Presentation is loading. Please wait.

Presentation is loading. Please wait.

Detica overview 9 February 2010.

Similar presentations

Presentation on theme: "Detica overview 9 February 2010."— Presentation transcript:

1 Detica overview 9 February 2010

2 Exploiting data to reveal actionable intelligence
Key facts Over 1,500 people Turnover £203.2m (2008) Acquired by BAE Systems in September 2008 to lead on intelligence, security and resilience Key markets Defence and national security Central government Critical National Infrastructure Homeland security Core services Business and technical services System integration, delivery management and system support Electronic solutions Specialist services and products Detica Forensics Detica NetReveal® and Detica TxtRevealTM StreamShield®

3 Our mission areas and their themes
Border and Trade security Cybersecurity and Information Assurance Preventing unlawful entry and managing immigration Preventing cross-border smuggling and facilitating trade Securing international cargo Securing energy supplies and resources Detecting CBRNE threats Policy and strategy for cybersecurity/IA Computer network operations Assuring information and protecting its infrastructure Protecting society from harmful content Sharing music online fairly Complex solutions integration Counter Terrorism and Organised Crime Tackling the Chemical, Biological, Radiological, Nuclear or Explosive threat Securing crowded places, transport systems and their users Countering Improvised Explosive Devices Countering radicalisation Revealing terrorists and organised criminals Responding to emergencies and civil unrest Safeguarding hazardous materials and sites, and vetting personnel Organisational learning System integration Data management Smart energy grids and meters Strategic Capability Framework

4 Case Study: UKBA Freight targeting system (FTS)
Risk-based targeting of freight and vehicle movements Counter-terrorism Organised crime and smuggling Immigration Time-critical risk scoring Automatic number plate recognition camera seconds from Channel Tunnel Ferry crossings Lord West (UK Security Minister) review “In the month following its launch in September 2007, FTS has contributed to the seizure of more than nine million cigarettes, 20kg of heroin and over 2 1⁄2 tonnes of cannabis.” 4

5 Other example programmes
Visa fraud and internal threat Crowded places Secure borders: Passenger screening and freight targeting Met Police mobile data Criminal intelligence and investigation Tax evasion

6 Contact details Adam Hosier Regional Manager - Turkey
Head Office Surrey Research Park Guildford Surrey GU2 7YP Tel: +44 (0) Fax: +44 (0) London Office 2 Arundel Street Arundel Great Court London WC2R 3AZ Tel: +44 (0) Fax: +44 (0) Cheltenham Office 1220 Lansdowne Court Gloucester Business Park Gloucester GL3 4AB UK Tel: +44 (0) Fax: +44 (0) Adam Hosier Regional Manager - Turkey Mobile: +44 (0)

7 UK Home Office: crowded places
Cross-government INSTINCT programme (Innovative Science and Technology in Counter Terrorism) seeks innovative solutions to the challenges of implementing the UK government’s CONTEST counter terrorism strategy Detica selected to deliver a technology demonstrator to evaluate and showcase novel approaches to modelling and predicting the behaviour of crowds Technologies were trialled in a virtual ‘crowded place’ before live trials in a real location 7

8 eBorders: Passenger risk screening pre-arrival
Making UK border control more secure, effective and efficient, enhance counter-terrorism operations and promote national security, and frustrate and dismantle organised crime Score travellers against defined criteria, watchlists and other information sources, as well as by behaviour profile Integrates risk-based targeting and advanced analytics with biometrics for identify verification eBorders

9 UK BA International Group: Visa fraud project
Sham colleges open doors to Pakistani terror suspects The Times, May Objectives Reduce the number of referrals and deferrals - automatically identify the high and low risk applications Speed up the process – automate manual risk checks Identify previously undetected networks of suspicious individuals and groups Illegal immigrants who ran fake visa factory are jailed The Times, Jun Networked existing data Risk analysis 9

10 Visa fraud scenario Multiple visa applications spread over ‘different’ identities Suspicious behaviour – identity manipulation captured through soft links 10

11 Met Police: Mobile access for real-time intelligence and processing
Enabling improved intelligence flows and data quality, delivering more effective decision making and enhanced risk assessments on the ground Improving officer safety Reducing bureaucracy Facilitating more criminals being successfully brought to justice Providing front-line police officers with access to local and national crime and intelligence systems Up to 10,000 mobile devices - in-car Mobile Data Terminals, PDAs, and in future, laptops/tablet PCs Secure, high-availability and resilient communications

12 Connect: Uncovering fraudulent tax claims and non-compliant behaviour
Risk-based compliance system for personal tax and VAT for HM Revenue and Customs Uncover hidden relationships between people and data Advanced data analytics and risk scoring Directly helping HMRC to Close the tax gap Focus resources on tax evasion and organised non-compliant behaviour HMRC’s 2009 annual report “Connect’s … use has uncovered fraudulent claims totalling over £330 million and prevented those sums being repaid…A further £118 million has been protected in direct taxes using Connect…” 12

13 HMRC: Investigating the criminals to increase successful prosecution rates
A programme to move from manual paper-based processes and deliver in phased releases an integrated criminal case management and intelligence system improve legal and regulatory compliance to reduce the burden on officers live for several thousand users Increasing the successful prosecution rate Addressing the increasing complexity of cases Managing large quantities of information Searching and analysing the information in a controlled and secure manner 13

Download ppt "Detica overview 9 February 2010."

Similar presentations

Ads by Google