noshitshirlock's Posts (8)

Sort by

It is so blatantly obvious without this information, that to carry out these most despicable evil crimes it had to be the CIA's bitch the  FBI.  These are the ones that are running this program.  Reporting anything to these is a total waste of your time, it is just feed back to them.  Follow the links to read what these have been up to.  And to you low life FBI'ers, may I repeat my favorite saying....  Be sure your sins will find you out. 

The Return of COINTELPRO?

by TOM MCNAMARA

“Democracies die behind closed doors” – Judge Damon J. Keith

For 15 years (1956-1971) the Federal Bureau of Investigation (FBI) ran a broad and highly coordinated domestic intelligence / counterintelligence program known as COINTELPRO (COunter INTELligence PROgrams). What was originally deemed as a justifiable effort to protect the US during the Cold War from Soviet and Communist threats and infiltration, soon devolved into a program for suppressing domestic dissent and spying on American citizens. Approximately 20,000 people were investigated by the FBI based only on their political views and beliefs. Most were never suspected of having committed any crime.

The reasoning behind the program, as detailed in a 1976 Senate report, was that the FBI had “the duty to do whatever is necessary to combat perceived threats to the existing social and political order.” The fact that the “perceived threats” were usually American citizens engaging in constitutionally protected behaviour was apparently overlooked. The stated goal of COINTELPRO was to “expose, disrupt, misdirect, discredit, or otherwise neutralize” any individual or group deemed to be subversive or a threat to the established power structure.

The FBI’s techniques were often extreme, with the agency being complicit in the murder and assassination of political dissidents, or having people sent away to prison for life. Some of the more “moderate” actions that were used were blackmail, spreading false rumors, intimidation and harassment. It has been argued that the US is unique in that it is the only Western industrialized democracy to have engaged in such a wide spread and well organized domestic surveillance program. It finally came to an end in 1971 when it was threatened with public exposure.

Or did it?

In a stunning revelation from the Partnership for Civil Justice Fund (PCJF), it appears that COINTELPRO is alive and well. Through a Freedom of Information Act (FOIA) request, PCJF was able to obtain documents showing how the FBI was treating the Occupy Wall Street (OWS) movement, from its inception, as a potential criminal and domestic terrorist threat. This despite the FBI’s own acknowledgement that the OWS organizers themselves planned on engaging in peaceful and popular protest and did not “condone the use of violence.”

The documents, while heavily redacted, give a clear picture of how the FBI was using its offices and agents across the country as early as August 2011 to engage in a massive surveillance scheme against OWS. This was almost a month before any actual protests took place or encampments were set up (the most famous being the one in New York City’s Zuccotti Park).

The FBI’s documents show a government agency at its most paranoid. It considered all planned protests, and the individuals involved, as potential threats. Most disturbing of all, there is talk (p. 61) of the government being ready to “engage in sniper attacks against protesters in Houston, Texas, if deemed necessary” and perhaps needing to formulate a plan “to kill the leadership [of the protest groups] via suppressed sniper rifles.”

Furthermore, the documents reveal a close and intricate partnership between the federal government on one side and banks and private businesses on the other.

On August 19, 2011, the FBI met with representatives of the New York Stock Exchange in order to discuss OWS protests that wouldn’t happen for another four weeks. In September of that year, even before OWS got into full swing, the FBI was notifying local businesses that they might be affected by protests. It is not clear if, while on Wall Street, the FBI investigated the criminal and irresponsible behavior engaged in by some of the largest banks on the planet, behavior which led directly to the financial crisis of 2008.

We are also introduced to a creature named the “Domestic Security Alliance Council” which, according to the federal government, is “a strategic partnership between the FBI, the Department of Homeland Security and the private sector.” A DSAC report tells us that any information shared between US intelligence agencies and their corporate partners should not be released to “the media, the general public or other personnel.”

In a curious coincidence, nine days after the PCJF’s embarrassing release of FBI documents, the New York Post ran a story about how a 27 year old woman and her “Harvard grad and Occupy Wall Street” boyfriend, Aaron Greene, were arrested by officers from the New York City Police Department (NYPD) after an alleged cache of weapons and bomb making explosives were found in their Greenwich Village apartment.

And what exactly led the police to this apartment? Was it credible actionable intelligence gathered from the FBI’s massive domestic surveillance program? Did some agent acquire this information by bravely infiltrating the potential domestic terrorist group known as OWS? Hardly. The NYPD was simply executing a routine search warrant related to a credit card-theft case.

But in a story about the exact same event that appeared in the New York Times, it was reported that “police said they did not believe that Mr. Greene was active in any political movements” and that no “evidence of a planned terrorist attack” had been found . Furthermore, police hadn’t “made a connection to any known plot or any connection to any known terrorists.” No mention was made of the suspect’s alleged ties to the OWS movement, an item that had been prominently reported in the New York Post’s version of events.

Oddly, a more recent New York Post story stated that Mr. Greene was now a “Nazi-loving Harvard grad” and a reported “Adolf Hitler-wannabe.” No mention was made of his suspected ties to OWS. This author made several attempts to contact the New York Post, and the writers of the 2 articles, in an effort to find out how they knew that Mr. Greene was an OWS member and activist. Attempts were also made to try to find out if the New York Post still believed that Mr. Greene was an active OWS member, or if they now simply thought that he was just an “Adolf Hitler-wannabe.”

As of the writing of this article, no response has been received from the New York Post.

The FBI’s stated mission regarding America’s security is to “develop a comprehensive understanding of the threats and penetrate national and transnational networks that have a desire and capability to harm us.”

The American people would be far better served by their government if, instead of wasting millions of dollars and thousands of man-hours harassing peaceful protesters, it spent a fraction of that time and money investigating, and bringing to justice, the people responsible for the engineered destruction of the American economy, and by extension, American society.

You know. The real terrorists.

Tom McNamara is an Assistant Professor at the ESC Rennes School of Business, France, and a Visiting Lecturer at the French National Military Academy at Saint-Cyr, Coëtquidan, France.

Sources

“COINTELPRO: The FBI’s Covert Action Programs Against American Citizens” Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, Book III, Final report of the Select Committee to Study Governmental Operations with respect to Intelligence Activities, United States Senate, April 23, 1976. Accessed at:

http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIa.htm

“COINTELPRO: The Untold American Story”, by Paul Wolf with contributions from Robert Boyle, Bob Brown, Tom Burghardt, Noam Chomsky, Ward Churchill, Kathleen Cleaver, Bruce Ellison, Cynthia McKinney, Nkechi Taifa, Laura Whitehorn, Nicholas Wilson, and Howard Zinn. Presented to U.N. High Commissioner for Human Rights Mary Robinson at the World Conference Against Racism in Durban, South Africa by the members of the Congressional Black Caucus attending the conference: Donna Christianson, John Conyers, Eddie Bernice Johnson, Barbara Lee, Sheila Jackson Lee, Cynthia McKinney, and Diane Watson, September 1, 2001. Accessed at:

http://www.icdc.com/~paulwolf/cointelpro/coinwcar3.htm

“FBI Documents Reveal Secret Nationwide Occupy Monitoring” The Partnership for Civil Justice Fund (PCJF), December 22, 2012. Accessed at:
http://www.justiceonline.org/commentary/fbi-files-ows.html

“Greenwich Village couple busted with cache of weapons, bombmaking explosives: sources” by Jamie Schram, Antonio Antenucci and Matt McNulty, December 31, 2012, The New York Post.   Accessed at:

http://www.nypost.com/p/news/local/manhattan/bombmaking_in_the_village_LoRDqNzP02SDZyfC1pLVXN

“Manhattan Couple Stored Bomb-Making Items, Police Say” by Wendy Ruderman, December 31, 2012, The New York Times. Accessed at:

http://www.nytimes.com/2013/01/01/nyregion/manhattan-couple-stored-bomb-making-items-police-say.html?_r=2&%29&

“More About FBI Spying” The American Civil Liberties Union (ACLU), June 25, 2010. Accessed at:

http://www.aclu.org/spy-files/more-about-fbi-spying

“NYC couple arrested after explosive substance find” December 31, 2012, CBS/AP. Accessed at:

http://www.cbsnews.com/8301-201_162-57561371/nyc-couple-arrested-after-explosive-substance-find/

“Revealed: how the FBI coordinated the crackdown on Occupy” by Naomi Wolf, December 29, 2012, The Guardian. Accessed at:

And that my friends is NoShit

Read more…

I knew these perps were low life scumbags, but this is absolutely outrageous.  This is without doubt a government perp/stalker, sent in to this guys apartment to move objects around and steal nothing.  All T.I's are familiar with this method and this dirty skunk  was caught bang to rights raping that poor pouch.   May this be a lesson to you stalking scumbags, be sure your sins will catch you out.

Suspect caught on camera will have to register as sex offender after prison sentence.

RYE, N.Y. -- An apartment building superintendent who was caught on tape entering a unit and having sex with the tenant's puppy was sentenced to prison Tuesday.

Kujtim Nicaj, 44, was sentenced Tuesday by Westchester County Judge Barry Warhit to 6 1/2 years in prison and 7 years' probation after pleading guilty in October 2012 to burglary and sexual misconduct charges.

"This case was unusual to say the least," Warhit said. "You exhibited cruelty to the animal. Your behavior was inexcusable."

Alan Kachalsky thought something in his apartment was amiss for months -- blinds drawn that had not been, a window left open that he had left shut. But nothing ever went missing, and, fearing he may come off as paranoid, Kachalsky never went to the police.

Instead, he set up three cameras and waited. Kachalsky shared his apartment at the Rye Colony Cooperative Apartments with a male Labrador puppy, Gunner, who, unbeknownst to Kachalsky, was the real target of the burglar.

The burglar, it turned out, wasn't there to steal anything, Kachalsky said Tuesday, but for something far more unimaginable.

Kachalsky, an attorney, said it never occurred to him that someone was returning to have sex with his dog.

Kachalsky turned over the video to police, who questioned and arrested Nicaj on Feb. 9, 2012, for sex acts against the 1-year-old dog committed the day before.

Nicaj, who wore a blue-striped gray sweater and blue jeans Tuesday in Westchester County Court, spoke little in court before his sentence, only telling Warhit that he had nothing to say. Steven Davidson, a lawyer for Nicaj, indicated after the proceedings that he might appeal the sentence, calling it unfair.

