WO2008082744A2 - Subscription-based private civil security facilitation method - Google Patents

Subscription-based private civil security facilitation method Download PDF

Info

Publication number
WO2008082744A2
WO2008082744A2 PCT/US2007/081676 US2007081676W WO2008082744A2 WO 2008082744 A2 WO2008082744 A2 WO 2008082744A2 US 2007081676 W US2007081676 W US 2007081676W WO 2008082744 A2 WO2008082744 A2 WO 2008082744A2
Authority
WO
WIPO (PCT)
Prior art keywords
civil security
access
subscription
private civil
services
Prior art date
Application number
PCT/US2007/081676
Other languages
French (fr)
Other versions
WO2008082744A3 (en
Inventor
Barrett H. Moore
Original Assignee
Moore Barrett H
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Moore Barrett H filed Critical Moore Barrett H
Publication of WO2008082744A2 publication Critical patent/WO2008082744A2/en
Publication of WO2008082744A3 publication Critical patent/WO2008082744A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Definitions

  • PRIVATELY PROVISIONED SURVIVAL SUPPLIES DELIVERY METHOD as filed on August 15, 2006 and having application number 11/464,751;
  • PRIVATELY PROVISIONED SURVIVAL SUPPLIES SUB UNIT-BASED DELIVERY METHOD as filed on August 15, 2006 and having application number
  • This invention relates generally to providing survival-related services.
  • transportation infrastructure such as roads, bridges, railways, and so forth that facilitate the inexpensive and rapid movement of sometimes perishable goods from source to consumer;
  • communications infrastructure such as telephones, television, radio, and the Internet that facilitate the inexpensive and rapid sharing of news, advice, information, and entertainment;
  • Such persons are also largely without many options when faced with civilly- catastrophic conditions that create a concurrent need for shelter, evacuation, and/or rescue.
  • the only available shelter comprises a public facility such as a school, auditorium, or sports venue on the one hand or ad hoc accommodations obtained at a hotel or via a charity or one's own social network.
  • a public facility such as a school, auditorium, or sports venue on the one hand or ad hoc accommodations obtained at a hotel or via a charity or one's own social network.
  • such options may be adequate.
  • such options quickly prove inadequate or even dangerous in and of themselves.
  • FIG. 1 comprises a flow diagram as configured in accordance with various embodiments of the invention
  • FIG. 2 comprises a schematic block diagram view as configured in accordance with various embodiments of the invention.
  • FIG. 3 comprises a flow diagram as configured in accordance with various embodiments of the invention.
  • FIG. 4 comprises a flow diagram as configured in accordance with various embodiments of the invention.
  • FIG. 5 comprises a schematic block diagram as configured in accordance with various embodiments of the invention.
  • FIG. 6 comprises a schematic block diagram as configured in accordance with various embodiments of the invention
  • FIG. 7 comprises a schematic block diagram as configured in accordance with various embodiments of the invention
  • FIG. 8 comprises a schematic block diagram as configured in accordance with various embodiments of the invention.
  • FIG. 9 comprises a schematic block diagram as configured in accordance with various embodiments of the invention.
  • FIG. 10 comprises a flow diagram as configured in accordance with various embodiments of the invention.
  • FIG. 11 comprises a top plan block diagram view as configured in accordance with various embodiments of the invention.
  • FIG. 12 comprises a flow diagram as configured in accordance with various embodiments of the invention.
  • a plurality of private civil security resources are provided.
  • These private civil security resources comprise, at least in part, civil security provisions, civil security facilities, and civil security services.
  • consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining or civil security resource. That resource is then maintained pending a need to permit subscription-based access to the resource in the event of a catastrophic event.
  • Authorized beneficiaries are then provided with consideration-based access to this plurality of private civil security resources.
  • the private civil security provisions can comprise various life-sustaining resources as pertain to various categories of life's necessities, including, for example, breathable air, water, food, and protective clothing.
  • the nature of the subscribed-to resource can vary with the needs or requirements of a given application setting but may comprise one or more of a consumable necessity of human life, a non-consumable necessity of human life, shelter, transportation to effect the above-mentioned access, and/or rescue, to note but a few useful examples.
  • Deployable shelters can also be included if desired.
  • non- civil security resources such as, but not limited to, luxury items
  • the civil security facilities can comprise various facilities as have application with respect to protecting such authorized beneficiaries from the effects (including the aftermath, if any) of a civilly-catastrophic event and other dangerous or unpleasant environmental or external influences and forces.
  • the facilities can include, for example, such things as civil security shelters (including both short term and longer term facilities), transportation rally points, trans-shipment facilities and/or distribution facilities for civil security provisions, medical services facilities, training facilities, and so forth.
  • the civil security services can similarly comprise any of a wide variety of services as have application with respect to protecting such authorized beneficiaries.
  • Exemplary services include, but are not limited to, civil security information services (including information that is both generally and specifically appropriate for individual ones of the authorized beneficiaries), transportations services, rescue services, and so forth.
  • a corresponding process 100 provides a plurality of private civil security resources.
  • "private” will be understood to refer to the opposite of public ownership or control (as exemplified by governmental or ecclesiastical ownership or control) but can include such things as ownership or control via publicly traded ownership (via, for example, publicly traded stock or the like), ownership or control via a not-for-profit entity, or the like.
  • the plurality of private civil security resources can vary to some degree with respect to category and kind of resource.
  • such resources will comprise, at least in part, civil security provisions, civil security facilities, and civil security services.
  • civil security provisions and civil security facilities are physical components rather than virtual components or products of the intellect.
  • the civil security provisions will typically comprise physical support and/or protection of one kind of another.
  • the civil security facilities will also typically comprise physical assets such as, but not limited to, physical shelters that provide real, substantive physical protection from physical threats to human life. Additional details in this regard are provided below.
  • the civil security services can comprise either physical real world services or virtual-content services.
  • These civil security provisions can comprise, for example, a plurality of life- sustaining resources as pertain to a plurality of differing categories of life's necessities.
  • examples in this regard include, but are not limited to, such elemental staples as water 201 (which can comprise water in a pure or impure state and/or other water-based palatable fluids), food 202 (which can comprise a wide variety of raw to highly processed food, nutritional supplements, and so forth, and protective clothing 203 (where "protective” will be understood to refer to protection against one or more potentially hazardous environmental influences such as temperature extremes, precipitation, high velocity winds, and the like but not to matters of fashion, social comment, or the like).
  • These civil security provisions 200 can further optionally include such components as breathable air 204 (which may comprise, for example, a fresh air supply, an oxygen supply (including but not limited to oxygen generators such as, but not limited to, chemical oxygen generators that often produce oxygen as part of a corresponding exothermic reaction) that can serve as a source of oxygen to mix with other atmospheric components, and/or personal or area air filters that serve to remove harmful airborne contaminants from the air prior to being inhaled by an authorized beneficiary), deployable shelters 205 (where "deployable” will be understood as referring to portable shelters such as tents, canopies, inflatable structures, and the like), and other items 206 as may be appropriate to meet the needs of a given application setting.
  • breathable air 204 which may comprise, for example, a fresh air supply, an oxygen supply (including but not limited to oxygen generators such as, but not limited to, chemical oxygen generators that often produce oxygen as part of a corresponding exothermic reaction) that can serve as a source of oxygen to mix with other atmospheric components,
  • these civil security provisions can be so provided in an aggregated form. Such might be the case, for example, when accumulating such material at a warehouse or the like.
  • These teachings will also accommodate, however, forming such civil security provisions into corresponding units of civil security provisions.
  • one such unit of civil security provisions as intended, for example, for a single authorized beneficiary might comprise, at least in part, consumable fluids, foods, medical supplies, personal hygiene supplies, and environmental threat abatement supplies (such as, for example, breathing masks, hazardous materials handling garb, and the like).
  • Such a unit of civil security provisions might comprise, for example, a short term unit that comprises a quantity and variety of civil security supplies that are adequate to sustain life for that one authorized beneficiary for, say, at least about thirty days but no more than, say, about one year.
  • adequacy of any food contents can be determined as a function of a particular target caloric intake per person on a per day basis.
  • the adequacy of any consumable fluid contents could be determined as a function of a particular target quantity intake per person on a per day basis.
  • Provision or supply cache locations may be disguised by fabricating their external appearance to include, for example, a sewer drain or manhole cover that could be removed or opened to provide access to a cache of supplies or provisions therein, including both consumable and non-consumable supplies.
  • a sewer drain or manhole cover that could be removed or opened to provide access to a cache of supplies or provisions therein, including both consumable and non-consumable supplies.
  • the manhole covers or drains could exist in plain sight, while still disguising the storage container and/or the container's point of entry.
  • the provisions may comprise a long-term, medium-term, or short-term amount of supplies. Further, the provisions may be divided or bundled, for example, into individual or family packs or the like.
  • the interior of the storage container may include an interior door and/or locking mechanism to keep the container secure.
  • these teachings provide for offering access to civil defense benefits via a subscription-based process. This can include, as noted, providing access to various and sundry survival supplies in survival packs in response to a civilly-catastrophic event having occurred.
  • the specific nature of the supply packs as well as the constituency of the emergency supplies therein can vary with the needs and/or requirements as characterize a given application setting.
  • supply packs may be customized for a particular period of time, gender, age group, or other specialized need, such as, for example, specific nutritional or corporate requirements. Particular needs can be identified and categorized and then a supply pack can be created and provided to address the particular need.
  • Examples of such specialty supply packs may include, for example, short-term, medium-term, or long- term packs for various time periods, male or female packs, infant and child packs, automobile (or other vehicle) packs, corporate packs, communication packs, aircraft packs, and so forth.
  • a supply of emergency materials can be provided to a given authorized beneficiary well prior to any civilly-catastrophic event. At least some of these supplies, however, are likely to have a limited shelf life. If desired, these teachings will accommodate the provision of a service to visit an authorized beneficiary's home, office, storage space, or other location of choice on a set or more casual basis (for example, once a week, once a month, once a year, once every five years, or whatever time frame makes sense in a given application setting) so that the pre-positioned goods that are owned, leased, or otherwise in the possession or control of authorized beneficiaries can be monitored, inspected, repacked, altered, and/or rotated to ensure that these supplies remain fresh, appropriate, up-to-date, and available should a need for their use arise.
  • Such a service may include substitutions, straight swaps, additions, or subtractions of goods and equipment so that the provisions are substantially optimized.
  • the service personnel visiting the authorized beneficiary and monitoring the provisions may use a standardized checklist or other standard to determine whether the supply of provisions should be modified.
  • the provisions may also be altered based on an updated or revised risk assessment for the authorized beneficiary.
  • the provisions supplied to the authorized beneficiary may be customized according to the needs and/or preferences of the authorized beneficiary, which may include providing provisions and supplies based on the projected risk for the authorized beneficiary. People in different regions of the country, for example, will have different risk profiles based on where they live, and will therefore require different levels or types of protection, as reflected in the contents of their supply of emergency provisions.
  • the personnel monitoring the authorized beneficiary's supply of provisions can modify the supply accordingly, such that the authorized beneficiary is well- prepared.
  • the contents of the provision supply may also facilitate the conversion of the authorized beneficiary's home into a sustainable shelter.
  • these teachings provide generally for accepting 301 consideration-based private civil security subscriptions from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource or civil security resource (or, if desired, to a plurality of different kinds and/or categories of life-sustaining resources) such as, but not limited to, resources pertaining to hydration, nourishment, shelter, environmentally borne threat abatement (such as protection from chemical, biological, and/or radioactive threats and the like), transportation, and/or rescue services.
  • This life-sustaining resource can comprise, for example, a consumable necessity of human life (i.e., a necessity such as nourishment that tends to be reduced in supply as it is consumed) and/or a non-consumable necessity of human life (i.e., a necessity such as shelter that is not necessarily reduced in supply as it is applied or used).
  • a consumable necessity of human life i.e., a necessity such as nourishment that tends to be reduced in supply as it is consumed
  • a non-consumable necessity of human life i.e., a necessity such as shelter that is not necessarily reduced in supply as it is applied or used.
  • This right of access can pertain, if desired, to a predetermined quantity of the life- sustaining resource.
  • a given subscription can relate to providing access to a one year's supply of the at least one life-sustaining resource for a given individual, number of individuals, or the like.
  • these subscriptions may be accepted by, for example, a for- profit business.
  • a not-for-profit business such as a membership-based entity
  • subscriptions may be accepted by, for example, a for- profit business.
  • a not-for-profit business such as a membership-based entity
  • the term “subscription” shall be understood to refer to and encompass a variety of legal mechanisms.
  • subscription mechanisms such as: time-limited rights of access (as where a subscription provides access rights for a specific period of time, such as one year, in exchange for a corresponding series of payments); event-limited rights of access (as where a subscription provides access rights during the life of a given subscriber based upon an up-front payment in full and where those access rights terminate upon the death of the subscriber or where, for example, a company purchases a subscription for a key employee and those corresponding rights of access terminate when and if that key employee leaves the employment of that company); inheritable rights of access (as may occur when the subscription, by its own terms and conditions, provides a right of access that extends past the death of a named subscription beneficiary and further allows for testate and/or intestate transfer to an heir); rights of access predicated upon a series of periodic payments (as where a subscription provides access rights during, for example, predetermined periods of time on a periodic basis as where a subscriber offers month-by-month payments
  • consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource, with "subscription" referring to and encompassing a variety of legal mechanisms.
  • One such type of subscription may include ownership-based rights of access.
  • an individual(s) may be offered the opportunity to obtain civil defense services by way of becoming a shareholder of an organization that either provides privatized civil defense services or contracts to receive such services. Instead of paying for membership by way of an established fee structure, membership, or subscription, a person may buy a share(s) entitling them to a level of privatized civil defense services.
  • memberships or subscriptions to privatized civil defense networks can come in a variety of forms, including equity and non-equity subscriptions.
  • An equity subscription includes a tangible ownership stake in the organization such that at some point in the future, such as when a subscriber chooses to discontinue the subscription, the subscriber is able sell the subscription to another person (the new subscriber) or the subscription organization itself buys the subscription back from the subscriber and then resells it to a new subscriber(s).
  • a non-equity subscription does not usually entail a direct economic interest in the subscription, such that when a non-equity subscriber leaves their subscription they receive nothing.
  • the subscription may require an upfront payment upon either submitting an application to become a subscriber, or at the time the subscription has been granted.
  • additional economic payments or dues may be required on a minute-by-minute, hourly, daily, weekly, monthly, quarterly, yearly, or other basis.
  • consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource, with "subscription" referring to and encompassing a variety of legal mechanisms.
  • the subscription to services provided by a privatized civil defense provider may be legally designed to be an asset of the subscriber.
  • the subscription would then be treated as an asset, just like real estate, cash, a business, inventory, and stock, for example, from an estate or portfolio planning standpoint.
  • this subscription asset would be designed to be passed along, liquidated, turned back in, and so forth.
  • a plurality of differentiated subscription opportunities can be offered in this regard.
  • This plurality of differentiated subscription opportunities can correspond, for example, to providing access to differing selections and/or quantities of the civil security resources or life-sustaining resource supplies.
  • such subscription opportunities can differ from one another at least with respect to cost.
  • This provides subscriber choice with respect to selecting a particular subscription that best meets their specific needs and/or budget limitations. For example, one subscription can provide for accessing life-sustaining resources that, though nutritionally viable, are economically selected while another subscription might provide for life-sustaining resources that are more costly and in turn reflect, for example, a wider variety of choices within a given category of resource.
  • an authorized beneficiary may subscribe to a variety of benefits, with a variety of payment plans and/or fee structures associated with the type, quantity, and/or duration of the benefits and services.
  • a subscriber may be provided with life-sustaining resources, such as provisions, shelter, rescue, and transport, for example, in which certain parameters regarding the resources are unlimited or unrestricted.
  • life-sustaining resources such as provisions, shelter, rescue, and transport, for example, in which certain parameters regarding the resources are unlimited or unrestricted.
  • the length of time of the provided benefits, the volume of the resource, the quality of the resource, and the variety of the resource may all be unlimited or unrestricted.
  • One or more of these unlimited/unrestricted parameters may be applied in a given subscription, such that a multitude of different coverages are available.
  • some variations may include: a subscription that includes coverage for an undefined period of time and the volume, quality, and variety of the supplies are not limited; a subscription that includes coverage for an undefined period of time but the volume, quality, and variety of supplies are limited; a subscription that includes coverage for an undefined period of time and the volume and quality of the supplies are not limited, but the variety of supplies is limited; a subscription that includes coverage for an undefined period of time and the volume of the supplies is not limited, but the quality and variety of the supplies are limited. Many other such combinations exist.
  • Such access may be predicated, if desired, upon a requirement that the civilly-catastrophic event be one that persists in substantial form for more than a predetermined period of time (such as one hour, one day, one week, and so forth) or that causes at least a predetermined amount or degree of infrastructure impairment or other measurable impact of choice (such as a particular level or degree of harm, interference, or negative impact upon a given minimum number of people).
  • a predetermined period of time such as one hour, one day, one week, and so forth
  • measurable impact of choice such as a particular level or degree of harm, interference, or negative impact upon a given minimum number of people.
  • such access may be predicated, if desired, upon a requirement of a particular level of objectivity or subjectively ascertained likelihood that a particular category or kind of civilly- catastrophic event will occur within a particular period of time.
  • civilly-catastrophic event will be understood to refer to an event that substantially and materially disrupts a society's local, regional, and/or national infrastructure and ability to provide in ordinary course for the at least one life-sustaining resource.
  • a civilly-catastrophic event can include both a precipitating event (which may occur over a relatively compressed period of time or which may draw out over an extended period of time) as well as the resultant aftermath of consequences wherein the precipitating event and/or the resultant aftermath include both the cause of the infrastructure interruption as well as the continuation (or worsening) of that interruption.
  • a civilly-catastrophic event can be occasioned by any of a wide variety of natural and/or non-naturally-caused disasters.
  • natural disasters that are potentially capable of initiating a civilly-catastrophic event include, but are not limited to, extreme weather-related events (such as hurricanes, tsunamis, extreme droughts, widespread or unfortunately-targeted tornadoes, extreme hail or rain, and the like, flooding, and so forth), extreme geological events (such as earthquakes, volcanic activity, and so forth), extreme space-based events (such as collisions with comets, large asteroids, and so forth, extreme solar flares, and the like), extreme environmental events (such as widespread uncontrolled fire or the like), and global or regional pandemics, to note but a few.
  • extreme weather-related events such as hurricanes, tsunamis, extreme droughts, widespread or unfortunately-targeted tornadoes, extreme hail or rain, and the like, flooding, and so forth
  • extreme geological events such as earthquakes, volcanic activity, and so forth
  • non-naturally-caused disasters capable of initiating a civilly- catastrophic event include both unintended events as well as intentional acts of aggression such as war, terrorism, madness or the like.
  • Examples of non-naturally-caused disasters capable of such potential scale include, but are not limited to, nuclear-related events (including uncontrolled fission or fusion releases, radiation exposure, and so forth), acts of war, the release of deadly or otherwise disruptive biological or chemical agents or creations, exposure to harmful mutagenic influence, and so forth.
  • conditional access can be absolute (as when a given individual may be granted or denied any access to any of the civil security resources) or may be relative (as when a given individual is granted or denied access to certain of the civil security resources while being allowed access to certain other of the civil security resources).
  • a given individual may habitually and consistently exhibit highly anti-social behaviors; in such a case, the provider of such civil security resources may be willing to provide such a person with civil security provisions but may be reluctant to permit this person to have access to a long term shelter where a certain amount of social buoyancy and ability to compromise with others may be important to the long term ability of that facility to successfully protect its inhabitants.
  • a very wide variety of criteria can be potentially considered for such purposes.
  • a few illustrative examples would include, but are not limited to, an authorized beneficiary's qualifications (based upon their experiences, aptitude testing, physical condition and capabilities, or the like), measured intelligence (based upon, for example, a traditional intelligence quotient (IQ test or the like), psychological test results, behavioral rest results, behavioral test results, race, nationality citizenship, ancestry, sexual orientation, gender, age, health, political beliefs and/or agenda, educational background, professional title, financial backing, athletic ability, mechanical ability, skills, and/or relationship to a third party entity with whom reciprocal relations regarding the provisions/facilities/services mutually agree to extend civilly-catastrophic event-based reciprocal access to one another's authorized beneficiaries).
  • IQ test traditional intelligence quotient
  • a given subscription may also provide for similar access to at least one non-civil security resource or non-necessity 302 (that is, an item or service that is not, strictly speaking, necessary to sustain human life on an elemental basis).
  • this process 300 will then also maintain 303 the additional resource and permit access 305 to these non-civil security resources as well.
  • An illustrative listing of representative non-necessities or non-civil security resources comprises, but is certainly not limited to: a luxury consumable (such as, for example, alcoholic beverages, foods that provide an experience beyond simple survival, and so forth); a luxury non-consumable; clothing; a food preparation tool; a personal communication device; a personal hygiene item; non-human nourishment (such as dog food, cat food, and so forth); barter medium (such as bulk or coined precious metals including but not limited to gold, silver, and so forth); an electrical energy source (including but not limited to alternating current power sources, direct current power sources, fuel-consumptive power sources, renewable fuel source power sources, and so forth); an entertainment apparatus (such as game stations, musical instruments, reading material, and so forth); an educational tool (including but not limited to instructional texts, reference works, laboratory and demonstrative equipment, and so forth); physical conditioning, exercise, and maintenance training and equipment; repair and maintenance tools and services; crafts supplies and training; and/or sports equipment and facilities; to note but
  • This process 300 then provides for maintaining 303 the resource(s) pending a need to permit subscription-based access to the resource(s) in response to the occurrence of a catastrophic event.
  • This can comprise maintaining the resource on behalf of the subscriber and/or on behalf of another authorized beneficiary. The specifics of such maintenance will of course vary with respect to the nature of the resource or resources being maintained.
  • maintaining 303 the resource can comprise acquiring 401 the at least one predetermined consumable necessity of human life to thereby provide acquired necessities and then storing 402 those acquired necessities to thereby provide stored necessities that are held on behalf of the corresponding authorized beneficiaries pending a need to access those stored necessities in the event of a triggering civilly-catastrophic event.
  • acquisition and storing steps can further comprise, if desired, acquiring and storing non-consumable necessities of human life and/or consumable or non-consumable non-necessities of human life.
  • Acquisition 401 of such items can be achieved through any of a variety of means.
  • the items may be procured on the open market.
  • the items may be purchased or otherwise acquired from third parties via private negotiations.
  • the entity that provides and accepts these subscriptions may itself create (through manufacturing, farming, or the like) the items of interest.
  • the acquired item may comprise a staple of ordinary commerce.
  • the acquired item may be unique and/or proprietary to the acquiring/storing entity.
  • the civil security facilities will typically comprise physical assets that tend, categorically, to comprise part of a private civil security infrastructure.
