Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the google-analytics-for-wordpress domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php on line 6121 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 Warning: Cannot modify header information - headers already sent by (output started at /customers/6/8/6/legind.com/httpd.www/wp-includes/functions.php:6121) in /customers/6/8/6/legind.com/httpd.www/wp-includes/rest-api/class-wp-rest-server.php on line 1896 {"id":122,"date":"2018-02-12T11:19:17","date_gmt":"2018-02-12T10:19:17","guid":{"rendered":"http:\/\/legind.com\/?page_id=122"},"modified":"2021-01-14T20:55:29","modified_gmt":"2021-01-14T19:55:29","slug":"post","status":"publish","type":"page","link":"https:\/\/legind.com\/en\/post\/","title":{"rendered":"Blog"},"content":{"rendered":"

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.6.5″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]<\/p>\n

System for Situation Assessment support<\/strong><\/h1>\n

Situation assessment (SA) has to provide everything what we need to know not to be surprised. Despite the simple definition, this is not an easy task the considering large amount of available heterogeneous data and turbulent environments. Therefore, we have to rely on increasingly efficient algorithms for data analysis and innovative SA processes.<\/p>\n

The COPKIT LTA SA solution presented here is focused on identification and analysis of threats in semi-structured data such as messages in forums, ads and emails.<\/p>\n

Legind Technologies’ solution (Legind SA) developed in the COPKIT project<\/h4>\n

\"\"<\/p>\n

The concept of the solution is based on the assumption that anomalies can be connected with suspicious activities and their analyses can reveal interesting details such as threats. As anomalies is considered increases in time and space, outliers, outstanding values, etc., of, for instance, messages indicating a threat of a particular kind. The analysis of fund anomalies and threats is an important part of the SA.<\/p>\n

This concept is presented as an intuitive cyclic 4-step SA process as illustrated in the figure above. Step 1, data gathering<\/strong>, is focused on automated gathering of semi-structured data that are texts with meta-data such as forums, messages, emails, conversation transcripts, documents, tweets, and so on. The majority of data analysed by law enforcement agencies (LEAs) can be transformed in this structure.<\/p>\n

COPKIT solution support this step with system for data import and transformation, identification of threat indicators, Named Entity Recognition (NER) and calculation of new indicators. For data import, the user drags and drops, or select, one or more files (.csv or .xlsx). The next version of the LTA SA tool will also support direct connection to mailboxes.<\/p>\n

Step 2 is aimed at anomaly detection<\/strong> in the input data. The purpose of this step is identification of time intervals including suspicious activities. The COPKIT solution supports this step with a time chart showing threat indicators and an automatically generated textual summary of the threat situation in the time interval (see the figure below). These indicators are based on a threat table composed of threat names, keywords, and explanation. For instance, a threat can be CCG (Cyber Crime Group), where the search keywords are names of the groups and explanation can include link to a page with more information about the group. Intervals with increasing number of the threats are anomalies.<\/p>\n

\"\"<\/p>\n

The previous step identifies interesting intervals but this is not enough for LEAs to take some actions. Step 3, anomaly analysis<\/strong>, provides details about this interval in order to reveal new threats. The details comprise conversation subjects, threats, characteristic users and entities, etc.<\/p>\n

The COPKIT solution supports this step through displaying the conversation both in table form and graph form, and the generated summary of the threat situation. The table shows conversations with indicators such as number of messages in conversation, number of threats, characteristic entities etc. Selected conversations are visualized in conversation graphs. The generated text provides entities that are characteristic for the selected time interval.<\/p>\n

Here, we focus on analysis of conversations, as needed to understand the meaning of the often very short individual messages, such as tweets and forum messages.<\/p>\n

Step 4, threat analysis<\/strong>, assesses the threat and details provided in previous step. The LTA SA solution supports insertion of new threat indicators and their visualization in time chart as well as export data for enrichment and analysis with other graph analysis tools.<\/p>\n

