Linkage software, free download. Office Tools downloads - Linkage by David M. Rector and many more programs are available for instant and free download.

Analysis
  1. Mar 30, 2018  Link analysis is a data analysis technique used in network theory that is used to evaluate the relationships or connections between network nodes. These relationships can be between various types of objects (nodes), including people, organizations and even transactions. Link analysis is essentially a kind of knowledge discovery that can be.
  2. Link Analysis applies to a variety of industries, from detecting fraudulent transactions, to analyzing social networks for market analysis, and building smart cities. For each of these challenges, link analysis is often applied to data to connect the dots, find the needle in the haystack, or unify and break down silos.

Analysis of Competing Hypotheses Software -- http://www2.parc.com/istl/projects/ach/ach.html
Analysis of Competing Hypotheses (ACH) is a simple model for how to think about a complex problem when the available information is incomplete or ambiguous, as typically happens in intelligence analysis. The software downloadable here takes an analyst through a process for making a well-reasoned, analytical judgment. It is particularly useful for issues that require careful weighing of alternative explanations of what has happened, is happening, or is likely to happen in the future. It helps the analyst overcome, or at least minimize, some of the cognitive limitations that make prescient intelligence analysis so difficult. ACH is grounded in basic insights from cognitive psychology, decision analysis, and the scientific method. It helps analysts protect themselves from avoidable error, and improves their chances of making a correct judgment.
This software was developed by Palo Alto Research Center (PARC) in collaboration with Richards J. Heuer, Jr. It was developed for use by the U.S. Intelligence Community with funding from the Intelligence Community's Advanced Research and Development Activity (ARDA) and the Office of Naval Research (ONR).
In distributing ACH, PARC is making the presently downloadable version of the program available to the general public at no cost when used for non-commercial or educational purposes subject to the terms and conditions of its end user license.
CARVER2 - Target Analysis Software -- http://www.ni2cie.org/CARVER2.asp
CARVER2, a free software tool that provides a non-technical method of comparing and ranking critical infrastructure and key resources. It is the only assessment tool that ranks critical infrastructure across sectors.
The CARVER2 vulnerability assessment tool is designed to quickly and easily identify and compare potential natural disaster and/or terrorist targets at the local, state and national levels in order to assist government officials in the allocation of protective resources. The CARVER2 target analysis tool is available free of charge to federal, state, and local government officials and agencies, as well as non-profit and educational institutions. See below to request the installation package.
Computer Online Forensic Evidence Extractor -- https://cofee.nw3c.org/
Microsoft COFEE is being made available to individuals employed by law enforcement agencies within the United States and Canada. COFEE means the Computer Online Forensic Evidence Extractor tool that fits on a USB drive and automates the execution of commands for data extraction and related documentation. Distribution is limited to law enforcement agencies. Access to the COFEE product requires verification of employment with a law enforcement agency and agreement to the terms and conditions of the Microsoft/NW3C Sublicense Agreement. The verification process is automated if you have an email account with RISS.NET or LEO.GOV, or have an account with NW3C.
Computer Security Evaluation Tool -- http://www.us-cert.gov/control_systems/satool.html
The Department of Homeland Security (DHS) has released its latest cyber system assessment tool to the Critical Infrastructure/Key Resources (CI/KR) community. The Computer Security Evaluation Tool (CSET) is a desktop software tool that guides users through a step-by-step process to evaluate their cyber systems and network security practices against recognized industry standards.
According to DHS, the benefits of CSET include:

  • Contributing to an organization's risk management and decision-making process;
  • Raising awareness and facilitating discussion on cyber security within the organization;
  • Highlighting vulnerabilities in the organization's systems and providing recommendations on ways to address those vulnerabilities;
  • Identifying areas of strength and best practices being followed in the organization;
  • Providing a method to systematically compare and monitor improvement in the cyber systems; and
  • Providing a common industry-wide tool for assessing cyber systems.