  • Such civil security facilities will typically comprise physical assets that tend, categorically, to comprise part of a private civil security infrastructure.
  • Such civil security facilities can, therefore comprise, for example: one or more civil security shelters; one or more rally points (at which authorized beneficiaries can gather in response to a civilly-catastrophic event in order to receive certain civil security services such as transportation to another civil security facility such as a shelter or at least to a location that is away from a location that presently (or imminently) lacks civil security (due, for example, to a civilly-catastrophic event, its aftermath, or both)); a location where at least some of the authorized beneficiary's civil security provisions are available (such as a metropolitan, local, regional, and/or national distribution facility); a trans-shipment facility for at least some of the civil security provisions (where, for example, dis-aggregate provisions are brought and then parsed and aggregated into corresponding units of provisions destined for particular recipient authorized beneficiaries); a medical services facility; and so forth, to note but a few relevant examples in this regard.
  • a temporary civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively short period of time.
  • a temporary shelter might prove sufficient in this regard for, say, no more than about ten inhabitants for no more than about one week, ten days, 15 days, and the like.
  • a temporary shelter such as this is designed and intended to only serve as a temporary refuge from the effects of a civilly- catastrophic event. Should longer term accommodations be necessary in a given instance, the inhabitants of such a temporary shelter will often be better served to move to a longer term civil security shelter.
  • a long term civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively longer period of time.
  • a temporary shelter might prove sufficient in this regard for, say, no more than about 100 inhabitants for up to about three months, six months, one years, or the like. (Again, such numeric examples serve an illustrative, rather than limiting, purpose only.)
  • a shelter of this type will typically be characterized not only by an ability to protect its inhabitants against the rigors of the local environment and to contain a relatively large and varied supply of provisions, but by an ability to exist and operate in a fully or at least substantially independent manner. This can relate in particular to an ability to create and/or otherwise replace its consumable provisions (by, for example, growing food, creating power, and so forth).
  • Such shelters may differ from one other in other ways.
  • such shelters may differ with respect to the non-survival related amenities that are provided. These differences can relate to categories of amenities (such as educational facilities, workshop facilities, food preparation facilities, communication facilities, entertainment and/or recreation facilities, or the like) and/or to a relative level of perception of quality, comfort, convenience, or the like.
  • the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource.
  • One such life-sustaining resource may comprise a shelter.
  • a shelter may be configured, arranged, located, and/or provisioned and operated as a short term facility, a medium-term facility, a long term facility, or as all three.
  • the shelter may comprise a manmade island location.
  • a civil security provider may create an island in a body of water, such as a lake, sea, ocean, river, or other body of water that would provide isolation. If desired, the island may be built in international waters to thereby locate the shelter outside the purview and laws of all nations.
  • shelter locations may be disguised by fabricating their external appearance to include, for example, a sewer drain or manhole cover that could be removed or opened to provide access to the remainder of the shelter located underground.
  • the interior of the shelter may optionally include an interior door and/or locking mechanism to keep the shelter secure.
  • the sewer drain may also be functional in that the drain could accept water through the opening and divert it outside of the shelter and into, for example, a storm sewer, thereby keeping the interior of the shelter free of accumulated water.
  • a false manhole cover could serve as the actual entrance to the shelter.
  • Such manhole covers or drains could exist in plain sight, while still disguising the shelter and/or the shelter's point of entry.
  • a civil security provider may provide a fortified building in an urban center that is constructed and fortified to withstand many manmade or natural disasters.
  • the fortified building would then be made available to subscribers in a time of need, and its location in an urban center facilitates access to the facility to those that may be trapped in the city.
  • the facility may serve as a short, medium, or long term shelter, and may also serve additional civil security functions, such as a communications center or storage facility, for example.
  • the facility may include significant physical security, extensive underground facilities, and radiological, biological, chemical, and EMP protection.
  • the facility may also include redundant systems, including electrical systems, water systems, positive air flow systems, and so forth to provide further protection.
  • a civil security provider may provide a shelter to house authorized beneficiaries during and/or after a civilly-catastrophic event and protect the inhabitants from environmental stress and extremes.
  • the shelter may comprise a self- sufficient shelter, such as a farm, that could grow crops to provide food for the occupants of the shelter.
  • the self-sufficient shelter could also maintain animals, livestock and/or fish- stocked water sources, with the animals and fish able to serve a variety of purposes.
  • the animals may provide motive force for other constructs (such as plows, wagons, buggies, and so forth). Animals such as dairy cattle, dairy goats, chickens, and so forth can serve as a source of fresh food products.
  • the self-sufficient shelter can be constructed by retrofitting an existing working farm, or by building a farm. Further, the self- sufficient shelter may have its self-sustaining features customized based on the unique location of the shelter. For example, one self-sufficient shelter may be located on a parcel of land conducive to farming, while another self-sufficient shelter may be located underground and provisioned with artificial light and hydroponic gardens to grow crops.
  • the self- sufficient shelter may be optionally configured for a greenhouse or biosphere environment, with the use of farming techniques conducive to the type of environment.
  • the aforementioned civil security services can comprise any of a relatively wide variety of offerings. Some examples include, but are certainly not limited to: transportation services (where such transportation services are not ordinary mass or individual transit services but instead represent, for example, services that are designed, scheduled, and deployed to effect transportation of dispossessed persons away from a location that substantially lacks civil security (such as an area afflicted by a civilly-catastrophic event); civil security information (including both civil security information that is generally appropriate for a large number (or all) of the authorized beneficiaries (such as civil security preparedness training or the like) as well as information that is specifically appropriate for individual ones of the authorized beneficiaries (such as personal contingency instructions that are formed and provided to guide specific authorized beneficiaries during a time of need regarding particular actions and behaviors that such specific individuals should take and observe when responding to a civilly-catastrophic event as well as consulting services that assist such individuals with respect to fortifying their relative positions and/or otherwise better protecting themselves against the effects of various civilly-catastrophic events); communications services, including long distance
  • a national network or database can be created to identify and monitor all emergency medical service (EMS) resources, including personnel, specialists, equipment, specialized equipment, and so forth to thereby allow emergency officials to ascertain the landscape of available EMS resources.
  • EMS emergency medical service
  • resources could be located and dispatched quickly and efficiently.
  • emergency officials would be able to determine, for example, the total number of available firefighters and how many are cross-trained as paramedics, the number of available pumper trucks, ladder trucks, ambulances, and so forth.
  • the information in the database can then be used to dispatch the appropriate personnel and equipment and can also be used to determine if more resources are required.
  • rescue/medical/transport personnel and equipment may need to be brought in from remote regions. This system would provide for the coordination of relief efforts so that the correct resources could be provided to areas with the highest need, thereby resulting in improved efficiency and response time, thus increasing the chance of survival.
  • the EMS network described above could further include a secondary function in which an area, district, city, state, department, group, or organization (designated generally as a "community") could elect to participate in a response service by making their personnel and EMS assets (for example, vehicles and related gear) available to other communities in need.
  • the community in need could then call on the assets of another registered community to obtain the resources necessary to respond to the emergency.
  • Participants in such an asset availability program would then be able to call on the services of another community listed in the database in a time of need, with such reciprocation providing an incentive for participation in the program.
  • the cost related to the calling of another group's assets may be compensated, for example, on a cost basis, a for-profit basis, a fixed fee basis, or at no cost to either party.
  • the vehicles used for this purpose can comprise, for example, a bus, van, or similar terrestrial platform.
  • Other vehicles, such as helicopters, hovercraft, boats, and so forth may also be employed where appropriate.
  • the right of a given individual to gain passage on such a vehicle can be arranged in advance of such a civilly-catastrophic event and/or at a specific time of need.
  • rescue services will be rendered in the event of a civilly-catastrophic event.
  • rescue personnel quickly locating the authorized beneficiary and physically accessing that authorized beneficiary to effect their removal to another location.
  • such a service can be supplemented to include allowing such an authorized beneficiary to identify another party to be rescued and/or to be located and accompanied as a precautionary or protective measure.
  • Long range acoustic devices may be mounted on or incorporated into the fuselage of a transport vehicle to be used to disband crowds of non-subscribers that might interfere with transport or rescue operations associated with privatized civil security services.
  • Long range acoustic devices are generally designed to loudly emit warnings, orders, or other noise or instruction at an uncomfortably loud 150 decibels. These devices can also operate by generating low-frequency sound pulses and sending them towards a target.
  • the human body generally does not react well to extremely low frequency noises, with certain low frequency noises causing sickness, balance problems, and/or discomfort and pain to soft tissues and organs.
  • a long range acoustic device can be used as a non-lethal weapon designed to disperse hostile crowds or ward off potential foreign combatants by delivering prerecorded warnings in several languages and, if needed, an earsplitting noise.
  • a civil security provider may dispatch a helicopter to rescue authorized beneficiaries. In trying to land to rescue the authorized beneficiaries, the provider's personnel may encounter scared, hostile, or panicked non-subscribers who might overrun the helicopter in their interest of fleeing a disaster.
  • the sound generator when incorporated into the fuselage of the aircraft, boat, or other rescue vehicle could provide up to a 360-degree zone of protection for the personnel to then retrieve the authorized beneficiaries.
  • Authorized beneficiaries and rescue personnel could be equipped with safety gear making them less susceptible to the discomfort associated with being in the deployment zone of the device.
  • authorized beneficiaries of a subscription-based private civil defense program can participate in the program by providing threat assessment information to, for example, a central information collection function.
  • a central information collection function can include, for example, such individuals making regular reports (via telephone, email, a website, a wireless communications device, and so forth) regarding their observations in this regard.
  • one or more threat-detection sensors can be deployed at the individual's property (for example, their homes, businesses, vehicles, their clothing, and so forth).
  • Such sensors can be, if desired, coupled to a communication network of choice that forwards the gathered information (using a real time, near real time, or batch protocol of choice) to the central information collection function.
  • such activities can be supplemented with training for the participating individuals regarding how these observations and so forth are to be carried out.
  • the repository may comprise, for example, a website or electronic bulletin board in which people or groups can post notices providing or requesting information.
  • people or groups may provide or request information regarding missing people or pets, requests for donations, and so forth.
  • the repository may be limited in use to only authorized beneficiaries, or may be offered, in whole or in part, to the general public.
  • the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource, where the resource may comprise a substantially unpopulated town.
  • the resource may comprise a substantially unpopulated town.
  • town serves as a convenient moniker for and reference to a municipality of essentially any size and serves as a representative expression for so-called villages, towns, cities, and so forth.
  • This town can be built in the first instance as such an entity or can, if desired, comprise a previously populated town that has been largely abandoned for whatever reason. In a disaster scenario, it is likely that many non- subscribers will seek shelter in the town.
  • the civil security provider owning the town could benefit economically in a number of ways from use of the town, both from subscribers and non-subscribers.
  • Such economic benefits may include charging each person an admission fee and then for the services they use/consume, charging each person a per hour rate, a per day rate, a per week rate, or a per month rate, and accepting contracts from the government (local, county, state of federal) for certain groups of people.
  • the owner of the town may provide services and accommodations to those in need at no cost to the displaced person.
  • the owner of the facility may be entitled to a tax deduction at the prevailing current value of the service provided.
  • this tax deduction may be of large economical value and may offset other tax obligations that might otherwise have to be paid.
  • the potential tax incentives may encourage providers to take on the risk of making the speculative investment required to build the town.
  • an insurance premium discount could be offered to those individuals who have already subscribed to privatized civil security benefits, thus providing an incentive for potential life insurance holders to subscribe to such benefits. Conversely, an individual's premiums could be increased if they have not subscribed to certain civil security benefits.
  • ком ⁇ онент may offer privatized civil defense insurance policies that may come in a variety of forms.
  • a subscriber may be provided with an insurance policy in which the coverage varies and in which certain parameters regarding the coverage are unlimited or unrestricted. For example, the length of time of the coverage, the volume of the coverage, the quality of the coverage, and the variety of the coverage may all be unlimited or unrestricted.
  • One or more of these unlimited/unrestricted parameters may be applied to a given policy, such that a multitude of different coverages are available.
  • the policies may provide coverage for an unlimited period of time, coverage for an unlimited period of time and at a limited standard, or coverage for an unlimited period of time and at an unlimited standard and with no limit on variety, and so forth.
  • the coverage may also be varied along these lines with respect to each type of service or benefit offered by the provider, such as provisions, shelter, rescue, transport, and so forth.
  • the civil security provider may have civil security facilities, such as a tactical operations center (TOC), to provide any of a variety of functions, such as, for example, gathering intelligence and evaluating threats and world events that influence the provider's authorized beneficiaries and ability to respond to any natural or non-natural disaster/catastrophe.
  • the TOC may be staffed 24 hours a day, seven days a week, and may be designed to monitor local, state, world, and near-space events and coordinate, as needed, civil security services for authorized beneficiaries.
  • the TOC generally represents the central location of all operations and is complemented by a network of sensors and civil security watchers.
  • the center may include a world-wide communications network capable of communicating with subscribers, authorized beneficiaries, governments, provider personnel, and deployed assets.
  • a corporate subscriber may staff corporate representatives at a designated, pre-assigned desk or area within the TOC at the time of a civil security disaster. These corporate representatives can then coordinate the corporate employees, particularly those employees that are authorized beneficiaries, the operations of ongoing corporate obligations, and the operations of the privatized civil security benefits provider. The presence of the corporate representatives helps ensure the timely exchange of information between the corporate subscriber and its employee subscribers and/or authorized beneficiaries and the civil security benefits provider.
  • a designated, pre-assigned desk or area within the civil security benefits provider's TOC may be provided for each government agency and military service having a potential role in disaster response operations.
  • the government's or military's own response facilities may be compromised by the civilly- catastrophic event, thereby preventing them from operating at an optimum level.
  • the government and/or military may operate partially or completely out of the TOC to maintain at least a minimum operation level if needed.
  • the designated desk or area for the government and/or military within the TOC can provide a variety of functions, including the ability for the private civil security benefits provider to coordinate their operations with local, state, federal, international, and/or military authorities.
  • the government and military representatives once manning their designated desks or areas, represent a level of redundancy for public civil security response operations. The presence of the representatives helps ensure the timely exchange of information between government and military agencies and the provider of privatized civil security benefits services.
  • the TOC or other related civil security facilities may be built or retrofitted with a Faraday cage to protect electrical circuits from the damage and destruction that may result from civilly-catastrophic events involving an electromagnetic pulse.
  • the TOC or other facility would still be fully operational in the event of an electromagnetic pulse disaster scenario, such that the civil security provider could still provide services to the authorized beneficiary without damage or undue interruption.
  • a battery-powered, portable electronic device may be issued to authorized beneficiaries that enables a civil security benefits provider to more quickly and accurately identify the location of an authorized beneficiary.
  • the device may use, for example, global positioning system technology, a wireless Internet communications receiver, and a 406 MHz transmitter and a 121.5 MHz homing signal.
  • an alert signal may then be transmitted to a satellite, such as a Cospas-Sarsat satellite or other privately owned, operated, leased, and/or controlled satellite, designated for privatized civil security services and forwarded to a TOC.
  • the built-in GPS receiver could provide latitude and longitude coordinates to give an authorized beneficiary's position within approximately 100 feet of the authorized beneficiary in most places in the world.
  • a signal may also be sent through the wireless Internet communication network, which may include digital and analog networks, if available.
  • One or two-way text messaging capabilities may optionally be included with the device.
  • Unmanned aerial vehicles may be used to survey a disaster area ahead of any privatized civil security rescue operations for authorized beneficiaries.
  • the UAV may be provisioned with a variety of sensors and/or cameras and other devices to provide real-time damage and/or risk assessment after a civilly-catastrophic event.
  • the data from the UAV will assist the provider in assessing the damage or risk caused by or otherwise owing to the event and evaluating the best way to logistically maneuver within an area.
  • the civil security provider can then decide, for example, the best mode of transport for the circumstances and can allocate the appropriate resources to carry out the rescue.
  • the vehicles are unmanned, personnel are not needed to pilot the vehicle, such that personnel are not put at risk by being exposed to any hazards produced or associated with the event.
  • satellite imagery may be used to survey a disaster zone.
  • the information and images produced by the satellite imagery can then be used to assess the damage and assist the provider in evaluating what resources are needed.
  • the satellite imagery can provide current damage and risk assessment, while possibly limiting the need for provider personnel to travel to the disaster region and risk exposure to the hazards produced or associated with the disaster.
  • the satellite imagery will also help the provider strategize, plan, implement, and coordinate any movement, evacuation, and/or rescue plans for authorized beneficiaries.
  • a network of civil defense protection watchers can be created that can report localized conditions for a particular region or locale.
  • the civil defense watchers can provide real-time, on-the-ground assessments and evaluations of a disaster area and its surrounding regions.
  • the information and reports provided by these civil defense watchers may facilitate and/or influence the need for or allocation of specific rescue assets and/or procedures.
  • Such a program could include training and certifying the civil defense watchers to follow a standardized protocol and to use reference cards or materials to provide an accurate assessment of the conditions in a given disaster and/or emergency situation.
  • the watchers may also be provided with measuring devices and gauges to facilitate the gathering of data and the overall assessment of the disaster area. The data can then be interpreted and reported according to a standard protocol.
  • the standardized materials and training provided to the watcher assists the watcher in evaluating the conditions and then reporting uniform and consistent data to the civil security provider. Standardized data will thus help the provider determine the overall scale and scope of the disaster and to then strategize and deploy the most effective rescue plan.
  • a nationwide network of radiological, biological, and chemical sensors may be provided. These sensors would provide real-time, on-the-ground measurements of the levels of any of the aforementioned agents.
  • the network may be national in scope with coverage on a city, county, state and national level.
  • Such sensors can be, if desired, coupled to a communication network of choice that forwards the gathered information (using a real time, near real time, or batch protocol of choice) to a central information collection function.
  • the measurements provided by the sensors could be monitored, for example, at a tactical operations center for a civil security provider, with personnel at the center being notified of elevated levels of the agents. The civil security provider could then proceed to respond accordingly.
  • Subscribers or members of the general public considering services provided by a civil security provider may desire a resource that can provide information regarding different privatized civil security organizations and the benefits and services offered by such an organization.
  • This resource may comprise, for example, a publication or website directed towards consumers or potential consumers of civil security benefits.
  • This resource will provide factual, unbiased data on the organizations, such as, for example, their offered services, the quality and nature of their services, how they manage their services, and the type and/or price of subscriptions, such that a potential subscriber to such services can make an informed decision regarding their subscription.
  • the resource may also include a rating system for grading or ranking providers and their services
  • Video and computer games are a popular form of entertainment in today's society.
  • video games are becoming more sophisticated and technologically advanced, with many accurately replicating or simulating real-life situations.
  • a civil security game system could be used for both entertainment and training and skill enhancement, with the system being offered to authorized beneficiaries and/or civil security provider employees, contractors, suppliers, or the like.
  • Those individuals that use the system may be entertained by the game-like appearance of the simulation, while also developing desired skills as they play.
  • the training game can enhance an individual's decision-making skills in everyday life and in disaster scenarios.
  • Such a simulation can train individuals in how to prepare or react to a given set of circumstances, for example, or train them in mastering a particular control system.
  • the skills developed by playing the game can then be applied in real life.
  • this process will readily accommodate providing such civil security provisions 200, civil security facilities 502, and civil security services 503 by a single provider 501.
  • a provider 501 can be integrally involved with designing, providing, maintaining, and offering such civil security resources or can comprise an aggregator of such resources, in whole or in part, as are provided by other sources.
  • these teaching can be flexibly applied in various ways in this regard. For example, and referring momentarily to FIG.
  • the civil security provisions 200 can be provided by a first provider 601, the civil security facilities 502 can be provided by a second provider 602, and the civil security services 503 can be provided by a third provider 603 wherein the first, second, and third providers comprise separate entities (as when, for example, these providers comprise separate legal entities having no co-ownership or common points of control). In such a case, these separate providers can meet the needs of this step by acting in an aggregated manner 604 (directly or indirectly) with one another.
  • a single provider 703 can provide the civil security facilities 502 and the civil security services 503 while the civil security provisions are provided by a plurality of civil security provisions providers represented here by a first civil security provisions provider 701 through an Nth civil security provisions provider 702 (where "N" will be understood to comprise an integer greater than one).
  • N will be understood to comprise an integer greater than one.
  • a private civil security provider will encounter particular difficulties not faced by providers of other, more traditional, products and services. For example, marketing such services, provisions, and facilities to consumers or clients may prove challenging because individuals may be hesitant to participate because of their reluctance to acknowledge the presence of certain threats or perhaps because they mistakenly believe that their federal, state, local, provincial, or municipal government is effectively addressing and preparing for such civilly-catastrophic events. Further, the business of civil security presents several unique obstacles and challenges to a business plan or model because the business partly operates within a realm sometimes occupied (or is at least perceived as being occupied) by various governmental entities. Some particular examples to address these concerns now follow (it being understood that these examples are provided for illustrative purposes and are not intended to comprise an exhaustive listing of such possibilities).
  • consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource.
  • the subscription price or fee structure may be assessed in any of a variety of ways.
  • the subscription fee may be rated based on a variety of factors.
  • the civil security provider may evaluate an individual's health, age, lifestyle, location, and so forth in determining the subscription fee for that individual.
  • an individual living in a high-risk urban environment may be charged more for services than their rural counterpart who faces a lower risk of disaster and a likely easier evacuation or rescue in the event of a disaster.
  • the civil security provider could develop a set of guidelines for determining the fee structure based on the evaluated factors.
  • Subscriptions for privatized civil security benefits can come in a variety of forms.
  • a family subscription could be offered whereby a family pays a standardized fee, based on the level of service required, with the family paying a flat fee irrespective of the size of the family.
