AU2013250933A1 - Crime investigation system - Google Patents

Crime investigation system Download PDF

Info

Publication number
AU2013250933A1
AU2013250933A1 AU2013250933A AU2013250933A AU2013250933A1 AU 2013250933 A1 AU2013250933 A1 AU 2013250933A1 AU 2013250933 A AU2013250933 A AU 2013250933A AU 2013250933 A AU2013250933 A AU 2013250933A AU 2013250933 A1 AU2013250933 A1 AU 2013250933A1
Authority
AU
Australia
Prior art keywords
crime
crime investigation
tool
application
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2013250933A
Inventor
Daniel Jimenez
David Mcintosh
Patrick Meaney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3rd Forensic Ltd
Original Assignee
3rd Forensic Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 3rd Forensic Ltd filed Critical 3rd Forensic Ltd
Publication of AU2013250933A1 publication Critical patent/AU2013250933A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A crime investigation system that includes a crime investigation tool for receiving and storing image information, attaching related case information, such as the crime number or the location or type of the crime, to the image information, matching the image information against previously stored image information, and generating and communicating reports including match results; and an interface in communication with the crime investigation tool, where the interface allows a user to enter the related case information, update the related case information, and produce wanted posters and intelligence briefing packs.

Description

WO 2013/156801 PCT/GB2013/051018 1 CRIME INVESTIGATION SYSTEM TECHNICAL FIELD AND BACKGROUND OF THE INVENTION FIELD OF THE INVENTION The present invention relates generally to the field of crime investigation, in some 5 cases to crime investigation using Image evidence, and in specific examples, to a point of investigation tool and interface, wherein the tool and interface are operable for entering, accessing and updating case, crime scene and Image information in real time and from the field. BACKGROUND OF THE INVENTION 10 Currently there are very limited resources available to law enforcement agencies in terms of computerized systems. The Applicant considers that such limited resources constitute a significant barrier to effective analysis of criminal intelligence information. Many police forces can now measure the number of fingerprint marks and DNA samples gathered, how many have been identified 15 and how many resulted in an offender been brought to justice. The same is not true for CCTV and other images. Police forces often do not know how many images they are in possession of, not to mention the physical or logical location of such images, typically they will be stored in filing cabinets, desks drawers and other silos, thus being used inefficiently. 20 SUMMARY OF THE INVENTION An object of the present invention is to provide a crime investigation tool for tracking case status and Image evidence to solve and link crimes. Another object of the present invention is to provide a point of investigation tool for entering and accessing evidence from which an Image profile can be 25 obtained.
WO 2013/156801 PCT/GB2013/051018 2 A further object of the invention is to provide an interface for accessing an investigation tool from the field and in real time for the purpose of uploading case information, tracking case status, searching stored image profiles and receiving updates and reports. 5 A still further object of the invention is to provide a crime investigation tool utilizing Image evidence to solve crime and generate reports. A still further object of the invention is to provide an investigation tool for storing and incorporating exclusion samples. A still further object of the invention is to provide an investigation tool for tracking 10 evidence chain of custody. A still further object of the invention is to provide an authorized-user investigation tool including an interface and database for organizing case and image related information. 15 To achieve the foregoing and other objects and advantages, and in accordance with the purposes of the invention as embodied and broadly described herein, the present invention provides various embodiments of point of investigation tools and methods utilizing image evidence. In embodiments, the present invention may provide a crime investigation tool for 20 entering, accessing and searching Image information and related information to aid in investigations and solve crime. Further, there may be provided a remote interface in communication with a crime investigation tool adapted to store case related and Image information, permit searching through stored records, link matching profiles and generate reports all in real time. Furthermore, there may be 25 provided a secured-access investigation tool in communication with intelligence labs and law enforcement officials, where the tool is capable of evidence chain of custody tracking, among other functions.
