Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice



Similar documents
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Surveillance and Security Systems

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

PRIME IDENTITY MANAGEMENT CORE

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT

IBM SECURITY QRADAR INCIDENT FORENSICS

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

WHITE PAPER. Gaining Total Visibility for Lawful Interception

From Lawful to Massive Interception : Aggregation of sources. amesys - Prague ISS World Europe 2008

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

Situational Awareness Through Network Visualization

Making critical connections: predictive analytics in government

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

FINFISHER. it intrusion. Remote Monitoring & Infection Solutions FINSPY QUICK INFORMATION

See Criminal Internet Communication as it Happens.

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

A&D srl Consulting & Logistic Systems Galleria Spagna, Padova (PD) - Italy - Telefono Fax Sede Legale:

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Integrated Physical Security and Incident Management

INFO Koffka Khan. Tutorial 6

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Migration/ Asylum. Co-operation in the field of drugs

White Paper. Information Security -- Network Assessment

Data Fusion Centers. Transforming Public Safety Information into Actionable Knowledge

Introduction to CCTNS. (Crime & Criminal Tracking and Network System)

Solutions and IT services for Oil-Gas & Energy markets

Defending against modern cyber threats

Complete IP Video Security Solutions

SURVEILLANCE ENHANCED FACE RECOGNITION

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

INTERPOL. Executive Summary

An Esri White Paper April 2011 Geospatial Intelligence for Fusion Centers

URBAN SECURITY & POLICING

UNODC s Unique Fully Integrated Software SPECIFICALLY FOR FINANCIAL INTELLIGENCE UNITS. goaml.unodc.org

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

THE GLOBAL EVENT MANAGER

How to Choose a CRM System

Compliance Guide: ASD ISM OVERVIEW

Computer/IT Project LIST. Contact:

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

GMS GRAPHICAL MANAGEMENT SYSTEM

MARITIME SURVEILLANCE SYSTEM

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT

Greater Manchester Police. Police service becomes more agile

Cyber Security Metrics Dashboards & Analytics

SILOBREAKER ENTERPRISE SOFTWARE SUITE

Document Management Glossary

Network device management solution

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Patterns of Information Management

Becoming an Agile Digital Detective

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

PROCEDURE Issued: October 5, 2001 Effective Date: September 14, 2000

PERAGO360. Trust and Innovation in Business Critical Solutions

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

IP Video Surveillance

Alien Criminal Response Information Management System (ACRIMe) & Enforcement Integrated Database (EID)

Troubleshooting LANs with Network Statistics Analysis

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

SOFT FLOW 2012 PRODUCT OVERVIEW

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD

RESUME WRITING GUIDE FOR POLICE AND SECURITY EXPERTS. By Katy Stockton April 2008 CANADEM

T a c k l i ng Big Data w i th High-Performance

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

D6.1: Service management tools implementation and maturity baseline assessment framework

CRM. Booklet. How to Choose a CRM System

Intelligence Solutions Monitoring Center. Keep your eyes open

Detect & Investigate Threats. OVERVIEW

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

Industrial Challenges for Content-Based Image Retrieval

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Nokia Siemens Networks Inventory Management

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

Balance collections with retention for each customer. Decision Analytics for debt management in telecommunications

Enterprise Energy Management with JouleX and Cisco EnergyWise

The FBI and the Internet

Transcription:

Siemens Intelligence Platform

Agenda Challenges Requirements Intelligence Tools System Aspects Summary 2

Did you ever wonder If the person flying into your country at a particular date every month is visiting his company s headquarters? but the date sometimes falls on a weekend If the irregular high banking transaction of a certain person is related to an inheritance from his just passed away mother? or from the art theft last week Sure, you are able to answer these questions But do you have - the time? - the staff to follow every seemingly unimportant hint? 3