  • the provider could define "family" to include or not include specific family members or limit the generations covered by such a family membership.
  • a group subscription may be offered by a civil security services provider where a group pays a standardized fee, based on the level of service required.
  • the group may comprise, for example, a corporation, a union, an association, and so forth.
  • the group can then choose individual subscription services for specific employees/members of the group and/or let the employees/members elect to buy the services for themselves.
  • an employee/member is a subscriber through their group, they can further elect to obtain subscriptions for services for their immediate families and/or extended families.
  • the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource.
  • One such life-sustaining resource may comprise rescue services.
  • the rescue service offering can be structured around a variety of measures, including response time (i.e., the time that subscribers can expect to have a rescue team on scene).
  • response time i.e., the time that subscribers can expect to have a rescue team on scene.
  • the subscriber can elect a particular response time or response priority as part of their rescue service. For example, several time frame options may be made available to the subscriber, such as a 30 minute response time or a 6 hour response time, for example.
  • the price for the rescue services may then be commensurate with the response time associated with that rescue.
  • the provider may designate the subscriber as a high priority rescue based on a specific risk or danger to a given subscriber such that the rescue team responds to and rescues those high priority subscribers before other subscribers.
  • the subscriber may notify the provider at the time of the event that they are requesting high priority status, with an additional fee optionally being assessed for such a status.
  • the subscriber may also pay an increased subscription price to be given rescue priority in a time of need.
  • the privatized civil defense industry is a new, unique, and developing industry, and the service requirements of the industry require unique business model solutions. For example, disaster classifications and alerts, disaster responses, data security, storage of supplies, rescue, training, transportation of large groups of people, and so forth are disparate service sectors that must be integrated and managed together within the privatized civil defense system. Therefore, it may be valuable to develop a customized curriculum that cuts across and then ties together in a cross-functional manner a multitude of previously unrelated industry sectors.
  • Disaster response software platforms offer one such approach to addressing the unique demands of privatized civil defense.
  • the software may comprise a plurality of distinct modules that can stand alone or interface into an enterprise-wide disaster response system.
  • the modules independently or as part of an enterprise-wide system, assist the civil defense provider in evaluating a multitude of external data to provide a real-time, multi-level response plan to a given disaster(s) with respect to the provider's service and product obligations to a world-wide network of subscribers.
  • One such module may be a business continuity or disaster management module. This module could provide real-time planning and instructions related to an organization's disaster response plans. The module may incorporate comprehensive contingency plans with respect to every employee action pre- disaster, during a disaster, and post-disaster, including elements involving training. As one illustrative example, the disaster planning module can interact with the training module to assess individual training needs and requirements.
  • the module may optionally integrate with an organization's enterprise resource program platforms or modules.
  • a custom training program and curriculum may be developed for employees and authorized beneficiaries so that they are more well-informed and prepared in how to, for example, access, select, facilitate, execute, and/or operate the services, products, and/or benefits provided by the civil security provider.
  • a software tracking system may be desired to track all elements of training for the privatized civil defense market.
  • the software system is an administrative system for assigning, deploying, managing, and measuring the training administered by the civil security provider.
  • Such training may be offered by any of a variety of approaches, such as, for example, instructor-led, self-study, web-based, in-class, live, recorded, and so forth.
  • the availability of the training software tracking system and the courseware that is cataloged, launched, and tracked by the system may be offered as a stand alone product or may be bundled as part of an overall privatized civil security solution.
  • the classes for example, may be sold individually or on a per-use basis, or may be offered as packages. Alternatively, or in addition thereto, the system may be optionally offered free to the public or authorized beneficiaries
  • the training software tracking system may include any or all of the following features for any of a variety of types of training classes, programs, certification programs, and/or degree programs:
  • the basic features of this option may include, for example, managing course registrations, scheduling resources, and managing course catalogs.
  • Advanced features of this option may include, for example, managing course prerequisites, manager approvals, e-commerce, the use of learning credits, certification processing, and expirations, student scores, managing learning plans, tracking learning history, search capabilities, and prescriptive learning (training designated to a learner based on their manager, job role, or assessment scores), to note but a few.
  • This feature comprises the tracking and reporting of certifications and learning metrics. Advanced features of this option may include, for example, exception reporting, automatic notification based on thresholds, and measuring business impact and return on investment.
  • This feature may include, for example, granting different access privileges based on organizational hierarchy, domain, and/or role.
  • the security feature may also encrypt data and personal information to protect the confidentiality of sensitive information.
  • the basic features of this option may include, for example, synchronizing the training software tracking system with the organization's human resources database.
  • Advanced features of this option may include, for example, integrating training and learning with performance planning and managing skills and competencies.
  • This feature facilitates the online storage of the training and learning content and indexing the content for searching purposes.
  • Advanced features may include, for example, managing the content and workflow among multiple groups.
  • This feature comprises implementing the industry standards of the Aviation Industry CBT (Computer-Based Training) Committee (AICC) and Sharable Content Object Reference Model (SCORM), making it possible to launch, track, bookmark, and/or report on electronic learning content.
  • AICC Aviation Industry CBT
  • SCORM Sharable Content Object Reference Model
  • E-Commerce This feature facilitates the processing of payments and charge- backs.
  • Advanced features may include, for example, creating business rules for transactions, such as discounts for certain learner types or course bundles, managing shopping carts, and checking certifications or learner status to determine eligibility.
  • This feature may also accommodate and/or facilitate loyalty programs, promotions, and discount processing functionality if desired.
  • Authorized beneficiaries of a subscription-based private civil security program can notify the civil security provider of a need for services by dialing a designated telephone number. For example, 911 is universally known as the number to call in emergency situations. Similarly, a number, such as a three digit number or other easily-remembered series of digits, could be assigned and designated as the number to call to alert a provider of the need to activate privatized catastrophic response services. An individual calling the number could report a disaster and/or request privatized civil security services. By one approach, the number could be a private code provided only to authorized beneficiaries of the provider's services and the provider's employees. By another approach, the number may be universally known such that subscribers and non-subscribers can report a disaster and notify the provider of a need for activation of civil security services.
  • this process 100 will also optionally provide for the provision 102 of non-civil security resources.
  • non-civil security resources comprise supplies and items that are not, strictly speaking, necessary to ensure human survival and hence may be viewed as luxuries.
  • Such items can quite literally span the full gamut of available offerings and can include both unique items (such as original works of art) and more commonly available offerings (such as jewelry, pleasure reading materials, audio playback devices, and so forth). Again, differentiation can exist with respect to actual or perceived levels of quality as pertain to such items if desired.
  • These steps of providing such civil security resources can further comprise maintaining such resources.
  • This can comprise, for example, maintaining the freshness and usability of civil security provisions (by replacing outdated or soon-to-be outdated supplies), replacing an existing resource with a better substitute that becomes available, maintaining present and/or imminent usability of a civil security shelter or transport vehicle, updating civil security-related information to reflect current data and intelligence, vetting and revetting personnel, and so forth.
  • Such maintenance can be provided, in whole or in part, by the provider of such civil security resources or can be outsourced if desired.
  • This process 100 then provides for providing 103 authorized beneficiaries with consideration-based access to the plurality of private civil security resources.
  • authorized beneficiaries can be identified. For example, by one approach, such authorized beneficiaries can attain this status as per the terms and conditions of a consideration-based private civil security benefits subscription as mentioned above with respect to FIG. 3.
  • a given subscription can provide such status for a stipulated one-year period of time for one or more authorized beneficiaries as correspond to that subscription.
  • the maintenance of the resource 203 may include storing the acquired necessities 402.
  • storage 402 occurs through use of one or more storage facilities 800, illustrated in FIG. 8, which are owned or controlled by the subscription accepting entity.
  • Any suitable storage facility may be used for this purpose with examples comprising (but not being limited to) above ground man-made shelters, below ground or below water facilities (including purposefully excavated facilities, natural caverns, and so forth), and water borne facilities (such as barges and the like).
  • Each such storage facility 800 will likely serve to store the resources as correspond to a plurality of authorized beneficiaries. By one approach such resources are stored in the aggregate.
  • each such bundle 801 can comprise a one year supply of all acquired items for a single adult authorized beneficiary.
  • a bundle 301 could comprise a one year supply of all acquired items as are intended for a family of four authorized beneficiaries.
  • a single authorized beneficiary may have a first bundle comprised of staple items that are acquired and stored for all beneficiaries and a second bundle comprised of custom items that are specifically and uniquely acquired for this particular beneficiary or class of beneficiaries (such as beneficiaries who all share a common dietary ailment or condition, sensitivity, medical condition, preference, or the like).
  • the bundle 801 itself can be realized via any of a wide variety of encapsulating or restraining mechanisms.
  • a tarp and tie-downs can be used to segregate the goods and form the described bundle.
  • discrete storage cabinets formed of wood, metal, plastic, canvas, or other material of choice could be employed for this purpose. Shrink wrap materials could also be employed in this regard.
  • these bundles 801 can be individually palletized (i.e., each placed upon and optionally secured to a pallet 802). Palletization, in turn, will permit ready and efficient movement of such bundles 801 to, about, or from a given storage facility 800 and/or delivery of such a bundle to an authorized beneficiary when such delivery comprises the desired form of granting access to such resources.
  • a first storage facility 901 may contain 1,000 such storage units while a second storage facility 902 may contain an additional 1,000 such storage units.
  • a first storage facility 901 may contain 1,000 such storage units while a second storage facility 902 may contain an additional 1,000 such storage units.
  • maintaining 303 the resource in such a context can further optionally comprise maintaining 403 the utility of the stored necessities. This can comprise, for example, monitoring the usability of perishable items and replacing such items on a corresponding schedule. As another simple illustration this step 403 can comprise holding certain items in deep refrigeration or in other special storage conditions as may suit the proper maintenance of such items.
  • Such maintenance 303 can also optionally comprise making adjustments 404 to the stored necessities to reflect dynamically changing circumstances as occur during the consideration-based private civil security subscription period.
  • a new product may become available that is particularly useful in treating a particular infectious condition that may likely arise upon the occurrence of a particular kind of civilly-catastrophic event.
  • maintaining 303 such resources can readily accommodate updating the acquired and stored items to include a supply of this new product.
  • this step of making adjustments 404 can readily comprise one or more of removing a particular one of the stored necessities (as when a better substitute becomes available, when the stored necessity itself is shown to be less effective for its intended purpose than was originally thought, and so forth), adding additional ones of the stored necessities (as when it becomes subsequently understood that more of a particular item is desirable to achieve a particular survival-related goal or purpose), adding at least one new stored necessity that is not already stored (as illustrated in the example provided above), and so forth.
  • the resource being acquired and maintained comprises consumable or non-consumable items.
  • these teachings are applicable for use with other resources as well.
  • maintaining 303 the resource may relate to providing civilly-catastrophic event-based access to a shelter.
  • this step of maintaining 303 the resource can comprise maintaining 1001 such a shelter.
  • Such a construction will usually at least serve to protect the inhabitants from environmental stress and extremes.
  • a shelter will typically also comprise internal temperature control, lighting, storage facilities, sleeping facilities, food preparation facilities, personal hygiene facilities, and so forth.
  • a shelter may also be equipped to provide for water treatment (such as filtering, bacteria removal, and so forth), waste treatment and/or recycling, electrical power generation, and/or air treatment (including but not limited to conditioning, filtering, and so forth).
  • water treatment such as filtering, bacteria removal, and so forth
  • waste treatment and/or recycling waste treatment and/or recycling
  • electrical power generation including but not limited to conditioning, filtering, and so forth.
  • such a shelter can also be equipped with communication facilities including a variety of wireless broadcast capabilities, long-distance two-way communications capabilities, and so forth.
  • Security will likely comprise a primary concern for such a shelter.
  • this can comprise maintaining the shelter in a location that is substantially distal from a nearest substantial human population.
  • a shelter 1102 may be separated from the closest major population bases 1103 by a distance that at least exceeds some predetermined substantial distance X 1104.
  • this distance X might comprise, for example, 800 kilometers.
  • Other factors might well play a part in this regard, of course.
  • a significant natural barrier (such as a large mountain range) might lie between a major population base and a shelter and make reasonable a shorter separation distance between such entities.
  • a suitable water source 1105 can comprise a ground-level water source or an underground water source as, in either case, ready access to the water source may be available. This, in turn, can be useful with respect to ensuring an adequate supply of water for the inhabitants of the shelter 1102 in times of need.
  • a ground-level water source may also provide a means of ingress and egress to facilitate the comings and goings of the authorized beneficiaries (for example, a navigable waterway can provide an effective pathway by which to transport authorized beneficiaries to the shelter 1102).
  • Dispersed shelters can also help ensure that at least some shelters will more likely survive civilly- catastrophic events that pose sufficient destructive force to destroy such a shelter or to otherwise significantly impair its purpose and functionality.
  • Such shelters may be differentiated, for example, with respect to their relative support for such things as a maximum supportable population, a depth and breadth of provided nonessential accouterments of life, medical facilities (such as, but not limited to, specialized equipment such as respirators, dialysis equipment, operating facilities, and so forth), pet animal accommodations, risk threat abatement capability, entertainment facilities, and so forth.
  • Assignment and/or access to a given differentiated shelter can be determined, at least in part, by such things as relative initial proximity of the authorized beneficiary, the terms and conditions of the corresponding subscription agreement, and so forth.
  • these teachings can be simply practiced by provision of shelter and/or life-sustaining supplies; gaining physical access to such resources comprises the responsibility of the authorized beneficiaries. During such times, of course, it can be expected that civil conditions will be troubled and confusing. Therefore, by another approach these teachings can further encompass transporting at least some of the authorized beneficiaries to the shelter and/or supplies in response to the occurrence of a civilly- catastrophic event. There are various ways by which to accomplish such a task.
  • At least one rally point can be identified 1002.
  • a rally point need not be reserved only for this purpose and may, for example, simply comprise a convenient location for at least some authorized beneficiaries.
  • Example rally points might include sports stadiums and auditoriums, amusement parks, and the like. When possible, it may be helpful to locate such a rally point relatively near an airstrip and/or a navigable waterway.
  • Such amenities can potentially be used when transporting the gathered beneficiaries to their destination (as when, for example, a destination shelter is accessible from the navigable waterway that is also readily accessible from the rally point).
  • one or more such rally points can be identified for each larger population area that contains authorized beneficiaries. It would also be possible, of course, to identify rally points to serve a similar function in more rural settings as well if desired.
  • This process can then optionally provide 1003 information regarding such rally points to the authorized beneficiaries.
  • This information can be provided prior to the occurrence of a civilly-catastrophic event if desired. It may also be useful or possible to provide such information (either in the first instance or as a supplemental notice) following the initiation of such an event. The latter may be achieved using such communication means as may be available at the time. It would also be possible to provision each authorized beneficiary (or family or company of beneficiaries) with one or more communications devices by which such information could be provided. This process could then provide 504 appropriate transportation to move the authorized beneficiaries from these rally points to the destination (such as to a designated shelter).
  • Such transportation can comprise standard vehicles (cars, buses, boats, airplanes, railroad cars, and so forth). If desired, however, more specialized equipment could be used including but not limited to armored transports, environmentally-contained vehicles or trailers, and so forth.
  • a short-term survival kit to facilitate their survival prior to their being able to access the aforementioned stored necessities upon the occurrence of a civilly-catastrophic event.
  • a short-term survival kit might comprise, for example, a seven day supply of nourishment, clothing, food preparation items, bedding, navigation tools, communication tools and/or location beacons, first aid supplies, water treatment items, items to aid with protecting against or otherwise treating environmentally borne hazards, maps, portable power sources, fire starting equipment, survival instructions, and so forth.
  • authorized beneficiaries could be provided 1202 with a survival instruction guide kit. These instructions could provide information regarding survival practices, emergency responses, and so forth.
  • a survival instruction guide kit such as a family group, a company group, and so forth.
  • each authorized beneficiary who comprised a part of a shared group such as a family group, a company group, and so forth
  • the participants would be able to take their own coordinated actions while being relatively secure in their knowledge of what their group counterparts were also likely doing at that time.
  • This survival instruction guide kit could comprise, for example, a book or manual having printing survival instructions and information in combination with fill-in-the-blank opportunities whereby a given authorized beneficiary could customize the instructions to specifically suit their particular needs and situation.
  • Such blanks could be used, for example, to prompt the beneficiary to think through and to record information such as their primary and secondary rally points or other family/group meeting points and protocols, communications protocols and contact information, specific items (perhaps somewhat unique to the individual and which may, or may not, relate to the survival of that individual) that should be stockpiled or otherwise made readily available in the event of a civilly-catastrophic event, and so forth.
  • Such a book or manual could include indexes, tabs, or other navigation tools to permit a reader to quickly find the relevant information they require during a time of need.
  • teachings would also accommodate providing 1203 survival training to authorized beneficiaries.
  • Such training could comprise in-person, on-site training, live instructors, and/or previously prepared teaching resources such as, but not limited to, electronic learning resources.
  • This training could include both general information regarding specific do's and don'ts as pertain to different kinds of civilly-catastrophic events as well as more specific information regarding specific actions that should be taken by the authorized beneficiary with respect to successfully achieving access to their subscribed-to resources as per their subscription.
  • These teachings will also accommodate providing 1204 authorized beneficiaries with a corresponding authorization mechanism by which they can effect their right of access to the resources provided by their subscription.
  • This may comprise a mechanism that the beneficiary carries with them as personal property (such as an identification card) or, for example, a biometric-based identity authentication process that relies upon fingerprints, retinal patterns, or some other relatively unique aspect of the human body.
  • the process 100 provides 104 the authorized beneficiaries with consideration-based access to the non-civil security resources. Notwithstanding the provision of such civil security resources, this step of providing access to such resources can readily comprise providing a plurality of different access opportunities.
  • Such opportunities can differ from one another in any number of ways. For example, these opportunities can differ from one another with respect to the specific resources that are included, the quantity of resources that are included, the duration of time during which the aforementioned access may occur, the conditions under which such access can occur, the manner by which such access occurs (for example, whether civil security provisions are delivered to a given authorized beneficiary (and if so, when, how often, and so forth) or must be picked up by the authorized beneficiary from a given distribution point), and so forth.
  • differing access opportunities could comprise, at least in part, a first access opportunity that provides limited access to no more than a first amount of the civil security resources and a second access opportunity that provides limited access to more than the first amount of the civil security resources.
  • the first amount can be specified, if desired, as a function of a predetermined quantity of the civil security resources and/or as a function of a predetermined amount of time during which the civil security resources are accessed.
  • the second access opportunity could differ from the first access opportunity, at least part, by providing an opportunity to have access to the civil security resources at a time that is temporally subsequent to a time when the first access opportunity provides access to the civil security resources (to thereby provide, for example, for a resupply or replenishment opportunity that supplements an original stock of supplies as might correspond to what is provided pursuant to the first access opportunity).
  • a first access opportunity could provide limited access to only civil security provisions and civil security services while a second, different access opportunity could provide access to both these civil security resources and civil security facilities as well.
  • a first access opportunity that provides limited access to only a limited selection of the civil security provisions and a limited selection of the civil security services comprising information-related services;
  • a second access opportunity that provides limited access to only a limited selection of the civil security provisions and a limited selection of the civil security services comprising both information-related services and transportation services (such as civilly-catastrophic event-based transportation to a civil security provisions distribution facility);
  • a third access opportunity that provides limited access to only a limited selection of the civil security provisions, a limited selection of the civil security services comprising information-related services and transportation services, and a limited selection of the civil security facilities comprising a civil security rally point (or, in other words, an access opportunity that equals that provided by the second access opportunity plus access to the civil security rally point);
  • a given provider of these civil security resources can provide five such access opportunities to comprise the primary offerings to be provided to the authorized beneficiaries.
  • Each such offering can of course command a different corresponding level of consideration (such as, for example, a different corresponding payment to be proffered for each).
  • this process will also optionally accommodate providing a key to authorized beneficiaries to thereby facilitate and permit those authorized beneficiaries to access one or more of the civil security resources during an authorized time of need.
  • a key may comprise a physical item (such as, for example, an identification card or a physical lock key) and/or a non-physical item (such as, for example, a code such as a personal identification number, a password, or the like).
  • this step can comprise (in conjunction with acquiring information, materials, and/or samples from the authorized beneficiary to thereby characterize the biometric of choice) providing instructions to the authorized beneficiary regarding presentation of such a biometric in order to gain the desired access.
  • this step can comprise providing the code to the authorized beneficiary.
  • this step can comprise receiving a code of choice from the authorized beneficiary and then providing confirmation to the authorized beneficiary regarding acceptance of that proffered code.
  • a base line membership for a given authorized beneficiary can bear a corresponding base line price and offer access to a corresponding set of civil security resources.
  • These resources might comprise, for example:
  • Pre-civilly catastrophic event delivery of a short-term supply of survival resources comprising at least nutritional consumables. Hydration supplies can also be provided if desired.
  • This short-term supply can comprise, for example, a sufficient quantity of survival resources to support survival of the corresponding authorized beneficiary for at least a predetermined number of days (such as, for example, a ten day period of time).
  • Pre-civilly catastrophic event access to civil security services comprising consulting services that provide for a preparedness review and inventory as well as preparation of a customized and personalized personal action plan to guide the authorized beneficiary in the event of a civilly-catastrophic event-based time of need.
  • a right to acquire additional civil security provisions (either for current delivery or to be held pending a civilly-catastrophic event-based time of need) and/or to access civil security facilities or additional services.
  • a base line offering can be provided for a relatively modest initial cost and, if and as the authorized beneficiary becomes more learned and experienced with respect to civil security issues and concerns, additional supplemental kinds and levels of protection and security can be subsequently acquired as needed.

