i2 Advances Technology to Tackle Information Sharing Challenges

Sharing information across jurisdictions is essential for law enforcement and intelligence agencies to keep pace with criminals and terrorists who are not limited by geographic boundaries. During a panel discussion held at the annual gathering of the International Association of Chiefs of Police Conference, several chiefs highlighted not only the technology challenges, but the policy, legal and cultural obstacles.

Responding to this critical need, i2 has broadened its product portfolio with a patented technology to help agencies overcome the lengthy process and legal hurdles to form information sharing agreements between jurisdictions.

"i2 has listened carefully to our customers and the pain points they face in implementing information sharing, and this step builds on our long heritage in facilitating secure collaboration within agencies, across agencies and across borders," said i2 CEO Bob Griffin. "Part of this is a technology challenge, but as we break down the technology barrier, we're exposing cultural, political, protocol and process issues. We've spent the last 10 years helping our clients with those challenges too."

Relevant to the IACP attendees – i2 solutions are helping US Law Enforcement customers share more than 2.5 billion records. One in three cops nationwide has access to i2 solutions across 4,000 jurisdictions. One in five cops nationwide are actively contributing, sharing and collaborating with i2 solutions.

i2 solutions now deliver three kinds of scalable and secure information sharing:

National Identity Index – This patented technology enhances COPLINK with a highly secure, encrypted and hashed cloud-based search of criminal data from all COPLINK nodes. If an information sharing agreement is not in place between jurisdictions, search results are not viewable; however, contact details to request information is presented. If an information sharing Memorandum of Understanding is in place between the two agencies, the search results include a link to the record.

By using i2's National Identity Index service, a detective in Boston, for example, could enter "John Doe" into their COPLINK database and automatically search the data from all COPLINK nodes. In addition to seeing records of John Doe in Boston, the detective might also learn that there are records of that same person in Tampa, even though they aren't able to see any of the information — speeding up the pace of the investigation because the Boston detective now knows to contact his peers in Tampa. Since only encrypted pointers are shared when no information sharing agreement is in place, privacy or legal concerns are alleviated. The National Identity Index is available to all existing COPLINK customers free of charge.

Concurrent Database Access – Law enforcement agencies rely on COPLINK, the most widely deployed lead generation system in the U.S., to organize and rapidly analyze vast quantities of seemingly unrelated criminal data currently housed in incompatible databases and record management systems. Many customers share data stores across multiple agencies and across borders.

For concurrent and collaborative intelligence analysis, law enforcement, national security and defense customers rely on i2's iBase and iBase IntelliShare, both highly secure and extremely flexible intelligence solutions.

With iBase, multiple agencies and organizations can contribute intelligence data to a single repository where multiple analysts can work together — in unison — to create, share and disseminate intelligence.

Node-to-Node – While COPLINK can be used as a single node for sharing within one geography, many customers employ node-to-node connections across multiple jurisdictions via formal MoUs. With these MoUs in place, users can access information with full rights management, while respecting all security levels of access. So, for example, if a police officer in Phoenix is seeking information on John Doe, they could obtain criminal records from Austin. The MoU process is possible for all COPLINK customers and the connectivity can happen in as little as an hour once the information sharing agreement is in place.

"With i2's multiple information sharing and collaboration capabilities, matched with our industry leading predictive and investigative analysis capabilities in use today, we're a bright spot in the global information sharing landscape," Griffin said. "There are many reasons that can prevent information sharing from happening. At i2, we have a proven track record of helping our customers knock down the barriers to making information sharing and collaboration a reality."


  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity


New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3