System and method for identifying members of a gang or security threat group
DC CAFCFirst Claim
1. A method for monitoring activity of detainees, comprising:
- identifying a detainee who is affiliated with a gang or correctional investigation;
searching one or more databases for information associated with the detainee, wherein the one or more databases include call record databases, and wherein the information associated with the detainee includes individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s accounts;
correlating the information to identify individuals who may be affiliated with the gang or correctional investigation; and
creating an alert that is triggered when a specified word, phrase or investigative event is detected during a telephone call by the detainee.
21 Assignments
Litigations
1 Petition
Accused Products
Abstract
System and method for monitoring activity of detainees comprising identifying a detainee who is affiliated with a gang, searching one or more databases for information associated with the detainee, and correlating the information to identify individuals who may be affiliated with the gang. The databases may include call record databases, and the information associated with the detainee may include individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s calls voice and/or facial biometric identifiers. An alert may be triggered when the detainee calls a specified individual or telephone number.
318 Citations
17 Claims
-
1. A method for monitoring activity of detainees, comprising:
-
identifying a detainee who is affiliated with a gang or correctional investigation; searching one or more databases for information associated with the detainee, wherein the one or more databases include call record databases, and wherein the information associated with the detainee includes individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s accounts; correlating the information to identify individuals who may be affiliated with the gang or correctional investigation; and creating an alert that is triggered when a specified word, phrase or investigative event is detected during a telephone call by the detainee. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for monitoring activity of detainees, comprising:
-
searching a first plurality of databases for a first level of information associated with a detainee known to be affiliated with a security threat group; searching a second plurality of databases using the first level of information to identify a second level of information; wherein the first and second plurality of databases include call record databases, and wherein the first and second levels of information associated with the detainee include individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s accounts; correlating the second level of information to the detainee to identify other individuals affiliated with the security threat group; and creating an alert that is triggered when a specified word or phrase is detected during a telephone call by the detainee. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method for monitoring activity of detainees, comprising:
-
searching first databases for a first level of information associated with a detainee known to be affiliated with a security threat group; searching second databases using the first level of information to identify a second level of information; searching third databases using the second level of information to identify a third level of information; wherein the databases include call record databases, and wherein the levels of information include individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s accounts; and creating an alert that is triggered when a specified word or phrase is detected during a telephone call by the detainee.
-
-
14. A method of configuring an alert, comprising:
-
identifying one or more parameters associated with a detainee; monitoring records comprising the one or more parameters; wherein the records include call records, and wherein the parameters include individuals called by the detainee, individuals who visit the detainee, telephone numbers called by the detainee, and sources of funding for the detainee'"'"'s accounts; notifying a user upon activity involving at least one of the one or more parameters; and creating an alert that is triggered when a specified word or phrase is detected during a telephone call by the detainee. - View Dependent Claims (15, 16, 17)
-
Specification