Let’s say that you are investigating John Doe. You start by setting up a target profiling application for John Doe in OpenMIND™ to scour the web for related information from relevant sources, utilizing multiple different search engines simultaneously to reach the maximum number of available and relevant results. This includes “deep web” content which is not indexed or accessible by standard search engines.
OpenMIND™ makes it easy for you to generate a John Doe profile by aggregating the collected information about John Doe, his friends, demographic data such as gender, race, and age, addresses, contact details, photos, interests, etc., and filter it for duplicates and spam. Filtering ensures that only relevant information is harvested and indexed and that what goes into the profile is both rich (having originated from different search engines) and purified (with duplicate results and filtered spam removed).
By setting this up as an ongoing investigation, new information will constantly and automatically be added to the initial results. Your next step is to analyze the filtered initial search results. OpenMIND™ indexes the results, extracts relevant entities and creates links, surfacing the key data points and connections in a link diagram.
Perhaps you are tracking an upcoming political rally. Once you set up the OpenMIND™ system to profile and monitor the rally, it will search the web for the event on web pages, social networking sites, blogs, forums and so forth, looking for information about the nature of the rally (e.g. peaceful, violent, participant demographics), try to identify both online and physical world activist leaders and collect information about them, monitor the event in real-time and alert you on user-defined critical developments.
Several days prior to the event, you start to receive alerts indicating increasing in traffic and recurrence of indicative words in several of the forums that you are monitoring.
Different visualizations of the rally including trend analysis of topics, individuals, locations, etc.; related geographical locations that highlight location-based patterns; discussions; leaders’ relationship map, etc. reveal that the forum users are planning to turn the political rally into a violent protest.
Your insight is distributed to the local police force warning them that the political rally may turn violent and potentially thwarting the violence before it occurs.
Criminals and terrorists using the web are getting smarter about concealing their activity and avoiding direction connection between operatives by using middlemen and other methods.
Suppose you are investigating a personal email address extracted from a confiscated laptop belonging to an arrested drug dealer.
When you check for online references to this e-mail address, OpenMIND™’s guided search feature displays the most highly recurring key words and phrases - one of which is the phrase “job offer.”
In reviewing the related results, you find that the email address you’re investigating was associated with posting the same job description on several recruitment sites.
Checking for the ad’s text on other sites results in a list of multiple recruitment sites with the same ad.
Using our link visualization capability, which applies complex algorithms to compute and rank the connections between entities based on different parameters (e.g. closeness, recurrence, known entity in knowledge base, entity type etc.), you can see that these ads are connected to other email addresses associated with publishing the same ad on other sites.
When your query regarding the new email addresses results in a personal ad linked to one of the investigated email addresses specifying its user’s full name, age, and contact details, you have the identified another possible member of the drug trafficking ring based on the indirect link with the arrested drug dealer – thanks to OpenMIND™’s identification and visualization capabilities.