WO 2013/156801 PCT/GB2013/051018 3 In one embodiment, the present invention provides an investigation tool utilizing CCTV and camera images (still and video) evidence including a database for receiving case related information, organizing the information, storing the information, running queries, finding matches, and generating communications 5 and reports. The investigation tool is in communication with an on-site or remote interface operable for accessing the investigation tool, inputting information, performing searches and receiving reports, automatically or upon request from a user. The interface may be used in the field to enter case-related information, introduce image evidence for Image analysis, track case status, and receive 10 matching image reports, among other reports, in real time. In one embodiment, the point of investigation tool includes a database including a memory, processor, software, server and interface for receiving, storing, sorting and communicating information. The information includes crime details with at 15 least one of crime number, crime type, offender description and motivation. The investigation tool provides real time access and updating, and is capable of generating and outputting "match" and "no match results," among other results, either automatically or upon demand. 20 In another embodiment, the present invention provides an investigation method whereby a user of the method, such as a law enforcement officer, is provided with an interface for accessing and entering information into an investigation tool, originating a case, entering specific information related to the case and collection circumstances, tracking case history, viewing image profile matches, receiving 25 reports and case updates, and tracking evidence chain of custody, among other functions. In a specific embodiment, image profiles matched with identification information are disconnected from the personal information. DETAILED DESCRIPTION OF THE INVENTION The present invention will now be described more fully hereinafter with reference 30 to the accompanying drawings, in which: WO 2013/156801 PCT/GB2013/051018 4 Figure 1 illustrates a criminal intelligence system according to a first aspect of the present invention; and Figure 2 displays in more detail the areas within the system of Figure 1. 5 The following detailed description discusses several exemplary embodiments of the invention; however, the invention may be embodied in many different forms and should not be construed as limited to the representative embodiments set forth herein. The exemplary embodiments are provided so that this disclosure will be both thorough and complete, and will fully convey the scope of the invention. 10 INTRODUCTION The system of Figure 1 allows access to both users and administrators. It is envisaged that administrators may be given privileged access to certain portions of the system, such as an application setup portion as shown in Figure 1, whereas users may be restricted to access to only an information entry/retrieval 15 portion. Both user and administrator access is controlled through log-in interfaces. These may be the same or different, so as to optionally provide greater security for administrator-level access. As shown in Figure 2, the system may be considered to be divided into six areas: 20 1. Access, 2. Management, 3. New Data Acquisition, 4. Intelligence, 5. Search, 25 6. Report.
WO 2013/156801 PCT/GB2013/051018 5 ACCESS - USER LOGIN As shown in Figure 1, a user is required to log-in to gain access to the information entry/retrieval portion of the system. Figure 2 illustrates in more detail the access process whereby the system requests the user to provide: 5 User number, Password. 1. If the user number is correct but the password does not match, it allows a total of three attempts before locking the account. Once this takes place the client 10 application administrator is notified automatically. 2. If the user number entered does not exist, the application will allow the user to register and will request further information to complete the registration. Once more it will notify the client application administrator automatically of the request for access. 15 a. User Number, b. Password, c. Name, d. Surname, e. Mobile Number, 20 f. Land Line Number, g. Email, h. Rank/Job Title, i. Department, j. Area, 25 k. Unit, 3. If the correct user number and password is entered, the user will be provided with access based on her/his privilege level as granted by the application administrator at registration time.
WO 2013/156801 PCT/GB2013/051018 6 MANAGEMENT - SETUP As part of the administration process, there is an application setup component, as shown in Figure 1. This may assist an administrator in management of the system. 5 As shown in more detail in Figure 2, the management area within the system may allow the client application administrator to define components specific to the client's environments, which are later used by the application users in the day to day activities, such as: 1. New Staff area (In the case of a police force, this could be Police Officers, 10 Researchers, Identifiers, Data Providers, etc). Rank/ Job title, Department(s), Unit(s), Area(s), 15 Security Access Group(s)/Level(s). 2. Offence: Offence type(s), Stolen/Damaged property(s), Motivating factor(s), 20 Identification result(s). 3. Image Source: Image source(s) i.e. CCTV, Mob-Phone, Photographic or Head Camera, etc, Image classification(s). 4. Descriptive Attributes: 25 Brand(s), Colour(s), Descriptive category(s), Descriptive group(s), Descriptive item(s). 30 WO 2013/156801 PCT/GB2013/051018 7 In this setup component, the client application administrator is able to create the constraints and boundaries with which all application users must work. For example: The client may only consider images obtained from CCTV or Head Cameras 5 worn by police officers to be acceptable, so she/he will only allow these two types as Image Source. Another example could be the restriction of the Offence type to be that as defined by Criminal Law. Once the client application administrator has completed the application setup 10 process, the application itself will enforce the applied constraints and boundaries, as well as use these in its automated match facility, while taking into account all the data entered for each and every offence. This approach enables the application to be deployed and used by a wide range of organizations operating in completely different fields. 15 NEW DATA ACQUISITION As shown in Figure 2, this area of the application allows for application user(s) to define new records. Part of this process is automated to minimized data entry error (please refer to the Appendix for Automated Data Entry), while other aspects are not. Those components of data entry which are not automated are 20 tightly monitored and control by the application. As mention above this area constitutes the initial point of entry for new data. Here the users, based on their access rights can: Create a new record, Ensure all legal and operational requirements are met, 25 Define the parameters, by which this record can be searched, Define the access level required to gain access to this record, Approve a new record for further action. It is important to note that the record created in this initial stage can later be 30 modified if required, by a user who has the appropriate access rights.
WO 2013/156801 PCT/GB2013/051018 8 The application in turn will use the new and/or the existing records to generate intelligence briefs in an automatic process. These can be as simple as producing a Brief, Report, Poster, etc, on demand, or at a predetermined time interval or when a number or new records have been entered, etc. Or it can generate 5 intelligence on possible unknown associates between records, etc. It will also notify the application user if the newly entered record has triggered any matches with other existing records. These automated matches (please refer to the Appendix for Automated Matches) 10 are completed at different levels of information: Image definition, Unique attributes, Suspect definition, Offence type, 15 Offence location, Offence factor(s), Modus Operandi, Known associates when multiple suspects involved. Known 2nd and 3rd level associates when multiple suspects involved. 20 INTELLIGENCE At this point the application users will use the application and external source such as a witness, members of the public or the police force, etc to help in the identification of suspects. As shown in Figure 2, this is achieved by making use of the different publication features in the application. In the case where the 25 application is deployed in a police force, these could be: Caught On Camera, Identification Poster, METSBATS (Internal publication(s)), Police Intranet, 30 Police Gazette, Circulation to Public Media (Such as TV, Newspapers, etc).
WO 2013/156801 PCT/GB2013/051018 9 If information was acquired and a possible identification is generated from the publications mention above, this would automatically trigger the application to generate further action and notify the relevant application users. SEARCH 5 The system, as mentioned above in New Data Acquisition and shown in Figure 2, is capable of completing automated searches in real time (as data is acquired) as well as the providing mechanism to complete a manual search on any data combination. Therefore minimizing if not eliminating human error at this level (refer to the Appendix for more details regarding Search). 