Abstract

A plurality of private civil security resources are provided (101). These private civil security resources comprise, at least in part, civil security provisions, civil security facilities, and civil security provisions. Consideration-based private civil security subscriptions are accepted (301) from subscribers with respect to providing civilly-catastrophic event-based access to one or more such resource. That resource is then maintained (303) pending a need to permit subscription-based access to the resource in the event of a catastrophic event.

Description

SUBSCRIPTION-BASED PRIVATE CIVIL SECURITY FACILITATION METHOD
Related Applications
[0001] This application claims the benefit of the filing date of U.S. provisional application numbers 60/829,779 filed October 17, 2006, 60/862,398 filed October 20, 2006, 60/862,718 filed October 24, 2006, 60/863,469 filed October 30, 2006, 60/863,481 filed October 30, 2006, 60/864,302 filed November 3, 2006, and 60/894,350 filed March 12, 2007, which are hereby incorporated in their entirety herein.
[0002] This comprises a continuation-in-part of each of:
[0003] SUB SCRIPTION-BASED PRIVATE CIVIL SECURITY FACILITATION METHOD as filed on March 17, 2006 and having application number 11/384,037;
[0004] SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED MEDICAL SERVICES FACILITATION METHOD as filed on March 30, 2006 and having application number 11/394,350;
[0005] PERSONAL PROFILE-BASED PRIVATE CIVIL SECURITY SUBSCRIPTION METHOD as filed on April 11, 2006 and having application number 11/279,333;
[0006] RADIATION SHELTER KIT APPARATUS AND METHOD as filed on April 24, 2006 and having application number 11/379,929;
[0007] FRACTIONALLY-POSSESSED UNDERGROUND SHELTER METHOD AND APPARATUS as filed on May 2, 2006 and having application number 11/381,247;
[0008] SUB SCRIPTION-B ASED CATASTROPHE-TRIGGERED TRANSPORT SERVICES FACILITATION METHOD AND APPARATUS as filed on May 2, 2006 and having application number 11/381,257;
[0009] SUBSCRIPTION-BASED MULTI-PERSON EMERGENCY SHELTER METHOD as filed on May 2, 2006 and having application number 11/381,265;
[0010] SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED RESCUE SERVICES FACILITATION METHOD AND APPARATUS as filed on May 2, 2006 and having application number 11/381,277; [0011] DOCUMENT-BASED CIVILLY-CATASTROPHIC EVENT PERSONAL ACTION GUIDE FACILITATION METHOD as filed on May 12, 2006 and having application number 11/383,022;
[0012] RESCUE CONTAINER METHOD AND APPARATUS as filed on May 26, 2006 and having application number 11/420,594;
[0013] PURCHASE OPTION-BASED EMERGENCY SUPPLIES PROVISIONING METHOD as filed on June 1, 2006 and having application number 11/421,694;
[0014] SUBSCRIPTION-BASED PRE-PROVISIONED TOWABLE UNIT FACILITATION METHOD as filed on June 12, 2006 and having application number 11/423,594;
[0015] RADIATION-BLOCKING BLADDER APPARATUS AND METHOD as filed on June 19, 2006 and having application number 11/425,043;
[0016] PRIVATE CIVIL DEFENSE-THEMED TELEVISION BROADCASTING METHOD as filed on June 23, 2006 and having application number 11/426,231 ;
[0017] EMERGENCY SUPPLIES PRE-POSITIONING AND ACCESS CONTROL METHOD as filed on July 10, 2006 and having application number 11/456,472;
[0018] PRIVATE CIVIL DEFENSE-THEMED BROADCASTING METHOD as filed on August 1, 2006 and having application number 11/461,605;
[0019] METHOD OF PROVIDING VARIABLE SUBSCRIPTION-BASED ACCESS TO AN EMERGENCY SHELTER as filed on August 1, 2006 and having application number 11/461,624;
[0020] SUBSCRIPTION-BASED INTERMEDIATE SHORT-TERM EMERGENCY SHELTER METHOD as filed on August 7, 2006 and having application number 11/462,795;
[0021 ] SUBSCRIPTION-BASED CATASTROPHE-TRIGGERED RESCUE SERVICES FACILITATION METHOD USING WIRELESS LOCATION INFORMATION as filed on August 7, 2006 and having application number 11/462,845;
[0022] PRIVATELY PROVISIONED SURVIVAL SUPPLIES DELIVERY METHOD as filed on August 15, 2006 and having application number 11/464,751; [0023] PRIVATELY PROVISIONED SURVIVAL SUPPLIES SUB UNIT-BASED DELIVERY METHOD as filed on August 15, 2006 and having application number
11/464,764;
[0024] PRIVATELY PROVISIONED SURVIVAL SUPPLIES ACQUISITION METHOD as filed on August 15, 2006 and having application number 11/464,775;
[0025] PRIVATELY PROVISIONED SURVIVAL SUPPLIES CONTENT ACQUISITION METHOD as filed on August 15, 2006 and having application number 11/464,788;
[0026] METHOD TO PRIVATELY PROVISION SURVIVAL SUPPLIES THAT INCLUDE THIRD PARTY ITEMS as filed on August 15, 2006 and having application number 11/464,799;
[0027] WASTE DISPOSAL DEVICE as filed on August 16, 2006 and having application number 11/465,063;
[0028] SUBSCRIPTION-BASED PRIVATE CIVIL SECURITY RESOURCE CUSTOMIZATION METHOD as filed on August 23, 2006 and having application number
11/466,727;
[0029] PREMIUM BASED PRIVATE CIVIL SECURITY POLICY METHODS as filed on August 24, 2006 and having application number 11/466,953;
[0030] SUBSCRIPTION-BASED MOBILE SHELTER METHOD as filed on September 5, 2006 and having application number 11/470,156;
[0031] METHOD OF PROVIDING A FLOATING LIFE-SUSTAINING FACILITY as filed on September 13, 2006 and having application number 11/531,651;
[0032] PRIVATELY PROVISIONED SUB-UNIT-BASED SURVIVAL SUPPLIES PROVISIONING METHOD as filed on September 15, 2006 and having application number 11/532,461;
[0033] PRIVATELY PROVISIONED INTERLOCKING SUB UNIT BASED SURVIVAL SUPPLIES PROVISIONING METHOD as filed on September 25, 2006 and having application number 11/535,021; [0034] RESOURCE CONTAINER AND POSITIONING METHOD AND APPARATUS as filed on September 26, 2006 and having application number 11/535,282;
[0035] PUBLICLY-FUNDED PRIVATELY FACILITATED ACCESS TO SURVIVAL RESOURCES METHOD as filed on September 29, 2006 and having application number 11/537,469;
[0036] ELECTRICITY PROVIDING PRIVATELY PROVISIONED SUBSCRIPTION- BASED SURVIVAL SUPPLY UNIT METHOD AND APPARATUS as filed on October 9, 2006 and having application number 11/539,798;
[0037] PREMIUM-BASED CIVILLY-CATASTROPHIC EVENT THREAT ASSESSMENT as filed on October 9, 2006 and having application number 11/539,861;
[0038] PRIVATELY MANAGED ENTERTAINMENT AND RECREATION SUPPLIES PROVISIONING METHOD as filed on October 10, 2006 and having application number 11/548,191;
[0039] METHOD TO FACILITATE PROVIDING ACCESS TO A PLURALITY OF PRIVATE CIVIL SECURITY RESOURCE as filed on October 16, 2006 and having application number 11/549,874;
[0040] METHOD OF PROVIDING BEARER CERTIFICATES FOR PRIVATE CIVIL SECURITY BENEFITS as filed on October 18, 2006 and having application number 11/550,594;
[0041] METHOD FOR CIVILLY-CATASTROPHIC EVENT-BASED TRANSPORT SERVICE AND VEHICLES THEREFOR as filed on October 19, 2006 and having application number 11/551,083;
[0042] METHOD FOR PROVIDING PRIVATE CIVIL SECURITY SERVICES BUNDLED WITH SECOND PARTY PRODUCTS as filed on October 30, 2006 and having application number 11/554,452;
[0043] SYSTEM AND METHOD FOR A PRIVATE CIVIL SECURITY LOYALTY REWARD PROGRAM as filed on November 1, 2006 and having application number 11/555,589;
[0044] SUBSCRIPTION BASED SHUTTLE METHOD as filed on November 2, 2006 and having application number 11/555,896; [0045] METHOD AND SECURITY MODULES FOR AN INCIDENT DEPLOYMENT AND RESPONSE SYSTEM FOR FACILITATING ACCESS TO PRIVATE CIVIL SECURITY RESOURCES as filed on November 3, 2006 and having application number 11/556,520;
[0046] METHOD OF PROVIDING SURVIVAL SUPPLIES CONTAINER WITH AN ILLUMINATION APPARATUS as filed on November 13, 2006 and having application number 11/559,278;
[0047] the contents of each of which are fully incorporated herein by this reference.
Technical Field [0048] This invention relates generally to providing survival-related services.
Background
[0049] Many citizens of the world have long passed the point when a ready availability of the basic necessities of life is satisfactory in and of itself. Today's consumer-oriented citizens demand, and often receive, an incredibly diverse and seemingly ever-growing cornucopia of consuming and experiential options. Such riches are typically based, in turn, upon a highly interdependent series of foundational infrastructure elements. Examples of the latter include, but are certainly not limited to:
[0050] transportation infrastructure such as roads, bridges, railways, and so forth that facilitate the inexpensive and rapid movement of sometimes perishable goods from source to consumer;
[0051] communications infrastructure such as telephones, television, radio, and the Internet that facilitate the inexpensive and rapid sharing of news, advice, information, and entertainment; and
[0052] the totality of civil services such as police services, fire fighting services, medical services, and so forth that facilitate a sufficient degree of order and predictability to, in turn, permit the complex series of inter-related actions that modern society requires in order to operate.
[0053] As powerful as the machinery of modern life appears, however, modern citizens are today perhaps more at risk of experiencing a serious disruption in their ability to prosper or even to survive en mass than is generally perceived. Providing the necessities of life in general requires a lot of things to all operate, more or less, correctly. To put it another way, a serious disruption to any significant element of civilized infrastructure can produce catastrophic results for a broad swath of a given civil entity. Any number of natural and/or human-caused events can greatly disrupt society's infrastructure and corresponding ability to provide one or more life-sustaining resources such as water, nutrition, shelter, and the like.
[0054] Many people believe and trust that their government (local, regional, and/or national) will provide for them in the event of such a civilly-catastrophic event. And, indeed, in the long view such is clearly a legitimate responsibility owed by any government to its citizens. That such is a consummation devoutly to be wished, however, does not necessarily make it so. Hurricane Katrina provided some insight into just how unprepared a series of tiered modern governmental entities may actually be to respond to even basic survival needs when a civilly-catastrophic event occurs. To a large extent one may reasonably argue that governments have forsaken their responsibility to design, fund, implement, or even discuss an effective civil defense program capable of protecting large segments of their populations.
[0055] Such insights, of course, are not particularly new. Civil preparedness shortcomings occasionally attract public attention and niche marketing opportunities exist with respect to provisioning the needs of so-called survivalists. Indeed, there are those who spend a considerable amount of their time and monetary resources attempting to ready themselves to personally survive a civilly-catastrophic event. Therein, however, lies something of a conundrum.
[0056] On the one hand, modern governments typically do little to proactively ensure the bulk survival (let alone the comfort) of their citizens in the face of most civilly-catastrophic events. On the other hand, attempting to take responsible actions to reasonably ensure one's own safety and security can become, in and of itself, nearly a full-time avocation and leave little time to actually enjoy the conveniences and opportunities of modern life. Such individual actions may even be frowned upon by the greater part of society which has grown accustomed and falsely secure with existing efficient just-in-time delivery systems that provide the illusion of plenty while undercutting the perception of risk.
[0057] As a result, many (if not most) individuals and their families are largely bereft of access to survival resources that they will need should a civilly-catastrophic event befall them. This shortcoming tends to be relatively comprehensive; most people have ready access to neither a sufficient selection of survival supplies nor a sufficient quantity. For people who do have a store of supplies set aside against such an eventuality, it can be a considerable burden to maintain and ensure the freshness, vitality, and usability of those supplies. At the same time, the same civilly-catastrophic event that occasions their need for supplies will also likely disrupt relevant supply chains enough to cause a partial or complete shortage of supplies at their local merchants. The unfortunate net result is a relatively near term severe need for a variety of survival supplies that will often go unmet for lengthy periods of time.
[0058] Such persons are also largely without many options when faced with civilly- catastrophic conditions that create a concurrent need for shelter, evacuation, and/or rescue. For example, in many cases, the only available shelter comprises a public facility such as a school, auditorium, or sports venue on the one hand or ad hoc accommodations obtained at a hotel or via a charity or one's own social network. In some cases, such options may be adequate. In many other cases, however, such options quickly prove inadequate or even dangerous in and of themselves.
Brief Description of the Drawings
[0059] The above needs are at least partially met through provision of the subscription- based private civil security facilitation method described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
[0060] FIG. 1 comprises a flow diagram as configured in accordance with various embodiments of the invention;
[0061] FIG. 2 comprises a schematic block diagram view as configured in accordance with various embodiments of the invention;
[0062] FIG. 3 comprises a flow diagram as configured in accordance with various embodiments of the invention;
[0063] FIG. 4 comprises a flow diagram as configured in accordance with various embodiments of the invention;
[0064] FIG. 5 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;
[0065] FIG. 6 comprises a schematic block diagram as configured in accordance with various embodiments of the invention; [0066] FIG. 7 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;
[0067] FIG. 8 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;
[0068] FIG. 9 comprises a schematic block diagram as configured in accordance with various embodiments of the invention;
[0069] FIG. 10 comprises a flow diagram as configured in accordance with various embodiments of the invention;
[0070] FIG. 11 comprises a top plan block diagram view as configured in accordance with various embodiments of the invention; and
[0071] FIG. 12 comprises a flow diagram as configured in accordance with various embodiments of the invention.
[0072] Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Detailed Description
[0073] Generally speaking, pursuant to these various embodiments, a plurality of private civil security resources are provided. These private civil security resources comprise, at least in part, civil security provisions, civil security facilities, and civil security services. By one approach, consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining or civil security resource. That resource is then maintained pending a need to permit subscription-based access to the resource in the event of a catastrophic event. Authorized beneficiaries are then provided with consideration-based access to this plurality of private civil security resources.
[0074] The private civil security provisions can comprise various life-sustaining resources as pertain to various categories of life's necessities, including, for example, breathable air, water, food, and protective clothing. The nature of the subscribed-to resource can vary with the needs or requirements of a given application setting but may comprise one or more of a consumable necessity of human life, a non-consumable necessity of human life, shelter, transportation to effect the above-mentioned access, and/or rescue, to note but a few useful examples. Deployable shelters can also be included if desired. By one approach, non- civil security resources (such as, but not limited to, luxury items) can also be provided if desired to supplement such staples.
[0075] The civil security facilities can comprise various facilities as have application with respect to protecting such authorized beneficiaries from the effects (including the aftermath, if any) of a civilly-catastrophic event and other dangerous or unpleasant environmental or external influences and forces. The facilities can include, for example, such things as civil security shelters (including both short term and longer term facilities), transportation rally points, trans-shipment facilities and/or distribution facilities for civil security provisions, medical services facilities, training facilities, and so forth.
[0076] The civil security services can similarly comprise any of a wide variety of services as have application with respect to protecting such authorized beneficiaries. Exemplary services include, but are not limited to, civil security information services (including information that is both generally and specifically appropriate for individual ones of the authorized beneficiaries), transportations services, rescue services, and so forth.
[0077] So configured, authorized beneficiaries will have concrete, predictable access to various categories of privately supplied civil security resources. These steps are readily facilitated without dependency upon (and perhaps even in spite of) governmental oversight, participation, or control. The particular resources provided can vary with the needs and requirements of the authorized beneficiaries. Importantly, via these teachings individuals can benefit from a greatly increased opportunity to bring a considerably improved measure of security into their lives, knowing that, should a civilly-catastrophic event indeed be visited upon them, they will have extraordinary and reliable access to privately facilitated civil security resources.
[0078] These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to FIG. 1, a corresponding process 100 provides a plurality of private civil security resources. As used herein, "private" will be understood to refer to the opposite of public ownership or control (as exemplified by governmental or ecclesiastical ownership or control) but can include such things as ownership or control via publicly traded ownership (via, for example, publicly traded stock or the like), ownership or control via a not-for-profit entity, or the like.
[0079] The plurality of private civil security resources can vary to some degree with respect to category and kind of resource. By one approach, however, such resources will comprise, at least in part, civil security provisions, civil security facilities, and civil security services. Generally speaking, both the civil security provisions and civil security facilities are physical components rather than virtual components or products of the intellect. For example, the civil security provisions will typically comprise physical support and/or protection of one kind of another. Similarly, the civil security facilities will also typically comprise physical assets such as, but not limited to, physical shelters that provide real, substantive physical protection from physical threats to human life. Additional details in this regard are provided below. Also as described in more detail below, however, the civil security services can comprise either physical real world services or virtual-content services.
[0080] These civil security provisions can comprise, for example, a plurality of life- sustaining resources as pertain to a plurality of differing categories of life's necessities. Referring momentarily to FIG. 2, examples in this regard include, but are not limited to, such elemental staples as water 201 (which can comprise water in a pure or impure state and/or other water-based palatable fluids), food 202 (which can comprise a wide variety of raw to highly processed food, nutritional supplements, and so forth, and protective clothing 203 (where "protective" will be understood to refer to protection against one or more potentially hazardous environmental influences such as temperature extremes, precipitation, high velocity winds, and the like but not to matters of fashion, social comment, or the like).
[0081] These civil security provisions 200 can further optionally include such components as breathable air 204 (which may comprise, for example, a fresh air supply, an oxygen supply (including but not limited to oxygen generators such as, but not limited to, chemical oxygen generators that often produce oxygen as part of a corresponding exothermic reaction) that can serve as a source of oxygen to mix with other atmospheric components, and/or personal or area air filters that serve to remove harmful airborne contaminants from the air prior to being inhaled by an authorized beneficiary), deployable shelters 205 (where "deployable" will be understood as referring to portable shelters such as tents, canopies, inflatable structures, and the like), and other items 206 as may be appropriate to meet the needs of a given application setting.
[0082] By one approach, these civil security provisions can be so provided in an aggregated form. Such might be the case, for example, when accumulating such material at a warehouse or the like. These teachings will also accommodate, however, forming such civil security provisions into corresponding units of civil security provisions. To illustrate, one such unit of civil security provisions as intended, for example, for a single authorized beneficiary might comprise, at least in part, consumable fluids, foods, medical supplies, personal hygiene supplies, and environmental threat abatement supplies (such as, for example, breathing masks, hazardous materials handling garb, and the like).
[0083] Such a unit of civil security provisions might comprise, for example, a short term unit that comprises a quantity and variety of civil security supplies that are adequate to sustain life for that one authorized beneficiary for, say, at least about thirty days but no more than, say, about one year.
[0084] Those skilled in the art will recognize and understand that there are various ways by which such adequacy can be determined, measured, and/or established. For example, by one approach, the adequacy of any food contents can be determined as a function of a particular target caloric intake per person on a per day basis. Similarly, the adequacy of any consumable fluid contents could be determined as a function of a particular target quantity intake per person on a per day basis.
[0085] The particular time frames suggested in the above examples are intended only to serve an illustrative purpose and are not to be construed as limitations with respect to the practice of these teachings. Those skilled in the art will also appreciate and understand that such a unit of civil security provisions can comprise a quantity of supplies that are intended to support more than one authorized beneficiary for the given period(s) of time. For example, such a unit might comprise a family unit that contains sufficient contents to adequately sustain life for a family of four authorized beneficiaries.
[0086] These teachings will also accommodate providing civil security provisions that differ from one another in ways other than by category or kind. For example, both branded and generic versions (or other differentiators with respect to quality) of a same kind of item can be selectively provided if desired. Some particular examples in this regard now follow (it being understood that these examples are provided for illustrative purposes and are not intended to comprise an exhaustive listing of such possibilities).
[0087] Provision or supply cache locations may be disguised by fabricating their external appearance to include, for example, a sewer drain or manhole cover that could be removed or opened to provide access to a cache of supplies or provisions therein, including both consumable and non-consumable supplies. As with the disguised shelter discussed below, the manhole covers or drains could exist in plain sight, while still disguising the storage container and/or the container's point of entry. The provisions may comprise a long-term, medium-term, or short-term amount of supplies. Further, the provisions may be parceled or bundled, for example, into individual or family packs or the like. The interior of the storage container may include an interior door and/or locking mechanism to keep the container secure.
[0088] As noted, these teachings provide for offering access to civil defense benefits via a subscription-based process. This can include, as noted, providing access to various and sundry survival supplies in survival packs in response to a civilly-catastrophic event having occurred. The specific nature of the supply packs as well as the constituency of the emergency supplies therein can vary with the needs and/or requirements as characterize a given application setting. For example, supply packs may be customized for a particular period of time, gender, age group, or other specialized need, such as, for example, specific nutritional or corporate requirements. Particular needs can be identified and categorized and then a supply pack can be created and provided to address the particular need. Examples of such specialty supply packs may include, for example, short-term, medium-term, or long- term packs for various time periods, male or female packs, infant and child packs, automobile (or other vehicle) packs, corporate packs, communication packs, aircraft packs, and so forth.
[0089] By one approach a supply of emergency materials can be provided to a given authorized beneficiary well prior to any civilly-catastrophic event. At least some of these supplies, however, are likely to have a limited shelf life. If desired, these teachings will accommodate the provision of a service to visit an authorized beneficiary's home, office, storage space, or other location of choice on a set or more casual basis (for example, once a week, once a month, once a year, once every five years, or whatever time frame makes sense in a given application setting) so that the pre-positioned goods that are owned, leased, or otherwise in the possession or control of authorized beneficiaries can be monitored, inspected, repacked, altered, and/or rotated to ensure that these supplies remain fresh, appropriate, up-to-date, and available should a need for their use arise. Such a service may include substitutions, straight swaps, additions, or subtractions of goods and equipment so that the provisions are substantially optimized. The service personnel visiting the authorized beneficiary and monitoring the provisions may use a standardized checklist or other standard to determine whether the supply of provisions should be modified. In addition, the provisions may also be altered based on an updated or revised risk assessment for the authorized beneficiary. The provisions supplied to the authorized beneficiary may be customized according to the needs and/or preferences of the authorized beneficiary, which may include providing provisions and supplies based on the projected risk for the authorized beneficiary. People in different regions of the country, for example, will have different risk profiles based on where they live, and will therefore require different levels or types of protection, as reflected in the contents of their supply of emergency provisions. If the authorized beneficiary's circumstances or environment changes such that the risk profile for the authorized beneficiary changes, the personnel monitoring the authorized beneficiary's supply of provisions can modify the supply accordingly, such that the authorized beneficiary is well- prepared. The contents of the provision supply may also facilitate the conversion of the authorized beneficiary's home into a sustainable shelter.
[0090] In one illustrative example, and referring now to FIG. 3, these teachings provide generally for accepting 301 consideration-based private civil security subscriptions from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource or civil security resource (or, if desired, to a plurality of different kinds and/or categories of life-sustaining resources) such as, but not limited to, resources pertaining to hydration, nourishment, shelter, environmentally borne threat abatement (such as protection from chemical, biological, and/or radioactive threats and the like), transportation, and/or rescue services. This life-sustaining resource (or resources) can comprise, for example, a consumable necessity of human life (i.e., a necessity such as nourishment that tends to be reduced in supply as it is consumed) and/or a non-consumable necessity of human life (i.e., a necessity such as shelter that is not necessarily reduced in supply as it is applied or used).
[0091] This right of access can pertain, if desired, to a predetermined quantity of the life- sustaining resource. For example, a given subscription can relate to providing access to a one year's supply of the at least one life-sustaining resource for a given individual, number of individuals, or the like.
[0092] By one approach, these subscriptions may be accepted by, for example, a for- profit business. By another approach a not-for-profit business (such as a membership-based entity) may be the appropriate entity to offer and accept such subscriptions. As used herein, the term "subscription" shall be understood to refer to and encompass a variety of legal mechanisms. Some relevant examples include, but these teachings are not limited to, subscription mechanisms such as: time-limited rights of access (as where a subscription provides access rights for a specific period of time, such as one year, in exchange for a corresponding series of payments); event-limited rights of access (as where a subscription provides access rights during the life of a given subscriber based upon an up-front payment in full and where those access rights terminate upon the death of the subscriber or where, for example, a company purchases a subscription for a key employee and those corresponding rights of access terminate when and if that key employee leaves the employment of that company); inheritable rights of access (as may occur when the subscription, by its own terms and conditions, provides a right of access that extends past the death of a named subscription beneficiary and further allows for testate and/or intestate transfer to an heir); rights of access predicated upon a series of periodic payments (as where a subscription provides access rights during, for example, predetermined periods of time on a periodic basis as where a subscriber offers month-by-month payments to gain corresponding month-by-month access rights); rights of access predicated upon a one-time payment (as may occur when a subscriber makes a single payment to obtain a time-based or event-based duration of access rights or, if desired, when a single payment serves to acquire a one-time right of access or a perpetual right of access that may be retained, transferred, inherited, or the like); ownership-based rights of access (as may occur when the subscription provides for ownership rights with respect to the civil security resources, when the subscription is based upon shareholder-based ownership of the provider of such civil security resources, or the like); non-transferable rights of access (as may occur when the subscription, by its terms and conditions, prohibits transfer of the right of access to the civil security resources from a first named beneficiary to another); transferable rights of access (as may occur when the subscription, by its terms and conditions, permits conditional or unconditional transfer of the right of access to the at least one life-sustaining resource from a first named beneficiary to another); membership-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a membership interest with respect to the accorded right of access such as, for example, a club-based membership); fractionally-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a divided interest by and between multiple subscription beneficiaries with respect to a right to access the civil security resources); non-ownership-based rights of access (as may occur when the subscription, by its terms and conditions, establishes the aforementioned right of access via, for example, a lease, a rental, or borrowing construct); option-based rights of access (as may occur when the subscription, by its terms and conditions, establishes a right for an authorized beneficiary to later obtain access to some or all such civil security resources upon, for example, paying an additional supplemental amount at that time); and/or credit-based rights of access (as may occur when a given individual predicates their right to access the civil security resources upon a representation, promise, or other credit-based transaction).
