AI Tools Can Help Police Fight Crime

The rise of the Internet has enhanced our lives in many ways. However, It’s also made it easier to commit the most terrible crimes. The anonymity of the Internet and digital currency make it possible to share, sell and trade illicit material from drugs to weapons to victims of human trafficking. 

While the Internet and digital technology have aided the explosion of certain crimes, they can also be an essential tool in the effort to identify victims, accelerate search and rescue times, deter abusers and disrupt the digital platforms where these crimes proliferate.

Technology providers like Veritone are building solutions that employ deep machine learning to fight crime by using it in ways like matching missing children photos to sexual exploitation images on the dark web, using traffic camera footage to locate a vehicle involved and investigating a mass shooting incident by identifying key moments in bystander or security images.

Deep machine learning means that, instead of being programmed to perform specific tasks, a computer can learn independently and adapt its understanding based on exposure to new data. 

The more data it is exposed to, the better the computer can begin to recognise and identify objects based on complex pattern recognition, until it’s finally able to independently and with a high degree of accuracy make predictions. 

According to policeone.com, because computers can be trained with millions of labeled images, they can successfully identify images more quickly than a human can. The algorithms or “neural networks” that can classify what is or is not a picture of a stop sign can also be trained to match other types of images, like car models, license plates, weapons or missing persons.
A machine’s ability to “see” is similar to the way a barcode scanner “sees” the stripes in a uniform bar code. But computer vision, the ability to recognize and, more importantly, categorise and sort images, is what enables deep machine learning to have a wider application in police work.

According to the 2018 Technology Vision report from global management consulting firm Accenture: “There are few crimes today that do not have at least some digital component; for example, the use of social media to create disorder. That’s changing the way that the police need to prevent, detect and solve criminal activity.” 

Fortunately, it’s never been easier or more cost-effective to collect data, store it, and build custom machine learning and deep-learning models. Combining machine learning algorithms with the computational power of the Intel Xeon Scalable processor enables developers to create intelligent and innovative new products, powered by machine learning, that can help law enforcement agencies fight and investigate crime.

Tom Avery, Vice President, Veritone, explained how machine learning has helped coping with the heaps of data collected via digital methods: “One of the unintended consequences of bodycam video is that now all of a sudden the judicial system is just hammered with all this extra data that just a few years ago didn’t exist. 

“The problem with unstructured audio and video data is that if you want to examine it for relevance or factual evidence, you have to sit down and watch it. If you’re already resource-constrained, how do you deal with that?”

Veritone’s aiWARE solution can help solve the challenge by using artificial intelligence to search stored audio and video for objects, spoken words, logos, faces, and more. 

Specific for law enforcement, Veritone’s IDentify employs AI to automatically compare known-offender and person-of-interest records with video and photographic evidence, enabling agencies to quickly identify potential suspects for further investigation.

 “One of the biggest impacts we can have on law enforcement is actually making that data searchable,” Avery said. “Instead of watching it, you can take action against it using a suite of tools, just like you would use a search engine for data that you’re looking for an answer from.”

I-HLS

You Might Also Read:

British Policing Faces The Future:

« Utility Week Cyber Security & Resilience Conference
Australian Defence Chief Issues Cybercrime Warning »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Cybermerc

Cybermerc

Cybermerc's services, training programmes and cyber security solutions are designed to forge collaborations across industry, government and academia, for collective defence of our digital borders.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

Emagine IT

Emagine IT

Emagine IT supports federal agencies and enterprises by leveraging a data-first approach to delivering cutting-edge IT, cybersecurity, and digital transformation services.