WO2005079178A2 - Anti terrorist and homeland security public safety warning system - Google Patents

Anti terrorist and homeland security public safety warning system Download PDF

Info

Publication number
WO2005079178A2
WO2005079178A2 PCT/US2003/037470 US0337470W WO2005079178A2 WO 2005079178 A2 WO2005079178 A2 WO 2005079178A2 US 0337470 W US0337470 W US 0337470W WO 2005079178 A2 WO2005079178 A2 WO 2005079178A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
terrorist
public
shows
providing
Prior art date
Application number
PCT/US2003/037470
Other languages
French (fr)
Other versions
WO2005079178A3 (en
Inventor
Richard Steven Trela
Original Assignee
Richard Steven Trela
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richard Steven Trela filed Critical Richard Steven Trela
Publication of WO2005079178A2 publication Critical patent/WO2005079178A2/en
Publication of WO2005079178A3 publication Critical patent/WO2005079178A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B27/00Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
    • G08B27/001Signalling to an emergency team, e.g. firemen
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services

Definitions

  • This invention relates generally to anti-terrorist criminal exposure and law enforcement intelligence gathering, sharing and distribution systems.
  • America is no longer protected by vast oceans. And as government works to better secure our homeland, America will continue to depend on the eyes and ears of alert citizens. We are protected from attack only by vigorous action abroad, and increased vigilance at home. State ofthe union address January 2, 2002 address.
  • the Department of Homeland Security would merge under one roof the capability to identify and assess current and future threats to the homeland, map those threats against our current vulnerabilities, inform the President, issue timely warnings, and immediately take or effect appropriate preventive and protective action.
  • Actionable intelligence is essential for preventing acts of terrorism.
  • the timely and thorough analysis and dissemination of information about terrorists and their activities will improve the government's ability to disrupt and prevent terrorist acts and to provide useful warning to the private sector and our population.
  • the U.S. government has no institution primarily dedicated to analyzing systematically all information and intelligence on potential terrorist threats within the United States, such as the Central Intelligence Agency performs regarding terrorist threats abroad.
  • the Department of Homeland Security working together with enhanced capabilities in other agencies such as the Federal Bureau of Investigation would make America safer by pulling together information and intelligence from a variety of sources.
  • the prevention of terrorist acts requires a proactive approach that will enhance the capability of policymakers and law enforcement personnel to preempt terrorist plots and warn appropriate sectors.
  • the Department would fuse and analyze legally accessible information from multiple available sources pertaining to terrorist threats to the homeland to provide early warning of potential attacks. This information includes foreign intelligence, law enforcement information, and publicly available information.
  • the Department would be a full partner and consumer of all intelligence-generating agencies, such as the Central Intelligence Agency, the National Security Agency, and the FBI. By obtaining and analyzing this information, the Department would have the ability to view the dangers facing the homeland comprehensively, ensure that the President is briefed on relevant information, and take necessary protective action. "Better communications are a fundamental key to better surveillance and to controlling events and disseminating vital information in times of crisis. "
  • the invention relates generally to anti-terrorist, criminal exposure and law enforcement intelligence sharing and distribution systems. More particularly, a system that allows multiple law enforcement agencies the ability to make instantaneous dissemination of intelligence information to be distributed across the Nation in a variety of high risk homeland locations such as airports, train stations, sports stadiums, etc. and which allows the public the ability to access a terrorist hotline or make an e-911 call with touch of one button.
  • the system allows multiple agencies the ability to add terrorist suspects or other wanted persons into a nationwide intelligence-sharing network.
  • the system incorporates the use of public visual display units that prominently display wanted terrorist information and wanted faces out in the public, thus allowing millions of Americans the ability to stay updated as to whom is being currently sought as wanted suspects in the war on terror.
  • the system uniquely isolates threats to homeland security by monitoring human reaction to constantly changing and updated images and descriptions of wanted terrorist being shown to persons in controlled public settings; i.e. groups in line to enter the country through customs, in line up to pass through airport security check points, or at the airline gate area waiting to board an airplane.
  • Human emotions and reactions to the numerous controlled and changing pictures (stimuli) being introduced into the public at high-risk locations and are monitored by law enforcement personnel via cameras as well as by posted security officers who can, first hand, spot abnormal reactions to the stimuli and act accordingly to secure the area.
  • the system also enables the current homeland security terrorist alert color code and status to be electronically changed and prominently disseminated throughout the country via a nationwide wireless switching system.
  • the system also incorporates the use of a portable e-911 calling wand encased in a destruction resistant housing, that allows either a one button e-911 call or one button direct line terrorist situation report call to be easily made by the general public.
  • the activation of this wand also emits a GPS tracking signal that allows authorities to pinpoint the exact location ofthe caller thus eliminating possible interference or delay in response to the terrorist alert call.
  • the system also features a back-up portable calling system that allows calls to on-site, security personnel that get monitored as well by federal terrorist momtoring agencies at remote location facilities. The system operates on it's own power supply and is not reliant upon external power in times of power outage.
  • the system utilizes a unique use ofthe Internet to broadcast nationwide an Internet website that is wirelessly accessed by portable visual display units strategically located in key public places such as customs check in stations and other passenger screening points. Thousands of visual display units are logged on to the Internet and connected to access a master website which sends up-to- date terrorist information nationwide.
  • This systems allows for nationwide dissemination of wanted terrorist or AMBER alert intelligence, without the need to use news stations, or radio, that have large delays in distribution due to other news stories, pre-sold air time, and lack of distribution points in high risk locations across the nation.
  • a master website is updated as needed by law enforcement agencies as new intelligence needs to be distributed.
  • each terrorist distribution point can be accessed wirelessly and can transmit real time web cam audio and visual transmissions as needed from thousands of high-risk locations back to on site security as well as a central monitoring station at federal watchdog facilities.
  • the present invention is a Homeland Security and Terrorist Awareness System that allows a law enforcement agency to broadly disseminate real-time intelligence to high risk public locations such as airports, train stations, stadiums etc. in order to provide the Nation an immediate update on who to look for.
  • This invention generally relates to increasing homeland security by enabling the general public the ability to easily contact the proper govt. authorities in order to report potential terrorist activities or other threats to homeland peace or well being as well providing government authorities and law enforcement agencies the ability to disseminate homeland security status changes, as well as, quickly spreading visual and audio information regarding wanted terrorists or other wanted suspects, or all points bulletin alerts for missing people, children or the ability to communicate Amber alerts via a high-speed audiovisual electronic communication system.
  • this invention provides the general public an easy means of reporting emergencies or suspicious terrorist activity to the proper authorities in public places during normal heights of Homeland security alerts or during times of heightened security alert, emergency power shortage or outage, times of enforced confinement, manmade or natural disasters or any other threats to civil or government well-being as well as providing wide spread tracking points for e-911 emergency calls placed from the device.
  • This invention was designed in response to the continued threat of terrorist threats to the United States of America. Its purpose is an alert system to keep the public and officials in our countries transportation centers, aware of any new and urgent terrorist threats and an immediate reporting system.
  • TRAP Transmission Response and Alert Program
  • TDM Terrorist Display Monitor
  • IAS Immediate Alert System
  • IAS displays scrolling text messages regarding any current threat alerts or information for immediate release Camera that will record any specific reaction responses (SRR) or unusual behavior.
  • Figure 6- shows hand pressure pushing the wand down to catch points (25) shows the springs extended and being depressed (26) shows the springs fully depressed and holding the wand down (27) shows the momentary pressure down to release the wand (28) shows the spring pressure pushing up to release the wand for use
  • Figure 7- shows the e-911 wand coming out ofthe unit (30) shows an internal illustration of wand action
  • Figure 8- shows the wand fully inserted (32) shows an internal illustration of wand depressed inside Figure 9-(33) beacons lights (34) internal switch (35) LCD panel (36) touch pad (37) - €-911 auto programmed touch pad (38) terrorist hotline auto programmed touch pad (39) cellular transmitter (40) back up battery 1 (41) back up battery 2 (42) negative contact bar (43) positive contact bar
  • Figure 18- (62) action of calling for help by pressing one button calling wand (63) shows help arriving Figure 19-(64) (65) (66) (67) various model cell phones (69) shows time wasted trying to figure out how to operate the phones (70) shows a house on fire (71) shows fire spreading due to too much time Figure 20- (72) shows the help arriving on time due to the one button e-911 call (73) shows the e-911 call being made without confusion (74) shows fast response and no wasted time in calling for help Figure 21- (75) shows electronic wanted poster displaying terrorist images (76) displays the current homeland security terrorist alert status (77) shows the built-in terrorist hotline for backup emergency calling Figure 22- (78) shows a wireless LED display for showing vital information (79) shows a wireless back reporting phone and terrorist hotline (80) shows the base and power supply housing (81) shows the e-911 wand (82) the homeland security status alert signage (83) LCD screen for displaying waned terrorist and amber alert information (14) is the emergency cellular charging unit
  • Figure 23- shows the applications for the terrorist reporting and alert units at an airport
  • FIG. 24 shows the system in an airport (84) shows real time transmission of wanted terrorists being displayed in an airport
  • Figure 26- Shows the intelligence coordination between various agencies in order to make wanted terrorist information available at key security points across the nation
  • Figure 27- Shows the blue line security terrorist hotline for reporting suspicious activity (99) shows the blue line phone (100) shows the receipt points ofthe terrorist notline ai a federal watchdog point as well as local security personnel
  • Figure 28- (101) shows law enforcement intelligence information being sent to an Intelligence clearance source (102) (103) intelligence is received by a terrorist/amber alert distribution center (104) an emergency website is updated for worldwide web distribution (105) Internet service provider sends out data to the Internet (106) shows the wireless Internet distribution ofthe information (107), (108), (109) are CPU'S with wireless Internet transmission capabilities (110), (111), and (112) are the portable terrorist reporting alert program unit (113), (114) and (115) are the LCD screens that display the terrorist/ or amber alert information
  • Figure 29- (116) is the transmission point screen of terrorist information that needs to be remotely checked for workability
  • 117 is the action of calling, via the Internet, ofthe terrorist alert and Amber Alerts.
  • alert transmission point computer by calling the URL number which isolates that exact computer so as to activate its transmission screen from a remote monitoring computer (117-a) is the real time image ofthe what is being shown on the remote screen being transmitted back to the monitoring computer (118) is the remote CPU transfer computer (119) is remote PC control software (120) is the home base monitoring computer
