Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesPhysical Security

The New Science of Criminal Apprehension and Prevention

The New Science of Criminal Apprehension and Prevention - Security Magazine
May 4, 2018

According to FBI crime statistics released in September of 2017, crime increased in the U.S. for the second consecutive year – posting a 4.1-percent surge last year compared to previous figures. FBI Director Christopher Wray called for the country to “get beyond anecdotal evidence and collect more comprehensive data so that we have a clearer and more complete picture of crime in the United States.” He continued, “The more complete the data, the better we can inform, educate and strengthen all of our communities.”

There’s no doubt that there is more video surveillance data in existence today than ever before and camera installations are on the rise. According to a recent industry report published by Scalar Market Research, the global physical security market is expected to grow from $71.59 billion in 2016 to approximately $158.79 billion by 2022. The more cameras there are in businesses and municipalities monitoring and recording activities, the greater the chances of apprehending and prosecuting criminals.

But the vast amount of video surveillance footage available is taxing security and law enforcement officials as the information collected requires viewing and investigation to determine identities. Ninety percent of the time, law enforcement officials do not have the time to identify the criminals captured on video as they dedicate their time to the most serious offenses. And while getting the video in front of a large audience is helpful, the chances of having a video of any one crime, such as retail robbery or theft broadcast on the local news, are slim given the vast number of cases reported every day.

“The vast amount of video surveillance footage available is taxing security and law enforcement officials as the information collected requires viewing and investigation to determine identities.”

However, there is a new science of crime solving and prevention that dramatically improves how new video surveillance technologies are applied to identify and apprehend criminals – and reduce crime. Captis Intelligence’s Criminal Apprehension and Prevention platform provides a cloud-based solution that employs crowdsourcing and advanced analytics to effectively help identify and apprehend suspects and deter future incidents from occurring.

The platform is built on four primary application pillars: Intelligence, Information, Identification and Investigation.

Intelligence includes an interactive map of crime in the member’s area that’s updated daily with Actionable Crime Tracking (ACT), and provides alerts based on defined criteria such as location radius, type of crime, warnings and pictures/videos of criminal events and more.

Information is built on a secured information exchange forum with other users’ businesses and a portal to share information or make inquiries directly to the police, which can be done via anonymous messaging.

Identification is accomplished with facial recognition analytics from captured video by users’ private and/or public/municipal surveillance systems to find matches of known criminals using Captis’ database of more than 15 million criminals. When a match is made, the suspect’s identity and dossier, including criminal record are provided to the user. If no match was made, the suspect’s image can be posted to Captis Intelligence’s Solveacrime.com crowdsourcing website (which is free for the public to view) to broadcast suspect and crime information via social media and other crowdsourcing conduits. Solveacrime.com followers can then enter anonymous tips which are sent to law enforcement officials for investigation.

Investigation is facilitated using the “Suspect Search” feature, which is utilized when there is no image of the suspect or the image is not clear enough to use with facial analytics. Instead, members can enter specific search criteria such as location, age, race, height, weight, scars, tattoos, etc., which is compared against Captis Intelligence’s databases of mugshots, terrorists, organized crime members, international criminals, sex offenders, wanted criminals and missing persons. The platform then produces a list of the closest matches along with a dossier and picture of each match. These databases have been compiled over several years, and are believed to be the world’s largest source of criminal data outside of government agencies. PRISM (Protective Research & Investigation in Social Media) is another investigation tool in the Captis I-4. It can scan all social media anywhere in the world including the Deep Web for specific people, terms, phrases, or even networks of targeted individuals and their communications.

The four “I’s” combine to unify and expand situational awareness, collect geographic crime intelligence, conduct social media investigations, poll criminal databases, implement crowdsourcing intelligence gathering, and exchange information with members and law enforcement agencies.

Solveacrime.com plays a critical role in solving crimes by expanding information gathering processes beyond active members and law enforcement agencies to the public. The crowdsourcing process can be broken down into six steps:

  1. Upload a crime scene video to Solveacrime.com
  2. Automatic notification to registered users of a criminal activity in a given geographic radius
  3. Automatic distribution of surveillance video and/or images of the perpetrator to dozens of Captis release conduits including Facebook, Twitter, Instagram, message boards and media outlets
  4. Members of the public using the App submit anonymous tips on Solveacrime.com and are given a unique tip ID number used for collection of any associated reward
  5. Tips are delivered to police and the submitter of the crime
  6. Police apprehend the suspect and a reward is paid to the tipster who provided the tip leading to the arrest

One of Captis Intelligence’s most notable accounts is the pharmacy chain giant, Rite Aid. In the fall of 2017, a man entered a Rite Aid location, jumped over the counter, took cash from the register and then fled before police arrived. A few days later a woman who lives in the area saw a surveillance feed with a familiar looking face on social media. She filled out a tip form on Solveacrime.com, and the subject was apprehended shortly after. -Tips like this solicited through Solveacrime.com have more than doubled Rite Aid’s case-closure rate.

According to Robert Oberosler, VP of Asset Protection at Rite Aid, “We’re now closing more than 50 percent of our violent crimes within a week of using Solveacrime.com. It is one of the most interesting and successful crime resolution tools that I have ever used over my 40 years of experience. Solveacrime.com helps Rite Aid solve more crimes, and provides a powerful deterrent by letting criminals know that Rite Aid is actively using crowdsourcing to identify and help apprehend criminals.”

One of the most surprising results Oberosler cites is the speed with which tips come in via Solveacrime.com. “Law enforcement personnel have been astonished at the overall results, as many cases are solved in a couple of days. In one instance we posted a crime and arrested the perpetrator in about three hours,” says Oberosler.

Captis Intelligence’s powerful Criminal Apprehension and Prevention platform has resulted in a significant change in how Rite Aid conducts criminal investigations and implements crime prevention strategies, according to Oberosler. “Instead of being purely defensive, we are now on the offensive, and the results are impressive. “It’s fun to play offense.”

KEYWORDS: crime insider threats loss prevention security investigations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • retail-enews

    The Science of Shoplifting and How Crime Prevention Begins Before Customers Enter a Retail Store

    See More
  • cyber5-900px.jpg

    New Report Examines the Creation of a Cyber Criminal

    See More
  • Meeting

    DHS S&T Announces $35M Funding for New Center of Excellence in Terrorism Prevention and Counterterrorism Research

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!