10 REPORT The application provides both static and dynamic reporting facilities. Thus, as shown in Figure 2, an application user can make use of pre-define report templates or she/he can create bespoke reports based on intelligence needs. These, like all aspects of the application, are control by a strict security access 15 control system. APPENDIX The following section sets out details of embodiments of the present invention in still further technical detail. AUTOMATED DATA ENTRY 20 As part of the application setup process, the client application administrator defines a number of items which will be used by the both the application user and the application itself during normal every day operations. These items will later constitute part but not all of the automated data entry. For example: 25 If we were to look into the application user registration process, we would note that the application administrator during the application setup process defined, - Rank/Job Title. - Department - Area WO 2013/156801 PCT/GB2013/051018 10 - Unit Therefore if this organization was a Casino, the application administrator may have created to following options for each of the points mention above: - Security Officer, Table Manager, Croupier, Floor Manager, 5 - Security, Finance, Services - VIP Zone, Bank, Roulette, Main Restaurant, - Red unit, Blue unit, Black unit, These, would be the only options available to the client application users when she/he registered as an application user. 10 Later when the registered application user is completing her/his normal task, the application will automatically add data to the new record, such as the application user details, minimizing human data entry error(s). Further more, the automated process also checks to verify the validity of the new record. An application user in London say a croupier could not truly claim to have 15 been witness to suspicious behavior by an individual on a table in the casino in Manchester when she/he was working in London! As a summary, the automated data entry aspect of this application will populate areas of the new record being created, with known data, such as but not limited to the details of the application user creating the record. The areas of the new 20 record which can not be automatically populated, will be presented to the application user, when possible, with a list of pre-define options thus minimizing human data entry error. AUTOMATED MATCHES As previously mentioned in the New Data Acquisition section of this document, 25 the application will notify the application user when a match is found by the system. The application administrator can setup the system to conduct automated searches of all existing records on a time interval(s) and/or when a new record(s) is added and/or requested by an application user i.e. on demand.
WO 2013/156801 PCT/GB2013/051018 11 The application administrator will also define the criteria by which a record is considered to be a match, i.e. 100% match on all search criteria, or a scaling system. 5 For example: When a new record is added to the system the application will search all existing record to find a match based on the boundaries and search criteria defined by the application administrator in the application setup process. The following is a sample list of the possible parameters which may/could be 10 used: - Image definition(s), - Description Category(s), - Description Group(s), - Description Item(s), 15 - Unique attribute(s), - Unique descriptions not covered in any other Image definition area. - Suspect detail(s), - Offence type(s), - Offence location(s), 20 - Offence factor(s), - Modus Operandi, - Known associates when multiple suspects involved. - Known 2nd and 3rd level associates when multiple suspects involved. If the system was to find any records which match the above defined sample 25 criteria, to that of the newly entered record, it will bring the matching record to the attention of the application user. SEARCH The automated matches section above has described by use of an example how the application can complete a search on all existing records to find matches to a 30 newly created record(s).
WO 2013/156801 PCT/GB2013/051018 12 The Manual Search functionality provided to the application users of this system can be viewed as a subset of this process when only some parameters of the automated match search criteria is used to complete the search. For example: 5 Let us say that the application administrator had only defined the following search criteria parameters during the application setup process for the Manual Search facility within the application: - Image definition(s), - Description Category(s), 10 - Description Group(s), - Description Item(s), - Offence type(s), - Offence location(s), - Offence factor(s), 15 and that the application user choose to only provide the following data for a manual search of existing records: - Offence type(s), - Offence location(s) - Offence factor(s) 20 The system will return a collection of records where all three, the offence type(s), offence location(s) and offence factor(s) would match, while disregarding the image definition(s) data. A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from 25 the spirit and scope of the invention. Accordingly, other embodiments are within the scope of the following claims.

