Suppose you are working on an investigation with multiple colleagues, regularly exchanging information. You are provided with the most elaborate charts, filled with colours and lines. Occasionally, you may wonder about the significance of the colours and lines in the chart. In such situations, a small legend can make all the difference. Read more
In analyses, it may happen that you want to reuse a query often to search and query your data, but it needs to be slightly different each time. Things like the date or the name of a person or organisation, for instance. It can be time consuming to re-enter the query each time. iBase offers two different options so you don't need to, and you can perform your analyses easier and with fewer actions. Read more
iBase offers many different import functionalities: from single text files and images, to bulk import of large amounts of structured data and the possibility to merge files. Plenty of features for analysts to get started with! Read more
EncroChat and Anom were two services used by criminals worldwide to communicate with each other. Both services were eventually infiltrated by the police. This yielded as many as 127 million messages hiding valuable intelligence. But how do you find useful information in 127 million chat messages? Read more
With the advent of online banking, detecting fraudulent behaviour has become an even greater challenge. This use case, from one of the largest banks in Germany, describes how financial institutions can identify fraudulent activity and map future threats. Read more
In this whitepaper, we delve into the working methods of a specialised unit within the Dutch Ministry of Defence that deals with collecting data from data carriers and correlating and analysing it. Their goal is to turn this information into actionable intelligence. Read more