Law Enforcement Enterprise Portal (LEEP)

LEEP Graphic

The Law Enforcement Enterprise Portal, or LEEP, is an electronic gateway that provides law enforcement agencies, intelligence partners, and criminal justice entities with centralized access to many different resources and services via a single sign-on. These resources strengthen case development for investigators and enhance information sharing between agencies.

Services on LEEP

Here are a few examples of the services on the LEEP:

Virtual Command Center/Special Interest Group 

The Virtual Command Center/Special Interest Group (VCC/SIG) program is a secure, Internet-based information sharing system available to agencies around the world that are involved in law enforcement, first response, criminal justice, anti-terrorism, intelligence, and related matters. SIG and VCC members can access or share sensitive but unclassified information anytime and anywhere. Both services are available on the Law Enforcement Enterprise Portal to all LEEP users.

Below is a brief description of SIG and VCC services as well as other beneficial tools available within either service.

Special Interest Group: A controlled/structured-access area for departments such as task forces, cyber, drug enforcement, or other disciplines, to share and store information with law enforcement, intelligence and emergency management communities, as an endeavor to enhance collaboration with the law enforcement and intelligence communities to keep our nation safe. SIGs can be configured to provide users access to intelligence reports, specialized trainings, maps, photos, forums and databases. SIGs enable cross-border and multi-agency collaboration often allowing users to access information previously unavailable to them

Virtual Command Center:  A real-time, collaborative tool that facilitates shared situational awareness and event/incident management. VCCs foster single and or multi-agency collaboration and allow users to share and report incidents, necessary intelligence resources—like suspect profiles, maps, and floor plans—and event schedules. VCCs—invaluable tools that have been successfully used in about 5,500 cases over the past decade—are ideal for:

  • Active shooter incidents
  • Child abductions
  • Presidential inaugurations
  • Takedown operations
  • Natural disasters
  • Special events
  • Terrorist attacks and threats

VCC Trax:  An operational tool designed to display the information associated with multiple suspects, locations, or mass casualties. Users also have the ability to take and upload photographs into the Trax application—i.e., law enforcement personnel on surveillance might take a suspect photograph and then upload it directly into a Trax suspect box within seconds.

Active Shooter: An outgrowth of a White House initiative to assist law enforcement and first responders, the FBI Active Shooter Resources SIG contains valuable resources to aid in the management of the chaos often surrounding active shooter/multiple victim incidents.

Intelink 

Intelink is a secure portal for integrated intelligence dissemination and collaboration efforts.

Regional Information Sharing Systems Network (RISSNET) 

RISSNET is a secure sensitive but unclassified law enforcement information sharing system operated by a collaborative organization of state and local justice officials. It provides access to millions of pieces of data, offers bidirectional sharing of information, and connects disparate state, local, and federal systems.

Internet Crime Complaint Center (IC3) 

The mission of the Internet Crime Complaint Center is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated fraud schemes and to develop effective alliances with law enforcement and industry partners. Information is analyzed and disseminated for investigative and intelligence purposes to law enforcement and for public awareness.

Visit the Internet Crime Complaint Center's website for more information.

Malware Investigator 

Malware Investigator is a tool that provides users the ability to submit suspected malware files and, within as little as an hour, receive detailed technical information about what the malware does and what it may be targeting.

Repository for Individuals of Special Concern (RISC) 

The CJIS Repository for Individuals of Special Concern (RISC) allows officers on the street to use a mobile identification (ID) device to perform a rapid search of a limited repository of fingerprint records. What’s the primary benefit of RISC? To provide law enforcement with an enhanced capability to quickly identity persons who present special risks to the public or to law enforcement officers themselves.

Specifically, this capability enables officers and agents in the field to screen detainees and criminal suspects against a repository of Wanted Persons, Sex Offenders Registry Subjects, Known or Suspected Terrorists, and other persons of special interest for rapid identification. Currently, 23 states and three federal agencies are using this capability to search a limited national database to enhance safety, homeland, and hometown security. Latest performance metrics show a hit rate between three to six percent, proving this capability is a valuable first check, allowing officers to quickly assess the level of threat of any subject encountered during their normal law enforcement activities.

As an example, a Florida state trooper, while on patrol, made a routine traffic stop of a car he witnessed driving with its headlights off. As the trooper approached the car, he smelled marijuana. Following protocol, the trooper asked the driver for his license. As the driver gave him a South Carolina license, the alert trooper noticed the driver had a bank card with a different name.

Using a mobile hand-held device that allowed the trooper to instantly fingerprint the driver, the trooper submitted a Rapid ID transaction that searched the Florida state system and the FBI’s Repository for Individuals of Special Concern (RISC). The RISC system returned a “red” response within 46 seconds, notifying the trooper of an outstanding warrant for the subject within the National Crime Information Center (NCIC). The driver was wanted by the Gwinnett County Sheriff’s Office in Georgia in connection with a murder and aggravated assault. The warrant had been outstanding for 8 years.

The hand-held identification devices can be used nationwide and will decrease officer risk when dealing with subjects presenting false or no identification. The matching process is entirely automated, enabling an officer to receive a response within seconds. The on-scene rapid search by RISC is just one more tool the CJIS Division is using to provide vital criminal justice information in a timely way to the FBI’s partners in the law enforcement, national security, and intelligence communities.

For more information about the program, read the RISC brochure or contact the Global Initiatives Unit at RISC@ic.fbi.gov.

Joining LEEP  

LEEP accounts are available to personnel affiliated with the criminal justice system, intelligence community, and the armed forces. To apply for a LEEP account go to www.cjis.gov and complete the online application.

Contacting LEEP 

For more information on the LEEP or to find out how to become a Service Provider (an agency that provides a service/resource to the LEEP) or Identity Provider (an agency that partners with the LEEP, which give their users easier access to the LEEP resources), please contact the FBI Support Center, available 24/7 to answer any questions.

FBI Support Center contact information:

Toll-free domestic calls: (888) 334-4536
International calls: (225) 334-4536
Telecommunications Relay Service (TRS): 711
E-mail: helpdesk@leo.gov