Claims (8)

1. A crime investigation system, comprising: a crime investigation tool operable for receiving and storing Image information, attaching related case information to the Image information, matching the Image information against previously stored Image information, and generating and communicating reports including match results, and an interface in communication with the crime investigation tool, the interface operable for at least one of entering the related case information, updating the related case information, and producing wanted posters and intelligence briefing packs.
2. The crime investigation system according to claim 1, wherein the interface is remote from the crime investigation tool and updates the related case information in real time.
3. The crime investigation system according to claim 1, wherein the crime investigation tool is further operable for generating types of crime and criminals for specific geographic locations.
4. The crime investigation system according to claim 1, wherein the crime investigation tool further tracks the offence type and the outcome of the investigations.
5. The crime investigation system according to claim 1, wherein the related case information includes at least one of crime number, crime type, location and suspect image description.
6. The crime investigation system according to claim 1, wherein the crime investigation tool qualifies CCTV images or images from other sources like cameras or mobile phones by, but not limited to, gender, race, age, physical appearance, distinguishing features (scars, tattoos, disabilities), clothing, glasses and footwear.
7. The crime investigation system according to claim 1, wherein the crime investigation tool qualifies offence type in terms of, but not limited to, theft & car WO 2013/156801 PCT/GB2013/051018 14 theft, robbery, burglary, public order, criminal damage, assault, grievous bodily harm, sexual assault, rape, murder and terrorism.
8. The crime investigation system according to claim 1, wherein the investigation tool includes a database, a memory, a processor, operating software and a server.
AU2013250933A 2012-04-20 2013-04-22 Crime investigation system Abandoned AU2013250933A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB1206974.6 2012-04-20
GB201206974A GB201206974D0 (en) 2012-04-20 2012-04-20 Crime investigation system
PCT/GB2013/051018 WO2013156801A1 (en) 2012-04-20 2013-04-22 Crime investigation system

Publications (1)

Publication Number Publication Date
AU2013250933A1 true AU2013250933A1 (en) 2014-12-04

Family

ID=46261625

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2013250933A Abandoned AU2013250933A1 (en) 2012-04-20 2013-04-22 Crime investigation system

Country Status (3)

Country Link
AU (1) AU2013250933A1 (en)
GB (2) GB201206974D0 (en)
WO (1) WO2013156801A1 (en)

Also Published As

Publication number Publication date
GB2516200A (en) 2015-01-14
GB201420281D0 (en) 2014-12-31
WO2013156801A1 (en) 2013-10-24
GB201206974D0 (en) 2012-06-06

Similar Documents

Publication Publication Date Title
US9355107B2 (en) Crime investigation system
Chen et al. COPLINK: managing law enforcement data and knowledge
US7792776B2 (en) System and method to aid in the identification of individuals and groups with a probability of being distressed or disturbed
US7805391B2 (en) Inference of anomalous behavior of members of cohorts and associate actors related to the anomalous behavior
Strandburg Home, home on the web and other fourth amendment implications of technosocial change
US7970759B2 (en) System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis
US7702605B2 (en) System and method for deriving a hierarchical event based database optimized for privacy and security filtering
Hribar et al. OSINT: a “grey zone”?
US7752154B2 (en) System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information
US8041743B2 (en) Systems and methods for providing semantically enhanced identity management
Loftus et al. Covert surveillance and the invisibilities of policing
Rengel Privacy in the 21st Century
Clarno et al. Policing in Johannesburg after apartheid
AU2016262874A1 (en) Systems, methods, and devices for information sharing and matching
Wang et al. Collaboration between law enforcement agencies in combating cybercrime: implications of a taiwanese case study about ATM hacking
Lord Undercover under threat: Cover identity, clandestine activity, and covert action in the digital age
Gray Bertillonage in an Age of Surveillance: Fourth Amendment Regulation of Facial Recognition Technologies
Strong Surveillance of Black lives as injury-in-fact
Tanui et al. Use of ICT in the Detection and Prevention of Crime in Kenya
Lynch et al. Facial Recognition Technology in New Zealand: towards a legal and ethical framework
Munn Seeing With Software: Palantir and the regulation of life
Brown 4 China's second-generation national identity card: Merging culture, industry and technology
Whisenant Using biometrics for sport venue management in a post 9‐11 era
AU2013250933A1 (en) Crime investigation system
Albu et al. Three sides of the same coin: Datafied transparency, biometric surveillance, and algorithmic governmentalities

Legal Events

Date Code Title Description
MK4 Application lapsed section 142(2)(d) - no continuation fee paid for the application