throbber
US007805457B1
`
`(12) Ulllted States Patent
`Viola et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,805,457 B1
`Sep. 28, 2010
`
`(54) SYSTEM AND METHOD FOR IDENTIFYING
`MEMBERS OF A GANG OR SECURITY
`THREAT GROUP
`
`(75) Inventors: John J. Viola, Frisco, TX (US); James
`s sidler Lubbock TX
`Luke
`'
`_
`’
`,
`’
`Kelser, F9300’ TX (Us)
`_
`_
`(73) Ass1gnee: (5568311118 Technologies, Inc., Dallas, TX
`
`’
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 402 days.
`
`Feb‘ 14’ 2008
`
`(21) Appl.No.: 12/031,460
`'
`(22) Flled'
`(51) Int CL
`(200601)
`G06F 17/30
`(52) us. Cl. ............................. .. 707/769; 707/E17.135
`.
`,
`,
`(58) Field of Classi?cation Search ............... .. 707/802,
`
`707/829, 769, 999.005, 999.1
`1 t
`?l f
`t.
`1.
`S
`h h. t
`ee app 10a Ion e or Comp 6 e Seam 15 Dry‘
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`5,781,704 A *
`6,072,860 A *
`6,173,284 B1 *
`
`7/l998 Rossno
`6/2000 Kek et a1. .............. .. 379/8825
`1/2001 Brown
`
`8/2002 Lemelson et al.
`6,437,696 B1 *
`6,665,380 B1 * 12/2003 Cree et al. ............. .. 379/8825
`7,039,171 B2* 5/2006 Gickler
`7,085,359 B2 *
`8/2006 Crites et al.
`7’l06’843 B1 :
`9/2006 Galnsboro et 31'
`7,529,357 B1
`5/2009 Rae et al.
`7,584,480 B1 *
`9/2009 Schwalenberg
`2002/0107871 A1* 8/2002 WyZga et al.
`2003/0070076 A1 *
`4/2003 Michael
`2005/0068169 A1* 3/2005 Copley et a1‘
`2005/0273453 A1 * 12/2005 Holloran
`2009/0150442 A1 *
`6/2009 Barnard et a1.
`* -t d b
`-
`C1 e y exammer
`Primary ExamineriCheryl LeWis
`74 A
`)1 Ag
`F '
`F garty L L C
`Horne ,
`@112, 0r lrmi o
`,
`.
`.
`.
`
`ABSTRACT
`(57)
`System and method for monitoring activity of detainees com
`prising identifying a detainee Who is'af?liated With a gang,
`seaflclillng1 one or mo(r1e databases flcir l'nitiormatron assoiclatetid
`.W“. F e e‘amee’ an Cone aimgt 6?“ Ormanontol en“ y
`1nd1v1duals Who may be af?llated W1th the gang. The data
`b
`-
`.
`.
`ases may 1nclude call record databases, and the 1nforrnat1on
`.
`.
`.
`.
`.
`.
`.
`assoc1ated W1th the deta1nee may 1nclude 1nd1v1duals called
`by the detainee, individuals Who visit the detainee, telephone
`numbers called by the detainee, and sources of funding for the
`detainee’s calls voice and/or facial biometric identi?ers. An
`alert may be triggered When the detainee calls a speci?ed
`individual or telephone number.
`
`17 Claims, 8 Drawing Sheets
`
`1 02 —\
`
`‘
`
`1 01
`
`104
`
`125\
`
`126
`
`109
`
`105
`
`107
`
`INVESTIGATION
`APPLICATION
`
`1 10
`
`1 1 2
`
`JMS
`
`1 14
`
`1 14
`
`121 /@ 11
`
`|—CMS—I
`
`a
`a 1 13
`
`1 18
`
`119
`
`120
`
`M SYSTEM
`
`1 O8
`/
`COURTHOUSE
`
`1 22
`/
`PROBATION
`SYSTEM
`
`GTL 1004
`PGR of U.S. Patent No. 8,855,280
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 1 of8
`
`US 7,805,457 B1
`
`1O / COURTHOUSE
`
`SYSTEM
`
`> V
`
`FIG. 1
`
`12 / PROBATION
`
`SYSTEM
`
`V
`
`/124
`
`I INVESTIGATION
`
`APPLICATION
`
`‘I’
`o
`F
`
`N
`o
`F
`
`A
`I
`
`II
`r
`
`LO
`
`c!)
