i2 Advances Technology to Tackle Information Sharing Challenges

Sharing information across jurisdictions is essential for law enforcement and intelligence agencies to keep pace with criminals and terrorists who are not limited by geographic boundaries. During a panel discussion held at the annual gathering of the International Association of Chiefs of Police Conference, several chiefs highlighted not only the technology challenges, but the policy, legal and cultural obstacles.

Responding to this critical need, i2 has broadened its product portfolio with a patented technology to help agencies overcome the lengthy process and legal hurdles to form information sharing agreements between jurisdictions.

"i2 has listened carefully to our customers and the pain points they face in implementing information sharing, and this step builds on our long heritage in facilitating secure collaboration within agencies, across agencies and across borders," said i2 CEO Bob Griffin. "Part of this is a technology challenge, but as we break down the technology barrier, we're exposing cultural, political, protocol and process issues. We've spent the last 10 years helping our clients with those challenges too."

Relevant to the IACP attendees – i2 solutions are helping US Law Enforcement customers share more than 2.5 billion records. One in three cops nationwide has access to i2 solutions across 4,000 jurisdictions. One in five cops nationwide are actively contributing, sharing and collaborating with i2 solutions.

i2 solutions now deliver three kinds of scalable and secure information sharing:

National Identity Index – This patented technology enhances COPLINK with a highly secure, encrypted and hashed cloud-based search of criminal data from all COPLINK nodes. If an information sharing agreement is not in place between jurisdictions, search results are not viewable; however, contact details to request information is presented. If an information sharing Memorandum of Understanding is in place between the two agencies, the search results include a link to the record.

By using i2's National Identity Index service, a detective in Boston, for example, could enter "John Doe" into their COPLINK database and automatically search the data from all COPLINK nodes. In addition to seeing records of John Doe in Boston, the detective might also learn that there are records of that same person in Tampa, even though they aren't able to see any of the information — speeding up the pace of the investigation because the Boston detective now knows to contact his peers in Tampa. Since only encrypted pointers are shared when no information sharing agreement is in place, privacy or legal concerns are alleviated. The National Identity Index is available to all existing COPLINK customers free of charge.

Concurrent Database Access – Law enforcement agencies rely on COPLINK, the most widely deployed lead generation system in the U.S., to organize and rapidly analyze vast quantities of seemingly unrelated criminal data currently housed in incompatible databases and record management systems. Many customers share data stores across multiple agencies and across borders.

For concurrent and collaborative intelligence analysis, law enforcement, national security and defense customers rely on i2's iBase and iBase IntelliShare, both highly secure and extremely flexible intelligence solutions.

With iBase, multiple agencies and organizations can contribute intelligence data to a single repository where multiple analysts can work together — in unison — to create, share and disseminate intelligence.

Node-to-Node – While COPLINK can be used as a single node for sharing within one geography, many customers employ node-to-node connections across multiple jurisdictions via formal MoUs. With these MoUs in place, users can access information with full rights management, while respecting all security levels of access. So, for example, if a police officer in Phoenix is seeking information on John Doe, they could obtain criminal records from Austin. The MoU process is possible for all COPLINK customers and the connectivity can happen in as little as an hour once the information sharing agreement is in place.

"With i2's multiple information sharing and collaboration capabilities, matched with our industry leading predictive and investigative analysis capabilities in use today, we're a bright spot in the global information sharing landscape," Griffin said. "There are many reasons that can prevent information sharing from happening. At i2, we have a proven track record of helping our customers knock down the barriers to making information sharing and collaboration a reality."

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities