U.S. patent application number 13/465158 was filed with the patent office on 2012-11-08 for system, method, and device for intelligence gathering and position tracking.
This patent application is currently assigned to SUR-TEC, INC.. Invention is credited to Todd Dupriest, Corey Smith.
Application Number | 20120281090 13/465158 |
Document ID | / |
Family ID | 43478582 |
Filed Date | 2012-11-08 |
United States Patent
Application |
20120281090 |
Kind Code |
A1 |
Smith; Corey ; et
al. |
November 8, 2012 |
SYSTEM, METHOD, AND DEVICE FOR INTELLIGENCE GATHERING AND POSITION
TRACKING
Abstract
A mobile communication device that may be used by an
investigator to secretly record a suspect and track the
investigator's location includes a microphone for detecting sounds,
a communication component for transmitting signals or data
representative of the sounds to one of the portable computers via
the wireless communication network, a display for displaying
information related to operation of the device, a computing device,
and a computer program implemented by the computing device. The
computer program is operable to place the device in a stealth mode
in which the display is turned off or otherwise deactivated to make
the entire device appear to be turned off while the microphone
continues to detect sounds and the communication component
continues to transmit signals or data representative of the sounds
to a surveillance or support team operating one of the portable
computers.
Inventors: |
Smith; Corey; (Austin,
TX) ; Dupriest; Todd; (Lenexa, KS) |
Assignee: |
SUR-TEC, INC.
Lenexa
KS
|
Family ID: |
43478582 |
Appl. No.: |
13/465158 |
Filed: |
May 7, 2012 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
12975754 |
Dec 22, 2010 |
8265597 |
|
|
13465158 |
|
|
|
|
12574177 |
Oct 6, 2009 |
7873349 |
|
|
12975754 |
|
|
|
|
Current U.S.
Class: |
348/143 ;
348/E7.085; 381/56 |
Current CPC
Class: |
H04M 1/72572 20130101;
H04M 3/2281 20130101; H04M 2242/30 20130101; H04M 1/72577
20130101 |
Class at
Publication: |
348/143 ; 381/56;
348/E07.085 |
International
Class: |
H04N 7/18 20060101
H04N007/18; H04R 29/00 20060101 H04R029/00 |
Claims
1. An intelligence gathering device comprising: a microphone for
detecting sounds; a communication component for transmitting
signals or data representative of the sounds to a computer via a
wireless communication network; a display for displaying
information related to operation of the device; a computing device
operatively coupled with the microphone, the communication
component, and the display; and a computer program stored on a
physical computer-readable medium accessible by the computing
device, the computer program including a code segment to place the
device in a stealth mode in which the display is operable to be
turned off to make all components of the intelligence gathering
device appear to be turned off while the microphone continues to
detect sounds and the communication component continues to transmit
signals or data representative of the sounds via internet protocol
(IP) data channels to the computer, wherein, in stealth mode, the
microphone continuously detects sounds and the communication
component continues to transmit signals or data representative of
the sounds at all times, including: while the display is on and
while the display is off.
2. The intelligence gathering device as set forth in claim 1,
further comprising a user interface operable to be actuated to turn
the intelligence gathering device off and on, wherein, in stealth
mode, the microphone is operable to detect sounds and the
communication component is operable to transmit signals or data
representative of the sounds to the computer both when the user
interface of the device is actuated to turn the device on and when
the user interface is actuated to turn the device off.
3. The intelligence gathering device as set forth in claim 1, the
computer program further including a code segment to wirelessly
receive a gain control instruction from the computer and to adjust
a gain setting of the microphone in accordance therewith.
4. The intelligence gathering device as set forth in claim 1,
further including a vibration element configured for vibrating the
device in response to an alert received by the communication
component from the computer while the device is in stealth
mode.
5. The intelligence gathering device as set forth in claim 1, the
computer program further including a code segment operable to
display graphics indicative of the device being in the process of
turning off while the microphone continues to detect sounds and the
communication component continues to transmit signals or data
representative of the sounds when the device is in the stealth
mode.
6. The intelligence gathering device as set forth in claim 1,
further comprising the computer remotely located from the
microphone, communication component, display, and computing device,
configured for wirelessly receiving the signals or data
representative of the sounds from the communication component.
7. The intelligence gathering device as set forth in claim 1, the
computing device and the computer program being operable to do at
least one of the following: place the device in the stealth mode
and discontinue the stealth mode only after a user of the device
enters valid user information and an operator of the computer
enters and transmits to the device valid acknowledgment
information.
8. The intelligence gathering device as set forth in claim 1,
further including a location-determining component for determining
a geographic location of the device, wherein the computer program
includes a code segment to transmit data representative of the
geographic location of the device to the computer while the device
is in the stealth mode.
9. The intelligence gathering device as set forth in claim 1,
further including an image capturing component for capturing at
least one of video and still images, wherein the computer program
includes a code segment to transmit data representative of the at
least one of video and still images to the computer while the
device is in the stealth mode.
10. The intelligence gathering device as set forth in claim 8, the
computing device and the computer program being further operable to
receive and store geographic coordinates corresponding to a
geofence and to place the device in the stealth mode whenever the
device enters or exits the area encompassed by the geofence.
11. The intelligence gathering device as set forth in claim 9, the
computer program further including a code segment to wirelessly
receive an image capture instruction from the computer and to
capture a still image in accordance therewith.
12. A system for gathering intelligence data, the system
comprising: a mobile communication device comprising-- a microphone
for detecting sounds; a communication component for wirelessly
transmitting signals or data representative of the sounds via a
wireless communication network; a display for displaying
information related to operation of the mobile communication
device; a computing device operatively coupled with the microphone,
the communication component, and the display; and a computer
program stored on a physical computer-readable medium accessible by
the computing device, the computer program including a code segment
to place the mobile communication device in a stealth mode in which
the display is operable to turn off the display to make the mobile
communication device appear to be turned off, wherein, in stealth
mode, the microphone continuously detects sounds and the
communication component continues to transmit signals or data
representative of the sounds at all times, including: while the
display is on and while the display is off; and a computer
configured for wirelessly receiving the signals or data
representative of the sounds from the mobile communication
device.
13. The system as set forth in claim 12, the computer being
operable to wirelessly transmit a gain control instruction to the
mobile communication device and the mobile communication device
being operable to adjust a gain setting of the microphone in
response to the gain control instruction.
14. The system as set forth in claim 12, the mobile communication
device further comprising a user interface operable to be actuated
to turn the mobile communication device off and on, wherein, in
stealth mode, the microphone is operable to detect sounds and the
communication component is operable to transmit signals or data
representative of the sounds to the computer both when the user
interface of the device is actuated to turn the mobile
communication device on and when the user interface is actuated to
turn the device off.
15. The system as set forth in claim 12, the mobile communication
device further including an image capturing component for capturing
at least one of video and still images, wherein the computer
program includes a code segment to transmit data representative of
the at least one of video and still images to the computer while
the device is in the stealth mode.
16. The system as set forth in claim 12, the mobile communication
device further including a location-determining component for
determining a geographic location of the device, wherein the
computer program includes a code segment to transmit data
representative of the geographic location of the device to the
computer while the device is in the stealth mode.
17. The system as set forth in claim 12, the computing device and
the computer program being further operable to receive and store
geographic coordinates corresponding to a geofence and to place the
device in the stealth mode whenever the device enters or exits the
area encompassed by the geofence.
18. The system as set forth in claim 12, wherein the communication
component transmits signals or data representative of the sounds
via internet protocol (IP) data channels to the computer.
19. The system as set forth in claim 15, the computer being
operable to wirelessly transmit an image capture instruction to the
mobile communication device and the mobile communication device
being operable to capture a still image in accordance
therewith.
20. A system for gathering intelligence data, the system
comprising: a mobile communication device comprising-- a microphone
for detecting sounds; an image capturing component configured for
capturing at least one of video and still images; a communication
component for wirelessly transmitting signals or data
representative of at least one of the sounds, video, and still
images via a wireless communication network; a display for
displaying information related to operation of the mobile
communication device; a computing device operatively coupled with
the microphone, the communication component, the display, and the
image capturing component; a user interface coupled with the
microphone, the image capturing component, the communication
component, the display, and the computing device, wherein the user
interface includes a power button configured to turn the mobile
communication device completely on or off when actuated in a normal
operating mode of the mobile communication device; and a computer
program stored on a physical computer-readable medium accessible by
the computing device, the computer program including a code segment
to turn the mobile communication device completely off when the
mobile communication device is in the normal operating mode and the
power button is actuated to turn the mobile communication device
completely off, and a code segment to switch the mobile
communication device from the normal operating mode to a stealth
mode in which the microphone continuously detects sounds and the
communication component continues to transmit signals or data
representative of the sounds both when the power button is actuated
in an attempt to turn the mobile communication device on and when
the power button is actuated in an attempt to turn the mobile
communication device completely off, wherein, in stealth mode, the
display is turned on when the power button is actuated in an
attempt to turn the mobile communication device on and the display
is turned off when the power button is actuated in an attempt to
turn the mobile communication device off; and a computer configured
for wirelessly receiving the signals or data representative of at
least one of the sounds, video, and still images from the mobile
communication device.
Description
RELATED APPLICATIONS
[0001] The present application is a continuation patent application
and claims priority benefit, with regard to all common subject
matter, of earlier-filed U.S. nonprovisional patent application
titled "SYSTEM, METHOD, AND DEVICE FOR INTELLIGENCE GATHERING AND
POSITION TRACKING," Ser. No. 12/975,754 filed Dec. 22, 2010, which
is a continuation of and claims priority benefit to earlier-filed
U.S. nonprovisional patent application titled "SYSTEM, METHOD, AND
DEVICE FOR INTELLIGENCE GATHERING AND POSITION TRACKING," Ser. No.
12/574,177, filed Oct. 6, 2009. Therefore, U.S. patent application
Ser. Nos. 12/975,754 and 12/574,177 are both hereby incorporated by
reference into the present application.
BACKGROUND
[0002] The present invention relates to systems, methods, and
devices for gathering intelligence data. More particularly,
embodiments of the invention relate to a mobile communication
device that may be used to secretly record conversations of a
suspect or other person and track the person's location.
[0003] Law enforcement officers, intelligence agents, military
personnel, and other investigators often engage in covert
intelligence gathering missions during which suspects and other
persons of interest are secretly recorded with microphones and
radio frequency transmitters worn by the investigators.
Unfortunately, such microphones and transmitters are difficult to
hide, easy to detect, and often make undesirable sounds, especially
when used in the vicinity of other wireless transmitters and
receivers.
[0004] Surveillance or support teams working with investigators
also often wish to track the locations of the investigators and/or
the persons being monitored. This requires that the investigators
carry separate GPS receivers or other devices, making it even more
difficult to hide the surveillance equipment. Use of both hidden
microphones/transmitters and GPS receivers is also expensive and
cumbersome.
[0005] Accordingly, there is a need for improved intelligence
gathering methods and devices.
SUMMARY
[0006] The present invention solves some of the above-described
problems and provides a distinct advance in the art of intelligence
gathering methods and devices.
[0007] Embodiments of the invention can be implemented in hardware,
software, firmware, or a combination thereof. In one exemplary
embodiment, the invention is implemented with at least one mobile
communication device operated by an investigator or other person
gathering intelligence information, one or more portable computers
operated by members of a support team assisting the investigator,
and one or more host computers for storing data and other
information gathered by the mobile communication device and the
portable computers. The mobile communication device, portable
computers, and host computers may all communicate and exchange data
and other information via a wireless network and/or a
communications network.
[0008] One embodiment of the mobile communication device comprises
a microphone for detecting sounds, an image capturing component for
capturing video and/or still images, a communication component for
transmitting signals or data representative of the sounds, video,
and/or still images to one of the portable computers via the
wireless communication network, a display for displaying
information related to operation of the device, a computing device,
and a computer program implemented by the computing device.
[0009] In accordance with one important aspect of the invention,
the computer program is operable to place the mobile communication
device in a stealth mode in which the display may be turned off or
otherwise deactivated to make the entire device appear to be turned
off while the microphone continues to detect sounds and the
communication component continues to transmit signals or data
representative of the sounds to one of the portable computers. If
the investigator or anyone else attempts to turn the mobile
communication device off while it is in the stealth mode, the
computer program presents screen graphics that suggest the device
is being turned off, but the components of the device necessary to
gather and transmit intelligence data continue to run. This allows
an investigator and support team to secretly record a person even
though the mobile communication device is in plain view because the
device appears to be turned off. While in the stealth mode, the
mobile communication device may be used to make or receive phone
calls or perform other functions, in which case the display will be
turned on, so that no one but the investigator and others
participating in the investigation will know the device is in the
stealth mode or that the stealth mode even exists.
[0010] In some embodiments, the mobile communication device can
only be placed in the stealth mode after the investigator enters
valid user information and an authorized member of the support team
enters and transmits to the device valid acknowledgment
information. Likewise, the stealth mode can only be cancelled after
the investigator enters valid user information and a member of the
support team enters and transmits to the device valid
acknowledgment information. In other embodiments, the investigator
and/or the support team may be required to only enter a passcode to
initiate the stealth mode. Both embodiments permit the mobile
communication device to be used as a conventional mobile phone
while not in the stealth mode and ensure that the person being
monitored cannot disable the stealth mode.
[0011] The mobile communication device may also include a GPS
receiver or other location-determining component for determining
geographic locations of the device and may transmit data
representative of the geographic locations to one of the portable
computers along with the voice signals or data. This allows the
support team to track the location of the investigator and person
being monitored even when the device is in the stealth mode.
[0012] While in the stealth mode, the mobile communication device
preferably transmits the voice data or signals and the location
data using internet protocol (IP) data channels (e.g. TCP, UDP)
rather than the wireless network's voice channels. This allows the
transmissions to be more easily encrypted and less vulnerable to
interception. Importantly, the mobile communication device
transmits the voice data or signals in real-time so the support
team may monitor the investigator's and suspect's conversations and
other sounds as they occur. This enables the support team to
immediately respond or otherwise react to any distress signals.
[0013] In other embodiments, one of the portable computers may be
programmed to wirelessly transmit a gain control instruction to the
mobile communication device, and the mobile communication device
may be programmed to adjust a gain setting of its microphone in
response thereto. This permits a surveillance team to monitor the
recording of a suspect's conversations and other sounds and to
adjust the mobile communication device's microphone gain to
compensate for background noises, the distance between the
investigator and the suspect, the suspect's voice level, and/or
other factors.
[0014] The mobile communication device may also include a vibration
element that vibrates the housing of the device in a conventional
manner. One of the portable computers may be programmed to
wirelessly transmit an alert signal to the mobile communication
device that causes the device to activate its vibration element.
The mobile communication device may be programmed to vibrate once
in response to an alert signal that is sent when the support team
believes the investigator is in immediate danger, twice in response
to a different alert signal that is sent when the support team
believes the intelligence gathering mission should be aborted, and
three or more times in response to other alert signals.
[0015] The mobile communication device may also include resident
memory for storing the voice signals or data and the location data.
This allows the device to "store and forward" intelligence data in
the event the mobile communication device and portable computers
cannot communicate.
[0016] The mobile communication device may also be programmed to
receive and store geographic coordinates corresponding to a
geofence or other boundary and to wirelessly transmit an alert to
one of the portable computers whenever the device enters or exits
an area encompassed by the geofence. Similarly, the mobile
communication device may be programmed to automatically switch to
the stealth mode whenever the device enters or exits the area
encompassed by the geofence.
[0017] In a particular embodiment of the invention, the mobile
communication device is a GPS-enabled "smart-phone" such as the HTC
Touch Pro.TM. that has been programmed to perform the functions
described herein. Use of an otherwise conventional mobile phone
that has been programmed in accordance with the present invention
permits law enforcement agencies and other entities to implement
intelligence gathering missions without purchasing expensive
stand-alone surveillance equipment.
[0018] After an intelligence gathering session has been completed,
all voice and location data gathered by the mobile communication
device and portable computers is uploaded to the server computers
via the communication network. The servers may then generate a
report that contains an audio file of all recorded communications
and other sounds, a location tracking file that contains
geographical coordinates for the mobile communication device during
the intelligence session, the investigator's identification
information, the exact log-in and log-out times for the stealth
mode, and electronic signatures of the investigator and one or more
members of the support team. Authorized persons may then request
copies of the report in electronic form or other form. The reports
may be used for any permitted purposes including as evidence in
investigations, trials, and/or other proceedings.
[0019] This summary is provided to introduce a selection of
concepts in a simplified form that are further described in the
detailed description below. This summary is not intended to
identify key features or essential features of the claimed subject
matter, nor is it intended to be used to limit the scope of the
claimed subject matter. Other aspects and advantages of the present
invention will be apparent from the following detailed description
of the embodiments and the accompanying drawing figures.
BRIEF DESCRIPTION OF THE DRAWING FIGURES
[0020] Embodiments of the present invention are described in detail
below with reference to the attached drawing figures, wherein:
[0021] FIG. 1 is a schematic diagram of exemplary computer and
communication equipment that may be used to implement embodiments
of the present invention;
[0022] FIG. 2 is a block diagram illustrating selected components
of a mobile communication device that may be used to implement
embodiments of the invention;
[0023] FIG. 3 is a flow diagram depicting a method in accordance
with an embodiment of the invention; and
[0024] FIG. 4 is a flow diagram depicting a method in accordance
with another embodiment of the invention.
[0025] The drawing figures do not limit the present invention to
the specific embodiments disclosed and described herein. The
drawings are not necessarily to scale, emphasis instead being
placed upon clearly illustrating the principles of the
invention.
DETAILED DESCRIPTION
[0026] The following detailed description of embodiments of the
invention references the accompanying drawings. The embodiments are
intended to describe aspects of the invention in sufficient detail
to enable those skilled in the art to practice the invention. Other
embodiments can be utilized and changes can be made without
departing from the scope of the claims. The following detailed
description is, therefore, not to be taken in a limiting sense. The
scope of the present invention is defined only by the appended
claims, along with the full scope of equivalents to which such
claims are entitled.
[0027] The present invention relates to a system, method, and
device for audio intelligence gathering and position tracking.
Embodiments of the invention can be implemented in hardware,
software, firmware, or a combination thereof. In one exemplary
embodiment, the invention is implemented with one or more computer
programs and computer and communications equipment broadly referred
to by the numeral 10 in FIG. 1. The exemplary equipment 10 may
include at least one mobile communication device 12, one or more
portable computers 14, 16, and one or more host computers 18, 20,
all of which may communicate and exchange data and other
information via a wireless network 22 and/or a communications
network 24. The computer programs and equipment 10 illustrated and
described herein are merely examples of programs and equipment that
may be used to implement embodiments of the invention and may be
replaced with other programs and equipment without departing from
the scope of the invention. Similarly, although FIG. 1 illustrates
a particular number of mobile communication devices, portable
computers, and host computers, any number of these devices may be
used without departing from the scope of the invention.
[0028] The mobile communication device 12 may be used by a law
enforcement officer, intelligence agent, military agent, or any
other investigator wishing to gather intelligence information
concerning a suspect or other monitored person. As used herein,
"investigator" is meant to encompass any user of the mobile
communication device 12, and "monitored person" and "suspect" are
meant to encompass anyone being investigated and/or monitored by
the investigator.
[0029] The mobile communication device 12 may be any device that
can detect voice communications and other sounds and transmit and
receive voice and data via the wireless network 22. The mobile
communication device may be, for example, a wireless phone, a
GPS-enabled wireless phone, a phone-enabled GPS device, a
phone-enabled personal digital assistant (PDA), a phone-enabled MP3
device, or any other wireless communication device. In one
particular embodiment, the mobile communication device 12 is an HTC
Touch Pro.TM. communication device or equivalent device that has
been programmed as described herein. The particular mobile
communication device 12 and its components illustrated and
described herein are merely examples of a device and components
that may be used to implement aspects of the present invention and
may be replaced with other devices and components without departing
from the scope of the present invention.
[0030] Key components of the mobile communication device 12 are
illustrated in FIG. 2 and include a computing device 26, a
microphone 28, a speaker 30, a communications component 32, a
location-determining component 34, a display 36, an image capturing
component 37, memory 38, a user interface 40, a power source 42,
one or more I/O ports 44, a vibration element 46, and a housing or
enclosure.
[0031] The computing device 26 may include any number of
processors, controllers, integrated circuits, programmable logic
devices, or other computing devices and resident or external memory
for storing data and other information accessed and/or generated by
the device. In one embodiment, the computing device includes a
Qualcomm.RTM. MSM7201A 528 MHZ processor with 512 MB of ROM, 288 MB
of RAM, and Windows Mobile.RTM. 6.1 Professional Operating System.
The computing device is preferably coupled with other components of
the mobile communication device through wired or wireless
connections, such as a data bus 48, to enable information to be
exchanged between the various components.
[0032] The computing device 26 may implement a computer program
and/or code segments to perform some of the functions described
herein. The computer program may comprise an ordered listing of
executable instructions for implementing logical functions in the
computing device of the mobile communication device as described in
more detail below.
[0033] The microphone 28 and speaker 30 are preferably built into
the housing and are provided for detecting and reproducing voice
communications and other sounds. As described in more detail below,
the gain of the microphone and speaker may be manually adjusted by
an operator of the mobile communication device or remotely adjusted
by an operator of one of the computers.
[0034] The communications component 32 enables the device to
communicate with the computers 14, 16 and other mobile phones and
similar devices through the wireless network 22 and/or the
communications network 24. The communications component may
transmit and receive any communications including incoming and
outgoing phone calls, IP data transmissions, text messages, instant
messages, voicemail messages, e-mail messages, missed phone calls,
and any other known communications. The communications component
may communicate utilizing wireless data transfer methods such as
cellular telephony, WiFi (802.11), Wi-Max, Bluetooth.TM., ANT.RTM.,
ultra-wideband, infrared, radio frequency, etc. In one embodiment,
the communications component is a cellular transceiver for
transmitting and receiving communications over a cellular phone
network such as those operated by Sprint.RTM., AT&T.RTM.,
Verizon.RTM., and other companies. For example, the communications
component 32 may transmit signals and/or data representative of
sounds or audio detected by the microphone 28 to the portable
computers 14,16.
[0035] The communications component 32 may also include a Frequency
Modulated (FM) receiver and may permit communications over several
different networks. For example, the device may be operable to
transmit and receive communications over a cellular network, a
short-range FM radio network, and a WiFi network.
[0036] The location-determining component 34 determines locations
of the device 12 as it is carried or otherwise moved from place to
place and generates corresponding location data that may be
transmitted to the computers or host computers as described below.
In a particular embodiment, the location-determining component 34
is a satellite navigation receiver that works with a global
navigation satellite system (GNSS) such as the global positioning
system (GPS) primarily used in the United States, the GLONASS
system primarily used in the Soviet Union, or the Galileo system
primarily used in Europe. As shown in FIG. 1, a GNSS includes a
plurality of satellites 50 in orbit about the Earth. The orbit of
each satellite is not necessarily synchronous with the orbits of
other satellites and, in fact, is likely asynchronous. The
satellite navigation receiver receives spread spectrum satellite
signals from the various satellites.
[0037] The spread spectrum signals continuously transmitted from
each satellite 50 utilize a highly accurate frequency standard
accomplished with an extremely accurate atomic clock. Each
satellite, as part of its data signal transmission, transmits a
data stream indicative of that particular satellite. The device 12
must acquire spread spectrum satellite signals from at least three
satellites for its receiver to calculate its two-dimensional
position by triangulation. Acquisition of an additional signal,
resulting in signals from a total of four satellites, permits the
device to calculate its three-dimensional position.
[0038] The location-determining component 34 and the computing
device 26 are operable to receive navigational signals from the
satellites 50 and to calculate positions of the device 12 as a
function of the signals. The location-determining component and
computing device may also determine track logs or any other series
of geographic coordinates corresponding to points along a road or
other path traveled by the investigator or other user of the device
12. The location-determining component 34 and/or the computing
device may also calculate routes to desired locations, provide
instructions to navigate to the desired locations, display maps and
other information on the display screen, and execute other
functions described herein.
[0039] The location-determining component 34 may include an antenna
to assist in receiving the satellite signals. The antenna may be a
patch antenna, a linear antenna, or any other type of antenna that
can be used with navigational devices. The antenna may be mounted
directly on or in the housing or may be mounted external to the
housing.
[0040] The location-determining component 34 may include one or
more processors, controllers, or other computing devices and memory
so that it may calculate location and other geographic information
without the computing device or it may utilize the components of
the computing device. Further, the location-determining component
may be integral with the computing device such that the
location-determining component may be operable to specifically
perform the various functions described herein. Thus, the computing
device 26 and location-determining component can be combined or be
separate or otherwise discrete elements.
[0041] Although embodiments of the mobile communication device 12
may include a satellite navigation receiver, it will be appreciated
that other location-determining technology may be used. For
example, the communication component 32 may be used to determine
the location of the device by receiving data from at least three
transmitting locations and then performing basic triangulation
calculations to determine the relative position of the device with
respect to the transmitting locations. For example, cellular towers
or any customized transmitting radio frequency towers can be used
instead of satellites 50. With such a configuration, any standard
geometric triangulation algorithm can be used to determine the
location of the electronic device.
[0042] In one embodiment, the mobile communication device 12 may
use both a GPS receiver and cell tower triangulation to determine
its position. For example, the device may first attempt to obtain a
signal fix from at least three GPS satellites 50. If it is unable
to do so due to blocked or otherwise unavailable satellite signals,
it reverts to cell tower triangulation until satellite signals are
received again. This allows the device 12 to be used inside
buildings and other places where GPS devices do not always
work.
[0043] In other embodiments, the location-determining component 34
need not directly determine the current location of the device. For
instance, the location-determining component may determine the
current geographic location through a communications network, such
as by using Assisted GPS (A-GPS), or from another electronic
device. The location-determining component 34 may even receive
location data directly from the investigator or other user.
[0044] The display 36 is operable to display various information
corresponding to the device and may comprise conventional black and
white, monochrome, or color display elements including, but not
limited to, Liquid Crystal Display (LCD), Thin Film Transistor
(TFT) LCD, Polymer Light Emitting Diode (PLED), Organic Light
Emitting Diode (OLED) and/or plasma display devices. Preferably,
the display is of sufficient size to enable the user to easily view
it while outdoors. In one particular embodiment, the display is a
2.8-inch TFT-LCD flat touch-sensitive screen with VGA resolution.
The display 36 may be integrated with the user interface 40, such
as in embodiments where the display is a touch-screen display to
enable the user to interact with it by touching or pointing at
display areas to provide information to the device.
[0045] The image capturing component 37 may comprise a camera or
the like operable to capture video or still images. The image
capturing component 37 may also comprise a flash to provide
additional lighting while capturing still images. The image
capturing component 37 may be communicably coupled with various
other components of the mobile communication device 12 and may be
configured for direct control via user interface 40 and/or remote
control by the support team.
[0046] The memory 38 may be integral with the location-determining
component 34, integral with the computing device 26, stand-alone
memory, or a combination of both. The memory may include, for
example, removable and non-removable memory elements such as RAM,
ROM, Flash, magnetic, optical, USB memory devices, and/or other
conventional memory elements.
[0047] The memory 38 may store various data associated with
operation of the device 12, such as the computer program and code
segments mentioned above, or other data for instructing the
computing device and other device elements to perform the steps
described herein. The memory may also be used to store data or
signals representative of voices and sounds detected by the
microphone 28 and the location data obtained by the
location-determining component 34. This data may be stored as a
back-up to the data transmitted to the computers 14, 16 or may
serve as the primary storage when then mobile communication device
cannot communicate with the computers. Further, the memory may
store various cartographic data corresponding to geographic
locations including map data, and map elements, such as terrain,
alert locations, points of interest, geographic entities, and other
navigation data to facilitate the various navigation functions
provided by the device. Additionally, the memory may store
destination addresses and previously calculated or otherwise
acquired routes to various destination addresses for later
retrieval by the computing device.
[0048] To implement functions and features of the present
invention, the memory 38 or some other memory accessible by the
computing device 26 may also store cartographic information for
roads, buildings, or other structures. The cartographic information
may be pre-loaded in the memory or other memory or may be
downloaded to the device via the communication component 32 or I/O
ports 44. For example, cartographic information for a particular
road or set of roads may be downloaded to the device based on a
current location of the device as determined by the
location-determining component.
[0049] The various data stored within the memory may be associated
within one or more databases to facilitate retrieval of the
information. For example, the databases may be configured to enable
the computing device to automatically access the cartographic
information based upon a current geographic location of the
device.
[0050] A map-matching search engine, preferably comprised of
software, firmware or the like executed by the computing device 26,
may search through the database of cartographic information to find
known locations which match a series of geographical coordinates. A
user may initiate a search or the search engine may automatically
search the database based on a state of the device such as the
current position of the device. The search engine, or alternatively
a separate computation engine (also preferably comprised of
software, firmware or the like executed by the computing device),
may also perform calculations related to the cartographic
information. The map mapping search engine may also identify a map
location.
[0051] The user interface 40 permits a user to operate the device
and is generally associated with the housing, such as by physical
connection through wires, etc, or wirelessly utilizing conventional
various wireless protocols. However, the user interface need not be
physically coupled with the housing. In one embodiment of the
device, the user interface includes a slide-out five-row QWERTY
keyboard.
[0052] The user interface 40 may also comprise one or more
functionable inputs such as buttons, switches, scroll wheels, a
touch screen associated with the display, voice recognition
elements such as a microphone, pointing devices such as mice,
touchpads, trackballs, styluses, a camera such as a digital or film
still or video camera, combinations thereof, etc. Further, the user
interface may comprise wired or wireless data transfer elements
such as removable memory including the memory, data transceivers,
etc, to enable the user and other devices or parties to remotely
interface with the device.
[0053] The user interface 40 may be operable to provide various
information to the user utilizing the display or other visual or
audio elements such as the speaker 30. Thus, the user interface
enables the user and device to exchange information relating to the
device, including geographic entities, configuration information,
security information, preferences, route information, points of
interests, alerts and alert notification, navigation information,
waypoints, a destination address, etc.
[0054] In one embodiment of the invention, the user interface 40
may comprise a power button. The power button may be any of the one
or more functionable inputs described above. The power button may
be implemented in hardware, software, or any combination thereof.
The power button may control whether or not the power source 42
provides power to the computing device 26, the microphone 28, the
speaker 30, the communications component 32, the
location-determining component 34, the display 36, the image
capturing device 37, the memory 38, the user interface 40, and/or
the vibration element 46. A user may touch, push, flip, or
otherwise manipulate the power button in a particular manner to
turn the mobile communication device 12 on and/or off. In some
embodiments of the invention, the power button may be displayed as
part of a touch screen display. In other embodiments of the
invention, particular audible commands or signals received by the
microphone 28 may actuate the mobile communication device 12 to
turn off and/or on.
[0055] The power source 42 provides electrical power to the other
components of the device and may comprise conventional power supply
elements, such as batteries, battery packs, etc. The power source
may also comprise power conduits, connectors, and receptacles
operable to receive batteries, battery connectors, or power cables.
For example, the power source may include both a battery to enable
portable operation and a power input for receiving power from an
external source such an automobile. In one embodiment, the power
source is a rechargeable lithium-ion or lithium-ion polymer battery
with a capacity of 1340 MAh.
[0056] The I/O ports 44 permit data and other information to be
transferred to and from the computing device 26 and the
location-determining component 34. The I/O ports 44 may include a
Secure Disk Digital (SD) card slot, Mini SD Card slot, Micro SD
Card slot or the like for receiving removable SD cards, Mini SD
Cards, Micro SD Cards, or the like, and a USB port for coupling
with a USB cable connected to another computing device such as a
personal computer. Navigational software, cartographic maps and
other data and information may be loaded in the device via the I/O
ports or the communications component.
[0057] To preserve battery life, the satellite navigation receiver
or other location-determining component 34 may be switched off
periodically. For example, the receiver may be alternatively
switched on for 30 seconds, off for two minutes, then back on for
30 seconds. If the location-determining component determines the
electronic device is moving, it may be switched on more frequently.
Alternatively, the location-determining component may be turned on
whenever the device enters or leaves a particular geographic area
or perimeter such as a geofence. Additionally or alternatively, if
the mobile communication device 12 is used in a GPS only mode, the
investigator and/or the support team may select batch transit and
then select a time duration. This may direct the mobile
communication device 12 to collect location information, power up
from a low power state, transmit the location information after the
selected time duration, then return to a low power state.
[0058] The vibration element 46 may be any device capable of
vibrating the device or a portion thereof. In one embodiment, the
vibration element consists of a miniature motor with an offset
weighted shaft.
[0059] The device's housing may be handheld or otherwise portable
to facilitate easy transport of the device. The housing is
preferably constructed from a suitable lightweight and
impact-resistant material such as, for example, plastic, nylon,
aluminum, or any combination thereof and may include one or more
appropriate gaskets or seals to make it substantially waterproof or
resistant. The housing may take any suitable shape for size, and
the particular size, weight and configuration of the housing may be
changed without departing from the scope of the present
invention.
[0060] The portable computers 14, 16 may be laptop computers,
personal computers, PDAs, smart phones, or any other devices
capable of performing the functions described herein and are
operated by surveillance team members or support personnel as
discussed in more detail below. As used herein, "support team" is
meant to encompass any person or groups of persons who may be
assisting the investigator in an intelligence gathering mission.
The portable computers 14, 16 are equipped with cellular
communication components or other devices that enable them to
transmit and receive voice and data via the wireless network 22
and/or communications network 24 and may also include
location-determining components and associated software similar to
the components and software in the mobile communication device. At
least one of the portable computers 14,16 may alternatively be
mobile communication devices similar or identical to mobile
communication device 12.
[0061] The host computers 18, 20 may serve as repositories for data
and programs used to implement certain aspects of the present
invention. The host computers may be any computing devices such as
network or server computers and may be connected to a firewall to
prevent tampering with information stored on or accessible by the
computers. The functionality of the host computers may also be
distributed amongst many different computers in a cloud computing
environment.
[0062] The host computers 18, 20 may operate or host a private,
secure website accessible only by authorized support team members
and investigators. The host computers may include conventional web
hosting operating software, an Internet connection such as a cable
connection, satellite connection, DSL converter, or ISDN converter,
and are assigned a URL and corresponding domain name so that the
information hosted thereon can be accessed via the communication
network in a conventional manner. The host computers may also host
and support software and services of proprietary mobile application
providers such as Google, Apple, and Blackberry.
[0063] Although two host computers 18, 20 are described and
illustrated herein, embodiments of the invention may use any
combination of host computers and/or other computers or equipment.
For example, the features and services described herein may be
divided between the host computers or may all be implemented with
only one of the host computers.
[0064] The equipment 10 may also include a data interchange format
device for distinguishing the types of devices (e.g. mobile phone,
desktop computer) that attempt to access the host computers 18, 20
and for routing communications and requests to the host computers
accordingly.
[0065] The wireless network 22 may be any communications network
that permits wireless communications between the mobile
communication device 12, the portable computers 14, 16, and other
similar devices. In one embodiment, the wireless network is a
cellular phone network such as those operated by Sprint.RTM.,
AT&T.RTM., Verizon.RTM., and other companies. The cellular
phone network may operate with GSM (Global System for Mobile
communications), CDMA (Code Division Multiple Access), or any other
known standards.
[0066] The communications network 24 is preferably the Internet but
may be any other communications network such as a local area
network, a wide area network, a wireless network, or an intranet.
The communications network may also be a combination of several
networks. In some embodiments of the invention, the mobile
communication device 12 may be operable to connect to a secure
server to re-broadcast audio, video, still images, and/or location
data to multiple portable computers 14,16 and/or host computers
18,20.
[0067] The computer programs of the present invention are stored in
or on computer-readable medium residing on or accessible by the
mobile communication device 12, the portable computers 14, 16,
and/or the host computers 18, 20 and preferably comprise ordered
listings of executable instructions for implementing logical
functions in the devices. The computer programs can be embodied in
any computer-readable medium for use by or in connection with an
instruction execution system, apparatus, or device, such as a
computer-based system, processor-containing system, or other system
that can fetch the instructions from the instruction execution
system, apparatus, or device, and execute the instructions. In the
context of this application, a "computer-readable medium" can be
any means that can contain, store, communicate, propagate or
transport the program for use by or in connection with the
instruction execution system, apparatus, or device. The
computer-readable medium can be, for example, but not limited to,
an electronic, magnetic, optical, electro-magnetic, infrared, or
semi-conductor system, apparatus, device, or propagation medium.
More specific, although not inclusive, examples of the
computer-readable medium would include the following: an electrical
connection having one or more wires, a portable computer diskette,
a random access memory (RAM), a read-only memory (ROM), an
erasable, programmable, read-only memory (EPROM or Flash memory),
an optical fiber, and a portable compact disk read-only memory
(CDROM).
[0068] The above-described equipment 10 may be used in covert
intelligence gathering missions to monitor and record a suspect or
other person of interest and track the person's locations.
Specifically, the mobile communication device 12 may be used by an
investigator, one or more of the portable computes 14, 16 may be
used by support team members, and the host computer 18, 20 may be
accessed by the investigator, support team members, or any other
authorized persons. In accordance with one important aspect of the
present invention, the mobile communication device includes a
stealth mode in which its display may be turned off or otherwise
deactivated to make the entire device appear to be turned off while
its microphone continues to detect sounds and its communication
component continues to transmit signals or data representative of
the sounds to one of the portable computers.
[0069] For example, when the mobile communication device 12 is not
in stealth mode, the power button may be actuated or manipulated to
turn the mobile communication device 12 on and/or off, thereby
either providing power to all powered components of the mobile
communication device 12 or denying power to all powered components
of the mobile communication device 12. However, in stealth mode,
when the power button is actuated or manipulated to turn the mobile
communication device 12 off, the computing device 26, the
microphone 28, and the communications component 32 may not turn
off, but the speaker 30 and the display 36 may turn off.
