1. Field
The invention relates generally to electronic monitoring and supervision in the criminal justice field. More specifically, embodiments of the invention relate to systems and methods for computerized management of offenders being supervised by criminal justice agencies and their staff.
2. Related Art
The current system of corrections relies on outdated methods and technologies, causing it to be both costly and inefficient. Prisons are overcrowded and the national corrections budget for 2012 is in excess of $74 billion. Many corrections personnel such as parole and probation officers are overworked and have heavy caseloads that can keep them from dedicating the necessary attention to each case. Owing to these limited resources, it is becoming increasingly difficult for officers to manage caseloads while maintaining a high level of individual care and support.
House arrest programs and body-worn monitoring devices (e.g. ankle bracelets) are widely implemented as a means of reducing prison populations. However, in general practice, these devices and programs have several serious flaws—for example, body worn monitoring devices cannot transmit a signal out of range of their associated base units, and certain health risks are associated with prolonged wearing of such a device. Additionally, the individual under such supervision faces significant barriers to reintegrating into society, such as the visibility of a body-worn device, which can engender discrimination and limit the individual's ability to acquire a job, make meaningful connections and so on.
Another way that existing methods fall short is in the realm of live support. Upon release from an institution such as prison, an individual may lack the skills or knowledge needed to pursue a successful path toward rehabilitation or reintegration. Certain existing systems advocate the providing of resources to such an individual in electronic format, but no system offers constant access to a live support network with no cost to the participant.
The technology disclosed herein can be used to implement machines, methods and articles of manufacture which can address one or more of deficiencies in the technology currently used in the art. For example, aspects of the disclosed technology can be used to implement a system comprising a computer, a first database, a second database, a first set of memory locations and a second set of memory locations. In such a system, the computer could be configured to collect location data from a plurality of portable electronic devices specified in a configuration file stored in the first database. The first database could contain personal data on a plurality of individuals, and each individual from the plurality of individuals could have a status of either under correctional supervision, previously under correctional supervision, or required to enter correctional supervision. The second database could contain location data collected by the computer for the individuals whose personal data is contained in the first database. The first set of memory locations could store a first set of software tools operable to configure the computer to, in response to receiving a request for data from an individual, filter data to be presented based on a role of the individual from whom the request is received. The second set of memory locations could store a second set of software tools operable to configure the computer to access and analyze personal data stored in the first database by matching that data against a set of information for one or more social service offerings available to a participant.
The disclosed technology could be used to implement methods as well. For example, aspects of the disclosed technology could be used to implement a method comprising creating a detailed program for a participant to follow, providing assistance to the participant to facilitate following the program, and monitoring the participant to verify that the program is being followed. In such a method, the detailed program could be created based upon at least one need of the participant, including all court ordered requirements. Providing the participant assistance to facilitate following the program could comprise using a data processor in a data processing center to match information regarding the participant with information regarding resources available to the participant. Monitoring the participant to verify that the program is being followed could comprise comparing location data provided by a portable device associated with the participant and a set of off-limits areas identified in the program.
Other methods are also possible. For example, using aspects of the disclosed technology, a method could be performed which comprises receiving a collection of location data from a portable device at a central location, storing the collection of location data in one or more back end databases, using data retrieved from the back end databases in determining if a participant is in a forbidden location of a competent court, using data retrieved from the back end databases in presenting location data, determining participant location based on comparing individual GPS data points with previous GPS data points, using the participant location in matching data related to the participant with data related to services that may benefit the participant, and using the participant location at a specific point in time and the data retrieved from the back end databases in verifying compliance by a participant with all relevant court orders and agreements is possible.
Other embodiments of the disclosed technology are also possible, will be immediately apparent to those of ordinary skill in the art, and could be made and used by those of ordinary skill in the art without undue experimentation in light of the disclosure set forth herein. Accordingly, the discussion of methods and systems which could be implemented using aspects of the disclosed technology should be understood as being illustrative only, and should not be treated as limiting on the protection accorded by this document or any related document.
The drawings and detailed descriptions which follow are intended to be illustrative and are not intended to imply limitations on the scope of potential implementations of the disclosure set forth herein.
Aspects of the technology disclosed herein can be used to implement a comprehensive, accessible system which can provide security for the public at large, aid for individuals participating in conditionally supervised release programs, and cost savings for the criminal justice system.