CrimeStat III -- http://www.icpsr.umich.edu/CrimeStat/
CrimeStat III is a spatial statistics program for the analysis of crime incident locations, developed by Ned Levine & Associates under the direction of Ned Levine, PhD, that was funded by grants from the National Institute of Justice. The program is Windows-based and interfaces with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law enforcement agencies and criminal justice researchers in their crime mapping efforts. CrimeStat is being used by many police departments around the country as well as by criminal justice and other researchers. The latest version is 3.3. The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp', ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates various spatial statistics and writes graphical objects to ArcGIS®, MapInfo®, Surfer for Windows®, and other GIS packages.


Comprehensive R Archive Network -- http://cran.r-project.org/
Comprehensive R Archive Network a freely available language and environment for statistical computing and graphics which provides a wide variety of statistical and graphical techniques: linear and nonlinear modelling, statistical tests, time series analysis, classification, clustering, etc.

Decrypto 8.5 -- http://www.blisstonia.com/software/WebDecrypto/
Decrypto is a fast and automated cryptogram solver by Edwin Olson. It can decode word games often found in newspapers, including puzzles like cryptoquips and patristocrats. You can also download a stand-alone version. [We have also found this program useful for quickly breaking simple substitution ciphers used by some criminal gangs.]
Encryption Wizard (EW) DoD Software Protection Initiative -- http://spi.dod.mil/ewizard.htm
EW is an SPC implementation of the Advanced Encryption Standard (AES) (Rijndael) augmented with a file manager Graphical User Interface (GUI) for ease of use. The 128-bit encryption/decryption algorithm used by Encryption Wizard is considered cryptographically strong and is routinely used in National Security Agency (NSA) and National Institute of Standards and Technology (NIST) certified products. Encryption Wizard is designed to protect data at rest and in transit (such as email attachments). EW is an easy to use tool for protecting sensitive (but not classified) documents, and for protecting files before transmission via email. It allows a user to encrypt files using a 128-bit implementation of the Advanced Encryption Standard (AES) with simple drag-and-drop efficiency. Encryption Wizard can significantly increase an organization‘s security posture at little to no cost to protect sensitive data in transit (E-mail, FTP, or shared web folders) or at rest on a removable storage device. The primary version for government users utilizes a FIPS 140-2 validated encryption engine licensed from RSA
Link Analysis Software For Mac
Environmental Protection Agency | VSAT -- http://yosemite.epa.gov/ow/SReg.nsf/description/VSAT
VSAT is a risk assessment software tool for water, wastewater, and combined utilities of all sizes. The tool assists drinking water and wastewater owners and operators in performing security threats and natural hazards risk assessments, as well as updating utility Emergency Response Plans. EPA, in collaboration with Water Sector partners, has updated VSAT to be consistent with the 2007 Risk Analysis and Management for Critical Asset Protection framework. The upgraded tool includes a new user-interface, an enhanced natural disaster threat assessment process, and a revised risk assessment approach. VSAT 5.0 software will provide the following benefits:
•An intuitive process with improved navigation and enhanced work tracking features;
•An improved analytical approach that will make consequence, vulnerability, and likelihood of occurrence assessments of threats more transparent; and
•A natural disaster assessment process supported by historical information to enable likelihood determinations.
NOTE: Although designed for water system vulnerabilities, VSAT is highly applicable to other types of risk analysis.
Individuals lacking a background in information technology often have a need for simple tools that allow the rapid creation of data collection instruments and data analysis, visualization, and reporting using epidemiologic methods. Epi Info™, a suite of lightweight software tools, delivers core ad-hoc epidemiologic functionality without the complexity or expense of large, enterprise applications. Epi Info™ is easily used in places with limited network connectivity or limited resources for commercial software and professional IT support. Epi Info™ is flexible, scalable, and free while enabling data collection, advanced statistical analyses, and geographic information system (GIS) mapping capability. It's free from the CDC, intended for public health practitioners and epidemiologists, but it includes many statistical techniques that crime analysts use too, including multivariate techniques. Epi Info training is available on-line from the UNC Center for Public Health Preparedness.

Google Earth -- http://www.google.com/earth/index.html
Google Earth lets you view satellite imagery, maps, terrain, 3D buildings, galaxies in outer space, and the depths of the ocean.
Near Repeat Calculator -- http://www.temple.edu/cj/misc/nr/
This software originates with the relatively recent discovery of the near repeat phenomenon in burglary patterns, a discovery that has highlighted the communicability of crime events that affect the risk level at nearby locations. The near repeat phenomenon states that if a location is the target of a crime (such as burglary), the homes within a relatively short distance have an increased chance of being burgled for a limited number of weeks (Townsley et al, 2003; Bowers and Johnson, 2004; Johnson and Bowers, 2004a, 2004b). This communicability of risk to nearby locations for a short amount of time raises the possibility that other crime types may also suffer from a near repeat spatio-temporal pattern of behavior.
The analytical method employed builds on a space-time clustering methods first pioneered by Knox (1964) to study the epidemiology of childhood leukemia. The Knox test seeks to determine whether there are more event-pairs observed that occur with a closer proximity in space and time than would be expected on the basis of a random distribution. To do this, each shooting for a particular dataset is compared with every other and the spatial and temporal distance between them recorded. The result is a matrix of space-time distances.
To establish a null hypothesis measure against which to test the shooting patterns, we employ a Monte Carlo simulation process. By computing multiple simulations of the expected values, it is possible to generate an expected distribution under a null hypothesis – using the actual study data. This provides a unique way to examine what would occur if there were no near repeat patterns.
Problem Analysis Module -- http://www.popcenter.org/learning/pam/
Problem Analysis Module (PAM) gives you a framework for analyzing any persistent crime and public safety problem. PAM will ask you to input information concerning every aspect of the problem and then suggest the kinds of responses you could try. PAM was developed to assist police problem solving through the asking of specific questions. The questions come from research into a set of powerful theories within the field of Environmental Criminology – particularly Routine Activity Theory, Situational Crime Prevention, and Crime Pattern Theory.

Quantum GIS (QGIS) is a powerful and user friendly Open Source Geographic Information System (GIS) that runs on Linux, Unix, Mac OSX, Windows and Android. QGIS supports vector, raster, and database formats. QGIS is licensed under the GNU Public License.
RAIDS On-Line Public Crime Map -- http://bairanalytics.com/raidsonline
BAIR’s free public crime map, RAIDS Online, connects law enforcement with the community to reduce crime and improve public safety. RAIDS Online is absolutely free to law enforcement and the public! RAIDS On-line’s public crime map works with any RMS to allow law enforcement to share crime data with the public through an easy-to-use online crime map and analytics dashboard. The data is displayed with 8 fields of limited offense information to protect victim privacy. This is a valuable tool for law enforcement to communicate crime activity to their citizens and the media.
Swot analysis of mac cosmetics
RFFlow is a powerful, yet easy to use, tool for drawing flowcharts, organization charts, and many other kinds of diagrams. You will quickly create professional-looking charts for documents, presentations, or the Web.
RFFlow has the capability to generate crime analysis charts. http://www.rff.com/sample_criminal_analysis.htm
Risk Self-Assessment Tool for Commercial Facilities - http://www.dhs.gov/files/programs/gc_1259861625248.shtm
The Risk Self Assessment Tool is a free, Web-based tool that delivers an all-hazard analysis of a facility’s current risk level and offers options for consideration on reducing and managing potential vulnerabilities. The self-assessment allows public assembly and lodging venues to manage their relative risk and provide a safe and secure venue for employees and guests.

SketchFace -- http://sketchface.com/
Created by Ali Daneshmandi, SketchFace is a free web application for creating photo-realistic facial composite pictures.
Squidmat (courses of action evaluation program) -- http://faculty.tamu-commerce.edu/jmstauffer/Squidmat/
The program compares two or more courses of action based on two or more evaluation criteria. The user arranges the evaluation criteria in descending order of importance and tells the program how much more important each criterion is than the next lower criterion. These importance ratings are used to calculate weights for each criterion. SquidMat takes user-supplied values for each course-of-action/criterion combination and converts them to Z scores. Using the criterion weights, the program calculates weighted sums for each course of action. The course of action with the highest weighted sum is considered to be the best. SquidMat is designed as a replacement decision matrix program for the CAS3 program DECMAT.
(DECMAT – Decision Matrix Software -- http://www.dcswift.com/military/software.html)
Statistical Software (Links to several free programs) -- http://www.freestatistics.altervista.org/en/stat.php

Link Analysis Software For Law Enforcement

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).