Details of events provided by witnesses are a critical element of evidence collection gathered during an investigation of an incident. Gathering incident scene information from witnesses has always been an investigative challenge. High quality evidence leads and witness incident knowledge may start to decline after just a few days, or even a few hours, of an incident occurring. Potential witnesses may be difficult to track down for an incident occurring near a large transient population, such as witnesses to a running marathon bombing incident or witnesses to a high speed vehicular chase incident. An initial influx of evidence leads may further exacerbate the challenge of determining which witnesses to follow up with first. Accordingly, there is a need for an improved approach to the collection of evidence leads from witnesses.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
Briefly, there is provided herein a communication system and method for prioritizing the collection of evidence leads. Geographic mass messaging notifications in conjunction with a request for incident information are sent out to a plurality of communication devices alerting to an incident. The embodiments provide for the prioritization of incident feedback responses originating from responding devices. Prioritization is based on parameters associated with the responding devices. The prioritization enables transient devices located within an incident area population to be provided with a higher priority than non-transient devices. The assigned priority facilitates investigative follow-up of a plurality of evidence leads prior to any detailed review of the actual content of each lead by identifying those responders likely to leave a specified geographic area.
For ease of description, some or the entire example systems presented herein are illustrated with a single exemplar of each of its component parts. Some examples may not describe or illustrate all components of the systems. Other example embodiments may include more or fewer of each of the illustrated components, may combine some components, or may include additional or alternative components.
In accordance with the various embodiments, the mass notification system 106 transmits a mass messaging incident notification in conjunction with an incident feedback request to a plurality of communication devices, such as the population of communication devices 118, operating within a specified geographic area associated with an incident, such as incident area 120. The evidence collection system 124 receives and stores incident feedback responses submitted by responding devices of the plurality of communication devices. The response engine 126 assigns priority to the responding devices based on device parameters associated with the responding devices, the device parameters comprising at least location of the responding devices and mobility of the responding devices. Highly transient responding devices and/or those devices predicted to be transient are identified (for example device 119 which is leaving the incident area 120) and prioritized. The prioritization enables highly transient devices to be provided with a higher priority than non-transient or less transient devices. The assigned priority facilitates investigative follow-up prior to reviewing the actual data content of each lead provided by responding devices.
The communications network 110 is a communications network including wireless connections, wired connections, or combinations of both. The communications network 110 may be implemented using a wide area network, for example, the Internet, a local area network, for example, a Bluetooth™ network or Wi-Fi, a Long Term Evolution (LTE) network, a Global System for Mobile Communications (or Groupe Special Mobile (GSM)) network, a Code Division Multiple Access (CDMA) network, an Evolution-Data Optimized (EV-DO) network, an Enhanced Data Rates for Global Evolution (EDGE) network, a 3G network, a 4G network, 5G network, and combinations or derivatives thereof. The cellular network 108 may operate according to an industry standard cellular protocol, for example, the Long Term Evolution (LTE) (including LTE-Advanced or LTE-Advanced Pro compliant with, for example, the 3GPP TS 36 specification series), or the 5G (including a network architecture compliant with, for example, the 3GPP TS 23 specification series and a new radio (NR) air interface compliant with the 3GPP TS 38 specification series) standard, among other possibilities, and over which, among other things, an open mobile alliance (OMA) push to talk (PTT) over cellular (OMA-PoC), a voice over IP (VoIP), or a PTT over IP (PoIP) application may be implemented.
The communication system 100 may include fewer or additional components or combinations thereof. For example, the evidence collection system 124 may be managed by a third party system independent of the response engine 126. The response engine 126 of the embodiments may be a standalone component of the system 100 or may be integrated as part of a service. In accordance with the embodiments, priority policies are set, managed and adjusted within the response engine 126 independently of the collected evidence, thereby advantageously enabling customization of priorities for different types of incidents.
