US20140099998A1 - System, method, and device for intelligence gathering and position tracking - Google Patents

System, method, and device for intelligence gathering and position tracking Download PDF

Info

Publication number
US20140099998A1
US20140099998A1 US14/101,555 US201314101555A US2014099998A1 US 20140099998 A1 US20140099998 A1 US 20140099998A1 US 201314101555 A US201314101555 A US 201314101555A US 2014099998 A1 US2014099998 A1 US 2014099998A1
Authority
US
United States
Prior art keywords
mobile communication
communication device
computer
set forth
sounds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/101,555
Inventor
Corey Smith
Todd Dupriest
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sur-Tec Inc
Original Assignee
Sur-Tec Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=43412686&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20140099998(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Sur-Tec Inc filed Critical Sur-Tec Inc
Priority to US14/101,555 priority Critical patent/US20140099998A1/en
Assigned to SUR-TEC, INC reassignment SUR-TEC, INC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SMITH, COREY, DUPRIEST, TODD
Publication of US20140099998A1 publication Critical patent/US20140099998A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • H04M1/656Recording arrangements for recording a message from the calling party for recording conversations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1654Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems
    • G08B13/1672Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems using sonic detecting means, e.g. a microphone operating in the audio frequency range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/001Concealed systems, e.g. disguised alarm systems to make covert systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/028Communication between parent and child units via remote transmission means, e.g. satellite network
    • G08B21/0283Communication between parent and child units via remote transmission means, e.g. satellite network via a telephone network, e.g. cellular GSM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/10Details of telephonic subscriber devices including a GPS signal receiver