[0093] As discussed, consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource, with "subscription" referring to and encompassing a variety of legal mechanisms. One such type of subscription may include ownership-based rights of access. As one type of ownership-based subscription, an individual(s) may be offered the opportunity to obtain civil defense services by way of becoming a shareholder of an organization that either provides privatized civil defense services or contracts to receive such services. Instead of paying for membership by way of an established fee structure, membership, or subscription, a person may buy a share(s) entitling them to a level of privatized civil defense services.
[0094] Along these same lines, memberships or subscriptions to privatized civil defense networks can come in a variety of forms, including equity and non-equity subscriptions. An equity subscription includes a tangible ownership stake in the organization such that at some point in the future, such as when a subscriber chooses to discontinue the subscription, the subscriber is able sell the subscription to another person (the new subscriber) or the subscription organization itself buys the subscription back from the subscriber and then resells it to a new subscriber(s). Similarly, a non-equity subscription does not usually entail a direct economic interest in the subscription, such that when a non-equity subscriber leaves their subscription they receive nothing. In both instances, the subscription may require an upfront payment upon either submitting an application to become a subscriber, or at the time the subscription has been granted. Similarly, additional economic payments or dues may be required on a minute-by-minute, hourly, daily, weekly, monthly, quarterly, yearly, or other basis.
[0095] As discussed, consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource, with "subscription" referring to and encompassing a variety of legal mechanisms. By one approach, the subscription to services provided by a privatized civil defense provider may be legally designed to be an asset of the subscriber. The subscription would then be treated as an asset, just like real estate, cash, a business, inventory, and stock, for example, from an estate or portfolio planning standpoint. As part of an estate or portfolio this subscription asset would be designed to be passed along, liquidated, turned back in, and so forth.
[0096] If desired, a plurality of differentiated subscription opportunities can be offered in this regard. This plurality of differentiated subscription opportunities can correspond, for example, to providing access to differing selections and/or quantities of the civil security resources or life-sustaining resource supplies. As but one very simple illustration in this regard, such subscription opportunities can differ from one another at least with respect to cost. This, in turn, provides subscriber choice with respect to selecting a particular subscription that best meets their specific needs and/or budget limitations. For example, one subscription can provide for accessing life-sustaining resources that, though nutritionally viable, are economically selected while another subscription might provide for life-sustaining resources that are more costly and in turn reflect, for example, a wider variety of choices within a given category of resource.
[0097] As mentioned, an authorized beneficiary may subscribe to a variety of benefits, with a variety of payment plans and/or fee structures associated with the type, quantity, and/or duration of the benefits and services. By one approach, a subscriber may be provided with life-sustaining resources, such as provisions, shelter, rescue, and transport, for example, in which certain parameters regarding the resources are unlimited or unrestricted. For example, the length of time of the provided benefits, the volume of the resource, the quality of the resource, and the variety of the resource may all be unlimited or unrestricted. One or more of these unlimited/unrestricted parameters (time, volume, quality, variety) may be applied in a given subscription, such that a multitude of different coverages are available. For example, some variations may include: a subscription that includes coverage for an undefined period of time and the volume, quality, and variety of the supplies are not limited; a subscription that includes coverage for an undefined period of time but the volume, quality, and variety of supplies are limited; a subscription that includes coverage for an undefined period of time and the volume and quality of the supplies are not limited, but the variety of supplies is limited; a subscription that includes coverage for an undefined period of time and the volume of the supplies is not limited, but the quality and variety of the supplies are limited. Many other such combinations exist.
[0098] These teachings also readily encompass the notion of a given subscriber providing such a subscription for an authorized beneficiary other than themselves. Such might occur, for example, when one family member procures such a subscription for one or more other family members. Another example would be for a company to subscribe on behalf of named key employees, family members of such key employees, and so forth. Other examples no doubt exist. For example, a bearer certificate (or its legal or functional equivalent, such as a gift card) could serve to identify any individual who produces and bears that certificate as an authorized beneficiary. [0099] By one approach, such access can be provided at the whim and convenience of the authorized beneficiaries. If desired, however, such access can be further conditioned in appropriate ways. For example, for many purposes and certainly as pertains to many of the civil security resources it may be appropriate to ordinarily limit such access to situations where such access is triggered, at least in part, by a civilly-catastrophic event having occurred or being likely imminent. Such access may be predicated, if desired, upon a requirement that the civilly-catastrophic event be one that persists in substantial form for more than a predetermined period of time (such as one hour, one day, one week, and so forth) or that causes at least a predetermined amount or degree of infrastructure impairment or other measurable impact of choice (such as a particular level or degree of harm, interference, or negative impact upon a given minimum number of people). In addition, or in lieu thereof, such access may be predicated, if desired, upon a requirement of a particular level of objectivity or subjectively ascertained likelihood that a particular category or kind of civilly- catastrophic event will occur within a particular period of time.
[00100] As used herein, "civilly-catastrophic event" will be understood to refer to an event that substantially and materially disrupts a society's local, regional, and/or national infrastructure and ability to provide in ordinary course for the at least one life-sustaining resource. Such a civilly-catastrophic event can include both a precipitating event (which may occur over a relatively compressed period of time or which may draw out over an extended period of time) as well as the resultant aftermath of consequences wherein the precipitating event and/or the resultant aftermath include both the cause of the infrastructure interruption as well as the continuation (or worsening) of that interruption.
[00101] A civilly-catastrophic event can be occasioned by any of a wide variety of natural and/or non-naturally-caused disasters. Examples of natural disasters that are potentially capable of initiating a civilly-catastrophic event include, but are not limited to, extreme weather-related events (such as hurricanes, tsunamis, extreme droughts, widespread or unfortunately-targeted tornadoes, extreme hail or rain, and the like, flooding, and so forth), extreme geological events (such as earthquakes, volcanic activity, and so forth), extreme space-based events (such as collisions with comets, large asteroids, and so forth, extreme solar flares, and the like), extreme environmental events (such as widespread uncontrolled fire or the like), and global or regional pandemics, to note but a few. [00102] Examples of non-naturally-caused disasters capable of initiating a civilly- catastrophic event include both unintended events as well as intentional acts of aggression such as war, terrorism, madness or the like. Examples of non-naturally-caused disasters capable of such potential scale include, but are not limited to, nuclear-related events (including uncontrolled fission or fusion releases, radiation exposure, and so forth), acts of war, the release of deadly or otherwise disruptive biological or chemical agents or creations, exposure to harmful mutagenic influence, and so forth.
[00103] In addition, or in lieu thereof, such access can be further conditioned upon other criteria of interest or concern in a given application setting. Such conditional access can be absolute (as when a given individual may be granted or denied any access to any of the civil security resources) or may be relative (as when a given individual is granted or denied access to certain of the civil security resources while being allowed access to certain other of the civil security resources). As a simple illustrative example in this regard, a given individual may habitually and consistently exhibit highly anti-social behaviors; in such a case, the provider of such civil security resources may be willing to provide such a person with civil security provisions but may be reluctant to permit this person to have access to a long term shelter where a certain amount of social buoyancy and ability to compromise with others may be important to the long term ability of that facility to successfully protect its inhabitants.
[00104] A very wide variety of criteria can be potentially considered for such purposes. A few illustrative examples would include, but are not limited to, an authorized beneficiary's qualifications (based upon their experiences, aptitude testing, physical condition and capabilities, or the like), measured intelligence (based upon, for example, a traditional intelligence quotient (IQ test or the like), psychological test results, behavioral rest results, behavioral test results, race, nationality citizenship, ancestry, sexual orientation, gender, age, health, political beliefs and/or agenda, educational background, professional title, financial backing, athletic ability, mechanical ability, skills, and/or relationship to a third party entity with whom reciprocal relations regarding the provisions/facilities/services mutually agree to extend civilly-catastrophic event-based reciprocal access to one another's authorized beneficiaries).
[00105] As suggested previously, in addition to accepting 301 a subscription with respect to providing civilly-catastrophic event-based access to one or more consumable or non- consumable life-sustaining or civil security resources, a given subscription may also provide for similar access to at least one non-civil security resource or non-necessity 302 (that is, an item or service that is not, strictly speaking, necessary to sustain human life on an elemental basis). In such a case, this process 300 will then also maintain 303 the additional resource and permit access 305 to these non-civil security resources as well. An illustrative listing of representative non-necessities or non-civil security resources comprises, but is certainly not limited to: a luxury consumable (such as, for example, alcoholic beverages, foods that provide an experience beyond simple survival, and so forth); a luxury non-consumable; clothing; a food preparation tool; a personal communication device; a personal hygiene item; non-human nourishment (such as dog food, cat food, and so forth); barter medium (such as bulk or coined precious metals including but not limited to gold, silver, and so forth); an electrical energy source (including but not limited to alternating current power sources, direct current power sources, fuel-consumptive power sources, renewable fuel source power sources, and so forth); an entertainment apparatus (such as game stations, musical instruments, reading material, and so forth); an educational tool (including but not limited to instructional texts, reference works, laboratory and demonstrative equipment, and so forth); physical conditioning, exercise, and maintenance training and equipment; repair and maintenance tools and services; crafts supplies and training; and/or sports equipment and facilities; to note but a few examples.
[00106] This process 300 then provides for maintaining 303 the resource(s) pending a need to permit subscription-based access to the resource(s) in response to the occurrence of a catastrophic event. This, of course, can comprise maintaining the resource on behalf of the subscriber and/or on behalf of another authorized beneficiary. The specifics of such maintenance will of course vary with respect to the nature of the resource or resources being maintained.
[00107] As one example, and referring momentarily to FIG. 4, when the resource (or resources) comprise one or more predetermined consumable necessities of human life, maintaining 303 the resource can comprise acquiring 401 the at least one predetermined consumable necessity of human life to thereby provide acquired necessities and then storing 402 those acquired necessities to thereby provide stored necessities that are held on behalf of the corresponding authorized beneficiaries pending a need to access those stored necessities in the event of a triggering civilly-catastrophic event. These acquisition and storing steps can further comprise, if desired, acquiring and storing non-consumable necessities of human life and/or consumable or non-consumable non-necessities of human life.
[00108] Acquisition 401 of such items can be achieved through any of a variety of means. By one approach the items may be procured on the open market. By another approach the items may be purchased or otherwise acquired from third parties via private negotiations. By yet another approach the entity that provides and accepts these subscriptions may itself create (through manufacturing, farming, or the like) the items of interest. In some cases the acquired item may comprise a staple of ordinary commerce. In other cases the acquired item may be unique and/or proprietary to the acquiring/storing entity.
[00109] Referring again to FIG. 1, the civil security facilities will typically comprise physical assets that tend, categorically, to comprise part of a private civil security infrastructure. Such civil security facilities will typically comprise physical assets that tend, categorically, to comprise part of a private civil security infrastructure. Such civil security facilities can, therefore comprise, for example: one or more civil security shelters; one or more rally points (at which authorized beneficiaries can gather in response to a civilly-catastrophic event in order to receive certain civil security services such as transportation to another civil security facility such as a shelter or at least to a location that is away from a location that presently (or imminently) lacks civil security (due, for example, to a civilly-catastrophic event, its aftermath, or both)); a location where at least some of the authorized beneficiary's civil security provisions are available (such as a metropolitan, local, regional, and/or national distribution facility); a trans-shipment facility for at least some of the civil security provisions (where, for example, dis-aggregate provisions are brought and then parsed and aggregated into corresponding units of provisions destined for particular recipient authorized beneficiaries); a medical services facility; and so forth, to note but a few relevant examples in this regard.
[00110] The teachings will readily accommodate a wide variety of civil security shelters. For example, this process 100 can provide for both temporary civil security shelters and longer term civil security shelters. A temporary civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively short period of time. For example, such a temporary shelter might prove sufficient in this regard for, say, no more than about ten inhabitants for no more than about one week, ten days, 15 days, and the like. Generally speaking, a temporary shelter such as this is designed and intended to only serve as a temporary refuge from the effects of a civilly- catastrophic event. Should longer term accommodations be necessary in a given instance, the inhabitants of such a temporary shelter will often be better served to move to a longer term civil security shelter.
[00111] A long term civil security shelter will be understood to comprise a shelter that is configured and arranged to adequately shelter and sustain human life for a relatively longer period of time. For example, such a temporary shelter might prove sufficient in this regard for, say, no more than about 100 inhabitants for up to about three months, six months, one years, or the like. (Again, such numeric examples serve an illustrative, rather than limiting, purpose only.)
[00112] These teaching will also readily accommodate the provision of a longer term civil security shelter up to and including an indeterminate term civil security shelter that is configured and arranged to adequately shelter and sustain human life for an indeterminately long period of time. A shelter of this type will typically be characterized not only by an ability to protect its inhabitants against the rigors of the local environment and to contain a relatively large and varied supply of provisions, but by an ability to exist and operate in a fully or at least substantially independent manner. This can relate in particular to an ability to create and/or otherwise replace its consumable provisions (by, for example, growing food, creating power, and so forth).
[00113] It is also possible for such shelters to differ from one other in other ways. For example, such shelters may differ with respect to the non-survival related amenities that are provided. These differences can relate to categories of amenities (such as educational facilities, workshop facilities, food preparation facilities, communication facilities, entertainment and/or recreation facilities, or the like) and/or to a relative level of perception of quality, comfort, convenience, or the like.
[00114] As discussed, the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource. One such life- sustaining resource may comprise a shelter. A shelter may be configured, arranged, located, and/or provisioned and operated as a short term facility, a medium-term facility, a long term facility, or as all three. By one approach, the shelter may comprise a manmade island location. For example, a civil security provider may create an island in a body of water, such as a lake, sea, ocean, river, or other body of water that would provide isolation. If desired, the island may be built in international waters to thereby locate the shelter outside the purview and laws of all nations.
[00115] By another optional approach, shelter locations may be disguised by fabricating their external appearance to include, for example, a sewer drain or manhole cover that could be removed or opened to provide access to the remainder of the shelter located underground. The interior of the shelter may optionally include an interior door and/or locking mechanism to keep the shelter secure. In some instances, the sewer drain may also be functional in that the drain could accept water through the opening and divert it outside of the shelter and into, for example, a storm sewer, thereby keeping the interior of the shelter free of accumulated water. If desired, a false manhole cover could serve as the actual entrance to the shelter. Such manhole covers or drains could exist in plain sight, while still disguising the shelter and/or the shelter's point of entry.
[00116] By one approach, a civil security provider may provide a fortified building in an urban center that is constructed and fortified to withstand many manmade or natural disasters. The fortified building would then be made available to subscribers in a time of need, and its location in an urban center facilitates access to the facility to those that may be trapped in the city. The facility may serve as a short, medium, or long term shelter, and may also serve additional civil security functions, such as a communications center or storage facility, for example. The facility may include significant physical security, extensive underground facilities, and radiological, biological, chemical, and EMP protection. The facility may also include redundant systems, including electrical systems, water systems, positive air flow systems, and so forth to provide further protection.
[00117] As discussed, a civil security provider may provide a shelter to house authorized beneficiaries during and/or after a civilly-catastrophic event and protect the inhabitants from environmental stress and extremes. By one approach, the shelter may comprise a self- sufficient shelter, such as a farm, that could grow crops to provide food for the occupants of the shelter. The self-sufficient shelter could also maintain animals, livestock and/or fish- stocked water sources, with the animals and fish able to serve a variety of purposes. The animals may provide motive force for other constructs (such as plows, wagons, buggies, and so forth). Animals such as dairy cattle, dairy goats, chickens, and so forth can serve as a source of fresh food products. Fish and animals such as cattle, chickens, pigs, and so forth can serve as direct (and renewable) food sources. The self-sufficient shelter can be constructed by retrofitting an existing working farm, or by building a farm. Further, the self- sufficient shelter may have its self-sustaining features customized based on the unique location of the shelter. For example, one self-sufficient shelter may be located on a parcel of land conducive to farming, while another self-sufficient shelter may be located underground and provisioned with artificial light and hydroponic gardens to grow crops. The self- sufficient shelter may be optionally configured for a greenhouse or biosphere environment, with the use of farming techniques conducive to the type of environment.
[00118] The aforementioned civil security services can comprise any of a relatively wide variety of offerings. Some examples include, but are certainly not limited to: transportation services (where such transportation services are not ordinary mass or individual transit services but instead represent, for example, services that are designed, scheduled, and deployed to effect transportation of dispossessed persons away from a location that substantially lacks civil security (such as an area afflicted by a civilly-catastrophic event); civil security information (including both civil security information that is generally appropriate for a large number (or all) of the authorized beneficiaries (such as civil security preparedness training or the like) as well as information that is specifically appropriate for individual ones of the authorized beneficiaries (such as personal contingency instructions that are formed and provided to guide specific authorized beneficiaries during a time of need regarding particular actions and behaviors that such specific individuals should take and observe when responding to a civilly-catastrophic event as well as consulting services that assist such individuals with respect to fortifying their relative positions and/or otherwise better protecting themselves against the effects of various civilly-catastrophic events); communications services, including long distance communication services (including, for example, wireless-based services) that are configured and arranged to provide substantially persistent communication services notwithstanding interaction of the long distance communication service with the effects of a civilly-catastrophic event (which may include, for example, satellite-based communications, quickly deployed wireless base stations (that comprise, for example, mobile terrestrial platforms, aerial platforms and so forth), and the like); civil security rescue services to facilitate, for example, retrieving selected authorized beneficiaries from dangerous circumstances that are owing, at least in part, to a substantial lack of civil security (including, for example, immediate threats posed by life-threatening influences such as fire, collapsed buildings, lawless unpoliced individuals, and the like as well as less-immediate threats (such as starvation, dehydration, infection, or the like) that can follow a substantial failure of civil infrastructure; civil security delivery services to provide for deliveries to authorized beneficiaries or the like of such things as their corresponding civil security provisions, fuel, and so forth; civil security medical services (including but not limited to both fixed location and mobile services); civil security physical security services (to provide, for example, physical security (such as guards, fences, and other barriers, surveillance equipment, and so forth) for residences, businesses, and other physical property of interest to an authorized beneficiaries); independent utilities facilities installation services (to provide, for example, for the installation of fuel-burning generators, renewable energy-based power generators, propane-based heating plants, and so forth at, for example, the residences and businesses of authorized beneficiaries); and/or post-civilly-catastrophic event social relationship facilitation services (to facilitate rebuilding social networks, friendships, partnerships, and romantic relationships for the survivors of civilly-catastrophic events); and so forth, to note but a few relevant examples.
[00119] To facilitate the timely and efficient provision of medical services, a national network or database can be created to identify and monitor all emergency medical service (EMS) resources, including personnel, specialists, equipment, specialized equipment, and so forth to thereby allow emergency officials to ascertain the landscape of available EMS resources. With the provision of such precise information, both on a local and national level, resources could be located and dispatched quickly and efficiently. As an illustrative example, when a disaster occurs in a certain area, emergency officials would be able to determine, for example, the total number of available firefighters and how many are cross-trained as paramedics, the number of available pumper trucks, ladder trucks, ambulances, and so forth. Upon evaluating the type and scope of a disaster, the information in the database can then be used to dispatch the appropriate personnel and equipment and can also be used to determine if more resources are required. In the event of a large-scale disaster, rescue/medical/transport personnel and equipment may need to be brought in from remote regions. This system would provide for the coordination of relief efforts so that the correct resources could be provided to areas with the highest need, thereby resulting in improved efficiency and response time, thus increasing the chance of survival.
[00120] Along these same lines, the EMS network described above could further include a secondary function in which an area, district, city, state, department, group, or organization (designated generally as a "community") could elect to participate in a response service by making their personnel and EMS assets (for example, vehicles and related gear) available to other communities in need. During a disaster or other emergency, the community in need could then call on the assets of another registered community to obtain the resources necessary to respond to the emergency. Participants in such an asset availability program would then be able to call on the services of another community listed in the database in a time of need, with such reciprocation providing an incentive for participation in the program. The cost related to the calling of another group's assets may be compensated, for example, on a cost basis, a for-profit basis, a fixed fee basis, or at no cost to either party.
[00121] In the event of a civilly-catastrophic event, ordinary transportation may be difficult and/or impossible for certain individuals. This may be due to congested roadways, impaired transportation infrastructure, civil disorder, confusion and/or uncertainty regarding a best direction in which to proceed, as well as problems that certain would-be drivers and/or passengers may themselves face, to note but a few illustrative examples in this regard. A private entity can arrange appropriate transport facilities that will travel a specific route during such a time of need to pick up authorized beneficiaries of such a service. By one approach this activity will only occur in the event of a sufficiently serious civilly-catastrophic event and will not comprise an ordinary service during less trying times. The vehicles used for this purpose can comprise, for example, a bus, van, or similar terrestrial platform. Other vehicles, such as helicopters, hovercraft, boats, and so forth may also be employed where appropriate. The right of a given individual to gain passage on such a vehicle can be arranged in advance of such a civilly-catastrophic event and/or at a specific time of need.
[00122] These teachings will accommodate having an authorized beneficiary arrange for rescue services to be rendered in the event of a civilly-catastrophic event. This could comprise, for example, rescue personnel quickly locating the authorized beneficiary and physically accessing that authorized beneficiary to effect their removal to another location. If desired, such a service can be supplemented to include allowing such an authorized beneficiary to identify another party to be rescued and/or to be located and accompanied as a precautionary or protective measure.
