📊

Data analysis and management

All Digital Tools

Sort by Purpose

5 views

Sort by Purpose

Sort by Organization

Sort by Crime Phase

Sort by Target Group

Sort by Country

PurposeOrganizationTool/project (Click to open) 👆Country of OriginTarget group/intended userCrime PhaseWebsiteDescription

Hubstream

Law enforcement

Hubstream Intelligence Fabric is an automation and data sharing service that powers national and international collaboration and distribution of mission-critical data sets. The service uses scalable and secure cloud technologies to allow massive scale collaboration and fast communication of changes to data sets used by forensics investigators. It is used internationally to track hundreds of millions of data points and is used by tens of thousands of users.

Stop The Traffik, IBM

Child sexual abuse investigatorsLaw enforcement

STOP THE TRAFFIK and our long-term technology partner, IBM, have created the first ever international data hub to facilitate the sharing of information about human trafficking across all industries and sectors. The Traffik Analysis Hub (TAHub) is a partnership that includes financial institutions, NGOs, law enforcement and government agencies who are all unified by the common goal of sharing data to stop human trafficking. Using advanced cognitive technologies developed by IBM, the TAHub will facilitate the sharing of information quickly and easily and combine multiple data sets in one secure system. IBM has donated a significant grant to make this a reality and will use AI technology to quickly analyse and process volumes of data from a variety of sources; while ensuring its security and integrity.

Cybertip Canada

Internet Service Providers

Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography.

Thorn

Search engine companies

The Keyword Hub allows technology companies to share search terms used to find child sexual abuse material (CSAM) with other companies allowing all parties to be better at stopping users seeking CSAM.

Eckerd Connect

Social services

Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers.

Griffeye

Law enforcement

Analyze Collaboration Server is a central repository for storing and sharing information. Analyze Collaboration Server Enterprise enables organizations to store and access all the relevant material they have ever collected. The software facilitates image and video processing via a custom user interface, allowing investigators to work with a central store of case data. The Griffeye AI is made up of two core solutions: The CSA classifier, which has been trained on real CSA case data, and the Object classifier, which can detect various objects and details in images.

Paliscope

Law enforcement

YOSE is an AI-driven search engine that lets you instantly track down intelligence within any file type—even from the largest, most unstructured stockpiles of locally stored data.

Predpol

Law enforcement

PredPol uses a machine-learning algorithm to calculate its predictions on where crimes will occur. Historical event datasets are used to train the algorithm for each new city (ideally 2 to 5 years of data). It then updates the algorithm each day with new events as they are received from the department. This information comes from the agency’s records management system (RMS). PredPol uses ONLY 3 data points – crime type, crime location, and crime date/time – to create its predictions. No personally identifiable information is ever used. No demographic, ethnic or socio-economic information is ever used. This eliminates the possibility for privacy or civil rights violations seen with other intelligence-led policing models.

Child Rescue Coalition

Law enforcement

Automating the handling of evidence –including chat logs, data and videos – for live streaming abuse cases. Because mobile applications are often used to share CSAM and groom children, this solution will also help collect data against suspects with a sexual interest in children.

Yoti

Private individualsSocial media

Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves.

Thorn

Law enforcement

Spotlight is a web-based application that helps law enforcement prioritize leads in their sex trafficking investigations. There are over 150,000 escort ads posted daily; Spotlight takes this massive amount of data and turns it into an asset for law enforcement. To date Spotlight has helped law enforcement identify an average of 8 children per day and has saved up to 60% of critical investigative time.

Project VIC International

Law enforcement

By working with local law enforcement, KATALYST will improve forensic and victim identification capabilities, and facilitate collaboration between national law enforcement teams and international partners to ensure the safety of children online.

Access Data Group

Law enforcement

Quin-C is a digital investigation software solution that provides a customizable UI to allow advanced data vizualisation, processing and analysis.

Child Rescue Coalition

Law enforcement

Child Rescue Coalition is a partnership of child exploitation investigators, police officers, digital forensic experts. prosecutors, child welfare agencies, and corporate and private philanthropy who work together to apprehend and convict abusers of children, rescue those in harm's way, and importantly, seek to prevent abuse from happening in the first place. At its core is technology that identifies, monitors, and ranks the online criminal behavior of child predators on peer-to-peer file-sharing and chat networks.

Crisp

Social mediaContent moderators

Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment.

Hubstream

Law enforcement

Hubstream lntelligence is a customizable web application for understanding and taking appropriate action on investigative data. Data from online and off-line sources becomes integrated with a user's overall intelligence capability. Through smart linking, modern visualization and analytic techniques, as well as actionable dashboards, users can more quickly drive investigative leads through mission-critical workflows. The software helps drive operations and triage process national and international case referrals, victim identification workflows, and automated intelligence gathering from open source and proprietary intelligence.

Hunch.ly

Law enforcement

Hunchly is a web capture tool that automatically collects, documents, and annotates every web page you visit to create a transparent audit trail for online investigations.

IBM i2

Law enforcement

IBM i2 Analyst's Notebook is a visual analysis tool that helps turn data into intelligence. The solution provides features such as connected network visualizations, social network analysis, and geospatial or temporal views to help users uncover hidden connections and patterns in data. These insights aid in identifying and disrupting criminal, cyber and fraudulent threats.

IBM i2

Law enforcement

i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 information Exchange for Analysis Search for Analyst's Notebook connects to/searches multiple sources at once to retrieve analysis-ready data.

Magnet Forensics

Law enforcement

Magnet Forensic's AXIOM tool set uses Al, automation, advanced searching techniques, modern data visualization and more to help investigative teams find digital evidence and understand the story it is telling.

Maltego

Law enforcement

Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

Palantir

Law enforcement

Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems. Palantir Gotham featres intuitive, user-friendly interface backed by powerful data integration software providing access to art available information related to an investigation in one place. Data is secured at a granular level (down to individual attributes describing each piece of data), ensuring that users can only see information for which they are authorized. Users can also collaborate on investigations and share information. Palantir Gotham can integrate data in any format, including existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, record managements system (RSS) or other crime-reporting data, Computer- Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured dat such as'document repositories and emails. Access restrictions can be applied broadly based on the data source, or granularly, down to individually securing attributes and metadata (e.g., a building's address or the timestamp associated with a photograph) These permissions govern how users access data All interactions, including searching, viking, and editing data, are recorded in a tamper-evident audit log.

Paliscope

Law enforcement

Paliscope software allows users to conduct online investigations and quickly and easily collect open source data for review and analysis using third party services to correlate and find more data on the Clearnet and Darknet. Findings can be reported and secured with an audit log. Paliscope also provides an easy-to-use OSINT browser with integrated tools to elicit optimal results

Project VIC

Law enforcement

Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric methods of investigation to improve success rate in rescuing victims of child sexual exploitation and trafficking. Proiect VIC has co-created an ecosystem of shared and standardized technologies specifically chosen to combat crimes involving massive amounts of images and video. Data from these respective technologies is processed using the Project VAC Cloud and redistributed back to the greater community working on crimes against children. The following tools are part of the Project VIC ecosystem: Project VIC Hash Cloud Provided by Project VIC International and Hubstream Inc. hosts over 65 million CSAM and non CSAM hashes- Access encryption Provided by Project VIC. PhotoDNA for Images by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC PhotoDMA for Video by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC Ft Video Fingerprinting by Friend MTB is made available to law enforcement through a sub-license agreement to Project VIC LLC. VICS-Odata Model Licensing is made available to law enforcement through a sub-license agreement with Project VIC LLC international Image Classifies Standard- (IC-3) Machine Learning Modelling is made available through Project VIC International Global Alert System- ViC5 Exif Matching across global platforms to identify similarities in imagery for Victim Identification. License included with ViC5

Rigr AI

Law enforcement

Rigr specializes in deceloping custom made applications specifically enabling AI driven management of sensitive data. For further information on available applications, visit website.

