CODY Systems' C.O.B.R.A.(tm) System Allows Data Sharing

Sept. 12, 2007
Agencies with disparate systems and databases can share, access, and analyze data instantly from anywhere, using integrated,zero-deployment user interface

POTTSTOWN, PA -- CODY Systems, an industry leader in the collection, analysis, and sharing of critical data for public safety and homeland security agencies has developed a proven weapon in the fight against crime and terrorism -- a system that allows agencies to quickly and securely share and analyze data to enhance officer safety and investigative efficiency. The company's C.O.B.R.A.(tm) (center-point based regional access) solution allows public safety and homeland security officials alike to share and analyze data with each other in real time, regardless of the myriad systems or databases they each choose to use. In the past, the thousands of different vendors' systems, multiple database languages and operating system platforms made it difficult -- if not impossible -- to easily, quickly and securely share information, especially when it counted. But close to ten years ago, CODY created the solution to this problem that has been running smoothly for over 150 agencies across the United States... a solution that is now coming into the limelight due to increased nationwide awareness of the need to provide field officers and investigative agents with a collaborative tactical "weapon" in the fight against rising cross-jurisdictional crime and the ever-present specter of global terrorism.

Overcoming obstacles

Ten years ago, before the term 'regional data-sharing' even existed, CODY Systems saw the need for a secure solution that would overcome the obstacles presented by variables such as operating systems, databases, and languages, and allow agencies to share data, and analyze the shared data, regardless of what systems and/or databases they chose to use. Their C.O.B.R.A.(tm) system is based on data encryption and interoperable, real-time communication over myriad connection options (wired LAN, Wi-Fi, personal area networks (PAN), Wide area networks (WAN), 3G mobile broadband, cellular modem, or the internet), between a center point server and the different systems/databases at each local participating agency. In addition, C.O.B.R.A.(tm) is respectful of each agency's own rules as to what it will or will not share, as well as the diverse legal restrictions placed on data sharing in different jurisdictions across the United States.

A key Center-point

In a C.O.B.R.A.(tm) network, tactical/mobile queries are made directly from a mobile unit using C.tac(tm) client software through a wireless connection to the center-point (by way of a laptop computer, MDT, or PDA). Strategic/investigative queries are made from an investigative workstation running C.sam(tm) client software.

The C.O.B.R.A(tm) Center-Point Server -- the heart and brains of the system -- is where the heavy-lifting occurs that enables all the disparate systems and databases to communicate with each other. All the network and agency-specific security/sharing rules are stored here, as are all the data sync and storage algorithms that give the system its speed and power. The Center-point is standards-compliant, providing support for the latest in information sharing standards, including the Global Justice XML Data Model (GJXDM), SOAP, CAP, etc.

The Center-point interfaces in real-time with each participating agency's local database and collects and translates shared data into a common database format. Unlike data warehouse style data-sharing systems, the Center-point keeps each agency's data separated from all other agencies, by storing each agency's data in its own insulated data silo. The transactional architecture of the Center-point makes shared data accessible to all clients within seconds of entry into the local agency's database.

Toolkit determines user rules

The C.O.B.R.A.(tm) System Admin Toolkit ("C.sat(tm)") is a utility application that allows system administrators to set up agency-specific sharing rules, record locks, users and Security Permission Groups. Using C.sat(tm), a network administrator can give limited access to community groups, fire and EMS agencies, even press agencies if they desire. The system will adjust the client application screen to match the permission level of a given group, based upon user login. Administrators can also track all user access and activity throughout the network -- what each user accessed, when, and other data.

Tactical Situations demand the right information -- right now

The C.O.B.R.A.(tm) Tactical Access Center (C.tac(tm)), is the tactical client of the C.O.B.R.A.(tm) system, that is accessible on wirelessly connected laptops, MDTs, or PDAs via either a web-service client or a current generation Internet browser (Internet Explorer, Firefox, etc.). C.tac(tm) is what officers on the street use to run detailed network-wide queries on names, vehicles, businesses, property, incidents, etc. The software allows officers on the street to query the Center-point for integrated results across all insulated data silos, while providing multiple ways to search, all with an eye toward increasing speed of searching for officer safety.

