AI Tools Can Help Police Fight Crime

The rise of the Internet has enhanced our lives in many ways. However, It’s also made it easier to commit the most terrible crimes. The anonymity of the Internet and digital currency make it possible to share, sell and trade illicit material from drugs to weapons to victims of human trafficking. 

While the Internet and digital technology have aided the explosion of certain crimes, they can also be an essential tool in the effort to identify victims, accelerate search and rescue times, deter abusers and disrupt the digital platforms where these crimes proliferate.

Technology providers like Veritone are building solutions that employ deep machine learning to fight crime by using it in ways like matching missing children photos to sexual exploitation images on the dark web, using traffic camera footage to locate a vehicle involved and investigating a mass shooting incident by identifying key moments in bystander or security images.

Deep machine learning means that, instead of being programmed to perform specific tasks, a computer can learn independently and adapt its understanding based on exposure to new data. 

The more data it is exposed to, the better the computer can begin to recognise and identify objects based on complex pattern recognition, until it’s finally able to independently and with a high degree of accuracy make predictions. 

According to policeone.com, because computers can be trained with millions of labeled images, they can successfully identify images more quickly than a human can. The algorithms or “neural networks” that can classify what is or is not a picture of a stop sign can also be trained to match other types of images, like car models, license plates, weapons or missing persons.
A machine’s ability to “see” is similar to the way a barcode scanner “sees” the stripes in a uniform bar code. But computer vision, the ability to recognize and, more importantly, categorise and sort images, is what enables deep machine learning to have a wider application in police work.

According to the 2018 Technology Vision report from global management consulting firm Accenture: “There are few crimes today that do not have at least some digital component; for example, the use of social media to create disorder. That’s changing the way that the police need to prevent, detect and solve criminal activity.” 

Fortunately, it’s never been easier or more cost-effective to collect data, store it, and build custom machine learning and deep-learning models. Combining machine learning algorithms with the computational power of the Intel Xeon Scalable processor enables developers to create intelligent and innovative new products, powered by machine learning, that can help law enforcement agencies fight and investigate crime.

Tom Avery, Vice President, Veritone, explained how machine learning has helped coping with the heaps of data collected via digital methods: “One of the unintended consequences of bodycam video is that now all of a sudden the judicial system is just hammered with all this extra data that just a few years ago didn’t exist. 

“The problem with unstructured audio and video data is that if you want to examine it for relevance or factual evidence, you have to sit down and watch it. If you’re already resource-constrained, how do you deal with that?”

Veritone’s aiWARE solution can help solve the challenge by using artificial intelligence to search stored audio and video for objects, spoken words, logos, faces, and more. 

Specific for law enforcement, Veritone’s IDentify employs AI to automatically compare known-offender and person-of-interest records with video and photographic evidence, enabling agencies to quickly identify potential suspects for further investigation.

 “One of the biggest impacts we can have on law enforcement is actually making that data searchable,” Avery said. “Instead of watching it, you can take action against it using a suite of tools, just like you would use a search engine for data that you’re looking for an answer from.”

I-HLS

You Might Also Read:

British Policing Faces The Future:

« Utility Week Cyber Security & Resilience Conference
Australian Defence Chief Issues Cybercrime Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.