  • Figure 30- (121) is intelligence information sent to be distributed by TRAP system (122) pictures or information cleared for distribution and ready to be processed (123) receives pictures or information and prepares it by priority for nationwide dissemination (124) builds a website and uploads terrorist/amber information (125) the ISP uploads info to WWW (126) is data being transferred to airport concourse area (127) is the local wireless transmission ofthe website to the terrorist display LCD
  • Figure 31-(131) shows an advertising sponsor using the dissemination system for promotion (132) shows a person seeing the sponsor ad's and the terrorist information
  • Figure 32- Shows the terrorist images being wirelessly disseminated to restaurant tables to portable table top LCD screens (133) and (134)
  • Figure 33- Shows the use ofthe nations cable network stations (135) to further the wanted terrorist information (136) to cable stations for distribution to the general public (137) to their regional signal area.
  • Figure 34 Shows the Internet transmission being converted to audio and video output signals input into the head end ofthe cable network.
  • Figure 35- Shows how different districts (140) and (141) can be supplied with selective information pertinent to the area.
  • Figure 36- Shows the built-in camera (142) that transmits the real-time images (143) in front ofthe image display units (112) that detects suspicious reactions to the wanted images being shown such as looking away from the images, walking away from the area, efforts to not be noticed by others in the crowd. The suspicious reactions are monitored by local security(144) officials as well as by other federal watchdog facilities (145).
  • Figure 37- Shows the components and wiring circuits for the portable LEIDS unit.
  • (146) is a 12 volt high amp hour sealed lead acid battery. This battery operates (151) the e-911 wand recharging circuit that connects to the e-911 wand Fig 9 (42) and (43) and (152) the Blue Line phone Fig. 22 (79) recharging circuit.
  • (153) is the wireless receiver that receives transmissions from the wireless Internet transmission circuit (106).
  • the 12 volt supply from (146) operates the LED screen (149) and the LCD screen (150).
  • (154) is the A/C line in connection to provide recharging power to the LEIDS unit.
  • (155) is the circuit that supplies the emergency cellular power unit (147).
  • Ref. Utility Patent Application 10/134,541 4/30/2002 (156) is the internal battery charger that recharges the SLA power supply (146).
  • (157) is the 110 volt inverter that takes 12 volts and changes it into 110-volts during power outages at supply (154).
  • (160) is the relay switch to convert over from outside power to 110 volt converted power at (157) converter when outage is detected at (154).
  • Fig. 1 - Shows e-911/ terrorist hotline calling wand.
  • This wand is designed to be used by the general public for emergency purposes to contact either a terrorist hotline or place an e-911 call to summons help from authorities. Its structure is impact resistant, water resistant and made to be carried or passed over to other persons in extreme environments such as bombsites, earthquake sites, fire sites, etc.
  • Fig. 2- (2) shows a one-button e-911 hotline button that is designed to activate an e-911 tracking signal along with the voice calling and receiving capabilities of a normal 911 call.
  • Shows the LCD readout that displays the call status as "connecting" or "connected” or "call ended”.
  • Is the negative recharging terminal and (6) is the positive terminal that connects to a charging block assembly (18) to keep the calling wand charged and ready for use.
  • Is a reset button that resets the unit back to "ready" status after either an e-911 call or a terrorist hotline call (8) Shows the homeland security alert status beacon that illuminates the current homeland security status color code-Low-Green, Blue-Guarded, Yellow-Elevated, Orange- High, Red-Severe.
  • Fig.3- Shows (14) the emergency cellular charging station -Ref Utility Patent Application 10/134,541 4/30/2002- PPA 60/328/057 PPA 60'328/019 PPA 60/327,916 #29/149,224
  • (11) Is the start switch that activates a timed charging cycle for the multiple model charging cords designed to supply portable emergency, cellular operating and recharging power to the most widely used cellular phones by the general public.
  • (12 Is the cellular re-charger D/C power recharging port that accepts a d/c power transformer that recharges the cellular the power supply in the emergency cellular charging station.
  • (13) Is the charging indicator light that shows power is reaching the portable cellular power supply battery
  • (14) Is the overall view ofthe portable emergency cellular charger (15) Shows how the e-911 wand sliding out of housing for use.
  • Fig.4- (17) shows the spring loaded electrical contact points fully extended. This spring pressure allows a strong electrical contact from the charging block power to the e- 911 wand receipt contact points. The springs act as well as a means to quickly release the e-911 wand for use when the spring catch clips are released.
  • ( 18) Shows the spring loaded charging block structure fully depressed and ready for release when needed for use.
  • Fig.5- Shows how the contacts meet to supply recharging power to the e-911 wand (1) via the following points: (19) positive connection transfer point, (20) Is the negative connection transfer point (21) positive connection receipt point (22) negative connection receipt point.
  • Fig.4- shows the spring loaded electrical contact points fully extended. This spring pressure allows a strong electrical contact from the charging block power to the e- 911 wand receipt contact points. The springs act as well as a means to quickly release the e-911 wand for use when the spring catch clips are released.
  • ( 18) Shows the spring loaded charging block structure fully de
  • Figure 7- (29) shows the e-911 wand coming out ofthe unit.
  • (30) shows an internal illustration of wand action
  • Figure 8- (31) shows the wand fully inserted in the cellular charging station and (32) shows an internal illustration of wand depressed inside.
  • (33) Shows the beacon lights for the for the Homeland Security color code status beacon.
  • (34) is the internal switch to activate the correct the Homeland Security color-coded status alert.
  • (35) Is the LCD call status panel (36) is the touch pad to reset the preprogrammed e-911 calls or terrorist hotline call.
  • (37) Is the -e-911 auto programmed touch pad and (38) is terrorist hotline auto programmed touch pad.
  • Is a cellular transmitter and receiver (40) is back up battery 1 and (41) is back up battery 2.
  • (42) is the negative contact bar (43) positive contact bar.
  • Figure 10-(45) shows an e-911 wand in wall mounted enclosure and (46) is a wall mounted door latch.
  • Figure 11 - (47) shows the different auto dialer on touch buttons that can be used to call sponsors for commercial business, auto dial sponsor buttons.
  • (48) Illustrates that the sponsor panel is located on the back side of e-911 wand.
  • Figure 12- (49) shows the internal workings ofthe sponsor side ofthe e-911 wand touch pad system and the LCD readout.
  • (50) Shows the internal action ofthe auto dial sponsor action against (51 ) touch pad for calling multiple sponsors (53) customer action to call sponsor external view
  • Figure 13-(54) shows a side view of a customer action to call a sponsor by closing a switch to auto dial circuit auto dial circuit
  • Figure 18- (62) is the action of calling for help by pressing one button calling wand and (63) shows help arriving Figure 19-(64) (65)
  • (66) (67) Shows various model cell phones and (69) Shows time wasted trying to figure out how to operate the phones
  • 70 Shows a house on fire and (71) shows fire spreading due to too much time
  • Figure 20- (72) shows the help arriving on time due to the one button e-911 call (75) shows the e-911 call being made without confusion * (76) shows fast response and no wasted time in calling for help
  • Figure 21- (75) shows electronic wanted poster displaying terrorist images (76) displays the current homeland security terrorist alert status (77) shows the built-in terrorist hotline for backup emergency calling
  • Figure 22- (78) shows a wireless LED display for showing vital information (79) shows a wireless back reporting phone and terrorist hotline (80) shows the base and power supply housing (81) shows the e-911 wand (82) the homeland security status alert signage (83) LCD screen for displaying waned terrorist and amber alert information (14) is the emergency cellular charging unit
  • Figure 23- shows the applications for the terrorist reporting and alert units at an airport
  • Figure 24- shows the system in an airport (84) shows real time transmission of wanted terorists being displayed in an airport
  • Figure 26- Shows the intelligence coordination between various agencies in order to make wanted terrorist information available at key security points across the National Figure 27- Shows the blue line security terrorist hotline for reporting suspicious activity (99) shows the blue line phone (100) shows the receipt points ofthe terrorist hotline at a federal watchdog point as well as local security personnel
  • Figure 28- (101) shows law enforcement intelligence information being sent to an Intelligence clearance source (102) (103) Intelligence is received by a terrorist/amber alert distribution center (104) an emergency website is updated for worldwide web distribution (105) Internet service provider sends out data to the Internet (106) shows the wireless Internet distribution ofthe information (107), (108), (109) are CPU's with wireless Internet transmission capabilities (110), (111), and (112) are the portable terrorist reporting alert program unit (113), (114) and (115) are the LCD screens that display the terrorist/ or amber alert information
  • Figure 29- (116) is the transmission point screen of terrorist information that needs to be remotely checked for workability (117) Is the action of calling, via the Internet, ofthe terrorist alert and amber alert transmission point computer by calling the URL number, which isolates that exact computer so as to activate its transmission screen from a remote monitoring computer (117-a) is the real time image of what is being shown on the remote screen being transmitted back to the monitoring computer (118) is the remote CPU transfer computer (119) is remote PC control software (120) is the home base monitoring computer
  • Figure 30- (121) is intelligence information sent to be distributed by TRAP system (122) pictures or information cleared for distribution and ready to be processed (123) receives pictures or information and prepares it by priority for Nationwide dissemination (124) builds a website and uploads terrorist/amber information (125) the ISP uploads info to WWW * (126) is data being transferred to airport concourse area (127) is the local wireless transmission ofthe website to the terrorist display LCD (128) is the remote CPU logged onto terrorist website (129) shows all the units in the area displaying same information and using the Internet as an automatic rapid information dissemination tool (130) shows a person receiving vital terrorist information
  • Figure 31-(131) shows an advertising sponsor using the dissemination system for promotion (132) shows a person seeing the sponsor ad's and the terrorist information Figure 32- shows the terrorist images being wirelessly disseminated to restaurant tables to portable table top LCD screens (133) and (134)
  • Figure 33- Shows the use ofthe nations cable network stations (135) to further the wanted terrorist information (136) to cable stations for distribution to the general public (137) to their regional signal area.
  • Figure 34 Shows the Internet transmission (106) being converted to audio and video
  • Figure 35- Shows how different districts (140) and (141) can be supplied with selective information pertinent to the area.
  • Figure 36- Shows the built-in camera (142) that transmits the real-time images (143) in front ofthe image display units (112) that detects suspicious reactions to the wanted images being shown such as looking away from the images, walking away from the area, efforts to not be noticed by others in the crowd. The suspicious reactions are monitored by local security(144) officials as well as by other federal watchdog facilities (145).
  • Figure 37- Shows the components and wiring circuits for the portable LEIDS unit.
  • (146) is a 12 volt high amp hour sealed lead acid battery. This battery operates (151) the e-911 wand recharging circuit that connects to the e-911 wand Fig 9 (42) and (43) and (152) the Blue Line phone Fig. 22 (79) recharging circuit.
  • (153) is the wireless receiver that receives transmissions from the wireless Internet transmission circuit (106).
  • the 12 volt supply from (146) operates the LED screen (149) and the LCD screen (150).
  • (154) is the A/C line in connection to provide recharging power to the LEIDS unit.
  • (155) is the circuit that supplies the emergency cellular power unit (147).
  • Ref. Utility Patent Application 10/134,541 4/30/2002 (156) is the internal battery charger that recharges the SLA power supply (146).
  • (157) is the 110 volt inverter that takes 12 volts and changes it into 110-volts during power outages at supply (154).
  • (160) is the relay switch to convert over from outside power to 110 volt converted power at (157) converter when outage is detected at (154).
  • This invention offers a simple solution to several problems confronting the nation at this time. How can the various intelligence agencies remain co-coordinated in the dissemination of vital information in the fight against terrorism and get it to where it needs to be? How can the system be updated nationwide quickly? How can the systems be quickly installed? How can the nations e-911 emergency reporting system be enhanced and spread nationwide with the pay phone for emergency calling becoming more and more obsolete? How can the overloaded (due to terrorist reports ) 911 calling stations be lightened by providing a specific line for reporting terrorists activities. How can such a system be sponsored by the private sector? How can the general public become the additional eyes and ears of law enforcement for the purposes of spotting wanted terrorists or Amber alert suspects?