`0/ g,
`
`‘
`
`\-
`
`w
`of E
`
`‘-
`
`102
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 2 0f 8
`
`US 7,805,457 B1
`
`203 \
`
`205 /
`
`201 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH THE GANG MEMBER'S
`202 \
`CALL RECORDS AND IDENTIFY
`INDIVIDUALS WHO COMMUNICATED
`WITH THE GANG MEMBER
`(I.E. GANG MEMBER'S CONTACTS)
`I
`IDENTIFY THE GANG
`MEMBER'S CONTACTS
`I
`SEARCH DATABASES FOR
`204 \
`RECORDS INVOLVING THIRD
`PARTIES‘ COMMUNICATIONS WITH
`ONE OR MORE OF THE GANG
`MEMBER'S CONTACTS
`I
`IDENTIFY THE THIRD PARTIES
`WHO HAVE COMMUNICATED
`WITH ONE OR MORE OF THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY SPECIFIC CALLS AND
`OTHER COMMUNICATIONS
`INVOLVING THIRD PARTIES
`COMMUNICATING WITH THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY GANG AFFILIATIONS
`FOR THE THIRD PARTIES
`
`206 /
`
`207 /
`
`FIG. 2A
`
`II
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`LINKS TO ONE OR MORE OF THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY OTHER RECORDS OR
`ACTIVITIES INVOLVING THE
`GANG MEMBER'S CONTACTS
`
`/‘ 208
`
`\ 209
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 3 0f 8
`
`US 7,805,457 B1
`
`FROM FIG. 2A
`
`R
`
`SEARCH GANG MEMBER'S CALL
`RECORDs AND IDENTIFY SOURCE
`AND DESTINATION ADDRESSES
`FOR DEVICES INVOLVED IN GANG
`MEMBER COMMUNICATIONS (l.E.
`GANG MEMBER COMMUNICATION
`ADDRESSES)
`I
`IDENTIFY THE GANG MEMBER
`COMMUNICATION ADDRESSES
`AND, IF KNOWN, THE IDENTITIES
`OF INDIVIDUALS ASSOCIATED
`WITH THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`SEARCH DATABASES FOR
`OTHER RECORDS INVOLVING
`COMMUNICATION WITH ONE OR
`MORE OF THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`LINKS TO ONE OR MORE OF
`THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`IDENTIFY OTHER RECORDS
`AND ACTIVITIES INVOLVING
`THE GANG MEMBER
`COMMUNICATION ADDRESSES
`
`FIG. 2B
`
`210\
`
`211\
`
`212/
`
`214/
`
`215/
`
`II
`ALLOW USER TO REQUEST
`ADDITIONAL INFORMATION
`RELATED TO SELECTED CALL
`RECORDS, GANG MEMBERS, GANG
`MEMBER CONTACTS, OTHER
`PARTIES, COMMUNICATION
`ADDRESSES, OR OTHER
`RECORDS OR ACTIVITIES
`
`/216
`
`II
`IDENTIFY OTHER PARTIES
`COMMUNICATING WITH ONE OR
`MORE OF THE GANG MEMBER
`COMMUNICATION ADDRESSES
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 4 of8
`
`US 7,805,457 B1
`
`301 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH GANG MEMBER'S
`COMMISSARY RECORDS AND
`IDENTIFY INDIVIDUALS WHO
`302 \ FUNDED THE GANG MEMBER'S
`COMMISSARY ACCOUNT (|.E.
`GANG MEMBER FUNDING
`SOURCES)
`I
`SEARCH GANG MEMBER'S
`303 \ CALL RECORDS AND IDENTIFY
`ADDITIONAL GANG MEMBER
`FUNDING SOURCES
`I
`IDENTIFY GANG MEMBER
`FUNDING SOURCES
`I
`SEARCH DATABASES FOR OTHER
`RECORDS INVOLVING FUNDING
`305 / BY ONE OR MORE OF THE GANG
`MEMBER FUNDING SOURCES
`I
`IDENTIFY OTHER ACCOUNTS
`FUNDED BY THE GANG
`MEMBER FUNDING SOURCES
`
`304 /
`
`306 _/
`
`FIG. 3
`
`I
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`NON-FUNDING LINKS TO ONE \ 307
`OR MORE OF THE GANG
`MEMBER FUNDING SOURCES
`I
`IDENTIFY THE OTHER ACTIVITIES
`ASSOCIATED WITH THE GANG \ 308
`MEMBER FUNDING SOURCES
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 5 of8
`
`US 7,805,457 B1
`
`401 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH GANG MEMBER'S
`VISITOR RECORDS AND
`402 \ IDENTIFY INDIVIDUALS WHO
`VISITED THE GANG MEMBER
`(|.E. GANG MEMBER VISITORS)
`
`Y
`403 \ DISPLAY THE GANG
`MEMBER VISITORS
`A
`SEARCH DATABASES FOR
`404 \ RECORDS INvoI_vING vIsITs
`BY oNE OR MORE OF THE
`GANG MEMBER VISITORS
`
`Y
`DISPLAY OTHER VISITS BY
`405 / THE GANG MEMBER VISITORS
`
`+
`SEARCH DATABASES FOR
`RECORDS INDICATING
`406 / OTHER CONNECTIONS TO
`ONE OR MORE OF THE
`GANG MEMBER VISITORS
`I
`
`DISPLAY oTHER ACTIVITIES
`407 / INVOLVING THE GANG
`MEMBER VISITOR
`
`FIG. 4
`
`SPECIFY SECURITY THREAT / 501
`GROUP FoR MoNITORING
`I
`SEARCH DATABASES FOR
`RECORDS ASSOCIATED / 502
`WITH MEMBERS OF THE
`SECURITY THREAT GROUP
`I
`
`503
`ANALYZE MEMBERS‘ RECORDS
`FOR FREQUENTLY USED /
`TELEPHONE NUMBERS
`I
`
`ANALYZE MEMBERS‘
`RECORDS FoR wIDEI_Y USED / 504
`TELEPHONE NUMBERS
`+
`
`ANALYZE MEMBERS‘
`RECORDS FOR COMMON \ 505
`FUNDING SOURCES
`
`Y
`ANAI_YzE MEMBERS‘ RECORDS
`FOR COMMON VISITORS \ 506
`Y
`DISPLAY FREQUENTLY AND
`WIDELY USED TELEPHONE
`NUMBERS, COMMON
`FUNDING SOURCES AND
`COMMON VISITORS
`I
`CONFIGURE ALERTS FoR
`SELECTED TELEPHONE
`NUMBERs, FUNDING
`SOURCES, AND/OR vIsIToRs
`
`\ 507
`
`\ 508
`
`FIG. 5
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 6 of8
`
`US 7,805,457 B1
`
`60\1‘
`
`60g
`
`60g
`
`GA~<>NEGL§ACE§BDER
`
`VISITSTIS
`
`IIIITT ST VISIT
`
`$04
`
`'6/05
`
`VII’ILSTIT"
`DETAINEES
`
`D‘IISEIS’TFSVT'I?”
`DETAINEE
`
`PRISONER #1
`
`VISITOR #1
`
`2/01/07
`
`PRISONER #2
`
`PRISONER #3
`
`INMATE #11
`
`VISITOR #2
`
`3/02/07
`
`PRISONER #3
`
`PRISONER #4
`
`INMATE #12
`
`INMATE #13
`
`INMATE #14
`
`VISITOR #3
`
`3/15/07
`
`PRISONER #3
`
`PRISONER #5
`
`FIG. 6
`
`2/01/07
`
`2/15/07
`
`3/02/07
`
`2/01/07
`
`2/15/07
`
`2/20/07
`
`2/20/07
`
`3/10/07
`
`3/01/07
`
`3/15/07
`
`701
`
`702
`
`703
`
`704
`
`705
`
`GASNEéEACETJgER
`
`CALLED PARTY DATE OF CALL
`
`CALLS FROM DATE OF CALL
`OTHER
`FROM OTHER
`DETAINEES
`DETAINEE
`
`PRISONER #1
`
`VISITOR #1
`
`2/01/07
`
`PRISONER #3
`
`PRISONER #3
`
`2/01/07
`
`2/01/07
`
`CALLED PARTY #1
`
`CALLED PARTY #2
`
`CALLED PARTY #3
`
`2/02/07
`
`3/01/07
`
`3/20/07
`
`2/15/07
`
`3/04/07
`
`FIG. 7
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 7 of8
`
`US 7,805,457 B1
`
`cow
`
`vmow
`
`

`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 8 of8
`
`US 7,805,457 B1
`
`#5
`
`

`
`US 7,805,457 B1
`
`1
`SYSTEM AND METHOD FOR IDENTIFYING
`MEMBERS OF A GANG OR SECURITY
`THREAT GROUP
`
`TECHNICAL FIELD
`
`The present invention relates generally to a system and
`method for monitoring, correlating and analyzing detainee
`records and, more particularly, to a system and method for
`identifying relationships to knoWn gang members.
