Workflow
From request to seal.
A step-by-step walkthrough of the EasyWarrant workflow — every phase documented with its CJIS control reference.
Officer Initiates the Request
The officer logs into the EasyWarrant officer portal using MFA-enforced credentials (AAL2). They create a new warrant request, enter the required details, and upload the warrant document — which is encrypted immediately on upload using AES-256 with agency-controlled keys.
- Multi-factor authentication (AAL2) enforced at login
- Warrant document encrypted with AES-256 on upload
- Agency-controlled encryption keys via Azure Key Vault
- Warrant request queued in the judge portal automatically
- Full audit event logged: officer ID, timestamp, document hash
Secure Video Session Established
EasyWarrant establishes an end-to-end encrypted video session between the officer and judge. Both parties authenticate independently. The session uses DTLS-SRTP for media encryption — no plaintext Criminal Justice Information traverses any external network at any point.
- End-to-end encrypted via DTLS-SRTP (AES for media, DTLS for key exchange)
- Judge authenticates independently via AAL2 MFA
- Session keys generated fresh per session — never reused
- Man-in-the-Middle protection enforced (CJIS SC-23)
- Session timer visible to both parties — CJIS 1-hour inactivity rule enforced
Judge Reviews the Warrant
With the video session active, the judge reviews the warrant document within the judge portal. The officer presents sworn testimony over the live video connection. The judge may ask questions, request clarification, or request amendments — all within the encrypted session.
- Warrant document rendered in-browser — no download to judge device required
- Document served via encrypted session — never cached outside the session
- Judge may annotate or request amendments within the portal
- All session activity logged with precise timestamps
- Officer sworn testimony occurs live over the encrypted video channel
Judicial Approval and E-Signature
The judge approves the warrant and applies a PKI-based e-signature. The signature is issued under an agency-level Certificate Authority and timestamped by a trusted Timestamp Authority (TSA). DocuSign eNotary provides the legally defensible judicial signature workflow.
- PKI e-signature via DocuSign eNotary (CJIS compliance documentation available)
- Judicial signature issued under agency-level CA (CJIS SC-17)
- Trusted TSA timestamp applied at signing — tamper-evident
- Warrant status updated to Sealed in the audit log
- Signed document stored encrypted in Azure Blob Storage (Gov)
Sealed Warrant and Audit Trail
The sealed warrant is stored encrypted in US-jurisdiction Azure Government infrastructure. A tamper-evident audit trail covering the complete lifecycle is available for immediate export by the agency. The session terminates and all ephemeral session keys are destroyed.
- Sealed warrant stored in Azure Blob Storage (Gov) — AES-256, US jurisdiction only
- Complete audit trail: officer ID, judge ID, timestamps, document hash, session duration
- Audit log is agency property — exported on demand, not accessible by Brigade Management staff
- Session keys destroyed on session termination
- Retention policy configurable per agency per CJIS requirements
Reference
CJIS Control Mapping
| Control | Title | EasyWarrant Implementation |
|---|---|---|
| SC-8(1) | Cryptographic Protection | TLS 1.2+ for all CJI in transit; AES-128 minimum |
| SC-13 | Cryptographic Protection | FIPS 140-3 validated modules; FIPS 140-2 not used (sunsets Sep 2026) |
| SC-28 | Protection at Rest | AES-256, Azure Blob Storage Gov, US jurisdiction enforced |
| SC-10 | Network Disconnect | 1-hour inactivity session termination, enforced server-side |
| SC-12 | Key Establishment | Agency-controlled CMK via Azure Key Vault (HSM-backed) |
| SC-17 | PKI Certificates | Agency-level CA for e-signature; DocuSign eNotary |
| SC-23 | Session Authenticity | MitM protection; session hijacking prevention; DTLS-SRTP |
| IA-2(1) | MFA | AAL2 for all officers and judges via Auth0 Gov / Okta FedRAMP |
| AU controls | Audit & Accountability | Tamper-evident log; agency-owned; on-demand export |
Ready to see it in action?
Request a demo to walk through the full workflow with your agency.
Request a Demo