`
`(12) Ulllted States Patent
`Viola et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,805,457 B1
`Sep. 28, 2010
`
`(54) SYSTEM AND METHOD FOR IDENTIFYING
`MEMBERS OF A GANG OR SECURITY
`THREAT GROUP
`
`(75) Inventors: John J. Viola, Frisco, TX (US); James
`s sidler Lubbock TX
`Luke
`'
`_
`’
`,
`’
`Kelser, F9300’ TX (Us)
`_
`_
`(73) Ass1gnee: (5568311118 Technologies, Inc., Dallas, TX
`
`’
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 402 days.
`
`Feb‘ 14’ 2008
`
`(21) Appl.No.: 12/031,460
`'
`(22) Flled'
`(51) Int CL
`(200601)
`G06F 17/30
`(52) us. Cl. ............................. .. 707/769; 707/E17.135
`.
`,
`,
`(58) Field of Classi?cation Search ............... .. 707/802,
`
`707/829, 769, 999.005, 999.1
`1 t
`?l f
`t.
`1.
`S
`h h. t
`ee app 10a Ion e or Comp 6 e Seam 15 Dry‘
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`5,781,704 A *
`6,072,860 A *
`6,173,284 B1 *
`
`7/l998 Rossno
`6/2000 Kek et a1. .............. .. 379/8825
`1/2001 Brown
`
`8/2002 Lemelson et al.
`6,437,696 B1 *
`6,665,380 B1 * 12/2003 Cree et al. ............. .. 379/8825
`7,039,171 B2* 5/2006 Gickler
`7,085,359 B2 *
`8/2006 Crites et al.
`7’l06’843 B1 :
`9/2006 Galnsboro et 31'
`7,529,357 B1
`5/2009 Rae et al.
`7,584,480 B1 *
`9/2009 Schwalenberg
`2002/0107871 A1* 8/2002 WyZga et al.
`2003/0070076 A1 *
`4/2003 Michael
`2005/0068169 A1* 3/2005 Copley et a1‘
`2005/0273453 A1 * 12/2005 Holloran
`2009/0150442 A1 *
`6/2009 Barnard et a1.
`* -t d b
`-
`C1 e y exammer
`Primary ExamineriCheryl LeWis
`74 A
`)1 Ag
`F '
`F garty L L C
`Horne ,
`@112, 0r lrmi o
`,
`.
`.
`.
`
`ABSTRACT
`(57)
`System and method for monitoring activity of detainees com
`prising identifying a detainee Who is'af?liated With a gang,
`seaflclillng1 one or mo(r1e databases flcir l'nitiormatron assoiclatetid
`.W“. F e e‘amee’ an Cone aimgt 6?“ Ormanontol en“ y
`1nd1v1duals Who may be af?llated W1th the gang. The data
`b
`-
`.
`.
`ases may 1nclude call record databases, and the 1nforrnat1on
`.
`.
`.
`.
`.
`.
`.
`assoc1ated W1th the deta1nee may 1nclude 1nd1v1duals called
`by the detainee, individuals Who visit the detainee, telephone
`numbers called by the detainee, and sources of funding for the
`detainee’s calls voice and/or facial biometric identi?ers. An
`alert may be triggered When the detainee calls a speci?ed
`individual or telephone number.
`
`17 Claims, 8 Drawing Sheets
`
`1 02 —\
`
`‘
`
`1 01
`
`104
`
`125\
`
`126
`
`109
`
`105
`
`107
`
`INVESTIGATION
`APPLICATION
`
`1 10
`
`1 1 2
`
`JMS
`
`1 14
`
`1 14
`
`121 /@ 11
`
`|—CMS—I
`
`a
`a 1 13
`
`1 18
`
`119
`
`120
`
`M SYSTEM
`
`1 O8
`/
`COURTHOUSE
`
`1 22
`/
`PROBATION
`SYSTEM
`
`GTL 1004
`PGR of U.S. Patent No. 8,855,280
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 1 of8
`
`US 7,805,457 B1
`
`1O / COURTHOUSE
`
`SYSTEM
`
`> V
`
`FIG. 1
`
`12 / PROBATION
`
`SYSTEM
`
`V
`
`/124
`
`I INVESTIGATION
`
`APPLICATION
`
`‘I’
`o
`F
`
`N
`o
`F
`
`A
`I
`
`II
`r
`
`LO
`
`c!)