Definitions

  • the present invention relates to systems, methods, and devices for gathering intelligence data. More particularly, embodiments of the invention relate to a mobile communication device that may be used to secretly record conversations of a suspect or other person and track the person's location.
  • the present invention solves some of the above-described problems and provides a distinct advance in the art of intelligence gathering methods and devices.
  • Embodiments of the invention can be implemented in hardware, software, firmware, or a combination thereof.
  • the invention is implemented with at least one mobile communication device operated by an investigator or other person gathering intelligence information, one or more portable computers operated by members of a support team assisting the investigator, and one or more host computers for storing data and other information gathered by the mobile communication device and the portable computers.
  • the mobile communication device, portable computers, and host computers may all communicate and exchange data and other information via a wireless network and/or a communications network.
  • One embodiment of the mobile communication device comprises a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a display for displaying information related to operation of the device, a computing device, and a computer program implemented by the computing device.
  • the computer program is operable to place the mobile communication device in a stealth mode in which the display may be turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to one of the portable computers. If the investigator or anyone else attempts to turn the mobile communication device off while it is in the stealth mode, the computer program presents screen graphics that suggest the device is being turned off, but the components of the device necessary to gather and transmit intelligence data continue to run. This allows an investigator and support team to secretly record a person even though the mobile communication device is in plain view because the device appears to be turned off.
  • the mobile communication device While in the stealth mode, the mobile communication device may be used to make or receive phone calls or perform other functions, in which case the display will be turned on, so that no one but the investigator and others participating in the investigation will know the device is in the stealth mode or that the stealth mode even exists.
  • the mobile communication device can only be placed in the stealth mode after the investigator enters valid user information and an authorized member of the support team enters and transmits to the device valid acknowledgment information.
  • the stealth mode can only be cancelled after the investigator enters valid user information and a member of the support team enters and transmits to the device valid acknowledgment information.
  • the investigator and/or the support team may be required to only enter a passcode to initiate the stealth mode. Both embodiments permit the mobile communication device to be used as a conventional mobile phone while not in the stealth mode and ensure that the person being monitored cannot disable the stealth mode.
  • the mobile communication device may also include a GPS receiver or other location-determining component for determining geographic locations of the device and may transmit data representative of the geographic locations to one of the portable computers along with the voice signals or data. This allows the support team to track the location of the investigator and person being monitored even when the device is in the stealth mode.
  • the mobile communication device While in the stealth mode, the mobile communication device preferably transmits the voice data or signals and the location data using TCP/IP data channels rather than the wireless network's voice channels. This allows the transmissions to be more easily encrypted and less vulnerable to interception. Importantly, the mobile communication device transmits the voice data or signals in real-time so the support team may monitor the investigator's and suspect's conversations and other sounds as they occur. This enables the support team to immediately respond or otherwise react to any distress signals.
  • one of the portable computers may be programmed to wirelessly transmit a gain control instruction to the mobile communication device, and the mobile communication device may be programmed to adjust a gain setting of its microphone in response thereto. This permits a surveillance team to monitor the recording of a suspect's conversations and other sounds and to adjust the mobile communication device's microphone gain to compensate for background noises, the distance between the investigator and the suspect, the suspect's voice level, and/or other factors.
  • the mobile communication device may also include a vibration element that vibrates the housing of the device in a conventional manner.
  • One of the portable computers may be programmed to wirelessly transmit an alert signal to the mobile communication device that causes the device to activate its vibration element.
  • the mobile communication device may be programmed to vibrate once in response to an alert signal that is sent when the support team believes the investigator is in immediate danger, twice in response to a different alert signal that is sent when the support team believes the intelligence gathering mission should be aborted, and three or more times in response to other alert signals.
  • the mobile communication device may also include resident memory for storing the voice signals or data and the location data. This allows the device to “store and forward” intelligence data in the event the mobile communication device and portable computers cannot communicate.
  • the mobile communication device may also be programmed to receive and store geographic coordinates corresponding to a geofence or other boundary and to wirelessly transmit an alert to one of the portable computers whenever the device enters or exits an area encompassed by the geofence. Similarly, the mobile communication device may be programmed to automatically switch to the stealth mode whenever the device enters or exits the area encompassed by the geofence.
  • the mobile communication device is a GPS-enabled “smart-phone” such as the HTC Touch ProTM that has been programmed to perform the functions described herein.
  • a GPS-enabled “smart-phone” such as the HTC Touch ProTM that has been programmed to perform the functions described herein.
  • Use of an otherwise conventional mobile phone that has been programmed in accordance with the present invention permits law enforcement agencies and other entities to implement intelligence gathering missions without purchasing expensive stand-alone surveillance equipment.
  • the servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team.
  • Authorized persons may then request copies of the report in electronic form or other form.
  • the reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • FIG. 1 is a schematic diagram of exemplary computer and communication equipment that may be used to implement embodiments of the present invention
  • FIG. 2 is a block diagram illustrating selected components of a mobile communication device that may be used to implement embodiments of the invention
  • FIG. 3 is a flow diagram depicting a method in accordance with an embodiment of the invention.
  • FIG. 4 is a flow diagram depicting a method in accordance with another embodiment of the invention.
  • the present invention relates to a system, method, and device for audio intelligence gathering and position tracking
  • Embodiments of the invention can be implemented in hardware, software, firmware, or a combination thereof.
  • the invention is implemented with one or more computer programs and computer and communications equipment broadly referred to by the numeral 10 in FIG. 1 .
  • the exemplary equipment 10 may include at least one mobile communication device 12 , one or more portable computers 14 , 16 , and one or more host computers 18 , 20 , all of which may communicate and exchange data and other information via a wireless network 22 and/or a communications network 24 .
  • FIG. 1 illustrates a particular number of mobile communication devices, portable computers, and host computers, any number of these devices may be used without departing from the scope of the invention.
  • the mobile communication device 12 may be used by a law enforcement officer, intelligence agent, military agent, or any other investigator wishing to gather intelligence information concerning a suspect or other monitored person.
  • investment is meant to encompass any user of the mobile communication device 12
  • monitoring person and “suspect” are meant to encompass anyone being investigated and/or monitored by the investigator.
  • the mobile communication device 12 may be any device that can detect voice communications and other sounds and transmit and receive voice and data via the wireless network 22 .
  • the mobile communication device may be, for example, a wireless phone, a GPS-enabled wireless phone, a phone-enabled GPS device, a phone-enabled personal digital assistant (PDA), a phone-enabled MP3 device, or any other wireless communication device.
  • the mobile communication device 12 is an HTC Touch ProTM communication device or equivalent device that has been programmed as described herein.
  • the particular mobile communication device 12 and its components illustrated and described herein are merely examples of a device and components that may be used to implement aspects of the present invention and may be replaced with other devices and components without departing from the scope of the present invention.
  • FIG. 2 Key components of the mobile communication device 12 are illustrated in FIG. 2 and include a computing device 26 , a microphone 28 , a speaker 30 , a communications component 32 , a location-determining component 34 , a display 36 , memory 38 , a user interface 40 , a power source 42 , one or more I/O ports 44 , a vibration element 46 , and a housing or enclosure.
  • the computing device 26 may include any number of processors, controllers, integrated circuits, programmable logic devices, or other computing devices and resident or external memory for storing data and other information accessed and/or generated by the device.
  • the computing device includes a Qualcomm® MSM7201A 528 MHZ processor with 512 MB of ROM, 288 MB of RAM, and Windows Mobile® 6.1 Professional Operating System.
  • the computing device is preferably coupled with other components of the mobile communication device through wired or wireless connections, such as a data bus 48 , to enable information to be exchanged between the various components.
  • the computing device 26 may implement a computer program and/or code segments to perform some of the functions described herein.
  • the computer program may comprise an ordered listing of executable instructions for implementing logical functions in the computing device of the mobile communication device as described in more detail below.
  • the microphone 28 and speaker 30 are preferably built into the housing and are provided for detecting and reproducing voice communications and other sounds. As described in more detail below, the gain of the microphone and speaker may be manually adjusted by an operator of the mobile communication device or remotely adjusted by an operator of one of the computers.
  • the communications component 32 enables the device to communicate with the computers 14 , 16 and other mobile phones and similar devices through the wireless network 22 and/or the communications network 24 .
  • the communications component may transmit and receive any communications including incoming and outgoing phone calls, TCP/IP data transmissions, text messages, instant messages, voicemail messages, e-mail messages, missed phone calls, and any other known communications.
  • the communications component may communicate utilizing wireless data transfer methods such as cellular telephony, WiFi (802.11), Wi-Max, BluetoothTM, ANT®, ultra-wideband, infrared, radio frequency, etc.
  • the communications component is a cellular transceiver for transmitting and receiving communications over a cellular phone network such as those operated by Sprint®, AT&T®, Verizon®, and other companies.
  • the communications component 32 may also include a Frequency Modulated (FM) receiver and may permit communications over several different networks.
  • FM Frequency Modulated
  • the device may be operable to transmit and receive communications over a cellular network, a short-range FM radio network, and a WiFi network.
  • the location-determining component 34 determines locations of the device 12 as it is carried or otherwise moved from place to place and generates corresponding location data that may be transmitted to the computers or host computers as described below.
  • the location-determining component 34 is a satellite navigation receiver that works with a global navigation satellite system (GNSS) such as the global positioning system (GPS) primarily used in the United States, the GLONASS system primarily used in the Soviet Union, or the Galileo system primarily used in Europe.
  • GNSS global navigation satellite system
  • GPS global positioning system
  • GLONASS global positioning system
  • Galileo system primarily used in Europe.
  • a GNSS includes a plurality of satellites 50 in orbit about the Earth. The orbit of each satellite is not necessarily synchronous with the orbits of other satellites and, in fact, is likely asynchronous.
  • the satellite navigation receiver receives spread spectrum satellite signals from the various satellites.
  • the spread spectrum signals continuously transmitted from each satellite 50 utilize a highly accurate frequency standard accomplished with an extremely accurate atomic clock.
  • Each satellite as part of its data signal transmission, transmits a data stream indicative of that particular satellite.
  • the device 12 must acquire spread spectrum satellite signals from at least three satellites for its receiver to calculate its two-dimensional position by triangulation. Acquisition of an additional signal, resulting in signals from a total of four satellites, permits the device to calculate its three-dimensional position.
  • the location-determining component 34 and the computing device 26 are operable to receive navigational signals from the satellites 50 and to calculate positions of the device 12 as a function of the signals.
  • the location-determining component and computing device may also determine track logs or any other series of geographic coordinates corresponding to points along a road or other path traveled by the investigator or other user of the device 12 .
  • the location-determining component 34 and/or the computing device may also calculate routes to desired locations, provide instructions to navigate to the desired locations, display maps and other information on the display screen, and execute other functions described herein.
  • the location-determining component 34 may include an antenna to assist in receiving the satellite signals.
  • the antenna may be a patch antenna, a linear antenna, or any other type of antenna that can be used with navigational devices.
  • the antenna may be mounted directly on or in the housing or may be mounted external to the housing.
  • the location-determining component 34 may include one or more processors, controllers, or other computing devices and memory so that it may calculate location and other geographic information without the computing device or it may utilize the components of the computing device. Further, the location-determining component may be integral with the computing device such that the location-determining component may be operable to specifically perform the various functions described herein. Thus, the computing device 26 and location-determining component can be combined or be separate or otherwise discrete elements.
  • embodiments of the mobile communication device 12 may include a satellite navigation receiver, it will be appreciated that other location-determining technology may be used.
  • the communication component 32 may be used to determine the location of the device by receiving data from at least three transmitting locations and then performing basic triangulation calculations to determine the relative position of the device with respect to the transmitting locations.
  • cellular towers or any customized transmitting radio frequency towers can be used instead of satellites 50 .
  • any standard geometric triangulation algorithm can be used to determine the location of the electronic device.
  • the mobile communication device 12 may use both a GPS receiver and cell tower triangulation to determine its position. For example, the device may first attempt to obtain a signal fix from at least three GPS satellites 50 . If it is unable to do so due to blocked or otherwise unavailable satellite signals, it reverts to cell tower triangulation until satellite signals are received again. This allows the device 12 to be used inside buildings and other places where GPS devices do not always work.
  • the location-determining component 34 need not directly determine the current location of the device.
  • the location-determining component may determine the current geographic location through a communications network, such as by using Assisted GPS (A-GPS), or from another electronic device.
  • A-GPS Assisted GPS
  • the location-determining component 34 may even receive location data directly from the investigator or other user.
  • the display 36 is operable to display various information corresponding to the device and may comprise conventional black and white, monochrome, or color display elements including, but not limited to, Liquid Crystal Display (LCD), Thin Film Transistor (TFT) LCD, Polymer Light Emitting Diode (PLED), Organic Light Emitting Diode (OLED) and/or plasma display devices.
  • the display is of sufficient size to enable the user to easily view it while outdoors.
  • the display is a 2.8-inch TFT-LCD flat touch-sensitive screen with VGA resolution.
  • the display 36 may be integrated with the user interface 40 , such as in embodiments where the display is a touch-screen display to enable the user to interact with it by touching or pointing at display areas to provide information to the device.
  • the memory 38 may be integral with the location-determining component 34 , integral with the computing device 26 , stand-alone memory, or a combination of both.
  • the memory may include, for example, removable and non-removable memory elements such as RAM, ROM, Flash, magnetic, optical, USB memory devices, and/or other conventional memory elements.
  • the memory 38 may store various data associated with operation of the device 12 , such as the computer program and code segments mentioned above, or other data for instructing the computing device and other device elements to perform the steps described herein.
  • the memory may also be used to store data or signals representative of voices and sounds detected by the microphone 28 and the location data obtained by the location-determining component 34 . This data may be stored as a back-up to the data transmitted to the computers 14 , 16 or may serve as the primary storage when then mobile communication device cannot communicate with the computers.
  • the memory may store various cartographic data corresponding to geographic locations including map data, and map elements, such as terrain, alert locations, points of interest, geographic entities, and other navigation data to facilitate the various navigation functions provided by the device. Additionally, the memory may store destination addresses and previously calculated or otherwise acquired routes to various destination addresses for later retrieval by the computing device.
  • the memory 38 or some other memory accessible by the computing device 26 may also store cartographic information for roads, buildings, or other structures.
  • the cartographic information may be pre-loaded in the memory or other memory or may be downloaded to the device via the communication component 32 or I/O ports 44 .
  • cartographic information for a particular road or set of roads may be downloaded to the device based on a current location of the device as determined by the location-determining component.
  • the various data stored within the memory may be associated within one or more databases to facilitate retrieval of the information.
  • the databases may be configured to enable the computing device to automatically access the cartographic information based upon a current geographic location of the device.
  • a map-matching search engine may search through the database of cartographic information to find known locations which match a series of geographical coordinates.
  • a user may initiate a search or the search engine may automatically search the database based on a state of the device such as the current position of the device.
  • the search engine or alternatively a separate computation engine (also preferably comprised of software, firmware or the like executed by the computing device), may also perform calculations related to the cartographic information.
  • the map mapping search engine may also identify a map location.
  • the user interface 40 permits a user to operate the device and is generally associated with the housing, such as by physical connection through wires, etc, or wirelessly utilizing conventional various wireless protocols. However, the user interface need not be physically coupled with the housing.
  • the user interface includes a slide-out five-row QWERTY keyboard.
  • the user interface 40 may also comprise one or more functionable inputs such as buttons, switches, scroll wheels, a touch screen associated with the display, voice recognition elements such as a microphone, pointing devices such as mice, touchpads, trackballs, styluses, a camera such as a digital or film still or video camera, combinations thereof, etc. Further, the user interface may comprise wired or wireless data transfer elements such as removable memory including the memory, data transceivers, etc, to enable the user and other devices or parties to remotely interface with the device.
  • the user interface 40 may be operable to provide various information to the user utilizing the display or other visual or audio elements such as the speaker 30 .
  • the user interface enables the user and device to exchange information relating to the device, including geographic entities, configuration information, security information, preferences, route information, points of interests, alerts and alert notification, navigation information, waypoints, a destination address, etc.
  • the power source 42 provides electrical power to the other components of the device and may comprise conventional power supply elements, such as batteries, battery packs, etc.
  • the power source may also comprise power conduits, connectors, and receptacles operable to receive batteries, battery connectors, or power cables.
  • the power source may include both a battery to enable portable operation and a power input for receiving power from an external source such an automobile.
  • the power source is a rechargeable lithium-ion or lithium-ion polymer battery with a capacity of 1340 MAh.
  • the I/O ports 44 permit data and other information to be transferred to and from the computing device 26 and the location-determining component 34 .
  • the I/O ports 44 may include a Secure Disk Digital (SD) card slot, Mini SD Card slot, Micro SD Card slot or the like for receiving removable SD cards, Mini SD Cards, Micro SD Cards, or the like, and a USB port for coupling with a USB cable connected to another computing device such as a personal computer.
  • SD Secure Disk Digital
  • Mini SD Card slot Mini SD Card slot
  • Micro SD Card slot or the like for receiving removable SD cards, Mini SD Cards, Micro SD Cards, or the like
  • USB port for coupling with a USB cable connected to another computing device such as a personal computer.
  • Navigational software, cartographic maps and other data and information may be loaded in the device via the I/O ports or the communications component.
  • the satellite navigation receiver or other location-determining component 34 may be switched off periodically. For example, the receiver may be alternatively switched on for 30 seconds, off for two minutes, then back on for 30 seconds. If the location-determining component determines the electronic device is moving, it may be switched on more frequently. Alternatively, the location-determining component may be turned on whenever the device enters or leaves a particular geographic area or perimeter such as a geofence.
  • the vibration element 46 may be any device capable of vibrating the device or a portion thereof.
  • the vibration element consists of a miniature motor with an offset weighted shaft.
  • the device's housing may be handheld or otherwise portable to facilitate easy transport of the device.
  • the housing is preferably constructed from a suitable lightweight and impact-resistant material such as, for example, plastic, nylon, aluminum, or any combination thereof and may include one or more appropriate gaskets or seals to make it substantially waterproof or resistant.
  • the housing may take any suitable shape for size, and the particular size, weight and configuration of the housing may be changed without departing from the scope of the present invention.
  • the portable computers 14 , 16 may be laptop computers, personal computers, PDAs, smart phones, or any other devices capable of performing the functions described herein and are operated by surveillance team members or support personnel as discussed in more detail below.
  • support team is meant to encompass any person or groups of persons who may be assisting the investigator in an intelligence gathering mission.
  • the portable computers 14 , 16 are equipped with cellular communication components or other devices that enable them to transmit and receive voice and data via the wireless network 22 and/or communications network 24 and may also include location-determining components and associated software similar to the components and software in the mobile communication device.
  • the host computers 18 , 20 may serve as repositories for data and programs used to implement certain aspects of the present invention.
  • the host computers may be any computing devices such as network or server computers and may be connected to a firewall to prevent tampering with information stored on or accessible by the computers.
  • the functionality of the host computers may also be distributed amongst many different computers in a cloud computing environment.
  • the host computers 18 , 20 may operate or host a private, secure website accessible only by authorized support team members and investigators.
  • the host computers may include conventional web hosting operating software, an Internet connection such as a cable connection, satellite connection, DSL converter, or ISDN converter, and are assigned a URL and corresponding domain name so that the information hosted thereon can be accessed via the communication network in a conventional manner.
  • the host computers may also host and support software and services of proprietary mobile application providers such as Google, Apple, and Blackberry.
  • host computers 18 , 20 are described and illustrated herein, embodiments of the invention may use any combination of host computers and/or other computers or equipment.
  • the features and services described herein may be divided between the host computers or may all be implemented with only one of the host computers.
  • the equipment 10 may also include a data interchange format device for distinguishing the types of devices (e.g. mobile phone, desktop computer) that attempt to access the host computers 18 , 20 and for routing communications and requests to the host computers accordingly.
  • a data interchange format device for distinguishing the types of devices (e.g. mobile phone, desktop computer) that attempt to access the host computers 18 , 20 and for routing communications and requests to the host computers accordingly.
  • the wireless network 22 may be any communications network that permits wireless communications between the mobile communication device 22 , the portable computers 14 , 16 , and other similar devices.
  • the wireless network is a cellular phone network such as those operated by Sprint®, AT&T®, Verizon®, and other companies.
  • the cellular phone network may operate with GSM (Global System for Mobile communications), CDMA (Code Division Multiple Access), or any other known standards.
  • the communications network 24 is preferably the Internet but may be any other communications network such as a local area network, a wide area network, a wireless network, or an intranet.
  • the communications network may also be a combination of several networks.
  • the computer programs of the present invention are stored in or on computer-readable medium residing on or accessible by the mobile communication device 12 , the portable computers 14 , 16 , and/or the host computers 18 , 20 and preferably comprise ordered listings of executable instructions for implementing logical functions in the devices.
  • the computer programs can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device, and execute the instructions.
  • a “computer-readable medium” can be any means that can contain, store, communicate, propagate or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the computer-readable medium can be, for example, but not limited to, an electronic, magnetic, optical, electro-magnetic, infrared, or semi-conductor system, apparatus, device, or propagation medium. More specific, although not inclusive, examples of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable, programmable, read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disk read-only memory (CDROM).
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable, programmable, read-only memory
  • CDROM portable compact disk read-only memory
  • the above-described equipment 10 may be used in covert intelligence gathering missions to monitor and record a suspect or other person of interest and track the person's locations.
  • the mobile communications device 12 may be used by an investigator, one or more of the portable computes 14 , 16 may be used by support team members, and the host computer 18 , 20 may be accessed by the investigator, support team members, or any other authorized persons.
  • the mobile communication device includes a stealth mode in which its display may be turned off or otherwise deactivated to make the entire device appear to be turned off while its microphone continues to detect sounds and its communication component continues to transmit signals or data representative of the sounds to one of the portable computers.
  • the display presents screen graphics that suggest the device is being turned off but the components of the device necessary to gather and transmit intelligence data continue to run. This allows an investigator and support team to secretly record a person even though the mobile communication device is in plain view because the device appears to be turned off.
  • the device While in the stealth mode, the device may be used to make or receive phone calls, in which case the display will be turned on, so that no one but the investigator and others participating in the investigation will know the mobile communication device is in the stealth mode or that the stealth mode even exists.
  • the mobile communication device 12 can only be placed in the stealth mode after the investigator enters valid user information into the device and an authorized member of the support team enters valid acknowledgment information into one of the computers 14 , 16 and transmits it to the mobile communication device. Likewise, the stealth mode can only be cancelled after the investigator enters valid user information and a member of the support team enters and transmits to the device valid acknowledgment information. This permits the mobile communication device to be used as a conventional mobile phone while not in the stealth mode and ensures that the person being monitored cannot disable the stealth mode.
  • the mobile communication device 12 may also transmit data representative of its locations to the portable computers 14 , 16 along with the voice signals or data.
  • the transmitted location data may be cross-hatched or otherwise transmitted to the computers with the original satellite data to enable the data to be cross-referenced for authenticity purposes.
  • the mobile communication device 12 may be configured to simultaneously transmit both voice data and location data, just voice data, or just location data. In one embodiment, both the investigator and the support team must provide authorization if only voice data or only location data is to be transmitted.
  • the computers 14 , 16 may be programmed to map the location of the mobile communication device and provide directions to the mobile communication device in case the support team needs to quickly go to the investigator.
  • the mobile communication device 12 While in the stealth mode, the mobile communication device 12 preferably transmits the voice data or signals and the location data using TCP/IP data channels rather than the wireless network's voice channels. This allows the transmissions to be more easily encrypted. Importantly, the mobile communication device transmits the voice data or signals in real-time so the support team may monitor the investigator's and suspect's conversations and other sounds as they occur. This enables the support team to immediately respond or otherwise react to any distress signals.
  • One or more of the portable computers 14 , 16 may be programmed to wirelessly transmit a gain control instruction to the mobile communication device 12 , and the mobile communication device may be programmed to adjust a gain setting of its microphone in response thereto. This permits a surveillance team to monitor the recording of a suspect's conversations and other sounds and to adjust the mobile communication device's microphone gain to compensate for background noises, the distance between the investigator and the suspect, the suspect's voice level, and/or other factors.
  • One of the portable computers 14 , 16 may also be programmed to wirelessly transmit an alert signal to the mobile communication device 12 that activates the device's vibration element.
  • the mobile communication device may be programmed to vibrate once in response to an alert signal that is sent when the support team believes the investigator is in immediate danger, twice in response to a different alert signal that is sent when the support team believes the intelligence gathering mission should be aborted, and three or more times in response to other alert signals.
  • the mobile communication device may also include resident memory for storing the signals or data representative of the detected sounds and the location data. This permits gathered intelligence data to be stored locally on the mobile communication device and forwarded to the portable computers at a later time.
  • the mobile communication device 12 may also be programmed to receive and store geographic coordinates corresponding to a geofence or other boundary and to wirelessly transmit an alert to one of the portable computers 14 , 16 whenever the device enters or exits an area encompassed by the geofence. Similarly, the mobile communication device may be programmed to automatically switch to the stealth mode whenever the device enters or exits the area encompassed by the geofence.
  • the servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team.
  • Authorized persons may then request copies of the report in electronic form or other form.
  • the reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • the flow chart of FIG. 3 shows the functionality and operation of a preferred implementation of the present invention in more detail.
  • Some of the blocks of the flow chart may represent a module segment or portion of code of the computer programs of the present invention which comprises one or more executable instructions for implementing the specified logical function or functions.
  • the functions noted in the various blocks may occur out of the order depicted in FIG. 3 .
  • two blocks shown in succession in FIG. 3 may in fact be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order depending upon the functionality involved.
  • the mobile communication device 12 may be used by an investigator and the personal computers 14 , 16 may be used by members of a surveillance or support team working with the investigator.
  • the investigator and support team are ready to begin an intelligence gathering operation, the investigator first initiates the “stealth” mode on the mobile communication device as depicted in step 302 .
  • the investigator may be required to enter valid user information such as an identification number, an investigation case number, a password, etc.
  • the investigator may also be prompted to acknowledge at least one party (the investigator) consents to recording of conversations in compliance with federal law.
  • initiation of the stealth mode also requires the authorization of the support team as depicted in step 304 .
  • the support team may be required to establish communications between one of the computers 14 , 16 and the mobile communication device 12 via the wireless network and/or the communication network and then enter required identification information such as an identification number, an investigation case number, a password, etc. Once this information is entered into one of the portable computers, a notification is sent to the mobile communication device to let the investigator know the support team is “in place” and ready to provide necessary support as depicted in step 306 .
  • Initiation of the stealth mode may finally require the investigator to acknowledge or otherwise respond to the notification sent by the support team as depicted in step 308 .
  • Sending the acknowledgment may then automatically switch the mobile communication device to the stealth mode as depicted in step 310 so that the investigator and support team may begin to covertly detect and record voices of the investigator and a person being monitored.
  • the mobile communication device 12 While in the stealth mode, the mobile communication device 12 records voices and other sounds and secretly transmits signals or data representative of the detected sounds to at least one of the computers 14 , 16 via the wireless network 22 as depicted in steps 312 and 314 .
  • the mobile communication device also receives signals from the satellites, determines its current location, and transmits signals or data representative of its current location to at least one of the computers so the support team may track the location of the investigator.
  • the mobile communication device remains in the stealth mode until both the investigator and the support team request termination of the mode.
  • the investigator may request termination of the stealth mode by entering valid user information such as an identification number, an investigation case number, a password, etc. as depicted in step 316 . If the investigator enters incorrect information, the mobile communication device either remains in the stealth mode or may send an alert message to the support team.
  • the investigator may indicate that he or she requires immediate back-up by entering a particular alert code and/or an electronic signature. This prompts the mobile communication device to send an alert message to the support team in accordance with the entered alert code.
  • the mobile communication device may include multiple alert codes for different scenarios. For example, one alert code may request immediate back-up for an emergency situation whereas another alert code may simply indicate that the monitored person has left the scene but may be returning.
  • the support team After the support team receives the investigator's request to terminate the stealth mode and verifies that no further intelligence gathering is required, the support team deactivates the stealth mode as depicted in steps 318 , 320 , and 324 . If the support team determines the investigator did not properly terminate the stealth mode, the team may assume the mobile communication device is being operated by someone other than the investigator and/or that the investigator has signaled for help as depicted in step 322 .
  • the support team members and/or other authorized persons may monitor the voice communications and location information transmitted by the mobile communication device. This may be done by directly establishing a communication link to the mobile communication device through the wireless network or by accessing voice data and location data uploaded to one of the servers 18 , 20 .
  • the servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team.
  • Authorized persons may then request copies of the report in electronic form or other form.
  • the reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • the flow chart of FIG. 4 shows the functionality and operation of another preferred implementation of the present invention in more detail.
  • some of the blocks of the flow chart may represent a module segment or portion of code of the computer programs of the present invention which comprises one or more executable instructions for implementing the specified logical function or functions.
  • the functions noted in the various blocks may occur out of the order depicted in FIG. 4 .
  • Steps 402 through 414 are substantially identical to steps 302 through 314 of FIG. 3 .
  • a support team member operating one of the portable computers monitors the voices and other sounds transmitted by the mobile communication device 12 . If the recorded voices are too low or otherwise difficult to understand, the support team member may instruct the portable computer to send a gain control instruction to the mobile communication device to increase the gain of the device's microphone as depicted in step 418 . Likewise, if the detected voices are too loud or difficult to interpret because of too much background noise, the support team member may instruct the portable computer to send a gain control instruction to the mobile communication device to decrease the gain of the mobile communication device's microphone. Other operating characteristics of the mobile communication device may also be monitored and adjusted in this manner. For example, one of the portable computers may receive data from the mobile communication device representative of the mobile communication device's battery level, signal reception strength, and memory capacity and then permit a support team member to adjust operating characteristics of the mobile communication device and/or alert the investigator.

