c2family of software by Common Caches
c2share
c2share is a digital evidence management application configured to support file-sharing and tip line use cases.
Features
- Upload components: contact information, location, note, files.
- Upload any file type: video, audio, images, documents, applications, binaries.
- Unlimited upload portals: standing, per-event, private sites. Share QR code or URL.
- Anonymous uploads: Personal information not required to upload, sender’s IP address not stored.
- Customisable upload portals: Banner, logo, instructions, emergency message, on/off upload components, CSS style sheet.
- Embedded upload portals: Integrate into existing websites and apps.
- Flexible deployments: SaaS, SaaS with bring-your-own storage, customer-hosted. Set primary, backup, and DMZ storage locations.
- Multiple user types: Full administrative control to view-only.
- Non-disruptive: Stand-alone or integrate with existing ways of working.
- Activity log: Operational transparency, chain of custody, easy export, easy search, over 100 actions logged.
- Sharing: Export single items, whole uploads, share with system users, export to other users, no content silos.
- Triage: Identify most relevant items first, reduce time-to-evidence, reduce time-to-share.
- Encryption: In-transit (TLS 1.3) and at-rest (NIST 800-53, FIPS 140-2).
- Hashing: Multiple hashing of uploaded items (patent pending). Currently SHA3-256.
- Security/CJIS controls: Timeout after inactivity, lockout after unsuccessful logins, password length, mandatory password reset, least privileged access.
c2timeline
c2timeline is a timeline for organising and visualising evidence for clear storytelling.
Features
- Multi-Source: Data from any source, including body-worn cameras, fixed cameras, drones, reports, interviews, cell phone extracts, and non-digital information.
- 2D Spatial/Temporal Visualisation: Present events in time and location context so users can clearly see what happened, where, and when.
- Interactive Timeline: Navigate, filter, and explore events, making complex events easier to grasp.
- Customisable Views: Tailor presentations for different audiences, such as law enforcement briefings, legal proceedings, or public disclosures.
- Portable Case: Download and share a Zip (index.html, json, timeline media assets) with others.
- Presentation Modes: (1) Main screen and (2) external presenter page.
- Deployment Option: Windows/Apple desktop application. Download-to-own. Single seat license. No cloud. No SaaS. Pay once. No, we are not kidding.Future support for desktop application with cloud storage.
c2timeline-3D
c2timeline-3D is an AI-native 3D visualisation with advanced triage feature set.
Features
- Multi-Source: Data from any source, including body-worn cameras, fixed cameras, drones, reports, interviews, cell phone extracts, and non-digital information.
- 3D Spatial/Temporal Visualisation: Present events in time and location context so users can clearly see what happened, where, and when.
- Triage: Filter by int-type, int-source, and probability, including probability chain and 10th man.
- AI Drag-and-Drop: Drag in a folder of structure/unstructured items, tell the application what you want, go to lunch, come back and it’s ready.
- First-Person/Group/Stand-Off View: See events from different view points.
- Semantic Diffusion: Probability and forest/trees triage for high-volume events in a low spatial or temporal space (patent pending).
Use cases
The George Carlin Special
A place for all your siloed, off-line, on physical media, scattered-everywhere stuff.
Physical Media Replacement
Stop using USBs, hard drives, etc. to store or share digital evidence.
Presentation
Make digital evidence more accessible and understandable by a wide-range of stakeholders such as courts, media, and the public.
12 Angry Tablets
Per-juror case information. No more wondering if twelve people hitting play on a high-def video at the same time will actually work.
Tip Line
Crowdsource or selectively collect from the public or third-parties.
Ghost Network
Operate in a contested environment.
UI for Degraded Environments
Low throughput interfaces for difficult operating conditions.
Cost Mitigation
Employ a storage vendor strategy to optimize costs.