`0/ g,
`
`‘
`
`\-
`
`w
`of E
`
`‘-
`
`102
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 2 0f 8
`
`US 7,805,457 B1
`
`203 \
`
`205 /
`
`201 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH THE GANG MEMBER'S
`202 \
`CALL RECORDS AND IDENTIFY
`INDIVIDUALS WHO COMMUNICATED
`WITH THE GANG MEMBER
`(I.E. GANG MEMBER'S CONTACTS)
`I
`IDENTIFY THE GANG
`MEMBER'S CONTACTS
`I
`SEARCH DATABASES FOR
`204 \
`RECORDS INVOLVING THIRD
`PARTIES‘ COMMUNICATIONS WITH
`ONE OR MORE OF THE GANG
`MEMBER'S CONTACTS
`I
`IDENTIFY THE THIRD PARTIES
`WHO HAVE COMMUNICATED
`WITH ONE OR MORE OF THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY SPECIFIC CALLS AND
`OTHER COMMUNICATIONS
`INVOLVING THIRD PARTIES
`COMMUNICATING WITH THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY GANG AFFILIATIONS
`FOR THE THIRD PARTIES
`
`206 /
`
`207 /
`
`FIG. 2A
`
`II
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`LINKS TO ONE OR MORE OF THE
`GANG MEMBER'S CONTACTS
`I
`IDENTIFY OTHER RECORDS OR
`ACTIVITIES INVOLVING THE
`GANG MEMBER'S CONTACTS
`
`/‘ 208
`
`\ 209
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 3 0f 8
`
`US 7,805,457 B1
`
`FROM FIG. 2A
`
`R
`
`SEARCH GANG MEMBER'S CALL
`RECORDs AND IDENTIFY SOURCE
`AND DESTINATION ADDRESSES
`FOR DEVICES INVOLVED IN GANG
`MEMBER COMMUNICATIONS (l.E.
`GANG MEMBER COMMUNICATION
`ADDRESSES)
`I
`IDENTIFY THE GANG MEMBER
`COMMUNICATION ADDRESSES
`AND, IF KNOWN, THE IDENTITIES
`OF INDIVIDUALS ASSOCIATED
`WITH THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`SEARCH DATABASES FOR
`OTHER RECORDS INVOLVING
`COMMUNICATION WITH ONE OR
`MORE OF THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`LINKS TO ONE OR MORE OF
`THE GANG MEMBER
`COMMUNICATION ADDRESSES
`I
`IDENTIFY OTHER RECORDS
`AND ACTIVITIES INVOLVING
`THE GANG MEMBER
`COMMUNICATION ADDRESSES
`
`FIG. 2B
`
`210\
`
`211\
`
`212/
`
`214/
`
`215/
`
`II
`ALLOW USER TO REQUEST
`ADDITIONAL INFORMATION
`RELATED TO SELECTED CALL
`RECORDS, GANG MEMBERS, GANG
`MEMBER CONTACTS, OTHER
`PARTIES, COMMUNICATION
`ADDRESSES, OR OTHER
`RECORDS OR ACTIVITIES
`
`/216
`
`II
`IDENTIFY OTHER PARTIES
`COMMUNICATING WITH ONE OR
`MORE OF THE GANG MEMBER
`COMMUNICATION ADDRESSES
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 4 of8
`
`US 7,805,457 B1
`
`301 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH GANG MEMBER'S
`COMMISSARY RECORDS AND
`IDENTIFY INDIVIDUALS WHO
`302 \ FUNDED THE GANG MEMBER'S
`COMMISSARY ACCOUNT (|.E.
`GANG MEMBER FUNDING
`SOURCES)
`I
`SEARCH GANG MEMBER'S
`303 \ CALL RECORDS AND IDENTIFY
`ADDITIONAL GANG MEMBER
`FUNDING SOURCES
`I
`IDENTIFY GANG MEMBER
`FUNDING SOURCES
`I
`SEARCH DATABASES FOR OTHER
`RECORDS INVOLVING FUNDING
`305 / BY ONE OR MORE OF THE GANG
`MEMBER FUNDING SOURCES
`I
`IDENTIFY OTHER ACCOUNTS
`FUNDED BY THE GANG
`MEMBER FUNDING SOURCES
`
`304 /
`
`306 _/
`
`FIG. 3
`
`I
`SEARCH DATABASES FOR
`RECORDS INDICATING OTHER
`NON-FUNDING LINKS TO ONE \ 307
`OR MORE OF THE GANG
`MEMBER FUNDING SOURCES
`I
`IDENTIFY THE OTHER ACTIVITIES
`ASSOCIATED WITH THE GANG \ 308
`MEMBER FUNDING SOURCES
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 5 of8
`
`US 7,805,457 B1
`
`401 \ IDENTIFY A KNOWN OR
`SUSPECTED GANG MEMBER
`I
`SEARCH GANG MEMBER'S
`VISITOR RECORDS AND
`402 \ IDENTIFY INDIVIDUALS WHO
`VISITED THE GANG MEMBER
`(|.E. GANG MEMBER VISITORS)
`
`Y
`403 \ DISPLAY THE GANG
`MEMBER VISITORS
`A
`SEARCH DATABASES FOR
`404 \ RECORDS INvoI_vING vIsITs
`BY oNE OR MORE OF THE
`GANG MEMBER VISITORS
`
`Y
`DISPLAY OTHER VISITS BY
`405 / THE GANG MEMBER VISITORS
`
`+
`SEARCH DATABASES FOR
`RECORDS INDICATING
`406 / OTHER CONNECTIONS TO
`ONE OR MORE OF THE
`GANG MEMBER VISITORS
`I
`
`DISPLAY oTHER ACTIVITIES
`407 / INVOLVING THE GANG
`MEMBER VISITOR
`
`FIG. 4
`
`SPECIFY SECURITY THREAT / 501
`GROUP FoR MoNITORING
`I
`SEARCH DATABASES FOR
`RECORDS ASSOCIATED / 502
`WITH MEMBERS OF THE
`SECURITY THREAT GROUP
`I
`
`503
`ANALYZE MEMBERS‘ RECORDS
`FOR FREQUENTLY USED /
`TELEPHONE NUMBERS
`I
`
`ANALYZE MEMBERS‘
`RECORDS FoR wIDEI_Y USED / 504
`TELEPHONE NUMBERS
`+
`
`ANALYZE MEMBERS‘
`RECORDS FOR COMMON \ 505
`FUNDING SOURCES
`
`Y
`ANAI_YzE MEMBERS‘ RECORDS
`FOR COMMON VISITORS \ 506
`Y
`DISPLAY FREQUENTLY AND
`WIDELY USED TELEPHONE
`NUMBERS, COMMON
`FUNDING SOURCES AND
`COMMON VISITORS
`I
`CONFIGURE ALERTS FoR
`SELECTED TELEPHONE
`NUMBERs, FUNDING
`SOURCES, AND/OR vIsIToRs
`
`\ 507
`
`\ 508
`
`FIG. 5
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 6 of8
`
`US 7,805,457 B1
`
`60\1‘
`
`60g
`
`60g
`
`GA~<>NEGL§ACE§BDER
`
`VISITSTIS
`
`IIIITT ST VISIT
`
`$04
`
`'6/05
`
`VII’ILSTIT"
`DETAINEES
`
`D‘IISEIS’TFSVT'I?”
`DETAINEE
`
`PRISONER #1
`
`VISITOR #1
`
`2/01/07
`
`PRISONER #2
`
`PRISONER #3
`
`INMATE #11
`
`VISITOR #2
`
`3/02/07
`
`PRISONER #3
`
`PRISONER #4
`
`INMATE #12
`
`INMATE #13
`
`INMATE #14
`
`VISITOR #3
`
`3/15/07
`
`PRISONER #3
`
`PRISONER #5
`
`FIG. 6
`
`2/01/07
`
`2/15/07
`
`3/02/07
`
`2/01/07
`
`2/15/07
`
`2/20/07
`
`2/20/07
`
`3/10/07
`
`3/01/07
`
`3/15/07
`
`701
`
`702
`
`703
`
`704
`
`705
`
`GASNEéEACETJgER
`
`CALLED PARTY DATE OF CALL
`
`CALLS FROM DATE OF CALL
`OTHER
`FROM OTHER
`DETAINEES
`DETAINEE
`
`PRISONER #1
`
`VISITOR #1
`
`2/01/07
`
`PRISONER #3
`
`PRISONER #3
`
`2/01/07
`
`2/01/07
`
`CALLED PARTY #1
`
`CALLED PARTY #2
`
`CALLED PARTY #3
`
`2/02/07
`
`3/01/07
`
`3/20/07
`
`2/15/07
`
`3/04/07
`
`FIG. 7
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 7 of8
`
`US 7,805,457 B1
`
`cow
`
`vmow
`
`
`
`US. Patent
`
`Sep. 28, 2010
`
`Sheet 8 of8
`
`US 7,805,457 B1
`
`#5
`
`
`
`US 7,805,457 B1
`
`1
`SYSTEM AND METHOD FOR IDENTIFYING
`MEMBERS OF A GANG OR SECURITY
`THREAT GROUP
`
`TECHNICAL FIELD
`
`The present invention relates generally to a system and
`method for monitoring, correlating and analyzing detainee
`records and, more particularly, to a system and method for
`identifying relationships to knoWn gang members.
`
`BACKGROUND
`
`Many prisoners, inmates or other detainees are a?iliated
`With a gang or security threat group. It is important to prison
`and jail management, Wardens, and guards to knoW the gang
`af?liation of detainees to manage housing issues and to
`reduce con?ict in the facility. Additionally, it Would be help
`ful to investigators to identify other gang members to assist in
`crime investigations for inside and outside the facility Walls.
`Currently, there is no system available to link data associated
`With knoWn gang members to other individuals Who may be
`a?iliated With the gang.
`
`SUMMARY OF THE INVENTION
`
`These and other problems are generally solved or circum
`vented, and technical advantages are generally achieved, by
`embodiments of the present invention in Which an investiga
`tor may identify knoWn or suspected gang members and then
`link those gang members to their visitors, to individuals Who
`provide funds to the gang members, to individuals Who com
`municate With the gang members and to gang members Who
`communicate With certain individuals. As used herein, the
`terms gang and security threat group are used broadly and are
`intended to include any knoWn or suspected criminal, politi
`cal, anti-social, anti-govemment, or terrorist organizations or
`groups of any size, including groups having local, national
`and/ or international members and/or having centralized,
`decentralized, formal or informal management and control.
`The present invention provides users With the capability to
`track, correlate and report on communication, visitation and
`funding activity of prisoners, inmates, and other detainees.
`Embodiments of the present invention provide for the inte
`gration of a plurality of databases and records stored on
`independent jail management, records management, call
`management, commissary services, and other systems. By
`searching across numerous independent databases and inte
`grating the resulting data, the present invention alloWs users
`to map an individual’s activity and to sort activity and rela
`tionships by gang af?liation, called party, visitors, funding
`party or other parameters. Embodiments of the present inven
`tion provide a system and method for sorting data to identify
`af?liations betWeen an incarcerated persons and other knoWn
`or potential gang members.
`The present invention may be used to search across many
`independent and separate facilities and databases to detect
`patterns and commonality in relationships betWeen gang
`members, detainees or other individuals. Additionally, con
`versations involving detainees’ phone calls, messages, visi
`tations orbiometric data may be recorded andused as a source
`of information. One objection of the invention is to provide a
`system and method for effectively “connecting the dots”
`betWeen people, activities, communications, and patterns.
`Data that is tagged With a gang af?liation notation may be
`linked to other directly or indirectly related data to identify
`other potential gang members. The data may be linked among
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`individuals and records both Within a facility and external to
`the facility as Well as across multiple facilities.
`Data in jail management softWare and applications may be
`used in embodiments to link knoWn gang members to called
`numbers and called parties. Record associated With detainees
`having a knoWn gang af?liation may be cross-referenced to
`other individuals using, for example, called numbers or call
`billing records. Additionally, visitation records may be used
`to link visitors to detainees With knoWn gang af?liations, or to
`link detainees to visitors With knoWn gang a?iliations. In
`other embodiments, funding for detainee accounts, such as
`commissary accounts and calling card accounts and commu
`nication funding accounts, may be linked to detainees or
`funding sources having a knoWn gang af?liation. If an inmate
`With a knoWn gang a?iliation receives funds from another
`individual (i.e. a funding event), the funding individual may
`be identi?ed as having a potential gang a?iliation. Embodi
`ments of the present invention may also track the amount of
`funds involved in funding events, and/or the frequency of
`funding events.
`Embodiments of the present invention provide integrated
`search capabilities that alloW a user to cross reference inmate,
`call, visitor and transaction records against knoWn gang
`members to identify other detainees, called parties, visitors
`and funding sources Who may be gang members or support
`ers.
`Additional databases that are not associated With a prison,
`jail or detention facility may also be searched, monitored or
`used in connection With the present invention. For example,
`records store in a court system, such as trial records, victim
`databases, Witness lists, dockets, and other case information
`may be analyzed and correlated using the present invention.
`After an prisoner or detainee is released, additional data asso
`ciated With the detainee may be collected, such as in a pro
`bation database. Embodiments of the invention include the
`capability to monitor and search information stored in such
`probation or post-incarceration databases.
`In addition to identifying additional gang members, the
`present invention may be used to identify hierarchies Within
`gangs and/ or the organization of the gangs. Patterns detected
`using the present invention may be used to identify a detain
`ee’s rank Within a gang.
`Users also have the capability to revieW information cor
`related to a particular detainee, called number, billed number
`or other parameter. For example, a user may enter a billed
`telephone number and an investigation application Would
`correlate and display all related information, such as the
`number times the telephone number Was called, Who called
`the number, When the number Was called, Where calls to the
`telephone number originated from, and Who Was called from
`the telephone number.
`A user may use a rules-based engine to con?gure alert
`noti?cations. The user may select parameters to be monitored
`and, upon occurrence of the parameters, the rules-based
`engine may send an alert noti?cations to speci?ed individuals
`or agencies. For example, a user may con?gure an alert to be
`noti?ed When particular gang members contact each other,
`When particular accounts are used or replenished, or When
`particular telephone numbers are called. In one embodiment,
`the user may receive the alert noti?cation in real-time, such as
`When a call is set-up betWeen tWo knoWn gang members or
`When a key Word is spoken that Would activate the noti?ca
`tion. For example, if a detainee With a knoWn gang af?liation
`calls another knoWn gang member, an alert may be sent to an
`investigator. Upon receiving the alert, the user may listen-in,
`break-in, terminate or record the call or communication
`betWeen the gang members.
`
`
`
`US 7,805,457 B1
`
`3
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of the present inven
`tion, and the advantages thereof, reference is now made to the
`following descriptions taken in conjunction with the accom
`panying drawings, in which:
`FIG. 1 illustrates systems used to identify gang or security
`threat group a?iliation according to one embodiment of the
`invention;
`FIGS. 2A and 2B illustrate a ?owchart for an exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals;
`FIG. 3 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals, such as common funding sources;
`FIG. 4 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communication and links between gang members and
`other individuals, such as common visitors;
`FIG. 5 illustrates a ?owchart for another exemplary
`embodiment of a method for tracking, correlating, and report
`ing on communications and links between gang members and
`other individuals;
`FIG. 6 illustrates a simpli?ed version of a user interface for
`use with embodiments of the present invention;
`FIG. 7 illustrates another simpli?ed version of a user inter
`face for use with embodiments of the present invention; and
`FIGS. 8A and 8B illustrate a user interface according to
`another embodiment of the invention.
`
`20
`
`25
`
`30
`
`DETAILED DESCRIPTION OF ILLUSTRATIVE
`EMBODIMENTS
`
`4
`tant (PDA), biometric scanner, handheld device, mobile
`phone, camera, or other such device. Device 103 may be a
`?eld identi?cation device that can be used to record an indi
`vidual’ s identi?cation, point of entry, arrest or detention loca
`tion, gang af?liation, and biometric data.
`
`TABLE 1
`
`Arrest/Incident Report
`
`Arrestee’s Name
`Place/Date of Arrest/Incident
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Gang/ Security Threat Group Af?liation
`Description of Clothing
`Description of Incident
`Charges
`Description of Evidence
`Description/Identi?cation of Other Arrestees
`
`It will be understood that the arrested or detained indi
`vidual may be held under the control of any federal, state or
`local o?icial working with any agency, such as, a sheriff‘s
`o?ice, police department, Federal Bureau of Investigation
`(FBI), Department of Homeland Security (DHS), U.S. Citi
`Zenship and Immigration Services (USCIS), Immigration and
`Naturalization Service (INS), Border Patrol, or any other
`federal, state or local agency. The arrest records may be stored
`in RMS database 104 from which the records are available to
`RMS 101 and/or other systems.
