Matrix Mapper for Counter Terrorism Units

10
WELCOME AARKEN TECHNOLOGIES

description

 

Transcript of Matrix Mapper for Counter Terrorism Units

Page 1: Matrix Mapper for Counter Terrorism Units

WELCOME

AARKEN TECHNOLOGIES

Page 2: Matrix Mapper for Counter Terrorism Units

MATRIX M

APPER

(For Counter Terrorism Units)

Page 3: Matrix Mapper for Counter Terrorism Units

The Matrix Mapper is intended to provide a strong, viable, dependable and effective alternative to the Analyst’s Notebook and to excel the Sentinel Visualizer. Therefore, for clarity in concept & visualization, above image of Analyst’s Notebook has been used.

Developing an Indigenous application matching the capabilities of Analyst’s Notebook. Analyst’s Notebook is

manufactured by i2, an IBM subsidiary that imposes Export Control Regulation on Analyst’s Notebook that it can only be available to businesses, government agencies and academic institutions operating within the USA and Russia.

ANALYST’S NOTEBOOK

Page 4: Matrix Mapper for Counter Terrorism Units

Base Diagram for Matrix Mapper

Page 5: Matrix Mapper for Counter Terrorism Units

MM: Intelligent Data GatheringThe Matrix Mapper (MM) would consume suspects’ data gathered from disparate sources that includes Structured data gathering from sources like Embarkation/ Disembarkation card, Railway reservations, Telephone/ Mobile calls, Hotel bookings, Credit/ Debit Card transactions, Visas granted, Vehicle ownerships, Gun licenses, Bank transactions and remittances etc. and Unstructured data gathering from sources like CCTV footage from ATMs, Banks, near by shops, Airport, Railway station, tips collected from manual resources etc.

. Audio InterceptCell/ Landline/ SDR

GIS

Images

Text/ Alphanumeric

Audio/ Video

Contacts & Contacts of Contacts

Contact Methods

Locational, Positional and Territorial Info. vis-à-vis Contacts

Imagery Correlationwith Visual, Situational Identification

Nature as well as Intensity of Inter-relationships

Prediction

Page 6: Matrix Mapper for Counter Terrorism Units

MM: Mapping Icons and Relationships

The Matrix Mapper (MM) would provide hundreds of icons each signifying an entity, place or event such as persons, communicating devices like landline, mobile and satellite phone, emails, PTT/SD radios, financial transactions through banks, credit cards, debit cards, insurance etc. , modes of transport (bus, scooter, airplane, trains) etc. It allows intelligent data population and knowledge discovery on the reams of data during investigation and provides inter-connection and relationship among the icons.

Page 7: Matrix Mapper for Counter Terrorism Units

The Matrix Mapper not only provides the graphical representation of the linkages among the matching entity, place and events, thus forming a consolidated network but also capable of throwing the actionable and predictive results.

Page 8: Matrix Mapper for Counter Terrorism Units

ATMVisit Time & Date

Date Time

Date Time

Date Time

Shahdara 05/09/12

15: 35

04/11/12

15:55 03/01/13

16:00

Loni 25/09/12

16:00 24/11/12

15:30 23/01/13

16:10

Sarita Vihar 15/10/12

15:45 14/12/12

16:00 13/02/13

16:30

PredictionNext ATM Withdrawal

The Matrix Mapper on the basis of the

interconnection, linkages and pattern formation of suspect’s data provides predictions for the next events that are likely to

happen and can be countered accordingly.

Activity Spikes for Predictive Inferences

Page 9: Matrix Mapper for Counter Terrorism Units

Matrix Mapper’s capabilities in counteracting terrorist attacks

The Matrix Mapper is capable for counteracting the terrorist’s activities by performing following operations:

1. Collating the streams of data and identifies matching pattern thus forming network of interconnection among entity, place and event.

2. Identifying the links of suspect(s) with previous terrorist activities that had occurred in the same pattern.

3. Mapping the financial transaction through banks, credit/debit cards and communication details that can be used to trace the location (especially the center of terrorist group) to which the terrorist belongs.

4. Targeting other terrorists in the network along with the local criminals who provide aids to them.

Page 10: Matrix Mapper for Counter Terrorism Units

Visit us at:

(www.aarktech.net)

THANK YOU