Abstract

A mobile communication device that may be used by an investigator to secretly record a suspect and track the investigator's location includes a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a display for displaying information related to operation of the device, a computing device, and a computer program implemented by the computing device. The computer program is operable to place the device in a stealth mode in which the display is turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to a surveillance or support team operating one of the portable computers. The mobile communication device may also include a location-determining component for determining geographic locations of the device and for transmitting location data to the portable computer.

Description

    RELATED APPLICATIONS
  • The present application is a continuation patent application and claims priority benefit, with regard to all common subject matter, of earlier-filed U.S. nonprovisional patent application titled “SYSTEM, METHOD, AND DEVICE FOR INTELLIGENCE GATHERING AND POSITION TRACKING,” Ser. No. 13/909,347, filed Jun. 4, 2013, which is hereby incorporated by reference in its entirety into the present application.
  • BACKGROUND
  • The present invention relates to systems, methods, and devices for gathering intelligence data. More particularly, embodiments of the invention relate to a mobile communication device that may be used to secretly record conversations of a suspect or other person and track the person's location.
  • Law enforcement officers, intelligence agents, military personnel, and other investigators often engage in covert intelligence gathering missions during which suspects and other persons of interest are secretly recorded with microphones and radio frequency transmitters worn by the investigators. Unfortunately, such microphones and transmitters are difficult to hide, easy to detect, and often make undesirable sounds, especially when used in the vicinity of other wireless transmitters and receivers.
  • Surveillance or support teams working with investigators also often wish to track the locations of the investigators and/or the persons being monitored. This requires that the investigators carry separate GPS receivers or other devices, making it even more difficult to hide the surveillance equipment. Use of both hidden microphones/transmitters and GPS receivers is also expensive and cumbersome.
  • Accordingly, there is a need for improved intelligence gathering methods and devices.
  • SUMMARY
  • The present invention solves some of the above-described problems and provides a distinct advance in the art of intelligence gathering methods and devices.
  • Embodiments of the invention can be implemented in hardware, software, firmware, or a combination thereof. In one exemplary embodiment, the invention is implemented with at least one mobile communication device operated by an investigator or other person gathering intelligence information, one or more portable computers operated by members of a support team assisting the investigator, and one or more host computers for storing data and other information gathered by the mobile communication device and the portable computers. The mobile communication device, portable computers, and host computers may all communicate and exchange data and other information via a wireless network and/or a communications network.
  • One embodiment of the mobile communication device comprises a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a display for displaying information related to operation of the device, a computing device, and a computer program implemented by the computing device.
  • In accordance with one important aspect of the invention, the computer program is operable to place the mobile communication device in a stealth mode in which the display may be turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to one of the portable computers. If the investigator or anyone else attempts to turn the mobile communication device off while it is in the stealth mode, the computer program presents screen graphics that suggest the device is being turned off, but the components of the device necessary to gather and transmit intelligence data continue to run. This allows an investigator and support team to secretly record a person even though the mobile communication device is in plain view because the device appears to be turned off. While in the stealth mode, the mobile communication device may be used to make or receive phone calls or perform other functions, in which case the display will be turned on, so that no one but the investigator and others participating in the investigation will know the device is in the stealth mode or that the stealth mode even exists.
  • In some embodiments, the mobile communication device can only be placed in the stealth mode after the investigator enters valid user information and an authorized member of the support team enters and transmits to the device valid acknowledgment information. Likewise, the stealth mode can only be cancelled after the investigator enters valid user information and a member of the support team enters and transmits to the device valid acknowledgment information. In other embodiments, the investigator and/or the support team may be required to only enter a passcode to initiate the stealth mode. Both embodiments permit the mobile communication device to be used as a conventional mobile phone while not in the stealth mode and ensure that the person being monitored cannot disable the stealth mode.
  • The mobile communication device may also include a GPS receiver or other location-determining component for determining geographic locations of the device and may transmit data representative of the geographic locations to one of the portable computers along with the voice signals or data. This allows the support team to track the location of the investigator and person being monitored even when the device is in the stealth mode.
  • While in the stealth mode, the mobile communication device preferably transmits the voice data or signals and the location data using TCP/IP data channels rather than the wireless network's voice channels. This allows the transmissions to be more easily encrypted and less vulnerable to interception. Importantly, the mobile communication device transmits the voice data or signals in real-time so the support team may monitor the investigator's and suspect's conversations and other sounds as they occur. This enables the support team to immediately respond or otherwise react to any distress signals.
  • In other embodiments, one of the portable computers may be programmed to wirelessly transmit a gain control instruction to the mobile communication device, and the mobile communication device may be programmed to adjust a gain setting of its microphone in response thereto. This permits a surveillance team to monitor the recording of a suspect's conversations and other sounds and to adjust the mobile communication device's microphone gain to compensate for background noises, the distance between the investigator and the suspect, the suspect's voice level, and/or other factors.
  • The mobile communication device may also include a vibration element that vibrates the housing of the device in a conventional manner. One of the portable computers may be programmed to wirelessly transmit an alert signal to the mobile communication device that causes the device to activate its vibration element. The mobile communication device may be programmed to vibrate once in response to an alert signal that is sent when the support team believes the investigator is in immediate danger, twice in response to a different alert signal that is sent when the support team believes the intelligence gathering mission should be aborted, and three or more times in response to other alert signals.
  • The mobile communication device may also include resident memory for storing the voice signals or data and the location data. This allows the device to “store and forward” intelligence data in the event the mobile communication device and portable computers cannot communicate.
  • The mobile communication device may also be programmed to receive and store geographic coordinates corresponding to a geofence or other boundary and to wirelessly transmit an alert to one of the portable computers whenever the device enters or exits an area encompassed by the geofence. Similarly, the mobile communication device may be programmed to automatically switch to the stealth mode whenever the device enters or exits the area encompassed by the geofence.
  • In a particular embodiment of the invention, the mobile communication device is a GPS-enabled “smart-phone” such as the HTC Touch Pro™ that has been programmed to perform the functions described herein. Use of an otherwise conventional mobile phone that has been programmed in accordance with the present invention permits law enforcement agencies and other entities to implement intelligence gathering missions without purchasing expensive stand-alone surveillance equipment.
  • After an intelligence gathering session has been completed, all voice and location data gathered by the mobile communication device and portable computers is uploaded to the server computers via the communication network. The servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team. Authorized persons may then request copies of the report in electronic form or other form. The reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • This summary is provided to introduce a selection of concepts in a simplified form that are further described in the detailed description below. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Other aspects and advantages of the present invention will be apparent from the following detailed description of the embodiments and the accompanying drawing figures.
  • BRIEF DESCRIPTION OF THE DRAWING FIGURES
  • Embodiments of the present invention are described in detail below with reference to the attached drawing figures, wherein:
  • FIG. 1 is a schematic diagram of exemplary computer and communication equipment that may be used to implement embodiments of the present invention;
  • FIG. 2 is a block diagram illustrating selected components of a mobile communication device that may be used to implement embodiments of the invention;
  • FIG. 3 is a flow diagram depicting a method in accordance with an embodiment of the invention; and
  • FIG. 4 is a flow diagram depicting a method in accordance with another embodiment of the invention.
  • The drawing figures do not limit the present invention to the specific embodiments disclosed and described herein. The drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the invention.
  • DETAILED DESCRIPTION
  • The following detailed description of embodiments of the invention references the accompanying drawings. The embodiments are intended to describe aspects of the invention in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments can be utilized and changes can be made without departing from the scope of the claims. The following detailed description is, therefore, not to be taken in a limiting sense. The scope of the present invention is defined only by the appended claims, along with the full scope of equivalents to which such claims are entitled.
  • The present invention relates to a system, method, and device for audio intelligence gathering and position tracking Embodiments of the invention can be implemented in hardware, software, firmware, or a combination thereof. In one exemplary embodiment, the invention is implemented with one or more computer programs and computer and communications equipment broadly referred to by the numeral 10 in FIG. 1. The exemplary equipment 10 may include at least one mobile communication device 12, one or more portable computers 14, 16, and one or more host computers 18, 20, all of which may communicate and exchange data and other information via a wireless network 22 and/or a communications network 24. The computer programs and equipment 10 illustrated and described herein are merely examples ofprograms and equipment that may be used to implement embodiments of the invention and may be replaced with other programs and equipment without departing from the scope of the invention. Similarly, although FIG. 1 illustrates a particular number of mobile communication devices, portable computers, and host computers, any number of these devices may be used without departing from the scope of the invention.
  • The mobile communication device 12 may be used by a law enforcement officer, intelligence agent, military agent, or any other investigator wishing to gather intelligence information concerning a suspect or other monitored person. As used herein, “investigator” is meant to encompass any user of the mobile communication device 12, and “monitored person” and “suspect” are meant to encompass anyone being investigated and/or monitored by the investigator.
  • The mobile communication device 12 may be any device that can detect voice communications and other sounds and transmit and receive voice and data via the wireless network 22. The mobile communication device may be, for example, a wireless phone, a GPS-enabled wireless phone, a phone-enabled GPS device, a phone-enabled personal digital assistant (PDA), a phone-enabled MP3 device, or any other wireless communication device. In one particular embodiment, the mobile communication device 12 is an HTC Touch Pro™ communication device or equivalent device that has been programmed as described herein. The particular mobile communication device 12 and its components illustrated and described herein are merely examples of a device and components that may be used to implement aspects of the present invention and may be replaced with other devices and components without departing from the scope of the present invention.
  • Key components of the mobile communication device 12 are illustrated in FIG. 2 and include a computing device 26, a microphone 28, a speaker 30, a communications component 32, a location-determining component 34, a display 36, memory 38, a user interface 40, a power source 42, one or more I/O ports 44, a vibration element 46, and a housing or enclosure.
  • The computing device 26 may include any number of processors, controllers, integrated circuits, programmable logic devices, or other computing devices and resident or external memory for storing data and other information accessed and/or generated by the device. In one embodiment, the computing device includes a Qualcomm® MSM7201A 528 MHZ processor with 512 MB of ROM, 288 MB of RAM, and Windows Mobile® 6.1 Professional Operating System. The computing device is preferably coupled with other components of the mobile communication device through wired or wireless connections, such as a data bus 48, to enable information to be exchanged between the various components.
  • The computing device 26 may implement a computer program and/or code segments to perform some of the functions described herein. The computer program may comprise an ordered listing of executable instructions for implementing logical functions in the computing device of the mobile communication device as described in more detail below.
  • The microphone 28 and speaker 30 are preferably built into the housing and are provided for detecting and reproducing voice communications and other sounds. As described in more detail below, the gain of the microphone and speaker may be manually adjusted by an operator of the mobile communication device or remotely adjusted by an operator of one of the computers.
  • The communications component 32 enables the device to communicate with the computers 14, 16 and other mobile phones and similar devices through the wireless network 22 and/or the communications network 24. The communications component may transmit and receive any communications including incoming and outgoing phone calls, TCP/IP data transmissions, text messages, instant messages, voicemail messages, e-mail messages, missed phone calls, and any other known communications. The communications component may communicate utilizing wireless data transfer methods such as cellular telephony, WiFi (802.11), Wi-Max, Bluetooth™, ANT®, ultra-wideband, infrared, radio frequency, etc. In one embodiment, the communications component is a cellular transceiver for transmitting and receiving communications over a cellular phone network such as those operated by Sprint®, AT&T®, Verizon®, and other companies.
  • The communications component 32 may also include a Frequency Modulated (FM) receiver and may permit communications over several different networks. For example, the device may be operable to transmit and receive communications over a cellular network, a short-range FM radio network, and a WiFi network.
  • The location-determining component 34 determines locations of the device 12 as it is carried or otherwise moved from place to place and generates corresponding location data that may be transmitted to the computers or host computers as described below. In a particular embodiment, the location-determining component 34 is a satellite navigation receiver that works with a global navigation satellite system (GNSS) such as the global positioning system (GPS) primarily used in the United States, the GLONASS system primarily used in the Soviet Union, or the Galileo system primarily used in Europe. As shown in FIG. 1, a GNSS includes a plurality of satellites 50 in orbit about the Earth. The orbit of each satellite is not necessarily synchronous with the orbits of other satellites and, in fact, is likely asynchronous. The satellite navigation receiver receives spread spectrum satellite signals from the various satellites.
  • The spread spectrum signals continuously transmitted from each satellite 50 utilize a highly accurate frequency standard accomplished with an extremely accurate atomic clock. Each satellite, as part of its data signal transmission, transmits a data stream indicative of that particular satellite. The device 12 must acquire spread spectrum satellite signals from at least three satellites for its receiver to calculate its two-dimensional position by triangulation. Acquisition of an additional signal, resulting in signals from a total of four satellites, permits the device to calculate its three-dimensional position.
  • The location-determining component 34 and the computing device 26 are operable to receive navigational signals from the satellites 50 and to calculate positions of the device 12 as a function of the signals. The location-determining component and computing device may also determine track logs or any other series of geographic coordinates corresponding to points along a road or other path traveled by the investigator or other user of the device 12. The location-determining component 34 and/or the computing device may also calculate routes to desired locations, provide instructions to navigate to the desired locations, display maps and other information on the display screen, and execute other functions described herein.
  • The location-determining component 34 may include an antenna to assist in receiving the satellite signals. The antenna may be a patch antenna, a linear antenna, or any other type of antenna that can be used with navigational devices. The antenna may be mounted directly on or in the housing or may be mounted external to the housing.
  • The location-determining component 34 may include one or more processors, controllers, or other computing devices and memory so that it may calculate location and other geographic information without the computing device or it may utilize the components of the computing device. Further, the location-determining component may be integral with the computing device such that the location-determining component may be operable to specifically perform the various functions described herein. Thus, the computing device 26 and location-determining component can be combined or be separate or otherwise discrete elements.
  • Although embodiments of the mobile communication device 12 may include a satellite navigation receiver, it will be appreciated that other location-determining technology may be used. For example, the communication component 32 may be used to determine the location of the device by receiving data from at least three transmitting locations and then performing basic triangulation calculations to determine the relative position of the device with respect to the transmitting locations. For example, cellular towers or any customized transmitting radio frequency towers can be used instead of satellites 50. With such a configuration, any standard geometric triangulation algorithm can be used to determine the location of the electronic device.
  • In one embodiment, the mobile communication device 12 may use both a GPS receiver and cell tower triangulation to determine its position. For example, the device may first attempt to obtain a signal fix from at least three GPS satellites 50. If it is unable to do so due to blocked or otherwise unavailable satellite signals, it reverts to cell tower triangulation until satellite signals are received again. This allows the device 12 to be used inside buildings and other places where GPS devices do not always work.
  • In other embodiments, the location-determining component 34 need not directly determine the current location of the device. For instance, the location-determining component may determine the current geographic location through a communications network, such as by using Assisted GPS (A-GPS), or from another electronic device. The location-determining component 34 may even receive location data directly from the investigator or other user.
  • The display 36 is operable to display various information corresponding to the device and may comprise conventional black and white, monochrome, or color display elements including, but not limited to, Liquid Crystal Display (LCD), Thin Film Transistor (TFT) LCD, Polymer Light Emitting Diode (PLED), Organic Light Emitting Diode (OLED) and/or plasma display devices. Preferably, the display is of sufficient size to enable the user to easily view it while outdoors. In one particular embodiment, the display is a 2.8-inch TFT-LCD flat touch-sensitive screen with VGA resolution. The display 36 may be integrated with the user interface 40, such as in embodiments where the display is a touch-screen display to enable the user to interact with it by touching or pointing at display areas to provide information to the device.
  • The memory 38 may be integral with the location-determining component 34, integral with the computing device 26, stand-alone memory, or a combination of both. The memory may include, for example, removable and non-removable memory elements such as RAM, ROM, Flash, magnetic, optical, USB memory devices, and/or other conventional memory elements.
  • The memory 38 may store various data associated with operation of the device 12, such as the computer program and code segments mentioned above, or other data for instructing the computing device and other device elements to perform the steps described herein. The memory may also be used to store data or signals representative of voices and sounds detected by the microphone 28 and the location data obtained by the location-determining component 34. This data may be stored as a back-up to the data transmitted to the computers 14, 16 or may serve as the primary storage when then mobile communication device cannot communicate with the computers. Further, the memory may store various cartographic data corresponding to geographic locations including map data, and map elements, such as terrain, alert locations, points of interest, geographic entities, and other navigation data to facilitate the various navigation functions provided by the device. Additionally, the memory may store destination addresses and previously calculated or otherwise acquired routes to various destination addresses for later retrieval by the computing device.
  • To implement functions and features of the present invention, the memory 38 or some other memory accessible by the computing device 26 may also store cartographic information for roads, buildings, or other structures. The cartographic information may be pre-loaded in the memory or other memory or may be downloaded to the device via the communication component 32 or I/O ports 44. For example, cartographic information for a particular road or set of roads may be downloaded to the device based on a current location of the device as determined by the location-determining component.
  • The various data stored within the memory may be associated within one or more databases to facilitate retrieval of the information. For example, the databases may be configured to enable the computing device to automatically access the cartographic information based upon a current geographic location of the device.
  • A map-matching search engine, preferably comprised of software, firmware or the like executed by the computing device 26, may search through the database of cartographic information to find known locations which match a series of geographical coordinates. A user may initiate a search or the search engine may automatically search the database based on a state of the device such as the current position of the device. The search engine, or alternatively a separate computation engine (also preferably comprised of software, firmware or the like executed by the computing device), may also perform calculations related to the cartographic information. The map mapping search engine may also identify a map location.
  • The user interface 40 permits a user to operate the device and is generally associated with the housing, such as by physical connection through wires, etc, or wirelessly utilizing conventional various wireless protocols. However, the user interface need not be physically coupled with the housing. In one embodiment of the device, the user interface includes a slide-out five-row QWERTY keyboard.
  • The user interface 40 may also comprise one or more functionable inputs such as buttons, switches, scroll wheels, a touch screen associated with the display, voice recognition elements such as a microphone, pointing devices such as mice, touchpads, trackballs, styluses, a camera such as a digital or film still or video camera, combinations thereof, etc. Further, the user interface may comprise wired or wireless data transfer elements such as removable memory including the memory, data transceivers, etc, to enable the user and other devices or parties to remotely interface with the device.
  • The user interface 40 may be operable to provide various information to the user utilizing the display or other visual or audio elements such as the speaker 30. Thus, the user interface enables the user and device to exchange information relating to the device, including geographic entities, configuration information, security information, preferences, route information, points of interests, alerts and alert notification, navigation information, waypoints, a destination address, etc.
  • The power source 42 provides electrical power to the other components of the device and may comprise conventional power supply elements, such as batteries, battery packs, etc. The power source may also comprise power conduits, connectors, and receptacles operable to receive batteries, battery connectors, or power cables. For example, the power source may include both a battery to enable portable operation and a power input for receiving power from an external source such an automobile. In one embodiment, the power source is a rechargeable lithium-ion or lithium-ion polymer battery with a capacity of 1340 MAh.
  • The I/O ports 44 permit data and other information to be transferred to and from the computing device 26 and the location-determining component 34. The I/O ports 44 may include a Secure Disk Digital (SD) card slot, Mini SD Card slot, Micro SD Card slot or the like for receiving removable SD cards, Mini SD Cards, Micro SD Cards, or the like, and a USB port for coupling with a USB cable connected to another computing device such as a personal computer. Navigational software, cartographic maps and other data and information may be loaded in the device via the I/O ports or the communications component.
  • To preserve battery life, the satellite navigation receiver or other location-determining component 34 may be switched off periodically. For example, the receiver may be alternatively switched on for 30 seconds, off for two minutes, then back on for 30 seconds. If the location-determining component determines the electronic device is moving, it may be switched on more frequently. Alternatively, the location-determining component may be turned on whenever the device enters or leaves a particular geographic area or perimeter such as a geofence.
  • The vibration element 46 may be any device capable of vibrating the device or a portion thereof. In one embodiment, the vibration element consists of a miniature motor with an offset weighted shaft.
  • The device's housing may be handheld or otherwise portable to facilitate easy transport of the device. The housing is preferably constructed from a suitable lightweight and impact-resistant material such as, for example, plastic, nylon, aluminum, or any combination thereof and may include one or more appropriate gaskets or seals to make it substantially waterproof or resistant. The housing may take any suitable shape for size, and the particular size, weight and configuration of the housing may be changed without departing from the scope of the present invention.
  • The portable computers 14, 16 may be laptop computers, personal computers, PDAs, smart phones, or any other devices capable of performing the functions described herein and are operated by surveillance team members or support personnel as discussed in more detail below. As used herein, “support team” is meant to encompass any person or groups of persons who may be assisting the investigator in an intelligence gathering mission. The portable computers 14, 16 are equipped with cellular communication components or other devices that enable them to transmit and receive voice and data via the wireless network 22 and/or communications network 24 and may also include location-determining components and associated software similar to the components and software in the mobile communication device.
  • The host computers 18, 20 may serve as repositories for data and programs used to implement certain aspects of the present invention. The host computers may be any computing devices such as network or server computers and may be connected to a firewall to prevent tampering with information stored on or accessible by the computers. The functionality of the host computers may also be distributed amongst many different computers in a cloud computing environment.
  • The host computers 18, 20 may operate or host a private, secure website accessible only by authorized support team members and investigators. The host computers may include conventional web hosting operating software, an Internet connection such as a cable connection, satellite connection, DSL converter, or ISDN converter, and are assigned a URL and corresponding domain name so that the information hosted thereon can be accessed via the communication network in a conventional manner. The host computers may also host and support software and services of proprietary mobile application providers such as Google, Apple, and Blackberry.
  • Although two host computers 18, 20 are described and illustrated herein, embodiments of the invention may use any combination of host computers and/or other computers or equipment. For example, the features and services described herein may be divided between the host computers or may all be implemented with only one of the host computers.
  • The equipment 10 may also include a data interchange format device for distinguishing the types of devices (e.g. mobile phone, desktop computer) that attempt to access the host computers 18, 20 and for routing communications and requests to the host computers accordingly.
