After two separate explosions are detonated counter terrorism analysts must prevent further attacks. The goal was to reveal the identities of the bombers and their associates and predict their movements and stop them before they execute another attack.
The analyst integrates call data records and subscriber databases into the intelligence platform and immediately identifies an MSISDN involved in both attacks. Using relation analysis the analyst uncovers other identities involved in both attacks identifying not only the coordinator but also three accomplices, two of which are known targets in the system.
Communication channels are quickly identified using link analysis and all suspects are put under surveillance both on and offline. Live monitoring of their calls, sms’, emails and online activity soon reveal that they are planning another attack. Voice recognition software compares the voice print of the two existing targets on the watch list with the voice prints from the wire taps and a positive match is found.
CDR analysis, reveals the cell members most visited locations and CCTV footage in those locations confirms the intelligence, the suspects were in fact in those locations at those times. Location based analysis is used to create a geo-fence around the area the analyst believes the next attack will take place. The analyst receives a proximity alarm for the suspects showing they are about to enter the area, and despatches a tactical team to apprehend the suspects foiling attack. The bomb is detonated and public safety restored.
The human trafficking division recently apprehended a gang member known to be involved in a prolific human trafficking network spanning multiple continents and countries. Using the mobile phone seized from the criminal, the investigator is tasked with mapping the infrastructure of the human trafficking ring and uncovering the identities of all of the key members of the network. Fortunately the intelligence platform does all of the hard work and enables the investigator to quickly perform analysis on masses of stored mobile data that would have otherwise taken days, if not weeks, had it been a manual process.
The investigator used the target dashboard to instantly build up a profile of the criminal and quickly discovered he had been using a second mobile phone, which through link analysis, led to the discovery of connections with other potential gang members.
Fusing this data with border control and flight traffic data the system identified that gang members were at the airport during times where victims were thought to be being brought into the country. Combining this data with the banking and credit card transactions of the criminal and potential gang members, the investigator was quickly able to build up a profile of the key members of the gang and start gathering evidence for the case against them.
The system automatically identified when the targets met at their usual locations with cell site analysis revealing two mobile phones that were always in the same place at the same time. By using the MCng to monitor targets in real-time, the investigator accessed the contents of gang’s communication and it became clear exactly how they were operating.
The gang leader was identified and monitored, and in one of his calls, he mentioned an upcoming drop off, which was later automatically detected due to a proximity alarm. This led to the discovery of the location where some of the victims were being kept, leading eventually to their arrest.