Skip to main content

Network Visualization

Related products


At your request, we will design a solution tailored to your needs.


Discover the potential of this application from Clementine staff!


Clementine experts can even provide on-site training to help your make the most of your applications.


Clementine events present the latest trends and developments in data science and natural language processing.

Network Visualization

i2 Analyst's Notebook

Data analysis and visualization for effective intelligence analysis

Fraud is a significant and evolving challenge for the financial industry, costing an estimated five to eight percent of revenues per annum. Criminals are becoming increasingly adept at exploiting weaknesses across multiple systems, possibly in collusion with employees, and attempting to hide in the siloed nature of Enterprise data. As well as damage to the balance sheet, fraud poses a real threat to brand and reputation with potential impact on customers, shareholders and regulators. However, each interaction with your systems leaves a small breadcrumb and with it, the opportunity to intelligently link them to identify, detect and disrupt threats.

Companies are usually looking for a solution against known threats, but the "rear-view mirror" strategy is often the more expensive and less effective way, as it does not protect against new or novel fraud. Thanks to modern analytical tools such as the i2 Analyst's Notebook, suspicious cases can be detected that have never been seen before. This is because fraud and crime are patterns of behaviour that deviate from the norm. When normal, habitual patterns of behaviour are uncovered, events that indicate abnormal behaviour become immediately visible. In addition to law enforcement agencies, the method is used by banks, insurance companies, telecoms companies and many service providers to detect money laundering, to detect suspicious customers in the case of services such as mobile phone purchases by fraudsters or electricity theft.

For most crimes, it is necessary to investigate the network of offenders or victims, i.e. network analysis. Network analysis can also be used to map the network of perpetrators of larger criminal organisations. If one member of a gang can be identified, the whole structure of the organisation can be revealed and the leaders can be identified. The network of perpetrators can be uncovered by analysing the transcripts of confessions, or by analysing the maps of perpetrators using data from seized assets, mobile phones, computers, etc., for which i2 Analyst's Notebook analysis toolkit is the ideal solution.

With the i2 Analyst's Notebook, users can:

  • create a single view from data from different sources. This allows for a complete mapping of suspected fraudulent activities.
  • improve crime detection rates by using event and rule-based processes, and by sharing investigative and other collaborative material.
  • create clear information charts, simplifying the complexity of data and contributing to an efficient flow of information.
  • Easily filter out the "Who?" "Where?" "What?" "When?" and "Why?" and display them in a variety of ways, including network, geospatial, time series, statistical and tabular views.
  • identify relationships, patterns and trends in a wide range of data types.
  • explore recurring information thanks to a semantic search mode.
  • better understand the behaviour of key members of criminal and terrorist networks and their role in the structure. This helps operational planning and resource allocation.

Flexible Data Acquisition
i2 Analyst’s Notebook provides a range of methods to quickly ingest the wide variety of information that intelligence analysts are faced with everyday. This flexible approach to data acquisition allows users to input a broad range of data types. Examples include, telephone call records, financial transactions, computer IP logs, mobile forensics data to name but a few.

Flexible Data Model and Representation
i2 Analyst’s Notebook provides an environment that offers users flexibility in how data is modeled and visualized. This flexibility ensures that users are not constrained in the input of complex relational data.

Simple communication of complex data
While the discovery and development of intelligence is key, it is equally important that analysts are able to effectively share critical findings in a clear and concise manner. The effective dissemination of data is vital to aid operational decision makers in making rapid, accurate, and informed decisions.