SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Let’s build a smarter planet Government
The Opportunity
To bring criminals to justice efficiently, law enforcement officers (LEOs)
must collaborate. Yet police forces across the country were working
in isolation, which inhibited them from sharing records and evidence
in a timely manner. Without a comprehensive view of crime and
investigation records from across the nation, police forces struggled to
link suspects with unsolved crimes. After a public inquiry confirmed
that the lack of timely intelligence and collaboration between police
forces had caused the primary suspect of a high-profile murder case to go
unidentified for two weeks, this public safety organization recognized the
need for a secure, centralized police intelligence system that could help
improve the efficiency of investigations.
What Makes It Smarter
By implementing a robust police intelligence system that establishes
clear visibility into records gathered from across the nation, this public
safety organization eliminated information-sharing barriers between
forces while improving the ability of LEOs to identify the most likely
suspects of crimes. The new solution integrates more than 1.5 billion
crime, custody, domestic violence and child-abuse records from
230 databases maintained by 49 police forces across the nation,
establishing a secure and centralized repository for important records.
Further, the new solution scans each record for data associated with
persons, objects, locations and events, running probabilistic algorithms
to group together records that most likely refer to the same individual.
By analyzing these groups, LEOs can connect potential suspects with
crimes, identify new patterns of criminal behavior and quickly take
action in an appropriate manner.
A public safety
organization
By implementing a solution that integrates criminal
records and helps link potential suspects with crimes,
this public safety organization has transformed the way
police bring criminals to justice.
What if unsolved crimes could be reduced
through timely and collaborative police
intelligence?
Real Business Results
•	 Accelerates information sharing between forces from up to two
weeks to less than 30 minutes, an improvement of 99 percent
•	 Empowers LEOs to link suspects with crimes and identify patterns
of criminal behavior more quickly, thereby enabling them to take
action earlier in investigations
•	 Fosters improved collaboration and greater force efficiency across
the country
For more information
Please contact your IBM sales representative or IBM Business Partner.
Visit us at: ibm.com/government
© Copyright IBM Corporation 2012
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States
December 2012
IBM, the IBM logo, ibm.com and InfoSphere are trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide. Other product
and service names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the web at “Copyright and trademark information” at
ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be changed by
IBM at any time. Not all offerings are available in every country in which IBM operates.
The performance data and client examples cited are presented for illustrative purposes
only. Actual performance results may vary depending on specific configurations and
operating conditions. THE INFORMATION IN THIS DOCUMENT IS
PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED,
INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR
CONDITION OF NON-INFRINGEMENT. IBM products are warranted according
to the terms and conditions of the agreements under which they are provided.
Please Recycle
IMC14798-USEN-00
Solution Components
•	 IBM® InfoSphere® Master Data
Management Standard Edition
•	 IBM Business Partner Logica

Más contenido relacionado

La actualidad más candente

05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
Bridget Butler
 

La actualidad más candente (19)

Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014
 
CAN-SPAM at 5
CAN-SPAM at 5CAN-SPAM at 5
CAN-SPAM at 5
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
We're not appy, not appy at all!
We're not appy, not appy at all!We're not appy, not appy at all!
We're not appy, not appy at all!
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Age
 
Sopa and pipa
Sopa and pipaSopa and pipa
Sopa and pipa
 
elec reporting
elec reportingelec reporting
elec reporting
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Communications
CommunicationsCommunications
Communications
 
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchPresentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
 

Similar a A Public Safety Organisation

Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
Aspiration Software LLC
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
jeffsrosalyn
 

Similar a A Public Safety Organisation (20)

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Edward Claughton Records Management
Edward Claughton Records ManagementEdward Claughton Records Management
Edward Claughton Records Management
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
CXFIRE Brochure
CXFIRE Brochure CXFIRE Brochure
CXFIRE Brochure
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 
Cis second draft
Cis second draftCis second draft
Cis second draft
 
About Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - ShieldAbout Data Quality And Regulatory Compliance at FI - Shield
About Data Quality And Regulatory Compliance at FI - Shield
 
