SlideShare uma empresa Scribd logo
1 de 14
IBM i2/G2 
Demonstration
Analysing tracking data using 
ICU Workbench and IBM i2 
Problem: Surveillance activities generate large volumes of tracking data from 
covert GPS tags, navigation systems, cellular phones, cellular carriers (CDR/CCR 
records), geo-located financial transactions, ANPR data – but there is no way to 
easily increase the value of the i2 analysis with this valuable tracking data. 
ICU Workbench quickly analyzes tracking data, turning it into valuable information 
that can be imported into i2’s Analyst Notebook increasing the value and 
completeness of the Analysts Notebook solution substantially. 
The spatial context (analysed track) of targets, when mated with other i2 data 
entities, is a very powerful and unique aid to complex investigations. 
These slides accompany a video that demonstrates how tracking data can be 
quickly analysed by G2 Research's ICU Workbench software and made available to 
IBM’s i2 Analysts Notebook in order to surface non-obvious linkages between a 
networks of suspects.
Situation 
• A criminal gang in California has been under surveillance for 6 months 
where they have been sighted in and around the County court house. Data 
is based on various GPS/cellular tracking devices. 
• Local law enforcement have received a complaint regarding a “Walter 
Rogers” from an anonymous court house source. 
• We have been asked to investigate using the ICU Workbench and i2 
Toolset. 
• There are no connections apparent using the i2 platform and datasources.
Load Data to G2 ICU WorkBench 
Load Criminal Gang 
location based tracking 
data into ICU Workbench 
Load 6 months of data 
across the entire 
network of surveillance 
targets
Pattern of Life Analysis highlights 
unusual behaviour 
Analysing Walter 
Rogers pattern of life 
reveals unusual 
working hours
Multi Target Correlation reveals who 
the subject might have been meeting 
Correlate all the data 
subjects to see who has 
had the potential to 
talk to who 
Analysis reveals Walter 
Rogers has the 
potential to meet a 
number of gang 
members
Export Multi Target Correlation results 
to i2 for further analysis/correlation 
Export Data into i2 Analysis 
Warehouse 
IBM i2 
Intelligence 
Repository 
IBM i2 
Analyst’s 
Notebook
i2 Visualises who Walter Rogers has 
had the opportunity to talk to 
Use the i2 tools to find 
Walter Rogers in the 
repository. 
Once found create a 
visualisation of all the 
potential meetings 
Find Walter 
Rogers 
Chart helps visualise: 
• 4 potential interactions at the 
County Courthouse 
• 5 potential targets
i2 Highlights Walter Rogers potential 
meetings 
The i2 tools help give 
context to people on the 
chart. 
The Activity View quickly 
reveals the pattern of 
the potential meetings 
Walter Rogers was 
involved with. 
Two of the five targets are 
known gang members: Barny 
Leeson and Ralphie Barrow 
The activity view highlights unusual 
behaviour from the gang member 
Barny Leeson, it looks possible he is 
monitoring Walter Rogers
Visualizing the ICU Workbench results 
in i2 reveals a hidden link 
Find and map the gang 
member Barny Leeson’s 
known locations, confirm 
where he has been going 
Further analysis 
shows Barny 
Leeson and Charles 
Campbell have 
been visiting all the 
same locations 
i2 finds a relationship 
between the places 
Barney Leeson has 
been going and a 
court official named 
Charles Campbell. 
Charles has been 
visiting the same 
places.
Analysing the hidden link 
i2 uncovers that the hidden link 
(Campbell) resolves to another 
meeting, i2 Analysis shows us it 
is with another known gang 
member (Ralphie Barrow) 
outside a DIY store 
Link analysis reveals Charles’ 
relationship to Ralphie Barrow 
The Activity View shows Charles and 
Ralphie to have visited the store 
location at exactly the same times.
Making the Connection 
Using the ICU Workbench results, mated with i2’s integration with other data 
stores, we can now find relationships that were impossible before. 
Search IAP for 
Charles Campbell 
Also finds an 
Automated Money 
Laundering record 
showing Campbell 
making a large 
cash deposit 
Finds a report highlighting 
Campbell going to a bank shortly 
after the Burrows meeting 
Search IAP for 
Ralphie Barrow Existing i2 chart stored in repository reveals a phone call 
between the Gang Leader, Desmond Martinez, Ralphie 
Barrow and a large cash withdrawal on the day of the 
Campbell meeting
The Connection Explained 
Walter 
Rogers 
Ralphie 
Barrows 
Barney 
Leeson 
Desmond 
Martinez 
Charles 
Campbell 
ICU Workbench 
identifies Pattern 
of Life is peculiar. 
Investigation 
begins. 
Barney 
Appears to 
be 
following 
Walter 
Cell phone call 
meets with 
I2 finds Financial Transactions 
indicating bribery between 
Charles Campbell and the 
Gang Leader, Desmond. 
This connection could not 
have been found without 
using the tracking data inside 
i2 to identify that Ralphie 
met with Charles at Home 
Depot. 
Gang 
Member 
Court 
Reporter 
I2 finds Cellular phone 
calls between Ralphie 
and Desmond 
ICU Workbench finds 
meetings between 
individuals by 
analyzing GPS tracking 
data 
meets with 
meets with
Scenario Summary 
Analysed geo-temporal data 
provides valuable intelligence to 
public safety agencies. The ICU 
Workbench’s extension to the 
Analyst Notebook complements 
our conventional processes and 
data repositories to deliver an 
enriched link analysis 
product. The inclusion of this 
extension provides analytical 
capability on tracking data that 
was not previously accessible in 
the Analyst Notebook.

