Technology Development Projects

Organized Crime and Gang Organizational Studies System for Law Enforcement

This system would be able to study all the gangs and organized crime members, and link them together by monitoring their social media usage and their other forms of communication such as tapping into their smart phones. It could even search for communications that are encrypted. The system would be able to create organizational charts, and organize police responses to deal with the organized crime and gang activity, by predicting how many members will be involved at various locations, by using CCTV interfaces and tracking their smart phones and other connections to the Internet.

This system could be used in conjunction with the Automated RICO case building system, to lessen the work load that officers have to perform to organize a joint task force to fight crime.

Intelligence Community (IC) Artificial Intelligence (AI) Intelligence Monitoring System

The purpose of this system is to monitor the intelligence factors associated with many identifiable surveillance targets, such as tracking their daily activities, and accurately detecting trends that could indicate that the individual(s) have the intention to commit crimes, or otherwise do harm towards other persons, or materials, or systems.

The surveillance aspect of the systems should cumulative and incidentally monitor subjects, both on a strategic and tactical basis, to avoid allowing the individuals to slip out of the system, and to alert authorities of any impending or probable incidents.

This system could replace the need to have approximately 8 agents monitoring a single subject 24/7, per subject, not by de-employing the agents, but by more accurately applying resources to monitor all subjects that need to be monitored with a reduced level or number of active agents than what would be required to monitor all the subjects.

This system would use Artificial Intelligence (AI) to automate the monitoring processes, using electronic systems such as drones, satellites, and existing telecommunications infrastructure, to accurately gather all relevant intelligence relating to each of the subjects, and determine their associates, and their potential threats, and monitor for any activities that indicate threats or activities that would suggest they are willing to take action on any threats, even if they haven’t in the past.

This system would be applicable to tracking and identifying potential terrorists, criminals, and hackers. The system would compile probable decisions that may be made by the subjects, such as acting out on their threats, through tactical surveillance that develops an active profile of the intelligence factor of the subject, to determine if they are an immediate threat, and if so, dispatch any applicable resources to deal with containing, while hopefully preventing the threat.

If Artificial Intelligence (AI) can be foreseen to cause damages towards humanity, surely it can be controlled to make correct assessments towards potential threats, and deploy resources to deal with such threats before they occur. With intelligence communities around the world having their resources stretched thin to monitor all the potential criminals, terrorists, and hackers – including cyber criminals, it is no wonder we can come up with such an idea.

ILE – Artificial Intelligence (AI) to Auto-Solve Cases of Crime

There could be deep learning methods and processes / algorithms created to study the process of catching criminals, and there could be systems that automate the entire process of policing. It would go far beyond facial recognition and robots. Obviously, it’s a lot more complicated than combining a human with cybernetics. You need the hardware and software that runs on the robotics to make it possible to catch criminals, and to solve cases.

There would be entire deep learning mechanisms that would study what different individuals in Police Departments do, and integrate their interpersonal relationships in how they help each other to solve the crimes in their various titles or positions. The program would then compile all known data from public sources, such as from surveillance, and accurately identify suspects, that would be automatically produced for human police officers, that could then check the accuracy of the computer systems.

There would need to be a lot of security on the computer systems. Obviously, criminals would try to compromise the systems’ integrity, and either make the systems go down such as with Denial of Service attacks, or compromise its integrity – or make it catch the wrong people.

These systems are possible through the integration of both local, state, and Federal law enforcement and domestic surveillance resources, such as pooled data that is gathered by the National Security Agency. If there is evidence of someone committing a crime, it should be provided to law enforcement systems that can keep the integrity of the information, while protecting the public from its disclosure.

The system could also employ calculations, such as situational awareness for police and riot squads, such as automatic identification and tracking of specific individuals with Heads Up Displays (HUD) in their helmets or shields.

System That Safely Stops Vehicles

We’re thinking of a system, sort of like Low-Jack, which would safely stop vehicles, but be based on perimeters that are specific to specific vehicles, so that the vehicle could be limited to specific areas or perimeters within a city, state, or nation. The perimeters could be established based on the ignition computer, and based off radio transmissions that stop the vehicle from taking certain actions, such as preventing the vehicle from crossing over into pedestrian areas, or preventing the vehicle from crossing over into oncoming traffic. The onboard computers would basically just shut down the vehicle if it ever veered off course from normal paths. In the days of GPS and satellite surveillance, this could even be orchestrated by existing technologies.

This system could also be combined with a system that detects when a vehicle has been in proximity to alcohol dispensaries, and transmit information to local law enforcement of any indication that the driver is driving drunk. This could be determined with GPS navigation onboard the vehicle, which would determine driving habits, or changes in driving characteristics after being present in proximity to an alcohol dispensary. The courts could require the technology on any vehicle driven by anyone that has been convicted of a DUI in the past, for an example, paid for by the driver.

Vehicles could also be made so that they only work for specific drivers, through biometrics or other types of security technologies that verify who the driver is. This would also reduce the prevalence of vehicle theft.

Finding the Needle in the Haystack Technology

There is a need, for a highly sophisticated technology, to be able to scour through petabytes worth of data, comprised of video surveillance, for OCR and object and person recognition systems that can accurately track objects through their paths off the grid in and out of different systems and networks of systems including closed-circuit television surveillance systems, such as those inside retail stores, and those that are affixed on permanent locations throughout cities, for the purpose of aiding law enforcement in finding assets and targets for surveillance purposes, and also to find criminals that are fleeing from the law and know how to evade systems technologies.

You can’t always depend on there being leads that you can follow, especially for the type that we’re suggesting should be under surveillance, and you can’t always rely on an organization such as the NSA to provide the systems technology to aide in finding people, because there are conflicts of interest. You need a system that works throughout the different systems, like the Napster of the surveillance world – almost a movement of persons connecting their systems together to help law enforcement, for this type of a system to be able to work. You would need to work with ISPs and data centers to be able to facilitate the software that would run the systems, even across state lines. However, it is technically possible, even on an international level.

© Copyright MCE123 (SM) 1999-2018, All Rights Reserved.

Privacy Policy | Contact Us Protection Status