Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

Microsoft Services chose Cambridge Intelligence (CI)’s KeyLines technology after a global beauty parade of potential solutions.

According to CI’s site, KeyLines management platform, with Microsoft Dynamics, help connect and utilize existing data to help provide information with real-time context to identify threat, risk and harm.

With the initial rollout due in mid-2017, Microsoft is working with two UK forces as others are expected to come on board once the platform has proved itself.

Until now, call handlers had to work with technologies that stored the information in different systems and rely on out dated desktop tools. This slowed processes and inhibited a self-service approach to information retrieval.

Huw Edmunds, solution architect at Microsoft Services, explained: “Contact Centre teams need to quickly find and understand a lot of contextual data. They don’t have time to look through long lists of information and historical records. This is an excellent way to bring out all of that relevant information at the right time.”

He added: “We examined several other options. KeyLines was chosen because it provided the level of support and documentation we needed to build network visualization into the Contact Centre solution. It also had the best performance and the right combination of features to provide that intuitive access to data our users needed.”

Microsoft has now engaged with other police forces in the UK who are interested in using the system.

The partners also plan to extend the system beyond its current scope to use the technology in other methods as well.

Some of the applications of CI’s visualisation solutions include, according to the company’s website:

For security and intelligence – Link analysis and network visualisation distils key intelligence from complex connected data, for quick and clear insight. An analyst’s role is to understand and effectively communicate threat information to decision makers at all levels.

Having access to tools such as KeyLines to visualise relationships and see patterns in data is an important component to the success of missions.

KeyLines has been deployed for military and defense data visualisation to help meet one of the biggest challenges in the field: to acquire, analyze and present critical intelligence on the enemy.

A KeyLines chart provides a concise and interactive format for communicating complex connected data in an easy to digest format. Critical intelligence can be readily depicted in a network format, including the lawful interception of communications data, terror cell network structures, the flow of enemy finances, military unit / resource and logistical data.

For law enforcement – The ability to find and prove incriminating links is at the heart of every successful police investigation and prosecution. KeyLines can be used to build interactive charts of people, events and connections as part of an investigation. These charts can be collaborative, helping police staff to find and understand new routes of enquiry and combine all knowledge into one central resource.

Understanding the social structure of criminal gangs and terrorist cells and their internal dynamics is essential for combating them. Without that knowledge, law enforcement agencies cannot know for certain if their surveillance operations are focusing on the ringleaders or just outlying players. KeyLines can be used to visualise vast amounts of communications data, such as telephone, email or social network records, through time.

The technology also has civilian applications, including understanding business intelligence involving complex and connected data, helping pharmaceutical companies combine their data management and discovery activities, understanding social networks in order to find influential people, anticipate peaks in demand for products or services, generate more targeted marketing approaches and predict illegal activity.

I-HLS

Police Using IoT To Detect Crime:             Police Connectivity: In-Car Video & Body Cameras:

 

« The Dark Web Is Hidden In Plain Sight
A Hybrid AI System That Is x 3 Better Than Automated Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Cyber Risk Policies

Cyber Risk Policies

CyberRiskPolicy.com is a joint venture between the Poindexter Surety Group of companies and Gibbs Cyber Security.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.