SlideShare a Scribd company logo
1 of 15
Flexible and Intelligent Access to InformationColumboDiscovery™ and ColumboForensics™ June 2010 1
Contents Context Information Challenges Our Approach to Information Discovery The Technologies we Use Columbo®Information Discovery Platform Automatic Entity Extraction Themes and Links Forensics Case Study Summary and benefits 2
Context Economic pressures versus increasing demand Increasing  technical sophistication of criminal and terrorist Criminal investigations versus digital investigations Information technology – failure of expectations Shortcomings of software  - 8 years on from Soham LEA working together? 3
Information Challenges Massive data volumes Petabytes + of data  (1 Petabyte (1000 terabytes) = approx 3000 million documents  Forensics analysis of hundreds of devices on large cases Diverse sources The Internet – www, blogs, twitter, social networks, virtual worlds, chat-rooms Internal – mail, office systems, intelligence databases, operational systems Third-party databases such as ISPs and Telcos Computers, storage devices, mobile phones, cameras, sat-navs, Wi Intelligence from other law enforcement agencies Integration of data in multiple formats Structured, unstructured (text), multi-media (image, voice, video) Deleted and hidden Languages / alphabets Dangers and shortcomings of search Search engine issues – ranking, relevance etc. Terminology, expert knowledge of subject…. Can distort investigative approach Spellings / miss-spellings 4
Some spelling challenges 5 112 different combinations!
Our Approach to Information Discovery Help the user to understand and explore the content We identify entities, themes (subjects), links – in most cases automatically People, Places, Objects, Account Numbers, Telephone Numbers, etc. Themes, Concepts, Sentiment Hard and soft (weak) links between Entities and Themes We present this in ways that help users understand and explore (discover) the data Entity /Theme Extractions Summaries Timelines and Graphs Connection and Relationship Diagrams Geo-location Maps Intelligent search Prompted Sounds like / spelt like  Semantic (find similar content to this) Automate processes including reports, where possible 6
Some of the Technologies we use We use advanced analysis techniques that result in much better conceptual understanding and forensic performance These techniques include using semantic indexing and linking and more novel proprietary ‘digital fingerprint’ techniques (CSI – Columbo® Semantic Indexing) Our platform is scalable and our techniques are geared to indexing and comparing massive amounts of information – many ‘discovery’ requirements are a numbers and speed game Our platform can be trained to recognise certain patterns where appropriate (both text and image based), and can run autonomously and covertly if required A key difference is that our solutions ‘turn search upside down’ We get the data to tell us what is there, rather than just looking for something specific We don’t search for the needle hidden in the haystack – we remove the hay and find the needle together with whatever else might be there Gillc has a number of products and applications, the main one of which is ColumboDiscoverytm, our integrated information discovery platform 7
Columbo® Information Discovery Platform 8 Reports & Comparisons Relationships ColumboCOREtm (Columbo Object Resource Enhancement) ColumboDiscoverytm (Intelligence Operations & Analysis Techniques) Geo-Location Entities & Themes Timelines & Events
Automatic Entity Extraction All structured and unstructured information resources can be automatically processed for entity extraction, including: Documents – including web pages, social media, office applications, email, databases Digital devices – cameras, phones, SIM cards, storage devices The entity types shown (left) are a selection of those already coded into Columbo® software. Others could include for example: Airports and airlines Known street gangs Additional types can be added by Gillc or added as Custom types by the end user Metadata from applications, image files and digital devices is also extracted as entity information. For example: Device type and ID – for phones, cameras, computers etc. Author and creation date – for enterprise documents etc. Entity classification is customisable, and includes various identification and matching techniques, for example: Detect entities where slang, codes or ‘street names’ are used Detect entities where there are multiple spellings Detect complex /variable formats – e.g. phone numbers, dates 9
Themes and Links Themes and Classification Themes and sub-themes are automatically identified from textual resource information Various techniques are used for theme deduction Various techniques are used for image classification / identification Links Hard and soft links can be identified or uncovered by interacting with the information within Columbo® Hard links show direct links between entities, entities and themes, and themes Soft links (or weak links) can be identified by: Analysing the presence/popularity of entities and themes in different resources/devices Using Columbo® Semantic Indexing (CSI) to identify varying levels of link strength CSI is also used for linking / categorising images 10
ColumboForensicstm – case study 11 X 4 X 4 X  3 X 10 Suspect  4 X 7 X 9 Suspect 3 Suspect 5 X 2 X 5 Suspect 2 Suspect  6 X 2 X 2 Suspect  7 Suspect 1 X 4
Forensics Process 12 Image Process E01 Image Process Suspect One Image Process Pro-active Comparison Between Suspects Image Process Indexing       and Analysis Gathering Image Process E01 Image Process E01 Suspect Two Image Process E01 Image Process 3 days (7 suspects, 22 phones, 37 computers) (Existing search driven approach requires each device to be analysed separately – estimate of 55- 75 days)
ColumboForensicstm – case study benchmarks
Some other Law Enforcement considerations All necessary security features including: Multiple protection levels Security at document, entity and word level – extensive audit trail options Can build case / suspect ‘databases’ allowing: Intra-case analysis Cross-case analysis Suspect consolidation whilst retaining case integrity Secure links between agencies could allow controlled comparison of content Performant Quick response times and turn-around offers real opportunity to change processes Potential for comprehensive but rapid tri-age 14
Summary and Benefits The Columbo® group of products are powerful, next generation information discovery applications Columbo®  applications are tailored towards ‘discovery’, as opposed to ‘search’ Search implies that the user already knows what to look for Discovery allows the data to identify what may be relevant, and allows the user to interact with it in order to find the information contained within it The software delivers significant efficiency savings, by both rapidly finding relevant data and automating much of the process including reporting The software enhances effectiveness, automatically compares content and incrementally builds an intelligence repository Columbo® is “implementation-lite” and has capacity to readily link diverse agencies together, sharing and collaborating critical data as appropriate 15

