Make timely, informed decisions related to your nation's border security
Get fast, actionable intelligence with IBM® i2® Enterprise Insight
Analysis. These vetting and monitoring capabilities are vital tools designed to help manage the safety of your borders and help detect any non-obvious or hidden threats.
Here are four potential cases for you to analyze: Business traveler, asylum seeker, visa applicant or someone wanting to relocate internationally
Threat level assessed.
Regardless of your assessment, intelligence analysis solutions can only help you identify potential threats. You as the analyst, should confirm, validate or investigate that information. Then share the resulting intelligence with your team to make the ultimate decision, and determine the appropriate next steps.
Business traveler, asylum seeker, visa applicant or someone wanting to relocate internationally – these are just a few examples that border security analysts see everyday.
IBM® i2® Enterprise Insight Analysis can complement your existing vetting process, by enabling you to ingest, integrate and analyze disparate open source data, to help validate and confirm the identity of the person of interest. This helps you uncover potential threats in visitor populations and determine which cases warrant further investigation.
See how this solution can help keep your borders safe.
IBM i2 Enterprise Insight Analysis highlights potential threats to allow you to make the
determination on whether that person requires further vetting. See how this solution helps you apply your insight and determine whether you think these four cases need further investigation.
Click the to reveal more details from the solution
Chloe: Business traveler
Active social media user
Public records limited to real estate purchases and previous filing for divorce
CIO of global financial institution
Name found in news articles
Yosef: Asylum Seeker
Minimal social media presence
No association with news headlines
Local public records
Emma: Visa Applicant
Marketing manager at a tech company
Active social media user
Social media indicates frequent traveler to western countries
Active member of political extremist group
Stephen: Relocating Family
Dark Web handles match name and location
Name found associated with news headlines
Active on Dark Web sites, including "How to See your Company's Data"
*Disclaimer: Users should access, store and delete data in accordance with legal requirements and their agreements with the content provider.