Furthermore, in stealth mode, the location-determining component
34, the memory 38, and the vibration element 46 may continue to be
provided with power even when the power button is actuated or
manipulated in such a way as to turn the mobile communication
device 12 off.
[0070] If the investigator or anyone else attempts to turn the
mobile communication device off while it is in the stealth mode,
the display presents screen graphics that suggest the device is
being turned off but the components of the device necessary to
gather and transmit intelligence data continue to run. This allows
an investigator and support team to secretly record a person even
though the mobile communication device is in plain view because the
device appears to be turned off.
[0071] Graphics that suggest that the mobile communication device
is being turned off may include, but are not limited to brand
logos, service provider logos, animated progress bars, and various
other animated graphics. Some mobile communication devices may
display a menu when a particular button or on-screen menu option is
selected requesting further confirmation that the user desires to
turn off the device. For example, the menu may present options of
"turn off", "airplane mode", or "cancel". Furthermore, the mobile
communication device may also supply an audible cue which suggests
that the device is turning off. For example, some interrelated
mobile communication devices, such as devices of the same brand,
provide brand-specific graphics and sounds each time they are
turned off, shut off, or powered down. Therefore, these visual and
audio cues may be provided to the user when the investigator or
anyone else attempts to turn the mobile communication device off,
such that those being investigated believe that the mobile
communication device is being turned off.
[0072] While in the stealth mode, the mobile communication device
12 may be used to make or receive phone calls, in which case the
display will be turned on, so that no one but the investigator and
others participating in the investigation will know the mobile
communication device is in the stealth mode or that the stealth
mode even exists. Additionally or alternatively, the mobile
communication device 12 may be operable to block inbound calls and
allow the investigator to enter another phone number for
auto-forwarding of inbound calls.
[0073] The mobile communication device 12 can only be placed in the
stealth mode after the investigator enters valid user information
into the device and an authorized member of the support team enters
valid acknowledgment information into one of the computers 14, 16
and transmits it to the mobile communication device. Likewise, the
stealth mode can only be cancelled after the investigator enters
valid user information and a member of the support team enters and
transmits to the device valid acknowledgment information. This
permits the mobile communication device to be used as a
conventional mobile phone while not in the stealth mode and ensures
that the person being monitored cannot disable the stealth
mode.
[0074] The mobile communication device 12 may also transmit data
representative of its locations to the portable computers 14, 16
along with the voice signals or data. The transmitted location data
may be cross-hatched or otherwise transmitted to the computers with
the original satellite data to enable the data to be
cross-referenced for authenticity purposes.
[0075] The mobile communication device 12 may be configured to
simultaneously transmit both voice data and location data, just
voice data, or just location data. In one embodiment, both the
investigator and the support team must provide authorization if
only voice data or only location data is to be transmitted. The
computers 14, 16 may be programmed to map the location of the
mobile communication device and provide directions to the mobile
communication device in case the support team needs to quickly go
to the investigator.
[0076] While in the stealth mode, the mobile communication device
12 preferably transmits the voice data or signals and the location
data using internet protocol (IP) data channels rather than the
wireless network's voice channels. This allows the transmissions to
be more easily encrypted. For example, data feed may be end-to-end
encrypted at 256ssl. Importantly, the mobile communication device
transmits the voice data or signals in real-time so the support
team may monitor the investigator's and suspect's conversations and
other sounds as they occur. This enables the support team to
immediately respond or otherwise react to any distress signals. In
some embodiments of the invention, a jitter buffer (not shown) may
be connected with or incorporated into the portable computers 14,16
and/or the mobile communication device 12 and may be configured to
enable the support team to increase the buffer if the computers
14,16 and/or the device 12 are in poor data connection areas,
thereby ensuring uninterrupted audio and/or video transmission.
[0077] One or more of the portable computers 14, 16 may be
programmed to wirelessly transmit a gain control instruction to the
mobile communication device 12, and the mobile communication device
may be programmed to adjust a gain setting of its microphone in
response thereto. This permits a surveillance team to monitor the
recording of a suspect's conversations and other sounds and to
adjust the mobile communication device's microphone gain to
compensate for background noises, the distance between the
investigator and the suspect, the suspect's voice level, and/or
other factors.
[0078] Additionally, the portable computers 14,16 may be programmed
to wirelessly transmit image capture instructions to the mobile
communication device 12, and the mobile communication device may be
programmed to capture video and/or still images via the image
capturing component 37 in response thereto. This permits a
surveillance team to visually monitor a suspect and/or the
suspect's surroundings. In stealth mode, video may be collected
continuously or may be collected when instructed by the support
team remotely or the investigator directly. The support team may
remotely instruct the image capturing component 37 to obtain and
transmit still images to the portable computers 14,16 as desired or
at a particular frequency or time interval. During stealth mode,
the flash is not operational and the mobile communication device 12
does not provide any audio or visual indication that the image
capturing component 37 is in use.
[0079] One of the portable computers 14, 16 may also be programmed
to wirelessly transmit an alert signal to the mobile communication
device 12 that activates the device's vibration element. The mobile
communication device may be programmed to vibrate once in response
to an alert signal that is sent when the support team believes the
investigator is in immediate danger, twice in response to a
different alert signal that is sent when the support team believes
the intelligence gathering mission should be aborted, and three or
more times in response to other alert signals.
[0080] The mobile communication device may also include resident
memory for storing the signals or data representative of the
detected sounds and the location data. This permits gathered
intelligence data to be stored locally on the mobile communication
device and forwarded to the portable computers at a later time.
[0081] The mobile communication device 12 may also be programmed to
receive and store geographic coordinates corresponding to a
geofence or other boundary and to wirelessly transmit an alert to
one of the portable computers 14, 16 whenever the device enters or
exits an area encompassed by the geofence. Similarly, the mobile
communication device may be programmed to automatically switch to
the stealth mode whenever the device enters or exits the area
encompassed by the geofence.
[0082] After an intelligence gathering session has been completed,
all voice and location data gathered by the mobile communication
device 12 and portable computers 14, 16 is uploaded to the host
computers 18, 20 via the communication network 24. The servers may
then generate a report that contains an audio file of all recorded
communications and other sounds, videos, images, a location
tracking file that contains geographical coordinates for the mobile
communication device during the intelligence session, the
investigator's identification information, the exact log-in and
log-out times for the stealth mode, and electronic signatures of
the investigator and one or more members of the support team.
Authorized persons may then request copies of the report in
electronic form or other form. The reports may be used for any
permitted purposes including as evidence in investigations, trials,
and/or other proceedings.
[0083] The flow chart of FIG. 3 shows the functionality and
operation of a preferred implementation of the present invention in
more detail. Some of the blocks of the flow chart may represent a
module segment or portion of code of the computer programs of the
present invention which comprises one or more executable
instructions for implementing the specified logical function or
functions. In some alternative implementations, the functions noted
in the various blocks may occur out of the order depicted in FIG.
3. For example, two blocks shown in succession in FIG. 3 may in
fact be executed substantially concurrently, or the blocks may
sometimes be executed in the reverse order depending upon the
functionality involved.
[0084] As discussed above, the mobile communication device 12 may
be used by an investigator and the portable computers 14, 16 may be
used by members of a surveillance or support team working with the
investigator. When the investigator and support team are ready to
begin an intelligence gathering operation, the investigator first
initiates the "stealth" mode on the mobile communication device as
depicted in step 302.
[0085] To initiate the stealth mode, the investigator may be
required to enter valid user information such as an identification
number, an investigation case number, a password, etc. The
investigator may also be prompted to acknowledge at least one party
(the investigator) consents to recording of conversations in
compliance with federal law.
[0086] In some embodiments, initiation of the stealth mode also
requires the authorization of the support team as depicted in step
304. For example, the support team may be required to establish
communications between one of the computers 14, 16 and the mobile
communication device 12 via the wireless network and/or the
communication network and then enter required identification
information such as an identification number, an investigation case
number, a password, etc. Once this information is entered into one
of the portable computers, a notification may be sent to the mobile
communication device to let the investigator know the support team
is "in place" and ready to provide necessary support as depicted in
step 306.
[0087] Initiation of the stealth mode may finally require the
investigator to acknowledge or otherwise respond to the
notification sent by the support team as depicted in step 308.
Sending the acknowledgment may then automatically switch the mobile
communication device to the stealth mode as depicted in step 310 so
that the investigator and support team may begin to covertly detect
and record voices and/or images of the investigator and a person
being monitored.
[0088] While in the stealth mode, the mobile communication device
12 records voices and other sounds and secretly transmits signals
or data representative of the detected sounds to at least one of
the computers 14, 16 via the wireless network 22 as depicted in
steps 312 and 314. The mobile communication device also receives
signals from the satellites, determines its current location, and
transmits signals or data representative of its current location to
at least one of the computers so the support team may track the
location of the investigator. The mobile communication device 12
may also collect and transmit video or still images with the image
capturing component 37 and secretly transmit signals or data
representative of the detected videos and/or images to at least one
of the computers 14,16 via the wireless network 22.
[0089] In one embodiment, the mobile communication device remains
in the stealth mode until both the investigator and the support
team request termination of the mode. The investigator may request
termination of the stealth mode by entering valid user information
such as an identification number, an investigation case number, a
password, etc. as depicted in step 316. If the investigator enters
incorrect information, the mobile communication device either
remains in the stealth mode or may send an alert message to the
support team. For example, in one embodiment, the investigator may
indicate that he or she requires immediate back-up by entering a
particular alert code and/or an electronic signature. This prompts
the mobile communication device to send an alert message to the
support team in accordance with the entered alert code. The mobile
communication device may include multiple alert codes for different
scenarios. For example, one alert code may request immediate
back-up for an emergency situation whereas another alert code may
simply indicate that the monitored person has left the scene but
may be returning.
[0090] After the support team receives the investigator's request
to terminate the stealth mode and verifies that no further
intelligence gathering is required, the support team deactivates
the stealth mode as depicted in steps 318, 320, and 324. If the
support team determines the investigator did not properly terminate
the stealth mode, the team may assume the mobile communication
device is being operated by someone other than the investigator
and/or that the investigator has signaled for help as depicted in
step 322.
[0091] During or after an intelligence gathering session, the
support team members and/or other authorized persons may monitor
the voice communications and location information transmitted by
the mobile communication device. This may be done by directly
establishing a communication link to the mobile communication
device through the wireless network or by accessing voice data and
location data uploaded to one of the host computers 18, 20.
[0092] After an intelligence gathering session has been completed,
all voice and location data gathered by the portable computers 14,
16 is uploaded to the host computers 18, 20 via the communication
network 24 as depicted in step 326. The servers may then generate a
report that contains an audio file of all recorded communications
and other sounds, video, images, a location tracking file that
contains geographical coordinates for the mobile communication
device during the intelligence session, the investigator's
identification information, the exact log-in and log-out times for
the stealth mode, and electronic signatures of the investigator and
one or more members of the support team. Authorized persons may
then request copies of the report in electronic form or other form.
The reports may be used for any permitted purposes including as
evidence in investigations, trials, and/or other proceedings.
[0093] The flow chart of FIG. 4 shows the functionality and
operation of another preferred implementation of the present
invention in more detail. As mentioned above, some of the blocks of
the flow chart may represent a module segment or portion of code of
the computer programs of the present invention which comprises one
or more executable instructions for implementing the specified
logical function or functions. In some alternative implementations,
the functions noted in the various blocks may occur out of the
order depicted in FIG. 4.
[0094] Steps 402 through 414 are substantially identical to steps
302 through 314 of FIG. 3. In step 416, a support team member
operating one of the portable computers monitors the voices and
other sounds transmitted by the mobile communication device 12. If
the recorded voices are too low or otherwise difficult to
understand, the support team member may instruct the portable
computer to send a gain control instruction to the mobile
communication device to increase the gain of the device's
microphone as depicted in step 418. Likewise, if the detected
voices are too loud or difficult to interpret because of too much
background noise, the support team member may instruct the portable
computer to send a gain control instruction to the mobile
communication device to decrease the gain of the mobile
communication device's microphone. Other operating characteristics
of the mobile communication device may also be monitored and
adjusted in this manner. For example, one of the portable computers
may receive data from the mobile communication device
representative of the mobile communication device's battery level,
signal reception strength, and memory capacity and then permit a
support team member to adjust operating characteristics of the
mobile communication device and/or alert the investigator.
[0095] Although the invention has been described with reference to
the preferred embodiment illustrated in the attached drawing
figures, it is noted that equivalents may be employed and
substitutions made herein without departing from the scope of the
invention as recited in the claims.
[0096] Having thus described the preferred embodiment of the
invention, what is claimed as new and desired to be protected by
Letters Patent includes the following:
* * * * *