  • the present invention makes it possible for participating law enforcement agencies to subscribe to a public, wanted terrorist information network, that enables law enforcement agencies a way to immediately disseminate audio and visual wanted terrorist or other wanted suspects information, or other information needed for homeland security including cooperation or emergency procedures.
  • This information can now be disseminated to the nations most vital and at risk locations in the nation.
  • the system utilizes the internet in a unique way.
  • the start ofthe dissemination process starts at the law enforcement level (101-102) the information is screened for clearance to the Amber alert/terrorist alert distribution center (103)- The information is then sent to the website assembly center (104) where it is built into a website program with priority, color codes, audio signals and alarms, voice-overs, graphics enhancements and urgency levels as needed in order to get the proper response, result and action at the receipt points, (high risk gates, etc.,) From there the information is transferred to the Internet via an Internet service provider (105). The Internet via hardwire and satellite systems reaches a location where the transmission can be distributed as needed . Fig. 32 At the location the Internet signal is either directly connected by high speed cable or is distributed via a wireless internet transmitter and receiver (106).
  • Fig 35 (104) is the point where the information sources all across the country. It is at this point as well, specific regions, given different website log on addresses are sent "region-specific" information to be disseminated by law enforcement as needed. This system of regional distribution is shown in Fig. 35 (109) and (140).
  • the next problem this invention solves is ? How can the systems be quickly installed an how can they be strategically located so as to be seen both by potential terrorists in order to stimulate a suspicious reaction as well as by security personnel and the general public. Fig.
  • FIG 22 shows the completely portable LEIDS unit, that is fully equipped with a long duration rechargeable power supply (80) capable of powering the unit in a power outage situation or when needed in a completely portable situation, such as an overcrowded gate during flight delays or when needed in screening large groups during times of heightened alert status.
  • Fig 37 shows the portable circuitry that allows the unit to operate under it's own portable power.
  • the next problem this invention solves is how can the nations e-911 emergency reporting system be enhanced and spread nationwide with the pay phone for emergency calling becoming more and more obsolete? Today the nation is faced with a growing problem. Pay phones are disappearing. A quick survey of populated places today shows that it is " increasingly hard to find a pay phone in order to make an emergency phone call.
  • the present invention makes e-911 public phones a very attractive and viable alternative to the disappearing pay phones.
  • Fig-20 illustrates the solution to major problems facing society today.
  • the additional problem that faces the general public is the ever increasing complexity and the diversity ofthe cellular phones on the market. Because ofthe complexity of cellular phone operation, I.E. phone button locks, button send sequences, button identification, and additional features such as phone directories, games, visual aids , etc.
  • the calling wand also solves another growing problem in society. That problem is the fact that more and more terrorist reporting calls are being made to 911 calling facilities which are overburdening the 911 operators with calls that are not immediately life threatening but are still vital information calls.
  • the solution to this problem is to provide a second "one touch" call button that calls a separate terrorist hotline which dramatically reduces the amount of 911 calls that should be more properly routed to a terrorist law enforcement r related agency instead.
  • pay phones are disappearing is the fact that they are no longer profitable to operate.
  • the suggested embodiment in Fig.14 shows how collective sponsors can pay for the distribution and operation ofthe units, allowing millions of former pay phone sites to be replaced with emergency calling sites that are not reliant on coin or credit card calls to be made to cover the cost of supplying a 911 call stations throughout the country.
  • the simplicity ofthe "one button" call feature allows children to be easily trained in it's use. Also physically impaired persons can more easily make a call as well by just having to press the button once.
  • the unit can even be equipped with a voice activated feature, wherein a set sequence of numbers such as 9-1-1 can be spoken into the mouth piece so as to activate the call.
  • the calling wand is equipped with a long duration battery supply that allows hours of e-911 calling to be made in order to stay in communication in disastrous situations such as that experienced during the vents of 911.
  • an auto dial to the sponsors feature makes the calling wand an even more attractive feature to sponsors.
  • the sponsor buttons with local emergency numbers such as Fire, Ambulance, Hospital, police, EMT or others as an alternative to summons help if the 911 call line is over burdened as has happened in the past when a major incident has occurred.
  • the system of dissemination of information and the quick up load capability ofthe information makes this invention an extremely effective new tool in the fight on terror and crime in general, such as kidnappings, in the case of Amber Alert dissemination or even missing children alerts. How can the Homeland Security Alert statuses be quickly upgraded across the nation, as well as provide further education to government employees and the general public, on what the status changes mean and what actions are necessary to take? Fig.
  • Fig. 24- shows a track of a terrorist entering an airport and walking into a "people trap" (90). This people trap is how suspicious human emotion and reaction is stimulated in the terrorist. The crowd is informed continuously of wanted terrorists. A terrorist walks into the 'people trap".
  • Fig. 25 shows local as well as federal remote monitoring of suspicious reactions that are brought about by the "People Trap”.
  • Fig. 26. shows how the te ⁇ orist is further set on edge by the fact that multiple agencies can in real time submit information. This furthers the possibilities that their face may come up and be seen. Right there, while they are there! When real time input is possible the te ⁇ orist will not be able to rest easy. This of course, is the magic in the effectiveness ofthe stimulus response, law enforcement, capabilities utilized in the "People Trap" anti -terrorism tool.
  • This invention is enhanced by the use ofthe portable cellular charging station in it's preferred embodiment shown in Fig. 39.
  • the e-911 calling wand is housed into the unit Fig. 3. (14) .
  • This provides detachable e-911 calling capability by using the e-911 wand.
  • the main unit is capable of charging over 70 models ofthe most widely used cellular phones which enables the public to charge their cellular phones for readiness, while out and about, and in emergency situations wherein the area is left without recharging power or conventional phone lines.
  • FIG. 1 Two-way information dissemination and gathering terminal housing.
  • FIG. 1 2- Law enforcement information screen 3- Body detection sensor 4- Power supply housing 5- Back-up summons light 6- Camera terminals 7- Traffic light system 8- CPU housing 9- Remote control housing
  • FIG 3- 10- Terrorist suspect viewing wanted terrorist information
  • Figure 4- 1 1- Terrorist suspect in body detection range 12- Terrorist suspect being signaled to come into camera range Figure 5-: 13- Terrorist in camera range of surveillance camera 14- Security officer watching actions of terrorist subject 15- Security officer with remote control capability to send suspicious reaction pictures to on and off site security 16- Camera view of terrorist suspect Figure 6-: 17-Security officer activating remote control to submit suspicious person to offsite law enforcement 18-Alert programmed camera 19- Terrorist suspect manifesting suspicious reactions 20- Te ⁇ orist suspect picture being wirelessly sent to back-up security
  • Figure 10- 32- e-mail alerts sent to authorized personnel 33- email alert sent to alert data storage computer
  • 31- Wireless web camera transmissions 32-a Web cam transmission
  • Figure 14 39- Surveillance audio and visual information gathering 40- Audio visual camera web server 41- Onsite data storage 42- Local area data review 43- Wide area network transmission
  • Figure 15 45- Wanted te ⁇ orist images submitted by law enforcement 44- Wanted images displayed via cable networks
  • Figure 16 46- Internet 46-a Satellite internet link 46-b Internet line 47- CPU 1
  • Figure 17 13-b Te ⁇ orist suspect Figure 18: 48-n law enforcement image 49- data broadcast center CPU 50- Web software 51 -Web server 52- Satellite Transmitter 52-a Satellite Transmission 53-Satellite receiver 54-Modem 55- LAN Transmission 56- Web browser software
  • This invention offers simple solution to several problems confronting the world at this time. As has been discovered from research into the events leading up to the events of
  • the present invention makes it possible for participating law enforcement agencies to subscribe to a wanted criminal and te ⁇ orist information dissemination network that enables law enforcement agencies a means to immediately disseminate audio visual wanted te ⁇ orist or other wanted suspect information , or other information needed to ensure higher homeland security standards to hundreds of key locations across the nation.
  • This information can now be disseminated to the nations most vital and at risk locations such as airports, customs checkpoints, border patrol centers, seaports, stadiums, hotels, resorts, courthouses, national landmarks) and government offices.
  • the present programming software and human interaction to result to create a brand new and extremely effective tool in deterring criminals and terrorists by invoking a series of exact steps calculated to stimulate human suspicious response from criminals and terrorist trying to pass a nations most at risk security checkpoints.
  • Figure 13 illustrates the sequence of events that begins with the dissemination of information that originates from various law enforcement agencies (35) , get sent via an internet transmission, and intranet transmission or other means to (36) the information processing center (36) that transforms the information to a format based in
  • Figure 3 illustrates a terrorist suspect entering a security checkpoint area wherein the present invention is set up and disseminating information on wanted suspects provide from law enforcement agencies at (35) to the general public as they enter the security check points of airports, customs border patrol posts, stadiums etc.
  • the suspect is shown at (10) seen reacting the sequences of present-time wanted images as they change across the screen as they are broadcast from (37) beginning the first of a series of steps that allow suspicious emotional response to be detected in an individual passing a security checkpoint.
  • Figure 4 (11) shows the distance sensor activating the traffic lights at (12) that operate so as to flash a green move forward light as the individual gets in close proximity to the information dissemination unit (1) typically within 3-5 feet and then changes to a red stop light that requires the person entering the security checkpoint to remain in front of an overt security camera for a period of 10-15 seconds while he has to confront directly the images of wanted persons that have been originated at (35) by law enforcement agencies Figure 4.
  • Figure 5 shows te ⁇ orist suspect (14) entering the security sequence with a security guard standing by with a wireless remote control (15) that enables him to send a snapshot instantly back to remote command centers
  • Figure 9 (25) and (26) should he see any of several of various suspicious reactions to the images and checkpoint protocol being of the present invention employed to invoke reaction from suspicious criminals or te ⁇ orist.
  • Figure 6 shows the security officer (17) taking a snapshot via remote control (15) ofthe te ⁇ orist suspect's face (19) which is converted to a digital image (20) and converted into a wireless digital transmission Figure 9 (23) and sent on the wireless wavelength media such as 802.1 lb or 802.1 lg wireless networks (23-b) and (23-a).
  • Figure 7 shows the te ⁇ orists behavior change into a sudden departure (21) which is caught immediately on camera by the remote control activation ofthe system by the security guard (17) which immediately sends wireless transmissions ofthe terrorist suspects' departure subject (21) in full motion at a rate of approximately 30 frames per second as shown in transmission picture (22) and (23) .
  • Figure 8 shows the back-up security alert light that draws the attention of other security personnel to the scene to provide back-up to detain the suspect.
  • Figure 9 (25) shows the snap shot created by the remote control action ofthe security officer (17) reaching a remote command center (25) via wireless transmission 23-b and a local command center (26) for documentation ofthe