Mais conteúdo relacionado

Mais procurados

prisoners of geography
prisoners of geographyprisoners of geography
prisoners of geography
abc xyz
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation Manual
Harve Abella
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
Clifford Stone
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case Study
Keith Krach
 
Harvard Business School Case- Trusted Clean Network - Keith Krach
Harvard Business School Case- Trusted Clean Network - Keith KrachHarvard Business School Case- Trusted Clean Network - Keith Krach
Harvard Business School Case- Trusted Clean Network - Keith Krach
Keith Krach
 
syria history.pptx
syria history.pptxsyria history.pptx
syria history.pptx
SafiaYasmeen1
 

Mais procurados (20)

CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Intelligence Analysis & Deliverables
Intelligence Analysis & DeliverablesIntelligence Analysis & Deliverables
Intelligence Analysis & Deliverables
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Border security: a physical and digital challenge
Border security: a physical and digital challengeBorder security: a physical and digital challenge
Border security: a physical and digital challenge
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
prisoners of geography
prisoners of geographyprisoners of geography
prisoners of geography
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation Manual
 
Purple Team Use Case - Security Weekly
Purple Team Use Case - Security WeeklyPurple Team Use Case - Security Weekly
Purple Team Use Case - Security Weekly
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Clean Network HBS Case Study
Clean Network HBS Case StudyClean Network HBS Case Study
Clean Network HBS Case Study
 
Deterrence .pptx
Deterrence .pptxDeterrence .pptx
Deterrence .pptx
 
Harvard Business School Case- Trusted Clean Network - Keith Krach
Harvard Business School Case- Trusted Clean Network - Keith KrachHarvard Business School Case- Trusted Clean Network - Keith Krach
Harvard Business School Case- Trusted Clean Network - Keith Krach
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
syria history.pptx
syria history.pptxsyria history.pptx
syria history.pptx
 

Destaque

Destaque (19)

Ibm i2
Ibm i2Ibm i2
Ibm i2
 
Gallaghers' i2 guidebook
Gallaghers' i2 guidebookGallaghers' i2 guidebook
Gallaghers' i2 guidebook
 
User guide customizing an danalyzing, ANB, iBASE Intelligence
User guide customizing an danalyzing, ANB, iBASE IntelligenceUser guide customizing an danalyzing, ANB, iBASE Intelligence
User guide customizing an danalyzing, ANB, iBASE Intelligence
 
Analyst's notebook
Analyst's notebookAnalyst's notebook
Analyst's notebook
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Gallaghers' i2 guidebook_abridged.
Gallaghers' i2 guidebook_abridged.Gallaghers' i2 guidebook_abridged.
Gallaghers' i2 guidebook_abridged.
 
Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
ICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of WhereICU WORKBENCH - The Art of Where
ICU WORKBENCH - The Art of Where
 
MASTERY__23[1]
MASTERY__23[1]MASTERY__23[1]
MASTERY__23[1]
 
Fintech Overview - Bekkozha Muslimov
Fintech Overview - Bekkozha MuslimovFintech Overview - Bekkozha Muslimov
Fintech Overview - Bekkozha Muslimov
 
Web Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesWeb Services-Enhanced Agile Modeling and Integrating Business Processes
Web Services-Enhanced Agile Modeling and Integrating Business Processes
 
Link Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the TerroristsLink Analysis in Networks - or - Finding the Terrorists
Link Analysis in Networks - or - Finding the Terrorists
 
Link Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow WorldLink Analysis and Link Building in a Penguin and Disavow World
Link Analysis and Link Building in a Penguin and Disavow World
 
LinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity DataLinkSUM: Using Link Analysis to Summarize Entity Data
LinkSUM: Using Link Analysis to Summarize Entity Data
 
Tutorial 7 (link analysis)
Tutorial 7 (link analysis)Tutorial 7 (link analysis)
Tutorial 7 (link analysis)
 
Artificial Intelligence - Trends & Advancements
Artificial Intelligence - Trends & AdvancementsArtificial Intelligence - Trends & Advancements
Artificial Intelligence - Trends & Advancements
 
Link analysis .. Data Mining
Link analysis .. Data MiningLink analysis .. Data Mining
Link analysis .. Data Mining
 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business Era
 
Data Mining: Text and web mining
Data Mining: Text and web miningData Mining: Text and web mining
Data Mining: Text and web mining
 

Semelhante a Sample - Extending IBM i2 Analysis with G2 Research

Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
carlibradley31429
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docx
infantsuk
 
A guide to conducting research in fbi records icwatch transparency toolkit...
A guide to  conducting research in fbi records   icwatch transparency toolkit...A guide to  conducting research in fbi records   icwatch transparency toolkit...
A guide to conducting research in fbi records icwatch transparency toolkit...
AnonDownload
 

Semelhante a Sample - Extending IBM i2 Analysis with G2 Research (10)

Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Defrag 2010-distrib
Defrag 2010-distribDefrag 2010-distrib
Defrag 2010-distrib
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docx
 
Case Study - Waterloo Regional Police
Case Study - Waterloo Regional PoliceCase Study - Waterloo Regional Police
Case Study - Waterloo Regional Police
 
Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014
 
A guide to conducting research in fbi records icwatch transparency toolkit...
A guide to  conducting research in fbi records   icwatch transparency toolkit...A guide to  conducting research in fbi records   icwatch transparency toolkit...
A guide to conducting research in fbi records icwatch transparency toolkit...
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 

Mais de G2 Research Ltd. (10)

ICU Enterprise
ICU EnterpriseICU Enterprise
ICU Enterprise
 
ICU MULTIVIEW
ICU MULTIVIEWICU MULTIVIEW
ICU MULTIVIEW
 
ICU TRACKSMITH
ICU TRACKSMITHICU TRACKSMITH
ICU TRACKSMITH
 
ICU PREDICTIONS
ICU PREDICTIONSICU PREDICTIONS
ICU PREDICTIONS
 
ICU OBSERVER
ICU OBSERVERICU OBSERVER
ICU OBSERVER
 
ICU CELLULAR
ICU CELLULARICU CELLULAR
ICU CELLULAR
 
ICU TRACKNET
ICU TRACKNETICU TRACKNET
ICU TRACKNET
 
icuWorkbench - Use cases
icuWorkbench - Use casesicuWorkbench - Use cases
icuWorkbench - Use cases
 
Military - Overview
Military - OverviewMilitary - Overview
Military - Overview
 
Law Enforcement - Overview
Law Enforcement - OverviewLaw Enforcement - Overview
Law Enforcement - Overview
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Sample - Extending IBM i2 Analysis with G2 Research

