Secure digital evidence intake for law enforcement and public safety agencies. Actionable data within minutes of an incident.
CrowdSource bridges the gap between witnesses and investigators, turning public submissions into organized, secure, and actionable intelligence.
Admins create an incident and receive a unique RSA-2048 keypair. A shareable public link is generated instantly for distribution.
Witnesses upload photos, videos, audio, and documents or submit anonymous text tips through a mobile-friendly intake form.
Files are encrypted at rest with AES-256-GCM, scanned for malware by ClamAV, and optionally analyzed by AI for synthetic media detection.
Investigators decrypt, review, tag, geolocate, and export evidence packages with full audit logging and compliance documentation.
Stand up a new incident with a single click. Each incident gets a unique RSA-2048 keypair, a shareable public URL, and a QR code ready for field distribution. Open and close submissions on your schedule.
Every incident generates a public-facing URL and QR code. Share it on social media, press releases, or printed flyers. Custom URL slugs let you brand the link for your agency. Control access by closing submissions at any time.
Browse all submitted media in a visual grid. Every image is automatically analyzed by on-premise AI to detect synthetic or AI-generated content. Tag evidence for batch export, decrypt submitter details, and download complete evidence packages.
The built-in AI model classifies every image as likely real or AI-generated, with a confidence score for each. Batch-analyze entire incidents at once. All processing runs locally on your infrastructure — media never leaves your control.
A unified activity log captures submissions, decryptions, AI analyses, storage events, and more. Color-coded categories make it easy to scan. Filter by type, review by timestamp, and maintain a complete chain of custody.
A purpose-built platform for public safety agencies that need to collect digital evidence from the community securely and at scale.
Accept photos, videos, audio, PDFs, documents, spreadsheets, and compressed archives. Drag-and-drop uploads with real-time progress tracking and a 10-minute timeout for large files.
Every file is encrypted at rest with AES-256-GCM. Submitter metadata (name, phone, email, location) is encrypted with incident-specific RSA-2048 keys. Only authorized admins with the private key can decrypt.
Integrated ClamAV antivirus scans every upload asynchronously. Infected files are automatically quarantined and deleted. Threat details are logged for audit review.
On-device AI model analyzes images for signs of AI generation. Confidence scores displayed as visual badges. All analysis runs locally on your infrastructure — media never leaves your platform.
Interactive mapping with Leaflet and OpenStreetMap. Geolocate submissions by IP address or browser location. Plot all evidence on a live map with detailed marker popups.
Every decryption, deletion, and admin action is logged with timestamp, user ID, IP address, and justification. Full compliance documentation for chain of custody requirements.
Visual gallery view for browsing media by incident. EXIF metadata extraction, fullscreen lightbox preview, tagging system for batch operations, and export as ZIP packages with HTML reports.
Manage multiple agencies and departments with fully isolated data, role-based access control, per-organization activity logs, and custom branded URLs. Each organization gets its own dedicated Google Cloud Storage bucket for total data sovereignty.
Metadata access requires a valid private key and written justification. Failed attempts are tracked with automatic lockout after 5 failures. Every access attempt is audited.
Every layer of the platform is designed with data protection, access control, and auditability at its core.
All media files and submitter metadata encrypted at rest with authenticated encryption providing both confidentiality and integrity.
Unique asymmetric keypair per incident. Private keys never stored on the server. Downloadable as PEM or PDF with incident identification.
All admin access requires time-based one-time password verification via authenticator apps. No admin can bypass multi-factor authentication.
Every uploaded file scanned for malware. Threats are automatically quarantined and logged with full threat identification details.
AI-generated image detection runs entirely on your infrastructure. No media data is ever sent to external services or third-party APIs.
Time-limited, HMAC-signed tokens for all media downloads. Prevents unauthorized access and URL sharing.
Multi-tier rate limiting across all endpoints. IP address tracking for every submission and admin action with geolocation capabilities.
Automatic lockout after 5 failed decryption attempts per submission. Prevents brute-force key attacks with audit logging of every attempt.
Immutable audit log of every sensitive operation: decryptions, deletions, admin actions, malware detections, and login events with IP and timestamp.