Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

Microsoft Services chose Cambridge Intelligence (CI)’s KeyLines technology after a global beauty parade of potential solutions.

According to CI’s site, KeyLines management platform, with Microsoft Dynamics, help connect and utilize existing data to help provide information with real-time context to identify threat, risk and harm.

With the initial rollout due in mid-2017, Microsoft is working with two UK forces as others are expected to come on board once the platform has proved itself.

Until now, call handlers had to work with technologies that stored the information in different systems and rely on out dated desktop tools. This slowed processes and inhibited a self-service approach to information retrieval.

Huw Edmunds, solution architect at Microsoft Services, explained: “Contact Centre teams need to quickly find and understand a lot of contextual data. They don’t have time to look through long lists of information and historical records. This is an excellent way to bring out all of that relevant information at the right time.”

He added: “We examined several other options. KeyLines was chosen because it provided the level of support and documentation we needed to build network visualization into the Contact Centre solution. It also had the best performance and the right combination of features to provide that intuitive access to data our users needed.”

Microsoft has now engaged with other police forces in the UK who are interested in using the system.

The partners also plan to extend the system beyond its current scope to use the technology in other methods as well.

Some of the applications of CI’s visualisation solutions include, according to the company’s website:

For security and intelligence – Link analysis and network visualisation distils key intelligence from complex connected data, for quick and clear insight. An analyst’s role is to understand and effectively communicate threat information to decision makers at all levels.

Having access to tools such as KeyLines to visualise relationships and see patterns in data is an important component to the success of missions.

KeyLines has been deployed for military and defense data visualisation to help meet one of the biggest challenges in the field: to acquire, analyze and present critical intelligence on the enemy.

A KeyLines chart provides a concise and interactive format for communicating complex connected data in an easy to digest format. Critical intelligence can be readily depicted in a network format, including the lawful interception of communications data, terror cell network structures, the flow of enemy finances, military unit / resource and logistical data.

For law enforcement – The ability to find and prove incriminating links is at the heart of every successful police investigation and prosecution. KeyLines can be used to build interactive charts of people, events and connections as part of an investigation. These charts can be collaborative, helping police staff to find and understand new routes of enquiry and combine all knowledge into one central resource.

Understanding the social structure of criminal gangs and terrorist cells and their internal dynamics is essential for combating them. Without that knowledge, law enforcement agencies cannot know for certain if their surveillance operations are focusing on the ringleaders or just outlying players. KeyLines can be used to visualise vast amounts of communications data, such as telephone, email or social network records, through time.

The technology also has civilian applications, including understanding business intelligence involving complex and connected data, helping pharmaceutical companies combine their data management and discovery activities, understanding social networks in order to find influential people, anticipate peaks in demand for products or services, generate more targeted marketing approaches and predict illegal activity.

I-HLS

Police Using IoT To Detect Crime:             Police Connectivity: In-Car Video & Body Cameras:

 

« The Dark Web Is Hidden In Plain Sight
A Hybrid AI System That Is x 3 Better Than Automated Systems »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.