  • 2. Analysing tracking data using ICU Workbench and IBM i2 Problem: Surveillance activities generate large volumes of tracking data from covert GPS tags, navigation systems, cellular phones, cellular carriers (CDR/CCR records), geo-located financial transactions, ANPR data – but there is no way to easily increase the value of the i2 analysis with this valuable tracking data. ICU Workbench quickly analyzes tracking data, turning it into valuable information that can be imported into i2’s Analyst Notebook increasing the value and completeness of the Analysts Notebook solution substantially. The spatial context (analysed track) of targets, when mated with other i2 data entities, is a very powerful and unique aid to complex investigations. These slides accompany a video that demonstrates how tracking data can be quickly analysed by G2 Research's ICU Workbench software and made available to IBM’s i2 Analysts Notebook in order to surface non-obvious linkages between a networks of suspects.
  • 3. Situation • A criminal gang in California has been under surveillance for 6 months where they have been sighted in and around the County court house. Data is based on various GPS/cellular tracking devices. • Local law enforcement have received a complaint regarding a “Walter Rogers” from an anonymous court house source. • We have been asked to investigate using the ICU Workbench and i2 Toolset. • There are no connections apparent using the i2 platform and datasources.
  • 4. Load Data to G2 ICU WorkBench Load Criminal Gang location based tracking data into ICU Workbench Load 6 months of data across the entire network of surveillance targets
  • 5. Pattern of Life Analysis highlights unusual behaviour Analysing Walter Rogers pattern of life reveals unusual working hours
  • 6. Multi Target Correlation reveals who the subject might have been meeting Correlate all the data subjects to see who has had the potential to talk to who Analysis reveals Walter Rogers has the potential to meet a number of gang members
  • 7. Export Multi Target Correlation results to i2 for further analysis/correlation Export Data into i2 Analysis Warehouse IBM i2 Intelligence Repository IBM i2 Analyst’s Notebook
  • 8. i2 Visualises who Walter Rogers has had the opportunity to talk to Use the i2 tools to find Walter Rogers in the repository. Once found create a visualisation of all the potential meetings Find Walter Rogers Chart helps visualise: • 4 potential interactions at the County Courthouse • 5 potential targets
  • 9. i2 Highlights Walter Rogers potential meetings The i2 tools help give context to people on the chart. The Activity View quickly reveals the pattern of the potential meetings Walter Rogers was involved with. Two of the five targets are known gang members: Barny Leeson and Ralphie Barrow The activity view highlights unusual behaviour from the gang member Barny Leeson, it looks possible he is monitoring Walter Rogers
  • 10. Visualizing the ICU Workbench results in i2 reveals a hidden link Find and map the gang member Barny Leeson’s known locations, confirm where he has been going Further analysis shows Barny Leeson and Charles Campbell have been visiting all the same locations i2 finds a relationship between the places Barney Leeson has been going and a court official named Charles Campbell. Charles has been visiting the same places.
  • 11. Analysing the hidden link i2 uncovers that the hidden link (Campbell) resolves to another meeting, i2 Analysis shows us it is with another known gang member (Ralphie Barrow) outside a DIY store Link analysis reveals Charles’ relationship to Ralphie Barrow The Activity View shows Charles and Ralphie to have visited the store location at exactly the same times.
  • 12. Making the Connection Using the ICU Workbench results, mated with i2’s integration with other data stores, we can now find relationships that were impossible before. Search IAP for Charles Campbell Also finds an Automated Money Laundering record showing Campbell making a large cash deposit Finds a report highlighting Campbell going to a bank shortly after the Burrows meeting Search IAP for Ralphie Barrow Existing i2 chart stored in repository reveals a phone call between the Gang Leader, Desmond Martinez, Ralphie Barrow and a large cash withdrawal on the day of the Campbell meeting
  • 13. The Connection Explained Walter Rogers Ralphie Barrows Barney Leeson Desmond Martinez Charles Campbell ICU Workbench identifies Pattern of Life is peculiar. Investigation begins. Barney Appears to be following Walter Cell phone call meets with I2 finds Financial Transactions indicating bribery between Charles Campbell and the Gang Leader, Desmond. This connection could not have been found without using the tracking data inside i2 to identify that Ralphie met with Charles at Home Depot. Gang Member Court Reporter I2 finds Cellular phone calls between Ralphie and Desmond ICU Workbench finds meetings between individuals by analyzing GPS tracking data meets with meets with
  • 14. Scenario Summary Analysed geo-temporal data provides valuable intelligence to public safety agencies. The ICU Workbench’s extension to the Analyst Notebook complements our conventional processes and data repositories to deliver an enriched link analysis product. The inclusion of this extension provides analytical capability on tracking data that was not previously accessible in the Analyst Notebook.