"We'll do everything we can to protect his interests," Davidson said, adding that Nicaj was doing well under the circumstances, "other than what his family is going through."

Nicaj will also have to register as a sex offender after the completion of his sentence, as well as agree to stay away from Kachalsky.

Nicaj, a 15-year resident of Rye, worked at the apartment complex for six years before his arrest, and Kachalsky said that the super seemed like a normal guy until one day, a few weeks before Kachalsky had set up the cameras, when the two had an odd run-in outside Kachalsky's apartment.

"He said he had stopped by to check the gas," Kachalsky said, even though the gas had been on for some time.

None

Gunner, a 1-year-old male Labrador puppy, was the target of sex acts by his owner's building superintendent.(Photo: The (Westchester, N.Y.) Journal News)

Finally, Kachalsky set up three cameras, which provided indisputable evidence -- "a naked man, in your apartment, having sex with your dog," Kachalsky said.

"I was wondering why someone would keep coming in here," Kachalsky said. "I never noticed anything to make me think."

A subsequent examination of Gunner by a veterinarian revealed no permanent physical damage, Kachalsky said, and the vet even expressed surprise that the soon-to-be 2-year-old pup could still interact normally with men.

The dog had always eagerly greeted visitors at the door, Kachalsky said, and still does, but on the video, with Nicaj, Gunner was abnormally passive.

"Gunner just sat on the couch," Kachalsky said. "He did not get up."

Now, Kachalsky said, Gunner is mostly back to his old self. He turns 2 years old Jan. 25.

"Anytime anyone comes in, he's all over 'em," Kachalsky said. "He's a terrific dog."

Read more…

Quite a few good sources of info

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor's web of informers, pay-off structure, payment laundering techniques and psychological methods.

A LIST OF THE CRIMES COMMITTED BY THE NWO-Nazis

Released on 2012-08-11 00:00 GMT

Email-ID1277361
Date2008-09-22 03:12:28
Fromtilachesis@gmail.com
Tonorway@un.int
A LIST OF THE CRIMES COMMITTED BY THE NWO-Nazis

A list of the crimes committed by the NWO-Nazis.
Like the WWII Nazis the NWO-Nazis must answer for their crimes.

Remember the real story of the causes of WWII and the Cold War.
THE CRIMES:-
Secret Geophysical Weapons (earthquake, floods, storms, fires) Crimes
Against Humanity in Myanmar, China, Iran, USA, Central America, Turkey,
Greece, Pakistan, India, Japan and Indonesia killing well over a million
people and massive destruction. (please see the REFERENCES below)

War Crimes, Crimes Against Humanity and Torture using Directed Energy and
Neurological Weapons to cause the most horrendous psychological tortures,
rapes, sexual abuse, surgical mutilations, and other mental and physical
mutilations on many, many thousands of people worldwide - leaders,
citizens and combatants.
(please see the REFERENCES below)

Dirty Wars and Black Operations fomenting and prolonging conflicts and
civil strife in Algeria, Sudan, Congo, Thailand, Somalia, Palestine,
Lebanon, Egypt, Kenya, Zimbabwe, South Africa, Turkey, Russia, Chechnyia,
Pakistan, India, Kashmir, Sri Lanka, China, Tibet, Colombia, Bolivia
causing the deaths of hundreds of thousands of people.

Crimes Against Peace, War Crimes and Crimes Against Humanity in Iraq and
Afghanistan resulting in the deaths of well over a million people and the
ongoing destruction of those countries, as the criminals pretend that the
world's most powerful surveillance and military forces can't establish
peace and stability there in 5 and 7 years respectively

Crimes Against Humanity using Directed Energy Weapons to cause crashes,
electrical and mechanical disasters, and violations of the integrity of
electronic data and systems killing thousands of people and causing much
criminal malfeasance. (please see the REFERENCES below)
Active Criminal Complicity in all of the above crimes by the Media
Monopolies as almost all public discourse, and as much as 80% of
'international news', 'events' and 'history', has been degraded into
produced and managed dramas/atrocities (i.e. wars, disasters, civil strife
etc), and criminally presented as infotainment, endogenous socio-political
changes, propaganda and/or pseudo-science.
(please see the REFERENCES below)

Active Criminal Complicity in all of the above crimes by other
Governments, Agencies and International Organisations as there's no
genuine information or analyses about any of these crimes a** at all.

Regarding these Crimes Against Humanity, War Crimes, Dirty Wars, Black
Operations, And Secret Weapons there is a complete ORWELLIAN/STALINIST
PUBLIC INFORMATION AND INQUIRY BLACKOUT.

THE NWO-NAZIS:-
the USA, UK, NATO (with Secret Geophysical Weapons "Weather Machine" War
Crimes Bases in Alaska, Norway, Greenland, Australia), Canada, and the
Agencies, Corporations, and the Media Monopolies actively involved in the
planning, initiation and perpetration of these crimes

Like the WWII Nazis the NWO-Nazis must answer for their crimes.

Remember the real story of the causes of WWII and the Cold War.


SECRET GEOPHYSICAL, DIRECTED ENERGY & NEUROLOGICAL WEAPONS - TECHNICAL &
POLITICAL/HISTORICAL INFORMATION
US CONGRESS, EUROPEAN PARLIAMENT & UK PARLIAMENT - BRIEFINGS ON SECRET
GEOPHYSICAL WEAPONS & 'MIND CONTROL'
WEB: http://www.policestateplanning.com/briefings.htm

RUSSIAN FOREIGN MINISTER SERGEI LAVROV - "THE THREAT OF NEW WEAPONRY"
WEB: http://english.pravda.ru/science/tech/84544-0/

GLOBAL RESEARCH.CA - WEATHER WARFARE
WEB:
http://www.globalresearch.ca/index.php?context=viewArticle&code=CHO20020104&articleId=205
http://www.google.com/search?domains=globalresearch.ca&q=haarp&sa=Google+Search&sitesearch=globalresearch.ca
"HAARP IS FULLY OPERATIONAL AND HAS THE ABILITY OF POTENTIALLY TRIGGERING
FLOODS, DROUGHTS, HURRICANES AND EARTHQUAKES. FROM A MILITARY STANDPOINT,
HAARP IS A WEAPON OF MASS DESTRUCTION"

CAMPAIGN FOR COOPERATION IN SPACE - HAARP IS A SPACE-BASED WEAPON OF
MASS-DESTRUCTION
WEB:
http://peaceinspace.blogs.com/peaceinspaceorg/2008/05/haarp-is-a-spac.html

FROM PRAVDA - SECRET GEOPHYSICAL WEAPONS - "UNPREDICTABLE NATURAL
DISASTERS AND MAN-CAUSED CATASTROPHES"
WEB: http://english.pravda.ru/main/2003/01/15/42068.html
SECRET GEOPHYSICAL WEAPONS
WEB: http://www.rense.com/general28/deathray.htm

THE SHOCKING MENACE OF SATELLITE SURVEILLANCE by John Fleming
WEB: http://www.sianews.com/modules.php?name=News&file=article&sid=1068

JOHN ST. CLAIR AKWEI VS. NSA, FT. MEADE, MD, USA
WEB: http://www.angelfire.com/or/mctrl/akwei.html

SYSTEMS OF SURVEILLANCE & REPRESSION by Judy Malloy
WEB: http://www.well.com/user/jmalloy/gunterandgwen/resources.html

WANTTOKNOW. INFO/MINDCONTROL
WEB: http://www.wanttoknow.info/mindcontrol10pg
MIND CONTROL & SUBLIMINAL SUGGESTION - 100 USA PATENTS
WEB: http://www.rexresearch.com/sublimin/sublimin.htm

ON THE NEED FOR NEW CRITERIA OF DIAGNOSIS OF PSYCHOSIS IN THE LIGHT OF
MIND INVASIVE TECHNOLOGY, CAROLE SMITH, JOURNAL OF PSYCHO-SOCIAL STUDIES ,
VOL 2(2) NO 3 2003
WEB: http://www.angelfire.com/or/mctrl/NewCrit-JPSS-CS2.htm

PROJECT CENSORED - HUMAN RIGHTS AND FREEDOM OF THOUGHT VIOLATIONS BY US
MILITARY/INTELLIGENCE ORGANIZATIONS.
WEB:
http://www.projectcensored.org/articles/story/us-intelligence-community-human-rights-violations/

PROJECT CENSORED - NO HABEAS CORPUS FOR 'ANY PERSON'
"THE NEW LAW APPEARS TO CREATE A PARALLEL 'STAR CHAMBER' SYSTEM FOR THE
PROSECUTION, IMPRISONMENT, AND POSSIBLE EXECUTION OF ENEMIES OF THE STATE,
WHETHER THOSE ENEMIES ARE FOREIGN OR DOMESTIC"
WEB:
http://www.projectcensored.org/top-stories/articles/1-no-habeas-corpus-for-any-person/

PROJECT CENSORED - AN ELECTION WITHOUT MEANING
"WILL HABEAS CORPUS AND POSSE COMITATUS BE RESTORED TO THE PEOPLE? WILL
TORTURE STOP?...WILL THE US NATIONAL SECURITY AGENCIES STOP MASS SPYING ON
OUR PERSONAL COMMUNICATIONS? WILL THE NEO-CONSERVATIVE AGENDA OF TOTAL
MILITARY DOMINATION OF THE WORLD BE REVERSED?"
WEB:
http://www.projectcensored.org/articles/story/an-election-without-meaning/

WALL STREET JOURNAL - NSA's DOMESTIC SPYING GROWS
WEB:
http://online.wsj.com/article/SB120511973377523845.html?mod=hps_us_whats_news

AUSTRALIA FIRST TO ADMIT "WE'RE PART OF GLOBAL SURVEILLANCE SYSTEM" -
ECHELON OUTED BY THE HEAD OF AUSTRALIA'S DEFENCE SIGNALS DIRECTORATE
(DSD), MARTIN BRADY.
WEB: http://www.heise.de/tp/r4/artikel/2/2889/1.html

MONARCH THE NEW PHOENIX PROGRAM
WEB: http://www.monarchnewphoenix.com/ , http://www.myspace.com/marsboy683

