SlideShare a Scribd company logo
1 of 13
The Art of Where 
The Art of Where
The Art of Where 
For our Customers 
Timely access to critical intelligence 
can save lives, improve mission 
planning, and significantly reduce 
operational costs.
The Art of Where 
The Challenge? 
• Quickly converting 
hundreds of thousands of 
lines of location data from 
GPS devices, call details, 
pings, financial, social, 
etc., into….
The Art of Where 
…into Actionable Intelligence – Pattern of Life 
The Itinerary 
A color coded-coded 
visual representation 
of 51 days of GPS 
tracking data (80,000 
fixes) in less than 2 
minutes!
The Art of Where 
Call Detail Analysis 
View telephone events and 
their details on the map. 
Interrogate the details by 
specific time, or by specific 
towers.
The Art of Where 
Compare Entities 
Show different data for the 
same target on the same map. 
Add other suspects to view how 
multiple targets with multiple 
data-sets interact. 
Tracker data, call-details, and Twitter 
data for the same target over a 3 hour 
period.
The Art of Where 
Missed Opportunities? 
Because of the effort and lag, 
analysis often focuses on 
“recent” locations; leaving 
valuable intelligence locked 
inside the data.
The Art of Where 
Manually identifying networks, meetings, locations of interest, 
potential dead-drops, and other organized crime activity 
through multiple tracks is almost impossible.
The Art of Where 
Multi-Target Analysis 
Multi-Target Analysis 
shows interactions 
of targets at shared 
locations. It can also 
identify potential 
dead-drop locations.
The Art of Where 
Missed Opportunities? 
If you were able to predict 
target whereabouts based on 
collected data could your 
Police Department optimize 
mission planning?
The Art of Where 
Predictions 
Our Predictions module 
summarizes a targets Pattern-of- 
Life to provide an investigator 
with the ability to plan missions 
(battery calculations, 
installations, apprehension) and 
coordinate surveillance team 
activity for maximum efficacy.
The Art of Where 
G2 Research – Key Benefits 
• Force Multiplier 
• Faster Access to Intelligence 
• Increased Value of Surveillance Investment 
• Increased Safety for Agents in the Field 
We enable Efficiency and Effectiveness
The Art of Where 
POWERED BY 
For more information please 
reach out to us! 
sales@g2-research.com 
1 (888) 744-3191 
www.G2-Research.com

More Related Content

Similar to Law Enforcement - Overview

Overview - Track Group Analytics
Overview - Track Group AnalyticsOverview - Track Group Analytics
Overview - Track Group AnalyticsToby Keeping
 
ACEDS - ZyLAB webinar - AI Based eDiscovery Analytics
ACEDS - ZyLAB webinar - AI Based eDiscovery AnalyticsACEDS - ZyLAB webinar - AI Based eDiscovery Analytics
ACEDS - ZyLAB webinar - AI Based eDiscovery AnalyticsAnnelore van der Lint
 
Orchestrating Collective Intelligence
Orchestrating Collective IntelligenceOrchestrating Collective Intelligence
Orchestrating Collective IntelligenceTuri, Inc.
 
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016MLconf
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
How new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finalHow new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finaljcscholtes
 
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...Localogy
 
Power Decision-making at Scale with Address-based Spatial Data Science
Power Decision-making at Scale with Address-based Spatial Data SciencePower Decision-making at Scale with Address-based Spatial Data Science
Power Decision-making at Scale with Address-based Spatial Data SciencePrecisely
 
Understanding the Data Behind Programmatic
Understanding the Data Behind ProgrammaticUnderstanding the Data Behind Programmatic
Understanding the Data Behind ProgrammaticPrecisely
 
Indoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingIndoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingChaitali Bose Roy
 
SapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadSapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadOReillyStrata
 
Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threatGreg Hanchin
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAmazon Web Services
 
FME UC 2014: Hexagon Keynote
FME UC 2014: Hexagon KeynoteFME UC 2014: Hexagon Keynote
FME UC 2014: Hexagon KeynoteSafe Software
 
Location guru product and solution
Location guru product and solutionLocation guru product and solution
Location guru product and solutionShilkumar Patil
 
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
5733   a deep dive into IBM Watson Foundation for CSP (WFC)5733   a deep dive into IBM Watson Foundation for CSP (WFC)
5733 a deep dive into IBM Watson Foundation for CSP (WFC)Arvind Sathi
 
11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data mining11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data miningAlexander Decker
 

Similar to Law Enforcement - Overview (20)

Overview - Track Group Analytics
Overview - Track Group AnalyticsOverview - Track Group Analytics
Overview - Track Group Analytics
 
ICU TRACKNET
ICU TRACKNETICU TRACKNET
ICU TRACKNET
 
ACEDS - ZyLAB webinar - AI Based eDiscovery Analytics
ACEDS - ZyLAB webinar - AI Based eDiscovery AnalyticsACEDS - ZyLAB webinar - AI Based eDiscovery Analytics
ACEDS - ZyLAB webinar - AI Based eDiscovery Analytics
 
Orchestrating Collective Intelligence
Orchestrating Collective IntelligenceOrchestrating Collective Intelligence
Orchestrating Collective Intelligence
 
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
Jonathan Lenaghan, VP of Science and Technology, PlaceIQ at MLconf ATL 2016
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
How new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finalHow new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-final
 
Matrix Mapper
Matrix MapperMatrix Mapper
Matrix Mapper
 
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...
PlaceConf London 2018: Radical Transparency - Unlocking the Black Box of Loca...
 
Power Decision-making at Scale with Address-based Spatial Data Science
Power Decision-making at Scale with Address-based Spatial Data SciencePower Decision-making at Scale with Address-based Spatial Data Science
Power Decision-making at Scale with Address-based Spatial Data Science
 
Understanding the Data Behind Programmatic
Understanding the Data Behind ProgrammaticUnderstanding the Data Behind Programmatic
Understanding the Data Behind Programmatic
 
Indoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingIndoor localization using wifi fingerprinting
Indoor localization using wifi fingerprinting
 
SapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_uploadSapientNitro Strata_presentation_upload
SapientNitro Strata_presentation_upload
 
Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threat
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - Splunk
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
FME UC 2014: Hexagon Keynote
FME UC 2014: Hexagon KeynoteFME UC 2014: Hexagon Keynote
FME UC 2014: Hexagon Keynote
 
Location guru product and solution
Location guru product and solutionLocation guru product and solution
Location guru product and solution
 
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
5733   a deep dive into IBM Watson Foundation for CSP (WFC)5733   a deep dive into IBM Watson Foundation for CSP (WFC)
5733 a deep dive into IBM Watson Foundation for CSP (WFC)
 
11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data mining11.challenging issues of spatio temporal data mining
11.challenging issues of spatio temporal data mining
 

More from G2 Research Ltd.

More from G2 Research Ltd. (8)

Sample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 ResearchSample - Extending IBM i2 Analysis with G2 Research
Sample - Extending IBM i2 Analysis with G2 Research
 
ICU Enterprise
ICU EnterpriseICU Enterprise
ICU Enterprise
 
ICU MULTIVIEW
ICU MULTIVIEWICU MULTIVIEW
ICU MULTIVIEW
 
ICU TRACKSMITH
ICU TRACKSMITHICU TRACKSMITH
ICU TRACKSMITH
 
ICU PREDICTIONS
ICU PREDICTIONSICU PREDICTIONS
ICU PREDICTIONS
 
ICU OBSERVER
ICU OBSERVERICU OBSERVER
ICU OBSERVER
 
ICU CELLULAR
ICU CELLULARICU CELLULAR
ICU CELLULAR
 
Case Study - Waterloo Regional Police
Case Study - Waterloo Regional PoliceCase Study - Waterloo Regional Police
Case Study - Waterloo Regional Police
 

Recently uploaded

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 

Law Enforcement - Overview

  • 1. The Art of Where The Art of Where
  • 2. The Art of Where For our Customers Timely access to critical intelligence can save lives, improve mission planning, and significantly reduce operational costs.
  • 3. The Art of Where The Challenge? • Quickly converting hundreds of thousands of lines of location data from GPS devices, call details, pings, financial, social, etc., into….
  • 4. The Art of Where …into Actionable Intelligence – Pattern of Life The Itinerary A color coded-coded visual representation of 51 days of GPS tracking data (80,000 fixes) in less than 2 minutes!
  • 5. The Art of Where Call Detail Analysis View telephone events and their details on the map. Interrogate the details by specific time, or by specific towers.
  • 6. The Art of Where Compare Entities Show different data for the same target on the same map. Add other suspects to view how multiple targets with multiple data-sets interact. Tracker data, call-details, and Twitter data for the same target over a 3 hour period.
  • 7. The Art of Where Missed Opportunities? Because of the effort and lag, analysis often focuses on “recent” locations; leaving valuable intelligence locked inside the data.
  • 8. The Art of Where Manually identifying networks, meetings, locations of interest, potential dead-drops, and other organized crime activity through multiple tracks is almost impossible.
  • 9. The Art of Where Multi-Target Analysis Multi-Target Analysis shows interactions of targets at shared locations. It can also identify potential dead-drop locations.
  • 10. The Art of Where Missed Opportunities? If you were able to predict target whereabouts based on collected data could your Police Department optimize mission planning?
  • 11. The Art of Where Predictions Our Predictions module summarizes a targets Pattern-of- Life to provide an investigator with the ability to plan missions (battery calculations, installations, apprehension) and coordinate surveillance team activity for maximum efficacy.
  • 12. The Art of Where G2 Research – Key Benefits • Force Multiplier • Faster Access to Intelligence • Increased Value of Surveillance Investment • Increased Safety for Agents in the Field We enable Efficiency and Effectiveness
  • 13. The Art of Where POWERED BY For more information please reach out to us! sales@g2-research.com 1 (888) 744-3191 www.G2-Research.com

Editor's Notes

  1. Our clients rely on timely intelligence. Not having access to it when they need it endangers lives, missions and can result in significant operational inefficiencies. With tightening budgets, these are no longer acceptable to many forces.
  2. Analysts we have spoken with tell us regularly that they are challenged to meet the tasks presented to them in a timely manner. Much of their day is spent looking at data with precious few hours left to work on the intelligence the data presents. As a result, there is a significant effort required to create an intelligence product from tracks of data. With higher priority items always being dumped on them, the delay in getting intelligence to those who request it is even longer.
  3. Their challenge is to quickly convert thousands of lines of location-based surveillance into….
  4. ….Actionable Intelligence. Seen here is a Pattern of Life from a 51 day track we imported into our tool. You can interrogate the data with a visual context to quickly with either a temporal or spatial focus.
  5. Because of the significant amount of effort involved and the lag that occurs, we also hear that much of the analysis on location-based surveillance is limited to “where was he a few hours ago” or “where is he right now”. Because investigators who rely on the intelligence are not aware they could get more from the data, valuable intelligence is simply left locked inside the data.
  6. Digesting volumes of data on a single target can challenge any analyst. The prospect of trying to overlap data for multiple targets to identify meetings, locations of interest, potential dead-drop location and other important intelligence is simply daunting; if not impossible.
  7. By comparison, our Advanced Multi-Target tool does just that in a matter of moments. Being able to quickly identify meetings, locations of interest and such, while also being able to drill into each, offers the analyst and those in the field with an array of possibilities.
  8. A second opportunity that we are told that is being missed is due to those in the field not having access to the intelligence contained in data already provided to the Analysts. By not getting an intelligence product back to the operatives in the field quickly, not only are suspects not acquired, but data collectors must re-do their efforts and supply new data to the Analysts thereby creating an repeating loop of inefficiency.
  9. Aside from being able to very quickly being able to get intelligence back into the field, an example of the value within the data can be shown with our Predictions feature. By compiling a pattern of life of a target over a period of time, our Predictions engine can equip an Analyst with the ability to predict not only a target’s location with a weighed value, it can also provide customers of the intelligence product with routes of travel to and from those locations, time at/away from a location, etc. Whether it is to intercept a target, or simply to change batteries in the tracker, knowing the safest time to engage is of vital importance.
  10. High level benefits of our suite