  • The wireless network 22 may be any communications network that permits wireless communications between the mobile communication device 22, the portable computers 14, 16, and other similar devices. In one embodiment, the wireless network is a cellular phone network such as those operated by Sprint®, AT&T®, Verizon®, and other companies. The cellular phone network may operate with GSM (Global System for Mobile communications), CDMA (Code Division Multiple Access), or any other known standards.
  • The communications network 24 is preferably the Internet but may be any other communications network such as a local area network, a wide area network, a wireless network, or an intranet. The communications network may also be a combination of several networks.
  • The computer programs of the present invention are stored in or on computer-readable medium residing on or accessible by the mobile communication device 12, the portable computers 14, 16, and/or the host computers 18, 20 and preferably comprise ordered listings of executable instructions for implementing logical functions in the devices. The computer programs can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device, and execute the instructions. In the context of this application, a “computer-readable medium” can be any means that can contain, store, communicate, propagate or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-readable medium can be, for example, but not limited to, an electronic, magnetic, optical, electro-magnetic, infrared, or semi-conductor system, apparatus, device, or propagation medium. More specific, although not inclusive, examples of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable, programmable, read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disk read-only memory (CDROM).
  • The above-described equipment 10 may be used in covert intelligence gathering missions to monitor and record a suspect or other person of interest and track the person's locations. Specifically, the mobile communications device 12 may be used by an investigator, one or more of the portable computes 14, 16 may be used by support team members, and the host computer 18, 20 may be accessed by the investigator, support team members, or any other authorized persons. In accordance with one important aspect of the present invention, the mobile communication device includes a stealth mode in which its display may be turned off or otherwise deactivated to make the entire device appear to be turned off while its microphone continues to detect sounds and its communication component continues to transmit signals or data representative of the sounds to one of the portable computers. If the investigator or anyone else attempts to turn the mobile communication device off while it is in the stealth mode, the display presents screen graphics that suggest the device is being turned off but the components of the device necessary to gather and transmit intelligence data continue to run. This allows an investigator and support team to secretly record a person even though the mobile communication device is in plain view because the device appears to be turned off. While in the stealth mode, the device may be used to make or receive phone calls, in which case the display will be turned on, so that no one but the investigator and others participating in the investigation will know the mobile communication device is in the stealth mode or that the stealth mode even exists.
  • The mobile communication device 12 can only be placed in the stealth mode after the investigator enters valid user information into the device and an authorized member of the support team enters valid acknowledgment information into one of the computers 14, 16 and transmits it to the mobile communication device. Likewise, the stealth mode can only be cancelled after the investigator enters valid user information and a member of the support team enters and transmits to the device valid acknowledgment information. This permits the mobile communication device to be used as a conventional mobile phone while not in the stealth mode and ensures that the person being monitored cannot disable the stealth mode.
  • The mobile communication device 12 may also transmit data representative of its locations to the portable computers 14, 16 along with the voice signals or data. The transmitted location data may be cross-hatched or otherwise transmitted to the computers with the original satellite data to enable the data to be cross-referenced for authenticity purposes.
  • The mobile communication device 12 may be configured to simultaneously transmit both voice data and location data, just voice data, or just location data. In one embodiment, both the investigator and the support team must provide authorization if only voice data or only location data is to be transmitted. The computers 14, 16 may be programmed to map the location of the mobile communication device and provide directions to the mobile communication device in case the support team needs to quickly go to the investigator.
  • While in the stealth mode, the mobile communication device 12 preferably transmits the voice data or signals and the location data using TCP/IP data channels rather than the wireless network's voice channels. This allows the transmissions to be more easily encrypted. Importantly, the mobile communication device transmits the voice data or signals in real-time so the support team may monitor the investigator's and suspect's conversations and other sounds as they occur. This enables the support team to immediately respond or otherwise react to any distress signals.
  • One or more of the portable computers 14, 16 may be programmed to wirelessly transmit a gain control instruction to the mobile communication device 12, and the mobile communication device may be programmed to adjust a gain setting of its microphone in response thereto. This permits a surveillance team to monitor the recording of a suspect's conversations and other sounds and to adjust the mobile communication device's microphone gain to compensate for background noises, the distance between the investigator and the suspect, the suspect's voice level, and/or other factors.
  • One of the portable computers 14, 16 may also be programmed to wirelessly transmit an alert signal to the mobile communication device 12 that activates the device's vibration element. The mobile communication device may be programmed to vibrate once in response to an alert signal that is sent when the support team believes the investigator is in immediate danger, twice in response to a different alert signal that is sent when the support team believes the intelligence gathering mission should be aborted, and three or more times in response to other alert signals.
  • The mobile communication device may also include resident memory for storing the signals or data representative of the detected sounds and the location data. This permits gathered intelligence data to be stored locally on the mobile communication device and forwarded to the portable computers at a later time.
  • The mobile communication device 12 may also be programmed to receive and store geographic coordinates corresponding to a geofence or other boundary and to wirelessly transmit an alert to one of the portable computers 14, 16 whenever the device enters or exits an area encompassed by the geofence. Similarly, the mobile communication device may be programmed to automatically switch to the stealth mode whenever the device enters or exits the area encompassed by the geofence.
  • After an intelligence gathering session has been completed, all voice and location data gathered by the mobile communication device 12 and portable computers 14, 16 is uploaded to the server computers 18, 20 via the communication network 24. The servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team. Authorized persons may then request copies of the report in electronic form or other form. The reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • The flow chart of FIG. 3 shows the functionality and operation of a preferred implementation of the present invention in more detail. Some of the blocks of the flow chart may represent a module segment or portion of code of the computer programs of the present invention which comprises one or more executable instructions for implementing the specified logical function or functions. In some alternative implementations, the functions noted in the various blocks may occur out of the order depicted in FIG. 3. For example, two blocks shown in succession in FIG. 3 may in fact be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order depending upon the functionality involved.
  • As discussed above, the mobile communication device 12 may be used by an investigator and the personal computers 14, 16 may be used by members of a surveillance or support team working with the investigator. When the investigator and support team are ready to begin an intelligence gathering operation, the investigator first initiates the “stealth” mode on the mobile communication device as depicted in step 302.
  • To initiate the stealth mode, the investigator may be required to enter valid user information such as an identification number, an investigation case number, a password, etc. The investigator may also be prompted to acknowledge at least one party (the investigator) consents to recording of conversations in compliance with federal law.
  • In some embodiments, initiation of the stealth mode also requires the authorization of the support team as depicted in step 304. For example, the support team may be required to establish communications between one of the computers 14, 16 and the mobile communication device 12 via the wireless network and/or the communication network and then enter required identification information such as an identification number, an investigation case number, a password, etc. Once this information is entered into one of the portable computers, a notification is sent to the mobile communication device to let the investigator know the support team is “in place” and ready to provide necessary support as depicted in step 306.
  • Initiation of the stealth mode may finally require the investigator to acknowledge or otherwise respond to the notification sent by the support team as depicted in step 308. Sending the acknowledgment may then automatically switch the mobile communication device to the stealth mode as depicted in step 310 so that the investigator and support team may begin to covertly detect and record voices of the investigator and a person being monitored.
  • While in the stealth mode, the mobile communication device 12 records voices and other sounds and secretly transmits signals or data representative of the detected sounds to at least one of the computers 14, 16 via the wireless network 22 as depicted in steps 312 and 314. The mobile communication device also receives signals from the satellites, determines its current location, and transmits signals or data representative of its current location to at least one of the computers so the support team may track the location of the investigator.
  • In one embodiment, the mobile communication device remains in the stealth mode until both the investigator and the support team request termination of the mode. The investigator may request termination of the stealth mode by entering valid user information such as an identification number, an investigation case number, a password, etc. as depicted in step 316. If the investigator enters incorrect information, the mobile communication device either remains in the stealth mode or may send an alert message to the support team. For example, in one embodiment, the investigator may indicate that he or she requires immediate back-up by entering a particular alert code and/or an electronic signature. This prompts the mobile communication device to send an alert message to the support team in accordance with the entered alert code. The mobile communication device may include multiple alert codes for different scenarios. For example, one alert code may request immediate back-up for an emergency situation whereas another alert code may simply indicate that the monitored person has left the scene but may be returning.
  • After the support team receives the investigator's request to terminate the stealth mode and verifies that no further intelligence gathering is required, the support team deactivates the stealth mode as depicted in steps 318, 320, and 324. If the support team determines the investigator did not properly terminate the stealth mode, the team may assume the mobile communication device is being operated by someone other than the investigator and/or that the investigator has signaled for help as depicted in step 322.
  • During or after an intelligence gathering session, the support team members and/or other authorized persons may monitor the voice communications and location information transmitted by the mobile communication device. This may be done by directly establishing a communication link to the mobile communication device through the wireless network or by accessing voice data and location data uploaded to one of the servers 18, 20.
  • After an intelligence gathering session has been completed, all voice and location data gathered by the portable computers 14, 16 is uploaded to the server computers 18, 20 via the communication network 24 as depicted in step 326. The servers may then generate a report that contains an audio file of all recorded communications and other sounds, a location tracking file that contains geographical coordinates for the mobile communication device during the intelligence session, the investigator's identification information, the exact log-in and log-out times for the stealth mode, and electronic signatures of the investigator and one or more members of the support team. Authorized persons may then request copies of the report in electronic form or other form. The reports may be used for any permitted purposes including as evidence in investigations, trials, and/or other proceedings.
  • The flow chart of FIG. 4 shows the functionality and operation of another preferred implementation of the present invention in more detail. As mentioned above, some of the blocks of the flow chart may represent a module segment or portion of code of the computer programs of the present invention which comprises one or more executable instructions for implementing the specified logical function or functions. In some alternative implementations, the functions noted in the various blocks may occur out of the order depicted in FIG. 4.
  • Steps 402 through 414 are substantially identical to steps 302 through 314 of FIG. 3. In step 416, a support team member operating one of the portable computers monitors the voices and other sounds transmitted by the mobile communication device 12. If the recorded voices are too low or otherwise difficult to understand, the support team member may instruct the portable computer to send a gain control instruction to the mobile communication device to increase the gain of the device's microphone as depicted in step 418. Likewise, if the detected voices are too loud or difficult to interpret because of too much background noise, the support team member may instruct the portable computer to send a gain control instruction to the mobile communication device to decrease the gain of the mobile communication device's microphone. Other operating characteristics of the mobile communication device may also be monitored and adjusted in this manner. For example, one of the portable computers may receive data from the mobile communication device representative of the mobile communication device's battery level, signal reception strength, and memory capacity and then permit a support team member to adjust operating characteristics of the mobile communication device and/or alert the investigator.
  • Although the invention has been described with reference to the preferred embodiment illustrated in the attached drawing figures, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims.