Abstract

An anti-terrorist and anti-criminal system for identifying suspicious persons, including terrorists and other criminals, by providing a predetermined audio-visual stimulus (75, 83) into controlled environments and disseminating real-time intelligence to the public (137), in order to elicit specific responses and reactions in any suspicious persons present in the controlled environment and make the public aware of such suspicious persons, particularly in high risk public places such as airports, borders, public buildings, courthouses, hotels, and sports arenas. The suspicious reactions are identifiable by onsite and offsite security personnel (97, 98). A specially designed 'one-touch' emergency communication device (2-10) enables the public to make e-911 or terrorist hotline calls.

Description

Utility Patent Application of Richard S. Trela
TITLE OF THE INVENTION Anti Terrorist and Homeland Security Public Safety Warning System
CROSS REFERENCE TO RELATED APPLICATIONS:
Application # 60/427,717 filed 11/20/2002
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH AND DEVELOPMENT: NOT APPLICABLE
References Cited [Referenced Byl U.S. Patent Documents
4260980 Apr., 1981 Bates 340/32. 4694295 Sep., 1987 Miller et al. 340/903. 5027104 Jun., 1991 Reid 340/426. 5280555 Jan., 1994 Ainsburg 385/116. 5307136 Apr., 1994 Saneyoshi 356/1. 5355118 Oct., 1994 Fukuhara 340/435. 5424952 Jun., 1995 Asayama 364/443. 5430431 Jul., 1995 Nelson 340/434. 5530421 Jun., 1996 Marshall et al. 340/435. 5570127 Oct., 1996 Schmidt 348/148.
FIELD OF THE INVENTION;
This invention relates generally to anti-terrorist criminal exposure and law enforcement intelligence gathering, sharing and distribution systems. Background and description of the related art
While airline hijackings have occurred on several occasions in the past, it was not until the events of Sep 11 , 2001 that the potential use of such aircraft for mass destruction was seen by most people. While boarding checks and other security measures have been in place for many years, the events of Sept. 11 have driven home the point that it is possible for potential terrorists to get past normal security measures and get on board planes or past security check points into public places with could potentially become targets of terrorists. The present invention provides a vaπety of advantages over earlier systems of by a new combination of technologies to bring about a much more effective system of achieving Homeland Security than has been seen before been available to Law enforcement and the nations public.
References:
"We need to find ways to share as much information with individuals as possible. To make every American whether they 're in business, in industry or in law enforcement, or in their families, capable of enhancing their security by being aware and alert. So it 's with that in mind, that we will guide our approach to information sharing. To make it possible for us all to be apart ofthe team which defeats terror ".
"September 11 changed America forever. Since that day, people across the country have asked, "What can I do to help? What do I need to do to make my community, my family better prepared?" President Bush created Citizen Corps to answer those questions. Citizen Corps is a local, community- based initiative to have every American become active participants in the
Homeland security effort and in support of local first responders and emergency managers."
As we look back and remember the tragic events of September 11, during this anniversary time, we also look forward. We can honor those lost by better and more creatively preparing for the future and taking the necessary steps to be better prepared for all disasters."
America is no longer protected by vast oceans. And as government works to better secure our homeland, America will continue to depend on the eyes and ears of alert citizens. We are protected from attack only by vigorous action abroad, and increased vigilance at home. State ofthe union address January 2, 2002 address.
And as government works to better secure our homeland, America will continue to depend on the eyes and ears of alert citizens.
In the aftermath of September 11, 2001, the need for strengthening and securing our communities have become even more critical. President Bush has announced that, with the help ofthe National Sheriffs' Association, the Neighborhood Watch Program will be taking on a new significance. Community residents will be provided with information which will enable them to recognize signs of potential terrorist activity, and to know how to report that activity, making these residents a critical element in the detection, prevention and disruption of terrorism. President Bush "The threats that we have heard recently remind us ofthe pattern of threats we heard prior to September the 11th. We have no specific threat to America, but we're taking everything seriously, obviously. And so, therefore, we have gone to a different level of concern, a different threat level, which means our government will be providing extra security at key facilities, and that we'll be increasing surveillance," said the President. * The purpose of this system will be to raise awareness in the public that a real threat still exists in this country. Complacency since the events of 9/11 are evident, and by keeping this threat in front ofthe general public will hopefully assist in preventing another tragedy such as that one.
"Fewer than one in four Americans (22 percent) in the latest FOX News/Opinion Dynamics national survey answered correctly when asked to name the country's current alert level - As the country continues to fight the war on terrorism, tracking down Al Qaeda members and other terrorists is the goal considered "very important" by the highest number of Americans " Dana Blanton - Fox News - 7/12/02 By keeping the Homeland Security Advisory System in front ofthe public, as well as up to date information regarding wanted terrorists, amber alerts, and emergency information; it could help prevent future tragedies as well as aid in the capture of known or suspected terrorists "Seventy-three percent of Americans in an ABCNEWS/Washington Post poll express concern about the chance of further attacks. And 54 percent have little confidence in the government's ability to stop them " ABC News - 7/16/02 Because this system can be updated on an almost instantaneous basis, and that information presented in front of large amounts of people at a time, the general public will be more informed and better prepared in the event of a terrorist threat or assist in an Amber alert. In the top fifty airports alone, over 400 million people emplane annually which does not include the public that drops off or pick up those airline travelers. "President Bush on added some federal muscle to the nation 's patchwork of Amber Alert systems, directing the Justice Department to set a national standard for the systems designed to speed information about abducted children to the public. " MSNBC News - 10/02/02
"The single most important item of unfinished business on Capitol Hill is to create a unified department of homeland security that will vastly improve our ability to protect our coasts and our borders and our communities. The election may be over, but a terrorist threat is still real. The Senate must pass a bill that will strengthen our ability to protect the American people. " President George W. Bush 11/7/02
Priority one for this nation and is Homeland Security The President's Budget for 2003 - the Federal government's first post-September 11 budget - reflects his absolute commitment to achieving a more secure homeland. The FY 2003 Budget directs $37.7 billion to homeland security, up from $19.5 billjon in 2002. This massive infusion of Federal resources reflects the priority the President has attached to the homeland security agenda.
On November 19, 2001, the President signed into law the Aviation and Transportation Security Act, which among other things established a new Transportation Security Administration (TSA) within the Department of Transportation. This Act established a series of challenging but critically important milestones toward achieving a secure air travel system. The President's Budget for 2003 requests $4.8 billion to fulfill the mandates established by the Act.
More broadly however, the Aviation and Transportation Security Act fundamentally changed the way transportation security will be performed and managed in the United States. The continued growth of commercial transportation, tourism and the world economy depends upon effective transportation security measures being efficiently applied. However, the threat to transportation is not restricted solely to those motivated by political or social concerns. In addition to terrorism, TSA will also work to prevent other criminal acts, regardless of motivation.
"If we cannot do a better job of sharing information, we will not be able to effectively identify vulnerabilities, develop needed technology, and coordinate efforts to detect and respond to attacks."
United States General Accounting Office 6/7/02
The Department of Homeland Security would merge under one roof the capability to identify and assess current and future threats to the homeland, map those threats against our current vulnerabilities, inform the President, issue timely warnings, and immediately take or effect appropriate preventive and protective action.
Actionable intelligence is essential for preventing acts of terrorism. The timely and thorough analysis and dissemination of information about terrorists and their activities will improve the government's ability to disrupt and prevent terrorist acts and to provide useful warning to the private sector and our population. Currently, the U.S. government has no institution primarily dedicated to analyzing systematically all information and intelligence on potential terrorist threats within the United States, such as the Central Intelligence Agency performs regarding terrorist threats abroad. The Department of Homeland Security, working together with enhanced capabilities in other agencies such as the Federal Bureau of Investigation would make America safer by pulling together information and intelligence from a variety of sources. The prevention of terrorist acts requires a proactive approach that will enhance the capability of policymakers and law enforcement personnel to preempt terrorist plots and warn appropriate sectors. The Department would fuse and analyze legally accessible information from multiple available sources pertaining to terrorist threats to the homeland to provide early warning of potential attacks. This information includes foreign intelligence, law enforcement information, and publicly available information. The Department would be a full partner and consumer of all intelligence-generating agencies, such as the Central Intelligence Agency, the National Security Agency, and the FBI. By obtaining and analyzing this information, the Department would have the ability to view the dangers facing the homeland comprehensively, ensure that the President is briefed on relevant information, and take necessary protective action. "Better communications are a fundamental key to better surveillance and to controlling events and disseminating vital information in times of crisis. "
SUMMARY OF THE INVENTION
The invention relates generally to anti-terrorist, criminal exposure and law enforcement intelligence sharing and distribution systems. More particularly, a system that allows multiple law enforcement agencies the ability to make instantaneous dissemination of intelligence information to be distributed across the Nation in a variety of high risk homeland locations such as airports, train stations, sports stadiums, etc. and which allows the public the ability to access a terrorist hotline or make an e-911 call with touch of one button. The system allows multiple agencies the ability to add terrorist suspects or other wanted persons into a nationwide intelligence-sharing network. The system incorporates the use of public visual display units that prominently display wanted terrorist information and wanted faces out in the public, thus allowing millions of Americans the ability to stay updated as to whom is being currently sought as wanted suspects in the war on terror. The system uniquely isolates threats to homeland security by monitoring human reaction to constantly changing and updated images and descriptions of wanted terrorist being shown to persons in controlled public settings; i.e. groups in line to enter the country through customs, in line up to pass through airport security check points, or at the airline gate area waiting to board an airplane. Human emotions and reactions to the numerous controlled and changing pictures (stimuli) being introduced into the public at high-risk locations and are monitored by law enforcement personnel via cameras as well as by posted security officers who can, first hand, spot abnormal reactions to the stimuli and act accordingly to secure the area. The system also enables the current homeland security terrorist alert color code and status to be electronically changed and prominently disseminated throughout the country via a nationwide wireless switching system. The system also incorporates the use of a portable e-911 calling wand encased in a destruction resistant housing, that allows either a one button e-911 call or one button direct line terrorist situation report call to be easily made by the general public. The activation of this wand also emits a GPS tracking signal that allows authorities to pinpoint the exact location ofthe caller thus eliminating possible interference or delay in response to the terrorist alert call. The system also features a back-up portable calling system that allows calls to on-site, security personnel that get monitored as well by federal terrorist momtoring agencies at remote location facilities. The system operates on it's own power supply and is not reliant upon external power in times of power outage. The system utilizes a unique use ofthe Internet to broadcast nationwide an Internet website that is wirelessly accessed by portable visual display units strategically located in key public places such as customs check in stations and other passenger screening points. Thousands of visual display units are logged on to the Internet and connected to access a master website which sends up-to- date terrorist information nationwide. This systems allows for nationwide dissemination of wanted terrorist or AMBER alert intelligence, without the need to use news stations, or radio, that have large delays in distribution due to other news stories, pre-sold air time, and lack of distribution points in high risk locations across the nation. A master website is updated as needed by law enforcement agencies as new intelligence needs to be distributed. Instantly, new information is transmitted across the nation, or indeed, worldwide, via the worldwide web, to all ofthe visual display units that are logged on to the Internet with this special predetermined website address. Additionally, each terrorist distribution point can be accessed wirelessly and can transmit real time web cam audio and visual transmissions as needed from thousands of high-risk locations back to on site security as well as a central monitoring station at federal watchdog facilities.
At the airport, via wireless transmissions to portable visual display units strategically located in airports at security checkpoints etc, real-time law enforcement information can be put right in front ofthe public where is needed the most. Also incorporated into the system is the ability ofthe information to be converted from a CPU distribution point to a cable head to enable the terrorist and or AMBER alert information to be distributed to select regions via cable stations. Additionally the distribution points are not limited to airport gates and security check points. These units and the system can be set up to be used at airports, hotels, restaurants, sports stadiums, convention centers or virtually any where this vital terrorist and Amber alert information is needed.
While airline hijackings have occurred on several occasions in the past, it was not until the events of Sep. 11, 2001 that the potential use of such aircraft for mass destruction was seen by most people. While boarding checks and other security measures have been in place for many years, the events of Sept. 11 have driven home the point that it is possible for potential terrorists to get past normal security measures and get on board planes or past security check points into public places which could potentially become targets of terrorists. The present invention provides a variety of advantages over earlier systems by incorporating a new combination of technologies to bring about a much more effective system of achieving Homeland Security than has been available to Law enforcement agencies and the nations public.