`
`BACKGROUND
`
`Many prisoners, inmates or other detainees are a?iliated
`With a gang or security threat group. It is important to prison
`and jail management, Wardens, and guards to knoW the gang
`af?liation of detainees to manage housing issues and to
`reduce con?ict in the facility. Additionally, it Would be help
`ful to investigators to identify other gang members to assist in
`crime investigations for inside and outside the facility Walls.
`Currently, there is no system available to link data associated
`With knoWn gang members to other individuals Who may be
`a?iliated With the gang.
`
`SUMMARY OF THE INVENTION
`
`These and other problems are generally solved or circum
`vented, and technical advantages are generally achieved, by
`embodiments of the present invention in Which an investiga
`tor may identify knoWn or suspected gang members and then
`link those gang members to their visitors, to individuals Who
`provide funds to the gang members, to individuals Who com
`municate With the gang members and to gang members Who
`communicate With certain individuals. As used herein, the
`terms gang and security threat group are used broadly and are
`intended to include any knoWn or suspected criminal, politi
`cal, anti-social, anti-govemment, or terrorist organizations or
`groups of any size, including groups having local, national
`and/ or international members and/or having centralized,
`decentralized, formal or informal management and control.
`The present invention provides users With the capability to
`track, correlate and report on communication, visitation and
`funding activity of prisoners, inmates, and other detainees.
`Embodiments of the present invention provide for the inte
`gration of a plurality of databases and records stored on
`independent jail management, records management, call
`management, commissary services, and other systems. By
`searching across numerous independent databases and inte
`grating the resulting data, the present invention alloWs users
`to map an individual’s activity and to sort activity and rela
`tionships by gang af?liation, called party, visitors, funding
`party or other parameters. Embodiments of the present inven
`tion provide a system and method for sorting data to identify
`af?liations betWeen an incarcerated persons and other knoWn
`or potential gang members.
`The present invention may be used to search across many
`independent and separate facilities and databases to detect
`patterns and commonality in relationships betWeen gang
`members, detainees or other individuals. Additionally, con
`versations involving detainees’ phone calls, messages, visi
`tations orbiometric data may be recorded andused as a source
`of information. One objection of the invention is to provide a
`system and method for effectively “connecting the dots”
`betWeen people, activities, communications, and patterns.
`Data that is tagged With a gang af?liation notation may be
`linked to other directly or indirectly related data to identify
`other potential gang members. The data may be linked among
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`individuals and records both Within a facility and external to
`the facility as Well as across multiple facilities.
`Data in jail management softWare and applications may be
`used in embodiments to link knoWn gang members to called
`numbers and called parties. Record associated With detainees
`having a knoWn gang af?liation may be cross-referenced to
`other individuals using, for example, called numbers or call
`billing records. Additionally, visitation records may be used
`to link visitors to detainees With knoWn gang af?liations, or to
`link detainees to visitors With knoWn gang a?iliations. In
`other embodiments, funding for detainee accounts, such as
`commissary accounts and calling card accounts and commu
`nication funding accounts, may be linked to detainees or
`funding sources having a knoWn gang af?liation. If an inmate
`With a knoWn gang a?iliation receives funds from another
`individual (i.e. a funding event), the funding individual may
`be identi?ed as having a potential gang a?iliation. Embodi
`ments of the present invention may also track the amount of
`funds involved in funding events, and/or the frequency of
`funding events.
`Embodiments of the present invention provide integrated
`search capabilities that alloW a user to cross reference inmate,
`call, visitor and transaction records against knoWn gang
`members to identify other detainees, called parties, visitors
`and funding sources Who may be gang members or support
`ers.