To minimize the threat posed by a person under corrections supervision, the disclosed technology can be used to implement a system which may include one or more of the following features: location tracking, voice authentication, and a 24-hour monitoring staff. A system such as might be implemented to include those features could operate in conjunction with a wireless communication device supplied to the participant. In a preferred embodiment, such a device has the functionality of (and may be) a cell phone or Smartphone, i.e. has cellular network, Internet and Global Positioning System (GPS) capabilities.
When using a portable device such as described, the participant will generally be made to understand that he or she is to carry the portable device at all times in order to correspond with the system, including call center staff (if provided), and as a reference for terms and conditions, including additional requirements entered into the system by the supervisor subsequent to release or sentencing.
A portable device can be implemented to interface with the system constantly, exchanging data related to aforementioned security mechanisms. In the system, a location-tracking unit can utilize GPS capabilities on the portable device, receiving position signals from satellites orbiting the Earth. The GPS capabilities of the portable device permit tracking of the participant with very high accuracy. A voice authentication mechanism can be used to verify that a participant has control and possession of his or her designated portable device at a variety of times. A 24-hour monitoring staff can be employed to monitor incoming data (e.g., voice authentication and location tracking) via the system platform.
As will be apparent to one of ordinary skill in the art, the inventor's technology can allow a portable device such as described above to eliminate the need for a body-worn transmitter. This can greatly increase a participant's freedom and ability to re-integrate into society while maintaining efficiency of monitoring and a high level of security. Additionally, in some embodiments, the participant could be free to use the portable device to call relatives, employers, friends, and so on. In such embodiments, these calls could be monitored so that calls of a suspicious nature can be investigated to ensure that no illegal activity is taking place.
The disclosed technology can be used to provide resources that can better equip a participant for successful completion of terms and conditions of sentence, and ultimately enable a successful, non-recidivist reintegration into society at large. To this end, a portable device can be used to provide the participant with instant access to a plurality of vital resources. These resources may include, but are not necessarily limited to: suitable job listings; important contacts and addresses; a satellite map with direction capabilities; a calendar and to-do list that shows upcoming requirements; and mail, messaging and call features to contact the 24-hour support staff for inquiries, notifications or emergencies. Access to these resources can be particularly helpful in the first few weeks following release from an institution such as prison.
In embodiments where they are provided, resources such as described above can be continually updated by the system or its implementers. Implementers of the system can include specialists that are hired to match participants with resources suited to their needs; specialists may also make assessments of mental, physical and emotional health conditions to determine if additional aid would benefit a participant.
In some embodiments, a system implemented using the technology disclosed herein can be programmed to generate aggregate data reports which can allow legislators and the like to make fast, informed decisions. The system can also allow for fewer incarcerated persons, which reduces costs to legislatures without compromising safety. Furthermore, the system can be used to replace costly current procedures with automated, streamlined services, and a 24-hour support staff operating as described can reduce the caseloads of supervisors, dramatically improving the public good.
Turning now to the figures,
In order to enable someone to connect with, and participate in, the channels of information and relationships supported, methods exist that connect individuals with resources. Exemplary channels of information and relationships supported by the system are illustrated in
Turning now to the individual components shown in
These reports can be released depending on user access level, including but not limited to the following: legislators and executive branch members can view aggregate data reports on supervised populations; and management officials can view reports on supervisors, to ensure that duties are being performed satisfactorily at all levels of the system.
There are multiple reasons why a participant might interact with the call center [42], such as when a supervisor wishes to speak to a participant, or when a participant misses a court date and would like help rescheduling; other cases are court ordered calls into the call center [42]. When a participant contacts the call center [42], for example, via their portable device, all of his or her information appears on a web-access display page for the call center employee to view. This display page, called a “dashboard,” can be configured to display all relevant information regarding the participant. This can include, but may not be limited to: personal information such as picture, address and name of supervisor; recent activity of the participant, with improper activity appearing at the top; current location and location history; terms and conditions of sentence; a calendar with upcoming requirements, and/or the participant's recent activity, including met or missed requirements (for example, a restitution payment).
Several tools, made available to users of the system via a web browser (such as Microsoft's Internet Explorer) can be provided to accomplish the matching of resources and participants. For example, after a supervisor logs into the system via a web page and enters his or her login credentials for verification, a supervisor calendar for the supervisor, and a participant calendar for each participant assigned to that supervisor, can be updated and synchronized. Synchronization can also occur at predefined intervals without the need for the supervisor or participant to log in. Other features, such as a template on which a staff member can type notes and send them directly to various parties can also be provided. Similarly, a system implemented according to this disclosure may include functionality to generate, on a regularly scheduled basis, a to-do list, which can list information that a call center employee could attempt to ascertain from a participant during a call, questions that could be asked may be regarding improper behavior (e.g. failure to contact supervisor when required), or reminders of other ongoing requirements. These questions (and their answers) can also be synchronized with the supervisor data either through a log in process or at regularly scheduled times.
Preferably, the system will operate using multiple, redundant, distributed data processing centers.
Block [56] represents the central processor. Block [58] represents the memory storage unit for the overall system, which can be used to hold any and all data entered into the system, including but not limited to participant data as described above. Block [60] represents the call manager/dialer aspects of the system, which can operate through and for the call centers and handle both incoming and outgoing calls. Block [62] shows a system web server, which can be used to enable all web-based communication provided by the disclosed technology, including mail and browsing features on the portable device. A web server [62] can also facilitate the display of reports for various users; for example, a legislator or other affiliated party can view a customized, web-access “dashboard,” described above. The final block [64] illustrated in
If, during the process of interaction with the supervisor or the call center as described herein, a participant is found compliant with the terms and conditions set forth in the his or her participant profile, the system proceeds to mark progress toward completion of program and updates the participant's risk score [70]. If the participant is not compliant, the system can be configured to contact the participant for an explanation [72] and to send a report to the top of the supervisor's list [74]. The supervisor can then determine the next course of action [76] and that adds sufficient data into the system to update the status of the participant.
The inventor's technology can also be used to provide other types of support and/or information. For example, the inventor's technology could be used in systems in which a first portable electronic device is provided to a participant under conditionally supervised, and a second portable electronic device is provided to an individual who needs protection from the participant. In this type of system, GPS or other type of location data from both devices can be sent to a data processing center as described, and the relationship between the locations of the two devices can be used to determine and provide useful information to the individual in need of protection. For instance, if information stored in a database at a data processing center indicated that a condition of the participant's release is that he or she remain more than 1000 feet away from the individual in need of protection, and the location data indicated that the participant had moved to within 1000 feet of the individual in need of protection, the data processing center could send a signal to the electronic device of the individual needing protection which could allow him or her to take appropriate action to avoid harm. To facilitate this, the electronic device for the individual needing protection could be configured with mapping software that, upon receipt of a notification from the data center, would display a map showing the relative locations of the participant and the individual in need of protection.
Variations on the above are also possible. For example, rather than (or in addition to) simply providing location information, other potentially useful information could be provided. For instance, the data processing center could be configured to provide movement data regarding the participant, and a map application on the electronic device of the individual needing protection could be configured to show vectors indicating the direction and speed of the participant, which information could allow the individual needing protection to avoid crossing the participant's path. Similarly, rather than (or in addition to) simply triggering a notification when a condition of the participant's conditionally supervised release is violated, the data processing center could be configured to detect when a violation appeared likely, and could trigger a notification in advance of the violation actually taking place. For instance, the data processing center could use changes in a participant's location information, and changes in the location information for the individual needing protection to detect that the two would come within a certain distance of each other if they continue their current activities. An alert could then be sent to the device of the individual requiring protection notifying him or her of the event even before a violation of the participant's terms of release (e.g., if the participant was prohibited from being within 500 feet of the individual requiring protection, the data center could detect and send an alert if the participant would come within 500 feet within a threshold time period if he/she continued to follow his/her current path at his/her current speed).
Further variations on events that would trigger a notification are also possible. For instance, notifications independent of a violation of release conditions could also be sent based static position, rather than movement. For example, it is possible that the inventor's technology could be used to implement a system which would detect whenever a participant came within a set distance (e.g., 500 feet) of an individual requiring protection, and would send a notification to the individual requiring protection when the participant came closer than that distance, regardless of whether that distance was required by the terms of the participant's conditional release.
As another example of variations on events that could trigger notifications, it is possible that notifications could be triggered based on proximity of a member of a class of participants to an individual needing protection, rather than being triggered based on proximity of an individual participant and an individual needing protection. To illustrate, consider the case of an elementary school teacher. While this teacher may not be under threat from any particular participant, the teacher (and, more directly, the students under the teacher's care) may require protection from participants identified as child sex offenders. To address this, a data processing center could be configured to store information identifying participants who have been classified as child sex offenders, and to send a notification to the teacher when the child sex offender is detected within a given proximity. In some cases, this type of notification could be keyed to more than just location. For example, if a child sex offender is detected within a certain proximity of a teacher outside of school hours, then a different (or no) notification could be sent relative to the notification that could be sent if the teacher was more likely to be in the company of children.
