Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

Microsoft Services chose Cambridge Intelligence (CI)’s KeyLines technology after a global beauty parade of potential solutions.

According to CI’s site, KeyLines management platform, with Microsoft Dynamics, help connect and utilize existing data to help provide information with real-time context to identify threat, risk and harm.

With the initial rollout due in mid-2017, Microsoft is working with two UK forces as others are expected to come on board once the platform has proved itself.

Until now, call handlers had to work with technologies that stored the information in different systems and rely on out dated desktop tools. This slowed processes and inhibited a self-service approach to information retrieval.

Huw Edmunds, solution architect at Microsoft Services, explained: “Contact Centre teams need to quickly find and understand a lot of contextual data. They don’t have time to look through long lists of information and historical records. This is an excellent way to bring out all of that relevant information at the right time.”

He added: “We examined several other options. KeyLines was chosen because it provided the level of support and documentation we needed to build network visualization into the Contact Centre solution. It also had the best performance and the right combination of features to provide that intuitive access to data our users needed.”

Microsoft has now engaged with other police forces in the UK who are interested in using the system.

The partners also plan to extend the system beyond its current scope to use the technology in other methods as well.

Some of the applications of CI’s visualisation solutions include, according to the company’s website:

For security and intelligence – Link analysis and network visualisation distils key intelligence from complex connected data, for quick and clear insight. An analyst’s role is to understand and effectively communicate threat information to decision makers at all levels.

Having access to tools such as KeyLines to visualise relationships and see patterns in data is an important component to the success of missions.

KeyLines has been deployed for military and defense data visualisation to help meet one of the biggest challenges in the field: to acquire, analyze and present critical intelligence on the enemy.

A KeyLines chart provides a concise and interactive format for communicating complex connected data in an easy to digest format. Critical intelligence can be readily depicted in a network format, including the lawful interception of communications data, terror cell network structures, the flow of enemy finances, military unit / resource and logistical data.

For law enforcement – The ability to find and prove incriminating links is at the heart of every successful police investigation and prosecution. KeyLines can be used to build interactive charts of people, events and connections as part of an investigation. These charts can be collaborative, helping police staff to find and understand new routes of enquiry and combine all knowledge into one central resource.

Understanding the social structure of criminal gangs and terrorist cells and their internal dynamics is essential for combating them. Without that knowledge, law enforcement agencies cannot know for certain if their surveillance operations are focusing on the ringleaders or just outlying players. KeyLines can be used to visualise vast amounts of communications data, such as telephone, email or social network records, through time.

The technology also has civilian applications, including understanding business intelligence involving complex and connected data, helping pharmaceutical companies combine their data management and discovery activities, understanding social networks in order to find influential people, anticipate peaks in demand for products or services, generate more targeted marketing approaches and predict illegal activity.

I-HLS

Police Using IoT To Detect Crime:             Police Connectivity: In-Car Video & Body Cameras:

 

« The Dark Web Is Hidden In Plain Sight
A Hybrid AI System That Is x 3 Better Than Automated Systems »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.