Criminal or terrorist activities are rarely conducted by isolated individuals. Behind these activities, we find more or less centralized organizations or networks. Intelligence experts are in charge of identifying every actor of such groups, despite their strategies to hide their connections to the networks (encrypted communication services, numerous middlemen, fake identities, etc). Getting the whole picture of the network is essential to monitor suspect activities, prevent attacks or detected potential threats.
Countering crime and terrorism is also about gathering information, from various existing sources. The logic so far has been: the more data intelligence and security organizations are able to obtain, the more likely they are to gather a clue needed to identify criminal or terrorist activities. But this means analysts and investigators have to handle large sets of heterogeneous data.
While traditional methods showed limits in making sense of heterogeneous and large datasets, graph-based intelligence analysis proved to be particularly effective. Graph databases allow organizations to store and query in near real-time the relationships between billions of entities. Let’s see how these systems, combined with network visualization tools like Linkurious Enterprise, can help intelligence analysts identify and investigate threats.