Law Enforcement Agencies (LEAs) in the United States have evolved rapidly to meet the needs of a growing nation and more sophisticated crime. Science and technology have been vital in crime fighting, improving the quality of evidence that prosecutors count on to put away criminals. One of the critical technologies within the national law enforcement landscape is the database.
I know, you just scrolled toward the little ‘x’ in the corner. But hold tight. Because this is fascinating.
Fighting crime effectively relies on the transfer of timely, complete, and accurate information to authorities in a position to act on that information, which requires data sharing. Our justice system relies on precise information storage and retrieval. So, databases are at the heart of our criminal justice system operating effectively.
So, where did computers and cops first meet?
Early computers consisted of mainframes running on COBOL that could fill an entire warehouse. Regional and municipal law enforcement entities could rarely connect to these legacy systems, and in many cases could not afford the technology. The PC revolution made field terminals possible, connected by wires to the Internet, field agents could check-in for the latest details. These days, field units are equipped with mobile devices that update in real-time, replacing terminals.
A quick and easy way to understand the landscape of technology and databases in the United States is to recognize the three levels of government at play. Federal agencies have databases that store unclassified information as well as classified. States have databases that store information on activities in their State and some have access to the Federal system as well. Municipalities have their own methods for capturing, storing, and tracking data, some of which filters to the State and National level, but not all.
A trend since 9/11 is the creation of inter-agency collaboration through the Joint Terrorism Task Force at each of the FBI field offices and beyond. These are the field counterparts to regional Fusion Centers where data and intelligence of all levels can be vetted and distributed to the appropriate recipients.
So, what’s next in Law Enforcement Databases?
The greatest looming identified need by LEAs is “interoperability,” the sharing of data between agencies which can include: geographical data and content with links to internal and external websites, personal data, multimedia data like photos, videos, and illustrations, and it all needs to be high-speed.
CTT’s solution will contain an extraordinarily powerful networked database. The system’s back-end will be a cloud-enabled repository solution which supports both private/public and hybrid cloud deployment. Every agency will be able to securely connect to the single repository in the cloud (which data is distributed through blockchain technology) from any location in a flexible way (from Web Client on PC or mobile device) and perform operations such as:
⁃ Login to the system with authentication of authorized users with applied restrictions based on the role and permission
⁃ Scan and add cash banknote images to the system repository
⁃ Attach authentication and additional metadata to a scanned image
⁃ Edit metadata associated with a batch of scanned images
⁃ Add, update and delete entities information (people, events, supplementary data)
⁃ Perform search or queries against existing repository based on metadata attributes
Every operation may have its own set of permissions associated with different roles which are mapped to users and groups. For example, users in the group “Field Officer” may query and view assets, but not add or remove them. The User and Group mappings in the agency hierarchy are fully transparent for the system. For instance, a particular agency and its officers can have completely different permissions from another agency.
The system will employ a multi-tenancy concept to provide additional security permission scenarios where different agencies may be hosted by a single system but have absolutely no visibility beyond their specific data boundaries.
High accessibility, fault-tolerance, speed, and interoperability are the four main drivers behind the software design and the network/hardware integration. Built on a blockchain protocol, establishing an immutable chain of custody and supported by artificial intelligence to recognize and project patterns of criminal activity, CTT’s currency tracking technology is designed for the future needs of criminal justice.
Law Enforcement Agents, the women, and men who dedicate every day to keeping our neighborhoods safe are calling out for modern systems. CTT can provide the solutions they need.