Armed with the right digital intelligence tools, law enforcement can track down terrorists and thwart future attacks

 Do you know how many fatalities occurred worldwide between January 1 and June 14, 2018, as a result of terrorist attacks? How about the number of terrorist attacks that occurred during that time?

According to information compiled by 
Esri and Peacetech Lab,  there were 3,056 fatalities and 584 attacks.
 
At this rate, by the end of 2018,  terrorists will have been responsible for the killing of more than 6,000 people across the globe, in more than 1,000 attacks. That is approximately more than 16 people per day.
 
So how are they doing it you ask? Well, in many cases, they’re using technology.
 

The Rise of Technology as a Weapon

With easy access to social media channels, forums, and websites, terrorists don’t need to physically cross borders to recruit new members. They can reach them digitally. And once these radicalized individuals are ready to act – they are able to securely communicate with their leaders and followers anywhere in the world using encrypted phones and apps.
 
In fact, a 2015 survey by Cellebrite found that “85 percent of law enforcement officers cited device and app encryption is one of the top challenges in mobile forensics.”
 
With the sheer volume of data being generated every second of every day, terrorists and radical groups are able to operate virtually undetected. 
 
The irony is that the same technology being exploited by terrorists is also the pathway by which savvy investigators may now track them. Nothing can take the place of solid evidence gathering by skilled investigation teams, but there are digital forensic tools that can help make evidence gathering less of a time burn. 
 
With the right tools, law enforcement can gain access to encrypted digital devices and applications to track down and capture terrorists, and even thwart future attacks. Still, good investigative works does take time —a challenge made more difficult when lives are at stake.
 
So how do we make our world a safer place? How do we eliminate or at least reduce, the fear that our children live with every day?
 
Terrorists use digital technology at every stage of an attack. From recruitment to aligning resources to launching the attack, when the situation is critical you need the right digital tools to save lives.  
Download the White Paper: “Fighting Terrorism with Digital Intelligence
 

Using Technology to Fight Back

You wouldn’t send a soldier into battle without a weapon. In the same way, law enforcement needs to be equipped with the right digital intelligence tools to fight terrorists using and abusing technology. 
 
Cellebrite, the worldwide leader in digital intelligence, has developed a range of innovative solutions that can when minutes matter.
 
Cellebrite’s digital intelligence solutions can rapidly unlock, extract, decode, and analyze digital data from multiple sources, including the cloud. Being able to analyze and sort through large volumes of data fast is critical to identifying terrorists and their accomplices as well as preventing future attacks.
 

Easing Witness Fears

Many witnesses to an event are hesitant to give up their phone – after all, would you? Cellebrite Responder empowers field teams to easily access actionable intelligence at the scene to inform next steps and keep the investigation moving.
 
Cellebrite also has ways of extracting data from certain devices using nondestructive techniques, even if they are damaged, and nonfunctional. Of course, it depends on the level of damage, but having this capability is massive, especially in the case of an actual event.
 
Being able to bring in public data from cloud services, such as Facebook,  or bring web pages into an investigation in a forensically sound process, are two additional advantages Cellebrite offers. The value here is that terrorists are using social media more to communicate. Additionally, with warrants, CTU’s can access token-based cloud data (tokens can be extracted from the phone). To find out how to extract PC tokens, go to Cellebrite UFED Cloud 6.1 release notes.
 
Watch the video below to understand how to access Google and Facebook content, and extract compelling evidence marked as public from social media with Cellebrite UFED Cloud version 6.1.


Viewing Made Easy

When it comes to viewing data from multiple sources, Cellebrite tools automatically consolidate views of disparate data in a single view. Much easier to digest, right? Our tools can also filter and group data to narrow searches. Again, there is a lot of data in a terrorism investigation. Being able to drill down on the critical data to focus in on what is key to tracking down the terror cell or preventing another attack is what we do.
 

Easing Analytics Bottlenecks

With so many elements and data sources, seeing the big picture can be tough. Using Neural network-based machine learning algorithms, investigators can automatically detect previously unknown images and video clips related to key categories, including, weapons, money, and drugs, to help identify terror cell members, additional targets, safe houses, and key images. 
 

See how Cellebrite’s digital intelligence helps solve counter-terrorism.

Share this post