`Additional databases that are not associated With a prison,
`jail or detention facility may also be searched, monitored or
`used in connection With the present invention. For example,
`records store in a court system, such as trial records, victim
`databases, Witness lists, dockets, and other case information
`may be analyzed and correlated using the present invention.
`After an prisoner or detainee is released, additional data asso
`ciated With the detainee may be collected, such as in a pro
`bation database. Embodiments of the invention include the
`capability to monitor and search information stored in such
`probation or post-incarceration databases.
`In addition to identifying additional gang members, the
`present invention may be used to identify hierarchies Within
`gangs and/ or the organization of the gangs. Patterns detected
`using the present invention may be used to identify a detain
`ee’s rank Within a gang.
`Users also have the capability to revieW information cor
`related to a particular detainee, called number, billed number
`or other parameter. For example, a user may enter a billed
`telephone number and an investigation application Would
`correlate and display all related information, such as the
`number times the telephone number Was called, Who called
`the number, When the number Was called, Where calls to the
`telephone number originated from, and Who Was called from
`the telephone number.
`A user may use a rules-based engine to con?gure alert
`noti?cations. The user may select parameters to be monitored
`and, upon occurrence of the parameters, the rules-based
`engine may send an alert noti?cations to speci?ed individuals
`or agencies. For example, a user may con?gure an alert to be
`noti?ed When particular gang members contact each other,
`When particular accounts are used or replenished, or When
`particular telephone numbers are called. In one embodiment,
`the user may receive the alert noti?cation in real-time, such as
`When a call is set-up betWeen tWo knoWn gang members or
`When a key Word is spoken that Would activate the noti?ca
`tion. For example, if a detainee With a knoWn gang af?liation
`calls another knoWn gang member, an alert may be sent to an
`investigator. Upon receiving the alert, the user may listen-in,
`break-in, terminate or record the call or communication
`betWeen the gang members.
`
`

`
`US 7,805,457 B1
`
`3
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of the present inven
`tion, and the advantages thereof, reference is now made to the
`following descriptions taken in conjunction with the accom
`panying drawings, in which:
`FIG. 1 illustrates systems used to identify gang or security
`threat group a?iliation according to one embodiment of the
`invention;
`FIGS. 2A and 2B illustrate a ?owchart for an exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals;
`FIG. 3 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals, such as common funding sources;
`FIG. 4 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals, such as common visitors;
`FIG. 5 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communications and links between gang members and
`other individuals;
`FIG. 6 illustrates a simpli?ed version of a user interface for
`use with embodiments of the present invention;
`FIG. 7 illustrates another simpli?ed version of a user inter
`face for use with embodiments of the present invention; and
`FIGS. 8A and 8B illustrate a user interface according to
`another embodiment of the invention.
`
`20
`
`25
`
`30
`
`DETAILED DESCRIPTION OF ILLUSTRATIVE
`EMBODIMENTS
`
`4
`tant (PDA), biometric scanner, handheld device, mobile
`phone, camera, or other such device. Device 103 may be a
`?eld identi?cation device that can be used to record an indi
`vidual’ s identi?cation, point of entry, arrest or detention loca
`tion, gang af?liation, and biometric data.
`
`TABLE 1
`
`Arrest/Incident Report
`
`Arrestee’s Name
`Place/Date of Arrest/Incident
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Gang/ Security Threat Group Af?liation
`Description of Clothing
`Description of Incident
`Charges
`Description of Evidence
`Description/Identi?cation of Other Arrestees
`
`It will be understood that the arrested or detained indi
`vidual may be held under the control of any federal, state or
`local o?icial working with any agency, such as, a sheriff‘s
`o?ice, police department, Federal Bureau of Investigation
`(FBI), Department of Homeland Security (DHS), U.S. Citi
`Zenship and Immigration Services (USCIS), Immigration and
`Naturalization Service (INS), Border Patrol, or any other
`federal, state or local agency. The arrest records may be stored
`in RMS database 104 from which the records are available to
`RMS 101 and/or other systems.
