Long Arm® Platform with Secure Misattribution and Associated Services
Long Arm®, is a platform for secure online investigation, open source research, and evidential capture. Our fully audited platform empowers investigators to operate on the internet with a managed digital footprint, and to capture and produce content to an evidential standard. Our Collaboraite® capability enables data & AI exploitation.
Features
- Misattributable Internet Access
- Mobile Phone Emulation
- Dark Web
- i3 Toolkit
- Case Management and Evidential Capture
- Online Investigation and training
- Virtual Sims
- Audit & Reporting
- Collaboraite® AI and Machine Learning
- Managed attribution
Benefits
- Auditable
- Evidential
- User Friendly
- Continuous Development
- Law Enforcement / Government Agencies only
- PASF Approved Hosting
- Remote Working
- Secure
- Compliant
- Integrated Access
Pricing
£305 to £1,000 a person a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 3 1 3 2 1 0 3 0 5 3 5 5 3 7
Contact
Internet Investigation Solutions Ltd
Claire Pickup
Telephone: 0344 247 0115
Email: contracts@ii-solutions.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Collaboraite AI Engines,
Collaboraite DB,
Voixtel Cloud Telephony Services. - Cloud deployment model
- Private cloud
- Service constraints
- N/a
- System requirements
-
- Windows, MacOS, Android or IOS Operating System
- Internet Connection
- Anti-Virus
- Supported Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are determined by the severity of the incident and graded by the end user. See the service definition document for further information.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is fully inclusive within the contract.
Each customer is provided a dedicated technical account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Customer will work with our Technical Team and an Installation Guide will be produced. New User creation shall be via the Service Desk or Self Managed Admin Portal. Our community page provides users with guides and video examples of how to use the system. Formal training is available at an additional cost.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- User's are able to extract their data at any time through the system portal provided.
- End-of-contract process
-
The Exit Plan for the end of the Contract is:
(1) The access and use rights to the Long Arm® Solution granted to the Buyer shall cease;
(2) The Buyer shall immediately pay the Supplier any sums due ;
(3) The Supplier will remove the Buyer’s access and use rights from the Long Arm® Solution within 14 working days, this purges any saved data from the platform.
(4) Any evidence available on the Evidence Portal must be exported securely. The Buyer can initiate a download of their data via the Evidence Portal.
(5) Any Audit Logs for the Buyers userbase will be securely removed. The audit log retention is set to 30 days and the system automatically purges any audit logs from the platform.
(6) Secure deletion/destruction of user management credentials.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Screen size and font size
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- When a user logs into Long Arm® their session is load balanced against a pre-set criteria to ensure they have the necessary resources available for their session. The back end infrastructure scales up and down automatically depending on the demand. This ensures that there is sufficient capacity for when it is required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
User Activity;
Usage Activity; - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users extract data via the Long Arm® Evidence Web Portal.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Microsoft Excel Open XML Spreadsheet
- Microsoft Word
- Portable Document Format
- .JPEG, .PNG, .BMP
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Microsoft Excel Open XML Spreadsheet
- Microsoft Word
- Portable Document Format
- .JPEG, .PNG, .BMP
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The guaranteed level of availability is 99.5% this does not include planned maintenance windows which may be required from time to time. Customers are responsible (unless otherwise agreed) to ensure sufficient resilience and scale of any inter-connectivity between the customer and the IIS Cloud is available to achieve this target.
SLA's can be found in the service definition document attached - Approach to resilience
- The IIS Cloud is a highly resilient infrastructure, although not publicly available further information can be obtained directly by contacting info@ii-solutions.co.uk.
- Outage reporting
- Email alerts are generated to report any outages. On-going updates are provided throughout the outage as detailed in the service definition document.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are in a separate physical network, with access from a jump-down device, requiring 2FA. Each support personnel has their own unique login with the required roles assigned, and all access is logged.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 22/09/2022
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- All areas of our platform and management networks are covered
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cloud Security Alliance CCSK
- CESG CCP
- PASF
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
We maintain the following policies:
GDPR/Data Protection, Patching, Incident Management, Business Continuity, Information Security and AUP, Risk assessment and Change Management, Cloud Security Principles.
Each of our policies and procedures follow the criteria set out in CSA CCM or equivalent standards
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Changes are documented and risk assessed. Changes under a specific risk value are permitted and scheduled in, changes with higher elements of risk are reviewed by the Change Advisory Board and approved or sent away for further investigation.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
A strict patching policy of 24 hours for critical security updates and a maximum of 1 week for information and functional updates is adhered to.
