Terrorist organizations recruit, communicate and operate through the Internet. Government and Intelligence Agencies need a high level of accuracy in processing the available information to detect potential terrorists and their threats in order to take action and make policy decisions.
The combination of the company’s technologies affords the user the ability to recognize the identity of potential terrorists by their voice and image. In order to detect potential attacks, the product processes data form a myriad Internet sources.
The company’s technologies are fully adaptable to the specific needs of Intelligence Agencies.
Example use cases:
- Terrorist identification by voice.
- Terrorist identification by video.
- Terrorist identification through Internet and Social Networks.