is from a minor incident or a violent crime.

Generally speaking, this protocol may seem contrary to an effective evidence processing program. However, for ballistic comparisons, it is critical to achieving the full potential of an effective ballistics program. For instance, intelligence gleaned from a “stop sign” shooting may yield clues in identifying a suspect in a drive-by shooting or a gun-related homicide. This recovered evidence may then help connect the crime to another scene. Information developed at connected crime scenes, such as video surveillance, phone records, or license plate readers, may provide an investigator with vital clues to help identify and remove a shooter from the streets. 

For a ballistics analysis program to work to its fullest potential, every piece of recovered ballistic evidence must be accounted for. Comprehensive collection practices should be instituted within a law enforcement agency and encompass a collective team approach on the part of leadership, commanders, crime scene technicians, investigators, and responding patrol units. It includes an understanding of the value of comprehensive collection and why it is vital to a successful ballistic program. Leadership must recognize the value of comprehensive collection and its role in “connecting the shots.” It is understandable that resources are often strained in many agencies and decisions must be made as to what an agency can afford to implement certain programs, but implementing successful practices and programs to help curb the crimes may not be as resource intensive as one would commonly think.

Timeliness

Comprehensive collection may be the foundation on which the other pillars of a good ballistics analysis strategy rest, but all the evidence collection in the world is no good if it isn’t entered and analyzed quickly. Ideally, a fired cartridge case recovered at a crime scene, or a test fire from a recovered firearm, should be entered into a ballistics network within 24 hours. The results should then be provided to an investigator immediately afterwards. Many of the successful ballistics programs operating within the United States input, correlate, and disseminate information about ballistic matches within 48 hours.

The principal goal of any successful crime gun intelligence program is to provide information to an investigator to help identify a shooter and possibly prevent the next shooting. That is why it is vitally important to analyze and pass information about fired cartridge cases to investigating officers as quickly as possible so that a potential lead can be generated. Investigators can then use the crime gun intelligence derived from a recovered firearm and its connection to a shooting scene to not only identify a shooter, but also connect various shooting scenes, and potentially preventing the next.

A lead based on matching FCCs or test fires that is weeks or months old is less useful to an investigator due to the potential staleness of the information.  Timeliness of the dissemination of that information is the basic tenant of any successful crime gun intelligence program.

Intelligence Layering

Comprehensive collection and timely dissemination of ballistics information are just two components of a successful ballistics analysis strategy. The third involves the layering of intelligence from other data sets or sources to aid in connecting crimes.

Some of the most successful police agencies in the U.S. investigating gun crime combine forensics, crime gun intelligence, and good old-fashioned police work to identify and apprehend the most violent perpetrators. These agencies are able to provide their investigators with immediate analysis of their recovered evidence and timely dissemination of vital intelligence associated with that evidence. A successful crime gun intelligence program then pulls in and analyzes information from multiple sources to include trace information on a recovered gun from police reports, license plate readers, social media, phone information, etc. By combining and analyzing these various sources, agencies can provide linkages between different crimes and which may help them develop leads to help identify a suspect. The most successful crime gun intelligence programs have all of this information under one platform and produces intelligence referrals in a simple, concise and logical report.

A Better Ballistics Analysis Strategy

Ballistics analysis is just one part of the intelligence cycle that helps detectives solve crimes and get more violent offenders behind bars. It is also critical that detectives have every possible piece of intelligence at their disposal to make connections, create leads and investigate suspects. When investigators can connect the dots between crime scenes and criminals, they can close more cases, interrupt future crimes and get more offenders off the streets.  But, without placing equal importance on comprehensive collection, intelligence layering, and timely dissemination of information, a law enforcement agency’s gun violence strategy will not live up to its full potential.

Ideally, law enforcement agencies should employ a comprehensive solution that ensures that the above best practices exist as a part of its overall gun violence strategy. With all stakeholders – from officers on the scene to detectives in the field to technicians in the crime lab – working according to establish best practices, law enforcement agencies have a better chance of getting violent offenders off the streets and behind bars, reducing gun-related crimes and protecting their communities.

KEYWORDS: crime evidence intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rabadi sam copy

Sam Rabadi is currently the director of business development for Vigilant Solutions. Rabadi is a 25 year veteran of the ATF and currently serves as the Special Agent in Charge of the Philadelphia Field Division. He currently serves as the chief executive of the Philadelphia Division and manages fifteen (15) field offices located throughout the state of Pennsylvania. These offices are comprised of over 200 special agents, industry investigators, deputized police officers, intelligence analysts, and other support staff. As the Special Agent in Charge, Mr. Rabadi has overall responsibility for all criminal and regulatory investigations, intelligence collection programs, and the security and safety of ATF personnel throughout the state of Pennsylvania. Prior to his appointment to the Senior Executive Service, Rabadi served as the Division Chief of the Firearms Operations Division within ATF’s National Headquarters.   As Division Chief, he managed all national firearms enforcement programs and training initiatives to include ATF’s National Integrated Ballistics Imaging Network (NIBIN).  In that role, he authored the 2012 NIBIN Strategic Plan that outlined the goals and strategies for the continuing expansion of ATF's ballistics technology program.  Prior to his headquarters assignment, he served in a variety of supervisory positions within ATF’s Field Operations directorate to include Assistant Special Agent in Charge of the Philadelphia Field Division and Resident Agent in Charge (RAC) of the ATF/New Jersey State Police Firearms Task Force in Trenton, NJ. In 2012, he crafted the Philadelphia Division’s Surge Initiative, a crime reduction plan that partnered with the Philadelphia Police Department to impact spiking violent crime rates in certain parts of the city. He subsequently served as the Incident Commander of that initiative.  Rabadi has also previously supervised ATF’s High Intensity Drug Trafficking Area (HIDTA) Task Force in Philadelphia. During that time period he supervised several long-term investigations that led to the dismantling of some of Philadelphia’s most violent drug gangs.  Prior to his employment with ATF, Rabadi served as a Special Agent with the US Secret Service in New York City and a police officer with the Yonkers Police Department. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • networking-security-freepik

    How to build a better corporate social media policy

    See More
  • 5 minutes w Miller

    5 minutes with Todd Miller - How to build community trust for better public safety

    See More
  • casings-enews

    Why Comprehensive Collection is Critical for Ballistics Analysis

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!