In
Geographic mass messaging notifications in conjunction with incident feedback requests are sent as wireless alerts to the mass notification system 106. It is not necessary for the alerting authorities 102 to have a database of recipients. The mass notification system 106 includes hardware and software configured to determine whether the wireless alert is a Wireless Emergency Alert (WEA) or a Database Alert. When the wireless alert is a WEA alert, the WEA alert is forwarded from the mass notification system 106 to the IPAWS Node 107 for coordination through the communication network 110 to cellular network 108 for transmission as a WEA alert with feedback request link to the incident area 120. When the wireless alert is a Database Alert, the Database Alert is sent from the mass notification system 106 to the communication network 110 for coordination through appropriate networks, such as internet, and/or telephone networks, for transmission as a database alert with feedback request link to the incident area 120. The WEA alerts with feedback request links are provided to cell phone devices within incident area 120. For the purposes of this application, cell phone devices, being mobile devices, will be considered transient devices. Database Alerts with feedback request links, however, will go out to both transient and non-transient devices within the incident area 120, where such devices may include but are not limited to cell phones, land line phones, emails, voip, and/or chat messages to name a few. Hence, both WEA alerts with feedback request link and database alerts with feedback request link are transmitted to a population of device users within incident area 120, where the population may comprise a combination of transient and/or non-transient device users.
The communication devices 118 receive the wireless notifications with incident feedback request link and present them, for example, on a display screen of each device. (for example, “A crime has been reported in your area. The suspect was seen fleeing West from 123 Main Street at approximately 6:15 PM wearing a blue shirt and tan pants. If you have any information about the suspect or the crime, please text the information to 12345.”) Some or all of the population of device users may respond to the incoming alerts (using the provided link). Notifications accompanied by an incident feedback request link (for both WEA alerts and Database Alerts) advantageously facilitate the collection of evidence leads and other relevant information pertaining to an incident from a larger pool of communication devices which may include both non-transient communication devices and transient communication devices.
Responses to requests 122, generated by both transient and non-transient members of the population are collected by evidence collection system 124 and stored within an evidence collection database contained therein. Response engine 126 monitors the evidence collection database 124 and coordinates prioritization of the evidence based on device parameters of the responding devices. The evidence collection system 124 with internal database provides categorization and attribute alignment of the responding devices based on the priority set by the priority policy of response engine 126. In accordance with the embodiments, the response engine 126 applies a priority policy for the retrieval of evidence based on the device parameter information, without having to analyze the specific content of the collected evidence. The response engine 126 advantageously assigns priority based at least on the responding device parameters of location of the responding device and mobility of the responding device. Investigative units 128 are then able to retrieve stored evidence in a prioritized manner from the evidence collection system 124 via a management interface provided therebetween. Hence, investigative units 128, such as those under the control of law enforcement, are able to interface with the evidence collection system 124 to retrieve tips from the database that have been appropriately prioritized by the priority policy of the response engine 126. The response engine's 126 priority policy application is also advantageously accessible to investigative devices 128. Allowing the priority policy to be accessible to investigative devices 128, enables investigators to adjust the prioritization parameters, attributes, and thresholds for different incidents. For example, priority thresholds for a responding device's location and mobility can be adjusted based on the incident type being a crime scene or a utility event.
As stated previously, the priority policy of response engine 126 is established based on device parameters associated with the responding device(s), those device parameters comprising at least location and mobility (current and predicted) of the responding device. For example, location of the responding device may be based on GPS coordinates at the time of the incident. Predicted mobility of the responding device may be based on the device's IP address, delta from the location of the IP address to the incident itself, and/or the radius of the mass notification are just a few example that can be used to predict a potentially transient device. Device information such as a device URL utilized for the device's database contacts vs. a different URL used for transient contacts provides can provide yet another device parameter to distinguish the priority between responses. Browser based location can also be gathered as a device parameter. These various parameters can all be set by the priority policy application programmed into the response engine 126. Those policies may be set and adjusted by the investigators accessing the response engine 126 through their investigative devices 128 and/or may be pre-programmed into response engine 126.
Additional device parameters may further refine the priority by the response engine 126, such as time of submission of the response relative to the incident notification time, identification of the submitter (anonymous or known), and type of response content (video, photo, text, voice). The priority determination advantageously enables transient devices to be quickly identified by the response engine 126 so that responses stored in the evidence collection database 124 from those devices can be quickly accessed by investigators prior to a potential transient witness leaving the incident area. The response engine 126 may further provide settings to adjust the prioritization logic. Priority may be assigned based on threshold ranges associated with the device parameters. For example, location of the responding device can be compared to predetermined location thresholds distance ranges associated with the incident. The response engine 126 can adjust such distance ranges may based on the type of incident. Mobility of the responding devices can be compared to mobility thresholds relative to the incident location. Hence, location and predicted mobility can both be used to elevate the priority of responding devices.
The communication system of
Those devices of the plurality of communication devices that respond to the incident feedback request are referred to as responding devices. Responding devices transmit their incident feedback responses to an evidence collection system at 304. Priority of the responding devices is assigned at 306, by a response engine. The priority is based on analytics performed on the incident feedback responses to determine device parameters associated with the responding devices. Device parameters upon which priority may be based are listed at 308.