Variations are also possible with respect to the nature of notifications that could be sent. For example, in some cases, a portable device provided to an individual requiring protection could be configured to provide an audible alert when a notification is received (e.g., it could be a Smartphone which would ring when a notification is received). However, depending on why the individual needing protection needs protection, such an audible alert may be undesirable, as it might preclude the individual needing protection from protecting himself or herself by concealing his or her location from the participant (i.e., by hiding). To account for this fact, in some situations, a device provided to an individual needing protection could be configured to provide alerts that would be perceived only by the individual requiring protection (e.g., to vibrate). Alternatively (or additionally), the inventor's technology could be implemented to provide multiple notifications to minimize the possibility that an initial notification is not received. For example, an individual requiring protection could be given an initial notification via vibration of an electronic device, and, unless he or she provides an acknowledgement signal (e.g., actuation of a button, or reply to a notification text), the initial call could be followed by a call from personnel at a call center. Other types of multiple notifications (e.g., increasing volume of a ring, flashing lights, etc) are also possible, and could be implemented by those of ordinary skill in the art without undue experimentation in light of this disclosure.
Of course, while the above examples focused specifically on notifications provided to an individual needing protection, that type of notification could be supplemented (or supplanted) by other types of notifications. For example, notifications as described above could be sent to a participant, his or her supervisor, call center personnel, or others. Similarly, it is possible that notifications provided to different individuals could be triggered by different events. For example, it is possible that a participant could be sent a notification that an individual the participant was restricted from approaching was within 1000 yards, while the individual the participant was restricted from approaching might be given the same type of notification when the participant was within 500 yards. In this way, the individual requiring protection could avoid receiving an unduly large number of notifications (which could have a desensitizing effect), while the participant could be given a notification which would allow him or her to avoid inadvertently violating the conditions of his or her release without waiting until he or she was close enough to be able to use the notifications to locate the individual who requires protection.
Preferably, and in most cases, this type of notification to a participant, which would be triggered at least in part based on information about an individual not under the jurisdiction of the criminal justice system (e.g., an individual requiring protection) will be provided only if the individual not under the jurisdiction of the criminal justice system has opted in. However, there are some situations where restricting notifications to cases where there has been an opt-in may not be feasible (e.g., a teacher may be required to consent to proximity notifications being sent to participants during work hours as part of the teacher's job). The specific types of notifications, triggering events and conditions will vary from case to case, and so the notification examples set forth above, like the other examples in this application, should be understood as illustrative only, and should not be treated as limiting on the scope of protection afforded by this document or any related document.
While the above disclosure discussed and explained certain manners in which the inventor's technology can be used, it should be understood that the inventor's technology is not limited to being implemented in the manners explicitly described. Accordingly, instead of limiting the protection accorded by this document (or any related document) to the material explicitly disclosed herein, the protection should be understood to be defined by the claims when the terms in the claims which are listed under the heading “Explicit Definitions” are given the explicit definitions set forth herein, and all other terms are given their broadest reasonable interpretation as shown by a general purpose dictionary. To the extent that the interpretation which would be given to the claims based on the above disclosure or the incorporated priority documents is in any way narrower than the interpretation which would be given based on the “Explicit Definitions” and the broadest reasonable interpretation provided by a general purpose dictionary, the “Explicit Definitions” and the broadest reasonable interpretation provide by a general purpose dictionary shall control.
When used in the claims, the phrase “GPS data”, or “location data”, should be understood to refer to an identifiable unit of information received from a Global Position System satellite orbiting the Earth.
When used in the claims, the phrase “inbound transmission” should be understood to mean that destination of the data being sent from an electronic portable device is the data processing center.
When used in the claims, the phrase “outbound transmission” should be understood to mean that destination of the data being sent from the data processing center is an electronic portable device.
When used in the claims, the term “participant”, should be understood to mean a conditionally supervised individual who is currently, or was previously, a user of the system who was, or is currently, under the jurisdiction of a competent court.
When used in the claims, the term “supervisor” should be understood to mean an individual who is currently, or was previously, a user of the system that supervises a participant under the jurisdiction of a competent court.