Claims (25)

Having thus described the preferred embodiment of the invention, what is claimed as new and desired to be protected by Letters Patent includes the following:
1. An intelligence gathering device comprising:
a microphone for detecting sounds;
a communication component for transmitting signals or data representative of the sounds to a computer via a wireless communication network;
a display for displaying information related to operation of the device;
a computing device operatively coupled with the microphone, the communication component, and the display; and
a computer program stored on computer-readable medium accessible by the computing device, the computer program including a code segment configured to place the device in a stealth mode in which the display may be turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to the computer using data channels.
2. The intelligence gathering device as set forth in claim 1, the computer program further including a code segment to wirelessly receive a gain control instruction from the computer and to adjust a gain setting of the microphone in accordance therewith.
3. The intelligence gathering device as set forth in claim 1, wherein the data channels used to transmit the signals or data representative of the sounds are Transmission Control Protocol/Internet Protocol (TCP/IP) data channels.
4. The intelligence gathering device as set forth in claim 3, the computer program including a code segment to wirelessly receive an alert from the computer and to operate the vibration element in response thereto.
5. The intelligence gathering device as set forth in claim 1, further including resident memory for storing the signals or data representative of the detected sounds.
6. The intelligence gathering device as set forth in claim 1, the computing device and the computer program being operable to place the device in the stealth mode only after a user of the device enters valid user information and an operator of the computer enters and transmits to the device valid acknowledgment information.
7. The intelligence gathering device as set forth in claim 1, the computing device and the computer program being further operable to discontinue the stealth mode only after a user of the device enters valid user information and an operator of the computer enters and transmits to the device valid acknowledgment information.
8. The intelligence gathering device as set forth in claim 1, further including a location-determining component for determining a geographic location of the device.
9. The intelligence gathering device as set forth in claim 8, the computer program including a code segment to transmit data representative of the geographic location of the device to the computer while the device is in the stealth mode.
10. The intelligence gathering device as set forth in claim 8, the computing device and the computer program being further operable to receive and store geographic coordinates corresponding to a geofence and to wirelessly transmit an alert to the computer whenever the device enters or exits an area encompassed by the geofence.
11. The intelligence gathering device as set forth in claim 10, the computing device and the computer program being further operable to place the device in the stealth mode whenever the device enters or exits the area encompassed by the geofence.
12. A computer program stored on computer-readable medium of a mobile communication device, the mobile communication device having a microphone, a communication component, a display, and a computing device, the computer program comprising a code segment or segments to place the mobile communication device in a stealth mode in which the display is turned off or otherwise deactivated to make the entire mobile communication device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to a computer using data channels.
13. The computer program as set forth in claim 12, further comprising a code segment to wirelessly receive a gain control instruction from the computer and a code segment to adjust a gain setting of the microphone in accordance with the gain control instruction.
14. The computer program as set forth in claim 12, wherein the data channels used to transmit the signals or data representative of the sounds are Transmission Control Protocol/Internet Protocol (TCP/IP) data channels.
15. The computer program as set forth in claim 12, wherein the code segment for placing the mobile communication device in the stealth mode requires entry of valid user information in the mobile communication device and entry of valid acknowledgment information in the computer.
16. The computer program as set forth in claim 12, further comprising a code segment to discontinue the stealth mode only after a user of the mobile communication device enters valid user information and an operator of the computer enters and transmits to the mobile communication device valid acknowledgment information.
17. The computer program as set forth in claim 12, further comprising a code segment to transmit data representative of a geographic location of the mobile communication device to the computer while the mobile communication device is in the stealth mode.
18. The computer program as set forth in claim 12, further including a code segment to access geographic coordinates corresponding to a geofence and to wirelessly transmit an alert to the computer whenever the mobile communication device enters or exits an area encompassed by the geofence.
19. The computer program as set forth in claim 18, further comprising a code segment to place the mobile communication device in the stealth mode whenever the device enters or exits the area encompassed by the geofence.
20. A system for gathering intelligence data, the system comprising:
a mobile communication device comprising
a microphone for detecting sounds;
a communication component for wirelessly transmitting signals or data representative of the sounds via a wireless communication network;
a display for displaying information related to operation of the mobile communication device;
a computing device operatively coupled with the microphone, the communication component, and the display; and
a computer program stored on computer-readable medium accessible by the computing device, the computer program operable to place the mobile communication device in a stealth mode in which the display is turned off or otherwise deactivated to make the mobile communication device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds using data channels; and
a computer for wirelessly receiving the signals or data representative of the sounds from the mobile communication device.
21. The system as set forth in claim 20, the computer being operable to wirelessly transmit a gain control instruction to the mobile communication device and the mobile communication device being operable to adjust a gain setting of the microphone in response to the gain control instruction.
22. The system as set forth in claim 20, wherein the data channels used to transmit the signals or data representative of the sounds are Transmission Control Protocol/Internet Protocol (TCP/IP) data channels.
23. The system as set forth in claim 22, the computer being further operable to wirelessly transmit an alert to the mobile communication device and the mobile communication device being operable to operate the vibration element in response thereto.
24. The system as set forth in claim 20, the mobile communication device further including a location-determining component for determining a geographic location of the device.
25. The system as set forth in claim 24, the mobile communication device being operable to transmit data representative of the geographic location of the device to the computer while the device is in the stealth mode.
US14/101,555 2009-07-02 2013-12-10 System, method, and device for intelligence gathering and position tracking Abandoned US20140099998A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/101,555 US20140099998A1 (en) 2009-07-02 2013-12-10 System, method, and device for intelligence gathering and position tracking

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/497,181 US8457596B2 (en) 2009-07-02 2009-07-02 System, method, and device for intelligence gathering and position tracking
US13/909,347 US8606230B2 (en) 2009-07-02 2013-06-04 System, method, and device for intelligence gathering and position tracking
US14/101,555 US20140099998A1 (en) 2009-07-02 2013-12-10 System, method, and device for intelligence gathering and position tracking

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/909,347 Continuation US8606230B2 (en) 2009-07-02 2013-06-04 System, method, and device for intelligence gathering and position tracking

Publications (1)

Publication Number Publication Date
US20140099998A1 true US20140099998A1 (en) 2014-04-10

Family

ID=43412686

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/497,181 Active 2032-03-14 US8457596B2 (en) 2009-07-02 2009-07-02 System, method, and device for intelligence gathering and position tracking
US13/909,347 Active US8606230B2 (en) 2009-07-02 2013-06-04 System, method, and device for intelligence gathering and position tracking
US14/101,555 Abandoned US20140099998A1 (en) 2009-07-02 2013-12-10 System, method, and device for intelligence gathering and position tracking

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/497,181 Active 2032-03-14 US8457596B2 (en) 2009-07-02 2009-07-02 System, method, and device for intelligence gathering and position tracking
US13/909,347 Active US8606230B2 (en) 2009-07-02 2013-06-04 System, method, and device for intelligence gathering and position tracking

Country Status (1)

Country Link
US (3) US8457596B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807183B2 (en) 2013-12-05 2017-10-31 Knowmadics, Inc. System and server for analyzing and integrating data collected by an electronic device
US10455633B2 (en) 2017-11-14 2019-10-22 Knowmadics, Inc. Wireless communication system and method for monitoring and alerting a broken pairing between electronic devices
US10861071B2 (en) 2013-12-05 2020-12-08 Knowmadics, Inc. Crowd-sourced computer-implemented methods and systems of collecting requested data

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8457596B2 (en) * 2009-07-02 2013-06-04 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8824652B2 (en) 2011-10-12 2014-09-02 World Emergency Network - Nevada, Ltd. Controlled recorded 3-way calling
CA2897088C (en) 2011-05-31 2019-07-09 World Emergency Network - Nevada, Ltd. Mobile phone as a one-way recorded transmitter over a cellular network
CN103733601B (en) 2011-06-30 2016-09-07 世界紧急网络-内华达公司 Multiple telephone wires are attached to single mobile phone or land line phone
GB2524174A (en) * 2013-03-13 2015-09-16 Acco Brands Corp User interface for object tracking
US8942727B1 (en) 2014-04-11 2015-01-27 ACR Development, Inc. User Location Tracking
US9413707B2 (en) 2014-04-11 2016-08-09 ACR Development, Inc. Automated user task management
WO2016168512A1 (en) 2015-04-15 2016-10-20 World Emergency Network - Nevada, Ltd. International one-way recorded transmitter over a cellular network
US10645213B1 (en) 2016-03-30 2020-05-05 World Emergency Network—Nevada Ltd. Virtual numbers for intelligence operations
US9788156B1 (en) * 2016-03-30 2017-10-10 International Business Machines Corporation Geofence determination
WO2020045206A1 (en) * 2018-08-29 2020-03-05 日本電気株式会社 Positioning system, positioning method, and recording medium
US11004325B2 (en) * 2019-09-26 2021-05-11 International Business Machines Corporation Smartphone based reminding system for forgotten objects

Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5875398A (en) * 1996-10-21 1999-02-23 At&T Wireless Method and apparatus for testing cellular services in a first location from a second location remote from the first location
US6199045B1 (en) * 1996-08-15 2001-03-06 Spatial Adventures, Inc. Method and apparatus for providing position-related information to mobile recipients
US6480726B1 (en) * 1999-10-19 2002-11-12 Matsushita Electric Industrial Co., Ltd. Portable telephone device
US20030032447A1 (en) * 2001-08-10 2003-02-13 Koninklijke Philips Electronics N.V. Conversation rewind
US20030137426A1 (en) * 2001-12-07 2003-07-24 Eric Anthony Early warning near-real-time security system
US20030151501A1 (en) * 2002-02-11 2003-08-14 Ayantra, Inc. Mobile asset security and monitoring system
US20050085257A1 (en) * 2003-10-01 2005-04-21 Laird Mark D. Mobile emergency notification system
US20050255826A1 (en) * 2004-05-12 2005-11-17 Wittenburg Kent B Cellular telephone based surveillance system
US20050272410A1 (en) * 2004-06-03 2005-12-08 Inventec Corporation Monitoring system for use status of computer apparatus
US20050282504A1 (en) * 2004-06-21 2005-12-22 Ming-Hsiang Yeh Apparatus for monitoring and recording audio and video
US7016656B2 (en) * 2000-03-30 2006-03-21 Pioneer Corporation Wireless terminal for mobile unit
US7054666B2 (en) * 2000-05-16 2006-05-30 Nec Corporation Method of calling function by keyword detection in portable communication apparatus
US7181252B2 (en) * 2002-12-10 2007-02-20 Nokia Corporation System and method for performing security functions of a mobile station
US20070047696A1 (en) * 2005-08-30 2007-03-01 Zhongwen Chen System for secret conversation and record
US20070082700A1 (en) * 2005-10-07 2007-04-12 Agere Systems, Inc. Method of using mobile communications devices for monitoring purposes and a system for implementation thereof
US20070140644A1 (en) * 2005-12-19 2007-06-21 Lctank Llc Apparatus and method for indentifying the geographic location and time in a recorded sound track by using a stealth mode technique
US7259781B2 (en) * 2002-06-04 2007-08-21 Casio Computer Co., Ltd. Electronic camera with an alarm function
US20070202858A1 (en) * 2006-02-15 2007-08-30 Asustek Computer Inc. Mobile device capable of dynamically adjusting volume and related method
US20080076410A1 (en) * 2004-09-21 2008-03-27 Beyer Malcolm K Method of controlling user and remote cell phone transmissions and displays
US7363029B2 (en) * 2003-09-12 2008-04-22 Core Mobility, Inc. Unified interface for voice, text or picture message authoring
US20080224884A1 (en) * 2005-07-15 2008-09-18 Leadership Dynamics Corporation System for Initiating Geospatial Functional Control of Mobile Electronics
US7502797B2 (en) * 2003-10-15 2009-03-10 Ascentive, Llc Supervising monitoring and controlling activities performed on a client device
US7515900B2 (en) * 2003-08-08 2009-04-07 Ciliko Wireless Incorporated Method and apparatus for communication
US20090093277A1 (en) * 2007-10-05 2009-04-09 Lg Electronics Inc. Mobile terminal having multi-function executing capability and executing method thereof
US20090100384A1 (en) * 2007-10-10 2009-04-16 Apple Inc. Variable device graphical user interface
US20090191913A1 (en) * 2008-01-24 2009-07-30 Jones Randall S Video camera utilizing subscriber-based networks
US20090197615A1 (en) * 2008-02-01 2009-08-06 Kim Joo Min User interface for mobile devices
US20090210249A1 (en) * 2008-02-16 2009-08-20 Juergen Rasch-Menges Medical device
US20090309725A1 (en) * 2007-10-03 2009-12-17 University Of Southern California Systems and methods for security breach detection
US20090322595A1 (en) * 2005-09-07 2009-12-31 Toshihiko Mizukami Portable communication terminal with gps function
US20100009674A1 (en) * 2008-07-10 2010-01-14 Bhawani Sapkota Client-controlled handover between radio technologies
US20100035630A1 (en) * 2006-12-28 2010-02-11 Worldscout Corporation System And Method For Determining The Location Of A Location Tracking Device
US20100130178A1 (en) * 2008-11-25 2010-05-27 Bennett James D Enabling Remote And Anonymous Control Of Mobile And Portable Multimedia Devices For Security, Tracking And Recovery
US20100291906A1 (en) * 2006-12-05 2010-11-18 Deluca Enrico Systems and methods for location related data interception
US7873349B1 (en) * 2009-10-06 2011-01-18 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8457596B2 (en) * 2009-07-02 2013-06-04 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0958672A4 (en) 1995-06-07 2002-05-22 Comm Inc E Low power telecommunication controller for a host computer server
JP2006041889A (en) 2004-07-27 2006-02-09 Funai Electric Co Ltd Video recorder
FR2899759A1 (en) 2006-04-06 2007-10-12 Alexandra Telescu Portable communication device`s e.g. mobile telephone, operating parameter e.g. dialing tone, control device, has decision-making module for analyzing position of telephone and transmitting order to parameter adjusting system
US7849951B2 (en) 2007-02-28 2010-12-14 Crown Equipment Corporation Materials handling vehicle having at least one controller coupled to a front wall of a frame

