simple web templates

Unlock the toxic network

How to detect, disrupt, and prevent complex criminal activity

Crime fighters can identify groups of people with criminal intent, like human traffickers or organised gangs. And they will know the kinds of resources available to them - the types of vehicles they use, the routes they take, the computer and phone systems they use, the people they contact for logistics or finance... the big picture of the whole network.

How can they cut through the noise of all that data and spot the keys to the organisation? Which assets, routes, or people are most influential on its whole operation? Who or what is most toxic in the network?

The IBM i2 team in our Cambridge Lab devised a way for a security analyst to measure toxicity of sub-networks in a network. Maybe it’s a group of three key influencers in a drugs syndicate. Or a specific trafficker using particular routes is causing the most human misery.

It’s also useful for measuring fraud and social engineering risks, because it finds and reveals underlying patterns that help analysts understand networks in a way that wasn’t possible before.

IBM i2 technology brings together over two decades of experience in visual intelligence and investigative analysis that’s now used by commerce, security, and law enforcement all around the world. It’s a central part of the IBM Security business.

Come and see how our i2 team creates the advanced human-cognitive intelligence analysis tools that can hunt, detect, disrupt, and prevent criminal activity and cyber threats.


IBM UK Lab Campus, Hursley,
Winchester, Hampshire,
SO21 2JN
Email us