When used in the claims, the phrase “sector specialist” should be understood to mean individuals who provide services to participants with the goal of helping them to assist the participant in their successful reentry into society at large.
When used in the claims, the term “profile” should be understood to mean a collection of data that is specific and personal to an individual.
When used in the claims, the phrase “real time”, or “real-time” should be understood to refer to nearly simultaneous in an absolute, physical sense and apparently simultaneously in a perceptual sense.
When used in the claims, the term “provide,” or “provides,” or “providing” should be understood to mean (i) to take precautionary measures, or (ii) to make a proviso or stipulation, or (iii) to make preparation to meet a need, or (iv) to prepare in advance, or (v) to supply or make available, or (vi) to make something available to, of (vii) to have as a condition.
When used in the claims, the phrases “electronic mobile device”, or “mobile device” should be understood to refer to any type of device comprising any type of electronic circuitry and uses a power supply that can easily, and reasonably, moved around, such as a laptop computer, and can receive and transmit GPS data.
Accordingly,
This document is related to, and claims priority from, U.S. provisional patent application Ser. No. 61/570,493, filed on Dec. 14, 2011 with the same title and inventor as the present document. That application is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5043736 | Darnell et al. | Aug 1991 | A |
5266944 | Carroll et al. | Nov 1993 | A |
5298884 | Gilmore et al. | Mar 1994 | A |
5369699 | Page et al. | Nov 1994 | A |
5396227 | Carroll et al. | Mar 1995 | A |
5461390 | Hoshen | Oct 1995 | A |
5537102 | Pinnow | Jul 1996 | A |
5661458 | Page et al. | Aug 1997 | A |
5731757 | Layson, Jr. | Mar 1998 | A |
5867103 | Taylor, Jr. | Feb 1999 | A |
5892447 | Wilkenson | Apr 1999 | A |
5959533 | Layson, Jr. | Sep 1999 | A |
5982281 | Layson, Jr. | Nov 1999 | A |
6014080 | Layson, Jr. | Jan 2000 | A |
6044257 | Boling et al. | Mar 2000 | A |
6054928 | Lemelson et al. | Apr 2000 | A |
6072396 | Gaukel | Jun 2000 | A |
6100806 | Gaukel | Aug 2000 | A |
6130620 | Pinnow et al. | Oct 2000 | A |
6160481 | Taylor, Jr. | Dec 2000 | A |
D440954 | Boling et al. | Apr 2001 | S |
6226510 | Boling et al. | May 2001 | B1 |
6285867 | Boling et al. | Sep 2001 | B1 |
6337665 | Gaukel | Jan 2002 | B1 |
6366538 | Anderson et al. | Apr 2002 | B1 |
6405213 | Layson et al. | Jun 2002 | B1 |
6437696 | Lemelson et al. | Aug 2002 | B1 |
6470319 | Ryan | Oct 2002 | B1 |
6606304 | Grinter et al. | Aug 2003 | B1 |
6636732 | Boling et al. | Oct 2003 | B1 |
6639516 | Copley | Oct 2003 | B1 |
6646617 | Gaukel | Nov 2003 | B1 |
6674368 | Hawkins et al. | Jan 2004 | B2 |
6703936 | Hill et al. | Mar 2004 | B2 |
6774797 | Freathy et al. | Aug 2004 | B2 |
6774799 | Defant et al. | Aug 2004 | B2 |
6844816 | Melton et al. | Jan 2005 | B1 |
6853304 | Reisman et al. | Feb 2005 | B2 |
6972684 | Copley | Dec 2005 | B2 |
6992581 | Reisman et al. | Jan 2006 | B2 |
6992582 | Hill et al. | Jan 2006 | B2 |
6998985 | Reisman et al. | Feb 2006 | B2 |
7015817 | Copley et al. | Mar 2006 | B2 |
7064670 | Galperin et al. | Jun 2006 | B2 |
7092695 | Boling et al. | Aug 2006 | B1 |
7098795 | Adamczyk et al. | Aug 2006 | B2 |
7119695 | Defant et al. | Oct 2006 | B2 |
7123141 | Contestabile | Oct 2006 | B2 |
7205890 | Defant et al. | Apr 2007 | B2 |
7251471 | Boling et al. | Jul 2007 | B2 |
RE39909 | Taylor, Jr. | Nov 2007 | E |
7317377 | Galperin et al. | Jan 2008 | B2 |
7330122 | Derrick et al. | Feb 2008 | B2 |
7382268 | Hartman | Jun 2008 | B2 |
7420878 | Holmes et al. | Sep 2008 | B2 |
D578918 | Aninye | Oct 2008 | S |
7446656 | Blakeway | Nov 2008 | B2 |
7456355 | Blakeway | Nov 2008 | B2 |
7489249 | Better et al. | Feb 2009 | B2 |
7518500 | Aninye et al. | Apr 2009 | B2 |
7522060 | Tumperi et al. | Apr 2009 | B1 |
7545318 | Derrick et al. | Jun 2009 | B2 |
7619513 | Hill et al. | Nov 2009 | B2 |
7636047 | Sempek | Dec 2009 | B1 |
7701171 | Defant et al. | Apr 2010 | B2 |
7719426 | Sloan | May 2010 | B2 |
7737841 | Derrick et al. | Jun 2010 | B2 |
7751282 | Holmes et al. | Jul 2010 | B2 |
7804412 | Derrick et al. | Sep 2010 | B2 |
7860222 | Sidler et al. | Dec 2010 | B1 |
7864047 | Aninye et al. | Jan 2011 | B2 |
7864050 | Eslambolchi et al. | Jan 2011 | B1 |
7889847 | Gainsboro | Feb 2011 | B2 |
7930927 | Cooper et al. | Apr 2011 | B2 |
7936262 | Derrick et al. | May 2011 | B2 |
7961092 | Freathy et al. | Jun 2011 | B2 |
7984540 | Blakeway | Jul 2011 | B2 |
8009036 | Freathy et al. | Aug 2011 | B2 |
8013736 | Derrick et al. | Sep 2011 | B2 |
8031077 | Derrick et al. | Oct 2011 | B2 |
8098804 | Rae et al. | Jan 2012 | B1 |
8232876 | Derrick et al. | Jul 2012 | B2 |
8275096 | Neece | Sep 2012 | B2 |
8395513 | Moran et al. | Mar 2013 | B2 |
20020067272 | Lemelson et al. | Jun 2002 | A1 |
20040199462 | Starrs | Oct 2004 | A1 |
20060149665 | Weksler | Jul 2006 | A1 |
20070139207 | Agapi et al. | Jun 2007 | A1 |
20070280462 | Neece | Dec 2007 | A1 |
20080012760 | Derrick et al. | Jan 2008 | A1 |
20080088438 | Aninye et al. | Apr 2008 | A1 |
20080096521 | Boling et al. | Apr 2008 | A1 |
20080108370 | Aninye | May 2008 | A1 |
20080122613 | Sanger | May 2008 | A1 |
20080316022 | Buck et al. | Dec 2008 | A1 |
20100066545 | Ghazarian | Mar 2010 | A1 |
20100090825 | Freathy | Apr 2010 | A1 |
20100090827 | Gehrke et al. | Apr 2010 | A1 |
20100123589 | Buck et al. | May 2010 | A1 |
20100240969 | Rompa et al. | Sep 2010 | A1 |
20110133928 | Buck et al. | Jun 2011 | A1 |
20110133937 | Buck et al. | Jun 2011 | A1 |
20110195722 | Walter et al. | Aug 2011 | A1 |
20110248853 | Roper et al. | Oct 2011 | A1 |
20120056744 | Gemer | Mar 2012 | A1 |
20120299722 | Lee et al. | Nov 2012 | A1 |
20130006066 | Melton | Jan 2013 | A1 |
20130024112 | Tate, Jr. | Jan 2013 | A1 |
Entry |
---|
Screenshot, 3M Electronic Monitoring, Domestic Violence Proximity Notification System, 2011. Accessed May 22, 2013 http://solutions.3m.com/3MContentRetrievalAPI/BlobServlet?lmd=1316545433000&locale=en—WW&assetType=MMM—Image&assetId=1273695271401&blobAttribute=ImageFile. |
Screenshot, Oakland County Michigan, Community Corrections, Electronic Monitoring Devices, 2012. Accessed May 22, 2013 http://www.oakgov.com/commcorr/Pages/program—service/electronic—monitor.aspx. |
Utterback's Utterings, Satellite Tracking of People LLC, Stalker Alert, Feb. 1, 2011. Accessed May 22, 2013 http://www.utterbacksutterings.com/category/domestic-violence/. |
Number | Date | Country | |
---|---|---|---|
61570493 | Dec 2011 | US |