THE EUROPEAN UNION...A TOTALITARIAN POLICE STATE IN THE MAKINGa*|.?
WEB:
http://groups.google.de/group/archive_news/browse_thread/thread/ad50ce7bbeaffbca?hl=en

BUSH/USA - WAR CRIMES & HITLER CONNECTIONS
WEB:
http://www.huffingtonpost.com/larisa-alexandrovna/all-the-presidents-nazis_b_102022.html

STATE-SPONSORED TERROR: BRITISH AND AMERICAN BLACK OPS IN IRAQ
WEB: http://www.globalresearch.ca/index.php?context=va&aid=9447
PROJECT CENSORED - THE PROPAGANDA MODEL & ACCELERATED MEDIA CONCENTRATION
A HANDFUL OF MULTINATIONAL CORPORATIONS CONTROLS NEARLY EVERYTHING WE SEE
AND HEAR ON THE SCREEN, OVER THE AIRWAVES AND IN PRINT. WHAT IMPACT DOES
CONSOLIDATION HAVE ON NEWS COVERAGE, ENTERTAINMENT CULTURE, FREEDOM OF
SPEECH AND DEMOCRACY?
WEB:
http://www.projectcensored.org/articles/story/left-progressive-media-inside-the-propaganda-model/

THE NEW MEDIA MONOPOLY - BEN BAGDIKIAN
DESCRIBES THE CARTEL OF FIVE GIANT MEDIA CONGLOMERATES WHO NOW CONTROL THE
MEDIAa*|. THEY MANUFACTURE POLITICS AND SOCIAL VALUES... A COUNTRY WITHOUT
ALL THE SIGNIFICANT NEWS, POINTS OF VIEW, AND INFORMATION ITS CITIZENS
NEED TO BE INFORMED IS RISKING THE LOSS OF DEMOCRATIC RIGHTS.
WEB: http://benbagdikian.net/index.htm

ABOUT THE CAUSES OF THE 2ND WORLD WAR
WEB: http://www.agitprop.org.au/lefthistory/1948_falsifiers_of_history.php
USA REPRESENTATIVE JIM GUEST'S (MO) LETTER
WEB: http://www.freedomfchs.com/repjimguestltr.pdf

"October 10, 2007
Dear Member of the Legislature and Friends:

This letter is to ask for your help for the many constituents in our
country who are being affected unjustly by electronic weapons torture and
covert harassment groups. Serious privacy rights violations and physical
injuries have been caused by the activities of these groups and their use
of so-called non-lethal weapons on men, women, and even children.

I am asking you to play a role in helping these victims and also stopping
the massive movement in the use of Verichip and RFID technologies in
tracking Americans. . . . . ."

Sincerely,
Representative Jim Guest EMAIL: Jim.Guest@house.mo.gov ,
jimoguest@msn.com 
WEB: http://jimguest.com/

PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com, MCmailteam@gmail.com

TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST TORTURE
AND ABUSE USING DIRECTED ENERGY AND NEUROLOGICAL WEAPONS
DIRECTED ENERGY & NEUROLOGICAL WEAPONS VICTIMS' ORGANISATIONS & FURTHER
INFORMATION
FREEDOM FROM COVERT HARASSMENT AND SURVEILLANCE
MR DERRICK ROBINSON
WEB: http://freedomfchs.com/
EMAIL: info@freedomfchs.com, derrickrobinson@gmail.com,

THE ASSOCIATION AGAINST THE ABUSE OF PSYCHOPHYSICAL WEAPONS
PRESIDENT SWETLANA SCHUNIN
EMAIL: DimitriSchunin@gmx.de, ka4143-896@online.de,
WEB: http://psychophysischer-terror.de.tl/

THE AMERICAN COGNITIVE LIBERTIES ASSOCIATION
THE DIRECTOR
WEB: http://americancognitivelibertiesassoc.org/default.aspx
EMAIL: emailus@americancognitivelibertiesassoc.org,
ACLA@americancognitivelibertiesassoc.org,

THE FEDERATION AGAINST MIND CONTROL EUROPE
MS MONIKA STOCES, MR DANNY BONTE
WEB: http://www.mindcontrol-victims.eu/
EMAIL: MCmailteam@gmail.com, monika.stoces@telenet.be,
monika.stoces@gmail.com, danny.bonte@gmail.com,

MIND CONTROL - TECHNOLOGY, TECHNIQUES & POLITICS
MR ALLEN BARKER Ph.D
WEB: http://www.cs.virginia.edu/~alb/misc/truth.html ,
http://www.cs.virginia.edu/~alb/misc/moreMindLinks.html

SURVEILLANCE ISSUES
MR PAUL BAIRD
WEB: www.surveillanceissues.com
EMAIL: p.baird@surveillanceissues.com,

SECRET ILLEGAL SURVEILLANCE AND ATTACKS
MS LESLIE CRAWFORD
WEB: http://www.lesliecrawford.cabanova.com/page1.html
EMAIL: lesliecraw40@talkamerica.net

MIND JUSTICE
MS CHERYL WELSH
WEB: http://www.mindjustice.org/
EMAIL: welsh@dcn.davis.ca.us

INTERNATIONAL MOVEMENT TO BAN THE MANIPULATION OF THE HUMAN NERVOUS SYSTEM
BY TECHNICAL MEANS,
MR MOMJIR BABACEK
WEB: http://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm,
http://web.iol.cz/mhzzrz/
EMAIL: mbabacek@iol.cz, welsh@dcn.davis.ca.us,

FRANCE - INFORMATION DOSSIER

WEB: http://informationdossier.wordpress.com/
EMAIL: rudyrud2004@gmail.com

GERMANY - VEREIN GEGEN DEN MISSBRAUCH PSYCHOPHYSISCHER WAFFEN
WEB: http://psychophysischer-terror.de.tl/

ASSOCIAZIONE VITTIME ARMI ELETTRONICHE-MENTALI
MR PAOLO DORIGO
WEB: http://it.geocities.com/decifircas/
www.associazionevittimearmielettroniche-mentali.org
EMAIL: info@avae-m.org,
info@associazionevittimearmielettroniche-mentali.org, basmau@libero.it,
paola.marziani@libero.it, antanarivo@libero.it,

INDIA - NO MORE COVERT MIND CONTROL WEAPONS

MR FEISAL SALIM A.S.
WEB: http://www.mindcontrolvictimsunity.in/
EMAIL: info@mindcontrolvictimsunity.in, informvictim@gmail.com
CHINA - PEACEPINK -c,^2*c,-o-c-aa**aa^1^3
MS SOLEILMAVIS
WEB: http://groups.google.com/group/soleilmavismailteam/ 
http://soleilmavis.googlepages.com/ ,

http://groups.google.com/group/soleilmavis (IN CHINESE)
http://soleilmavis.spaces.live.com/
EMAIL: soleilmavis@yahoo.com,



JAPAN - STOP MIND CONTROL
a*(R)a*ua*CURa**a*-a**aa*uaa*"ae**e!*a**aa?*c,**aa|c,*a**ae*-ac,*"a**a**a**a**a*CURa*^3a**a*^3a*^3a**a*a*
1/4a*<<a*(R)aa 1/4.aa*P:a:-o-oa: 1/2*aa(R)*e"*a*<<aa**aa- 3/4a**a* 3/4a**

WEB: http://www5f.biglobe.ne.jp/~terre/index.html , http://www.mirai1.com/
, (in JAPANESE and ENGLISH)
http://www.geocities.jp/techhanzainetinfo/ (in JAPANESE)

JAPAN -
WEB: http://gangstalkinginde.blog59.fc2.com/

THE MOSCOW HOUSING ECOLOGY COMMITTEE
MS ALLA PETUKHOVA
WEB: http://www.moscomeco.narod.ru./
EMAIL: pealla@mail.ru, moscomeco@mail.ru, moskomekologia@narod.ru

THE ST.PETERSBOURGH SOCIETY OF PERSONS SUBJECT TO REMOTE CONTROLLED
BIOENERGETIC TERROR
THE DIRECTORS
WEB: http://psyterror.narod.ru/
EMAIL: pealla@mail.ru, moscomeco@mail.ru, moskomekologia@narod.ru

BAN ELECTRONIC WARFARE ON CIVILIANS PETITION
280 + SIGNATURES AND MESSAGES OF VICTIMS & SUPPORTERS
WEB: http://www.ipetitions.com/petition/synergy/?e
EMAIL: ti.synergy@gmail.com, kommmy@gmail.com

MIND CONTROL FORUM VICTIMS' ACCOUNTS
600 + VICTIMS' ACCOUNTS
WEB: http://www.mindcontrolforums.com/archv-hm.htm

NAFF - ADVOCATING FOR VICTIMS OF MIND CONTROL, TORTURE, SLAVERY & RELATED
TERROR
MS KATHLEEN SULLIVAN
WEB: http://naffoundation.org/
EMAIL: mail@naffoundation.org

FASCISM - "9-11" - MIND CONTROL
MR JAMES MARINO
WEB: http://www.9-11themotherofallblackoperations.blogspot.com/
EMAIL: peaceseeker12@hotmail.com

CITIZENS AGAINST HUMAN EXPERIMENTATION
MR RICHARD PERLMANN
WEB: http://www.healthycitizens.blogspot.com/
EMAIL: healthycitizens@gmail.com, rjp@healthycitizens.com

THE CENTER FOR COGNITIVE LIBERTY & ETHICS (CCLE)
MR RICHARD GLEN BOIRE, DR WRYE SENTENTIA
WEB: http://www.cognitiveliberty.org/index.html
EMAIL: info@cognitiveliberty.org,

RULE OF LAW DEFENDERS
MR MOE HOSNY
WEB: www.hosnyinfo.com
EMAIL: defend_law@yahoo.ca

MIKROWELLENTERROR.DE/
WEB: http://www.mikrowellenterror.de/
EMAIL: info@mikrowellenterror.de, webmaster@mikrowellenterror.de

INTERNATIONAL COMMITTEE ON OFFENSIVE MICROWAVE WEAPONS
MR HARLAN GIRARD
WEB: http://www.icomw.org/
EMAIL: http://www.icomw.org/contact.asp

THE OMINOUS PARALLELS
WEB: http://www. theominousparallels.blogspot. com/
EMAIL: theominousparallels@gmail.com , theepitbull@gmail.com,

