Use-cases

Predict. Prevent. Protect.

One thing is certain, change is the only constant. The world is constantly evolving, causing a growing challenge for law enforcement predicting and preventing crime in the face of ever increasing amounts of data and progressively sophisticated criminals. Factor in improved encryption and you arrive at a new paradigm, which calls for a new approach and new lawful interception and intelligence technologies to deal with these evolving threats and help detect and predict crimes before they develop into major threats.
trovicor solutions uncover threats which were previously hidden, by transforming traces from electronic communication, transactions and interactions into structured and meaningful information. We facilitate the generation of reliable and actionable intelligence to expose threats, identify suspects and uncover key evidence. Find out how we have helped law enforcement to outsmart even the most sophisticated criminals in the fight against crime. Click here to discover how trovicor’s lawful interception and intelligence solutions enable law enforcement to identify the suspects involved in a kidnapping incident and successfully apprehend them, reuniting the abducted child with his family.

Counter terrorism foils subsequent terror attack saving hundreds of lives

Use-case one

After two separate explosions are detonated counter terrorism analysts must prevent further attacks. The goal was to reveal the identities of the bombers and their associates and predict their movements and stop them before they execute another attack.

The analyst integrates call data records and subscriber databases into the intelligence platform and immediately identifies an MSISDN involved in both attacks. Using relation analysis the analyst uncovers other identities involved in both attacks identifying not only the coordinator but also three accomplices, two of which are known targets in the system.

Communication channels are quickly identified using link analysis and all suspects are put under surveillance both on and offline. Live monitoring of their calls, sms’, emails and online activity soon reveal that they are planning another attack. Voice recognition software compares the voice print of the two existing targets on the watch list with the voice prints from the wire taps and a positive match is found.

CDR analysis, reveals the cell members most visited locations and CCTV footage in those locations confirms the intelligence, the suspects were in fact in those locations at those times. Location based analysis is used to create a geo-fence around the area the analyst believes the next attack will take place. The analyst receives a proximity alarm for the suspects showing they are about to enter the area, and despatches a tactical team to apprehend the suspects foiling attack. The bomb is detonated and public safety restored.

Read more

Police uncover gang involved in a prolific human trafficking network

Use-case two

The human trafficking division recently apprehended a gang member known to be involved in a prolific human trafficking network spanning multiple continents and countries. Using the mobile phone seized from the criminal, the investigator is tasked with mapping the infrastructure of the human trafficking ring and uncovering the identities of all of the key members of the network. Fortunately the intelligence platform does all of the hard work and enables the investigator to quickly perform analysis on masses of stored mobile data that would have otherwise taken days, if not weeks, had it been a manual process.

The investigator used the target dashboard to instantly build up a profile of the criminal and quickly discovered he had been using a second mobile phone, which through link analysis, led to the discovery of connections with other potential gang members.

Fusing this data with border control and flight traffic data the system identified that gang members were at the airport during times where victims were thought to be being brought into the country. Combining this data with the banking and credit card transactions of the criminal and potential gang members, the investigator was quickly able to build up a profile of the key members of the gang and start gathering evidence for the case against them.

The system automatically identified when the targets met at their usual locations with cell site analysis revealing two mobile phones that were always in the same place at the same time. By using the MCng to monitor targets in real-time, the investigator accessed the contents of gang’s communication and it became clear exactly how they were operating.

The gang leader was identified and monitored, and in one of his calls, he mentioned an upcoming drop off, which was later automatically detected due to a proximity alarm. This led to the discovery of the location where some of the victims were being kept, leading eventually to their arrest.

Read more

Gang detection

Oil & gas theft

Corruption detection

Prison surveillance

Kidnapping & extortion

Money laundering

Airport surveillance

Human trafficking

Drugs & weapons smuggling