Wynyard’s Crime Science Research Centre brings together the world’s leading data scientists, software engineers and industry experts. Single-minded about building powerful tools that enable our clients to know the threats, connect the dots and uncover the truth, our research focuses the application of advanced analytics, data integration and context aware visualisation. Our technology modules are described in this presentation.
1. 1
UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND
An overview of Wynyard’s software, platforms and data models
Published by Wynyard NZ
Technology
2. 2
ABOUT WYNYARD
Wynyard Group is a market leader in risk management
and crime-fighting software used in investigations
and intelligence operations by government agencies and
financial organisations.
Wynyard solutions help solve and prevent crime,
defend against advanced persistent cyber-threats and
counter terrorism. Wynyard’s powerful software platform
combines big data, advanced crime analytics and
tradecraft to identify persons of interest, stop offenders
and protect victims.
Wynyard has more than 120,000 users and offices in
the United States, United Kingdom, Canada, United Arab
Emirates, Australia and New Zealand. For more
information, visit wynyardgroup.com
4. 4
CRIME SCIENCE RESEARCH INSTITUTE
Wynyard is single-minded about
building powerful tools so clients know
the threats, connect the dots and
uncover the truth.
Our Crime Science Research Institute
brings together the world’s leading:
• Data scientists
• Software engineers
• Industry experts
The focus is on the application of
advanced analytics, data integration
and context-aware visualisation.
We create powerful software tools,
platforms and data models.
5. 5
TASKING
Wynyard’s software has comprehensive tasking and
scheduling capabilities to support business processes.
• Configure specific template-based tasks
• Notifications are automatically generated
• Notifications/alerts sent as email messages
• Link tasks to other entities
• Users absent for a time can redirect tasks
• Task recipients can forward or reject the task
• Task results can incorporate link associations to
other entities
6. 6
SEARCH & QUERY
The Wynyard platform contains a high-performance, full-featured text search engine which supports phrase, wildcard, fuzzy,
proximity and range queries.
ACA responds to queries with a listing of the best matches according to its criteria.
Path Finder queries allow the user to quickly see paths of links between selected entities – helping find common entities.
Paths can be found across all link types to a specified number of degrees of separation.
The Path Explorer tool can be used to explore the possible relationships between entities and define a query for specific link
and entity types.
7. 7
VISUALISATION
Context-aware visualisation displays entities in the
most intuitive way.
Visualisation of entities can be customised and is
colour coded.
Solid or dashed lines indicate known or inferred
relationships.
Entities can be confirmed or reclassified.
Users can reduce the clutter by filtering to examine
the strength of the relationships or by opening up
multiple graphs.
8. 8
TEXT MINING
Text mining obtains valuable insights from large amounts
of unstructured text.
Wynyard’s platform automatically discovers and visualises
information about entities and their relationships.
Several different entity extraction engines, trained on
multiple data sets, produce effective entity extraction
and recognition.
Combined with structured data, this provides a
comprehensive and coherent view of all data.
9. 9
ANOMALY DETECTION
Anomaly detection is the search for entities or events that do not conform to an expected pattern.
Wynyard’s anomaly detection model for dynamic networks quickly highlights entities, relationships and time periods
inconsistent with their usual behaviour.
Visual analysis and investigation allows users to navigate through graphical data representations of anomalous instances
to focus on nodes and edges with higher anomalous scores.
10. 10
RULES ENGINE
Wynyard’s rules and scoring engine allows data to be
monitored in near real time.
The easy-to-use rules engine allows customers to build
their own rules without specialised IT skills.
Users can action or modify the rule templates, combine
rules and set rule parameters and thresholds, with a full
audit trail.
11. 11
PREDICTION
Wynyard’s predictive analytics combines data from a variety
of sources to generate a model of future events.
Variables for the model can be derived from historical data
and will be weighted for testing and machine learning.
Criteria for detecting changes in data can be encoded using
the rules engine.
The model should be able to predict and uncover activity
that is insignificant in isolation but, if undetected,
potentially catastrophic.
Refine and modify the model over time.
New data sources can be incorporated.
12. 12
OPEN SOURCE INTELLIGENCE
Open source intelligence (OSINT) can be used throughout Wynyard’s solutions as a data source for intelligence gathering.
Social media, including news aggregation, have proven to be a useful tool for network analysis and intelligence gathering.
13. 13
XEREM™ DATA MODEL
XEREM™ is a data model that enables specific entities, relationships and events to be defined to meet the requirements of a
particular customer or solution.
Entities represent
real world objects
or concepts
Relationships
represent the
connections or
links between
entities
Events represent
something that
happens at a point in
time and may include
a duration
14. 14
DATA LOAD AND INGESTION
Data from any source that can be provided in text, CSV,
XML or JSON formats can be loaded into ACA.
Data sources can be structured, semi-structured or
unstructured.
Common data types are:
• SMS messages and phone call records
• Financial transaction records
• Geographic location data sets
• Social media
• Documents
• Address records
• Web page content
• Witness reports
• Emails
15. 15
SECURITY
There are three fundamental principles of data management and security:
• Data integrity
• Data availability
• Data confidentiality
The Wynyard platform security model ensures that data is only accessed and manipulated by authorised personnel.
This is achieved by:
• Compartmentalising information behind security layers
• Restricting access to data
• Limiting functionality
• Audit logging