Government Software Built by Someone Who Actually Gets It

25 years as an IMPD detective. Two products. Both in production. Built for the field, not the boardroom.

25 Years IMPD
2 Products in Production
0 Consultants Involved

Built on NIST 800-63B  ·  MFA + Immutable Audit Logs  ·  42 CFR Part 2 Compliant

NIST 800-63B
TOTP Multi-Factor Auth
OWASP Top 10 Covered
Immutable Audit Logs
AES-256 Encryption
CJIS Out of Scope

Two Problems. Two Solutions. Both Built from the Inside.

Not built by consultants who guessed. Built by a detective who lived these problems for 25 years.

Homeless Outreach

OutreachLink

Indianapolis has 30+ homeless service organizations doing important work alongside law enforcement. When those efforts are coordinated, outcomes improve for everyone.

OutreachLink makes that collaboration possible — shared case visibility, automatic routing, and a compliance-ready audit trail.

Geographic auto-routing Case continuity tracking 42 CFR Part 2 data wall
Learn more about OutreachLink
Gear Tracking

UnitGear

You think you have 20 body armor vests. You actually have 14. Four are damaged, two are missing. And three of the ones being deployed are expired.

UnitGear tells you exactly what you own, who has it, and when it expires — before an investigator has to ask.

Scan-based checkout Expiration alerts 90/60/30 days Immutable audit trail
Learn more about UnitGear

Built by a Detective, Not a Consultant

"I spent 25 years watching departments use spreadsheets for problems that software could solve in minutes. The tools didn't exist, or they were built by people who'd never worn a badge. So I built them."
25 years IMPD Detective, 1999–2025
Digital Forensics Certified examiner, expert witness (state & federal courts)
Financial Crimes Detective, undercover narcotics, executive assistant
15+ years Building automation tools that save 300+ hours/year
About Matt →

Built for Government Procurement

Government IT departments have checklists. We have answers. View full details →

NIST 800-63B
Password length & storage standards
Multi-Factor Auth
TOTP (RFC 6238), custodian-enforced
OWASP Top 10
A01–A10 covered by design
Immutable Audit Logs
Every action: who, what, when, why
AES-256 Encryption
At rest & TLS in transit
CJIS Out of Scope
No CJI stored — by architectural design

Ready to See It in Action?

30 minutes. We'll walk through the real workflows, answer your questions, and show you how it fits your unit's needs. No sales pressure. No slide deck.