Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

Microsoft Services chose Cambridge Intelligence (CI)’s KeyLines technology after a global beauty parade of potential solutions.

According to CI’s site, KeyLines management platform, with Microsoft Dynamics, help connect and utilize existing data to help provide information with real-time context to identify threat, risk and harm.

With the initial rollout due in mid-2017, Microsoft is working with two UK forces as others are expected to come on board once the platform has proved itself.

Until now, call handlers had to work with technologies that stored the information in different systems and rely on out dated desktop tools. This slowed processes and inhibited a self-service approach to information retrieval.

Huw Edmunds, solution architect at Microsoft Services, explained: “Contact Centre teams need to quickly find and understand a lot of contextual data. They don’t have time to look through long lists of information and historical records. This is an excellent way to bring out all of that relevant information at the right time.”

He added: “We examined several other options. KeyLines was chosen because it provided the level of support and documentation we needed to build network visualization into the Contact Centre solution. It also had the best performance and the right combination of features to provide that intuitive access to data our users needed.”

Microsoft has now engaged with other police forces in the UK who are interested in using the system.

The partners also plan to extend the system beyond its current scope to use the technology in other methods as well.

Some of the applications of CI’s visualisation solutions include, according to the company’s website:

For security and intelligence – Link analysis and network visualisation distils key intelligence from complex connected data, for quick and clear insight. An analyst’s role is to understand and effectively communicate threat information to decision makers at all levels.

Having access to tools such as KeyLines to visualise relationships and see patterns in data is an important component to the success of missions.

KeyLines has been deployed for military and defense data visualisation to help meet one of the biggest challenges in the field: to acquire, analyze and present critical intelligence on the enemy.

A KeyLines chart provides a concise and interactive format for communicating complex connected data in an easy to digest format. Critical intelligence can be readily depicted in a network format, including the lawful interception of communications data, terror cell network structures, the flow of enemy finances, military unit / resource and logistical data.

For law enforcement – The ability to find and prove incriminating links is at the heart of every successful police investigation and prosecution. KeyLines can be used to build interactive charts of people, events and connections as part of an investigation. These charts can be collaborative, helping police staff to find and understand new routes of enquiry and combine all knowledge into one central resource.

Understanding the social structure of criminal gangs and terrorist cells and their internal dynamics is essential for combating them. Without that knowledge, law enforcement agencies cannot know for certain if their surveillance operations are focusing on the ringleaders or just outlying players. KeyLines can be used to visualise vast amounts of communications data, such as telephone, email or social network records, through time.

The technology also has civilian applications, including understanding business intelligence involving complex and connected data, helping pharmaceutical companies combine their data management and discovery activities, understanding social networks in order to find influential people, anticipate peaks in demand for products or services, generate more targeted marketing approaches and predict illegal activity.

I-HLS

Police Using IoT To Detect Crime:             Police Connectivity: In-Car Video & Body Cameras:

 

« The Dark Web Is Hidden In Plain Sight
A Hybrid AI System That Is x 3 Better Than Automated Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

xMatters

xMatters

xMatters is a digital service availability platform that helps enterprises prevent, manage, and resolve IT incidents before they can become business problems.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.