More Related Content

What's hot

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 

What's hot (10)

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 

Viewers also liked

Feria ticket
Feria ticketFeria ticket
Feria ticketuss
 
Webquest copia
Webquest   copiaWebquest   copia
Webquest copiadeverling
 
Sketchbook drawings4.jpg
Sketchbook drawings4.jpgSketchbook drawings4.jpg
Sketchbook drawings4.jpgCiaraGunter
 
Presentación1 (1)
Presentación1 (1)Presentación1 (1)
Presentación1 (1)famustafa
 

Viewers also liked (6)

A speech outline
A speech outlineA speech outline
A speech outline
 
Feria ticket
Feria ticketFeria ticket
Feria ticket
 
Webquest copia
Webquest   copiaWebquest   copia
Webquest copia
 
Sketchbook drawings4.jpg
Sketchbook drawings4.jpgSketchbook drawings4.jpg
Sketchbook drawings4.jpg
 
Presentación1 (1)
Presentación1 (1)Presentación1 (1)
Presentación1 (1)
 
Template (Arta Boga)
Template (Arta Boga)Template (Arta Boga)
Template (Arta Boga)
 

Similar to Vigiles Overview June 2010

Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
E police gara prezentacija en
E police gara prezentacija enE police gara prezentacija en
E police gara prezentacija enmadaravinberga
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and ChallengesAhmed Banafa
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attemptj9lai
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626j9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for ITj9lai
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITj9lai
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 

Similar to Vigiles Overview June 2010 (20)

Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
E police gara prezentacija en
E police gara prezentacija enE police gara prezentacija en
E police gara prezentacija en
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
Forensics for IT - ACC 626
Forensics for IT - ACC 626Forensics for IT - ACC 626
Forensics for IT - ACC 626
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
ACC 626 - Forensics for IT
ACC 626 - Forensics for ITACC 626 - Forensics for IT
ACC 626 - Forensics for IT
 
Acc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for ITAcc 626 slidecast - Forensics for IT
Acc 626 slidecast - Forensics for IT
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Vigiles Overview June 2010

  • 1. Flexible and Intelligent Access to InformationColumboDiscovery™ and ColumboForensics™ June 2010 1
  • 2. Contents Context Information Challenges Our Approach to Information Discovery The Technologies we Use Columbo®Information Discovery Platform Automatic Entity Extraction Themes and Links Forensics Case Study Summary and benefits 2
  • 3. Context Economic pressures versus increasing demand Increasing technical sophistication of criminal and terrorist Criminal investigations versus digital investigations Information technology – failure of expectations Shortcomings of software - 8 years on from Soham LEA working together? 3
  • 4. Information Challenges Massive data volumes Petabytes + of data (1 Petabyte (1000 terabytes) = approx 3000 million documents Forensics analysis of hundreds of devices on large cases Diverse sources The Internet – www, blogs, twitter, social networks, virtual worlds, chat-rooms Internal – mail, office systems, intelligence databases, operational systems Third-party databases such as ISPs and Telcos Computers, storage devices, mobile phones, cameras, sat-navs, Wi Intelligence from other law enforcement agencies Integration of data in multiple formats Structured, unstructured (text), multi-media (image, voice, video) Deleted and hidden Languages / alphabets Dangers and shortcomings of search Search engine issues – ranking, relevance etc. Terminology, expert knowledge of subject…. Can distort investigative approach Spellings / miss-spellings 4
  • 5. Some spelling challenges 5 112 different combinations!
  • 6. Our Approach to Information Discovery Help the user to understand and explore the content We identify entities, themes (subjects), links – in most cases automatically People, Places, Objects, Account Numbers, Telephone Numbers, etc. Themes, Concepts, Sentiment Hard and soft (weak) links between Entities and Themes We present this in ways that help users understand and explore (discover) the data Entity /Theme Extractions Summaries Timelines and Graphs Connection and Relationship Diagrams Geo-location Maps Intelligent search Prompted Sounds like / spelt like Semantic (find similar content to this) Automate processes including reports, where possible 6
  • 7. Some of the Technologies we use We use advanced analysis techniques that result in much better conceptual understanding and forensic performance These techniques include using semantic indexing and linking and more novel proprietary ‘digital fingerprint’ techniques (CSI – Columbo® Semantic Indexing) Our platform is scalable and our techniques are geared to indexing and comparing massive amounts of information – many ‘discovery’ requirements are a numbers and speed game Our platform can be trained to recognise certain patterns where appropriate (both text and image based), and can run autonomously and covertly if required A key difference is that our solutions ‘turn search upside down’ We get the data to tell us what is there, rather than just looking for something specific We don’t search for the needle hidden in the haystack – we remove the hay and find the needle together with whatever else might be there Gillc has a number of products and applications, the main one of which is ColumboDiscoverytm, our integrated information discovery platform 7
  • 8. Columbo® Information Discovery Platform 8 Reports & Comparisons Relationships ColumboCOREtm (Columbo Object Resource Enhancement) ColumboDiscoverytm (Intelligence Operations & Analysis Techniques) Geo-Location Entities & Themes Timelines & Events
  • 9. Automatic Entity Extraction All structured and unstructured information resources can be automatically processed for entity extraction, including: Documents – including web pages, social media, office applications, email, databases Digital devices – cameras, phones, SIM cards, storage devices The entity types shown (left) are a selection of those already coded into Columbo® software. Others could include for example: Airports and airlines Known street gangs Additional types can be added by Gillc or added as Custom types by the end user Metadata from applications, image files and digital devices is also extracted as entity information. For example: Device type and ID – for phones, cameras, computers etc. Author and creation date – for enterprise documents etc. Entity classification is customisable, and includes various identification and matching techniques, for example: Detect entities where slang, codes or ‘street names’ are used Detect entities where there are multiple spellings Detect complex /variable formats – e.g. phone numbers, dates 9
  • 10. Themes and Links Themes and Classification Themes and sub-themes are automatically identified from textual resource information Various techniques are used for theme deduction Various techniques are used for image classification / identification Links Hard and soft links can be identified or uncovered by interacting with the information within Columbo® Hard links show direct links between entities, entities and themes, and themes Soft links (or weak links) can be identified by: Analysing the presence/popularity of entities and themes in different resources/devices Using Columbo® Semantic Indexing (CSI) to identify varying levels of link strength CSI is also used for linking / categorising images 10
  • 11. ColumboForensicstm – case study 11 X 4 X 4 X 3 X 10 Suspect 4 X 7 X 9 Suspect 3 Suspect 5 X 2 X 5 Suspect 2 Suspect 6 X 2 X 2 Suspect 7 Suspect 1 X 4
  • 12. Forensics Process 12 Image Process E01 Image Process Suspect One Image Process Pro-active Comparison Between Suspects Image Process Indexing and Analysis Gathering Image Process E01 Image Process E01 Suspect Two Image Process E01 Image Process 3 days (7 suspects, 22 phones, 37 computers) (Existing search driven approach requires each device to be analysed separately – estimate of 55- 75 days)
  • 13. ColumboForensicstm – case study benchmarks
  • 14. Some other Law Enforcement considerations All necessary security features including: Multiple protection levels Security at document, entity and word level – extensive audit trail options Can build case / suspect ‘databases’ allowing: Intra-case analysis Cross-case analysis Suspect consolidation whilst retaining case integrity Secure links between agencies could allow controlled comparison of content Performant Quick response times and turn-around offers real opportunity to change processes Potential for comprehensive but rapid tri-age 14
  • 15. Summary and Benefits The Columbo® group of products are powerful, next generation information discovery applications Columbo® applications are tailored towards ‘discovery’, as opposed to ‘search’ Search implies that the user already knows what to look for Discovery allows the data to identify what may be relevant, and allows the user to interact with it in order to find the information contained within it The software delivers significant efficiency savings, by both rapidly finding relevant data and automating much of the process including reporting The software enhances effectiveness, automatically compares content and incrementally builds an intelligence repository Columbo® is “implementation-lite” and has capacity to readily link diverse agencies together, sharing and collaborating critical data as appropriate 15