Blockchain Evidence Locker
Optimized data growth solution for law enforcement and public safety
Optimized data growth storage challenges
Digital transformation is forcing law enforcement and public safety organizations to go through major changes. Many are asking
• How can we manage our growth in data production?
• How can we ensure our data is tamper-proof and assure the courts that we have a chain of evidence for the full life cycle of the data?
• How can we achieve compliance with all regulations?
• How can we keep our storage costs low?
• How can we store our data efficiently and securely?
Optimized data growth storage solution
Blockchain Evidence Locker (BEL): Hyper-secure, decentralized, blockchain hardened software-defined object storage solution
Quantities and types of data are growing drastically
The variety of data sources – car cams, body cams, CCTV, computers, all types of mobile devices that law enforcement and public safety organizations are utilizing are continually expanding. All of these sources generate an incredible amount of data, all of which needs to be stored, retained, and disclosed securely, and in accordance with individual state/provincial laws. For example, bodyworn cameras generate 150 MB of data a day per officer. Moreover, San Diego estimates their storage costs for 1,450 cameras amounts to US$3.5 million. Therefore, optimizing data storage will only continue to grow as a priority for law enforcement and public safety organizations.
Law enforcement needs to adhere to requirements and regulations
The compliance and regulatory environment for law enforcement and public safety organizations to store and manage data is becoming more complex, prescriptive, and broad-reaching. Moreover, the fines for not being in accordance with regulations can cost organizations tens of millions of dollars. Additionally, when law enforcement agencies are dealing with criminal justice information they are required to adhere to the Criminal justice information standards (CJIS).
Data needs to be secure, tamper-proof and auditable
The Blockchain Evidence Locker (BEL) ensures that digital assets remain true, tamperproof and with a verifiable chain of custody. It achieves this by equipping Leonovus software-defined storage with a permissioned blockchain that records all access to digital evidence in an immutable ledger. The Blockchain Evidence Locker allows authorized parties to access the evidence while auditors can view and verify all digital activity regarding evidentiary assets. During input, the BEL creates a cryptographic hash that is a unique fingerprint of each asset. If an asset (file) is altered in any way, the hash that is generated from the altered asset will no longer match that of the original. Moreover, an external auditor is able to access all actions to that data from input, access, deletion and deletion attempts by viewing the blockchain.
Blockchain Evidence Locker architecture diagram
Law enforcement and public safety data storage solution
• Ensuring cloud freedom by offering no Cloud Vendor Lock-In
• Reliability by establishing up to 99.9999% data durability
• Autonomous self-healing of files if a storage endpoint is no longer accessible
• Satisfying the CJIS Security Policy with a solution that is FIPS 140-2 compliant
• Easy integration with existing applications and devices so an authenticated user does not have to change how they access their content
• Secure, compliant use of idle storage assets across the organization
• Full lifecycle data protection
How Blockchain Evidence Locker works
The Blockchain Evidence Locker enables law enforcement and public safety organizations to address their storage requirements with confidence. It ensures that their digital evidence remains available, secure, compliant and cryptographically-verifiable while offering total awareness of access and tampering.
• Utilizes encrypt, shred and spread technology to store the evidentiary assets remain secure
•Allows for optimized data storage through on-premises, cloud, and multi-cloud storage endpoints.
• Utilizes cryptography and blockchain technology to ensure an auditable chain of custody
• Audit logs that are produced from evidentiary assets will record: submissions, access, submissions, and deletion events
• Write once read many (WORM) policies provides another tool to ensure that digital assets cannot be tampered with events