c2family of software by Common Caches

 

c2share

c2share is a digital evidence management application configured to support file-sharing and tip line use cases.

Features

  • Upload components: contact information, location, note, files.
  • Upload any file type: video, audio, images, documents, applications, binaries.
  • Unlimited upload portals: standing, per-event, private sites. Share QR code or URL.
  • Anonymous uploads: Personal information not required to upload, sender’s IP address not stored.
  • Customisable upload portals: Banner, logo, instructions, emergency message, on/off upload components, CSS style sheet.
  • Embedded upload portals: Integrate into existing websites and apps.
  • Flexible deployments: SaaS, SaaS with bring-your-own storage, customer-hosted. Set primary, backup, and DMZ storage locations.
  • Multiple user types: Full administrative control to view-only.
  • Non-disruptive: Stand-alone or integrate with existing ways of working.
  • Activity log: Operational transparency, chain of custody, easy export, easy search, over 100 actions logged.
  • Sharing: Export single items, whole uploads, share with system users, export to other users, no content silos.
  • Triage: Identify most relevant items first, reduce time-to-evidence, reduce time-to-share.
  • Encryption: In-transit (TLS 1.3) and at-rest (NIST 800-53, FIPS 140-2).
  • Hashing: Multiple hashing of uploaded items (patent pending). Currently SHA3-256.
  • Security/CJIS controls: Timeout after inactivity, lockout after unsuccessful logins, password length, mandatory password reset, least privileged access.

c2timeline

c2timeline is a timeline for organising and visualising evidence for clear storytelling.

Features

  • Multi-Source: Data from any source, including body-worn cameras, fixed cameras, drones, reports, interviews, cell phone extracts, and non-digital information.
  • 2D Spatial/Temporal Visualisation: Present events in time and location context so users can clearly see what happened, where, and when.
  • Interactive Timeline: Navigate, filter, and explore events, making complex events easier to grasp.
  • Customisable Views: Tailor presentations for different audiences, such as law enforcement briefings, legal proceedings, or public disclosures.
  • Portable Case: Download and share a Zip (index.html, json, timeline media assets) with others.
  • Presentation Modes: (1) Main screen and (2) external presenter page.
  • Deployment Option: Windows/Apple desktop application. Download-to-own. Single seat license. No cloud. No SaaS. Pay once. No, we are not kidding.Future support for desktop application with cloud storage.

c2timeline-3D

c2timeline-3D is an AI-native 3D visualisation with advanced triage feature set.

Features

  • Multi-Source: Data from any source, including body-worn cameras, fixed cameras, drones, reports, interviews, cell phone extracts, and non-digital information.
  • 3D Spatial/Temporal Visualisation: Present events in time and location context so users can clearly see what happened, where, and when.
  • Triage: Filter by int-type, int-source, and probability, including probability chain and 10th man.
  • AI Drag-and-Drop: Drag in a folder of structure/unstructured items, tell the application what you want, go to lunch, come back and it’s ready.
  • First-Person/Group/Stand-Off View: See events from different view points.
  • Semantic Diffusion: Probability and forest/trees triage for high-volume events in a low spatial or temporal space (patent pending).

Use cases

The George Carlin Special
A place for all your siloed, off-line, on physical media, scattered-everywhere stuff.

Physical Media Replacement
Stop using USBs, hard drives, etc. to store or share digital evidence.

Presentation
Make digital evidence more accessible and understandable by a wide-range of stakeholders such as courts, media, and the public.

12 Angry Tablets
Per-juror case information. No more wondering if twelve people hitting play on a high-def video at the same time will actually work.

Tip Line
Crowdsource or selectively collect from the public or third-parties.

Ghost Network
Operate in a contested environment.

UI for Degraded Environments
Low throughput interfaces for difficult operating conditions.

Cost Mitigation
Employ a storage vendor strategy to optimize costs.