Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

Microsoft Services chose Cambridge Intelligence (CI)’s KeyLines technology after a global beauty parade of potential solutions.

According to CI’s site, KeyLines management platform, with Microsoft Dynamics, help connect and utilize existing data to help provide information with real-time context to identify threat, risk and harm.

With the initial rollout due in mid-2017, Microsoft is working with two UK forces as others are expected to come on board once the platform has proved itself.

Until now, call handlers had to work with technologies that stored the information in different systems and rely on out dated desktop tools. This slowed processes and inhibited a self-service approach to information retrieval.

Huw Edmunds, solution architect at Microsoft Services, explained: “Contact Centre teams need to quickly find and understand a lot of contextual data. They don’t have time to look through long lists of information and historical records. This is an excellent way to bring out all of that relevant information at the right time.”

He added: “We examined several other options. KeyLines was chosen because it provided the level of support and documentation we needed to build network visualization into the Contact Centre solution. It also had the best performance and the right combination of features to provide that intuitive access to data our users needed.”

Microsoft has now engaged with other police forces in the UK who are interested in using the system.

The partners also plan to extend the system beyond its current scope to use the technology in other methods as well.

Some of the applications of CI’s visualisation solutions include, according to the company’s website:

For security and intelligence – Link analysis and network visualisation distils key intelligence from complex connected data, for quick and clear insight. An analyst’s role is to understand and effectively communicate threat information to decision makers at all levels.

Having access to tools such as KeyLines to visualise relationships and see patterns in data is an important component to the success of missions.

KeyLines has been deployed for military and defense data visualisation to help meet one of the biggest challenges in the field: to acquire, analyze and present critical intelligence on the enemy.

A KeyLines chart provides a concise and interactive format for communicating complex connected data in an easy to digest format. Critical intelligence can be readily depicted in a network format, including the lawful interception of communications data, terror cell network structures, the flow of enemy finances, military unit / resource and logistical data.

For law enforcement – The ability to find and prove incriminating links is at the heart of every successful police investigation and prosecution. KeyLines can be used to build interactive charts of people, events and connections as part of an investigation. These charts can be collaborative, helping police staff to find and understand new routes of enquiry and combine all knowledge into one central resource.

Understanding the social structure of criminal gangs and terrorist cells and their internal dynamics is essential for combating them. Without that knowledge, law enforcement agencies cannot know for certain if their surveillance operations are focusing on the ringleaders or just outlying players. KeyLines can be used to visualise vast amounts of communications data, such as telephone, email or social network records, through time.

The technology also has civilian applications, including understanding business intelligence involving complex and connected data, helping pharmaceutical companies combine their data management and discovery activities, understanding social networks in order to find influential people, anticipate peaks in demand for products or services, generate more targeted marketing approaches and predict illegal activity.

I-HLS

Police Using IoT To Detect Crime:             Police Connectivity: In-Car Video & Body Cameras:

 

« The Dark Web Is Hidden In Plain Sight
A Hybrid AI System That Is x 3 Better Than Automated Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.