`When the arrested individual is transported to a jail, lock
`up, or other facility, additional information associated with
`the individual may be collected. If the arrested individual is
`held in jail after arrest and/or before trial, information about
`that individual may be entered into jail management system
`(JMS) 105. JMS 105 may be associated with a state or county
`jail, for example, that is used to hold inmates for relatively
`short periods of time after arrest and/ or prior to a bond hearing
`or trial. In one embodiment, prisoner information is entered
`via a kiosk or stand-alone terminal, such as terminal 06 which
`may be used to enter inmate information during a booking or
`other process. The information entered into JMS 105 may
`include any relevant information, such as the information
`listed in Table 2, for example. Terminal, in-?eld hand-held
`unit or kiosk 106 may records a two-dimensional (2D) or
`three-dimensional (3D) image or series of images of the pris
`oner. Additionally, the visitor kiosk, in-?eld hand-held unit or
`terminal may record other biometric data, such as ?nger
`prints, voice data, or speech samples.
`JMS 105 may be used to classify and manage individual
`inmates by tracking individual inmate data, including identi
`?cation information, such as height, weight, marks and scars,
`inmate health information, such as health history data, drug
`use, or suicide warnings. A booking o?icer or guard may also
`enter inmate data into JMS 105 based upon the of?cer’s
`observations or the prisoner’s answers to questions. For
`example, the guard may observe certain tattoos or clothing
`that indicates that the prisoner is a member of a gang or
`security threat group. Gang a?iliation information may be
`used to prevent or limit members of the same or different
`gangs from interacting in the jail facility. The booking data
`may be linked to other records, such as an arrest record (Table
`1). It will be understood that the information illustrated in
`Table 2 is merely exemplary and any additional information
`may also be included in the booking data entered in J MS 105,
`
`35
`
`40
`
`45
`
`The present invention provides many applicable inventive
`concepts that can be embodied in a wide variety of speci?c
`contexts. The speci?c embodiments discussed are merely
`illustrative of speci?c ways to make and use the invention,
`and do not limit the scope of the invention.
`FIG. 1 illustrates systems used to identify gang or security
`threat group a?iliation according to one embodiment of the
`invention. Information related to individuals who are associ
`ated, directly or indirectly, with the criminal justice system,
`such as suspects, victims, witnesses, convicts, parolees, infor
`mants, investigators, guards, and their family, friends, and
`visitors, for example, may be stored in many different, inde
`pendent systems and formats. Information associated with an
`individual who is arrested may be entered into records man
`agement system (RMS) 101 by a police o?icer, investigator,
`50
`or detective. Information may be directly entered into RMS
`101 at the time of arrest, or recorded on an arrest report and
`entered into RMS 101 at a later time, such as during or after
`booking RMS 101 may include, for example, arrest reports,
`incident reports, or other information associated with crime
`investigation and arrests.
`The arrest reports stored in RMS 101 may include any
`relevant information, such as the information listed in Table l ,
`for example. Any additional relevant information may be
`included with or linked to the arrest report, such as pictures
`and biometric data, including but not limited to ?ngerprints
`and facial images. The arresting o?icer may enter the data
`into RMS 101 using data terminal 102, which may be linked
`directly to RMS 101 or remotely connected to RMS 101 via
`the Internet or any other public or private data network. The
`arresting of?cer may also enter data via wireless device 103,
`which may be a mobile data terminal, personal digital assis
`
`55
`
`60
`
`65
`
`

`
`US 7,805,457 B1
`
`5
`such as a voice print or speech sample, or a tWo-dimensional
`or three-dimensional image, mug shot, or picture of the indi
`vidual.
`
`TABLE 2
`
`Inmate Booking Data
`
`Inmate’s Name
`Date of Booking
`Charges
`Prior convictions/charges/arrests
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Fingerprints
`Mug Shot/Pictures
`Biometric Data
`Assigned Cell
`Identity of Cell Mates
`Gang/ Security Threat Group Af?liation
`Description of Clothing
`Description of Prisoner’s Property
`
`Terminal 106 may be any ?xed, mobile or portable data
`entry terminal, such as a personal computer, kiosk, PDA, or
`mobile data terminal, that is coupled to JMS 105 via a Wired
`or Wireless connection. Information entered into JMS 105,
`such as booking data (Table 2), may be stored in JMS data
`base 107. Records and data stored database 107 may be
`available to JMS 105 and/or other systems.