Contact:\u00a0info@legind.com<\/a>\u00a0(Subject: Legind SA)<\/p>\n

 <\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

System for Situation Assessment support Situation assessment (SA) has to provide everything what we need to know not to be surprised. Despite the simple definition, this is not an easy task the considering large amount of available heterogeneous data and turbulent environments. Therefore, we have to rely on increasingly efficient algorithms for data analysis and […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_oct_exclude_from_cache":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-122","page","type-page","status-publish","hentry"],"yoast_head":"\nBlog - Legind Technologies - Read, comment on, share our latest topics<\/title>\n<meta name=\"description\" content=\"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blog - Legind Technologies - Read, comment on, share our latest topics\" \/>\n<meta property=\"og:description\" content=\"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legind.com\/en\/post\/\" \/>\n<meta property=\"og:site_name\" content=\"Legind Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-14T19:55:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legind.com\/en\/post\/\",\"url\":\"https:\/\/legind.com\/en\/post\/\",\"name\":\"Blog - Legind Technologies - Read, comment on, share our latest topics\",\"isPartOf\":{\"@id\":\"https:\/\/legind.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legind.com\/en\/post\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legind.com\/en\/post\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png\",\"datePublished\":\"2018-02-12T10:19:17+00:00\",\"dateModified\":\"2021-01-14T19:55:29+00:00\",\"description\":\"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.\",\"breadcrumb\":{\"@id\":\"https:\/\/legind.com\/en\/post\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legind.com\/en\/post\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legind.com\/en\/post\/#primaryimage\",\"url\":\"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png\",\"contentUrl\":\"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legind.com\/en\/post\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legind.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legind.com\/en\/#website\",\"url\":\"https:\/\/legind.com\/en\/\",\"name\":\"Legind Technologies\",\"description\":\"Analytic tools for law enforcement\",\"publisher\":{\"@id\":\"https:\/\/legind.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legind.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legind.com\/en\/#organization\",\"name\":\"Legind Technologies A\/S\",\"url\":\"https:\/\/legind.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png\",\"contentUrl\":\"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png\",\"width\":200,\"height\":55,\"caption\":\"Legind Technologies A\/S\"},\"image\":{\"@id\":\"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blog - Legind Technologies - Read, comment on, share our latest topics","description":"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Blog - Legind Technologies - Read, comment on, share our latest topics","og_description":"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.","og_url":"https:\/\/legind.com\/en\/post\/","og_site_name":"Legind Technologies","article_modified_time":"2021-01-14T19:55:29+00:00","og_image":[{"url":"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/legind.com\/en\/post\/","url":"https:\/\/legind.com\/en\/post\/","name":"Blog - Legind Technologies - Read, comment on, share our latest topics","isPartOf":{"@id":"https:\/\/legind.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legind.com\/en\/post\/#primaryimage"},"image":{"@id":"https:\/\/legind.com\/en\/post\/#primaryimage"},"thumbnailUrl":"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png","datePublished":"2018-02-12T10:19:17+00:00","dateModified":"2021-01-14T19:55:29+00:00","description":"On the blog page of Legind Technologies you can read up on different articles considering IT, law enforcement and other related topics that may interest people in this area of IT and security.","breadcrumb":{"@id":"https:\/\/legind.com\/en\/post\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legind.com\/en\/post\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legind.com\/en\/post\/#primaryimage","url":"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png","contentUrl":"https:\/\/legind.com\/wp-content\/uploads\/2021\/01\/4-step-SA-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/legind.com\/en\/post\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legind.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog"}]},{"@type":"WebSite","@id":"https:\/\/legind.com\/en\/#website","url":"https:\/\/legind.com\/en\/","name":"Legind Technologies","description":"Analytic tools for law enforcement","publisher":{"@id":"https:\/\/legind.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legind.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/legind.com\/en\/#organization","name":"Legind Technologies A\/S","url":"https:\/\/legind.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png","contentUrl":"https:\/\/legind.com\/wp-content\/uploads\/2018\/01\/cropped-LogoCircledotCOM.png","width":200,"height":55,"caption":"Legind Technologies A\/S"},"image":{"@id":"https:\/\/legind.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":5,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/122\/revisions"}],"predecessor-version":[{"id":3569,"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/pages\/122\/revisions\/3569"}],"wp:attachment":[{"href":"https:\/\/legind.com\/en\/wp-json\/wp\/v2\/media?parent=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}