The present invention is a Homeland Security and Terrorist Awareness System that allows a law enforcement agency to broadly disseminate real-time intelligence to high risk public locations such as airports, train stations, stadiums etc. in order to provide the Nation an immediate update on who to look for. This invention generally relates to increasing homeland security by enabling the general public the ability to easily contact the proper govt. authorities in order to report potential terrorist activities or other threats to homeland peace or well being as well providing government authorities and law enforcement agencies the ability to disseminate homeland security status changes, as well as, quickly spreading visual and audio information regarding wanted terrorists or other wanted suspects, or all points bulletin alerts for missing people, children or the ability to communicate Amber alerts via a high-speed audiovisual electronic communication system.
More specifically this invention provides the general public an easy means of reporting emergencies or suspicious terrorist activity to the proper authorities in public places during normal heights of Homeland security alerts or during times of heightened security alert, emergency power shortage or outage, times of enforced confinement, manmade or natural disasters or any other threats to civil or government well-being as well as providing wide spread tracking points for e-911 emergency calls placed from the device.
Terrorism Response and Alert Program (TRAP)
This invention was designed in response to the continued threat of terrorist threats to the United States of America. Its purpose is an alert system to keep the public and officials in our nations transportation centers, aware of any new and urgent terrorist threats and an immediate reporting system.
This system, called TRAP (Terrorism Response and Alert Program), would be placed in the nations transportation centers - airports, train, bus, and subway stations - to keep the public informed of any new threats, and to constantly update the terrorists that are currently wanted. This system is self-contained and completely wireless, and intended to be distributed in areas of heaviest traffic flow in the mentioned transportation centers. TRAP contains amongst other features the following security assets: Terrorist Display Monitor (TDM) displaying pictures of currently wanted terrorists or amber alert suspects. Pictures would change at preset times. Immediate Alert System (IAS) displays scrolling text messages regarding any current threat alerts or information for immediate release Camera that will record any specific reaction responses (SRR) or unusual behavior. These cameras to be monitored in the security offices of any specific location. Current threat level based on the Homeland Security Advisory System updated wirelessly. Cellular Phone directly connected to onsite security office or FBI to report any suspicious activity or suspected terrorist. Through wireless technology and on-board CPU, updates can be disseminated almost immediately to any ofthe TRAP systems in place, keeping the general public and officials at these transportation centers informed of any new developments. These updates can be wirelessly transmitted by the agency involved or from the security personnel on site.
Drawings
Fig. 1 - e-911 terrorist hotline wand Fig. 2- (2) e-911 hotline button (3) terrorist hotline button (4) LED/LCD readout (5) negative connection point (6) positive connection point (7) reset button (8) Beacon (9) Switch (10) Housing Fig.3- (11) Start switch (12) recharging port (13) charging indicator light (14) portable emergency cellular charger (15) e-911 wand sliding out of housing Fig.4- (17) spring loaded electrical contact points (18) spring loaded charging block structure Fig.5- (19) positive connection transfer point (20) negative connection transfer point (21) positive connection receipt point (22) negative connection receipt point
Figure 6- (24) shows hand pressure pushing the wand down to catch points (25) shows the springs extended and being depressed (26) shows the springs fully depressed and holding the wand down (27) shows the momentary pressure down to release the wand (28) shows the spring pressure pushing up to release the wand for use Figure 7- (29) shows the e-911 wand coming out ofthe unit (30) shows an internal illustration of wand action Figure 8- (31) shows the wand fully inserted (32) shows an internal illustration of wand depressed inside Figure 9-(33) beacons lights (34) internal switch (35) LCD panel (36) touch pad (37) -€-911 auto programmed touch pad (38) terrorist hotline auto programmed touch pad (39) cellular transmitter (40) back up battery 1 (41) back up battery 2 (42) negative contact bar (43) positive contact bar Figure 10-(45) e-911 wand in wall mounted enclosure (46) wall mounted door latch Figure 11 - (47) auto dial sponsor buttons (48) back side of e-911 wand Figure 12- (49) sponsor LCD readout (50) internal action to auto dial sponsor against touch pad (51) touch pad for multiple sponsors (52) customer action to call sponsor external view
Figure 13-(54) customer action to call sponsor closing switch to auto dial circuit (55) (55) auto dial circuit Figure 14-(56) sponsor advertisement (57) e-911 wand with sponsor autodial (58) e-911 instructions (59) customer removing the e-911 wand Figure 15- (59) customer removing the e-911 wand
Figure 16- (60) reverse side ofthe e-911 wand with ad touch pad
Figure 17- (61) beacon light displaying the current homeland security alert status color code
Figure 18- (62) action of calling for help by pressing one button calling wand (63) shows help arriving Figure 19-(64) (65) (66) (67) various model cell phones (69) shows time wasted trying to figure out how to operate the phones (70) shows a house on fire (71) shows fire spreading due to too much time Figure 20- (72) shows the help arriving on time due to the one button e-911 call (73) shows the e-911 call being made without confusion (74) shows fast response and no wasted time in calling for help Figure 21- (75) shows electronic wanted poster displaying terrorist images (76) displays the current homeland security terrorist alert status (77) shows the built-in terrorist hotline for backup emergency calling Figure 22- (78) shows a wireless LED display for showing vital information (79) shows a wireless back reporting phone and terrorist hotline (80) shows the base and power supply housing (81) shows the e-911 wand (82) the homeland security status alert signage (83) LCD screen for displaying waned terrorist and amber alert information (14) is the emergency cellular charging unit
Figure 23- shows the applications for the terrorist reporting and alert units at an airport
Figure 24- shows the system in an airport (84) shows real time transmission of wanted terrorists being displayed in an airport
(85) shows behind the scenes security monitoring of suspicious reactions to the pictures being displayed (86) shows a terrorist suspect having left the airport after seeing the visual display showing wanted terrorist (87) shows a law enforcement officer zeroing in on a fleeing terrorist (88) shows the changes in pictures being shown to the public (89) shows the terrorist awareness unit in detail (90) shows the public now being more aware of wanted people to look for Figure 25- (91) shows a terrorist suspect noticing the wanted terrorist pictures (92) shows the suspect in the suspicious reaction zone (93), and (94) shows the suspect leaving the area so as not to be detected (95) shows the suspect leaving the area so as not to be detected and being detained by security (96) shows the suspect being watched and identified by security (97) who calls officers to detain the suspect (98) shows federal watchdog authorities also monitoring the situation
Figure 26- Shows the intelligence coordination between various agencies in order to make wanted terrorist information available at key security points across the nation Figure 27- Shows the blue line security terrorist hotline for reporting suspicious activity (99) shows the blue line phone (100) shows the receipt points ofthe terrorist notline ai a federal watchdog point as well as local security personnel Figure 28- (101) shows law enforcement intelligence information being sent to an Intelligence clearance source (102) (103) intelligence is received by a terrorist/amber alert distribution center (104) an emergency website is updated for worldwide web distribution (105) Internet service provider sends out data to the Internet (106) shows the wireless Internet distribution ofthe information (107), (108), (109) are CPU'S with wireless Internet transmission capabilities (110), (111), and (112) are the portable terrorist reporting alert program unit (113), (114) and (115) are the LCD screens that display the terrorist/ or amber alert information
Figure 29- (116) is the transmission point screen of terrorist information that needs to be remotely checked for workability (117) is the action of calling, via the Internet, ofthe terrorist alert and Amber Alerts. alert transmission point computer by calling the URL number, which isolates that exact computer so as to activate its transmission screen from a remote monitoring computer (117-a) is the real time image ofthe what is being shown on the remote screen being transmitted back to the monitoring computer (118) is the remote CPU transfer computer (119) is remote PC control software (120) is the home base monitoring computer
Figure 30- (121) is intelligence information sent to be distributed by TRAP system (122) pictures or information cleared for distribution and ready to be processed (123) receives pictures or information and prepares it by priority for nationwide dissemination (124) builds a website and uploads terrorist/amber information (125) the ISP uploads info to WWW (126) is data being transferred to airport concourse area (127) is the local wireless transmission ofthe website to the terrorist display LCD
(129) shows all the units in the area displaying same information and using the Internet as an automatic rapid information dissemination tool (130) shows a person receiving vital terrorist information
Figure 31-(131) shows an advertising sponsor using the dissemination system for promotion (132) shows a person seeing the sponsor ad's and the terrorist information Figure 32- Shows the terrorist images being wirelessly disseminated to restaurant tables to portable table top LCD screens (133) and (134) Figure 33- Shows the use ofthe nations cable network stations (135) to further the wanted terrorist information (136) to cable stations for distribution to the general public (137) to their regional signal area.
Figure 34-Shows the Internet transmission being converted to audio and video output signals input into the head end ofthe cable network.
Figure 35- Shows how different districts (140) and (141) can be supplied with selective information pertinent to the area.
Figure 36- Shows the built-in camera (142) that transmits the real-time images (143) in front ofthe image display units (112) that detects suspicious reactions to the wanted images being shown such as looking away from the images, walking away from the area, efforts to not be noticed by others in the crowd. The suspicious reactions are monitored by local security(144) officials as well as by other federal watchdog facilities (145). Figure 37- Shows the components and wiring circuits for the portable LEIDS unit. (146) is a 12 volt high amp hour sealed lead acid battery. This battery operates (151) the e-911 wand recharging circuit that connects to the e-911 wand Fig 9 (42) and (43) and (152) the Blue Line phone Fig. 22 (79) recharging circuit. (153) is the wireless receiver that receives transmissions from the wireless Internet transmission circuit (106). The 12 volt supply from (146) operates the LED screen (149) and the LCD screen (150). (154) is the A/C line in connection to provide recharging power to the LEIDS unit. (155) is the circuit that supplies the emergency cellular power unit (147). Ref. Utility Patent Application 10/134,541 4/30/2002 (156) is the internal battery charger that recharges the SLA power supply (146). (157) is the 110 volt inverter that takes 12 volts and changes it into 110-volts during power outages at supply (154). (160) is the relay switch to convert over from outside power to 110 volt converted power at (157) converter when outage is detected at (154).
Operation of the system
Fig. 1 - Shows e-911/ terrorist hotline calling wand. This wand is designed to be used by the general public for emergency purposes to contact either a terrorist hotline or place an e-911 call to summons help from authorities. Its structure is impact resistant, water resistant and made to be carried or passed over to other persons in extreme environments such as bombsites, earthquake sites, fire sites, etc. Fig. 2- (2) shows a one-button e-911 hotline button that is designed to activate an e-911 tracking signal along with the voice calling and receiving capabilities of a normal 911 call. (3) Shows a one button terrorist hotline button that sends a call to a preprogrammed terrorist hotline reporting center and sends an e-911 tracking signal as well. (4) Shows the LCD readout that displays the call status as "connecting" or "connected" or "call ended".
(5) Is the negative recharging terminal and (6) is the positive terminal that connects to a charging block assembly (18) to keep the calling wand charged and ready for use. (7) Is a reset button that resets the unit back to "ready" status after either an e-911 call or a terrorist hotline call (8) Shows the homeland security alert status beacon that illuminates the current homeland security status color code-Low-Green, Blue-Guarded, Yellow-Elevated, Orange- High, Red-Severe.
Figure imgf000022_0001
(9) Points to the structure ofthe wand which is made of strong, lightweight aluminum. (10) Shows the switch for changing status alert colors
Fig.3- Shows (14) the emergency cellular charging station -Ref Utility Patent Application 10/134,541 4/30/2002- PPA 60/328/057 PPA 60'328/019 PPA 60/327,916 #29/149,224 (11) Is the start switch that activates a timed charging cycle for the multiple model charging cords designed to supply portable emergency, cellular operating and recharging power to the most widely used cellular phones by the general public. (12 Is the cellular re-charger D/C power recharging port that accepts a d/c power transformer that recharges the cellular the power supply in the emergency cellular charging station. (13) Is the charging indicator light that shows power is reaching the portable cellular power supply battery (14) Is the overall view ofthe portable emergency cellular charger (15) Shows how the e-911 wand sliding out of housing for use.
Fig.4- (17) shows the spring loaded electrical contact points fully extended. This spring pressure allows a strong electrical contact from the charging block power to the e- 911 wand receipt contact points. The springs act as well as a means to quickly release the e-911 wand for use when the spring catch clips are released. ( 18) Shows the spring loaded charging block structure fully depressed and ready for release when needed for use. Fig.5- Shows how the contacts meet to supply recharging power to the e-911 wand (1) via the following points: (19) positive connection transfer point, (20) Is the negative connection transfer point (21) positive connection receipt point (22) negative connection receipt point. Fig. 6- (24) shows hand pressure pushing the wand down to catch points (25) shows the springs extended and being depressed (26) shows the springs fully depressed and holding the wand down (27) shows the momentary pressure down to release the wand (28) shows the spring pressure pushing up to release the wand for use.
Figure 7- (29) shows the e-911 wand coming out ofthe unit. (30) shows an internal illustration of wand action
Figure 8- (31) shows the wand fully inserted in the cellular charging station and (32) shows an internal illustration of wand depressed inside. Figure 9-Shows the internal workings ofthe e-91 lwand. (33) Shows the beacon lights for the for the Homeland Security color code status beacon. (34) is the internal switch to activate the correct the Homeland Security color-coded status alert. (35) Is the LCD call status panel (36) is the touch pad to reset the preprogrammed e-911 calls or terrorist hotline call. (37) Is the -e-911 auto programmed touch pad and (38) is terrorist hotline auto programmed touch pad. (39) Is a cellular transmitter and receiver (40) is back up battery 1 and (41) is back up battery 2. (42) is the negative contact bar (43) positive contact bar.