How do you cope with.. vague subscriber identities Variety of pre-paid SIM cards for mobile phones Internet access from differing public locations Nomadic use of VoIP phones Variety of anonymous log-in identities... undetermined operator LI responsibilities Soft switch and payload via separate operators Peer-to-peer communication 4

Imagine to get a report within minutes: Track all major contact persons of the main militant group in the country using this data sources: - E-mail, Fax, SMS - Phone calls - Bank transfer data - Flight booking details - Credit Card records Identify new suspicious persons and organisations regarding money laundering. Which suspect person or group shows a different behaviour today compared with the normal behaviour? 5

How can I find the needle in the haystack? or at least make the haystack considerably smaller? 6

Requirements KEY VISUAL IPF Challenges Requirements Intelligence Tools System Aspects Summary 7

The Intelligence Platform in the context of Homeland Security Missions Missions Prevent Terrorist threats Intelligence & warnings Organised crime Illegal immigration Smuggling Intelligence Platform Threats & Challenges Respond Domestic counter terrorism Border & transportation security Hijacking Sabotage Nuclear, Biological, Critical infrastructure protection Chemical Agents Defense against catastrophic events Natural Disasters Man-made Disasters Diseases Emergency preparedness and response 8 Protect Recover

Customer Requirements Fact Law Enforcement and Government authorities are drowning in huge amounts of disparate data Challenge To extract intelligence from this data and produce usable information Task To provide a system that can connect to all available data sources to generate comprehensive profiles of persons, groups, or entities in TIME 9

The Intelligence Platform Design principle The Siemens Intelligence Platform is designed for organisations related to Law Enforcement Government Other investigative organisations To support their task in the fields of Intelligent Analysis Case Management Forensics 10

Intelligence Tools Challenges Requirements Intelligence Tools System Aspects Summary 11

Market Positioning Main goal: Creating new intelligence User: Intelligence Officers and Analysts Customising and service are substantial parts of the offer Parallel product line to the Siemens Monitoring Center 12

Your Solution The Intelligence Platform Integrate data from many different sources Structure unstructured data (files) by deploying Indexing and Intelligence Modules Create new intelligence using sophisticated Intelligence Applications Processing of mass data to enable comprehensive investigations Object oriented handling (e.g. targets, cases) One desktop for all applications 13

Intelligence Platform System Architecture draw new intelligence based on enriched meta data Stores all collected information Common workplace for analysts Intelligence Applications Intelligence Mining Intelligence Desk Objects Reporting Roles Workflow Rule based Queries Indexing Data Integration Intelligence Modules Intelligence Warehouse Customer Data Sources and MC enrich the collected unstructured information with new meta data Connect to data sources and gather data Any customer accessible data source 14

Data Integration Examples of Data Sources Siemens Monitoring Center Data Retention Systems Telephone book data bases Telephone billing records Internet Protocol Address GIS Police and criminal records Driving Licence register Traffic control points Vehicle registration data base Credit card transactions Bank account transactions Insurance company data bases Border Control data base Passport data base Finger print data base DNA analysis data base Registry office records Land registry data base Car rental data base Any other data base which contain relevant data 15

Intelligence Warehouse The Intelligence Warehouse stores all collected operational data - Database - File Storage System Data can be entered in different ways - Imported by Data Integration - Created by Intelligence Applications or Intelligence Modules - Manually entered by the Analyst Data stored can be accessed, processed, and viewed from the Intelligence Desk 16

Intelligence Applications and Modules Goal: Create new Intelligence from existing information draw new intelligence based on enriched meta data Intelligence Desk Objects Reporting Roles Workflow Intelligence Applications Intelligenc e Mining Rule based Queries Indexing Intelligence Modules enrich the collected unstructured information with new meta data Intelligence Warehouse Data Integration Customer Data Sources and MC 17

Intelligence Applications Overview Intelligence Mining - Pattern Recognition - Pattern Profiling - Link Analysis Rule Based Queries Indexing - Full Text Indexing and Retrieval - Named Entity Extraction 18

Intelligence Applications Intelligence Mining: Pattern Recognition What is it? Detects automatically all reoccurring patterns meeting certain criteria How does it work? Define the objects and links (relations) Set - time frame in which patterns occur - minimum occurrence count Data Source: Intelligence Warehouse 19

Intelligence Applications Intelligence Mining: Pattern Recognition - Example Example Task: Search for suspicious patterns in 21,237,645 call records Results: 0911/345678 Criteria: 0821/409021 0911/33459 Time frame: 1 hour Minimum count: 5 089/721345 089/71363 0841/3011 Additional Examples money transfers between bank accounts geographical movements of targets 20

Intelligence Applications Intelligence Mining: Pattern Profiling Principle: Pattern Profiling includes patterns with - behavior - communication - movement - relationship A target usually has its individual behavior which only changes slowly over time Sudden changes in target behavior - Generates an alarm - Draws the analyst s attention 21

Intelligence Applications Intelligence Mining: Pattern Profiling - Example ATM drawn money per week Known target pattern Geographical Location Alarms are generated Phone calls per day Deviation No Small Large 22

Intelligence Applications Intelligence Mining: Link Analysis The nodes represent any kind of object available in the database The links represent relations between these objects Display the relation of any information 23

Intelligence Applications Rule Based Queries To construct complex database queries without database knowledge The analyst constructs a semi-graphical model of the query The system retrieves all instances from the database that fulfil the Rule Example: Search the database for all occurrences where two suspects Suspect A Owner Account A $20,000 a) are communicating via phone calls Phone Call Account X b) use a bank account to transfer money via a third party Suspect B Owner Account B $20,000 24

Intelligence Applications Indexing: Full Text Indexing and Retrieval Indexing is performed on all sorts of text documents, like - Web pages - Word documents, Transcripts - Emails, SMS, Chat protocols as well as on data base records in general The Indexing process constantly runs in the background The analyst can quickly search in a Google-like manner for words or phrases Typical response time < 1 sec 25

Intelligence Applications Indexing: Named Entity Extraction - Example Task: Find targets sharing a name of a geographical place Target A Casablanca Riyadh New York Named Entity Recognition Criteria: Detection of geographical places Target A gets associated with Casablanca, Riyadh and New York. Mosow Casablanca Riyadh New York Target B Target A Tunis London Casablanca Dubai Jerusalem Target E Target C Results: Targets A, D, and E share the city name Casablanca Target D Tunis Madrid Casablanca 26

Intelligence Modules Overview Voice Domain Speaker Recognition Language Recognition Word & Phrase spotting Topic Spotting Emotion detection Automatic Transcription Text Domain Topic Spotting Language Detection Optical Character Recognition Automatic Translation An Intelligence Module runs in the background and enriches existing raw information with new intelligence Image Domain Image Recognition (Images/Pictures/Logotypes) Video Recognition 27

Intelligence Modules Topic Spotting in the text domain How does it work? The Analyst defines a number of topics, e.g.: - Drug Trafficking - Corruption - Money Laundering - Kidnapping The analyst provides sample documents containing typical contents for each topic The Intelligence Module is trained on the samples After training the Intelligence Module classifies documents with unknown contents according to the trained classes Topic Spotting is language independent 28

Intelligence Modules Topic Spotting Text example Typical Topic Spotting result (accuracy ~90%) 29

Intelligence Modules Language Detection Text example Topic Spotting applied to language detection (accuracy = 100%) 30

Intelligence Modules Process Management Task: Process an input file with a number of different Intelligence Modules according to a user defined workflow Default processes Analysts can graphically design processes on their own Goal: To enable automated analysis processes 31

Intelligence Modules Process Management - Example Intercept Language Recognition Intelligence Warehouse Language Speaker Intercept Intercept English? yes Speaker Recognition John Doe? yes Word Recognition no no Stop Stop Results: Alarm only if John Doe speaks English and mentions the word Casablanca Word Casablanca"? no Stop yes Alarm 32

Intelligence Desk Overview Common workplace for the analyst to support - Planning and Direction - Analysis and Production - Dissemination within the Intelligence Cycle Integration of the different Intelligence Applications and Modules - Configuration Visualisation Customer and investigation specific reporting 33

Intelligence Desk Concept The Intelligence Platform is based on an object oriented concept Object types - examples: - Target - Telephone number - Car licence number - Bank account number - Civic registration number - Date and Time In each object the user can drill down to get the properties of the object, e.g. - Target - Telephone number, email address - Associated objects 34

Intelligence Desk Views & Roles Views Structured View, similar to Windows Explorer Object View - Targets - Attributes - Communications Analysis View - Intelligence Applications - Intelligence Modules - Process Management Roles & Security Analyst, Investigator (restricted access) Supervisor (defined access) Administrator (contents not accessible) World-wide best-in-class Security 35

Intelligence Desk Object Views Target centric John Doe Lisa Dee John.Doe @msn.com Lisa.Dee@msn.com www.msn.com 069 /522 79383 08221 /493872 030 /38766 0201 /77635 www.siemens.com John.Doe @msn.com Derek.Domino@msn.com www.google.com 0402 /448766 0202 /55535 36

Intelligence Desk Object Views Email centric John.Doe@msn.com Derek.Domino @msn.com John.Doe @msn.com Lisa.Dee@msn.com Eric.Smith @msn.com Sarah.Jones @msn.com John Doe Lisa Dee Derek Domino Eric Smith Sarah Jones 37

Intelligence Desk Location Tracking - GIS Geographical view is applicable to any objects for which location information is available, e.g. Vehicle tracking using Toll Road Systems Location information of ATM machines Mobile phone tracking Geographical IP address mapping of nomadic targets Information provided by surveillance teams 38

Intelligence Desk Workflow Management The Workflow Management supports the customer to comply with standardised procedures: The customer s operational processes are reflected within this system Collaboration functions enable efficient teamwork National and legal restrictions can be depicted within the Workflow 39

Intelligence Desk Reporting - Dissemination Comprehensive reporting function Based on templates Templates are customised depending on specific requirements Mixed content: Charts, tables, plain text, structured text Various output formats, e.g. Word, Acrobat Reader, Excel 40

Statistics The Intelligence Platform constantly maintains different kinds of statistics. These include Workload of the Intelligence Applications and Modules Workload of database and data storage Health information of the Intelligence Applications and Modules Operator statistics per role, user, tool usage etc. 41

System Aspects Challenges Requirements Intelligence Tools System Aspects Summary 42

Intelligence Platform Architecture Scalability: The system can operate as a - Mini-Sized entry system as well as with - Data Center dimensions processing mass data (TB) Redundancy: Avoid single points of failure Dislocation: Remote access possible Modularity: Basic Platform System - with optional extensions Intelligence Modules Intelligence Applications 43

Modularity Basic System Intelligence Warehouse Data Integration Intelligence Desk Basic set of Intelligence Applications Basic set of Intelligence Modules Optional components Additional Intelligence Applications Additional Intelligence Modules Workflow Management 44

Customisation End-to-end solution provided by Siemens High customisation level of - Interfaces - Templates (e.g. Reports) - Workflow Service agreements for - Regular upgrades - Integration of Customer Data Sources - Template modifications 45

Summary Challenges Requirements Intelligence Tools System Aspects Summary 46

Intelligence Platform Advantages Operational Reduced manpower, reduced operating costs Harmonise Homeland Security information Instant customized reports, e.g. Daily Status Process Automated supervision of target behaviour Don t miss any part of information, e.g. Dragnet Investigations Analysis Comprehensive identification of former unknown suspects Very fast results 47

Fact & Objective End-to-end Lawful Interception solutions only from Siemens Making the world safer... with trend-setting intelligence solutions 48

Thank you for your attention 49