Using Technology To Get Results: Accumulated Knowledge

Over three articles, Griffeye known for its Analyze platform for collecting, processing, analyzing, visualizing and managing images and videos, explores the challenges and opportunities law enforcement face due to the sheer volume of data in digital media investigations. Not least showing how technology can help us get better results, quicker. This first article addresses accumulated knowledge and its value.What is accumulated knowledge and why is it important?
Like all of us, you carry around a great deal of knowledge and experience in your head. Accumulated over a long time or even your entire life, you have enormous experiential intelligence, and you use much of this knowledge freely. In fact, almost effortlessly, like when you get in your car in the morning and all of a sudden you are at work: how did that happen? Or when you cook your favorite meal, without following any instructions even though it involves hundreds of individual actions and decisions.

Drawing on the experience of others
We routinely solve many of the problems we encounter by just using the knowledge we have accumulated throughout our lifetime. But if we take this idea and apply it to more than one person, it gets even more interesting. Collectively, a group of people will accumulate far more than any one person can learn.
We use what others have already figured out, and then we add to it. And we reuse what others have done when faced with particular problems. Reflecting on the importance of accumulated knowledge, Isaac Newton said, “If I have seen further, it is by standing on the shoulders of giants.”

At the heart of law enforcement cooperation
Two excellent examples of the benefits of accumulating knowledge as a common, shareable resource to combat crime and solve cases are Interpol’s International Child Sexual Exploitation (ICSE) database and UK’s national Child Abuse Image Database (CAID). They are both powerful intelligence and investigative resources that let specialized investigators share data with colleagues. Sharing knowledge and building on each other’s knowledge makes sure that important information and clues are not missed and avoids the risk of individuals and teams repeating each other’s work.

Using old and new knowledge
The ICSE and CAID databases make a great case for how to gather and structure data to accumulate knowledge – particularly with how old and new data can be used to build intelligence. Clues are found and cases are cracked when a face or object is recognised from a previous investigation. It’s that ability to access and apply all the knowledge we have that is so important.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Which will bring us to the next issue and the next article. If we recognize the value of gathering and sharing knowledge in daily investigations then what happens if investigators can’t access this knowledge, share it or use it thanks to the limitations of their tools and systems. How do we get them out of their silo?


About the author
Pelle Garå is a Director and co-Founder of Griffeye with over 10 years’ experience working closely with law enforcement in the area of applied image and video analysis. Over this time, Pelle’s main focus has been on implementing new ideas and new solutions, and supporting the development of greater, more effective collaboration between individuals and organizations to achieve better and quicker results.


Leave a Comment

Latest Videos

Data Extraction From UNISOC-Based Devices In Oxygen Forensic® Detective

Forensic Focus 16th November 2023 3:08 pm

Listen on Apple Podcasts: https://www.forensicfocus.com/podcast/listen-on-apple-podcasts

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors. 

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users  - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

Si and Desi talk to Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation, and Emma Pickering, Head of Tech and Economic Abuse at Refuge. They discuss the impact of digital forensics and incident response (DFIR) in cases of domestic abuse. They highlight the prevalence of tech-enabled abuse, such as the use of stalkerware, and the need for comprehensive support and safety plans for survivors.

They also talk about the challenges faced by law enforcement in investigating and prosecuting these cases, as well as the importance of training and awareness in addressing tech-enabled abuse. The conversation emphasizes the need for collaboration between organizations, tech developers, and law enforcement to effectively combat domestic abuse.

Show Notes:

Apple Support: How Safety Check on iPhone works to keep you safe - https://support.apple.com/guide/personal-safety/how-safety-check-works-ips2aad835e1/web
IBM: Five Technology Design Principles to Combat Domestic Abuse - https://www.ibm.com/policy/five-technology-design-principles-to-combat-domestic-abuse/
EFF: Today The UK Parliament Undermined The Privacy, Security, And Freedom Of All Internet Users - https://www.eff.org/deeplinks/2023/09/today-uk-parliament-undermined-privacy-security-and-freedom-all-internet-users
Wesley Mission: More support to help escape family violence - https://www.wesleymission.org.au/about-us/what-we-do/helping-people-most-in-need/housing-and-accommodation/wesley-emergency-relief/more-support-to-help-escape-family-violence/
Refuge: How we can help you - https://refuge.org.uk/i-need-help-now/how-we-can-help-you/
Electronic Frontier Foundation - https://www.eff.org/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_nSWQZe9gpVk

Protecting Victims From Stalkerware And Tech-Enabled Abuse

Forensic Focus 15th November 2023 11:11 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles