AI Tools Can Help Police Fight Crime

The rise of the Internet has enhanced our lives in many ways. However, It’s also made it easier to commit the most terrible crimes. The anonymity of the Internet and digital currency make it possible to share, sell and trade illicit material from drugs to weapons to victims of human trafficking. 

While the Internet and digital technology have aided the explosion of certain crimes, they can also be an essential tool in the effort to identify victims, accelerate search and rescue times, deter abusers and disrupt the digital platforms where these crimes proliferate.

Technology providers like Veritone are building solutions that employ deep machine learning to fight crime by using it in ways like matching missing children photos to sexual exploitation images on the dark web, using traffic camera footage to locate a vehicle involved and investigating a mass shooting incident by identifying key moments in bystander or security images.

Deep machine learning means that, instead of being programmed to perform specific tasks, a computer can learn independently and adapt its understanding based on exposure to new data. 

The more data it is exposed to, the better the computer can begin to recognise and identify objects based on complex pattern recognition, until it’s finally able to independently and with a high degree of accuracy make predictions. 

According to policeone.com, because computers can be trained with millions of labeled images, they can successfully identify images more quickly than a human can. The algorithms or “neural networks” that can classify what is or is not a picture of a stop sign can also be trained to match other types of images, like car models, license plates, weapons or missing persons.
A machine’s ability to “see” is similar to the way a barcode scanner “sees” the stripes in a uniform bar code. But computer vision, the ability to recognize and, more importantly, categorise and sort images, is what enables deep machine learning to have a wider application in police work.

According to the 2018 Technology Vision report from global management consulting firm Accenture: “There are few crimes today that do not have at least some digital component; for example, the use of social media to create disorder. That’s changing the way that the police need to prevent, detect and solve criminal activity.” 

Fortunately, it’s never been easier or more cost-effective to collect data, store it, and build custom machine learning and deep-learning models. Combining machine learning algorithms with the computational power of the Intel Xeon Scalable processor enables developers to create intelligent and innovative new products, powered by machine learning, that can help law enforcement agencies fight and investigate crime.

Tom Avery, Vice President, Veritone, explained how machine learning has helped coping with the heaps of data collected via digital methods: “One of the unintended consequences of bodycam video is that now all of a sudden the judicial system is just hammered with all this extra data that just a few years ago didn’t exist. 

“The problem with unstructured audio and video data is that if you want to examine it for relevance or factual evidence, you have to sit down and watch it. If you’re already resource-constrained, how do you deal with that?”

Veritone’s aiWARE solution can help solve the challenge by using artificial intelligence to search stored audio and video for objects, spoken words, logos, faces, and more. 

Specific for law enforcement, Veritone’s IDentify employs AI to automatically compare known-offender and person-of-interest records with video and photographic evidence, enabling agencies to quickly identify potential suspects for further investigation.

 “One of the biggest impacts we can have on law enforcement is actually making that data searchable,” Avery said. “Instead of watching it, you can take action against it using a suite of tools, just like you would use a search engine for data that you’re looking for an answer from.”

I-HLS

You Might Also Read:

British Policing Faces The Future:

« Utility Week Cyber Security & Resilience Conference
Australian Defence Chief Issues Cybercrime Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.