INTERPOL’S GLOBAL POLICE COMMUNICATIONS SYSTEM - I-24/7
In 2002 the I-24/7 web-based communication system was launched, improving NCBs’ access to Interpol’s multiple databases. I-24/7 is Interpol Global Communications System and an improved service and tool for international law enforcement. It delivers fast, reliable and secure information in a user-friendly manner, permitting immediate analysis and identification. Canada was the first of Interpol member countries to connect to the I-24/7 system on 23.01.2003. Georgia is connected to the system since 10.03.2004. By the end of July 2006 183 of Interpol member countries had been connected to the system, regional offices and other international organizations among them to which Interpol granted access. Interpol has come up with solutions to ensure all member countries can access the system regardless of financial or technical limitations. The system is especially created as the means of exchange of information for international co-operation in combating crime. Exchange of information between authorized agencies and General Secretariat is conducted through secure and encoded network.
POLICE CERVICES PROVIDED THROUGH I-24/7: |
|
- |
ASF Nominal database - This facility permits search on known international criminals, providing access to their criminal history, related notices, extradition arrangements, photographs, fingerprints, ect; |
- |
ASF Stolen Travel Documents’ database - Because stolen travel document are used essentially for illicit activities, they constitute a haven for organized groups particularly in the field of illegal immigration, drug trafficking, terrorism, economic crime and credit card fraud. Access to this kind of information is therefore particularly useful to international border control entities; |
- |
Stolen vehicles database - This database contains detailed information for vehicles reported as stolen around the world; |
- |
ASF Stolen Works of Art - Information related to artwork and cultural heritage stolen in all parts of the world is stored and updated based on the information provided by the Interpol membership; |
- |
ASF Electronic Notices - Interpol notices are used to secure the arrest of fugitives wanted for crime or to serve a sentence, request information relating to the identification, crimi8nal record or location of a person, share data about a person who may commit offences affecting several countries, or alert on another to a missing person or an unidentified body; |
- |
ASF Fingerprints - This database contains the fingerprints of internationally wanted persons; |
- |
ASF database for person suspected in terrorism; |
- |
ASF database on child sexual abuse; |
- |
ASF DNA database. |
In the last period Interpol of Georgia has obtained access on all the above mentioned databases. NCB Georgia systematically co-operates in a written form with the 183 member countries, furthermore, from May 2006 General Secretariat issued the new ASF 2 system database, permitting the simultaneous check of persons and documents as well as transportation facilities in the shortest period of time possible.
In June 2006 NCB Georgia obtained an “Easyform” software created by the General Secretariat which provides the possibility not only putting the information about vehicles and documents wanted in Georgia in the General Secretariat international database, but also adding and editing of it.
In consultation with member countries the General Secretariat’s Forensic and Technical Databases sub-directorate (Operational Support Directorate) is already developing police features which, while not yet operational through I-24/7, will include improved and updated version of DNA, fingerprints, counterfeited and fraudulent travel documents and disaster victim identification (DVI).
General Secretariat and NCBs use all technical means with the purpose of keeping the connection between each other as isolated as possible from the unauthorized third party.
Each NCB is connected to I-24/7 communication system by means of an infrastructure whose security elements are the VPN with authentication, encryption and firewalls.