Figure 10-(45) shows an e-911 wand in wall mounted enclosure and (46) is a wall mounted door latch.
Figure 11 - (47) shows the different auto dialer on touch buttons that can be used to call sponsors for commercial business, auto dial sponsor buttons. (48) Illustrates that the sponsor panel is located on the back side of e-911 wand. Figure 12- (49) shows the internal workings ofthe sponsor side ofthe e-911 wand touch pad system and the LCD readout. (50) Shows the internal action ofthe auto dial sponsor action against (51 ) touch pad for calling multiple sponsors (53) customer action to call sponsor external view
Figure 13-(54) shows a side view of a customer action to call a sponsor by closing a switch to auto dial circuit auto dial circuit
Figure 14-(56) sponsor advertisement (60) e-911 wand with sponsor autodial (61) e-911 instructions (62) customer removing the e-911 wand Figure 15- (59) customer removing the e-911 wand
Figure 16- (60) reverse side ofthe e-911 wand with ad touch pad
Figure 17- (61) beacon light displaying the current homeland security alert status color code Figure 18- (62) is the action of calling for help by pressing one button calling wand and (63) shows help arriving Figure 19-(64) (65) (66) (67) Shows various model cell phones and (69) Shows time wasted trying to figure out how to operate the phones (70) Shows a house on fire and (71) shows fire spreading due to too much time
Figure 20- (72) shows the help arriving on time due to the one button e-911 call (75) shows the e-911 call being made without confusion * (76) shows fast response and no wasted time in calling for help Figure 21- (75) shows electronic wanted poster displaying terrorist images (76) displays the current homeland security terrorist alert status (77) shows the built-in terrorist hotline for backup emergency calling Figure 22- (78) shows a wireless LED display for showing vital information (79) shows a wireless back reporting phone and terrorist hotline (80) shows the base and power supply housing (81) shows the e-911 wand (82) the homeland security status alert signage (83) LCD screen for displaying waned terrorist and amber alert information (14) is the emergency cellular charging unit
Figure 23- shows the applications for the terrorist reporting and alert units at an airport
Figure 24- shows the system in an airport (84) shows real time transmission of wanted terorists being displayed in an airport
(85) shows behind the scenes security monitoring of suspicious reactions to the pictures being displayed (86) shows a terrorist suspect having left the airport after seeing the visual display showing wanted terrorist (87) shows a law enforcement officer zeroing in on a fleeing terrorist (88) shows the changes in pictures being shown to the public (89) shows the terrorist awareness unit in detail (90) shows the public now being more aware of wanted people to look for Figure 25- (91) shows a terrorist suspect noticing the wanted terrorist pictures (92) shows the suspect in the suspicious reaction zone (93), and (94) shows the suspect leaving the area so as not to be detected (95) shows the suspect leaving the area so as not to be detected and being detained by security (96) shows the suspect being watched and identified by security (97) who calls officers to detain the suspect (98) shows federal watchdog authorities also monitoring the situation
Figure 26- Shows the intelligence coordination between various agencies in order to make wanted terrorist information available at key security points across the Nation Figure 27- Shows the blue line security terrorist hotline for reporting suspicious activity (99) shows the blue line phone (100) shows the receipt points ofthe terrorist hotline at a federal watchdog point as well as local security personnel Figure 28- (101) shows law enforcement intelligence information being sent to an Intelligence clearance source (102) (103) Intelligence is received by a terrorist/amber alert distribution center (104) an emergency website is updated for worldwide web distribution (105) Internet service provider sends out data to the Internet (106) shows the wireless Internet distribution ofthe information (107), (108), (109) are CPU's with wireless Internet transmission capabilities (110), (111), and (112) are the portable terrorist reporting alert program unit (113), (114) and (115) are the LCD screens that display the terrorist/ or amber alert information
Figure 29- (116) is the transmission point screen of terrorist information that needs to be remotely checked for workability (117) Is the action of calling, via the Internet, ofthe terrorist alert and amber alert transmission point computer by calling the URL number, which isolates that exact computer so as to activate its transmission screen from a remote monitoring computer (117-a) is the real time image of what is being shown on the remote screen being transmitted back to the monitoring computer (118) is the remote CPU transfer computer (119) is remote PC control software (120) is the home base monitoring computer
Figure 30- (121) is intelligence information sent to be distributed by TRAP system (122) pictures or information cleared for distribution and ready to be processed (123) receives pictures or information and prepares it by priority for Nationwide dissemination (124) builds a website and uploads terrorist/amber information (125) the ISP uploads info to WWW* (126) is data being transferred to airport concourse area (127) is the local wireless transmission ofthe website to the terrorist display LCD (128) is the remote CPU logged onto terrorist website (129) shows all the units in the area displaying same information and using the Internet as an automatic rapid information dissemination tool (130) shows a person receiving vital terrorist information
Figure 31-(131) shows an advertising sponsor using the dissemination system for promotion (132) shows a person seeing the sponsor ad's and the terrorist information Figure 32- shows the terrorist images being wirelessly disseminated to restaurant tables to portable table top LCD screens (133) and (134)
Figure 33- Shows the use ofthe nations cable network stations (135) to further the wanted terrorist information (136) to cable stations for distribution to the general public (137) to their regional signal area.
Figure 34-Shows the Internet transmission (106) being converted to audio and video
Output signals then relayed from the head end (139) ofthe cable company onto the rest ofthe Cable network.
Figure 35- Shows how different districts (140) and (141) can be supplied with selective information pertinent to the area.
Figure 36- Shows the built-in camera (142) that transmits the real-time images (143) in front ofthe image display units (112) that detects suspicious reactions to the wanted images being shown such as looking away from the images, walking away from the area, efforts to not be noticed by others in the crowd. The suspicious reactions are monitored by local security(144) officials as well as by other federal watchdog facilities (145). Figure 37- Shows the components and wiring circuits for the portable LEIDS unit. (146) is a 12 volt high amp hour sealed lead acid battery. This battery operates (151) the e-911 wand recharging circuit that connects to the e-911 wand Fig 9 (42) and (43) and (152) the Blue Line phone Fig. 22 (79) recharging circuit. (153) is the wireless receiver that receives transmissions from the wireless Internet transmission circuit (106). The 12 volt supply from (146) operates the LED screen (149) and the LCD screen (150). (154) is the A/C line in connection to provide recharging power to the LEIDS unit. (155) is the circuit that supplies the emergency cellular power unit (147). Ref. Utility Patent Application 10/134,541 4/30/2002 (156) is the internal battery charger that recharges the SLA power supply (146). (157) is the 110 volt inverter that takes 12 volts and changes it into 110-volts during power outages at supply (154). (160) is the relay switch to convert over from outside power to 110 volt converted power at (157) converter when outage is detected at (154).
Description
This invention offers a simple solution to several problems confronting the nation at this time. How can the various intelligence agencies remain co-coordinated in the dissemination of vital information in the fight against terrorism and get it to where it needs to be? How can the system be updated nationwide quickly? How can the systems be quickly installed? How can the nations e-911 emergency reporting system be enhanced and spread nationwide with the pay phone for emergency calling becoming more and more obsolete? How can the overloaded (due to terrorist reports ) 911 calling stations be lightened by providing a specific line for reporting terrorists activities. How can such a system be sponsored by the private sector? How can the general public become the additional eyes and ears of law enforcement for the purposes of spotting wanted terrorists or Amber alert suspects? How can the Homeland Security Alert statuses be quickly upgraded across the nation as well as provide further education to government employees and the general public on what the status changes mean and what actions are necessary to take? How can law enforcement agencies be given a new tool for monitoring large groups of people and isolate human emotions and reactions that are telltale and stand out for security and law enforcement officers to follow up on? How can portable emergency cellular power be made available to the general public for readiness and emergency communication support services? These important issues and many other factors make this vital new system of law enforcement a necessity and enhancement to our nations Homeland Security efforts that will greatly assist in the war on terrorism.
Objects and advantages:
. How can the various intelligence agencies remain co-coordinated in the dissemination of vital information in the fight against terrorism and get it to where it needs to be? The present invention makes it possible for participating law enforcement agencies to subscribe to a public, wanted terrorist information network, that enables law enforcement agencies a way to immediately disseminate audio and visual wanted terrorist or other wanted suspects information, or other information needed for homeland security including cooperation or emergency procedures. This information can now be disseminated to the nations most vital and at risk locations in the nation. LE Airport gates, customs check points ,border patrol centers, seaports, stadiums , hotels, resorts, courthouses, national landmarks and governmental offices. The system utilizes the internet in a unique way. Using it as a public electronic wanted and emergency terrorist and homeland security alert status medium. Via a common website assembly center, each participating law enforcement agency is able to submit for publication their wanted terrorist or other vital security information. At the website assembly center Fig. 35 (104) a website is assembled with vital information plain to see and read or encoded as needed to send discreet messages to law enforcement agencies or security personnel at our nations most vulnerable sites. The start ofthe dissemination process starts at the law enforcement level (101-102) the information is screened for clearance to the Amber alert/terrorist alert distribution center (103)- The information is then sent to the website assembly center (104) where it is built into a website program with priority, color codes, audio signals and alarms, voice-overs, graphics enhancements and urgency levels as needed in order to get the proper response, result and action at the receipt points, (high risk gates, etc.,) From there the information is transferred to the Internet via an Internet service provider (105). The Internet via hardwire and satellite systems reaches a location where the transmission can be distributed as needed . Fig. 32 At the location the Internet signal is either directly connected by high speed cable or is distributed via a wireless internet transmitter and receiver (106). The information is now transmitted to an on board CPU which is programmed to log onto the special Internet website. This enables literally thousands of strategically located LEIDS- law enforcement information display system units, all logged onto the special website, to be instantly updated across the whole nation. This answers the first problem of: . How can the various intelligence agencies remain co- coordinated in the dissemination of vital information in the fight against terrorism and get it to where it needs to be?
The next problem the invention answers is how can the information be updated all across the nation immediately? Fig 35 (104) is the point where the information sources all across the country. It is at this point as well, specific regions, given different website log on addresses are sent "region-specific" information to be disseminated by law enforcement as needed. This system of regional distribution is shown in Fig. 35 (109) and (140). The next problem this invention solves is ? How can the systems be quickly installed an how can they be strategically located so as to be seen both by potential terrorists in order to stimulate a suspicious reaction as well as by security personnel and the general public. Fig. 22 shows the completely portable LEIDS unit, that is fully equipped with a long duration rechargeable power supply (80) capable of powering the unit in a power outage situation or when needed in a completely portable situation, such as an overcrowded gate during flight delays or when needed in screening large groups during times of heightened alert status. Fig 37 shows the portable circuitry that allows the unit to operate under it's own portable power. The next problem this invention solves is how can the nations e-911 emergency reporting system be enhanced and spread nationwide with the pay phone for emergency calling becoming more and more obsolete? Today the nation is faced with a growing problem. Pay phones are disappearing. A quick survey of populated places today shows that it is" increasingly hard to find a pay phone in order to make an emergency phone call. The present invention makes e-911 public phones a very attractive and viable alternative to the disappearing pay phones. Fig-20 illustrates the solution to major problems facing society today. The disappearance of pay phones across the nation, (due to the cellular phone boon), greatly minimizes the points of emergency calling across the nation. The additional problem that faces the general public is the ever increasing complexity and the diversity ofthe cellular phones on the market. Because ofthe complexity of cellular phone operation, I.E. phone button locks, button send sequences, button identification, and additional features such as phone directories, games, visual aids , etc. Fig. (64)-(65)- (66)- and (67). For instance, in an emergency, if someone has to make a e-911 call then the time to call can be greatly delayed or completely thwarted if the cell phone is unfamiliar to the user, if the battery is dead, the phone is locked, by code, is "locked" by unfamiliarity or if it is unavailable altogether making it very difficult to make emergency calling a widespread problem. The answer to this problem is solved with the present invention in that the special new e-911 and terrorist hotline "calling wand" shcvn in Figr.. 1-21 shows how the problem can be solved nationwide. Fig. 20- shows how the simplicity of pushing one clearly marked button, can save time in summonsing help and can save property and lives by getting the message out without the confusion of what button to push. The calling wand also solves another growing problem in society. That problem is the fact that more and more terrorist reporting calls are being made to 911 calling facilities which are overburdening the 911 operators with calls that are not immediately life threatening but are still vital information calls. The solution to this problem is to provide a second "one touch" call button that calls a separate terrorist hotline which dramatically reduces the amount of 911 calls that should be more properly routed to a terrorist law enforcement r related agency instead. One ofthe major reasons pay phones are disappearing is the fact that they are no longer profitable to operate. The suggested embodiment in Fig.14 shows how collective sponsors can pay for the distribution and operation ofthe units, allowing millions of former pay phone sites to be replaced with emergency calling sites that are not reliant on coin or credit card calls to be made to cover the cost of supplying a 911 call stations throughout the country. It should also be noted that the simplicity ofthe "one button" call feature allows children to be easily trained in it's use. Also physically impaired persons can more easily make a call as well by just having to press the button once. The unit can even be equipped with a voice activated feature, wherein a set sequence of numbers such as 9-1-1 can be spoken into the mouth piece so as to activate the call. Additionally, the calling wand is equipped with a long duration battery supply that allows hours of e-911 calling to be made in order to stay in communication in disastrous situations such as that experienced during the vents of 911. Fig.9- (40) and (^ 1). As is jhown in the Fig. 12- an auto dial to the sponsors feature makes the calling wand an even more attractive feature to sponsors. However, it may be important in the future program the sponsor buttons with local emergency numbers such as Fire, Ambulance, Hospital, Police, EMT or others as an alternative to summons help if the 911 call line is over burdened as has happened in the past when a major incident has occurred. The sturdy structure ofthe wand Fig. 2-9 allows the storage of emergency chemical lighting glow sticks, for sending additional location help along with the all important e- 911 tracking signals that sends out a GPS location enabling the emergency to be located by authorities without the need to actually give 'an address. Of course the address ofthe wand station is clearly marked on the station and a location number given each wand station that can be cross related to the location by authorities for automatic mapping computers to quickly print out directions to the emergency. The next problem the invention solves is how can the general public become the additional eyes and ears of law enforcement for the purposes of spotting wanted terrorists or Amber alert suspects? Fig. 24- (90) shows how the most wanted terrorists and other vital homeland security information including Amber Alerts is prominently displayed in highly populated locations throughout the country. Last year alone more than 440,000,000 people traveled through our nations top 50 airports. These units are placed on the main traffic channels of public locations and more specifically where people wait in line or wait at airport gates where the images and messages can be studied and absorbed by millions of people. It is quite commonly known that crimes are solved and criminals are caught when the information on who to look for is made available widely to the general public. The system of dissemination of information and the quick up load capability ofthe information makes this invention an extremely effective new tool in the fight on terror and crime in general, such as kidnappings, in the case of Amber Alert dissemination or even missing children alerts. How can the Homeland Security Alert statuses be quickly upgraded across the nation, as well as provide further education to government employees and the general public, on what the status changes mean and what actions are necessary to take? Fig. 21 -(76) and Fig. 2- (82) shows a homeland security status color change and alert rating being shown on the LEIDS units. The information is programmed into the unit wirelessly along with all the other information via the wireless information system outlined in Fig-34. How can law enforcement agencies be given a new tool for monitoring large groups of people and isolate human emotions and reactions that are telltale and stand out for security and law enforcement officers to follow up on? Fig. 24- (86-a) shows a track of a terrorist entering an airport and walking into a "people trap" (90). This people trap is how suspicious human emotion and reaction is stimulated in the terrorist. The crowd is informed continuously of wanted terrorists. A terrorist walks into the 'people trap".
Real-time changes in terrorist images (88) and (89) leaves the terrorist wondering if his image will come up or whether his image has already come up and is fresh in the minds of the crowd. He becomes uncomfortable and leaves the line, acts suspicious, or creates diversion from the pictures. The suspicious reaction is monitored by security (85) and law enforcement personnel (86-b) are summoned to move in on the suspect. It has been proven many times that if you can get the information to the general public, you can greatly increase the chances of spotting suspicious reaction. The people trap can be set up wherever law enforcement officials deem it necessary. Fig. 23 shows how the LEIDS units can be placed wherever there are large groups of people that need to be informed and possible teπorists or wrong doers "flushed out". This systems works beautifully when tested as serves as means of not only setting the suspects on edge by keeping the general public informed on what to do, who to look for as well as adding millions of eyes to the hunt for suspicious activity in our nations most vulnerable public places. Fig. 25 shows local as well as federal remote monitoring of suspicious reactions that are brought about by the "People Trap". Fig. 26. shows how the teπorist is further set on edge by the fact that multiple agencies can in real time submit information. This furthers the possibilities that their face may come up and be seen. Right there, while they are there! When real time input is possible the teπorist will not be able to rest easy. This of course, is the magic in the effectiveness ofthe stimulus response, law enforcement, capabilities utilized in the "People Trap" anti -terrorism tool. The next vital need that this invention solves is How can portable emergency cellular power be made available to the general public for readiness and emergency communication support services? ) Ref. Utility Patent Application 10/134,541 4/30/2002. Fig.38 shows the portable emergency cellular power supply that is outlined in the above referenced patent. This unique invention allows the general public to recharge their cellular phones while let us say at an airport. As is now common knowledge, cellular phones have been proven to be a very important tool for fighting the war on terror. Ref: USA TODAY 10-23-2001 By John Yaukey Gannett news service " The events of 911 demonstrated how helpful mobile phones can be in an emergency. There are numerous accounts of victims and survivors of he terrorist's attacks making critical calls to friends and family over cellular networks".
Ref. "Mustang Daily Online" November 1, 2001 by Jenni Mintz" Cell phones also provide safety in an emergency, allowing people to contact help when they are far from a pay phone or society".
This invention is enhanced by the use ofthe portable cellular charging station in it's preferred embodiment shown in Fig. 39. In this use, the e-911 calling wand is housed into the unit Fig. 3. (14) . This provides detachable e-911 calling capability by using the e-911 wand. The main unit, is capable of charging over 70 models ofthe most widely used cellular phones which enables the public to charge their cellular phones for readiness, while out and about, and in emergency situations wherein the area is left without recharging power or conventional phone lines.
Upon review of this invention by law enforcement agencies it has been found to be a very much needed and wanted system that answers many problems the world faces today. Comments such as "these should be in all the federal courthouses," at the "Super Bowl, "at all the national monuments, etc". Essentially wherever there are large groups of people in high risk locations across the nation.
DRAWINGS:
Figure 1-: Two-way information dissemination and gathering terminal housing.
Figure 2-: 2- Law enforcement information screen 3- Body detection sensor 4- Power supply housing 5- Back-up summons light 6- Camera terminals 7- Traffic light system 8- CPU housing 9- Remote control housing
Figure 3-: 10- Terrorist suspect viewing wanted terrorist information Figure 4-: 1 1- Terrorist suspect in body detection range 12- Terrorist suspect being signaled to come into camera range Figure 5-: 13- Terrorist in camera range of surveillance camera 14- Security officer watching actions of terrorist subject 15- Security officer with remote control capability to send suspicious reaction pictures to on and off site security 16- Camera view of terrorist suspect Figure 6-: 17-Security officer activating remote control to submit suspicious person to offsite law enforcement 18-Alert programmed camera 19- Terrorist suspect manifesting suspicious reactions 20- Teπorist suspect picture being wirelessly sent to back-up security Figure 7-: 21- Teπorist subject leaving checkpoint area 22- Motion picture images sent to command center 23- Motion picture images sent to offsite law enforcement agencies Figure 8-: 24-Back-up security summons light 25- Back-up security entering the area by seeing the summons light Figure 9-: 23-a Intranet transmission to on-site security command center 23-b Internet transmission to off-site law enforcement 25- Off -site law enforcement personnel 26- On site security command center
Figure 10-: 32- e-mail alerts sent to authorized personnel 33- email alert sent to alert data storage computer Figure 11-: 27- Alert-data storage computer Figure 12-: 28- Perimeter camera 29- Suspect surveillance tracking 30- Surveillance camera transmissions 31- Wireless web camera transmissions 32-a Web cam transmission 33- Web cam data storage transmission
Figure 12-a 32-a Home office authorized verification personnel 13-a Delivery person Figure 13-: 34-Wanted teπorist audio visual transmission displayed in public 35- law enforcement agencies supplying wanted teπorist information 36- teπorist alert distribution center* 37- web graphics preparation center 38- internet server upload
Figure 14: 39- Surveillance audio and visual information gathering 40- Audio visual camera web server 41- Onsite data storage 42- Local area data review 43- Wide area network transmission
Figure 15: 45- Wanted teπorist images submitted by law enforcement 44- Wanted images displayed via cable networks Figure 16: 46- Internet 46-a Satellite internet link 46-b Internet line 47- CPU 1 Figure 17: 13-b Teπorist suspect Figure 18: 48-n law enforcement image 49- data broadcast center CPU 50- Web software 51 -Web server 52- Satellite Transmitter 52-a Satellite Transmission 53-Satellite receiver 54-Modem 55- LAN Transmission 56- Web browser software
57- CPU 8- Display terminal
59-Public dissemination of teπorist suspect 0-Teπorist suspect
61- distance sensor 2-Traffic lights
63- Remote control
64- wireless relay
65- Camera
66-web camera software
67- Server CPU
68- LAN Transmission
69- local security monitor
70- Server and local data storage CPU 70-a Suspect transmission 71-Satelliet transmitter
72- Satellite transmission
73- satellite receiver
74- Web camera viewing software
75- Law enforcement viewer terminal
76- law enforcement viewer terminal
77- E mail software 78=- authorized email recipient 79- authorized e mail recipient 80-dexcoding software 81- decoded teπorist suspect image
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Embodiments ofthe present invention will now be described in detail while referring to the accompanying drawings.
This invention offers simple solution to several problems confronting the world at this time. As has been discovered from research into the events leading up to the events of
Sept 11th the needs to raise awareness ofthe public as well as law enforcement personnel at our nations gathering places for terrorist threats cannot be understated. As well, the need to quickly disseminate wanted teπorist information to the general public as well as to security personnel at high security risk locations is also vital to a nation's security.
The present invention makes it possible for participating law enforcement agencies to subscribe to a wanted criminal and teπorist information dissemination network that enables law enforcement agencies a means to immediately disseminate audio visual wanted teπorist or other wanted suspect information , or other information needed to ensure higher homeland security standards to hundreds of key locations across the nation. This information can now be disseminated to the nations most vital and at risk locations such as airports, customs checkpoints, border patrol centers, seaports, stadiums, hotels, resorts, courthouses, national landmarks) and government offices. The present programming software and human interaction to result to create a brand new and extremely effective tool in deterring criminals and terrorists by invoking a series of exact steps calculated to stimulate human suspicious response from criminals and terrorist trying to pass a nations most at risk security checkpoints.
Figure 13 illustrates the sequence of events that begins with the dissemination of information that originates from various law enforcement agencies (35) , get sent via an internet transmission, and intranet transmission or other means to (36) the information processing center (36) that transforms the information to a format based in
JEG, TIFF, GIF, HTML WAV file or other electronic format and also is enable with an auto refersh code of Java includuing but not limited to:
<* a href=" javascript: location. reload()" target=" _self >Refresh</a> ready to be disseminated to specific locations across the nation via an internet or intranet connection. At step (37) an internet server with a static IP address is uploaded with the information prepared at
(36) and broadcasts it to information dissemination units at (34) that are programmed to receive and display the audio visual web broadcast IP address of the server of step (37).
Figure 3 illustrates a terrorist suspect entering a security checkpoint area wherein the present invention is set up and disseminating information on wanted suspects provide from law enforcement agencies at (35) to the general public as they enter the security check points of airports, customs border patrol posts, stadiums etc. The suspect is shown at (10) seen reacting the sequences of present-time wanted images as they change across the screen as they are broadcast from (37) beginning the first of a series of steps that allow suspicious emotional response to be detected in an individual passing a security checkpoint.. Figure 4 (11) shows the distance sensor activating the traffic lights at (12) that operate so as to flash a green move forward light as the individual gets in close proximity to the information dissemination unit (1) typically within 3-5 feet and then changes to a red stop light that requires the person entering the security checkpoint to remain in front of an overt security camera for a period of 10-15 seconds while he has to confront directly the images of wanted persons that have been originated at (35) by law enforcement agencies Figure 4.
Figure 5 shows teπorist suspect (14) entering the security sequence with a security guard standing by with a wireless remote control (15) that enables him to send a snapshot instantly back to remote command centers Figure 9 (25) and (26) should he see any of several of various suspicious reactions to the images and checkpoint protocol being of the present invention employed to invoke reaction from suspicious criminals or teπorist. Figure 6 shows the security officer (17) taking a snapshot via remote control (15) ofthe teπorist suspect's face (19) which is converted to a digital image (20) and converted into a wireless digital transmission Figure 9 (23) and sent on the wireless wavelength media such as 802.1 lb or 802.1 lg wireless networks (23-b) and (23-a). Figure 7 shows the teπorists behavior change into a sudden departure (21) which is caught immediately on camera by the remote control activation ofthe system by the security guard (17) which immediately sends wireless transmissions ofthe terrorist suspects' departure subject (21) in full motion at a rate of approximately 30 frames per second as shown in transmission picture (22) and (23) . Figure 8 (24) shows the back-up security alert light that draws the attention of other security personnel to the scene to provide back-up to detain the suspect. Figure 9 (25) shows the snap shot created by the remote control action ofthe security officer (17) reaching a remote command center (25) via wireless transmission 23-b and a local command center (26) for documentation ofthe

Claims

Claims
I claim a method of isolating terrorists and criminals by providing a predetermined audio- visual stimulus into controlled public or private environments in order to elicit specific human responses, reactions and judgment changes in teπorists or other criminals (a) a means of utilizing said stimuli to create multiple stimuli points in said controlled environment by the dissemination of real-time intelligence being shown to the general public in a fashion that creates further observable judgment changes in the teπorists and criminals as the general public become observation points for suspicious persons and activities.
(b)providing a central intelligence audio and visual collection system accessible by at least one law enforcement agency for the purpose of disseminating wanted teπorist images and information. (c) providing a central processing center for the purpose of prioritizing and encoding the information so as to act as an effective visual and audio stimulant useful for evoking at least one of several predetermined human emotions and reactions (d) preparing the prioritized and encoded information in a form capable of being published on the internet for distribution to pre determined high terrorist risk locations
(e) preparing the prioritized and encoded information in a form capable of being published on cable networks for distribution to pre determined high teπorist risk locations
(f) publishing the encoded information on the internet
(g) publishing the encoded information on a cable network
(h) providing a means of disseminating the information to a plurality of potential public teπorist targets populated with people waiting in lines or seated in waiting areas, (i) providing a portable apparatus that displays said teπorist images and information in a predetermined manner that evokes human response and stimulates suspicious reactions in terrorists and other criminals, (j) providing a stationary apparatus that displays said teπorist images and information in a predetermined manner that evokes human response and stimulates suspicious reactions in terrorists and other criminals, (k) a system of monitoring and capturing the reactions on camera (1) a system of monitoring and analyzing said reactions by human surveillance (m)a method of transmitting electronically said suspicious reactions to remote locations for security evaluations
(n) a means of remotely checking the transmitted audio and visual information being disseminated at said public locations
(2) A system of providing widespread public emergency communication wherein, (a) by means of providing the general public a way of placing e-911 calls with a one touch button (b) a means of providing the general public a way of placing a teπorist hotline call with a on touch button
(c) a means of providing the general public a way of placing an emergency call to on site security (d) a means of providing the general public the ability to place the said emergency calls during a power outage
(e) a means of providing emergency cellular recharging power to the general public for the purpose of maintaining communication during emergency situations
(3) a system of law enforcement wherein the general public receives real time wanted terrorist information in highly populated areas that have been designated as high risk to teπorist attacks (a) providing a collective public awareness environment designed to invoke heightened awareness of wanted teπorists in waiting areas and entrance areas of high risk public locations that combines to act as a stimulus to evoke discernable predetermined human emotions and reaction from teπorists and other criminals (b) a means of providing the general public with real time wanted teπorist information in a manner that elicits continual interest and awareness by the general public of their immediate environment with the purpose of evoking Suspicious reactions from teπorists
( c ) a means of providing the general public with vital homeland security information in audio visual form
(d) a means of providing the general public with the cuπent homeland security terrorist alert status and safety procedures deemed necessary by law enforcement
Claim 4-A method of broadcasting emergency or other audio visual information over the internet comprising:
A web page published on the internet that is a host to many CPU's located in public places that are pointed to said web page's static IP address and are displaying the transmitted page continuously because they have been preset to the IP address ofthe host computer.
B-Publishing a web page with a static IP address that is programmed with a Java and
HTML code to auto refresh the page in the event of news to be broadcast or information to be updated dated in order for recipient CPU's browsing on the internet to be left in an on condition as to display new information without the need to be refreshed by a person on the receiving end ofthe transmission.
C-Wherein the said refreshed pages are capable of being updated from a central processing location and distributed across the world to salve display units that are equipped with browser settings dedicated to receive primarily the transmissions send out by the host server's broadcast set at a static IP address programmed with an auto refresh html code.
-b Wherein said refreshed page can also be programmed with various and unlimited types of audio visual information
PCT/US2003/037470 2003-11-20 2003-11-20 Anti terrorist and homeland security public safety warning system WO2005079178A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US42771703P 2003-11-20 2003-11-20
US60/427,717 2003-11-20

Publications (2)

Publication Number Publication Date
WO2005079178A2 true WO2005079178A2 (en) 2005-09-01
WO2005079178A3 WO2005079178A3 (en) 2007-08-09

Family

ID=34885873

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/037470 WO2005079178A2 (en) 2003-11-20 2003-11-20 Anti terrorist and homeland security public safety warning system

Country Status (1)

Country Link
WO (1) WO2005079178A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9704366B2 (en) 2013-07-16 2017-07-11 Honeywell International Inc. Method to detect an alarm situation and to send silent alerts to external systems using voice input to mobile devices
US11494579B2 (en) * 2016-01-29 2022-11-08 Nec Corporation Information processing apparatus, information processing method, and program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4951308A (en) * 1988-12-29 1990-08-21 Cellular Communications Corporation Automated vending of cellular hand-held telephones and cellular telephone services
US5793851A (en) * 1993-05-17 1998-08-11 Albertson; David V. Pay telephone communication system
US5850599A (en) * 1992-09-25 1998-12-15 Ecs Enhanced Cellular Systems Manufacturing Inc. Portable cellular telephone with credit card debit system
US6044257A (en) * 1998-03-19 2000-03-28 American Secure Care, Llc Panic button phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4951308A (en) * 1988-12-29 1990-08-21 Cellular Communications Corporation Automated vending of cellular hand-held telephones and cellular telephone services
US5850599A (en) * 1992-09-25 1998-12-15 Ecs Enhanced Cellular Systems Manufacturing Inc. Portable cellular telephone with credit card debit system
US5793851A (en) * 1993-05-17 1998-08-11 Albertson; David V. Pay telephone communication system
US6044257A (en) * 1998-03-19 2000-03-28 American Secure Care, Llc Panic button phone

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9704366B2 (en) 2013-07-16 2017-07-11 Honeywell International Inc. Method to detect an alarm situation and to send silent alerts to external systems using voice input to mobile devices
US11494579B2 (en) * 2016-01-29 2022-11-08 Nec Corporation Information processing apparatus, information processing method, and program

Also Published As

Publication number Publication date
WO2005079178A3 (en) 2007-08-09

Similar Documents

Publication Publication Date Title
US7245223B2 (en) Anti terrorist and homeland security public safety warning system
US11308790B2 (en) Apparatus and methods for distributing and displaying emergency communications
US10178537B2 (en) Emergency messaging system and method of responding to an emergency
US8630820B2 (en) Methods and systems for threat assessment, safety management, and monitoring of individuals and groups
US9414212B2 (en) Community emergency request communication system
US9411997B1 (en) Systems and methods for tracking subjects
US10313144B2 (en) System and method for incident reporting and notification
US20140118140A1 (en) Methods and systems for requesting the aid of security volunteers using a security network
US20210400459A1 (en) Emergency management system
US9860723B2 (en) Method of notification of fire evacuation plan in floating crowd premises
US7280042B2 (en) Standoff security and real-time vendor verification system and apparatus
US20120087482A1 (en) Method Of Providing An Emergency Call Center
US20140368643A1 (en) Systems and methods for monitoring and tracking emergency events within a defined area
US20110227730A1 (en) System and apparatus for locating and surveillance of persons and/or surroundings
US20190088097A1 (en) Mental health, safety, and wellness support system
US11501629B2 (en) System and method for responding to an active shooter
KR100993887B1 (en) Realtime interactive safety control system using cctv camera
US11145182B2 (en) System and method for responding to an active shooter
Ghazal et al. Smart mobile-based emergency management and notification system
US20100033572A1 (en) Ticket-holder security checkpoint system for deterring terrorist attacks
WO2005079178A2 (en) Anti terrorist and homeland security public safety warning system
Mohammed et al. KMSAFE APP: Campus Safety Mobile App
KR101383583B1 (en) Remote supervisory method for scene of accident, management method for remote supervisory system and remote supervisory realization method for application operated on mobile terminal
KR102571217B1 (en) Incident analysis system using metaverse in which incident site status information is recorded
US20230300236A1 (en) Detection of emergency events through Computer Vision and edge devices

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase