Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.



Similar documents
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Making critical connections: predictive analytics in government

Making Critical Connections: Predictive Analytics in Government

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

The FBI and the Internet

Big Data for Banks: 5 Profitable Use Cases

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

IBM Content Analytics: Rapid insight for crime investigation

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

The Big Data Paradigm Shift. Insight Through Automation

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Solve Your Toughest Challenges with Data Mining

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Big Data s Big Impact In Financial Investigations

FIN-2014-A007 August 11, 2014

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

Solve your toughest challenges with data mining

Who s Doing the Hacking?

Setting the Standard for Safe City Projects in the United States

How To Create An Insight Analysis For Cyber Security

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

The Sophos Security Heartbeat:

Statement of. Mark Nelsen. Senior Vice President, Risk Products and Business Intelligence. Visa Inc. House Ways & Means Subcommittee.

Endpoint Threat Detection without the Pain

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Analyzing HTTP/HTTPS Traffic Logs

Video Analytics and Security

Fighting Advanced Threats

Establishing a State Cyber Crimes Unit White Paper

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

AMPLIFYING SECURITY INTELLIGENCE

Stay ahead of insiderthreats with predictive,intelligent security

Seven Things To Consider When Evaluating Privileged Account Security Solutions

CYBERSECURITY INESTIGATION AND ANALYSIS

MORPHO CRIMINAL JUSTICE SUITE

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Continuous Network Monitoring

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

How the oil and gas industry can gain value from Big Data?

Evolution Of Cyber Threats & Defense Approaches

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

The Impact of Cybercrime on Business

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Executive Cyber Security Training. One Day Training Course

Working with the FBI

A Love Affair: Cyber Security, Big-data and Risk

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Automated Protection Against Advanced Attacks

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

IBM SECURITY QRADAR INCIDENT FORENSICS

Cyber and Operational Solutions for a Connected Industrial Era

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A New Era Of Analytic

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Legislative Language

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Solve your toughest challenges with data mining

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

10 Things Every Web Application Firewall Should Provide Share this ebook

NCIS Overview. Prevent Terrorism Protect Secrets Reduce Crime

Getting Ahead of Malware

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

PUBLIC SAFETY CYBER SECURITY

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Testimony Of Ms. Anne Wallace. On behalf of. The Identity Theft Assistance Corporation. Identity Theft: A Victims Bill of Rights

FBI AND CYBER SECURITY

You Can t Afford the Risks

1. Understanding Big Data

Federal Bureau of Investigation

CyberArk Privileged Threat Analytics. Solution Brief

Transcription:

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

I m not going to get more money. I m not going to get more cops. I have to be better at using what I have, and that s what predictive policing is about If this old street cop can change the way that he thinks about this stuff, then I know that my [officers] can do the same. Charlie Beck Los Angeles Police Chief Share this ebook: 2

1 Social Network Analysis In spite of more recent changes in the way that we communicate, the intelligence community has always employed content analysis to determine the most active and influential people in a criminal network. There was a time when this kind of intelligence operation required many operatives recording the movements of individuals and their communications. Today this information trail is digital. From telephone records to Facebook posts, to emails, the actions of a criminal enterprise or terrorist network are being recorded as strings of structured and unstructured text. Not only does law enforcement need to adjust to the digital paper trail by developing digital analysis tools, but the entire structure of police and intelligence work must change the way that personnel think about criminal and terrorist communications. These technologies have already begun to trickle down from larger federal agencies down to City and State intelligence and law enforcement agencies. Major cities have implemented social data into their crime-fighting strategies and seen some successes. Tools from some analytics firms provide an initial layer of Twitter analysis that allow law enforcement to capture data on crimes and specific suspects. New techniques are emerging that will help investigators get to an answer faster, identifying and ranking information the investigators will need to see first. Algorithms that find and qualify relevant information automatically will be the next step forward in crime fighting technologies. 3

Some social media monitoring companies do a great job of measuring volume of opinions and sentiment, but none of them allow you to get to key influencers. For intelligence, it is critical that we identify and isolate individuals and networks in the social graph that will cause unrest. That s the distinction. Anonymous Emcien Intelligence Partner Share this ebook: 4

2 Connecting Seemingly Unrelated Case Files There was a time when seemingly disparate cases were connected only through the reasoning skills of investigators. Today, case management software and analysis technologies allow zones, precincts, and entire departments to enter files and notes into a more structured data system, allowing investigators to search that content for connections between crimes, locations, and individuals. With this search ability, investigators can come up with, and verify, their suspicions more quickly than ever. Now data on a specific type of crime or an individual suspect can be accessed almost instantly, even on the scene in some cases, to help officers link cases they are working on with cases that have not one attribute in common, but that match two, three, or more relevant attributes. These advances lead to a greater degree of accuracy than was previously thought possible. The case files can be related and ranked based on their content, telling users not only that the documents are related, but to present them in a list ranked by how closely they are related. The benefit to police officers, investigators, and intelligence officials is that instead of reaching out across offices and departments, these documents are automatically connected by the key words and phrases they contain. 5

3 Some Crime Prediction Modeling of the most exciting advances in law enforcement have come from the combination of various data sources to create a model for predicting criminal behavior. Given enough data, these models can make reasonable predictions of when and where crime spikes will occur. Proactive agencies can then use these predictions to divert enforcement resources to the locations and times that are likely to see increased crime, in essence preventing crimes before they happen. All of this data was already available in the form of arrest records, crime-scene reports, traffic stops, and incident reports, but today digital records can be reviewed, queried, and modeled to more easily extract valuable information. Today, departments can explore the trends and relationships that exist between the surrounding circumstances and the criminal act itself. With the ability to understand the nature of crimes across time, location, and many other factors, law enforcement and government representatives can begin to address the root causes of crime spikes rather than being reactive to crimes. 6

New technologies keep the leadership up to speed on what s happening where, if not in real-time, than at least in a very recent time frame. It allows management to analyze, organize and respond in an efficient manner. Ralph Taylor Temple University criminal justice professor and crime researcher Share this ebook: 7

4 Network Oversight and Cyber Security There are no easy parallels for the rapid scaling of data that governments, businesses, and agencies must protect. As physical paper files have been replaced with digital, these records are available almost anywhere around the world, sacrificing security for the sake of convenience. Governments that do keep pace with advances in modern technology are collecting and storing all kinds of sensitive data. Personal data, financial data, and even intellectual property must be distributed across local networks and between corporate partners. Widespread access leaves this sensitive information open to threats from foreign governments, hackers and hacktivists, and private companies looking for competitive advantage. Botnets, backdoors, rootkits, trojans, and worms are the tools used by these bad-actors to infiltrate the sensitive data collected by governments. Addressing these intrusions has become an ongoing game of chase, with intruders adapting new methods as companies and law enforcement catch on to their schemes. For each advancement in fighting cyber crime the criminals adapt with new ways to cover their tracks or extract information without being detected. 8

Mitigating Threats to Safety by Leveraging Data The modern trail of breadcrumbs is no longer entirely a physical one investigators must now be scouring both the physical and the digital realms to keep pace with today s bad actors. The Emcien technology suite helps law enforcement and intelligence agencies by automatically mapping connections in data, revealing the connections between documents, people, recurring events and the circumstances that lead to events that threaten security, safety, and property. EmcienScout offers automatic pattern detection for unstructured machine data and human generated text data. Emcien s pattern detection enables: Anomaly detection in machine data to reveal suspicious network traffic Automatically map the connections between documents to link case files and evidence documents Identify the factors that lead to spiking criminal activity Analyze social data and correspondence to create a network of bad actors, identifying the most influential individuals and their followers Automated fraud identification and investigation tools Request a Live Demo Share this ebook: 9