AI Tools Can Help Police Fight Crime

The rise of the Internet has enhanced our lives in many ways. However, It’s also made it easier to commit the most terrible crimes. The anonymity of the Internet and digital currency make it possible to share, sell and trade illicit material from drugs to weapons to victims of human trafficking. 

While the Internet and digital technology have aided the explosion of certain crimes, they can also be an essential tool in the effort to identify victims, accelerate search and rescue times, deter abusers and disrupt the digital platforms where these crimes proliferate.

Technology providers like Veritone are building solutions that employ deep machine learning to fight crime by using it in ways like matching missing children photos to sexual exploitation images on the dark web, using traffic camera footage to locate a vehicle involved and investigating a mass shooting incident by identifying key moments in bystander or security images.

Deep machine learning means that, instead of being programmed to perform specific tasks, a computer can learn independently and adapt its understanding based on exposure to new data. 

The more data it is exposed to, the better the computer can begin to recognise and identify objects based on complex pattern recognition, until it’s finally able to independently and with a high degree of accuracy make predictions. 

According to policeone.com, because computers can be trained with millions of labeled images, they can successfully identify images more quickly than a human can. The algorithms or “neural networks” that can classify what is or is not a picture of a stop sign can also be trained to match other types of images, like car models, license plates, weapons or missing persons.
A machine’s ability to “see” is similar to the way a barcode scanner “sees” the stripes in a uniform bar code. But computer vision, the ability to recognize and, more importantly, categorise and sort images, is what enables deep machine learning to have a wider application in police work.

According to the 2018 Technology Vision report from global management consulting firm Accenture: “There are few crimes today that do not have at least some digital component; for example, the use of social media to create disorder. That’s changing the way that the police need to prevent, detect and solve criminal activity.” 

Fortunately, it’s never been easier or more cost-effective to collect data, store it, and build custom machine learning and deep-learning models. Combining machine learning algorithms with the computational power of the Intel Xeon Scalable processor enables developers to create intelligent and innovative new products, powered by machine learning, that can help law enforcement agencies fight and investigate crime.

Tom Avery, Vice President, Veritone, explained how machine learning has helped coping with the heaps of data collected via digital methods: “One of the unintended consequences of bodycam video is that now all of a sudden the judicial system is just hammered with all this extra data that just a few years ago didn’t exist. 

“The problem with unstructured audio and video data is that if you want to examine it for relevance or factual evidence, you have to sit down and watch it. If you’re already resource-constrained, how do you deal with that?”

Veritone’s aiWARE solution can help solve the challenge by using artificial intelligence to search stored audio and video for objects, spoken words, logos, faces, and more. 

Specific for law enforcement, Veritone’s IDentify employs AI to automatically compare known-offender and person-of-interest records with video and photographic evidence, enabling agencies to quickly identify potential suspects for further investigation.

 “One of the biggest impacts we can have on law enforcement is actually making that data searchable,” Avery said. “Instead of watching it, you can take action against it using a suite of tools, just like you would use a search engine for data that you’re looking for an answer from.”

I-HLS

You Might Also Read:

British Policing Faces The Future:

« Utility Week Cyber Security & Resilience Conference
Australian Defence Chief Issues Cybercrime Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.