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199045B1 (en) * 1996-08-15 2001-03-06 Spatial Adventures, Inc. Method and apparatus for providing position-related information to mobile recipients
US5875398A (en) * 1996-10-21 1999-02-23 At&T Wireless Method and apparatus for testing cellular services in a first location from a second location remote from the first location
US6480726B1 (en) * 1999-10-19 2002-11-12 Matsushita Electric Industrial Co., Ltd. Portable telephone device
US7016656B2 (en) * 2000-03-30 2006-03-21 Pioneer Corporation Wireless terminal for mobile unit
US7054666B2 (en) * 2000-05-16 2006-05-30 Nec Corporation Method of calling function by keyword detection in portable communication apparatus
US20030032447A1 (en) * 2001-08-10 2003-02-13 Koninklijke Philips Electronics N.V. Conversation rewind
US20030137426A1 (en) * 2001-12-07 2003-07-24 Eric Anthony Early warning near-real-time security system
US20030151501A1 (en) * 2002-02-11 2003-08-14 Ayantra, Inc. Mobile asset security and monitoring system
US7259781B2 (en) * 2002-06-04 2007-08-21 Casio Computer Co., Ltd. Electronic camera with an alarm function
US7181252B2 (en) * 2002-12-10 2007-02-20 Nokia Corporation System and method for performing security functions of a mobile station
US7515900B2 (en) * 2003-08-08 2009-04-07 Ciliko Wireless Incorporated Method and apparatus for communication
US7363029B2 (en) * 2003-09-12 2008-04-22 Core Mobility, Inc. Unified interface for voice, text or picture message authoring
US20050085257A1 (en) * 2003-10-01 2005-04-21 Laird Mark D. Mobile emergency notification system
US7502797B2 (en) * 2003-10-15 2009-03-10 Ascentive, Llc Supervising monitoring and controlling activities performed on a client device
US20050255826A1 (en) * 2004-05-12 2005-11-17 Wittenburg Kent B Cellular telephone based surveillance system
US20050272410A1 (en) * 2004-06-03 2005-12-08 Inventec Corporation Monitoring system for use status of computer apparatus
US20050282504A1 (en) * 2004-06-21 2005-12-22 Ming-Hsiang Yeh Apparatus for monitoring and recording audio and video
US20080076410A1 (en) * 2004-09-21 2008-03-27 Beyer Malcolm K Method of controlling user and remote cell phone transmissions and displays
US20080224884A1 (en) * 2005-07-15 2008-09-18 Leadership Dynamics Corporation System for Initiating Geospatial Functional Control of Mobile Electronics
US20070047696A1 (en) * 2005-08-30 2007-03-01 Zhongwen Chen System for secret conversation and record
US20090322595A1 (en) * 2005-09-07 2009-12-31 Toshihiko Mizukami Portable communication terminal with gps function
US20070082700A1 (en) * 2005-10-07 2007-04-12 Agere Systems, Inc. Method of using mobile communications devices for monitoring purposes and a system for implementation thereof
US20070140644A1 (en) * 2005-12-19 2007-06-21 Lctank Llc Apparatus and method for indentifying the geographic location and time in a recorded sound track by using a stealth mode technique
US20070202858A1 (en) * 2006-02-15 2007-08-30 Asustek Computer Inc. Mobile device capable of dynamically adjusting volume and related method
US20100291906A1 (en) * 2006-12-05 2010-11-18 Deluca Enrico Systems and methods for location related data interception
US20100035630A1 (en) * 2006-12-28 2010-02-11 Worldscout Corporation System And Method For Determining The Location Of A Location Tracking Device
US20090309725A1 (en) * 2007-10-03 2009-12-17 University Of Southern California Systems and methods for security breach detection
US20090093277A1 (en) * 2007-10-05 2009-04-09 Lg Electronics Inc. Mobile terminal having multi-function executing capability and executing method thereof
US20090100384A1 (en) * 2007-10-10 2009-04-16 Apple Inc. Variable device graphical user interface
US20090191913A1 (en) * 2008-01-24 2009-07-30 Jones Randall S Video camera utilizing subscriber-based networks
US20090197615A1 (en) * 2008-02-01 2009-08-06 Kim Joo Min User interface for mobile devices
US20090210249A1 (en) * 2008-02-16 2009-08-20 Juergen Rasch-Menges Medical device
US20100009674A1 (en) * 2008-07-10 2010-01-14 Bhawani Sapkota Client-controlled handover between radio technologies
US20100130178A1 (en) * 2008-11-25 2010-05-27 Bennett James D Enabling Remote And Anonymous Control Of Mobile And Portable Multimedia Devices For Security, Tracking And Recovery
US8457596B2 (en) * 2009-07-02 2013-06-04 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8606230B2 (en) * 2009-07-02 2013-12-10 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US7873349B1 (en) * 2009-10-06 2011-01-18 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8265597B2 (en) * 2009-10-06 2012-09-11 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking
US8311515B1 (en) * 2009-10-06 2012-11-13 Sur-Tec, Inc. System, method, and device for intelligence gathering and position tracking

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807183B2 (en) 2013-12-05 2017-10-31 Knowmadics, Inc. System and server for analyzing and integrating data collected by an electronic device
USD850472S1 (en) 2013-12-05 2019-06-04 Knowmadics, Inc. Display screen with graphical user interface
USD881233S1 (en) 2013-12-05 2020-04-14 Knowmadics, Inc. Display screen or portion thereof with graphical user interface
US10861071B2 (en) 2013-12-05 2020-12-08 Knowmadics, Inc. Crowd-sourced computer-implemented methods and systems of collecting requested data
US11368541B2 (en) 2013-12-05 2022-06-21 Knowmadics, Inc. Crowd-sourced computer-implemented methods and systems of collecting and transforming portable device data
US11381650B2 (en) 2013-12-05 2022-07-05 Knowmadics, Inc. System and server for analyzing and integrating data collected by an electronic device
US11799980B2 (en) 2013-12-05 2023-10-24 Knowmadics, Inc. Crowd-sourced computer-implemented methods and systems of collecting and transforming portable device data
US10455633B2 (en) 2017-11-14 2019-10-22 Knowmadics, Inc. Wireless communication system and method for monitoring and alerting a broken pairing between electronic devices
US10667313B2 (en) 2017-11-14 2020-05-26 Knowmadics, Inc. Wireless communication system and method for monitoring the pairing status between two devices

Also Published As

Publication number Publication date
US20130267220A1 (en) 2013-10-10
US8606230B2 (en) 2013-12-10
US20110002480A1 (en) 2011-01-06
US8457596B2 (en) 2013-06-04

Similar Documents

Publication Publication Date Title
US8311515B1 (en) System, method, and device for intelligence gathering and position tracking
US8606230B2 (en) System, method, and device for intelligence gathering and position tracking
US9625269B2 (en) Method and system for mobile device selectively reporting of GPS position information to others
US8023963B2 (en) Mobile communication device and method for linking communications with location data
ES2295582T3 (en) METHOD FOR TRAINING A WIRELESS INFORMATION DEVICE FOR ACCESS TO LOCALIZATION DATA.
US8768294B2 (en) Notification and tracking system for mobile devices
US20110154014A1 (en) Data exchange for mobile devices
US20080114543A1 (en) Mobile phone based navigation system
US20140099973A1 (en) Systems and methods for finding mobile phone users
KR20160146343A (en) Blackbox image sharing method considering location information and terminal using the method
US20080268870A1 (en) Method and System for Obtaining Location of a Mobile Device
KR101056074B1 (en) Calling system in radius and service method for thereof
KR100768977B1 (en) Communication terminal, communication system, and communication method
KR20080105061A (en) A navigation device and method for storing and utilizing a last docked location
US20120303353A1 (en) Apparatus, method and system for locating and monitoring the movement of an object
KR20050020111A (en) Mobile communication terminal position reporting method in using global positioning system and image
WO2011002544A1 (en) System, method, and device for intelligence gathering and position tracking
KR101165574B1 (en) Method for Providing Position Detection in Shadow Area by Using Automatic Position Tracking Function of GPS Mobile Terminal
CN101433056A (en) Method for mobile station management service request through digital mobile communication network
KR101455985B1 (en) Terminal and method of providing position information therein
JP2000083276A (en) Position retrieval system for using portable terminal having position information
Huq et al. A Telematics Application for Stolen Vehicle Recovery Using On-Device Position Fixing

Legal Events

Date Code Title Description
AS Assignment

Owner name: SUR-TEC, INC, KANSAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SMITH, COREY;DUPRIEST, TODD;SIGNING DATES FROM 20090626 TO 20090630;REEL/FRAME:031748/0706

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION