AI Tools Can Help Police Fight Crime

The rise of the Internet has enhanced our lives in many ways. However, It’s also made it easier to commit the most terrible crimes. The anonymity of the Internet and digital currency make it possible to share, sell and trade illicit material from drugs to weapons to victims of human trafficking. 

While the Internet and digital technology have aided the explosion of certain crimes, they can also be an essential tool in the effort to identify victims, accelerate search and rescue times, deter abusers and disrupt the digital platforms where these crimes proliferate.

Technology providers like Veritone are building solutions that employ deep machine learning to fight crime by using it in ways like matching missing children photos to sexual exploitation images on the dark web, using traffic camera footage to locate a vehicle involved and investigating a mass shooting incident by identifying key moments in bystander or security images.

Deep machine learning means that, instead of being programmed to perform specific tasks, a computer can learn independently and adapt its understanding based on exposure to new data. 

The more data it is exposed to, the better the computer can begin to recognise and identify objects based on complex pattern recognition, until it’s finally able to independently and with a high degree of accuracy make predictions. 

According to policeone.com, because computers can be trained with millions of labeled images, they can successfully identify images more quickly than a human can. The algorithms or “neural networks” that can classify what is or is not a picture of a stop sign can also be trained to match other types of images, like car models, license plates, weapons or missing persons.
A machine’s ability to “see” is similar to the way a barcode scanner “sees” the stripes in a uniform bar code. But computer vision, the ability to recognize and, more importantly, categorise and sort images, is what enables deep machine learning to have a wider application in police work.

According to the 2018 Technology Vision report from global management consulting firm Accenture: “There are few crimes today that do not have at least some digital component; for example, the use of social media to create disorder. That’s changing the way that the police need to prevent, detect and solve criminal activity.” 

Fortunately, it’s never been easier or more cost-effective to collect data, store it, and build custom machine learning and deep-learning models. Combining machine learning algorithms with the computational power of the Intel Xeon Scalable processor enables developers to create intelligent and innovative new products, powered by machine learning, that can help law enforcement agencies fight and investigate crime.

Tom Avery, Vice President, Veritone, explained how machine learning has helped coping with the heaps of data collected via digital methods: “One of the unintended consequences of bodycam video is that now all of a sudden the judicial system is just hammered with all this extra data that just a few years ago didn’t exist. 

“The problem with unstructured audio and video data is that if you want to examine it for relevance or factual evidence, you have to sit down and watch it. If you’re already resource-constrained, how do you deal with that?”

Veritone’s aiWARE solution can help solve the challenge by using artificial intelligence to search stored audio and video for objects, spoken words, logos, faces, and more. 

Specific for law enforcement, Veritone’s IDentify employs AI to automatically compare known-offender and person-of-interest records with video and photographic evidence, enabling agencies to quickly identify potential suspects for further investigation.

 “One of the biggest impacts we can have on law enforcement is actually making that data searchable,” Avery said. “Instead of watching it, you can take action against it using a suite of tools, just like you would use a search engine for data that you’re looking for an answer from.”

I-HLS

You Might Also Read:

British Policing Faces The Future:

« Utility Week Cyber Security & Resilience Conference
Australian Defence Chief Issues Cybercrime Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

CyberForce Competition

CyberForce Competition

The CyberForce Competition is a US Department of Energy cyber defense competition that focuses on the defensive/hardening aspects of energy cyber infrastructure.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

CyberSafe

CyberSafe

CyberSafe is a Portuguese company with a focus on cybersecurity solutions and services including network security, managed security, incident response and forensic analysis.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Oman Data Park

Oman Data Park

The Data Park is Oman’s premier IT Managed Services provider. We offer a superior Tier 3 Data Center network providing cyber security and cloud services.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.