Today's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward ClaughtonToday's Records Management is Everyone's Business by Edward Claughton
Today's Records Management is Everyone's Business by Edward Claughton
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
Tools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft VictimsTools for Assisting Identity Theft Victims
Tools for Assisting Identity Theft Victims
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 

Más de IBM Big Data and Analytics UK

Más de IBM Big Data and Analytics UK (15)

DFS and their analytics in the cloud
DFS and their analytics in the cloudDFS and their analytics in the cloud
DFS and their analytics in the cloud
 
L'Oreal MDM Story
L'Oreal MDM StoryL'Oreal MDM Story
L'Oreal MDM Story
 
Data, the World's new Natural Resource
Data, the World's new Natural ResourceData, the World's new Natural Resource
Data, the World's new Natural Resource
 
Big Data & Analytics – beyond Hadoop
Big Data & Analytics – beyond HadoopBig Data & Analytics – beyond Hadoop
Big Data & Analytics – beyond Hadoop
 
Soitec Solar Industries, LLC
Soitec Solar Industries, LLCSoitec Solar Industries, LLC
Soitec Solar Industries, LLC
 
Oxford Fertility Unit
Oxford Fertility UnitOxford Fertility Unit
Oxford Fertility Unit
 
National Grid
National GridNational Grid
National Grid
 
Irish Marine Institute
Irish Marine InstituteIrish Marine Institute
Irish Marine Institute
 
Huntsworth
HuntsworthHuntsworth
Huntsworth
 
GKN Land System
GKN Land SystemGKN Land System
GKN Land System
 
Electricity Supply Board
Electricity Supply BoardElectricity Supply Board
Electricity Supply Board
 
Dublin City Council - Congestion
Dublin City Council - CongestionDublin City Council - Congestion
Dublin City Council - Congestion
 
ASG World Wide
ASG World WideASG World Wide
ASG World Wide
 
Virgin atlantic
Virgin atlanticVirgin atlantic
Virgin atlantic
 
Rugby Football Union
Rugby Football UnionRugby Football Union
Rugby Football Union
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

A Public Safety Organisation

  • 1. Let’s build a smarter planet Government The Opportunity To bring criminals to justice efficiently, law enforcement officers (LEOs) must collaborate. Yet police forces across the country were working in isolation, which inhibited them from sharing records and evidence in a timely manner. Without a comprehensive view of crime and investigation records from across the nation, police forces struggled to link suspects with unsolved crimes. After a public inquiry confirmed that the lack of timely intelligence and collaboration between police forces had caused the primary suspect of a high-profile murder case to go unidentified for two weeks, this public safety organization recognized the need for a secure, centralized police intelligence system that could help improve the efficiency of investigations. What Makes It Smarter By implementing a robust police intelligence system that establishes clear visibility into records gathered from across the nation, this public safety organization eliminated information-sharing barriers between forces while improving the ability of LEOs to identify the most likely suspects of crimes. The new solution integrates more than 1.5 billion crime, custody, domestic violence and child-abuse records from 230 databases maintained by 49 police forces across the nation, establishing a secure and centralized repository for important records. Further, the new solution scans each record for data associated with persons, objects, locations and events, running probabilistic algorithms to group together records that most likely refer to the same individual. By analyzing these groups, LEOs can connect potential suspects with crimes, identify new patterns of criminal behavior and quickly take action in an appropriate manner. A public safety organization By implementing a solution that integrates criminal records and helps link potential suspects with crimes, this public safety organization has transformed the way police bring criminals to justice. What if unsolved crimes could be reduced through timely and collaborative police intelligence?
  • 2. Real Business Results • Accelerates information sharing between forces from up to two weeks to less than 30 minutes, an improvement of 99 percent • Empowers LEOs to link suspects with crimes and identify patterns of criminal behavior more quickly, thereby enabling them to take action earlier in investigations • Fosters improved collaboration and greater force efficiency across the country For more information Please contact your IBM sales representative or IBM Business Partner. Visit us at: ibm.com/government © Copyright IBM Corporation 2012 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States December 2012 IBM, the IBM logo, ibm.com and InfoSphere are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Please Recycle IMC14798-USEN-00 Solution Components • IBM® InfoSphere® Master Data Management Standard Edition • IBM Business Partner Logica