In this week’s blog, Research Analyst Julia Herriott details an analytic workflow to detect illicit cocaine shipments coming from Colombia in connection with the macro-level potential of thoughtful investigative mechanisms to promote conflict resolution in the context of the Colombian Peace Process.
Intelligence Cell Research Analysts, Natalie Polanosky and Sarah Jasinski, have been working to compile information regarding child sex trafficking in the United States this summer. A demo involving Praescient’s ANB platform to demonstrate the movement of domestic CSAM in Texas will wrap up the duo’s research from this session. Their efforts follow notional cell tower… Read more »
This week, Research Analyst Sarah Jasinski uses her Forensic Psychology background to demonstrate the connections between psychological profiling and data modeling. Forensic Psychology and Data Analytics overlap on many fronts, as detailed in a previous Praescient blog. Exploring the connection between data modeling and psychological profiling initiates a deeper dive into the mechanics of how… Read more »
In this week’s blog, Business Development Associate Max Margolis deep dives into Facial Recognition and emphasizes how this Machine Learning technology is assisting investigations and augmenting data analytics. Facial Recognition is a powerful, new emerging technology that is being rapidly adopted across law enforcement agencies. But as with any new piece of software, it has… Read more »
The problem with America is that there are too many donuts and not enough milk, and that really sucks. Seven years ago, I ate a donut that was too big for my mouth but I swallowed anyway. BIG mistake. I rushed for a glass of milk only to discover that it was empty. With no… Read more »
As the nationwide anti-police brutality protests sparked by the killing of George Floyd continue throughout the streets of America, we are starting to see the beginnings of change on the legislative level. Representative Eddie Bernice Johnson, D-Texas, recently introduced police reform-focused legislation that would mandate several federal agencies to examine and confront law enforcement entities’… Read more »
Last month, IBM hosted a webinar titled “From Fraud to Firearms” which showcased how IBM’s i2 has assisted with both fraud investigations and ballistic intelligence investigations with social network analysis, data visualization and use of the Esri connector for mapping. S-Branch, a UK-based Analytics Consultancy that specializes in i2, presented a case study involving an… Read more »
The constant evolution and introduction of new technologies such as artificial intelligence (AI) can be incredibly helpful in combating cyber attacks as well as defending against future threats. It has been predicted that every new software product would feature some form of artificial intelligence by the year 2020. The introduction of these technologies has completely… Read more »
Blockchain is mentioned so frequently when talking about cryptocurrencies such as Bitcoin that many assume it’s only use is within finance circles. However, blockchain technology is far from one dimensional. Experts predict that it will be of utmost importance for U.S. government officials to have an understanding of the emerging technology, as well as the… Read more »
“Machine Learning” is one of those buzzwords thrown around a lot these days, put in the same conversations as “Artificial Intelligence” and “Computer Vision.” Yet despite the prominence of machine learning, most Americans do not know what it actually is, let alone its implications for individual privacy in cyberspace. Data in the 21st Century is… Read more »