FAQ

How long has the LEAP system been in place?

The LEAP system has been fully operational since 2007 and all infrastructure computers, software, security controls and communications allocations are in place and ready to accept data feeds from new customers.

What is the value of a centralized repository of criminal data?

A centralized data system architecture differs dramatically from county or regional data and analytical sharing architectures in that all data is sent to a central national warehouse, where it is normalized and then distributed to local subscribers. As an analogy, a central data facility works similar in fashion to how Federal Express sends all of its packages to Memphis TN for sorting before distributing packages back to local destinations.

The LEAP system is hosted in one centralized data facility where data from all agencies participating in LEAP is stored and can be shared and analyzed in the aggregate therefore transcending geopolitical boundaries that offenders ignore. As just one example, several hundred offenders who had been arrested or were being sought for arrest by law enforcement agencies in the state of Texas, reside in Oakland California, more than 1,800 miles away – further illustrating the mobility of the criminal element and the value of a truly national law enforcement data sharing system.

How does Forensic Logic ensure the security of its data?

We engaged the FBI to certify our system and underwent a nine month compliance audit resulting in our certification as being a CJIS facility.

In order to further provide comfort to our law enforcement customers, we hired a third party operational auditor – a former FBI Special Agent in Charge – to monitor our management as well as our users activity of our system for misuse.

To eliminate any concerns about sustainability of the data during either natural or manmade disasters, we engaged the largest data center operator in the United States to manage our data center operations. With more than 60 high-speed connected facilities throughout the United States and sufficient backup generation capabilities at each of the facilities, we are able to guarantee an uptime service level in almost any circumstance.

To further secure the data being transmitted to our data center operations from the local law enforcement facility and back to users from our data center facility, all transmissions are fully encrypted.

How does Forensic Logic extract its data from local agencies?

We normalize all incoming law enforcement data into an XML schema now adopted by both the US Department of Justice and the US Department of Homeland Security. The data schema is known as the National Information Exchange Model and is the successor to the Global Justice XML Data Model.

We built a standard Application Programming Interface or API to our system so that it would be easy for others to map their data structures into ours – consequently making the integration of external systems into ours more scalable.

And lastly, we created a partner program so that law enforcement records management vendors and other law enforcement information providers could create and maintain support for our API within their existing software releases as well as future software upgrade releases.

By taking the above actions, we have been able to develop software connectors that can be installed in the vast majority of law enforcement agencies in the United States. More importantly, through these efforts, we have build up the expertise so that we are now able to integrate the most difficult records management system data into our system in a matter of days.

What other technologies does Forensic Logic employ?

Forensic Logic’s products utilize a mixed technology environment that includes the following:

JAVA
Ruby on Rails
C#
R
PHP
Relational Databases
- Microsoft SQL Server
- MySQL
- Postgress
Non-relational database technologies
- Hadoop
- MongoDB
Apache Foundation Projects
- Lucene Java
- Solr
- HTTP Server
Jaspersoft
Pentaho
IBM
- Cognos
- SPSS