[00123] Long range acoustic devices may be mounted on or incorporated into the fuselage of a transport vehicle to be used to disband crowds of non-subscribers that might interfere with transport or rescue operations associated with privatized civil security services. Long range acoustic devices are generally designed to loudly emit warnings, orders, or other noise or instruction at an uncomfortably loud 150 decibels. These devices can also operate by generating low-frequency sound pulses and sending them towards a target. The human body generally does not react well to extremely low frequency noises, with certain low frequency noises causing sickness, balance problems, and/or discomfort and pain to soft tissues and organs. A long range acoustic device can be used as a non-lethal weapon designed to disperse hostile crowds or ward off potential foreign combatants by delivering prerecorded warnings in several languages and, if needed, an earsplitting noise. For example, a civil security provider may dispatch a helicopter to rescue authorized beneficiaries. In trying to land to rescue the authorized beneficiaries, the provider's personnel may encounter scared, hostile, or panicked non-subscribers who might overrun the helicopter in their interest of fleeing a disaster. The sound generator, when incorporated into the fuselage of the aircraft, boat, or other rescue vehicle could provide up to a 360-degree zone of protection for the personnel to then retrieve the authorized beneficiaries. Authorized beneficiaries and rescue personnel could be equipped with safety gear making them less susceptible to the discomfort associated with being in the deployment zone of the device.
[00124] If desired, authorized beneficiaries of a subscription-based private civil defense program can participate in the program by providing threat assessment information to, for example, a central information collection function. This can include, for example, such individuals making regular reports (via telephone, email, a website, a wireless communications device, and so forth) regarding their observations in this regard. By another " approach, in combination or in lieu thereof, one or more threat-detection sensors can be deployed at the individual's property (for example, their homes, businesses, vehicles, their clothing, and so forth). Such sensors can be, if desired, coupled to a communication network of choice that forwards the gathered information (using a real time, near real time, or batch protocol of choice) to the central information collection function. If desired, such activities can be supplemented with training for the participating individuals regarding how these observations and so forth are to be carried out.
[00125] In the event of an emergency or disaster, chaos may reign, such that communities become frenzied, families and friends become separated, communication infrastructures may be compromised, and so forth. Therefore, it may be desirable to provide a central repository of information in a time of need in which individuals or groups can communicate with others regarding any of a variety of concerns. The repository may comprise, for example, a website or electronic bulletin board in which people or groups can post notices providing or requesting information. For example, people or groups may provide or request information regarding missing people or pets, requests for donations, and so forth. The repository may be limited in use to only authorized beneficiaries, or may be offered, in whole or in part, to the general public.
[00126] As discussed, the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource, where the resource may comprise a substantially unpopulated town. (Those skilled in the art will recognize and understand that, as used herein, "town" serves as a convenient moniker for and reference to a municipality of essentially any size and serves as a representative expression for so-called villages, towns, cities, and so forth.) This town can be built in the first instance as such an entity or can, if desired, comprise a previously populated town that has been largely abandoned for whatever reason. In a disaster scenario, it is likely that many non- subscribers will seek shelter in the town. They could be a mix of the general public, rescue groups (such as the Red Cross for example), and/or the government itself. The civil security provider owning the town could benefit economically in a number of ways from use of the town, both from subscribers and non-subscribers. Such economic benefits may include charging each person an admission fee and then for the services they use/consume, charging each person a per hour rate, a per day rate, a per week rate, or a per month rate, and accepting contracts from the government (local, county, state of federal) for certain groups of people. In addition, the owner of the town may provide services and accommodations to those in need at no cost to the displaced person. By one approach, if the services are to be given away or provided at no cost to the displaced person, the owner of the facility may be entitled to a tax deduction at the prevailing current value of the service provided. In some instances this tax deduction may be of large economical value and may offset other tax obligations that might otherwise have to be paid. Under certain circumstances, assuming a civil defense disaster(s) of sufficient magnitude displaces enough people, the potential tax incentives may encourage providers to take on the risk of making the speculative investment required to build the town.
[00127] Many individuals choose to purchase life insurance policies to protect the financial interests of the beneficiary of the policy upon the death of the insured. An insurance company issuing the policy will typically have a variety of prerequisites or conditions that an individual must satisfy in order to qualify for the life insurance services provided by the company. The benefits and services provided by a civil security provider can help reduce the risk of death in the event of a civilly-catastrophic event or emergency. Thus, an insurance company may determine that the risk profile of an individual is reduced by subscribing to such services. By one approach, life insurance companies may mandate that an individual subscribe to privatized civil security benefits as a prerequisite to granting coverage to the individual. By another optional approach, an insurance premium discount could be offered to those individuals who have already subscribed to privatized civil security benefits, thus providing an incentive for potential life insurance holders to subscribe to such benefits. Conversely, an individual's premiums could be increased if they have not subscribed to certain civil security benefits.
[00128] Privatized civil security providers may offer privatized civil defense insurance policies that may come in a variety of forms. By one approach, a subscriber may be provided with an insurance policy in which the coverage varies and in which certain parameters regarding the coverage are unlimited or unrestricted. For example, the length of time of the coverage, the volume of the coverage, the quality of the coverage, and the variety of the coverage may all be unlimited or unrestricted. One or more of these unlimited/unrestricted parameters (time, volume, quality, variety) may be applied to a given policy, such that a multitude of different coverages are available. For example, the policies may provide coverage for an unlimited period of time, coverage for an unlimited period of time and at a limited standard, or coverage for an unlimited period of time and at an unlimited standard and with no limit on variety, and so forth. In addition, the coverage may also be varied along these lines with respect to each type of service or benefit offered by the provider, such as provisions, shelter, rescue, transport, and so forth.
[00129] If desired, the civil security provider may have civil security facilities, such as a tactical operations center (TOC), to provide any of a variety of functions, such as, for example, gathering intelligence and evaluating threats and world events that influence the provider's authorized beneficiaries and ability to respond to any natural or non-natural disaster/catastrophe. The TOC may be staffed 24 hours a day, seven days a week, and may be designed to monitor local, state, world, and near-space events and coordinate, as needed, civil security services for authorized beneficiaries. The TOC generally represents the central location of all operations and is complemented by a network of sensors and civil security watchers. The center may include a world-wide communications network capable of communicating with subscribers, authorized beneficiaries, governments, provider personnel, and deployed assets. By one approach, a corporate subscriber may staff corporate representatives at a designated, pre-assigned desk or area within the TOC at the time of a civil security disaster. These corporate representatives can then coordinate the corporate employees, particularly those employees that are authorized beneficiaries, the operations of ongoing corporate obligations, and the operations of the privatized civil security benefits provider. The presence of the corporate representatives helps ensure the timely exchange of information between the corporate subscriber and its employee subscribers and/or authorized beneficiaries and the civil security benefits provider.
[00130] By another approach, a designated, pre-assigned desk or area within the civil security benefits provider's TOC may be provided for each government agency and military service having a potential role in disaster response operations. In some instances, the government's or military's own response facilities may be compromised by the civilly- catastrophic event, thereby preventing them from operating at an optimum level. Thus, the government and/or military may operate partially or completely out of the TOC to maintain at least a minimum operation level if needed. The designated desk or area for the government and/or military within the TOC can provide a variety of functions, including the ability for the private civil security benefits provider to coordinate their operations with local, state, federal, international, and/or military authorities. In addition, the government and military representatives, once manning their designated desks or areas, represent a level of redundancy for public civil security response operations. The presence of the representatives helps ensure the timely exchange of information between government and military agencies and the provider of privatized civil security benefits services.
[00131] The TOC or other related civil security facilities may be built or retrofitted with a Faraday cage to protect electrical circuits from the damage and destruction that may result from civilly-catastrophic events involving an electromagnetic pulse. Thus, the TOC or other facility would still be fully operational in the event of an electromagnetic pulse disaster scenario, such that the civil security provider could still provide services to the authorized beneficiary without damage or undue interruption.
[00132] A battery-powered, portable electronic device may be issued to authorized beneficiaries that enables a civil security benefits provider to more quickly and accurately identify the location of an authorized beneficiary. The device may use, for example, global positioning system technology, a wireless Internet communications receiver, and a 406 MHz transmitter and a 121.5 MHz homing signal. In the event of an emergency, an alert signal may then be transmitted to a satellite, such as a Cospas-Sarsat satellite or other privately owned, operated, leased, and/or controlled satellite, designated for privatized civil security services and forwarded to a TOC. The built-in GPS receiver could provide latitude and longitude coordinates to give an authorized beneficiary's position within approximately 100 feet of the authorized beneficiary in most places in the world. A signal may also be sent through the wireless Internet communication network, which may include digital and analog networks, if available. One or two-way text messaging capabilities may optionally be included with the device. Thus, the location and/or status of an authorized beneficiary can be more quickly identified to then discern the optimum type of emergency service they need.
[00133] Unmanned aerial vehicles (UAV) may be used to survey a disaster area ahead of any privatized civil security rescue operations for authorized beneficiaries. The UAV may be provisioned with a variety of sensors and/or cameras and other devices to provide real-time damage and/or risk assessment after a civilly-catastrophic event. The data from the UAV will assist the provider in assessing the damage or risk caused by or otherwise owing to the event and evaluating the best way to logistically maneuver within an area. The civil security provider can then decide, for example, the best mode of transport for the circumstances and can allocate the appropriate resources to carry out the rescue. As the vehicles are unmanned, personnel are not needed to pilot the vehicle, such that personnel are not put at risk by being exposed to any hazards produced or associated with the event.
[00134] Along these same lines, satellite imagery may be used to survey a disaster zone. The information and images produced by the satellite imagery can then be used to assess the damage and assist the provider in evaluating what resources are needed. The satellite imagery can provide current damage and risk assessment, while possibly limiting the need for provider personnel to travel to the disaster region and risk exposure to the hazards produced or associated with the disaster. The satellite imagery will also help the provider strategize, plan, implement, and coordinate any movement, evacuation, and/or rescue plans for authorized beneficiaries.
[00135] By one approach, a network of civil defense protection watchers can be created that can report localized conditions for a particular region or locale. The civil defense watchers can provide real-time, on-the-ground assessments and evaluations of a disaster area and its surrounding regions. The information and reports provided by these civil defense watchers may facilitate and/or influence the need for or allocation of specific rescue assets and/or procedures. Such a program could include training and certifying the civil defense watchers to follow a standardized protocol and to use reference cards or materials to provide an accurate assessment of the conditions in a given disaster and/or emergency situation. The watchers may also be provided with measuring devices and gauges to facilitate the gathering of data and the overall assessment of the disaster area. The data can then be interpreted and reported according to a standard protocol. The standardized materials and training provided to the watcher assists the watcher in evaluating the conditions and then reporting uniform and consistent data to the civil security provider. Standardized data will thus help the provider determine the overall scale and scope of the disaster and to then strategize and deploy the most effective rescue plan.
[00136J It may be desirable to monitor a variety of environmental and/or air quality conditions to determine the occurrence and/or severity of certain types of disaster. By one approach, a nationwide network of radiological, biological, and chemical sensors may be provided. These sensors would provide real-time, on-the-ground measurements of the levels of any of the aforementioned agents. The network may be national in scope with coverage on a city, county, state and national level. Such sensors can be, if desired, coupled to a communication network of choice that forwards the gathered information (using a real time, near real time, or batch protocol of choice) to a central information collection function. The measurements provided by the sensors could be monitored, for example, at a tactical operations center for a civil security provider, with personnel at the center being notified of elevated levels of the agents. The civil security provider could then proceed to respond accordingly.
[00137] Subscribers or members of the general public considering services provided by a civil security provider may desire a resource that can provide information regarding different privatized civil security organizations and the benefits and services offered by such an organization. This resource may comprise, for example, a publication or website directed towards consumers or potential consumers of civil security benefits. This resource will provide factual, unbiased data on the organizations, such as, for example, their offered services, the quality and nature of their services, how they manage their services, and the type and/or price of subscriptions, such that a potential subscriber to such services can make an informed decision regarding their subscription. The resource may also include a rating system for grading or ranking providers and their services
[00138] Individuals affected by disasters are often eligible for financial assistance or other benefits, such as, for example, federal aid or charitable donations. In addition, individuals may also need to prove their victim status to entities such as insurance companies or creditors. However, it is often difficult to determine which individuals are deserving victims legitimately eligible for such assistance and which are not, with many individuals attempting to defraud the system by obtaining benefits for which they are not eligible. Therefore, by one approach, a certification and/or documentation system could be provided to verify and guarantee that an individual was affected by the disaster, thereby making them eligible for certain benefits or assistance. The certification system would provide proof positive documentation to the government (federal or state), the Internal Revenue Service, insurance providers, creditors, and so forth, to confirm that a given individual was a victim of the disaster and is eligible for offered benefits or assistance.
[00139] Video and computer games are a popular form of entertainment in today's society. In addition, such video games are becoming more sophisticated and technologically advanced, with many accurately replicating or simulating real-life situations. By one approach, a civil security game system could be used for both entertainment and training and skill enhancement, with the system being offered to authorized beneficiaries and/or civil security provider employees, contractors, suppliers, or the like. Those individuals that use the system may be entertained by the game-like appearance of the simulation, while also developing desired skills as they play. The training game can enhance an individual's decision-making skills in everyday life and in disaster scenarios. Such a simulation can train individuals in how to prepare or react to a given set of circumstances, for example, or train them in mastering a particular control system. The skills developed by playing the game can then be applied in real life.
[00140] By one approach, and referring momentarily to FIG. 5, this process will readily accommodate providing such civil security provisions 200, civil security facilities 502, and civil security services 503 by a single provider 501. Such a provider 501 can be integrally involved with designing, providing, maintaining, and offering such civil security resources or can comprise an aggregator of such resources, in whole or in part, as are provided by other sources. [00141] As noted these teaching can be flexibly applied in various ways in this regard. For example, and referring momentarily to FIG. 6, the civil security provisions 200 can be provided by a first provider 601, the civil security facilities 502 can be provided by a second provider 602, and the civil security services 503 can be provided by a third provider 603 wherein the first, second, and third providers comprise separate entities (as when, for example, these providers comprise separate legal entities having no co-ownership or common points of control). In such a case, these separate providers can meet the needs of this step by acting in an aggregated manner 604 (directly or indirectly) with one another.
[00142] Yet other arrangements are possible. For example, and referring momentarily to FIG. 7, a single provider 703 can provide the civil security facilities 502 and the civil security services 503 while the civil security provisions are provided by a plurality of civil security provisions providers represented here by a first civil security provisions provider 701 through an Nth civil security provisions provider 702 (where "N" will be understood to comprise an integer greater than one). Persons skilled in these arts will understand and appreciate that numerous permutations and combinations of these elements as well as other possibilities are available. Such alternatives are well within the scope of these teachings and are rightly considered to comprise a part of this invention.
[00143] A private civil security provider will encounter particular difficulties not faced by providers of other, more traditional, products and services. For example, marketing such services, provisions, and facilities to consumers or clients may prove challenging because individuals may be hesitant to participate because of their reluctance to acknowledge the presence of certain threats or perhaps because they mistakenly believe that their federal, state, local, provincial, or municipal government is effectively addressing and preparing for such civilly-catastrophic events. Further, the business of civil security presents several unique obstacles and challenges to a business plan or model because the business partly operates within a realm sometimes occupied (or is at least perceived as being occupied) by various governmental entities. Some particular examples to address these concerns now follow (it being understood that these examples are provided for illustrative purposes and are not intended to comprise an exhaustive listing of such possibilities).
[00144] As discussed, consideration-based private civil security subscriptions are accepted from subscribers with respect to providing civilly-catastrophic event-based access to at least one life-sustaining resource. The subscription price or fee structure may be assessed in any of a variety of ways. By one approach, the subscription fee may be rated based on a variety of factors. For example, the civil security provider may evaluate an individual's health, age, lifestyle, location, and so forth in determining the subscription fee for that individual. As an illustrative example, an individual living in a high-risk urban environment may be charged more for services than their rural counterpart who faces a lower risk of disaster and a likely easier evacuation or rescue in the event of a disaster. The civil security provider could develop a set of guidelines for determining the fee structure based on the evaluated factors.
[00145] Subscriptions for privatized civil security benefits can come in a variety of forms. By one approach, a family subscription could be offered whereby a family pays a standardized fee, based on the level of service required, with the family paying a flat fee irrespective of the size of the family. The provider could define "family" to include or not include specific family members or limit the generations covered by such a family membership.
[00146] Along the same lines, a group subscription may be offered by a civil security services provider where a group pays a standardized fee, based on the level of service required. The group may comprise, for example, a corporation, a union, an association, and so forth. Once the group is a subscriber, the group can then choose individual subscription services for specific employees/members of the group and/or let the employees/members elect to buy the services for themselves. Similarly, once an employee/member is a subscriber through their group, they can further elect to obtain subscriptions for services for their immediate families and/or extended families.
[00147] As discussed, the consideration-based private civil security subscriptions provide civilly-catastrophic event-based access to at least one life-sustaining resource. One such life- sustaining resource may comprise rescue services. The rescue service offering can be structured around a variety of measures, including response time (i.e., the time that subscribers can expect to have a rescue team on scene). By one approach, the subscriber can elect a particular response time or response priority as part of their rescue service. For example, several time frame options may be made available to the subscriber, such as a 30 minute response time or a 6 hour response time, for example. The price for the rescue services may then be commensurate with the response time associated with that rescue. Further, the provider may designate the subscriber as a high priority rescue based on a specific risk or danger to a given subscriber such that the rescue team responds to and rescues those high priority subscribers before other subscribers. Alternatively, the subscriber may notify the provider at the time of the event that they are requesting high priority status, with an additional fee optionally being assessed for such a status. The subscriber may also pay an increased subscription price to be given rescue priority in a time of need.
[00148] The privatized civil defense industry is a new, unique, and developing industry, and the service requirements of the industry require unique business model solutions. For example, disaster classifications and alerts, disaster responses, data security, storage of supplies, rescue, training, transportation of large groups of people, and so forth are disparate service sectors that must be integrated and managed together within the privatized civil defense system. Therefore, it may be valuable to develop a customized curriculum that cuts across and then ties together in a cross-functional manner a multitude of previously unrelated industry sectors. Disaster response software platforms offer one such approach to addressing the unique demands of privatized civil defense. The software may comprise a plurality of distinct modules that can stand alone or interface into an enterprise-wide disaster response system. The modules, independently or as part of an enterprise-wide system, assist the civil defense provider in evaluating a multitude of external data to provide a real-time, multi-level response plan to a given disaster(s) with respect to the provider's service and product obligations to a world-wide network of subscribers. One such module may be a business continuity or disaster management module. This module could provide real-time planning and instructions related to an organization's disaster response plans. The module may incorporate comprehensive contingency plans with respect to every employee action pre- disaster, during a disaster, and post-disaster, including elements involving training. As one illustrative example, the disaster planning module can interact with the training module to assess individual training needs and requirements. The module may optionally integrate with an organization's enterprise resource program platforms or modules.
[00149] Even during those times when there is not a need for privatized civil security services, it is still desirable for the personnel of the civil security provider to continue to train to ensure that the personnel learn and maintain their skills so that the response by the personnel will remain optimized when the time of need arises. Therefore, in an effort to actively pursue training for the provider personnel, the personnel may offer to provide backup services to the traditional EMS personnel. The provider personnel can then benefit from the valuable real world training provided by this program. Such an arrangement can also establish and preserve relationships with local, state, and national EMS service providers. In addition, such an arrangement can be economical for the EMS service providers because they will not have to invest in their own reserve fleet or have to call out EMS personnel and equipment from other communities.
[00150] By one approach, a custom training program and curriculum may be developed for employees and authorized beneficiaries so that they are more well-informed and prepared in how to, for example, access, select, facilitate, execute, and/or operate the services, products, and/or benefits provided by the civil security provider. To facilitate such a training program, a software tracking system may be desired to track all elements of training for the privatized civil defense market. The software system is an administrative system for assigning, deploying, managing, and measuring the training administered by the civil security provider. Such training may be offered by any of a variety of approaches, such as, for example, instructor-led, self-study, web-based, in-class, live, recorded, and so forth. The availability of the training software tracking system and the courseware that is cataloged, launched, and tracked by the system may be offered as a stand alone product or may be bundled as part of an overall privatized civil security solution. The classes, for example, may be sold individually or on a per-use basis, or may be offered as packages. Alternatively, or in addition thereto, the system may be optionally offered free to the public or authorized beneficiaries The training software tracking system may include any or all of the following features for any of a variety of types of training classes, programs, certification programs, and/or degree programs:
Administration: The basic features of this option may include, for example, managing course registrations, scheduling resources, and managing course catalogs. Advanced features of this option may include, for example, managing course prerequisites, manager approvals, e-commerce, the use of learning credits, certification processing, and expirations, student scores, managing learning plans, tracking learning history, search capabilities, and prescriptive learning (training designated to a learner based on their manager, job role, or assessment scores), to note but a few.
Reporting and Measurement: This feature comprises the tracking and reporting of certifications and learning metrics. Advanced features of this option may include, for example, exception reporting, automatic notification based on thresholds, and measuring business impact and return on investment.
Security: This feature may include, for example, granting different access privileges based on organizational hierarchy, domain, and/or role. The security feature may also encrypt data and personal information to protect the confidentiality of sensitive information.
Human Resources-related Features: The basic features of this option may include, for example, synchronizing the training software tracking system with the organization's human resources database. Advanced features of this option may include, for example, integrating training and learning with performance planning and managing skills and competencies.
Content Management: This feature facilitates the online storage of the training and learning content and indexing the content for searching purposes. Advanced features may include, for example, managing the content and workflow among multiple groups.
Content Integration: This feature comprises implementing the industry standards of the Aviation Industry CBT (Computer-Based Training) Committee (AICC) and Sharable Content Object Reference Model (SCORM), making it possible to launch, track, bookmark, and/or report on electronic learning content. Such interfaces may be tested and certified against different content providers.
E-Commerce: This feature facilitates the processing of payments and charge- backs. Advanced features may include, for example, creating business rules for transactions, such as discounts for certain learner types or course bundles, managing shopping carts, and checking certifications or learner status to determine eligibility. This feature may also accommodate and/or facilitate loyalty programs, promotions, and discount processing functionality if desired.
[00151] Authorized beneficiaries of a subscription-based private civil security program can notify the civil security provider of a need for services by dialing a designated telephone number. For example, 911 is universally known as the number to call in emergency situations. Similarly, a number, such as a three digit number or other easily-remembered series of digits, could be assigned and designated as the number to call to alert a provider of the need to activate privatized catastrophic response services. An individual calling the number could report a disaster and/or request privatized civil security services. By one approach, the number could be a private code provided only to authorized beneficiaries of the provider's services and the provider's employees. By another approach, the number may be universally known such that subscribers and non-subscribers can report a disaster and notify the provider of a need for activation of civil security services.
[00152] Referring again to FIG. 1, this process 100 will also optionally provide for the provision 102 of non-civil security resources. Such non-civil security resources comprise supplies and items that are not, strictly speaking, necessary to ensure human survival and hence may be viewed as luxuries. Such items can quite literally span the full gamut of available offerings and can include both unique items (such as original works of art) and more commonly available offerings (such as jewelry, pleasure reading materials, audio playback devices, and so forth). Again, differentiation can exist with respect to actual or perceived levels of quality as pertain to such items if desired.
[00153] These steps of providing such civil security resources can further comprise maintaining such resources. This can comprise, for example, maintaining the freshness and usability of civil security provisions (by replacing outdated or soon-to-be outdated supplies), replacing an existing resource with a better substitute that becomes available, maintaining present and/or imminent usability of a civil security shelter or transport vehicle, updating civil security-related information to reflect current data and intelligence, vetting and revetting personnel, and so forth. Such maintenance can be provided, in whole or in part, by the provider of such civil security resources or can be outsourced if desired.
[00154] This process 100 then provides for providing 103 authorized beneficiaries with consideration-based access to the plurality of private civil security resources. There are various ways by which such authorized beneficiaries can be identified. For example, by one approach, such authorized beneficiaries can attain this status as per the terms and conditions of a consideration-based private civil security benefits subscription as mentioned above with respect to FIG. 3. For example, a given subscription can provide such status for a stipulated one-year period of time for one or more authorized beneficiaries as correspond to that subscription.
[00155] Returning to the security subscriptions discussed with respect to FIGS. 3 and 4, the maintenance of the resource 203 may include storing the acquired necessities 402. By one approach such storage 402 occurs through use of one or more storage facilities 800, illustrated in FIG. 8, which are owned or controlled by the subscription accepting entity. Any suitable storage facility may be used for this purpose with examples comprising (but not being limited to) above ground man-made shelters, below ground or below water facilities (including purposefully excavated facilities, natural caverns, and so forth), and water borne facilities (such as barges and the like). Each such storage facility 800 will likely serve to store the resources as correspond to a plurality of authorized beneficiaries. By one approach such resources are stored in the aggregate. By another approach, or in combination with an aggregated approach, some or all of the acquired necessities are stored in subscriber-based bundles 801. For example, each such bundle 801 can comprise a one year supply of all acquired items for a single adult authorized beneficiary. As another example, such a bundle 301 could comprise a one year supply of all acquired items as are intended for a family of four authorized beneficiaries.
[00156] Other possibilities of course exist. For example, a single authorized beneficiary may have a first bundle comprised of staple items that are acquired and stored for all beneficiaries and a second bundle comprised of custom items that are specifically and uniquely acquired for this particular beneficiary or class of beneficiaries (such as beneficiaries who all share a common dietary ailment or condition, sensitivity, medical condition, preference, or the like).
[00157] The bundle 801 itself can be realized via any of a wide variety of encapsulating or restraining mechanisms. For example, a tarp and tie-downs can be used to segregate the goods and form the described bundle. As another example, discrete storage cabinets formed of wood, metal, plastic, canvas, or other material of choice could be employed for this purpose. Shrink wrap materials could also be employed in this regard. In addition, if desired, these bundles 801 can be individually palletized (i.e., each placed upon and optionally secured to a pallet 802). Palletization, in turn, will permit ready and efficient movement of such bundles 801 to, about, or from a given storage facility 800 and/or delivery of such a bundle to an authorized beneficiary when such delivery comprises the desired form of granting access to such resources.
[00158] The use of such bundles (and particularly the bundling of staple items in a manner calculated to provide at least a minimum level of survival support to a predetermined number of authorized beneficiaries for at least a predetermined period of time) provides highly leveragable resource allocation opportunities as well. For example, and referring now momentarily to FIG. 9, a first storage facility 901 may contain 1,000 such storage units while a second storage facility 902 may contain an additional 1,000 such storage units. By treating such storage units, at least in part, as being fungible with one another, such resources can be made available to authorized beneficiaries in time of need by accessing a storage facility that is positioned to provide the earliest relief to the beneficiaries rather than by necessarily requiring all beneficiaries to only access their resources from a specific pre-ordained facility.
[00159] Referring again to FIG. 4, maintaining 303 the resource in such a context can further optionally comprise maintaining 403 the utility of the stored necessities. This can comprise, for example, monitoring the usability of perishable items and replacing such items on a corresponding schedule. As another simple illustration this step 403 can comprise holding certain items in deep refrigeration or in other special storage conditions as may suit the proper maintenance of such items.
[00160] Such maintenance 303 can also optionally comprise making adjustments 404 to the stored necessities to reflect dynamically changing circumstances as occur during the consideration-based private civil security subscription period. As one illustration, a new product may become available that is particularly useful in treating a particular infectious condition that may likely arise upon the occurrence of a particular kind of civilly-catastrophic event. In such a case, maintaining 303 such resources can readily accommodate updating the acquired and stored items to include a supply of this new product. Accordingly, this step of making adjustments 404 can readily comprise one or more of removing a particular one of the stored necessities (as when a better substitute becomes available, when the stored necessity itself is shown to be less effective for its intended purpose than was originally thought, and so forth), adding additional ones of the stored necessities (as when it becomes subsequently understood that more of a particular item is desirable to achieve a particular survival-related goal or purpose), adding at least one new stored necessity that is not already stored (as illustrated in the example provided above), and so forth.
[00161] In the examples provided above, the resource being acquired and maintained comprises consumable or non-consumable items. As noted earlier, however, these teachings are applicable for use with other resources as well. For example, and referring now to FIG. 10, maintaining 303 the resource may relate to providing civilly-catastrophic event-based access to a shelter. By this approach this step of maintaining 303 the resource can comprise maintaining 1001 such a shelter.
[00162] Much is known in the art regarding construction and maintenance of shelters. Such a construction will usually at least serve to protect the inhabitants from environmental stress and extremes. In addition to walls and a roof such a shelter will typically also comprise internal temperature control, lighting, storage facilities, sleeping facilities, food preparation facilities, personal hygiene facilities, and so forth. For present purposes such a shelter may also be equipped to provide for water treatment (such as filtering, bacteria removal, and so forth), waste treatment and/or recycling, electrical power generation, and/or air treatment (including but not limited to conditioning, filtering, and so forth). By one approach such a shelter can also be equipped with communication facilities including a variety of wireless broadcast capabilities, long-distance two-way communications capabilities, and so forth.
[00163] Security will likely comprise a primary concern for such a shelter. In particular it will likely be important to secure the shelter, any resources as are stored or otherwise available at the shelter, and the inhabitants of the shelter from unauthorized entry and access. By one approach, this can comprise maintaining the shelter in a location that is substantially distal from a nearest substantial human population. For example, and referring momentarily to FIG. 11, within a given geographic region 1101 (such as a continent, country, or the like) a shelter 1102 may be separated from the closest major population bases 1103 by a distance that at least exceeds some predetermined substantial distance X 1104. Depending upon other factors, this distance X might comprise, for example, 800 kilometers. Other factors might well play a part in this regard, of course. For example, a significant natural barrier (such as a large mountain range) might lie between a major population base and a shelter and make reasonable a shorter separation distance between such entities.
[00164] When possible, and with continued reference to FIG. 11 , it may be desirable to locate such a shelter 1102 in relative proximity to a water source 1105. A suitable water source 1105 can comprise a ground-level water source or an underground water source as, in either case, ready access to the water source may be available. This, in turn, can be useful with respect to ensuring an adequate supply of water for the inhabitants of the shelter 1102 in times of need. A ground-level water source may also provide a means of ingress and egress to facilitate the comings and goings of the authorized beneficiaries (for example, a navigable waterway can provide an effective pathway by which to transport authorized beneficiaries to the shelter 1102).
[00165] Notwithstanding that it may be desirable to locate such shelters at a considerable distance from major population centers, this does not necessarily require that such shelters be secreted within completely primitive and/or wild settings. For example, one useful approach might be to locate such a shelter 1106 proximal to an entertainment destination 1107 (such as, but not limited to, remotely located golf courses, resorts, dude ranches, casinos, and so forth). In such a case at least some of the infrastructure that may be required and/or useful for the shelter can be shared with the facilities of the entertainment destination and thereby reduce the effective costs of installing and maintaining such facilities.
[00166] For a variety of reasons it may be appropriate to provide a plurality of such shelters in various locations throughout a relatively wide geographic region such as a continent or country. Such a dispersal can aid with reducing the logistic difficulties of transporting authorized beneficiaries to such a shelter during times of need. Dispersed shelters can also help ensure that at least some shelters will more likely survive civilly- catastrophic events that pose sufficient destructive force to destroy such a shelter or to otherwise significantly impair its purpose and functionality.
[00167] When providing a plurality of shelters, it may also be useful to differentiate such shelters from one another with respect to, for example, their features and/or accouterments. Such shelters may be differentiated, for example, with respect to their relative support for such things as a maximum supportable population, a depth and breadth of provided nonessential accouterments of life, medical facilities (such as, but not limited to, specialized equipment such as respirators, dialysis equipment, operating facilities, and so forth), pet animal accommodations, risk threat abatement capability, entertainment facilities, and so forth. Assignment and/or access to a given differentiated shelter can be determined, at least in part, by such things as relative initial proximity of the authorized beneficiary, the terms and conditions of the corresponding subscription agreement, and so forth.
[00168] By one approach these teachings can be simply practiced by provision of shelter and/or life-sustaining supplies; gaining physical access to such resources comprises the responsibility of the authorized beneficiaries. During such times, of course, it can be expected that civil conditions will be troubled and confusing. Therefore, by another approach these teachings can further encompass transporting at least some of the authorized beneficiaries to the shelter and/or supplies in response to the occurrence of a civilly- catastrophic event. There are various ways by which to accomplish such a task.
[00169] Referring again to FIG. 10, by one optional approach at least one rally point can be identified 1002. (An example of such a rally point appears in FIG. 11 as denoted by reference numeral 1108.) Such a rally point need not be reserved only for this purpose and may, for example, simply comprise a convenient location for at least some authorized beneficiaries. Example rally points might include sports stadiums and auditoriums, amusement parks, and the like. When possible, it may be helpful to locate such a rally point relatively near an airstrip and/or a navigable waterway. Such amenities, in turn, can potentially be used when transporting the gathered beneficiaries to their destination (as when, for example, a destination shelter is accessible from the navigable waterway that is also readily accessible from the rally point).
[00170] By one approach, one or more such rally points can be identified for each larger population area that contains authorized beneficiaries. It would also be possible, of course, to identify rally points to serve a similar function in more rural settings as well if desired.
[00171] This process can then optionally provide 1003 information regarding such rally points to the authorized beneficiaries. This information can be provided prior to the occurrence of a civilly-catastrophic event if desired. It may also be useful or possible to provide such information (either in the first instance or as a supplemental notice) following the initiation of such an event. The latter may be achieved using such communication means as may be available at the time. It would also be possible to provision each authorized beneficiary (or family or company of beneficiaries) with one or more communications devices by which such information could be provided. This process could then provide 504 appropriate transportation to move the authorized beneficiaries from these rally points to the destination (such as to a designated shelter).
[00172] In many instances such transportation can comprise standard vehicles (cars, buses, boats, airplanes, railroad cars, and so forth). If desired, however, more specialized equipment could be used including but not limited to armored transports, environmentally-contained vehicles or trailers, and so forth.
[00173] These teachings can readily accommodate other features as well. For example, and referring now to FIG. 12, prior to the occurrence of a civilly-catastrophic event an authorized beneficiary can be provided 1201 with a short-term survival kit to facilitate their survival prior to their being able to access the aforementioned stored necessities upon the occurrence of a civilly-catastrophic event. Such a short-term survival kit might comprise, for example, a seven day supply of nourishment, clothing, food preparation items, bedding, navigation tools, communication tools and/or location beacons, first aid supplies, water treatment items, items to aid with protecting against or otherwise treating environmentally borne hazards, maps, portable power sources, fire starting equipment, survival instructions, and so forth.
[00174] As another example, authorized beneficiaries could be provided 1202 with a survival instruction guide kit. These instructions could provide information regarding survival practices, emergency responses, and so forth. By one approach each authorized beneficiary who comprised a part of a shared group (such as a family group, a company group, and so forth) would receive such a kit. This, in turn, would facilitate unity of action, purpose, and result in the event of a civilly-catastrophic event. For example, by each knowing and observing the shared instructions provided by such an approach, the participants would be able to take their own coordinated actions while being relatively secure in their knowledge of what their group counterparts were also likely doing at that time.
[00175] This survival instruction guide kit could comprise, for example, a book or manual having printing survival instructions and information in combination with fill-in-the-blank opportunities whereby a given authorized beneficiary could customize the instructions to specifically suit their particular needs and situation. Such blanks could be used, for example, to prompt the beneficiary to think through and to record information such as their primary and secondary rally points or other family/group meeting points and protocols, communications protocols and contact information, specific items (perhaps somewhat unique to the individual and which may, or may not, relate to the survival of that individual) that should be stockpiled or otherwise made readily available in the event of a civilly-catastrophic event, and so forth. Such a book or manual could include indexes, tabs, or other navigation tools to permit a reader to quickly find the relevant information they require during a time of need.
[00176] These teachings would also accommodate providing 1203 survival training to authorized beneficiaries. Such training could comprise in-person, on-site training, live instructors, and/or previously prepared teaching resources such as, but not limited to, electronic learning resources. This training could include both general information regarding specific do's and don'ts as pertain to different kinds of civilly-catastrophic events as well as more specific information regarding specific actions that should be taken by the authorized beneficiary with respect to successfully achieving access to their subscribed-to resources as per their subscription.
[00177] These teachings will also accommodate providing 1204 authorized beneficiaries with a corresponding authorization mechanism by which they can effect their right of access to the resources provided by their subscription. This may comprise a mechanism that the beneficiary carries with them as personal property (such as an identification card) or, for example, a biometric-based identity authentication process that relies upon fingerprints, retinal patterns, or some other relatively unique aspect of the human body.
[00178] Returning once again to FIG. 1, the process 100, as mentioned, provides 104 the authorized beneficiaries with consideration-based access to the non-civil security resources. Notwithstanding the provision of such civil security resources, this step of providing access to such resources can readily comprise providing a plurality of different access opportunities. Such opportunities can differ from one another in any number of ways. For example, these opportunities can differ from one another with respect to the specific resources that are included, the quantity of resources that are included, the duration of time during which the aforementioned access may occur, the conditions under which such access can occur, the manner by which such access occurs (for example, whether civil security provisions are delivered to a given authorized beneficiary (and if so, when, how often, and so forth) or must be picked up by the authorized beneficiary from a given distribution point), and so forth.
[00179] As one example in this regard, differing access opportunities could comprise, at least in part, a first access opportunity that provides limited access to no more than a first amount of the civil security resources and a second access opportunity that provides limited access to more than the first amount of the civil security resources. In such a case, the first amount can be specified, if desired, as a function of a predetermined quantity of the civil security resources and/or as a function of a predetermined amount of time during which the civil security resources are accessed. As to the latter example, the second access opportunity could differ from the first access opportunity, at least part, by providing an opportunity to have access to the civil security resources at a time that is temporally subsequent to a time when the first access opportunity provides access to the civil security resources (to thereby provide, for example, for a resupply or replenishment opportunity that supplements an original stock of supplies as might correspond to what is provided pursuant to the first access opportunity).
[00180] This can comprise, if desired, additionally offering access opportunities that provide access to less than all three categories of the civil security resources noted. As a very simple illustration in this regard, a first access opportunity could provide limited access to only civil security provisions and civil security services while a second, different access opportunity could provide access to both these civil security resources and civil security facilities as well.
[00181] By one approach, for example, standard (or customizable) bundles of specific resources, fashioned in different ways, could comprise these different access opportunities. Again, a simple illustrative example may be useful in this regard (though the reader is cautioned that the provided example is but one example of an indeterminate number of possibilities and is not offered with any suggestion of exhaustion in this regard). Consider, in particular, five different access opportunities that are each generally characterized as follows:
A first access opportunity that provides limited access to only a limited selection of the civil security provisions and a limited selection of the civil security services comprising information-related services;
A second access opportunity that provides limited access to only a limited selection of the civil security provisions and a limited selection of the civil security services comprising both information-related services and transportation services (such as civilly-catastrophic event-based transportation to a civil security provisions distribution facility);
A third access opportunity that provides limited access to only a limited selection of the civil security provisions, a limited selection of the civil security services comprising information-related services and transportation services, and a limited selection of the civil security facilities comprising a civil security rally point (or, in other words, an access opportunity that equals that provided by the second access opportunity plus access to the civil security rally point);
A fourth access opportunity that equals that provided by the third access opportunity plus access to a civil security shelter (or shelters); and A fifth access opportunity that equals that provided by the fourth access opportunity plus access to civil security rescue services.
[00182] If desired, a given provider of these civil security resources can provide five such access opportunities to comprise the primary offerings to be provided to the authorized beneficiaries. Each such offering can of course command a different corresponding level of consideration (such as, for example, a different corresponding payment to be proffered for each).
[00183] It would of course also be possible to permit an authorized beneficiary having a given one of these access opportunities to extend the scope of the opportunity in exchange for increased consideration. By one approach, such an extension (or upgrade) could be accommodated by simply requiring payment of a price differential as otherwise distinguishes such opportunities in the first instance. Such an approach might be appropriate, for example, when accommodating such a change well prior to even the threat of any particular civilly- catastrophic event. If desired, however, such an extension (or upgrade) might require a considerably higher supplemental payment when the authorized beneficiary seeks the extension (or upgrade) during or following a given civilly-catastrophic event and/or at a time when a given civilly-catastrophic event is perceived as being an imminent occurrence.
[00184] It would also be possible to permit some or all of the resources as comprise such an opportunity to be customized to suit the needs and/or preferences of a given authorized beneficiary. In some cases, such customization might be offered without additional corresponding cost. In other cases, and particularly where items and/or services of higher value are being substituted for existing standard items or services, additional commensurate cost might be required. For example, a given authorized beneficiary might wish to upgrade their unit of civil security provisions to include some foods that are not a part of a standard package of supplies or might wish to upgrade from a basic rescue package to a premier rescue offering that offers, for example, a faster guaranteed maximum response time.
[00185] If desired, this process will also optionally accommodate providing a key to authorized beneficiaries to thereby facilitate and permit those authorized beneficiaries to access one or more of the civil security resources during an authorized time of need. Such a key may comprise a physical item (such as, for example, an identification card or a physical lock key) and/or a non-physical item (such as, for example, a code such as a personal identification number, a password, or the like). When the key itself comprises a biometric characteristic as corresponds to the authorized beneficiary (such as, but not limited to, deoxyribonucleic acid (DNA), a retinal pattern, an asperity pattern (such as a fingerprint, a palm print, or the like), a voice print, a characteristic typing pattern, and so forth) this step can comprise (in conjunction with acquiring information, materials, and/or samples from the authorized beneficiary to thereby characterize the biometric of choice) providing instructions to the authorized beneficiary regarding presentation of such a biometric in order to gain the desired access. When the key comprises a code, by one approach this step can comprise providing the code to the authorized beneficiary. By another approach, this step can comprise receiving a code of choice from the authorized beneficiary and then providing confirmation to the authorized beneficiary regarding acceptance of that proffered code.
[00186] Those skilled in the art will appreciate the considerably flexibility and scalability that these teachings offer. As an example of such flexibility, by one approach, if desired, a base line membership for a given authorized beneficiary can bear a corresponding base line price and offer access to a corresponding set of civil security resources. These resources might comprise, for example:
Pre-civilly catastrophic event delivery of a short-term supply of survival resources comprising at least nutritional consumables. Hydration supplies can also be provided if desired. This short-term supply can comprise, for example, a sufficient quantity of survival resources to support survival of the corresponding authorized beneficiary for at least a predetermined number of days (such as, for example, a ten day period of time).
Pre-civilly catastrophic event access to civil security services comprising consulting services that provide for a preparedness review and inventory as well as preparation of a customized and personalized personal action plan to guide the authorized beneficiary in the event of a civilly-catastrophic event-based time of need.
A right to acquire additional civil security provisions (either for current delivery or to be held pending a civilly-catastrophic event-based time of need) and/or to access civil security facilities or additional services.
[00187] So configured, a given authorized beneficiary can obtain a viable, valuable, useful entree into a private civil security paradigm. A base line offering can be provided for a relatively modest initial cost and, if and as the authorized beneficiary becomes more learned and experienced with respect to civil security issues and concerns, additional supplemental kinds and levels of protection and security can be subsequently acquired as needed.
[00188] Those skilled in the art will recognize and appreciate that the above described teachings can be applied and leveraged in a variety of ways to achieve a significant number of tangible and concrete benefits (including but not limited to facilitating a relatively higher degree of personal awareness regarding civil security issues, a relatively higher level of resources availability, and/or a relatively more powerful set of motivations for various parties to adopt behaviors that in turn prompt an increased availability of potentially life-preserving resources for a relatively wide consuming audience than might likely be achieved in the absence of such teachings).
[00189] It will be appreciated that these teachings provide for a highly flexible yet powerfully effective way by which a modern citizen can greatly improve their likelihood of surviving a civilly-catastrophic event. These teachings are sufficiently flexible so as to accommodate the needs and desires of a wide-ranging set of potential beneficiaries while nevertheless still tending to ensure adequate access to the basic necessities of life. Though training and some related activity may be provided and encouraged, in general the beneficiary receives these benefits without being required to make the commitment of time, energy, and expertise that would ordinarily be associated with attaining such a high level of civil security.
[00190] Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept. As one example in this regard, the notion of civil security provisions can encompass, if desired, weapons of various kinds. Weapons and their ammunition (including, but not limited to, projectile-based weapons of various kinds) can have an important place in ensuring one's survival under certain conditions as they can be used for protection and can also be employed for hunting.

Claims

What is claimed is:
1. A method comprising: accepting consideration-based private civil security subscriptions from subscribers with respect to providing an authorized beneficiary with civilly-catastrophic event-based access to at least one private civil security resource; providing the authorized beneficiary with access to post-civilly catastrophic recovery assistance; offering consideration-based private civil security subscriptions for authorized beneficiaries, the consideration-based private civil security subscriptions being offered in aggregate with life insurance related products or services.
2. The method of claim 1 wherein the civilly-catastrophic event comprises an event that substantially disrupts society's infrastructure and ability to provide at least one life- sustaining resource and is one that is likely to persist in substantial form for more than a predetermined period of time.
3. The method of claim 1 wherein the subscriptions comprise at least one of: time-limited rights of access; event-limited rights of access; inheritable rights of access; rights of access predicated upon a series of periodic payments; rights of access predicated upon a one-time payment; ownership-based rights of access; non-transferable rights of access; transferable rights of access; membership-based rights of access; fractionally-based rights of access; non-ownership-based rights of access; option-based rights of access; credit-based rights of access; group-based rights of access.
4. The method of claim 1 wherein the at least one private civil security resource comprises at least one of: a private civil security provision; a private civil security facility; a private civil security service.
5. The method of claim 4 wherein the at least one private civil security resource comprises at least one of each of: the private civil security provision; the private civil security facility; the private civil security service.
6. The method of claim 5 wherein the civil security provision comprises a plurality of life- sustaining resources as pertain to a plurality of differing categories of life's necessities.
7. The method of claim 6 wherein the plurality of differing categories of life's necessities comprise: breathable air; water; food; protective clothing; shelter.
8. The method of claim 1 further comprising providing the authorized beneficiary with an insurance premium discount in conjunction the provision of benefits through a consideration-based private civil security subscription.
9. The method of claim 8 wherein the authorized beneficiary is offered the insurance premium discount at a time after the consideration-based private civil security subscription for the authorized beneficiary has been accepted.
10. The method of claim 8 wherein the authorized beneficiary is offered the insurance premium discount in conjunction with acceptance of the consideration-based private civil security subscription for the authorized beneficiary.
11. The method of claim 1 wherein the life insurance related products or services are not offered unless a consideration-based private civil security subscription is obtained.
12. The method of claim 11 further comprising increasing an insurance beneficiary's premium in conjunction with not having access to at least one private civil security resource.
13. The method of claim 12 wherein the insurance beneficiary's premium is increased upon losing access to at least one private civil security resource.
14. The method of claim 12 wherein the insurance beneficiary's premium is increased upon a lapse in a consideration-based private civil security subscription from which the insurance beneficiary received access to at least one private civil security resource.
15. The method of claim 1 wherein the life insurance related products or services are not offered to a potential life insurance beneficiary unless access to at least one private civil security resource is provided to the potential life insurance beneficiary.
PCT/US2007/081676 2006-10-17 2007-10-17 Subscription-based private civil security facilitation method WO2008082744A2 (en)

Applications Claiming Priority (14)

Application Number Priority Date Filing Date Title
US82977906P 2006-10-17 2006-10-17
US60/829,779 2006-10-17
US86239806P 2006-10-20 2006-10-20
US60/862,398 2006-10-20
US86271806P 2006-10-24 2006-10-24
US60/862,718 2006-10-24
US86346906P 2006-10-30 2006-10-30
US86348106P 2006-10-30 2006-10-30
US60/863,481 2006-10-30
US60/863,469 2006-10-30
US86430206P 2006-11-03 2006-11-03
US60/864,302 2006-11-03
US89435007P 2007-03-12 2007-03-12
US60/894,350 2007-03-12

Publications (2)

Publication Number Publication Date
WO2008082744A2 true WO2008082744A2 (en) 2008-07-10
WO2008082744A3 WO2008082744A3 (en) 2008-11-20

Family

ID=39589161

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/081676 WO2008082744A2 (en) 2006-10-17 2007-10-17 Subscription-based private civil security facilitation method

Country Status (1)

Country Link
WO (1) WO2008082744A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010052142A1 (en) * 2000-01-12 2001-12-20 Marcon Pamela Leigh Personal survival vestpac
US20050086127A1 (en) * 2000-04-28 2005-04-21 Hastings W. R. Approach for managing rental items across a plurality of distribution locations
US20060074724A1 (en) * 2004-09-24 2006-04-06 Schwartz James D Method and apparatus for bundling insurance coverages in order to gain a pricing advantage
US20060173708A1 (en) * 2005-01-28 2006-08-03 Circle Of Care, Inc. System and method for providing health care

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010052142A1 (en) * 2000-01-12 2001-12-20 Marcon Pamela Leigh Personal survival vestpac
US20050086127A1 (en) * 2000-04-28 2005-04-21 Hastings W. R. Approach for managing rental items across a plurality of distribution locations
US20060074724A1 (en) * 2004-09-24 2006-04-06 Schwartz James D Method and apparatus for bundling insurance coverages in order to gain a pricing advantage
US20060173708A1 (en) * 2005-01-28 2006-08-03 Circle Of Care, Inc. System and method for providing health care

Also Published As

Publication number Publication date
WO2008082744A3 (en) 2008-11-20

Similar Documents

Publication Publication Date Title
US20070225995A1 (en) Method and Security Modules for an Incident Deployment and Response System for Facilitating Access to Private Civil Security Resources
US20070223658A1 (en) Method and Apparatus to Facilitate Deployment of One or More Private Civil Security Resources
US20080275308A1 (en) Premium-Based Civilly-Catastrophic Event Threat Assessment
US20070233501A1 (en) Subscription-based private civil security facilitation method
US20070219810A1 (en) Personal profile-based private civil security subscription method
WO2008082744A2 (en) Subscription-based private civil security facilitation method
US20070219431A1 (en) Method to Facilitate Providing Access to a Plurality of Private Civil Security Resources
US20070219814A1 (en) Publicly-Funded Privately Facilitated Access to Survival Resources Method
US20070276681A1 (en) Method Of Providing Bearer Certificates For Private Civil Security Benefits
Gurtner et al. PRE & RAPID: Community Impact Assessment for Disaster Recovery
WO2008082746A2 (en) Subscription-based private civil security facilitation method
US20080255868A1 (en) Subscription-Based Private Civil Security Facilitation Method and Apparatus
Spice Disaster shelter planning: Using a social domain heuristic to examine organizational behaviors of policy implementation during the 2004 hurricane season in Florida
WO2008036672A2 (en) Subscription-based private civil security facilitation method
Lakamp Developing a shared service unmanned aerial vehicle capability for regional emergency services
WO2008073527A2 (en) Subscription-based private civil security facilitation method
Islam Legal and Institutional Advancement of DM in Bangladesh
WO2008085573A2 (en) Subscription-based private civil security facilitation method
WO2008085584A2 (en) Subscription-based private civil security facilitation method
Crabtree A community-based participatory research approach to assist vulnerable communities in developing a disaster preparedness plan to lessen the impact of natural disasters
US20090112777A1 (en) Method of providing variable subscription-based access to an emergency shelter
Brunet Grant funding to state and local governments and systematic assessment of vulnerability
County Classified Marketplace
WO2008042797A2 (en) Method of providing an on-call private civil security operator
WO2008057769A2 (en) Subscription-based private civil security facilitation method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07872324

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07872324

Country of ref document: EP

Kind code of ref document: A2