Stop the Traffik

Private individuals

Human trafficking is happening in plain sight all around us. Have you ever seen something that looks out of place? Does uncertainty stop you from speaking up? Every human trafficking story, no matter how long or short, whether current or historic, is important and relevant. It may be the missing piece of the puzzle, contributing to a larger and more accurate picture of human trafficking, which can then inform efforts to combat it. Technology places the power to prevent into the hand of a person who holds a mobile device. The STOP APP can be downloaded by anyone, anywhere in the world who has access to a smartphone. The app is anonymous, confidential and secure – it is available in seven languages and allows you to submit suspicious activity quickly by sending text based messages and uploading photos and videos.

Thompson Reuters, Mekong Club

Financial institutions

Toolkits is designed to help financial institutions fight human trafficking using data. The Toolkit, tailored for use in the Asia Pacific region, includes a set of ‘red flags’ - potential indicators of modern slavery - linked to suspicious patterns in financial transactions, customer data and behaviour. It also includes contextual information and case studies to widen the financial service sectors’ understanding of this multi-faceted crime.

The National Center for Missing & Exploited Children (NCMEC)

Law enforcement

NCMEC’s CyberTipline is the nation’s (USA’s) centralized reporting system for the online exploitation of children. The public and electronic service providers can make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, unsolicited obscene materials sent to a child, misleading domain names, and misleading words or digital images on the internet. Through funding from Facebook, NCMEC offers the Case Management Tool (CMT) for domestic and international law enforcement who receive and investigate CyberTipline reports.  The CMT allows users to triage, query, organize and refer CyberTipline reports within this web-based interface. NCMEC's Law Enforcement Agency Web Services (LEAWS) allows law enforcement around the world access to CyberTipline report data.  This back-end infrastructure allows report data to be ingested by case management tools to allow quicker access, triage and response. NCMEC's ISP Web Services (ISPWS) allows companies around the world report directly to the CyberTipline. This back-end infrastructure allows for easier and automated reporting by companies around the world taking a stand against child sexual exploitation. While companies based in the US are required by law to report to the CyberTipline, any global company may and is welcome to report to the CyberTipline to better protect children and users on their platforms and services. As part of the CyberTipline response process, NCMEC notifies companies and providers when they are hosting CSAM and no suspect or offender is identified. Our analysts use a specialized interface to send notices daily, calling for these providers to remove the content and it includes a follow-up check to ensure the content has in fact been taken down. In 2021, NCMEC sent over 100,000 notices to companies to remove content from their hosting sites.

Access Data Group

Law enforcement

FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer forensic investigations. The product provides file filtering, search functionality and access to remote systems on the network as well as helps law enforcement, corporate security and IT professionals locate, analyze and evaluate the evidentiary value of files, folders and computers

Global Emancipation Network

Law enforcementChild sexual abuse investigators

Global Emancipation Network is excited to announce the latest counter-trafficking tool in our arsenal: Artemis. We teamed up with our friends at Splunk, Accenture, and Graphistry to produce a first-of-its-kind trafficking content classifier. Artemis is a proactive, automated solution for counter-human trafficking stakeholders to increase efficiency in investigations and disruptions by identifying high-risk establishments, individuals, and content. Our initial pilot focused on the illicit massage industry, categorizing massage businesses based on customer activity, staffing, location, services offered, imagery, and disciplinary actions. Using this data and advanced analytics, we created risk scores and tiers for targeted action.

Global Emancipation Network

Law enforcementChild sexual abuse investigators

Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users. Minerva is equipped with data-processing capabilities to extract and organize information from a variety of data sources. Capabilities include: Advertisement analysis: Analyzes advertisements from the deep and open web, where most trafficking cases originate, and extracts data such as user, location, account and other identifying information. Image processing tools: Processes images of victims to reduce the time users spend analyzing photographs and manually linking them to advertisements. Minerva integrates image analysis tools to tag photographs with characteristics to expedite database search, and reverse image search to identify similar images. Text analysis tools and natural language processing: Extracts text in images from advertisements and flags correlations with missing persons reports and other valuable information. Multi-tenant system informing trend analysis: Allows all Minerva users to store their information securely on the same database at the same time, enabling secure, multi-agency collaboration on shared investigations.

💻Device extraction/search🔎Facial/object detection🔠Text analysis/processing🖼️Image and video detection/classification📊Data analysis and management