stockNum Systems provides law enforcement agencies with unique technological solutions to their everyday problems at a price that is easily affordable. Investigators

Cyberbullying and specifically revenge porn are becoming an epidemic that is risking the safety of our children of all ages. You may be surprised to find out this issue spans multiple age groups and affects youth from pre-teen through teenage and into their college years. Today's youth are sharing intimate and personal photos of themselves with their peers via SMS and social media. These photos are stolen from hacked phones by cybercriminals, and in some cases purposefully shared by 'former friends' of the youth, in either case, these photos end up on the internet in less than flattering posts.

Special investigative accounts are available to verified law enforcement agencies.

Additional details on Investigative Accounts. allows patrol officers the ability to use their iPhone or Android handheld device to scan driver's license barcodes, VIN barcodes, and take photographs of subjects.

Each subject contact is immediately displayed on a dispatch console along with longitude and latitude GPS coordinates of the officer. Additionally, the photographs of the subjects are run through our facial recognition database to identify the subject in realtime to increase officer safety and decrease the time it takes to identify a subject.

We currently have over 50 million person faces in our database that are indexed to just under 5 million unique individuals. This data is increasing every day as we bring additional resources online. These persons include mugshots of arrested persons, public social media photographs, AMBER alerts, and other various online resources we have collected.

Additional details on mobile facial recognition services for law enforcement.

SecureTribe: Investigative Accounts

SecureTribe is a revolutionary photo sharing social media network for consumers concerned about their privacy. With recent hacks of Instagram and iCloud users are far more concerned about protecting their personal and private photos and communications from the prying eyes of hackers. Unfortunately, with all of these protections we provide law-abiding citizens, criminals will want to exploit this high level of security for their criminal means. For this reason, we designed law enforcement capabilities into SecureTribe, WITHOUT breaking encryption or providing any backdoors that can be exploited by hackers.

Special investigative accounts are available to verified law enforcement agencies.

Additional details on SecureTribe Law Enforcement Investigative Accounts or free personal use premium accounts for officers to use off-duty.

Security Built In The Core

SSL/TLS (https) Traffic Everywhere

Our entire network uses secure https traffic to encrypt and verify all traffic coming in and out of our network; internal servers also use HTTP Public Key Pinning (HPKP) to only trust certificates that are preauthorized, preventing man-in-the-middle attacks against our network.

PHP WAF Blocking

Many common hacking vectors for PHP based systems are well known on the internet and are utilized by script kiddies to probe a network for vulnerabilities. Because our system does not use PHP, we automatically block any IP address requesting PHP files. This serves to block whole ranges of IP addresses of known attackers before they even have the opportunity to probe our network.

Multi-layered DDoS Protection

Our first line of defense is Cloudflare, and we benefit from their network size and traffic variability for data analysis. By protecting over 6M customer websites, Cloudflare has insight into emerging, global threats. As a result, Cloudflare’s DDoS protections and Web Application Firewall proactively defend our network from attacks. Cloudflare’s scale from its 116+ data centers, combined with the Anycast network, enables Cloudflare to resist even the most massive distributed attacks.

Once traffic leaves Cloudflare’s network and is routed to our local data centers, we are further protected from DDoS by Rackspace DDoS mitigation services.

VPN Access to Protected Environments

Protected aspects of our network such as SSH, sFTP, and others are fully locked down to allow only VPN credentialed users to access these services. Additionally, with limited access control and variable security credentials, only authorized personnel for authorized purposes can access restricted data and environments. If credentials were ever compromised, they have highly restricted access, and any attempt to use them outside these restrictions trips our intrusion detection system (IDS).

Isolated Database Credentials

Similar to how we restrict which personnel can access protected environments within our network, we also restrict access to our databases only to our DMZ Private API Servers. Credentials used to access the databases that store secured personally identifiable information (facial recognition database, criminal history, etc.) are isolated in these servers that have no outside internet access and only respond to a highly restricted list of commands from specific public facing web-servers over a protected local NAT.

Encryption At Rest

Not only do we encrypt all traffic going in and out of our network; we also store all data in our databases and datastores fully encrypted while at rest.

No Public Access

None of our protected data is publically available on the internet. For example, all of our arrest photos, revenge photos, and cyberbullying photos are stored encrypted within our secure network. Whenever an authorized person needs access to a specific photograph, the picture is decrypted and returned to the password protected web environment in BASE64 MIME encoding without ever disclosing a URL path to said photograph making it impossible to "share a link" to a photo.