Officers can directly query any field(s) on the screen, or a combination thereof, or can use a separate query screen to build more complex queries on the fly. Search methods also include wildcard and partial plate searches: if the officer only knows that the vehicle plate had a "1" and a "K" in it, but doesn't know where either of these characters appear in the plate, he can perform a search with only this information. Or, if he knows where the characters are in the overall plate number, he can limit his search with this info.

Results are organized by agency, and a search can be limited to only certain agencies or groups. Users can select (or deselect) certain agencies, or groups of agencies to customize the scale of any query.

Where allowed in a given jurisdiction, C.tac(tm) also allows an officer to 'drill-down' on a given record, to get more information instantly on the entity in question (such as images, floorplans, etc.), as well as any entities that are directly connected to the entity in question (ex -- linked vehicles, other persons, businesses, etc.).

Users of C.tac(tm) can not only access shared data, but can interact with each other in real-time as well, using C.tac's built-in secure, audited instant messenger. This is invaluable for tactical situations which demand discretion.

Deep-diving into Strategic Data Analysis

The C.O.B.R.A.(tm) Strategic Analysis Manager (C.sam(tm)) is the strategic analysis client application of the system. C.sam(tm) is a robust, multi-tiered query, analysis, visualization, and reporting application that provides a comprehensive analysis toolkit for detectives, investigators, and analysts. The application allows investigators to query across all insulated agency data silos, using advanced fielded and statement search engines. Every field, or any combination of fields, in the C.O.B.R.A(tm) Center-Point Server can be searched. Results can be organized on customizable charts, plotted on GIS maps, viewed on adaptive graphic visualizations, and even exported to agency-defined reports with the built-in report writer.

C.sam(tm) takes the drill-down capabilities of C.tac(tm) and expands them greatly to enhance investigative speed and efficiency. Again, where allowed in a given jurisdiction, C.sam(tm) allows an investigator to drill-down past the direct, first level associations of a given entity to expand the web of associations. For example...

In C.tac(tm), a user can search for John Smith, and see all associated entities that John is directly associated with, at 1 degree of separation (e.g. -- an incident he was involved with, or a vehicle he owns). In C.sam(tm), if a user searches for John Smith, not only does she get back all 1st level associations, but all associations that John Smith has, with any entity (person, business, vehicle, incident, property, etc.) at any degree of association. Results can be limited to however many degrees are relevant, and can be limited to associations through whatever type(s) of entities are desired. This has obvious advantages in an investigative situation, as this potentially infinite web of associations can shed light on associations between entities that would not otherwise have been immediately recognized. Investigators can send search results to the CODY Multi-tiered Link Visualizer(tm) to see an adaptive, graphical rendering of the association-web, with thumbnail record info/photos and full drill-down capabilities.

A Single, Integrated System

The four applications of C.O.B.R.A.(tm) are designed using the same, familiar user interface, and all seamlessly function together to produce a unified, integrated solution for cross-jurisdictional data sharing and analysis. The system is fully interoperable, capable of reaching beyond its own borders to interface with other databases (NCIC, SCIC, etc.) and/or data-sharing systems. C.O.B.R.A.(tm) is a field-proven solution, tempered by close to 10 years of continued use at over 150 agencies nation-wide, and backed by the ~30 year history of CODY Systems, a trusted industry veteran that exclusively provides software solutions to public safety and homeland security agencies.

About CODY Systems:

For close to 30 years, CODY has been an industry leader in the collection, analysis and secure sharing of sensitive mission-critical information for law enforcement, public safety, and homeland security agencies. CODY's proprietary technologies power an integrated product suite that continues to revolutionize the integrated solutions market. Products include: CODY Records(tm), CODY Dispatch(tm), CODY Mobile(tm), CODY Investigations(tm), CODY Corrections(tm), C.O.B.R.A.(tm) data-sharing, and more.

Sponsored Recommendations

Voice your opinion!

To join the conversation, and become an exclusive member of Officer, create an account today!