EXOTIC WARFARE.COM
WEB: http://exoticwarfare.org/
EMAIL: journalist@Safe-mail.net, texassupport@fastmail.fm

ORGANIZED CRIME WAVES
MS ELIZABETH ADAMS
http://www.organizedcrimewaves.com/
EMAIL: organizedgovcrimes@yahoo.com

EMF TORTURE CHAMBER
MS T. JOSEPHINE
WEB: http://www.geocities.com/xposperps/
EMAIL: http://emftorturechamber.blogspot.com/, xposperps@yahoo.com

TECHNOLOGICAL TORTURE
MS PAT STEWART
WEB: http://iamatorturevictim.blogspot.com/
EMAIL: stewardp34@bellsouth.net

US CITIZENS ARE SECRETLY BEING USED AS RESEARCH RATS
WEB: http://researchrat.com/
EMAIL: targetelephant@yahoo.com
Read more…
A remote tracking system with a dedicated monitoring center
EP2047439 A2 (text from WO2008008669A2) 
ABSTRACT  

A remote tracking system is described that includes one or more remote tracking devices, where each remote tracking device including a cellular transceiver, a positioning system receiver, and a processor connected to the positioning system receiver and the cellular transceiver. A dedicated monitoring center is in communication with each of the remote tracking devices and includes a monitoring center application to process and store the location information and status information received from each of the at least one remote tracking device The monitoring center also includes agents available as an initial contact point when the monitoring center application determines that attention to a particular remote tracking device is required. The system further includes a portal through which an authorized user responsible for one or more of the at least one remote tracking device can access information related to each of the remote tracking devices.

CLAIMS  (OCR text may contain errors)

CLAIMS

What is claimed is:

1. A remote tracking system comprising: at least one remote tracking device, each remote tracking device including a cellular transceiver, a positioning system receiver operable to generate location information by receiving signals indicative of the location of the remote tracking device, and a processor connected to the positioning system receiver and the cellular transceiver, the processor operable to generate status information for the remote tracking device; and a dedicated monitoring center in communication with each of the at least one remote tracking devices using the cellular transceiver of each of the remote tracking devices, the monitoring center including a monitoring center application to process and store the location information and status information received from each of the at least one remote tracking device, monitoring center agents available as an initial contact point when the monitoring center application determines from the location information and/or status information that attention to a particular remote tracking device from the at least one remote tracking device is required, and a portal through which an authorized user responsible for one or more of the at least one remote tracking device can access information related to each of the at least one remote tracking device.

2. The remote tracking system of claim 1 wherein each remote tracking device of the at least one remote tracking device is further operable to generate alarm conditions as a result of comparing the location information for the remote tracking device to a set of programmed rules for the remote tracking device, and wherein the alarm conditions are transmitted to the dedicated monitoring center.

3. The remote tracking system of claim 1 wherein the monitoring center application is operable to generate alarm conditions as a result of comparing the location information for the remote tracking device to a set of programmed rules for the remote tracking device.

4. The remote tracking system of claim 1 wherein the dedicated monitoring center is able to initiate two-way voice communication with each of the remote tracking devices.

5. The remote tracking system of claim 1 the authorized user can modify parameters and rules for those particular remote tracking devices over which the authorized user has responsibility.

6. The remote tracking system of claim 5 wherein the monitoring center application can send the modified parameters and rules to the particular remote tracking device.

7. The remote tracking system of claim 1 wherein the monitoring center application stores biographical information for a wearer of each remote tracking device.

8. A monitoring center application for use in a remote tracking system, the remote tracking system including a plurality of remote tracking devices generating location information and status in formation and in communication with the monitoring center application, the monitoring center application comprising: a data processing function operable to process the location information and status information for each of the plurality of remote tracking devices; an alert function operable to alert an agent from a pool of agents when the data processing function determines that an alert condition exists for a particular remote tracking device; and a portal allowing authorized personnel responsible for one or more of the plurality of remote tracking devices to access the monitoring center application.

9. The application of claim 8 further comprising a setup function operable to create and modify parameters and rules for each of the remote tracking devices.

10. The application of claim 8 wherein the monitoring application also receives indications of alarm conditions from the plurality of remote tracking devices.

11. The application of claim 10 wherein the alarm conditions are rules violations determined by a remote tracking device comparing its location to a set of preprogrammed rules.

12. The application of claim 9 wherein the alarm management system can send new parameters and rules to a particular remote tracking device using the cellular transceiver of the remote tracking device.

13. The application of claim 8 wherein the monitoring center application is able to establish a two-way voice communication between a remote tracking device and the remote monitoring center.

14. The application of claim 8 wherein monitoring center application is able to activate a high decibel siren on the remote tracking device.

15. A method for tracking and monitoring a plurality of remote tracking devices in a remote tracking system, the remote tracking devices generating location information and status in formation, the method comprising: receiving the location in formation and status information from each of the plurality of remote tracking devices; storing the location and status information for each of the remote tracking devices generating alerts for an agent selected from a pool of agents based on the location information and status information; and providing access to the location information and status information to authorized users responsible for one or more of the plurality of remote tracking devices.

16. The method of claim 15 wherein receiving also includes receiving alarm conditions generated by a remote tracking device from the plurality of remote tracking devices.

17. The method of claim 15 further comprising generating an alarm condition based on the location information and/or status information from a particular remote tracking device from the plurality of remote tracking devices.

18. The method of claim 15 further comprising establishing a two-way voice communication with a remote tracking device from the plurality of remote tracking devices.

19. The method of claim 15 further comprising sending modifies parameter and rules to a remote tracking device from the plurality of remote tracking devices.

20. The method of claim 15 further comprising activating a high decibel siren in a remote tracking device from the plurality of remote tracking devices.

DESCRIPTION  (OCR text may contain errors)

A REMOTE TRACKING SYSTEM WITH A DEDICATED MONITORING CENTER

TECHNICAL FIELD

[0001] The field of the present invention relates to remote tracking and communication systems and devices, and more particularly to dedicated monitoring center for use in systems for tracking and monitoring person using remote devices.

A REMOTE TRACKING SYSTEM WITH A DEDICATED MONITORING CENTER

BACKGROUND OF THE INVENTION

[0002] The Global Positioning System (GPS) is very well known as a mechanism for providing relatively accurate positioning information using small portable devices. To create a remote tracking device useful for tracking or monitoring persons GPS devices need a mechanism to transmit the location information from the GPS to a central site where a record of the person's location can be maintained. There have been several devices that have used terrestrial wireless or cellular networks coupled to a GPS engine to transmit the location data to a central repository. The GPS/cellular device can either transmit the raw GPS data over the cellular network to a central system which can then process the GPS data to determine the location of the device, or if enough processing power is built into the remote tracking device the GPS calculations can be done on the remote tracking device and the derived location information can be transmitted to the central repository. A time stamp can be associated with the location information to provide temporal context for the location information.

[0003] An example of such a device is described in U.S. Patent No. 6,014,080 to Layson, Jr. The remote tracking device of Layson, Jr. includes a tamper resistant strap and housing which holds a GPS engine and a wireless data modem. The remote tracking device communicates with a central station computer using the wireless data modem and transmits the location data for the remote tracking device. The central station includes a computer which is operable to take the position information from the remote tracking device and to compare that location information against a schedule of rules and location restraints to determine if the remote tracking device has strayed from a permitted inclusion zone or has entered a forbidden exclusion zone.

[0004] Another remote tracking device is described in U.S. Patent No. 6,072,396 to Gaukel. The remote tracking device of Gaukel is a two-piece device with a tamper resistant unit securely attached to the person to be monitored. The secure unit is connected to, or in communication with, a body-worn device that includes a GPS engine and a cellular modem. As with Layson, Jr., the cellular modem is used to communicate the location information from the GPS engine to a control station. [0005] Yet another remote tracking device and system is described by U.S. Patent No. 5,867,103 to Taylor, Jr. The remote tracking device of Taylor, Jr. includes a tamper detection mechanism, a mechanism for receiving a signal from a positioning device, such as a GPS satellite, and a transmitter for transmitting a signal to a central station. The system for monitoring the remote devices includes a position determining mechanism for computationally determining the location of the remote device based on the signal from the positioning device and a temporal marking mechanism for providing a time stamp associated with the location determination.

[0006] While each of these devices shares a similar use of GPS and cellular or wireless data technology to gather information about the position of the remote device and to transmit information about the position to a central computer, each of these devices also suffer from the same deficiencies. Examples of these deficiencies are the lack of an ability to do anything with the information once it is received at the central computer. At most the central computers of these devices can generate messages of rules violations that can be transmitted to a parole officer or other recipient. The systems do not provide for any context for the message about the violation and do not provide for computer access to information about the remote tracking device and any violations or a monitoring center which can be contacted by the remote tracking device and the parole officer or other supervisor who has responsibility for the person being monitored.

[0007] These systems pass all location data obtained from the tracking devices directly through to the parole officer or supervisor has responsibility for the person being monitored. This places the task of sorting through the mountain of location data directly on the parole officer or supervisor who may be in charge of a great number of persons being monitored. Placing such a heavy burden on the parole office or supervisor is generally undesirable and a waste of resources.

[0008] Further, these systems do not allow for voice communication with the person wearing the remote monitoring device. Some of the devices described above can initiate tones or vibrations in the device in the event of a rules violation, but none have the ability to initiate voice communication between the person being monitored and personnel at a monitoring center or the persons parole officer or supervisor. [0009] Still further, these devices to not have any type of alarm system, alarm management, or alarm hierarchy which can be used to warn the person being monitored, or, as a last resort, warn those in the vicinity of the person being monitored that a violation is occurring.

BRIEF SUMMARY OF THE INVENTION

[0010] In one embodiment, the concepts described herein are directed to a remote tracking system. The remote tracking system includes at least one remote tracking device, where each remote tracking device including a cellular transceiver, a positioning system transceiver, or receiver, operable to generate location information by receiving signals indicative of the location of the remote tracking device, and a processor connected to the positioning system transceiver and the cellular transceiver, the processor operable to generate status information for the remote tracking device. The system also includes a dedicated monitoring center in communication with each of the at least one remote tracking devices using the cellular transceiver of each of the remote tracking devices, the monitoring center including a monitoring center application to process and store the location information and status information received from each of the at least one remote tracking device. The dedicated monitoring center also includes monitoring center agents available as an initial contact point when the monitoring center application determines from the location information and/or status information that attention to a particular remote tracking device from the at least one remote tracking device is required, and a portal through which an authorized user responsible for one or more of the at least one remote tracking device can access information related to each of the at least one remote tracking device.

[0011] In another embodiment a monitoring center application for use in a remote tracking system is described, where the remote tracking system includes a plurality of remote tracking devices generating location information and status in formation and in communication with the monitoring center application. The monitoring center application includes a data processing function operable to process the location information and status information for each of the plurality of remote tracking devices, an alert function operable to alert an agent from a pool of agents when the data processing function determines that an alert condition exists for a particular remote tracking device, and a portal allowing authorized personnel responsible for one or more of the plurality of remote tracking devices to access the monitoring center application.

[0012] In yet another embodiment a method for tracking and monitoring a plurality of remote tracking devices in a remote tracking system is described where the remote tracking devices generating location information and status in formation. The method includes receiving the location in formation and status information from each of the plurality of remote tracking devices, and storing the location and status information for each of the remote tracking devices. The method further includes generating alerts for an agent selected from a pool of agents based on the location information and status information, and providing access to the location information and status information to authorized users responsible for one or more of the plurality of remote tracking devices.

[0013] The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0014] For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:

[0015] FIGURE 1 is a diagram illustrating the major elements of a remote tracking system according to the concepts described herein;

[0016] FIGURE 2 is a perspective view of a remote tracking and communication device according to the concepts described herein;

[0017] FIGURE 3 is a schematic view of the electrical components in a remote tracking and communication device;

[0018] FIGURES 4A-C are flow charts illustrating embodiments of a data processing methods and data reporting methods using the remote tracking system;

[0019] FIGURE 5 is a flow chart illustrating an embodiment of a data processing method using the remote tracking system;

[0020] FIGURE 6 is a chart illustrating an embodiment of a monitoring center administration flow according to the concepts described herein

[0021] FIGURE 7 is a flow chart illustrating an embodiment of a monitoring center call flow according to the concepts described herein;

[0022] FIGURE 8 is a illustration of a screen shot showing an embodiment of a status monitor for a remote tracking device according to the concepts described herein; and

[0023] FIGURES 9A-9J are flow charts illustrating embodiments of monitoring center application flows for the setup, assignment and modification of various aspects associated with a remote tracking system according to the concepts described herein. DETAILED DESCRIPTION OF THE INVENTION

[0024] Preferred embodiments of a remote tracking device and monitoring system according to the concepts described herein provides for a remote tracking that includes two-way voice communication between the person being monitored and monitoring center personnel or the persons parole officer, supervisor, or other administrator. It also provides for an alarm system for the remote tracking device and associated alarm management system and alarm hierarchy which is capable of warning the offender and potentially those around the offender of a violation of the terms and conditions surrounding the monitoring. Still further, it provides for a comprehensive monitoring system that includes a staffed monitoring center and access by the parole officer, supervisor or administrator to information and tools to manage the information related to the person being monitored and the status of the person and remote tracking device.

[0025] Referring now to Figure 1, a simplified diagram showing the major elements of a preferred embodiment of a remote tracking system according to the concepts described herein is shown. System 100 is used to track multiple remote tracing devices (RTDs). Each RTD 101 includes a positioning system engine, such as a global positioning system (GPS) engine, which is able to receive signals from one or more sources, either terrestrial networks or satellite network such as multiple GPS satellites 102, and to perform a location calculation based on the signals from the sources. While preferred embodiments described herein will use references to GPS, any position system engine or transceiver, terrestrial, airborne or satellite based, may be used in place of GPS according to the scope of the concepts described herein, including the Galeleo satellite tracking system. Applicant intends the use of GPS herein to be generic to any positioning system and to include all positioning systems. Location determination using terrestrial networks, satellite, or assisted satellite (using satellite signals in association with terrestrial signals such as cellular signals to provide a more precise location determination), is well known and will not be discussed further herein.

[0026] In addition to a GPS engine, the RTD includes a wireless/cellular transceiver. After a location determination has been made by the GPS engine or an internal microprocessor, the location information and information indicating the status of the RTD is sent over a terrestrial network, which is preferably a cellular network, as shown by cellular network 103. In order to be useful, each position location for the RTD needs to include an indication of the time for the location. In a preferred embodiment, the RTD uses the time information contained in the GPS signals themselves to provide the time indication for the position determination, however, instead of using the time information from the GPS signal, the RTD itself may provide the time indication from an internal clock. An internal clock may also be used to provide time indications on when data packets were created and sent using the cellular connection.

[0027] The information sent by the RTD over its cellular connection is received by monitoring center 104. Monitoring center 104 is preferably a staffed monitoring center providing representatives who can act as an intermediary between the person being monitored and the parole officer, supervisor or administrator with responsibility for the person being monitored. The monitoring center also includes the computer resources required to process, store and analyze the data received from the RTDs and provide the interface for the officers/supervisors/administrators to review the information in the system and to setup, modify and terminate the operating parameters for each individual RTD.

[0028] Access to the information in the monitoring center is available through a web interface which connects to a network 105, such as the Internet, which allows persons with authorization 106 outside the monitoring center to access information in the monitoring centers computers. Additionally, cellular network 103 can also be used to establish two-way voice communication between the RTDs and the monitoring center, or responsible officer/supervisor/administrator. While reference is made to two-way voice communication, the term two-way is meant to encompass any interactive voice communication involving two or more parties, including three or more- way voice communication and would include conference type calls and multiparty calls. The two-way voice communications may use the same infrastructure as the data connections between the RTD and monitoring center, or may use completely different infrastructure or paths through the network than the data connections. Other third parties may also be in the voice or data path between the RTD and monitoring center to provide any number of functions, including the recording and archival of the voice communications between the RTD and monitoring center, and still be within the scope of the concepts described herein.

[0029] Referring now to Figure 2, an embodiment of the physical characteristics a remote tracking device 200 according to the concepts described herein is shown in greater detail. Device 200 includes housing 201 with battery 202 removably affixed thereto. The single housing is configured to contain all electrical components necessary for tracking and communicating with the individual wearing device 200. Battery 202 provides power to the electronic circuitry within housing 201, as described below, and is preferably rechargeable. Top side 203 of housing 201 includes a first set of through ports 204. Another side 205 of housing 201 includes a second set of through ports 206. The first set of through ports 204 are configured to allow sound to pass through to a microphone (not shown) disposed within housing 201, while the second set of through ports 206 are configured to allow sound to pass outward from a speaker (not shown) which is also disposed within the housing 201. Top side 203 of housing 201 also includes two panels 207 and 208, at least one of which is configured as a rocker button to activate one or more of the electronic components described below.

[0030] The rear face of device 200 includes an appropriate curvature so that it can be attached to a person's body, preferably to an ankle. Battery 202, which is inserted into the bottom side of device 200, includes a release lever (not shown) which is movable to release the battery from the housing. Each end of a strap 209 (partially shown) is secured within an extension on each side of housing 201, such as extension 210. Strap 209 and the strap connections to housing 201 are tamper resistant and include security measures intended to prevent the disconnection or severing of strap 209, or if strap 209 is severed, device 200 can provide a signal indicating the status of the strap. The strap preferably includes one or more optical fibers and/or conductive materials embedded throughout its length, each of which is exposed at either end of the strap and connected to the electronics in device 200 which can determine the integrity of the connections.

[0031] Additional tamper detection may be achieved through monitoring all externally accessible fasteners, e.g., the screws affixing the pressure block to the housing, the external battery, and the like, for electrical continuity by using each fastener to complete, or as part of, an electrical circuit.

[0032] Referring now to Figure 3, an embodiment of the electronic aspects of the remote tracking device is shown. The type of connection between the various components is a matter of design choice, and may vary depending upon the specific component chosen to perform for a particular function. Further, where a specific component is indicated, those skilled in the art will appreciate that the indicated component may be substituted with other, functionally equivalent components that are readily available in the marketplace.

[0033] Electronics 300 includes microprocessor 301. Microprocessor 301 controls overall operation of the device according to programming stored in memory 302, which can be SRAM memory. Electronics 300 may include inputs 303, which can be inputs such as switches or buttons, are included as inputs to microprocessor 301 and can be used to input data or provide for activation of pre-designated functionality controlled by microprocessor 301. hi embodiments of the RTD, there is one button dedicated for activation of voice communications with the monitoring center. LEDs 304 are used as function and status indicators. The programming stored in memory 302 may be placed there at the time of manufacture, and additional, new or modified programming may be uploaded to the device using a wired connection via the included diagnostic interface 305, user interface 306, or wirelessly via the cellular transceiver 307 received by antenna 308.

[0034] Cellular transceiver 307 may be of the GSM/GPRS variety, and may include a SIM card 309. Cellular transceiver 307 allows two-way voice and data communication between the remote device and the monitoring center 104 from Figure 1. Voice communications are further enabled by a direct connection between cellular transceiver 307 and an audio codec 310, which encodes and decodes the digital audio signal portion of the wireless transmission, and an associated speaker 311 and microphone 312. Data communications preferably use the cellular data channel and/or the cellular control channel, which can make use of short message service (SMS) capabilities in the network. This has additional benefits in that it provides redundancy for cellular systems in which service for both types of data communication is supported. Also, for those cellular systems in which the voice channel cannot be used simultaneously with the data channel, or in which the data channel is simply unavailable, the control channel can provide a data link between the call center and the device.

[0035] Electronics 200 may also include short range wireless transceiver 313 and associated antenna 314, which, if included, allow for short range wireless voice and data communications with peripheral devices. This second wireless transceiver 114 can be chosen to utilize the wireless communications standard published by the ZigBee Alliance, information about which may be found at www.zigbee.org. Wireless transceiver 313, however, maybe designed and implemented using any of the alternative wireless communication standards which are well known in the art. Microprocessor 301 can be programmed to pass through voice communications received by cellular transceiver 307 to a voice-capable peripheral when such a peripheral is employed in conjunction with the remote tracking and communication device and is activated. Voice communications received from a voice enabled peripheral can be passed through to cellular transceiver 307 for transmission. Data generated by the device or received from a peripheral, if any, may be stored by microprocessor 301 in memory 315, which can be non- volatile memory such as serial flash memory until required by microprocessor 301 or until it is to be transmitted by the device.

[0036] GPS receiver 316 and antenna 317 receive signals transmitted by GPS satellites, the signal used to establish the geographical location of the device and the person being monitored, hi one embodiment, data from GPS receiver 316 is passed through to microprocessor 301, which in turn processes the data to determine a location and associated time, and stores it in the serial flash memory 315 pending transmission using cellular transceiver 307. While electronics 300 are shown with a GPS receiver which passes the GPS signal data to the microprocessor for processing, a GPS engine which includes both the GPS receiver and the capability to process the GPS signal to produce a location determination and associated time indication may also be used according to the concepts described herein. Using a stand alone GPS engine would free processing bandwidth in the microprocessor, thereby allowing the microprocessor to perform other additional functions. [0037] Cellular transceiver 307 may also be used to geographically locate the device through well known methods of cell tower triangulation, or may be used to provide location information used in assisted GPS schemes. Geographical location using cellular transceiver 307 may be performed in addition to, in conjunction with, or as a substitute for the GPS receiver 316. Other known methods for geographically locating the device may also be employed.

[0038] Either of memories 302 and 315, or memory resident on the microprocessor, may be used individually, or may be used in any combination to store the operating program and parameters for the operation of the device, as will be discussed later, and may further be used to store prerecorded messages which can be played through speaker 311 as part of the monitoring and alarm management system which will be discussed in greater detail below. A siren/speaker 323 may also be included in the device and controlled by microprocessor 301. Siren 323 is also used as part of the alarm system and can be activated to provide a high decibel audible alarm. This alarm can both warn those in the vicinity that the person being monitored has entered an exclusion zone or left an inclusion zone, and can aid the police in the location of the person being monitored. The siren can be activated automatically by the microprocessor as part of the alarm management system or can be activated remotely by sending a signal to the microprocessor using cellular transceiver 307. Siren 323 can be a separate device or could be combined with the functionality of speaker 311. Tamper detection circuit 322 monitors the condition of strap 209 from Figure 2 and any other tamper detection sensors that may be part of housing 201.

[0039] In the embodiment shown in Figure 3, power to the processor and other electronic components is provided though power controller 318 by external battery 319, or internal battery 320 when the external batter is disconnected or the voltage of the external battery falls below a threshold. External battery 319 is removable and is preferably rechargeable by a separate recharging unit. Also, the person being monitored will preferably have multiple external batteries so that a charged external battery can be immediately inserted when a discharged battery is removed. Internal battery 320 is preferably internal to the housing and not accessible by the person being monitored. The internal battery allows the device to continue to operate normally while the external battery is being replaced. As the internal battery is intended to supply power to the device only during the transitioning from a depleted external battery to a charged external battery, or to provide a short amount of time to acquire a charged battery, the internal battery does not need to have a large capacity. Internal battery 320 is charged using power from external battery 319 using voltage converter 321 and/or a battery charger which may be connected to the device through voltage converter 321.

[0040] Since RTD 200 is intended to be worn around the ankle of the person being monitored, the microphone and speaker used for two-way voice communication is a significant distance from the ears and mouth of the person being monitored. To compensate for this a peripheral device may be used in conjunction with the RTD to aid in the two-way voice communication. In one embodiment the peripheral device has the form factor of a watch and includes an internal speaker, an internal microphone, and an internal short range wireless transceiver. The microphone and speaker are positioned in the housing of the peripheral to better enable voice communications. The short range wireless transceiver is configured to use the same wireless communications standard as the RTD to enable wireless voice and data communications between the device and the peripheral. A button can be included which, when pressed, causes a command signal to be sent to the RTD. This command signal can be used to instruct the remote tracking and communication device to initiate two-way voice communications with the monitoring center. When the peripheral device is used for such voice communications, the peripheral device communicates wirelessly with the RTD using the respective short range wireless transceiver of each respective unit, and the RTD then uses the cellular transceiver to connect the voice communications with the monitoring center. The microphone and speaker in the RTD can be disabled by the microprocessor when a peripheral device, such as described, is in use.

[0041] Using electronics such as those described above, embodiments of a remote tracking devices according to the concepts described herein may be programmed with a variety of useful features. One such feature is the ability to track the geographical location the individual wearing the device. Most frequently, the GPS receiver is used to determine the location of the device (and thus the wearer) at the time indicated in the GPS signals received from GPS network satellites. When the GPS is unable to determine location, the cellular transceiver may be used to determine the location of the device using well-known cellular tower triangulation techniques. Once identified, the location of the device is passed to the microprocessor, which processes the data according to its programming and stores the data in the memory.

[0042] As illustrated in method 430 shown in Figure 4B, in some embodiments each element of location data, including the time is collected, as shown by process 431, and along with the current status of the RTD, process 432, is placed into a datagram, process 433, and send through the cellular transceiver immediately, process 436, as long as the RTD has a good cellular signal, process 434. If there is not a good cellular signal, the RTD stores the datagram and all subsequent datagrams, process 435 until a good cellular signal is detected by the RTD. When the good cellular signal is established all of the unsent datagrams are then sent to the monitoring center computers over the cellular network, process 436.

[0043] In other embodiments, the datagrams may be stored and sent in batches. In batch send embodiments, method 430 would repeat processes 431, 432 and 433 until a predetermined number of datagrams were stored, or until a timer expired before continuing on to process 434.

[0044] hi yet other embodiments, any number of operations, such as (in this example) the batch sending of datagrams, could be determined from environmental factors and not tied to a predetermined or preprogrammed number, such as the number of datagrams or a predetermined timer, as is illustrated in method 450 shown in Figure 4C. hi method 450, the environmental conditions are monitored to determine if the period, or frequency of the operation, should be adjusted. These environmental conditions could be any condition that might require a different reporting frequency, such as the current speed of the RTD, the location of the RTD, conditions/events detected by the RTD, such as physiological conditions/events, sensor inputs to the RTD, notices of conditions or events from the monitoring center, or any other environmental condition, event or factor. Operations could include, but are not limited to, sending of data by the RTD, performing location determinations, issuing alerts to the wearer, generating alarm conditions, or any other operation that my be tied to environmental conditions, events or factors. For movement speed, for example, the RTD can determine, from comparing previous location and time measurements, the rate of movement of the RTD, and by association its wearer. As a result, the RTD may determine that location information needs to be sent more frequently and may further determine that more frequent location determinations need to be made. Similarly, if the RTD is approaching an exclusion zone or the edge of an inclusion zone, the RTD may determine that more frequent location determinations should be made and/or transmitted to that the system is more quickly aware of a violation that would occur at normal rates. Though speed and proximity are used as examples of environmental factors that could be used to determine batch send frequency or even location determination frequency and factor that can be monitored and used in the frequency determination is included in the concepts described herein.

[0045] hi process 452 of method 450 it is determined if the batch send timer needs to be adjusted. If yes, process 453 adjusts the timer accordingly. Process 454 then determines if the timer has expired, if not, the method returns to process 451. If the timer has expired the method passes to process 455, which sends the accumulated datagrams.

[0046] As referenced above, embodiments of the remote tracking devices and/or the remote tracking system can be programmed to track the location of an RTD with respect to inclusion and exclusion zones, hi these embodiments the microprocessor can be programmed to compare location data against rules which establish predefined geographical areas where the person being monitored is required to be (inclusion zones), or forbidden from being (exclusion zones). These zones can be tied to specific times of the day, such as curfews. A curfew is defined by a geographical area within which the device (and thus the wearer) needs to be physically located during specified times. Examples of curfew rules include requiring the wearer to be at a home area during the evening and overnight hours or at a work area during work hours. An inclusion zone is a geographical area within which the wearer is required to remain during specified times or a boundary outside of which the wearer is not allowed to travel. Inclusion zones and curfews, under these definitions, can also therefore be layered. For example, there may be a permanent inclusion zone, such as the county of residence of the wearer, outside of which the wearer is not allowed to travel without specific permission. Inside of this permanent zone there may be time specific zones, such as the wearers home during overnight hours or workplace between 8 am and 5 pm. [0047] An exclusion zone is a geographical area outside of which the wearer is required at all times. The rules can be established for any particular device at the time of initialization, modified at any time, or even temporarily suspended, at any time through changes to the parameters entered into the monitoring center computers and downloaded to the device, or entered directly into the device through direct connections to the diagnostic or user interface components of the device, hi addition to geo-zone type rules, rules dictating a "report-in" type requirement may also be programmed into the device. These "report-in" rules could be used to satisfy report in requirements for some parolees. The device would be programmed with chronological points at which the wearer could be notified, such as by a prerecorded voice message stored on the device, to contact the monitoring center or other person at that time, or within a specified interval. The wearer could activate the voice communication on the device or could report in by other means. Further, rules for monitoring physiological conditions/events can be programmed into the device. Sensors on the remote tracking device, or peripherals to the remote tracking device, could be used to monitor physiological conditions. If measurements associated with those physiological conditions fall outside an expected range, which could be programmed in the form of a rule, or if a physiological event occurs as detected by a sensor, an alarm condition could be generated by the processor and sent to the monitoring center.

[0048] As described, the memory can be utilized to store prerecorded voice messages or other audio which provide feedback during operation of the device. Prerecorded voice messages, are preferred to tones or vibrations because they do not require a reference manual or knowledge of the wearer for interpretation, hi addition to alarm type messages, voice message feedback may be advantageously utilized during initial setup of the device in that it provides step-by- step instructions for the setup routine, including directing the administrative user to input information about the device and user into the database via the web application described below. Voice message feedback may be similarly utilized during the detachment process to ensure that the device is removed by an authorized individual. During the removal process, if the audible instructions are not followed, i.e., inputting requested information into the database, then the device is preferably programmed to generate an alarm, which is processed as described below. [0049] Following the initial power-up sequence, the device may be programmed to establish a data connection with a monitoring center computer, or central server, to which the device provides device-specific identification data. This eliminates any need for the administrative user to connect the device to a local computer or terminal for the initialization process. The monitoring center computer(s) is/are programmed to maintain a data base of data sent by tracking and communication devices. Upon initial contact, the central server creates a database entry using the device-specific identification data.

[0050] The administrative user is provided access to data on the central server via a computer or terminal, m instances where the device is used as a tracking device for offenders, the administrative user may be the supervision officer or other authority figure. For other service applications, the administrative user and the wearer may be the same individual. Access to the database may be advantageously implemented as a web application, or it may be implemented as a stand alone application.

[0051] During normal operation, the GPS receiver identifies the geographical location of the device, and the microprocessor processes and stores that location data according to its programming. The device may be programmed such that geographical location is continuously monitored or monitored at specified intervals. In certain embodiments, with an appropriate peripheral, the device may also be programmed to monitor physiological conditions of the wearer. The microprocessor actively monitors other components of the device for indications of tampering, battery exchanges/replacements, and equipment failure.

[0052] Referring now to Figure 4A, a flow chart is shown illustrating an embodiment of a method 400 by which microprocessor 301 from Figure 3 can monitor and processes certain conditions. The microprocessor is preferably programmed to collect and store location data and data related to the status of the device and other monitored conditions in the flash memory, as shown by process 401. The microprocessor is further programmed to perform additional functions based upon application of the rules to the data collected, shown by process 402, upon predetermined intervals, or upon occurrence of a particular condition, such as, e.g., when tampering is detected, when the wearer has entered an exclusion zone, when the external battery need to be replaced, or when the wearer's heartbeat is irregular or no longer detectable, the latter requiring a separate peripheral.

[0053] When an alarm condition is raised or action is otherwise required, as shown by process 403, whether because the action is preprogrammed based on the status of the device, or the action is the result of a command received from the monitoring center, the monitoring center server or the administrative user, the microprocessor proceeds through a series of queries to determine the appropriate action. It should be noted that both the condition resulting in an action, and the action taken the microprocessor, are preferably programmable through the monitoring center, the web application or through a direct interface connection to the device. The first query 404 is whether to send data to the monitoring center by immediately initiating a data connection with the central server to transmit data relating to an alarm or data that is stored in memory, as shown in process 405. Next query 406 determines if siren 323 from Figure 3 is activated, producing an audible alert, as shown by process 407.

[0054] The next query 408 determines whether the RTD should play one of the pre-recorded messages stored in memory, as shown by process 409. Query 410 determines whether to call the monitoring center by initiating a two-way voice communication using the cellular transceiver, as shown by process 411. Finally query 412 determines if the RTD should take some other programmed action as shown by process 413. Other actions may include, but are not limited to, storing data related to an alarm in memory for transmission at a later time, storing updated rules data to memory, or suspending rule violations notification for a period of time. While queries 404, 406, 408, 410 and 412 are shown in Figure 4A in a particular order, the order is arbitrary and may be modified by programming the device.

[0055] As an example of method 400, in instances where the location data indicates the device is located outside of a geographical location permitted by the rules, the RTD may provides audio feedback to the wearer indicating the rule violation, in the form of a siren or a prerecorded message, and immediately sends notice to the central server for additional processing. The notice would includes the geographical location of the device, the time of the location, and an indicator of the rule violated. If the wearer did not respond to the prerecorded message, the RTD might then escalate the alarm condition by establishing a two-way call with the monitoring center. The monitoring center personnel would then attempt to direct the wearer to leave the exclusion zone and verify that the wearer was complying with the request. If the wearer still did not comply with the request, the alarm condition could be escalated still further by activating the siren on the RTD and the monitoring center could then contact the local authorities and direct them to the wearer.

[0056] Figure 4A and the above example illustrates an alarm management system in accordance with the concepts described herein. Although the example above recited specific steps, the concepts described herein relate to any alarm management system where the remote tracking device and the remote tracking system step through a series of alarm conditions and upon failure by the wearer to resolve the alarm condition, escalate the alarm to a higher level of response or intervention. Such alarm conditions could include, but are not limited to, battery alarms, rules violation alarms, tampering alarms and any other condition that can be programmed into the device and recognized by the device.

[0057] Referring now to Figure 5, an embodiment of a method 500 illustrates processing data from the device when it is received at the central server. Initially, the central server determines if the data includes information that was expressly requested by an operator at the call center or by the administrative user, as shown by process 501, and if so, the data is relayed to the operator or administrative user for display at a computer or terminal, process 502. Next, the central server determines if the data includes a standard tracer record in process 503, which may include self- identification of the device, self-diagnostic reports, upload audit logs, component version identification, confirmation of parameter changes such as volume control, suspending audible alarms at the device, activating or deactivating the speaker, and the like. Standard tracer records are processed as necessary and noted in the database, as shown in process 504.

[0058] If the data does not include a tracer record, the central server determines if the data is an indicator of an alarm condition in process 506. If the data is indicative of an alarm condition, the central server determines if the alarm is a repeat of an alarm which was previously received and reported, as shown by process 507. For alarms that were not previously received, the central server takes the appropriate notification action as programmed by the administrative user, as described by process 508.

[0059] If the data is not indicative of an alarm condition, the central server determines whether the individual wearing the device is subject to geographical location rules in process 509. In such instances, the central server determines whether a rule has, in fact, been violated, process 510, and determines if an alarm condition exists, process 511. When an alarm condition is raised, the central server first determines if the alarm is a repeat of a previous alarm, as shown in process 512, and if so, takes the appropriate notification action as programmed by the administrative user in process 513.

[0060] When immediate administrative user notification is not required, or no alarm condition is raised, the data is stored in the database, as shown by process 514, and reported to the administrative user in periodic reports which at least lists all alarm conditions received since provision of the last report. All recorded data may optionally be included in the report.

[0061] In embodiments of the remote tracking system according to the concepts described herein, the notification actions are fully configurable by the administrative user through the web application. The administrative user may designate specific types of alarms for immediate notification, and notification may be arranged through one or more methods including fax, email, text messaging to a pager, text messaging to a cellular phone, or through a direct call from the call center, or the like. In addition, the administrative user may also designate that some specific types of alarms result in direct notification to local authorities for immediate action.

[0062] The web application may also provide the administrative user with the ability to temporarily suspend reactions to specific types of alarms. During suspension, the device will suspend localized reactions only (i.e., pre-recorded voice messages, siren, initiating voice communications with the call center). The device will still transmit all alarms identified during suspension to the central server, which will in turn include all identified alarms in the periodic reports (e.g., weekly) to the administrative user. The web application may also provide the administrative user and call center operators with the ability to enter and store notes. Notes may be in the form of personal daily monitoring logs, calendared appointments or action items, case management directives, or contextual notations related to particular alarms saved within the database.

[0063] In embodiments of the remote tracking system, the central server may enable the call center or the administrative user, through the web application, to send commands or other data to the device. Such commands may include playing a prerecorded message to the wearer, instructing the microprocessor to transmit data to provide a current status of the location and status of the device, and the like. The administrative user may also use the web application to instruct to the call center to initiate voice communications with the wearer. The call center then contacts the wearer by placing a cellular call to the cellular transceiver. Once the wearer is contacted, the call center then initiates a call to the administrative user and conferences the two calls.

[0064] Preferably, all voice communications with the device are made through the call center so that all calls may be recorded and saved within the database. This enables the call center and the administrative user to access the recorded calls at a later time as needed. To ensure that all calls are recorded, the cellular transceiver may be configured to block all incoming calls that do not originate from the call center. Alternatively, the cellular transceiver may be configured to selectively block incoming calls by utilizing the area code and telephone prefix to identify the origin of the call, allowing calls only from selected area codes and prefixes. Alternatively, the cellular transceiver may selectively block all calls except those from list of phone numbers that is stored in memory.

[0065] In embodiments of the remote tracking system, the wearer may also initiate voice communications with the call center, hi these embodiments, at least one of the buttons on the exterior of the device housing may be configured to activate voice communications using the cellular transceiver. When pressed, the device is programmed such that cellular transceiver may only contacts the monitoring center. The device preferably has stored in memory a primary number for the call center and a secondary number in case a connection cannot be achieved on the primary number. Further, the device is programmed to attempt make a predetermined number of attempts to contact the call center, first at the primary number, then at the secondary number. Should all attempts fail, the device is preferably programmed to sound an alert condition to the wearer as an indication that the device is out of a cellular service area or requires service for an internal fault.

[0066] As has been referenced above, the monitoring center, or call center, is the focal point of the preferred embodiments of the remote tracking system according to the concepts described herein. The monitoring center is able to communicate with the remote tracking devices, the wearers of the remote tracking devices, and the officers, supervisors or administrators in charge of the persons wearing the RTDs. The monitoring center is also the repository for all the data collected from the RTDs and allows direct access to the data by the monitoring center employees and remote access by the administrators through the web application. The monitoring center also provides the mechanisms for establishing and modifying the operating parameters of the RTDs, including the rules for each wearer.

[0067] Referring now to Figure 6, an example of an embodiment of a monitoring center administration flow 600 is shown. Flow 600 begins with the login access 626. Administrator login 601 provides a user with administrator privileges access to the entirety of flow 600, including administrator flow 627, operator flow 628, script manager flow 629, fulfillment home 630, and supervisor flow 631. Lesser login privileges, such as supervisor login 602, operator login 603, script manager login 604 and fulfillment login 605 provided only access to their respective flows and any less included flows, such as the supervisor login providing access to supervisor flow 631 and operator flow 628.

[0068] Administrator flow, accessible by an authorized administrator, includes access to the administrator home 606 and to agency overview functions 607 and manage agency functions 608, as well as employee management functions 609. Supervisor privileges provides access to supervisor home 610, manage user functions 611, as well as to employee management functions 610. Supervisor privileges also provide access to operator flow 628 as does operator privileges. Operator flow 628 includes access to operator home 612 which includes access to reports functions 613, messaging functions 614, client and offender detail 615 and 616, respectively, and to search function 617. Client detail 615 and offender detail 616 provide further access to demographics functions 620 which contains access to contacts 621 and medical history 622.

[0069] Script manager privileges provide access to script manager home 618 and to script management functions 619. Fulfillment privileges provides access to fulfillment home 623 and device management functions 624 and device assignment functions 625.

[0070] A preferred embodiment of a call monitoring center in accordance with the concepts described herein includes a monitoring center which is staffed 24 hours, seven days a week. The monitoring center is responsible for monitoring all of the remote tracking devices in the field and is staffed based on historical patterns of requirements for intervention by monitoring center staff. The computers of the monitoring center automatically receive and process the location and status information continuously or periodically sent by each of the remote tracking devices. Based on programmable rules in the monitoring center software, the occurrence of certain conditions in the remote tracking devices results in the monitoring center software sending an alert to one of the monitoring center personnel. These conditions are usually related to alarm conditions in a remote tracking device, but can be programmed to be any condition which might be of interest to the monitoring center personnel or the supervisors or administrators of the person being monitored.

[0071] When a condition is determined to require the attention of monitoring center personnel, the monitoring center software determines the appropriate monitoring center agent and sends the alert to the agent's terminal. The agent can then respond to the alert or access data in the monitoring center computers related to the history of the remote tracking device, the current parameters programmed into the remote tracking device, information on the wearer of the device or the agency or administrator in charge of the wearer and the device. If intervention, such as the initiation of a two-way voice call, is required by the agent, the monitoring center software provides a predetermined script for the agent to follow to ensure that the intervention by the agent conforms to the policies of the monitoring center and the agency or supervisor responsible for the tracking device and wearer.

[0072] In addition to the monitoring center software generating an alert which requires the attention of a monitoring center agent, agents may be required to respond to incoming calls from various interested persons including the wearer of the remote tracking device or the supervisor or administrator of a wearer or device. Referring now to Figure 7, an embodiment of a call routing system 700 for use in the call monitoring center is described. Routing system 700 is operable to receive incoming calls from a variety of sources 701, 702, 703 and 704, which could be the wearer of a remote tracking device 702, a supervisor or administrator 703, or other incoming call 701 or 704. A routing function 705 in the monitoring center call system determines the appropriate agent to receive the call from currently active agents at the center. The call may be routed based on the source of the call or may be routed based on a queue of available agents or any other routing criteria which may be used to select an appropriate agent.

[0073] Once the agent has been selected the application passes the call details to the agent's terminal as shown by process 706. hi process 707, the application uses the dialed number to select an application context, and then in process 708 determines a call handling flow for each specific type of call. Call routing system 700 also includes a contingent process flow 709 for situations in which no call detail information is available to determine context and call flow for the agent. In the contingent process 709, the agent manually enters the caller's phone number into the agent application which then looks up the customer records and uses those records to determine the appropriate context and flow for the call.

[0074] As has been described, embodiments of the remote tracking device maintain status on themselves in the form of states for various aspects of the devices. This status is sent to the monitoring center and maintained by the monitoring center application. Monitoring center personnel, or supervisors or administrators can access the status of the any particular device under their control. An example of the types of status which can be maintained by the RTD and monitoring center is shown in Figure 8. Figure 8 is an illustration of a screen shot of an embodiment of the monitoring center application in accordance with the concepts described herein. While Figure 8 shows particular aspects of the RTD on which status is maintained other aspects of the RTD, it's operating environment, or operating conditions can also be maintained within the scope of the concepts described herein.

[0075] Referring now to Figures 9A through 9 J, embodiments of flow charts illustrating the operation and functionality of an embodiment of aspects of the monitoring center software and/or applications are shown. Figure 9A illustrates an embodiment of an agency setup flow. Agency setup flow 900 illustrates a process by which an administrator or operator can create an agency for which one or more officers will be assigned RTDs that will be monitored by the monitoring center. Figure 9B illustrates an embodiment of an officer/administrator setup flow. Officer setup flow 901 illustrates the process by which officers/administrators of a particular agency can be setup with control over particular RTDs and provided access to the monitoring center application.

[0076] Figure 9C illustrates an embodiment of an offender/wearer setup flow. Offender/wearer setup flow 902 illustrates the process by which supervisors or agents of the monitoring center or officers/administrators of a particular agency can setup particular RTDs and provided relevant and required information to the monitoring center application concerning each offender wearer of an RTD. Figure 9D illustrates an embodiment of an offender/wearer assignment flow. Assignment flow 903 illustrates the process by which officers/administrators of a particular agency are assigned with authority over particular RTDs and offenders/wearers.

[0077] Figure 9E illustrates an embodiment of an offender/wearer device assignment flow. Device assignment flow 904 illustrates the process by which individual offenders/wearers are assigned with particular RTDs. Figures 9F, 9G and 9H illustrate an embodiment of an inclusion/exclusion zone, referred to collectively as geo- zones, setup flow. Geo-zone setup flows 905, 906 and 907 illustrate the process by which operators or officers/administrators can setup inclusion and exclusion zone rules for a particular RTDs and offender/wearer. [0078] Figure 91 illustrates an embodiment of an contact monitoring center flow. Assignment flow 903 illustrates the process by which the monitoring center can be contacted by standard message, live chat or email. Figure 9J illustrates an embodiment of an offender/wearer scheduling flow. Scheduling flow 909 illustrates the process by which operators or officers/administrators of a particular agency can manage alarm schedules for particular RTDs and offenders/wearers.

[0079] Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiment's of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiment's described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Read more…

http://www.scaminformer.com/scam-report/virtual-justice-virtual-justice-vj-revenge-company-revenge-services-hired-c10494.html

Virtual Justice
Virtual Justice VJ Revenge Company Revenge Services Hired this company to electronically harass and stalk an individual for $575.00!! All they did is
9th of Jan, 2011 by User280170
I hired this company to electronically harass, stalk, ruin the reputation of and make the person in question get committed for insanity for revenge. They offer revenge services for people who wish to get revenge on others for a price. The only thing Virtual Justice did was fly a couple ofairplanes aorund this guys residence day and night for a year, and spread a few rumors about him. Yeah that's really gonna make someone insane isn't it? They told me to be patient, and that his life was being torn apart as we speak. But I can't see that this guys life has been torn apart at all!! In fact they mentioned that he's trying to find a girlfriend! Well he doesn't deserve a girlfriend after embarrasing me in front of several people at the convention. I could have lost my club because of him!! This company isn't worth spending $575.00 on! They suck! If you wanna ruin someones reputation and get them committed for insanity it's better to do it yourself! They say they have men and women employed all over the U.S. who make their living off of ruining peoples lives for revenge. But so far they've only used 10 people to produce results on that s.o.b. for embarrasing me! This is the WORST revenge service I've ever paid for! I don't even know if the electronic harassment has worked on this guy yet! They say it is, and that he hasbeen screaming at night because of the pain! SCAM!! LIARS!! Don't waste your time if your trying to get revenge on somebody. Do it yourself!
Read more…

Killing us slowly

You do not have the right to life.  There is a "Project" put in place called The Liverpool Care Pathway.  The name alone is misleading, it is not just local to Liverpool, the county or the country for that matter.  The tentacles of this program are now stretched global.  If those that are curious  throw it through Google the search will return with sites that are heartbreaking but that paint a pretty picture of caring heroic professionals that are trying their best to make an inevitable end of life as lovely as possible.  With a primitive tick box system that is as easy to misread as it is to manipulate and which is sometimes secretive and unjustifiable is a program of death which takes away the right to live.  This program is aimed at the most vulnerable whether through illness accident or weakness of the mind When placed on this pathway all medical aid to progression and for life is withdraw.  A syringe drive containing a cocktail of drugs sedates leaving a silent victim. This alone would be terrible but then added to this is the withdrawal of all fluid.  This results in death by dehydration.  The words fall too easy on the screen, they can be read without a thought.  Death by dehydration. Death by dehydration. Death by dehydration.  A poet, an artist the wisest of men could not hand you the true meaning of those words.  If you could replace the word inhuman with a picture then the death I am trying to explain to you would be too much.  Left for death with a look as if their life was been sucked from their open mouth that is set solid with dehydration.  These are people that we have laughed and cried with our loved ones someone's child.  They say the eyes are the windows to the soul, if this is true you will get a great chance to peer in, the eyes are wide open unable to close any longer.  There are many people out there that have managed to be pulled from the clutches of this hell.  They are better equipped to explain what they went through.  I can only warn you that this monster exists.  I can only give you a start to the information that was with held from us even when a person we loved was placed on it.  Like thousands of families we are still living with this hell.  Knowing that blinded by authority wearing the blinkers of their secrecy we watched and read the pain we clearly saw in a strong fathers eyes as the anguish of a sad goodbye.  How wrong we were and how deeply it cuts when with hindsight we now look back at the brief memories of the eye contact he struggled to achieve as he struggled against what was been done to him.   That kind of hell has no escape and maybe that is rightly so, the fact we didn't have a clue that this type of thing went on is not much of a get out of pain free card.  We should of known, what is it that makes us place something so important as the life of our loved ones and everything that involves, unquestioningly in to the hands of others. Others who no matter how good their intentions are, a job is but work and to work for someone you are expected on a whole to comply and follow procedures.  Who is left to question those procedures if we the ones that claim to love them do not.  How many are there that could sit in a waiting room reading a magazine full of mistakes and mess ups in connection with health care and still not think to question their care.  Those that read this, those that are told, you have the start of information that is invaluable, and like anything it comes to you at a cost.  You now have the responsibility of knowing.  Those that know and do nothing are worse than those that are carrying this out.

Read more…

I wont leave no one behind

A part from being electronically harassed 24/7, I am unbelievably swamped by any amount of people and organisations, that do all they can to orchestrate as much interference in my daily routine as possible. Although it is now getting worse, over the years I have experienced every kind of sabotage from all my utilities been tampered a destroyed to my shoe laces been swiped. Also I have experienced near car accidents (clear set ups) and many near hit and runs, one by a cop car outside my house that took a second attempt having to turn round (I was shouting abuse at them with my finger in the air mind!!) What strikes me as been strange, I have done any amount of research regarding this topic and the people that I would say that are getting the serious Grade A treatment like myself, have done something they know of why they are being persecuted, like whistle blowing etc. Now me I can't think why these arseholes are trying their uppermost to murder me because I have been no choir boy when it comes to my life. Although I have done many things the worse thing I can say I am guilty of is the 13 and a half years in prison I did for armed robbery of a jewelers, and fighting with a prison guard. I have been out over 15 years now and had made something of my life. A lovely wife, gorgeous Children, a big house, cars businesses etc I turned my self right round.The only thing I can think of is that I have never been able to accept authority as the truth and I believe in a God that I felt was not of any of the religions I was been taught. I believe the God I have been talking to all my life has a plan for me and these are trying to prevent me.from carrying out his wishes.

Read more…