Weekly change logs of the environment from internal and external systems are taken to spot any issues and changes.
Several feeds are used for update notification, including a nightly inventory of all software and firmware using a 3rd party tool which takes update feeds from the manufacturers, and security feeds from NCSC and the security/software providers are used. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
A reactive system of monitoring is used, including agents on each device capturing all relevant logs and feeding into a SIEM platform. The system creates tickets and assigns to support staff for actioning, and reactive measures modify security systems based on feeds from Threat Exchange systems in real time.
Host based intrusion detection is present, as well as file/registry changes, and anything deemed a risk or unexpected creates a job in real time for the SOC Team to action, resolve and close. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- All users can report incidents via phone/email or on the online community. A full incident response plan following the CISR guidance from Crest, and is available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are dedicated to combating climate change through various initiatives: Reducing Carbon Footprint: We prioritise energy efficiency by optimising data centres, adopting energy-efficient technologies, and implementing smart building management systems to minimise energy consumption. Waste Disposal and Reduction: We operate as a paperless office, segregate waste for proper disposal and recycling, and adhere to regulations for electrical waste disposal. Green IT Practices: Our technology development focuses on energy-efficient software, cloud-based services, and virtualisation to maximise resource utilisation. Reuse and Recycling: We responsibly dispose of IT equipment and office waste, often donating discarded furniture and equipment to local charities. Sustainable Procurement: We promote ethical procurement, purchase recycled products, and collaborate with suppliers who adhere to sustainable principles. Remote Working and Travel Reduction: Our Remote First Strategy minimises travel needs, enabling staff to work from home, utilising public transport, car sharing, and offering a Cycle to Work Scheme. Sustainable Training Solutions: We conduct virtual training sessions for courses where classroom-based activities are not essential to reduce the need for participants to travel and can offer training at a customer’s site to minimise travel and reduce carbon emissions.Covid-19 recovery
Our company is dedicated to aiding organisations in recovering from Covid-19 impacts through community empowerment, local procurement, supply chain collaboration, charitable partnerships, volunteering, and education and training support. We create employment, training, and educational opportunities for local residents, procure goods locally, collaborate with supply chain partners, support charitable partnerships, encourage volunteering, and offer education and training support.Tackling economic inequality
We are dedicated to addressing economic inequality, employs a multifaceted approach aligned with government priorities and our Social Value Policy, supported by our Sustainability Strategy. We target social exclusion by providing employment, education, and training opportunities for underrepresented groups, ensuring equal opportunities for all through our Equal Opportunities Policy and flexible working arrangements. Economic empowerment is achieved through local procurement, creating jobs in sectors like secure technology, and fostering partnerships with charities to benefit local communities. We promote environmental sustainability by reducing carbon emissions through remote work and public transport options. Efficient resource management and recycling practices contribute to sustainability, supported by our Sustainability Working Group. Aligned with government initiatives, our strategies focus on creating businesses, jobs, and skills while addressing climate change and promoting supplier diversity. The leadership of our Sustainability Working Group emphasises our commitment to socially responsible business practices, thereby contributing to the overarching objective of addressing economic inequality.Equal opportunity
We are deeply committed to advancing equality within our organisation and the broader community. Our Equal Opportunities Policy ensures fair treatment for all employees and potential recruits, regardless of various factors. We actively recruit and support disabled individuals, holding "Positive About Disabled People" employer status and being a member of "The Disability Confident Scheme". We cultivate a discrimination-free environment, empowering employees personally and professionally. We comply with UK legal requirements and social responsibility commitments by addressing social exclusion, developing local talent, providing ongoing training, offering flexible work arrangements, promoting employee well-being, and supporting veterans. Through these efforts, we not only fulfil legal obligations but also contribute to a fairer society and foster a workplace culture of inclusivity and diversity.Wellbeing
We prioritise employee wellbeing through proactive and inclusive measures, fostering a supportive environment. Initiatives include:
Employee Assistance Programme for confidential counselling; Mental Health Support with trained first aiders and additional resources; Promotion of Healthy Lifestyles such as the cycle to work scheme; Flexible Working Model supporting work-life balance; Investment in Training and Education for skill development; Workplace Ergonomics for comfort and safety; Health and Safety Initiatives ensuring a safe environment; Employee Recognition through a reward programme; Community Engagement and Volunteering Opportunities; Employee Social Events for relationship-building and relaxation.
Pricing
- Price
- £305 to £1,000 a person a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We offer a free of charge trial for 4 weeks, 5 Users. Terms and conditions apply.