Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

How to Build a Better Ballistics Analysis Strategy

Three key components every law enforcement agency needs to ensure a successful workflow, identify and apprehend suspects, and prevent the next shooting.

By Sam Rabadi
police1-900px.jpg
April 16, 2018

One of the biggest challenges currently facing law enforcement is the continuing epidemic of gun violence afflicting many communities across our country. Gun crime impacts almost every major city in the United States. Unfortunately, as of late, it seems to be permeating more and more of the surrounding suburban and rural areas of those cities.

Urban police departments are struggling to keep pace with rising levels of gun crime, focusing their strained resources to address systemic violence associated with feuding drug gangs or criminal organizations battling over turf. While, in many instances, the availability of illegal firearms in the hands of violent criminals continues to fuel the surge in gun violence across neighborhoods in so many of our communities.

An analysis of shooting incidents in some of our most vulnerable communities by various research groups is also showing an even sharper uptick in gun-related violent crimes in various cities across the U.S. Currently, the Chicago Police Department’s most pressing priority continues to be the gun violence perpetrated by localized street gangs and career offenders in furtherance of their criminal activities. Even though it’s a high priority for the police department, the city continues to experience pockets of extreme firearms-related violence and, in many instances, encountering crime scenes with evidence of multiple shooters utilizing multiple firearms. Oftentimes, these crime scenes are littered with dozens of fired cartridge cases strewn about alongside victims, some innocent bystanders caught in the crossfire.   

From practical experience, one thing is clear: unless we can collect and analyze timely intelligence related to ballistic evidence recovered at different crime scenes, we cannot begin to apply effective law enforcement programs and design new strategies to address the problem. Without comprehensive collection of ballistic evidence and timely dissemination of crime gun intelligence, we are destined to use inefficient work processes, resulting in misdirected and wasted resources. Agencies must rethink their strategy for gun-related crime investigations, which starts with ensuring a proper ballistics analysis workflow. Ballistics analysis is integral to connecting crimes and getting violent criminals off the streets. And in order to create a successful strategy, a law enforcement agency needs to include three crucial components to be successful.

Comprehensive Collection

Comprehensive collection – the foundation on which a successful ballistics analysis program is built – means that every fired cartridge case (FCC) recovered at any crime scene must be entered into a ballistics imaging system operated by a law enforcement agency. The entry of ballistic evidence into an imaging database should not be prioritized by the type of crime the evidence was recovered from. Every piece of ballistic evidence needs to be processed, whether it is from a minor incident or a violent crime.

Generally speaking, this protocol may seem contrary to an effective evidence processing program. However, for ballistic comparisons, it is critical to achieving the full potential of an effective ballistics program. For instance, intelligence gleaned from a “stop sign” shooting may yield clues in identifying a suspect in a drive-by shooting or a gun-related homicide. This recovered evidence may then help connect the crime to another scene. Information developed at connected crime scenes, such as video surveillance, phone records, or license plate readers, may provide an investigator with vital clues to help identify and remove a shooter from the streets. 

For a ballistics analysis program to work to its fullest potential, every piece of recovered ballistic evidence must be accounted for. Comprehensive collection practices should be instituted within a law enforcement agency and encompass a collective team approach on the part of leadership, commanders, crime scene technicians, investigators, and responding patrol units. It includes an understanding of the value of comprehensive collection and why it is vital to a successful ballistic program. Leadership must recognize the value of comprehensive collection and its role in “connecting the shots.” It is understandable that resources are often strained in many agencies and decisions must be made as to what an agency can afford to implement certain programs, but implementing successful practices and programs to help curb the crimes may not be as resource intensive as one would commonly think.

Timeliness

Comprehensive collection may be the foundation on which the other pillars of a good ballistics analysis strategy rest, but all the evidence collection in the world is no good if it isn’t entered and analyzed quickly. Ideally, a fired cartridge case recovered at a crime scene, or a test fire from a recovered firearm, should be entered into a ballistics network within 24 hours. The results should then be provided to an investigator immediately afterwards. Many of the successful ballistics programs operating within the United States input, correlate, and disseminate information about ballistic matches within 48 hours.

The principal goal of any successful crime gun intelligence program is to provide information to an investigator to help identify a shooter and possibly prevent the next shooting. That is why it is vitally important to analyze and pass information about fired cartridge cases to investigating officers as quickly as possible so that a potential lead can be generated. Investigators can then use the crime gun intelligence derived from a recovered firearm and its connection to a shooting scene to not only identify a shooter, but also connect various shooting scenes, and potentially preventing the next.