In accordance with some embodiments, the priority that is assigned at 306 is based at least on the device parameters of location and mobility of the responding device shown at 308. Additional device parameters (also shown at 308) may be used to further refine priority assignment to the responding devices, such as time of response of the responding device, identification status of the responding device, and response type (text only, text and video, text and photos). of the responding device. The priority assigned at 306 may be a numerical value based on points, logic and/or combinations thereof associated with device parameter threshold ranges.
The assigned priority may be either transmitted over the network to investigative devices at 310 (from evidence collection system 124) or alternatively retrieved by investigative devices having access to the database of evidence collection system 124. The method and system advantageously allow for responses from potentially highly transient witnesses to be retrieved quickly so that follow-up investigations can take place prior to the witness leaving the geographic area.
In accordance with some embodiments, the device parameters upon which priority is based include location of the responding devices and mobility of the responding devices. The location and mobility of the responding devices may be based on change in location between time of notification and time of submission (where a different location outside of the notification area is considered transient). For example, current location of a responding device at the time of the incident may be based on GPS coordinates at the time of the incident, while predicted mobility may be based on changes in the GPS coordinates from the time of the incident and time of response submission. As a further example, responding devices with a non-local IP address may be assigned a higher priority than responding devices with a local IP address based, the non-local IP address being considered a more transient device. A responding device associated with a non-local service provider may be assigned a higher priority than a responding device associated with a local service provider, the non-local service provider being considered a more transient device.
Additionally, is some embodiments, the thresholds may be adjusted based on incident type. For example, distance threshold ranges and timing ranges pertaining to a high threat incident, such as a bombing incident, may have different threshold ranges than those associated with a traffic accident. The adjustment of the thresholds may be initially determined by the alerting authority based on incident type, then subsequently adjusted by the response engine and/or investigative units based on initial responses by responding incident type and initial responses.
As further seen in Table 1, the device parameters upon which priority may further be based may include time of the response relative to incident notification time, identification of the responding device (known or anonymous), and type of response content (text-only; text and photo; text, photo, and video) For example, a higher priority may be assigned to a responding device based on known user identification, attachment of images, and text in the response feedback, while a lower priority may be assigned to a responding device without user identification and a text-only response. Priority is assigned prior to any detailed analysis of the actual data content (i.e. without analysis of the text content, photo content, and/or video content) thereby providing investigators with a very fast initial prioritization of potential witnesses to the incident.
Accordingly, there has been provided a system and method for prioritizing communication devices responding to a mass notification combined with an incident feedback request. The system and method beneficially enable solicitation of evidence information from a wider group of target devices and prioritization of that evidence based on device parameters tied to the mobility of the source. The prioritization can be adjusted based on changes in transient movement of a communication device or anticipated transient movement of a communication device. The approach provided by the system and method addresses the challenges associated with transient responses. Multiple responses to a request for incident information can now be managed through the effective prioritization provided by the embodiments. For incidents where there is a large transient population (for example a marathon bombing), investigators are now able to quickly determine which leads originate from local subscriber devices and which leads originate from more transient, mobile users within and outside of the geographic area of the incident. Investigators can use the assigned priority to quickly follow up with highly transient individuals who may only be at an incident area for a short period of time.
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
Moreover in this document, relational terms for example, first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially,” “essentially,” “approximately,” “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way but may also be configured in ways that are not listed.
It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
It should also be understood that although certain examples depict components as logically separate, such depiction is merely for illustrative purposes. In some embodiments, the illustrated components may be combined or divided into separate software, firmware and/or hardware. Regardless of how they are combined or divided, these components may be executed on the same computing device or may be distributed among different computing devices connected by one or more networks or other suitable communication means.
In addition, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
Number | Name | Date | Kind |
---|---|---|---|
5815417 | Orr et al. | Sep 1998 | A |
8424984 | Ritter | Apr 2013 | B2 |
9386050 | Oswald | Jul 2016 | B2 |
20150302425 | Borger | Oct 2015 | A1 |
20160071113 | Papanicolaou et al. | Mar 2016 | A1 |
20190236346 | Barone | Aug 2019 | A1 |
Entry |
---|
Schuler, Francesca et al.: Transmitting Near Real-Time Geographic Mass Messaging Requests, U.S. Appl. No. 16/942,473, filed Jul. 29, 2020, all pages. |