`Additional information related to arrested or detained indi
`viduals or inmates may be stored in courthouse computer
`system 108, Which may be a docketing or case management
`softWare application, for example. Data associated With
`criminal trials, such as the information listed in Table 3 or
`similar documents or information, may be stored in database
`109. Database 109 may be operated and maintained, for
`example, by a court clerk or a third party, such as the data
`bases available on the Internet from LexisNexis®,
`CourtLink®, and Public Access to Court Electronic Records
`(PACER).
`
`TABLE 3
`
`Court Data
`
`Defendant’s Name
`Charges
`Judge
`Trial Date
`Trial Disposition
`Sentence
`Case Docket
`Pleadings
`Motions
`Orders
`Transcripts
`Exhibits
`Witness Lists
`Prosecutor
`Defense Counsel
`Co-Defendants
`
`20
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Individuals Who are found guilty at trail and convicted of a
`crime may be assigned to a state or federal prison facility to
`serve their sentences. A jail management system, such as JMS
`110 may be used at the prison facility to manage prisoners.
`Terminal 111 may be used to enter prisoner information dur
`ing a prisoner booking or check-in process. Terminal 1 11 may
`be any ?xed, mobile or portable data entry terminal, such as a
`personal computer, kiosk, PDA, or mobile data terminal, that
`
`60
`
`65
`
`6
`is coupled to JMS 110 via a Wired or Wireless connection.
`Information entered into JMS 110, such as the example pris
`oner data listed in Table 4, may be stored in JMS database
`112. Records and data stored database 112 may be available
`to JMS 110 and/or other systems. JMS 110 may be used to
`retrieve prisoner records from other facilities, such as by
`pulling an inmate record from database 107 for an individual
`that is transferred from one facility to another.
`In one embodiment, prisoner information is entered via a
`kiosk, in-?eld hand-held unit, or stand-alone terminal, such as
`terminal 1 11, Which records a tWo-dimensional (2D) or three
`dimensional (3D) image or series of images of the prisoner.
`Additionally, the visitor kiosk, in-?eld hand-held unit, or
`terminal may record other biometric data, such as ?nger
`prints, voice data, or speech samples. A guard or of?cer may
`also enter prisoner data into JMS 110 based upon the guard’s
`observations or the prisoner’s ansWers to questions, for
`example. The guard may observe certain tattoos or clothing
`that indicates that the prisoner is a member of a gang or
`security threat group. The prisoner may have been a gang
`member outside of prison and may develop additional gang
`af?liations While in prison. In a preferred embodiment, any
`knoWn or suspected gang or security threat group af?liation
`Would be recorded for each prisoner to facilitate prison man
`agement and to reduce inter-gang con?ict and interaction
`Within the prison.
`The information entered into JMS 110 may include any
`relevant information, and the records stored in database 112
`may be linked to other records, such as an arrest record 104 or
`inmate record 107. It Will be understood that the information
`illustrated in Table 4 is merely exemplary and any additional
`information may also be included in the prisoner data entered
`in J MS 110.
`
`TABLE 4
`
`Prisoner Data
`
`Prisoner’s Name
`Crime/Conviction
`Sentence
`Prior convictions/charges/arrests
`Dates Entering/Leaving Prison
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Fingerprints
`Mug Shot/Images
`Biometric Data
`Assigned Cell
`Identity of Cell Mates
`Gang/ Security Threat Group Af?liation
`Description of Prisoner’s Property
`
`When arrestees, inmates or prisoners are being held in a
`jail, prison, holding cell, lock-up or other restricted-access
`facility, they may have visitors. For example, the detained or
`incarcerated individual may be visited by laWyers, investiga
`tors, family members, and/or friends. In one embodiment, a
`jail management system, such as JMS 105 or 110, may be
`used to manage and facilitate inmate visitation. Visitors may
`need to pre-register or schedule their visits. This alloWs the
`Warden, guards or prison operator to collect information
`about the visitor, such as name, address, and other identi?ca
`tion information such as biometric identi?ers. Alternatively,
`visitors may “Walk-in” during visiting hours, but in that case
`the prison operator Would collect identi?cation information
`When the visitor arrives and before the visitor is alloWed to
`
`

`
`US 7,805,457 B1
`
`7
`meet With the prisoner. In one embodiment, visitors check-in
`or enter information into a kiosk or terminal, such as termi
`nals 106 or 111, Which records a tWo-dimensional (2D) or
`three-dimensional (3D) image or series of images of the visi
`tor. Additionally, the visitor kiosk or terminal may record
`other biometric data, such as visitor ?ngerprints, voice data,
`or speech samples.
`One example of the type of information that may be col
`lected by the prison operator is shoWn in Table 5. It Will be
`understood that this list is merely exemplary and is not
`intended to be an exhaustive list of information to be collected
`nor is it intended to list required information ?elds.
`
`TABLE 5
`
`Visitor Data
`
`Visitor’s Name
`Name of Prisoner Visited
`Dates of Visits
`Address
`Race
`Gender
`Date of Birth
`Driver License Number/ State
`Social Security Number
`Visitor Biometric Data/Images
`Marks, Scars, Tattoos
`Gang/ Security Threat Group Af?liation
`Relationship to Prisoner
`Employer/Occupation
`Visitor Criminal Record Data
`Recording of Visitation
`Transcription/Transliteration of Visitation
`
`The prison operator may use the visitor information to run
`a background check on the visitor before or during the visi
`tation. Additional information may be added to the visitor’s
`data, such as knoWn or suspected gang af?liation, Which may
`be based, for example, on the background-check information,
`a gang af?liation of the visited prisoner, or tattoos or clothing
`Worn by the visitor. The visitor record data may be stored to a
`jail management system database, such as databases 107 or
`112, or to a separate database. Additionally, the visitor record
`data may be associated With or linked to data ?les related to
`the prisoner. For example, the visitor data in Table 5 may be
`linked to inmate or prisoner data, such as Tables 2 and 4, for
`the visited prisoner.
`Jails, prisons, holding cells, lock-ups or other restricted
`access facilities often provide commissary services that alloW
`prisoners or inmates to purchase food, tobacco products, toi
`letries, and other items. In order to use the commissary ser
`vices, the prisoner, inmate or detainee must open and fund a
`commissary account. Typically, funds may be added to the
`commissary account by the detainee or by their laWyer, fam
`ily members or friends. In one embodiment, a jail manage
`ment system, such as J MS 105 or 110, may be used to manage
`the commissary services. Table 6 illustrates the type of data
`that may be used or monitored in a jail management system to
`operate commissary services. Commissary fund data for indi
`vidual prisoners may be stored to a jail management system
`database, such as databases 107 or 112, or to a separate
`database. Additionally, the commissary fund data may be
`associated With or linked to data ?les related to the prisoner.
`For example, the commissary fund data in Table 6 may be
`linked to inmate, prisoner and/or depositor data, such as
`Tables 2 and 4.
`
`8
`
`TABLE 6
`
`Commissary Data
`
`Prisoner’s Name
`Balance
`Deposit Amounts
`
`Deposit Sources
`Withdrawal Amounts
`Withdrawal Dates
`Items Purchased
`
`Prisoners typically have the capability to make telephone
`calls and may have the capability to receive voice messages
`and to send and receive text and/or email messages. Call
`management system (CMS) 113 may be used at a prison, jail,
`or other detention facility to provide telephone and/or mes
`saging services to prisoners. In one embodiment, prisoners
`use a plurality of telephones 114, Which are controlled by
`CMS 113, to make telephone calls to family, friends and other
`parties. CMS 113 is capable of routing calls to ?xed, circuit
`sWitched Wireline telephones, such as home telephone 115,
`via public sWitched telephone netWork (PSTN) 116. CMS
`113 may also route calls to Wireless telephone 117 via Wire
`less netWork 118. In other embodiments, CMS 113 may be
`capable of routing calls or other communications via packet
`sWitched netWorks, such as Internet 119 or any public or
`private data netWork, to destination communication device
`120. For example, CMS 113 may provide Voice over Internet
`Protocol (VoIP) communications betWeen prison telephone
`114 and destination device 120. It Will be understood that
`destination device 120 may be a telephone, personal com
`puter, laptop, personal digital assistant (PDA) or other device.
`CMS 113 maintains a record of data for each communica
`tion betWeen telephones 114 and other devices 115, 117, or
`120. For example, CMS 113 may maintain Call Detail
`Records (CDRs) for calls or messages made to or from tele
`phones 114. The CDR or other record may include informa
`tion such as the ?elds illustrated in Table 7. A separate CDR
`may be created for every call or other communication. The
`CDR may identify the prisoner by name, account number or
`other identi?er. The CDR preferably includes information to
`ide

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket