Abstract:
Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.
Abstract:
Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence.
Abstract:
Embodiments of the systems and methods described herein relate to providing body worn camera functionality to users, such as on their mobile device. Additionally, capabilities of mobile devices such as mobile telephonic devices are leveraged to stream captured audio/visual data in real-time and provide robust notification and safety features to users in order to democratize access to body worn cameras. The additional features promote increased use of the disclosed systems and methods as a safety tool while simultaneously providing increased transparency in law enforcement.
Abstract:
Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.
Abstract:
Embodiments of the systems and methods described herein relate to covertly monitoring call audio and obtaining other communications of a source device with a target device. For example, a source, with a mobile phone configured as the source device, and working in cooperation with an agency agrees to the interception communications at the source device. A covert application provided to the source device manages configuration of the source device and covert interception of the communications. The intercepting of communications at the source device is performed covertly to protect the source in instances where the source is an undercover informant with the agency.
Abstract:
An inmate communication system is configured to manage the sending and receiving of messages on a messaging service between an inmate incarcerated in a correctional institution and other inmates, or between the inmate and a contact located outside of the facility. Example messaging services include SMS and MMS. Inmates are provided access to a messaging terminal. The inmates interact with the messaging terminal to compose messages for transmission and view received message transmissions. The message communications of the inmates and contacts are analyzed prior to transmission to the recipient. Message contents are analyzed for flagged key-words and flagged sender/recipients. Flagged messages may be placed in an approval queue prior to their delivery for approval or rejection.
Abstract:
Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.
Abstract:
A geolocation system enables law enforcement officers to geolocate a mobile phone, or target device, during the course of police business. In a consented geolocation request, an officer requests, via the geolocation system, that the user of a target device be prompted to grant the officer permission to geolocate the target device. If the user allows the request, the officer may, in turn, geolocate the target device with the geolocation system. In a surreptitious geolocation request, the officer circumvents any request for user permission to grant the officer permission to geolocate the target device. Instead, the officer utilizes the geolocation system to generate a surreptitious request package which contains the necessary legal and situational information required to geolocate the target device without the user's consent. Once a submitted request is registered, the officer may geolocate the target device.
Abstract:
Embodiments of the systems and methods described herein relate to covertly monitoring call audio and obtaining other communications of a source device with a target device. For example, a source, with a mobile phone configured as the source device, and working in cooperation with an agency agrees to the interception communications at the source device. A covert application provided to the source device manages configuration of the source device and covert interception of the communications. The intercepting of communications at the source device is performed covertly to protect the source in instances where the source is an undercover informant with the agency.
Abstract:
A geolocation system enables law enforcement officers to geolocate a mobile phone, or target device, during the course of police business. In a consented geolocation request, an officer requests, via the geolocation system, that the user of a target device be prompted to grant the officer permission to geolocate the target device. If the user allows the request, the officer may, in turn, geolocate the target device with the geolocation system. In a surreptitious geolocation request, the officer circumvents any request for user permission to grant the officer permission to geolocate the target device. Instead, the officer utilizes the geolocation system to generate a surreptitious request package which contains the necessary legal and situational information required to geolocate the target device without the user's consent. Once a submitted request is registered, the officer may geolocate the target device.