Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Wynyard Group -Technology modules

Wynyard’s Crime Science Research Centre brings together the world’s leading data scientists, software engineers and industry experts. Single-minded about building powerful tools that enable our clients to know the threats, connect the dots and uncover the truth, our research focuses the application of advanced analytics, data integration and context aware visualisation. Our technology modules are described in this presentation.

  • Login to see the comments

Wynyard Group -Technology modules

  1. 1. 1 UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND An overview of Wynyard’s software, platforms and data models Published by Wynyard NZ Technology
  2. 2. 2 ABOUT WYNYARD Wynyard Group is a market leader in risk management and crime-fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber-threats and counter terrorism. Wynyard’s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 120,000 users and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information, visit wynyardgroup.com
  3. 3. 3
  4. 4. 4 CRIME SCIENCE RESEARCH INSTITUTE Wynyard is single-minded about building powerful tools so clients know the threats, connect the dots and uncover the truth. Our Crime Science Research Institute brings together the world’s leading: • Data scientists • Software engineers • Industry experts The focus is on the application of advanced analytics, data integration and context-aware visualisation. We create powerful software tools, platforms and data models.
  5. 5. 5 TASKING Wynyard’s software has comprehensive tasking and scheduling capabilities to support business processes. • Configure specific template-based tasks • Notifications are automatically generated • Notifications/alerts sent as email messages • Link tasks to other entities • Users absent for a time can redirect tasks • Task recipients can forward or reject the task • Task results can incorporate link associations to other entities
  6. 6. 6 SEARCH & QUERY The Wynyard platform contains a high-performance, full-featured text search engine which supports phrase, wildcard, fuzzy, proximity and range queries. ACA responds to queries with a listing of the best matches according to its criteria. Path Finder queries allow the user to quickly see paths of links between selected entities – helping find common entities. Paths can be found across all link types to a specified number of degrees of separation. The Path Explorer tool can be used to explore the possible relationships between entities and define a query for specific link and entity types.
  7. 7. 7 VISUALISATION Context-aware visualisation displays entities in the most intuitive way. Visualisation of entities can be customised and is colour coded. Solid or dashed lines indicate known or inferred relationships. Entities can be confirmed or reclassified. Users can reduce the clutter by filtering to examine the strength of the relationships or by opening up multiple graphs.
  8. 8. 8 TEXT MINING Text mining obtains valuable insights from large amounts of unstructured text. Wynyard’s platform automatically discovers and visualises information about entities and their relationships. Several different entity extraction engines, trained on multiple data sets, produce effective entity extraction and recognition. Combined with structured data, this provides a comprehensive and coherent view of all data.
  9. 9. 9 ANOMALY DETECTION Anomaly detection is the search for entities or events that do not conform to an expected pattern. Wynyard’s anomaly detection model for dynamic networks quickly highlights entities, relationships and time periods inconsistent with their usual behaviour. Visual analysis and investigation allows users to navigate through graphical data representations of anomalous instances to focus on nodes and edges with higher anomalous scores.
  10. 10. 10 RULES ENGINE Wynyard’s rules and scoring engine allows data to be monitored in near real time. The easy-to-use rules engine allows customers to build their own rules without specialised IT skills. Users can action or modify the rule templates, combine rules and set rule parameters and thresholds, with a full audit trail.
  11. 11. 11 PREDICTION Wynyard’s predictive analytics combines data from a variety of sources to generate a model of future events. Variables for the model can be derived from historical data and will be weighted for testing and machine learning. Criteria for detecting changes in data can be encoded using the rules engine. The model should be able to predict and uncover activity that is insignificant in isolation but, if undetected, potentially catastrophic. Refine and modify the model over time. New data sources can be incorporated.
  12. 12. 12 OPEN SOURCE INTELLIGENCE Open source intelligence (OSINT) can be used throughout Wynyard’s solutions as a data source for intelligence gathering. Social media, including news aggregation, have proven to be a useful tool for network analysis and intelligence gathering.
  13. 13. 13 XEREM™ DATA MODEL XEREM™ is a data model that enables specific entities, relationships and events to be defined to meet the requirements of a particular customer or solution. Entities represent real world objects or concepts Relationships represent the connections or links between entities Events represent something that happens at a point in time and may include a duration
  14. 14. 14 DATA LOAD AND INGESTION Data from any source that can be provided in text, CSV, XML or JSON formats can be loaded into ACA. Data sources can be structured, semi-structured or unstructured. Common data types are: • SMS messages and phone call records • Financial transaction records • Geographic location data sets • Social media • Documents • Address records • Web page content • Witness reports • Emails
  15. 15. 15 SECURITY There are three fundamental principles of data management and security: • Data integrity • Data availability • Data confidentiality The Wynyard platform security model ensures that data is only accessed and manipulated by authorised personnel. This is achieved by: • Compartmentalising information behind security layers • Restricting access to data • Limiting functionality • Audit logging
  16. 16. 16 RELATED LINKS https://www.wynyardgroup.com/en/news-events-blog/big-data-analytics/ https://www.wynyardgroup.com/en/news-events-blog/new-zealand-police-join-wynyard%E2%80%99s-crime-science- research-institute/ https://www.wynyardgroup.com/en/news-events-blog/using-wynyard-advanced-crime-analytics-on-open-source-data/ https://www.wynyardgroup.com/en/news-events-blog/wynyards-aca-software-helps-analysts-to-uncover-hidden-connections/ https://www.wynyardgroup.com/en/news-events-blog/introducing-wynyard-risk-management-9/ CLICK HERE TO RECEIVE MORE INFORMATION ON WYNYARD'S TECHNOLOGY
  17. 17. 17

×