Cybernetics Prodigy Protector

Objective:

The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way.

Existing System:

For a government it is hard task to transfer evidences in a secure way. While dealing with a particular case several departments can be involved in that to find out the solution. In existing system there is no secure mechanism to send and receive evidences from one department to another department. In existing system manual interaction is the process to share the information while making final reports about any particular case. At the same time citizens of state do not know complete information about success stories. No suggestions allowing from citizens in existing system.

Proposed System:

Our software which is calling as cybernetics prodigy Protector is an intelligent tool which allows secret agency, defense ministry and citizens at one place. The main advantage with our tool is keeping evidences securely and ensure sharing of evidences among departments with low expensive cost and time with high secure. Through this software secret agencies and its clients or agents can communicate to exchange of evidences in a secure way. This tool keeps the evidences for a long time which can be useful in future.

Functional Requirements:

Secret Agency’s Chief:

  1. Chief should be able to create/edit/view Agent’s profile
  2. Appointing of Agent to a particular case.
  3. Secure retrieval of evidences received from Agent.
  4. Access to Data Base logs.
  5. Should be able to trace Agent’s location (using IP addresses)
  6. Generate Reports
  7. Ability to store data with history (archive cases).
  8. Ability to create Digital Signature certificates.

Agent:

  1. Able to view case details.
  2. Should be able to encrypt & upload evidence or data to Data Base.
  3. Able to view resources from ministry or chief.
  4. Generate Report.
  5. Should be able to view the dynamic map of anywhere in the world.

Defense Ministry:

  1. Should be able to send resources to SecretAgency.
  2. Receive reports
  3. Ability to assign cases to the Agency.

Citizen:

  1. Ability to see Success Stories.
  2. Chat assistance from Intelligence Agency.
  3. Ability to apply for a job in Secret Intelligence Agency.
  4. Ability to give tips & suggestion.

Nonfunctional Requirements:

  1. Secure access of confidential data (user’s details). SSL can be used.
  2. 24 X 7 availability
  3. Better component design to get better performance at peak time

Users:

A. Citizen

B. Under Cover Agent

C. Secret Intelligence Agency‘s chief

D. Ministry of Defense

Modules:

  1. Authentication Module
  2. Agency Chief Activities Module
  3. Case Management Module
  4. Defense Activities module
  5. Citizen Module
  6. Report Module
  7. Admin Module

Reports:

A. Case Report

B. Success Report

C. Report regarding most wanted criminals and bounty information if available.

Technologies:

  • J2EE (Servlets, JSP, Hibernate, Struts 1.x),
  • XML,
  • e-Forms,
  • AJAX,
  • Web-services,
  • java swings,
  • SQL / PLSQL
  • Web Technologies (HTML, Java Script, CSS )

Tools:

  • Web Sphere
  • Eclipse/Lotus Forms Desighner / Portlet Factory
  • Oracle/ MySql
  • Linux will be the preferred OS.