A lead based on matching FCCs or test fires that is weeks or months old is less useful to an investigator due to the potential staleness of the information.  Timeliness of the dissemination of that information is the basic tenant of any successful crime gun intelligence program.

Intelligence Layering

Comprehensive collection and timely dissemination of ballistics information are just two components of a successful ballistics analysis strategy. The third involves the layering of intelligence from other data sets or sources to aid in connecting crimes.

Some of the most successful police agencies in the U.S. investigating gun crime combine forensics, crime gun intelligence, and good old-fashioned police work to identify and apprehend the most violent perpetrators. These agencies are able to provide their investigators with immediate analysis of their recovered evidence and timely dissemination of vital intelligence associated with that evidence. A successful crime gun intelligence program then pulls in and analyzes information from multiple sources to include trace information on a recovered gun from police reports, license plate readers, social media, phone information, etc. By combining and analyzing these various sources, agencies can provide linkages between different crimes and which may help them develop leads to help identify a suspect. The most successful crime gun intelligence programs have all of this information under one platform and produces intelligence referrals in a simple, concise and logical report.

A Better Ballistics Analysis Strategy

Ballistics analysis is just one part of the intelligence cycle that helps detectives solve crimes and get more violent offenders behind bars. It is also critical that detectives have every possible piece of intelligence at their disposal to make connections, create leads and investigate suspects. When investigators can connect the dots between crime scenes and criminals, they can close more cases, interrupt future crimes and get more offenders off the streets.  But, without placing equal importance on comprehensive collection, intelligence layering, and timely dissemination of information, a law enforcement agency’s gun violence strategy will not live up to its full potential.

Ideally, law enforcement agencies should employ a comprehensive solution that ensures that the above best practices exist as a part of its overall gun violence strategy. With all stakeholders – from officers on the scene to detectives in the field to technicians in the crime lab – working according to establish best practices, law enforcement agencies have a better chance of getting violent offenders off the streets and behind bars, reducing gun-related crimes and protecting their communities.

KEYWORDS: crime evidence intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rabadi sam copy

Sam Rabadi is currently the director of business development for Vigilant Solutions. Rabadi is a 25 year veteran of the ATF and currently serves as the Special Agent in Charge of the Philadelphia Field Division. He currently serves as the chief executive of the Philadelphia Division and manages fifteen (15) field offices located throughout the state of Pennsylvania. These offices are comprised of over 200 special agents, industry investigators, deputized police officers, intelligence analysts, and other support staff. As the Special Agent in Charge, Mr. Rabadi has overall responsibility for all criminal and regulatory investigations, intelligence collection programs, and the security and safety of ATF personnel throughout the state of Pennsylvania. Prior to his appointment to the Senior Executive Service, Rabadi served as the Division Chief of the Firearms Operations Division within ATF’s National Headquarters.   As Division Chief, he managed all national firearms enforcement programs and training initiatives to include ATF’s National Integrated Ballistics Imaging Network (NIBIN).  In that role, he authored the 2012 NIBIN Strategic Plan that outlined the goals and strategies for the continuing expansion of ATF's ballistics technology program.  Prior to his headquarters assignment, he served in a variety of supervisory positions within ATF’s Field Operations directorate to include Assistant Special Agent in Charge of the Philadelphia Field Division and Resident Agent in Charge (RAC) of the ATF/New Jersey State Police Firearms Task Force in Trenton, NJ. In 2012, he crafted the Philadelphia Division’s Surge Initiative, a crime reduction plan that partnered with the Philadelphia Police Department to impact spiking violent crime rates in certain parts of the city. He subsequently served as the Incident Commander of that initiative.  Rabadi has also previously supervised ATF’s High Intensity Drug Trafficking Area (HIDTA) Task Force in Philadelphia. During that time period he supervised several long-term investigations that led to the dismantling of some of Philadelphia’s most violent drug gangs.  Prior to his employment with ATF, Rabadi served as a Special Agent with the US Secret Service in New York City and a police officer with the Yonkers Police Department. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • networking-security-freepik

    How to build a better corporate social media policy

    See More
  • George Gerchow podcast

    Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy

    See More
  • 5 minutes w Miller

    5 minutes with Todd Miller - How to build community trust for better public safety

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing