CrowdSource
Digital Intelligence

Secure digital evidence intake for law enforcement and public safety agencies. Actionable data within minutes of an incident.

AES-256
Encryption at Rest
TOTP
Multi-Factor Auth
24/7
Evidence Intake
100%
Chain of Custody
0
Critical incidents
per day in the US
0
Smartphone cameras
nationwide
< 0
Bystander evidence
reaches investigators
0
Before digital evidence
starts disappearing
How It Works

From incident to intelligence
in four steps

CrowdSource bridges the gap between witnesses and investigators, turning public submissions into organized, secure, and actionable intelligence.

Create an Incident

Admins create an incident and receive a unique RSA-2048 keypair. A shareable public link is generated instantly for distribution.

Public Submits Evidence

Witnesses upload photos, videos, audio, and documents or submit anonymous text tips through a mobile-friendly intake form.

Automatic Processing

Files are encrypted at rest with AES-256-GCM, scanned for malware by ClamAV, and optionally analyzed by AI for synthetic media detection.

Review & Act

Investigators decrypt, review, tag, geolocate, and export evidence packages with full audit logging and compliance documentation.

See It In Action

Built for real-world operations

Create incidents, generate secure upload links in seconds

Stand up a new incident with a single click. Each incident gets a unique RSA-2048 keypair, a shareable public URL, and a QR code ready for field distribution. Open and close submissions on your schedule.

CrowdSource admin dashboard showing incident creation and management

One link connects your community to your investigation

Every incident generates a public-facing URL and QR code. Share it on social media, press releases, or printed flyers. Custom URL slugs let you brand the link for your agency. Control access by closing submissions at any time.

Incident detail view with shareable link, QR code, and custom URL configuration

Visual review with AI-powered authenticity scoring

Browse all submitted media in a visual grid. Every image is automatically analyzed by on-premise AI to detect synthetic or AI-generated content. Tag evidence for batch export, decrypt submitter details, and download complete evidence packages.

Gallery view showing evidence grid with AI authenticity badges and tagging tools

Flag manipulated media before it enters your case file

The built-in AI model classifies every image as likely real or AI-generated, with a confidence score for each. Batch-analyze entire incidents at once. All processing runs locally on your infrastructure — media never leaves your control.

AI image analysis results showing real and AI-generated classifications with confidence scores

Every action tracked, categorized, and accountable

A unified activity log captures submissions, decryptions, AI analyses, storage events, and more. Color-coded categories make it easy to scan. Filter by type, review by timestamp, and maintain a complete chain of custody.

Activity log showing color-coded event categories including submissions, decryptions, and AI detections
Platform Features

Everything you need to collect,
secure, and analyze evidence

A purpose-built platform for public safety agencies that need to collect digital evidence from the community securely and at scale.

Multi-Format Evidence Intake

Accept photos, videos, audio, PDFs, documents, spreadsheets, and compressed archives. Drag-and-drop uploads with real-time progress tracking and a 10-minute timeout for large files.

End-to-End Encryption

Every file is encrypted at rest with AES-256-GCM. Submitter metadata (name, phone, email, location) is encrypted with incident-specific RSA-2048 keys. Only authorized admins with the private key can decrypt.

Malware Scanning

Integrated ClamAV antivirus scans every upload asynchronously. Infected files are automatically quarantined and deleted. Threat details are logged for audit review.

AI Synthetic Media Detection

On-device AI model analyzes images for signs of AI generation. Confidence scores displayed as visual badges. All analysis runs locally on your infrastructure — media never leaves your platform.

Geographic Intelligence

Interactive mapping with Leaflet and OpenStreetMap. Geolocate submissions by IP address or browser location. Plot all evidence on a live map with detailed marker popups.

Complete Audit Trail

Every decryption, deletion, and admin action is logged with timestamp, user ID, IP address, and justification. Full compliance documentation for chain of custody requirements.

Gallery & Evidence Review

Visual gallery view for browsing media by incident. EXIF metadata extraction, fullscreen lightbox preview, tagging system for batch operations, and export as ZIP packages with HTML reports.

Multi-Tenant Organizations

Manage multiple agencies and departments with fully isolated data, role-based access control, per-organization activity logs, and custom branded URLs. Each organization gets its own dedicated Google Cloud Storage bucket for total data sovereignty.

Justification-Based Decryption

Metadata access requires a valid private key and written justification. Failed attempts are tracked with automatic lockout after 5 failures. Every access attempt is audited.

Security & Compliance

Built for agencies that can't
afford to compromise on security

Every layer of the platform is designed with data protection, access control, and auditability at its core.

AES-256-GCM Encryption

All media files and submitter metadata encrypted at rest with authenticated encryption providing both confidentiality and integrity.

RSA-2048 Key Management

Unique asymmetric keypair per incident. Private keys never stored on the server. Downloadable as PEM or PDF with incident identification.

Mandatory TOTP MFA

All admin access requires time-based one-time password verification via authenticator apps. No admin can bypass multi-factor authentication.

ClamAV Antivirus Integration

Every uploaded file scanned for malware. Threats are automatically quarantined and logged with full threat identification details.

On-Premise AI Detection

AI-generated image detection runs entirely on your infrastructure. No media data is ever sent to external services or third-party APIs.

Signed URL Media Access

Time-limited, HMAC-signed tokens for all media downloads. Prevents unauthorized access and URL sharing.

Rate Limiting & IP Tracking

Multi-tier rate limiting across all endpoints. IP address tracking for every submission and admin action with geolocation capabilities.

Decryption Lockout

Automatic lockout after 5 failed decryption attempts per submission. Prevents brute-force key attacks with audit logging of every attempt.

Full Audit Compliance

Immutable audit log of every sensitive operation: decryptions, deletions, admin actions, malware detections, and login events with IP and timestamp.

Anonymous tips. Encrypted evidence.
Complete accountability.

CrowdSource Intelligence gives your community a secure, trusted way to contribute digital evidence while giving your investigators the tools to organize, verify, and act on it — all with a complete chain of custody.

Full Capabilities

Every feature, at a glance

Evidence Collection

  • Photos, videos, audio, documents, archives
  • Real-time upload progress with drag-and-drop
  • Anonymous text-only tip submissions
  • Mobile-optimized responsive intake form
  • Browser geolocation capture
  • Incident-specific submission links with QR codes
  • Contact info collection (name, phone, email)

Incident Management

  • Create, edit, and archive incidents
  • RSA-2048 keypair per incident
  • Private key download (PEM and PDF)
  • Shareable public submission URLs
  • QR code generation for field distribution
  • Enable/disable submissions per incident
  • Incident-level submission counts and status

Review & Analysis

  • Visual gallery with lightbox preview
  • EXIF metadata extraction (camera, GPS, timestamps)
  • AI synthetic media detection with confidence scores
  • Interactive geolocation map with marker popups
  • Tagging system for batch operations
  • Malware scan status indicators
  • Submission filtering and search

Export & Reporting

  • ZIP export with HTML evidence report
  • Media files bundled with submitter details
  • Text tips exported as .txt files
  • Batch export of tagged submissions
  • Billing and storage reports
  • Audit log export
  • Per-organization storage analytics

Organization & Access

  • Multi-tenant organization support
  • Role-based access (Owner, Admin, Member)
  • Organization activity log with category filters
  • Custom public-facing URL slugs
  • User invitation and provisioning
  • Per-org storage tiers and limits
  • Cross-organization superadmin controls

Security & Compliance

  • AES-256-GCM file encryption at rest
  • RSA-2048 metadata encryption
  • Mandatory TOTP multi-factor authentication
  • ClamAV malware scanning
  • Justification-required decryption
  • Failed attempt lockout (5 attempts)
  • Complete immutable audit trail
  • Signed URL media access control
  • Multi-tier API rate limiting
  • Login event monitoring