SlideShare a Scribd company logo
Open Corporates Demo
Using KeyLines to Visualize Fraud
Demo – Enron Fraud

http://youtu.be/zu2AynDWswo
Demo – Terrorism

http://youtu.be/LOZZ5lwY0cY
Demo – Email traffic
Demo – Fraud
Insurance Fraud

• Each formation is an insurance claim
• Overview reveals suspicious patterns
• Zooming in helps ID modus operandi
• 270 public and private sector organizations in
the UK are members of CIFAS
• CIFAS maintains two large databases, one of all
reported fraud instances and one for reported
staff fraud
• CIFAS has contracted to use KeyLines to
visualize connections between fraud instances
UK National Fraud Database
Cambridge Intelligence

Founded May 2011
Andrew

Ex-

Corey

Joe

Kaush

Marco

Nate

Phil

Combined 40+ years developing and
designing visual tools for law
enforcement and national security
Visualise and analyse networks in the browser
•
•
•

Communication networks
Social networks
Fraud networks

Features
•
Pure HTML5
•
Works on IE6, 7, 8 via Flash
•
Graph layouts
•
Graph analytics
– SNA measures, path finding & more
•
Full event model
•
Full workflow support
– Image generation for reports, undo stack, etc

•
•
•
•

Very quick integration time
Thorough documentation
Good performance
Great support
http://keylines.com/neo4j
Thanks!

joe@cambridge-intelligence.com

All logos, trademarks, service marks and copyrights used in this
presentation belong to their respective owners

More Related Content

PPTX
Network Security in the Age of the Third Platform
PDF
ICTSA v2
PDF
Visualizing Threats: Network Visualization for Cyber Security
PPT
Cyber crime faizan project
PPTX
Software Security For DevOps And Continuous Deployment In The Cloud
PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
PPTX
Cybercrime in Nigeria - Technology and Society
Network Security in the Age of the Third Platform
ICTSA v2
Visualizing Threats: Network Visualization for Cyber Security
Cyber crime faizan project
Software Security For DevOps And Continuous Deployment In The Cloud
Refugees on Rails Berlin - #2 Tech Talk on Security
Cybercrime in Nigeria - Technology and Society

What's hot (19)

PDF
Ransomware ly
PPTX
The EU Data Protection Regulation and what it means for your organization
PDF
Understanding and preventing cyber crime and its impact on your organisation
PDF
The application security controller
PPTX
Internet Security is an Oxymoron
PDF
Protecting Financial Records, Privacy & Digital Footprint
PPT
Cybersecurity
PPTX
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
PPTX
Mohammed tariq alsharhan
PDF
Uganda lawsociety v2digitalforensics
PPTX
Introduction to cybercrime
PPTX
ION Hangzhou - Opening Remarks
PDF
ICANN 50: ICANN Security Stability and Resiliency Outreach
PPT
ISOC and GSMA: Shared Futures, Global Opportunities
PPTX
Cyber security , an Analysis of State Security in Sri Lanka
PPTX
Stop in the name of norton
PPTX
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
PPTX
MIRAI: What is It, How Does it Work and Why Should I Care?
PPTX
Digital Law Powerpoint
Ransomware ly
The EU Data Protection Regulation and what it means for your organization
Understanding and preventing cyber crime and its impact on your organisation
The application security controller
Internet Security is an Oxymoron
Protecting Financial Records, Privacy & Digital Footprint
Cybersecurity
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Mohammed tariq alsharhan
Uganda lawsociety v2digitalforensics
Introduction to cybercrime
ION Hangzhou - Opening Remarks
ICANN 50: ICANN Security Stability and Resiliency Outreach
ISOC and GSMA: Shared Futures, Global Opportunities
Cyber security , an Analysis of State Security in Sri Lanka
Stop in the name of norton
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
MIRAI: What is It, How Does it Work and Why Should I Care?
Digital Law Powerpoint
Ad

Similar to Using KeyLines to Visualize Fraud (20)

PPTX
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
KEY
Data for Business Journalism, NICAR 2012
PDF
Build Intelligent Fraud Prevention with Machine Learning and Graphs
PDF
II-SDV 14 Product Presentations Cambridge Intelligence
KEY
The Closed World Of Company Data
PDF
Graphs in Government
PDF
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
PDF
Fighting Fraud with Neo4j, Kees Vegter
PDF
A visual approach to fraud detection and investigation - Giuseppe Francavilla
PDF
Leveraging graph technology to fight financial fraud
PPTX
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
PDF
Digital Utopias, Hull, UK 2015-01 – Overview of Open Data
PDF
GraphTalks Italy - Using graphs to fight financial fraud
PDF
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
PDF
Scoda company networks2
PPT
The Insider Threat
PDF
Corporate transparency
PDF
Using graph technologies to fight fraud
PDF
Scoda project companygraph
PDF
Neo4j graphs in government
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Data for Business Journalism, NICAR 2012
Build Intelligent Fraud Prevention with Machine Learning and Graphs
II-SDV 14 Product Presentations Cambridge Intelligence
The Closed World Of Company Data
Graphs in Government
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Fighting Fraud with Neo4j, Kees Vegter
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Leveraging graph technology to fight financial fraud
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
Digital Utopias, Hull, UK 2015-01 – Overview of Open Data
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
Scoda company networks2
The Insider Threat
Corporate transparency
Using graph technologies to fight fraud
Scoda project companygraph
Neo4j graphs in government
Ad

More from Cambridge Intelligence (10)

PDF
Building powerful apps with ArangoDB & KeyLines
PDF
Supercharged graph visualization for cyber security
PDF
Visualizing NoSQL databases as networks
PDF
Dynamic networks
PPTX
Bringing Networks to Life Using Visualization for User Engagement
PPTX
Making the switch to angular js
PPT
Big Data & Graphs in Rome
PPTX
Seeing Graphs - How to successfully visualize connected data
PPTX
Visualizing the neo4j graph database with key lines
PPTX
Designing graph visualizations - unpicking the hairball
Building powerful apps with ArangoDB & KeyLines
Supercharged graph visualization for cyber security
Visualizing NoSQL databases as networks
Dynamic networks
Bringing Networks to Life Using Visualization for User Engagement
Making the switch to angular js
Big Data & Graphs in Rome
Seeing Graphs - How to successfully visualize connected data
Visualizing the neo4j graph database with key lines
Designing graph visualizations - unpicking the hairball

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Weekly Chronicles - August'25 Week I
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Using KeyLines to Visualize Fraud