`When the arrested individual is transported to a jail, lock
`up, or other facility, additional information associated with
`the individual may be collected. If the arrested individual is
`held in jail after arrest and/or before trial, information about
`that individual may be entered into jail management system
`(JMS) 105. JMS 105 may be associated with a state or county
`jail, for example, that is used to hold inmates for relatively
`short periods of time after arrest and/ or prior to a bond hearing
`or trial. In one embodiment, prisoner information is entered
`via a kiosk or stand-alone terminal, such as terminal 06 which
`may be used to enter inmate information during a booking or
`other process. The information entered into JMS 105 may
`include any relevant information, such as the information
`listed in Table 2, for example. Terminal, in-?eld hand-held
`unit or kiosk 106 may records a two-dimensional (2D) or
`three-dimensional (3D) image or series of images of the pris
`oner. Additionally, the visitor kiosk, in-?eld hand-held unit or
`terminal may record other biometric data, such as ?nger
`prints, voice data, or speech samples.
`JMS 105 may be used to classify and manage individual
`inmates by tracking individual inmate data, including identi
`?cation information, such as height, weight, marks and scars,
`inmate health information, such as health history data, drug
`use, or suicide warnings. A booking o?icer or guard may also
`enter inmate data into JMS 105 based upon the of?cer’s
`observations or the prisoner’s answers to questions. For
`example, the guard may observe certain tattoos or clothing
`that indicates that the prisoner is a member of a gang or
`security threat group. Gang a?iliation information may be
`used to prevent or limit members of the same or different
`gangs from interacting in the jail facility. The booking data
`may be linked to other records, such as an arrest record (Table
`1). It will be understood that the information illustrated in
`Table 2 is merely exemplary and any additional information
`may also be included in the booking data entered in J MS 105,
`
`35
`
`40
`
`45
`
`The present invention provides many applicable inventive
`concepts that can be embodied in a wide variety of speci?c
`contexts. The speci?c embodiments discussed are merely
`illustrative of speci?c ways to make and use the invention,
`and do not limit the scope of the invention.
`FIG. 1 illustrates systems used to identify gang or security
`threat group a?iliation according to one embodiment of the
`invention. Information related to individuals who are associ
`ated, directly or indirectly, with the criminal justice system,
`such as suspects, victims, witnesses, convicts, parolees, infor
`mants, investigators, guards, and their family, friends, and
`visitors, for example, may be stored in many different, inde
`pendent systems and formats. Information associated with an
`individual who is arrested may be entered into records man
`agement system (RMS) 101 by a police o?icer, investigator,
`50
`or detective. Information may be directly entered into RMS
`101 at the time of arrest, or recorded on an arrest report and
`entered into RMS 101 at a later time, such as during or after
`booking RMS 101 may include, for example, arrest reports,
`incident reports, or other information associated with crime
`investigation and arrests.
`The arrest reports stored in RMS 101 may include any
`relevant information, such as the information listed in Table l ,
`for example. Any additional relevant information may be
`included with or linked to the arrest report, such as pictures
`and biometric data, including but not limited to ?ngerprints
`and facial images. The arresting o?icer may enter the data
`into RMS 101 using data terminal 102, which may be linked
`directly to RMS 101 or remotely connected to RMS 101 via
`the Internet or any other public or private data network. The
`arresting of?cer may also enter data via wireless device 103,
`which may be a mobile data terminal, personal digital assis
`
`55
`
`60
`
`65
`
`
`
`US 7,805,457 B1
`
`5
`such as a voice print or speech sample, or a tWo-dimensional
`or three-dimensional image, mug shot, or picture of the indi
`vidual.
`
`TABLE 2
`
`Inmate Booking Data
`
`Inmate’s Name
`Date of Booking
`Charges
`Prior convictions/charges/arrests
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Fingerprints
`Mug Shot/Pictures
`Biometric Data
`Assigned Cell
`Identity of Cell Mates
`Gang/ Security Threat Group Af?liation
`Description of Clothing
`Description of Prisoner’s Property
`
`Terminal 106 may be any ?xed, mobile or portable data
`entry terminal, such as a personal computer, kiosk, PDA, or
`mobile data terminal, that is coupled to JMS 105 via a Wired
`or Wireless connection. Information entered into JMS 105,
`such as booking data (Table 2), may be stored in JMS data
`base 107. Records and data stored database 107 may be
`available to JMS 105 and/or other systems.
`Additional information related to arrested or detained indi
`viduals or inmates may be stored in courthouse computer
`system 108, Which may be a docketing or case management
`softWare application, for example. Data associated With
`criminal trials, such as the information listed in Table 3 or
`similar documents or information, may be stored in database
`109. Database 109 may be operated and maintained, for
`example, by a court clerk or a third party, such as the data
`bases available on the Internet from LexisNexis®,
`CourtLink®, and Public Access to Court Electronic Records
`(PACER).
`
`TABLE 3
`
`Court Data
`
`Defendant’s Name
`Charges
`Judge
`Trial Date
`Trial Disposition
`Sentence
`Case Docket
`Pleadings
`Motions
`Orders
`Transcripts
`Exhibits
`Witness Lists
`Prosecutor
`Defense Counsel
`Co-Defendants
`
`20
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Individuals Who are found guilty at trail and convicted of a
`crime may be assigned to a state or federal prison facility to
`serve their sentences. A jail management system, such as JMS
`110 may be used at the prison facility to manage prisoners.
`Terminal 111 may be used to enter prisoner information dur
`ing a prisoner booking or check-in process. Terminal 1 11 may
`be any ?xed, mobile or portable data entry terminal, such as a
`personal computer, kiosk, PDA, or mobile data terminal, that
`
`60
`
`65
`
`6
`is coupled to JMS 110 via a Wired or Wireless connection.
`Information entered into JMS 110, such as the example pris
`oner data listed in Table 4, may be stored in JMS database
`112. Records and data stored database 112 may be available
`to JMS 110 and/or other systems. JMS 110 may be used to
`retrieve prisoner records from other facilities, such as by
`pulling an inmate record from database 107 for an individual
`that is transferred from one facility to another.
`In one embodiment, prisoner information is entered via a
`kiosk, in-?eld hand-held unit, or stand-alone terminal, such as
`terminal 1 11, Which records a tWo-dimensional (2D) or three
`dimensional (3D) image or series of images of the prisoner.
`Additionally, the visitor kiosk, in-?eld hand-held unit, or
`terminal may record other biometric data, such as ?nger
`prints, voice data, or speech samples. A guard or of?cer may
`also enter prisoner data into JMS 110 based upon the guard’s
`observations or the prisoner’s ansWers to questions, for
`example. The guard may observe certain tattoos or clothing
`that indicates that the prisoner is a member of a gang or
`security threat group. The prisoner may have been a gang
`member outside of prison and may develop additional gang
`af?liations While in prison. In a preferred embodiment, any
`knoWn or suspected gang or security threat group af?liation
`Would be recorded for each prisoner to facilitate prison man
`agement and to reduce inter-gang con?ict and interaction
`Within the prison.
`The information entered into JMS 110 may include any
`relevant information, and the records stored in database 112
`may be linked to other records, such as an arrest record 104 or
`inmate record 107. It Will be understood that the information
`illustrated in Table 4 is merely exemplary and any additional
`information may also be included in the prisoner data entered
`in J MS 110.
`
`TABLE 4
`
`Prisoner Data
`
`Prisoner’s Name
`Crime/Conviction
`Sentence
`Prior convictions/charges/arrests
`Dates Entering/Leaving Prison
`Height/Weight
`Race
`Gender
`Date of Birth
`Marks, Scars, Tattoos
`Fingerprints
`Mug Shot/Images
`Biometric Data
`Assigned Cell
`Identity of Cell Mates
`Gang/ Security Threat Group Af?liation
`Description of Prisoner’s Property
`
`When arrestees, inmates or prisoners are being held in a
`jail, prison, holding cell, lock-up or other restricted-access
`facility, they may have visitors. For example, the detained or
`incarcerated individual may be visited by laWyers, investiga
`tors, family members, and/or friends. In one embodiment, a
`jail management system, such as JMS 105 or 110, may be
`used to manage and facilitate inmate visitation. Visitors may
`need to pre-register or schedule their visits. This alloWs the
`Warden, guards or prison operator to collect information
`about the visitor, such as name, address, and other identi?ca
`tion information such as biometric identi?ers. Alternatively,
`visitors may “Walk-in” during visiting hours, but in that case
`the prison operator Would collect identi?cation information
`When the visitor arrives and before the visitor is alloWed to
`
`
`
`US 7,805,457 B1
`
`7
`meet With the prisoner. In one embodiment, visitors check-in
`or enter information into a kiosk or terminal, such as termi
`nals 106 or 111, Which records a tWo-dimensional (2D) or
`three-dimensional (3D) image or series of images of the visi
`tor. Additionally, the visitor kiosk or terminal may record
`other biometric data, such as visitor ?ngerprints, voice data,
`or speech samples.
`One example of the type of information that may be col
`lected by the prison operator is shoWn in Table 5. It Will be
`understood that this list is merely exemplary and is not
`intended to be an exhaustive list of information to be collected
`nor is it intended to list required information ?elds.
`
`TABLE 5
`
`Visitor Data
`
`Visitor’s Name
`Name of Prisoner Visited
`Dates of Visits
`Address
`Race
`Gender
`Date of Birth
`Driver License Number/ State
`Social Security Number
`Visitor Biometric Data/Images
`Marks, Scars, Tattoos
`Gang/ Security Threat Group Af?liation
`Relationship to Prisoner
`Employer/Occupation
`Visitor Criminal Record Data
`Recording of Visitation
`Transcription/Transliteration of Visitation
`
`The prison operator may use the visitor information to run
`a background check on the visitor before or during the visi
`tation. Additional information may be added to the visitor’s
`data, such as knoWn or suspected gang af?liation, Which may
`be based, for example, on the background-check information,
`a gang af?liation of the visited prisoner, or tattoos or clothing
`Worn by the visitor. The visitor record data may be stored to a
`jail management system database, such as databases 107 or
`112, or to a separate database. Additionally, the visitor record
`data may be associated With or linked to data ?les related to
`the prisoner. For example, the visitor data in Table 5 may be
`linked to inmate or prisoner data, such as Tables 2 and 4, for
`the visited prisoner.
`Jails, prisons, holding cells, lock-ups or other restricted
`access facilities often provide commissary services that alloW
`prisoners or inmates to purchase food, tobacco products, toi
`letries, and other items. In order to use the commissary ser
`vices, the prisoner, inmate or detainee must open and fund a
`commissary account. Typically, funds may be added to the
`commissary account by the detainee or by their laWyer, fam
`ily members or friends. In one embodiment, a jail manage
`ment system, such as J MS 105 or 110, may be used to manage
`the commissary services. Table 6 illustrates the type of data
`that may be used or monitored in a jail management system to
`operate commissary services. Commissary fund data for indi
`vidual prisoners may be stored to a jail management system
`database, such as databases 107 or 112, or to a separate
`database. Additionally, the commissary fund data may be
`associated With or linked to data ?les related to the prisoner.
`For example, the commissary fund data in Table 6 may be
`linked to inmate, prisoner and/or depositor data, such as
`Tables 2 and 4.
`
`8
`
`TABLE 6
`
`Commissary Data
`
`Prisoner’s Name
`Balance
`Deposit Amounts
`
`Deposit Sources
`Withdrawal Amounts
`Withdrawal Dates
`Items Purchased
`
`Prisoners typically have the capability to make telephone
`calls and may have the capability to receive voice messages
`and to send and receive text and/or email messages. Call
`management system (CMS) 113 may be used at a prison, jail,
`or other detention facility to provide telephone and/or mes
`saging services to prisoners. In one embodiment, prisoners
`use a plurality of telephones 114, Which are controlled by
`CMS 113, to make telephone calls to family, friends and other
`parties. CMS 113 is capable of routing calls to ?xed, circuit
`sWitched Wireline telephones, such as home telephone 115,
`via public sWitched telephone netWork (PSTN) 116. CMS
`113 may also route calls to Wireless telephone 117 via Wire
`less netWork 118. In other embodiments, CMS 113 may be
`capable of routing calls or other communications via packet
`sWitched netWorks, such as Internet 119 or any public or
`private data netWork, to destination communication device
`120. For example, CMS 113 may provide Voice over Internet
`Protocol (VoIP) communications betWeen prison telephone
`114 and destination device 120. It Will be understood that
`destination device 120 may be a telephone, personal com
`puter, laptop, personal digital assistant (PDA) or other device.
`CMS 113 maintains a record of data for each communica
`tion betWeen telephones 114 and other devices 115, 117, or
`120. For example, CMS 113 may maintain Call Detail
`Records (CDRs) for calls or messages made to or from tele
`phones 114. The CDR or other record may include informa
`tion such as the ?elds illustrated in Table 7. A separate CDR
`may be created for every call or other communication. The
`CDR may identify the prisoner by name, account number or
`other identi?er. The CDR preferably includes information to
`ide