Linkon Technology - Solution beyond the imagination
Contact   Sitemap

Homeland Security System

Introduction:

Crime is increasing everyday and today we do not make best use of the technology which could help in looking back and guide us in better decision making to counter the threat.

Homeland security efforts require considerable investments in security screening, data gathering, and integration (for the merging of data and systems) and analysis technologies. The objectives of these investments are to improve information access and identify potential threats. Key technologies include sensors and surveillance equipment, wireless and hand held mobile devices, biometrics, databases, network infrastructure, and new applications and Web services focused on integrating existing data sources and systems. Geographic information systems (GIS) that integrate multiple data sources and display the data as map overlays are a popular solution, particularly for justice and public safety organizations.
A brief summary:

India's system today is manual and currently all data available is in fragmented fashion. The data volume is tremendously high and is manual, and there is no way of data sharing between different law enforcement support agencies. These are few challenges for our government to act faster and in an organized fashion. What we need today is a centralized repository, encrypted and secured data with a cost effective real time system to work efficiently for homeland security. SHIELD would try to help reduce these challenges faced by the government today. The following would be a high level outline that will be targeted for the system (caution: – a detailed system study by the team can add/change more functionality to the system and the proposed plan) :

  1. Identity Management system ( Similar to SSN/ Unique Identification Number in other countries)

    The idea is simple—shift the burden of compliance to a secured centralized repository for publics SSNs and minimize the required changes to the existing legacy applications. The key enabling technology for this transition is Universal Identification Master, which includes rich capabilities for safeguarding and actively managing any Identifications. Universal Identification Master becomes the centralized hub for any ID management that generates a Universal Unique ID (UUID). This UUID becomes the enterprise identifier used in all interactions across all channels.

    Approx Cost Rs300 Cr to Rs500 Cr. Time 5 years to 7 Years.

  2. Complaint Management System

    Complaint management enables information to be easily shared within and between the agencies with the type of complaints and it's seriousness. The Complaint Management will have  the following goals:

    • Enable complaint management data to be shared within and across agencies.
    • Improve effectiveness and efficiency of law enforcement, investigation, civil and criminal litigation complaint management processes.
    • Identify common complaints management processes across components and agencies that will drive system and function consolidation.
    • Address immediate and long-term complaint management needs and opportunities within federal agencies.
    • Provide guidance for future complaint management across the government.
    • Deliver insights on complaint trends for better planning and resource utilization and build infrastructure.
    • Issue can be resolved at very early stage before it proceeds to a  criminal activities.
    • Common people can get  justice  and they can speak out their grievances.

  3. FIR Management/Case management

    FIR/Case Management provides powerful tools for law enforcement to manage incoming incidents, tips, leads, grievances, or crime complaints from the general public. FIR/Case Management collects, manages, dispositions and analyzes large volumes of reported information to more efficiently conduct and conclude large, complex, and/or politically sensitive investigations. These are the sub-systems that would be part of this-

    • FIR/Case Management System
    • Lead/Tips Management System
    • Incident  Tracking Management System
    • Offense/Offender Tracking Management System
    • Suspect and Victim Tracking System
    • Evidence Management System
    • Universal Case Inbox
    • Investigative Analytics Module

  4. Crime Investigation module

    Investigative and enforcement agencies typically consist of multi-disciplinary case resource personal, all needing to access and use of common source of candidates and case information. While Crime investigation such information will be available and will have sensitive data in a cryptic fashion just for investigation agencies and key personnel :-

    • A history of agency interactions with the candidate, including appointments, meetings, e-mails, faxes, phone calls etc.
    • Address history of real property deals
    • Information on asset and income information
    • Employment history if any.
    • Relationship mapping to other case players and link charting
    • Accumulated evidence in document and other file formats such as voice mails, faxes, photographs etc.
    • Other key reference information

View the complete PDF (311 KB)


This page includes links to documents in Portable Document File (PDF) format. To read PDF documents you may need to download the free Adobe Acrobat Reader. For PDF accessibility help, visit Access Adobe. These links will open in a new browser window.