David “Sherlock” Hawkins is using his Malipod™ virtual machine for crime site analysis (see references) to investigate Nicholas (Nick) Soames, Joanne Isham and Tracey McVicar as possible ad-hoc custodians of the various patented AI/expert-system algorithms needed by Serco—the world’s largest non-government air traffic controller—and DOJ Pride operators of prisoner-transport (Con Air) and pedophile-tagging networks to synchronize dead-pool betting on body counts at mass-casualty events and spot fix the weight of carbon saved by crashing passenger-carrying aircraft at drag-and-drop crime sites apparently selected by former U.S. Vice President Al Gore to reduce the risks of catastrophic anthropogenic global warming (CAGW).
By way of example, Hawkins believes that Soames, Isham and McVicar sold time-lapse rights in patented assets, including a drag-and-drop device, needed to spot fix the weight of carbon saved by crashing the Boeing 777-200ER carrying the 227 passengers and 12 crew of Malaysia Airlines Flight 370 (MH370)—a scheduled flight from Kuala Lumpur International Airport, Malaysia, to Beijing Capital International Airport in China—that disappeared on 8 March 2014 at a crime site in a communication dead zone and crashing the Boeing 777-200ER carrying the 283 passengers and 15 crew of MH Flight 17—a scheduled international passenger flight from Amsterdam to Kuala Lumpur—that was shot down on 17 July 2014 while flying over eastern Ukraine to crash at a crime site in a communication dead zone allegedly controlled by pro-Russian rebels in the War in Donbass, during the Battle of Shakhtarsk.
Hawkins Malipod™ analysis suggest that the 537 victims of the MH Boeing 777-200ER crashes in 2014 suffered wrongful deaths at crime sites in communication dead zones as a result of the negligent, reckless, wilful or fraudulent use of one or more of the following patents …..
· Apple Inc.’s “Graphical user interface providing consistent behavior for the dragging and dropping of content objects [targets?] Priority date 1995-08-07 …. 2003-03-18 US6535230B1 Grant”;
· Kim Rossmo’s “Expert system method of performing crime site analysis Priority date 1996-10-11 … 1998-07-14 US5781704A Grant … 2002-07-16 US5781704C1 Grant”
· Jerome Lemelson’s “Prisoner [Con Air] tracking and warning system and corresponding methods 2000-04-25 US6054928A Grant”;
· Jerome Lemelson’s “Friend or foe detection system and method and expert system military action advisory system and method Priority date 1999-01-13 …. 2001-03-13 US6201495B1 Grant”;
· Howard Lutnick’s “Real-time interactive wagering on event outcomes Priority date 2003-04-10 … 2016-08-02 US9406196B2 Grant”;
· Inmarsat Global Ltd’s “Method and apparatus for timing correction in communications systems Priority date 1999-03-05 .. 2009-05-12 US7532891B2 Grant”;
· BAE Systems PLC “Proximity fuze Priority date 1998-12-23 … 2004-12-28 US6834591B2 Grant”; and,
· QinetiQ North America Inc.’s “Social engineering protection appliance US9123027B2 Priority date 2010-10-19 …… 2015-09-01 US9123027B2 Grant.”
Hawkins’s Malipod™ crime site analysis suggests that Nicholas Soames (former U.K. Minister of State for the Armed Forces from 1994 to 1997 in the John Major government) and Tracey McVicar (managing partner of the CAI private equity group) equipped Joanne Isham—the woman who was awarded the CIA’s Distinguished Intelligence Medal by Clinton pardonee, the disgraced former CIA Director John Deutch on March 18, 1995 for outstanding management of the CIA’s Office of Congressional Affairs and the founder of the National Imagery and Mapping Agency (NIMA) on Oct. 1, 1996—with the Joint Automated Booking System (JABS) and expert-system algorithms allegedly developed for Serco and DOJ Pride SWAT teams to target victims selected by Gore and spot fix outcomes of the following events …
· On Christmas Day 1996, when the writer of the JonBenet Ramsey ransom note declared “Any deviation of my instructions will result in the immediate execution of your daughter.… Speaking to anyone about your situation, such as police or F.B.I. will result in your daughter being beheaded. .. You can try to deceive us, but be warned we are familiar with law enforcement countermeasures and tactics. …. S.B.T.C [Hawkins believes S.B.T.C stands for a Sigma Beta Tau Colony and alleges that Isham’s targets for extortion included then Lockheed Martin directors Lynne Cheney and Norman Mineta who would be told to stand down U.S. defenses on 9/11]”
· Between 1996 and 2002 when Isham appears to have used NIMA visualization and mapping, facilities and Lemelson’s patent expert systems algorithms to track prisoners, parolees and victims for “heart rate, pulse, blood pressure, respiration, temperature, and chemical properties of selected body fluids such as sweat and/or breath” and reward them for the removal or spoliation of evidence of murder-for-hire, hard-core and child-pornography and online-betting crime sites, formerly operated up to August 1999 by Vancouver-based Starnet Communications;
· In August 1999, when ‘SWAT teams and computer specialists from the U.S. Internal Revenue Service and the U.S. Customs Service, invaded Starnet’s Carrall Street office and seized equipment and records’ relating to hard core porn (snuff films?) and online gambling sites;
· On 9/11, when Soames deployed Con Air SWAT teams to a Serco sharehoilders’ meeting on 47th floor of WTC #1 and Tracey McVicar was scheduled to collect a drag-and-drop computer from a CIA/DOD/IRS command center allegedly established by Isham on the 25th floor of WTC7 to track the “first live-broadcast mass snuff film in human history” with NIMA’s “animated renditions of imagery and geospatial data” to support dead-pool betting during the attack in New York;
· In August 2010, when SWAT teams appear to have “tidied up” the flat of the late MI-6 spy Gareth Williams and removed fingerprints from the padlocked bag containing his body; and,
· On December 15, 2017, when SWAT teams appear to have removed electronic straps from the wrists of the late Barry and Honey Sherman; returned alibied Con Air killers to their prison cells; and, injected fake news of a murder suicide into the Toronto Police communications system.
Hawkins notes that while Ms. Isham can eliminate the apparent mens rea from crime sites by targeting victims, executing missions and rewarding SWAT teams through the use of patented drag-and-drop devices and expert-system algorithms, she leaves the custodians of such devices—Serco has just processed the 4 millionth patent applications as USPTO’s outsourcer for Pre-Grant Publication (PGPubs) Classification Services!—and its investment bankers N M Rothschild & Sons Ltd., and its shareholders including the Teachers (TIAA) pension fund, vulnerable to class-action lawsuits for wrongful death.
Hawkins’s Malipod™ investigations suggest that Isham, former director of the National Imagery and Mapping Agency, former VP/Deputy General manager at BAE Systems in Washington D.C. Metro Area, former Director of MacDonald, Dettwiler and Associates [MDA] Ltd. (now Maxar Technologies Ltd.), a director of SSL MDA Holdings, Inc. and of BEI Precision Systems & Space Co. Inc. (inventor of the Clinton-patented QRS11 gyrochip apparently embedded in the Boeing aircraft hijacked on 9/11) and a Member of Advisory Board at US Investigations Services [USIS], LLC., used a drag and drop interface and expert system algorithms on the federal bridge certification authority (FBCA) network to trigger a “Double Occurrence” cat bond on 9/11 after SWAT teams fraudulently attributed to the late Osama bin Laden’s attacked NYC’s WTC complex with two hijacked planes and demolished three buildings (WTC 1, 2 and 7) with the same energetic materials …
The President’s Interagency Council on Women
January 22, 1999—Joanne Isham, Central Intelligence Agency, is a member but not in photo https://1997-2001.state.gov/picw/images/Icwphoto.jpg
Hawkins has identified Nicholas Soames, a grandson of Winston Churchill and former Minister of State for the Armed Forces from 1994 to 1997 in the government of John Major, as the primary custodian of patents covering Con Air AI/expert systems and Entrust PKI devices who, allegedly, ordered Serco and the UK MOD to adopt the version of Entrust PKI developed by a CAI investee, the B.C.-based MacDonald, Dettwiler and Associates Ltd., for the secondary custodian Tracey McVicar, founder of the Vancouver branch of the NYC-headquartered CAI Private Equity Group, whose special investors were alleged clients for Starnet’s online LGBT, child pornography and pig-farm murder-for-hire services from 1996 to 2002.
Hawkins is recommending that families who lost loved ones in HVT or mass-casualty events associated with the negligent, reckless, wilful or fraudulent use of patents in the de-facto custody of agents of Soames, McVicar, Serco or the CAI Private Equity Group, including their shareholders, investment bankers or clients, should follow civil procedures with claims for damages for wrongful deaths similar to those used by the Brown and Goldman families where were awarded compensatory and punitive damages totalling $33.5 million after O.J. Simpson was acquitted in a verdict announced on October 3, 1995 of the murder of his ex-wife, Nicole Brown Simpson, and her friend, Ron Goldman, but where Simpson as sole defendant in the civil case was found responsible for both deaths.
Hawkins has also stated that if he is given all or any of the $10 million reward offered by the family for his help in solving the Sherman murders, he will share the reward equally with Jason Goodman, founder of Crowd Source the Truth, as the only investigative journalist with the technical ability to work with Hawkins on the real-time ‘discovery’ of evidence needed to identify the principals of network who use patented devices or systems to spot fix times of death or body counts at HVT or mass-casualty events.
Introduction to Reverse Engineered Crime Scene Investigation with David Hawkins https://www.youtube.com/watch?v=wZHkQUQjP_k
©2018 David C. Hawkins
“Why does David Hawkins use Malipod as a virtual machine to reverse engineer phony expert system crime site analysis at coordinated, synchronized and spoliated high value targets and mass-casualty events? [‘Mali-’ because it is derived] from dismal (adj.) c. 1400, “unlucky, inauspicious,” in dismal day, earlier as a noun, in the dismal (c. 1300) “in days of misfortune or disaster, under inauspicious circumstances, at an unlucky time,” from Anglo-French dismal (mid-13c.), apparently from Old French (li) dis mals “(the) bad days,” from Medieval Latin dies mali “evil or unlucky days” (also called dies Ægyptiaci), from Latin dies “days” (from PIE root *dyeu-“to shine”) + mali, plural of malus “bad” (from PIE root *mel- “false, bad, wrong”) and ‘-pod’ because Con Air SWAT teams tend to bond together as experts to exploit different vulnerabilities—Sex, Fear, Greed, Power—in their victims.”
“Serco farewell to NPL after 19 years of innovation 8 January 2015 Serco said goodbye to the National Physical Laboratory (NPL) at the end of December 2014 after 19 years of extraordinary innovation and science that has seen the establishment build a world-leading reputation and deliver billions of pounds of benefit for the UK economy. During that period under Serco’s management and leadership, NPL has delivered an extraordinary variety and breadth of accomplishments for the UK’s economy and industry. Some of the key achievements during that time have been: … It has been estimated that work carried out by the Centre of Carbon Measurement at NPL will save eight million tonnes of carbon emissions reductions (2% of UK footprint) and over half a billion pounds in economic benefit over the next decade…. NPL’s caesium fountain atomic clock is accurate to 1 second in 158 million years and NPL is playing a key role in introducing rigour to high frequency trading in the City through NPLTime.”
“Malaysia Airlines Flight 370 was a scheduled international passenger flight operated by Malaysia Airlines that disappeared on 8 March 2014 while flying from Kuala Lumpur International Airport, Malaysia, to its destination, Beijing Capital International Airport in China. Commonly referred to as “MH370”, “Flight 370”, or “Flight MH370”, the flight was also marketed as China Southern Airlines Flight 748 (CZ748/CSN748) through a codeshare. The crew of the Boeing 777-200ER aircraft last communicated with air traffic control (ATC) around 38 minutes after takeoff when the flight was over the South China Sea. The aircraft was lost from ATC radar screens minutes later, but was tracked by military radar for another hour, deviating westwards from its planned flight path, crossing the Malay Peninsula and Andaman Sea. It left radar range 200 nautical miles (370 km) northwest of Penang Island in northwestern Malaysia. With all 227 passengers and 12 crew aboard presumed dead, the disappearance of Flight 370 was the deadliest incident involving a Boeing 777 and the deadliest incident of Malaysia Airlines’ history, until it was surpassed in both regards by Malaysia Airlines Flight 17 four months later. The combined loss caused significant financial problems for Malaysia Airlines, which was renationalised by the Malaysian government in December 2014.”
“Malaysia Airlines Flight 17 (MH17)[a] was a scheduled passenger flight from Amsterdam to Kuala Lumpur that was shot down on 17 July 2014 while flying over eastern Ukraine, killing all 283 passengers and 15 crew on board. Contact with the aircraft, a Boeing 777-200ER, was lost when it was about 50 km (31 mi) from the Ukraine–Russia border and wreckage of the aircraft fell near Hrabove in Donetsk Oblast, Ukraine, 40 km (25 mi) from the border. The shoot-down occurred in the War in Donbass, during the Battle of Shakhtarsk, in an area controlled by pro-Russian rebels. The crash was Malaysia Airlines‘ second aircraft loss during 2014 after the disappearance of Flight 370 on 8 March.
The responsibility for investigation was delegated to the Dutch Safety Board (DSB) and the Dutch-led joint investigation team (JIT), who concluded that the airliner was downed by a Buk surface-to-air missile launched from pro-Russian separatist-controlled territory in Ukraine. According to the JIT, the Buk that was used originated from the 53rd Anti-Aircraft Missile Brigade of the Russian Federation, and had been transported from Russia on the day of the crash, fired from a field in a rebel-controlled area, and the launcher returned to Russia after it was used to shoot down MH17. On the basis of the JIT’s conclusions, the governments of the Netherlands and Australia hold Russia responsible for the deployment of the Buk installation and are taking steps to hold Russia formally accountable.
The DSB and JIT findings confirmed earlier claims by American and German intelligence sources as to the missile type and launch area. In 2014 the American intelligence had also said that Russia had supplied the Buk missile to pro-Russian insurgents, and that the insurgents most plausibly shot down MH17 in error, after misidentifying it as a military aircraft.”
“BAE Systems PLC Proximity fuze Priority date 1998-12-23 … 2004-12-28 US6834591B2 Grant … Abstract A proximity fuze for use in a tube launched projectile carrying a payload, comprising an oscillator for generating a radio frequency signal which has a varying frequency, a single antenna for transmitting the radio frequency signal and for receiving an echo of the radio frequency signal, a first signal processor for generating a range signal corresponding to the time delay between the transmission of the radio frequency signal and the receipt of the echo signal, second signal processor for comparing the range signal with a reference signal and depending on the result of the comparison generating an activation signal for activating the payload, wherein a directional coupler is used for coupling the radio frequency signal from the oscillator to the antenna and to the signal processor and for coupling the echo signal from the antenna to the signal processor, and wherein the second signal processor comprises a threshold detector, a peak detector and a comparator, the threshold detector being for allowing the comparator to utilise the output from the peak detector only once the range signal has reached a predetermined magnitude.”
“Inmarsat Global Ltd’s Method and apparatus for timing correction in communications systems Priority date 1999-03-05 .. 2009-05-12 US7532891B2 Grant Abstract In a wireless communications system, transceivers transmit short bursts to a base station, which determines timing corrections from the time of receipt of the burst and transmits the timing corrections to the respective transceivers. In one aspect, the base station indicates to the transceivers a plurality of time slots, each transceiver selects one of the time slots at random, formats a burst including an indicator of the selected time slot and transmits the burst in that slot. In another aspect, the base station transmits to each transceiver a timing uncertainty value, which determines how the timing correction will be modified by the transceiver as the interval since last receiving a timing correction increases. Data bursts are transmitted in a format comprising a first unique word, a content field and a second unique word, in that order. The bursts are transmitted in a TDMA channel format which can accommodate both short and long bursts in a block format of constant periodicity.”
“Serco Combined Resilience Exercising – is critical in ensuring organisations are prepared for and able to manage risks that may affect lives, reputations and profits. Through our Combined Resilience exercising capability we offer a wide range of solutions to assist with the development of emergency plans and procedures and also to ultimately test preparedness and resilience within and between key organisations and agencies. Simulation and Media Support The method of delivering an exercise is flexible and will be designed with the client to meet their requirements with options ranging from simple paper-based delivery through to full [MITM] use of their real communications systems and advance computer simulation. In addition, media play can also be added in the form of news injects and the provision of experienced journalists and television crews to help test procedures and also assist in training key staff.”
“Apple Inc.’s Graphical user interface providing consistent behavior for the dragging and dropping of content objects Priority date 1995-08-07 …. 2003-03-18 US6535230B1 Grant Abstract A drag-and-drop operation in a graphical user interface is controlled dependence upon whether the destination for the operation is a content object or a service object. If the destination of a drag-and-drop operation is a content object, the resulting action is to move the dragged object from its original location to the destination. If the destination is a service object, the resulting action is to perform the associated service on the dragged object without affecting the perceived location of the data contained in the dragged object. If the user desires that an operation other than a move be made when dragging an object to a content object, a specified key on a keyboard is pressed, to indicate that the drag-and-drop operation should make a copy, rather than merely move the object. If the source of the dragged object does not permit the user to move the object, the user can be presented with an option to copy the object when the drag-and-drop operation is carried out. Alternatively, rather than requesting the user to indicate a choice each time such a situation occurs, the computer system can be set up to automatically make a copy if the source does not permit the object to be moved.”
“FOR IMMEDIATE RELEASE AG
TUESDAY, OCTOBER 22, 1996 (202) 616-2777
TDD (202) 514-1888
ATTORNEY GENERAL PRESENTS HAMMER AWARDS
AT DOJ “LAB DAY”
WASHINGTON, DC — Attorney General Janet Reno presented
Hammer Awards to three employee working groups from Justice
Department components as part of the Department’s “Justice
Performance Review Lab Day,” an event showcasing the achievements
of the Department’s 16 reinvention labs.
The Hammer Award is Vice President Gore’s special
recognition to teams of employees which made significant
contributions in support of the President’s National Performance
Review (NPR) principles of improving customer service, cutting
red tape, empowering employees, and getting back to basics.
“By accepting the challenge to re-invent government, these
employees are making government more efficient and improving the
way we perform our public responsibilities,” Reno said during the
Lab Day event in the Justice Department’s Great Hall. Deputy
Attorney General Jamie Gorelick, who also attended, noted that
the employees “have taken the concept of creating a government
that works better and costs less and have made it a reality.”
The three Justice Department teams receiving the award are:
* The SENTRI Reinvention Lab, for developing a secure,
high-tech, automated border inspection system at Otay Mesa,
* The Joint Automated Booking System (JABS) Lab, a multi-
component effort which has significantly improved the
prisoner booking process;
* The Justice Prisoner Alien Transportation System (JPATS),
which combines the resources of several DOJ components to
schedule and transport prisoners more quickly, safely, and
Additional information on the awardees is attached.
96-523 ### “
“Investigator tried to warn of serial killer, Pickton inquiry told
By PETTI FONGStaff Reporter
Wed., Oct. 12, 2011
VANCOUVER—A senior Vancouver police investigator who pioneered geographic criminal profiling tried to warn residents in the Downtown Eastside that a serial killer was on the loose and preying on vulnerable women, a commission looking into missing women heard Wednesday.
Kim Rossmo, who completed his doctorate in criminology while on the force and headed the Vancouver police department’s geographic profiling section, wrote a public warning in May 1998, said his lawyer Mark Skwarok.
Dr. Kim Rossmo, a respected criminal profiler, drafted a letter of warning in 1998, the B.C. inquiry was told by his lawyer Wednesday.
The inquiry was ordered by the provincial government after Robert Pickton was convicted in 2007 of six counts of second degree murder. Another 20 counts of murder were stayed when Pickton was sentenced to life in prison.
The commission is looking at a time frame between January 1997 and February 2002 when Pickton was finally arrested. During that period, the commission has heard, the Vancouver police department and Port Coquitlam RCMP, where Pickton had a pig farm, were aware of his connections to the Downtown Eastside.
But despite early suspicions that the disappearance of dozens of women may be linked to a killer, the Vancouver police ignored mounting evidence, according to Rossmo’s lawyer.
“There is clear and unambiguous evidence that had senior police officers listened to him (Rossmo), Pickton would have been caught sooner,” said Skwarok.
Rossmo, who has since left the force and now teaches criminology at a university in Texas, wrote a draft press release in 1998 that warned residents in the Downtown Eastside that a serial killer was preying on people in the neighbourhood.
Pickton’s victims were sex trade workers and drug addicts who had come to the impoverished neighbourhood to live and work.
Drawing on evidence from analysis done on the number of women who went missing and those who were later found murdered Rossmo concluded that the most likely explanation for the majority of cases was a single murderer preying on skid row prostitutes.
“The probability that the extraordinary increase in the number of missing women could be attributed to chance was less than one per cent,” Skwarok told the commission.
But despite Rossmo’s belief that a serial killer found his victims in the Downtown Eastside, his bosses in the Vancouver police department refused to publish his report.
Nearly a dozen organizations representing sex trade workers, residents in the Downtown Eastside and aboriginal groups have pulled their participation from the commission because their request for funding from the provincial government was rejected.
Ann Livingston, of the group Vancouver Area Network of Drug Users, said the women who went missing were often lured to their deaths with illegal drugs and while they were living, they were criminalized and marginalized because of their drug addictions and poverty.
Many of them had children and some of those children live in the Downtown Eastside.
“We want to be assured the orphaned children are looked after so they don’t kill themselves or drug or drink themselves to death,” said Livingston. “We want an apology from the police for disregarding us.”
Lawyer Sean Hearn, who is representing the Vancouver police department and police board, made an apology to the families of the missing women, saying the force should have caught Pickton sooner.
But he reminded the commissioner that investigators did not know all the facts.
“There was a frighteningly large number of suspects capable of committing these crimes who live among us,” said Hearn. “Today we see a clear path between the Downtown Eastside and the pig farm.”
But in the late 1990s, police didn’t have all the information and the benefit of hindsight bias must always be kept in mind, he said.”
“Darcy Kim Rossmo’s Expert system method of performing crime site analysis Priority date 1996-10-11 …. 1998-07-14 US5781704A Grant … 2002-07-16 US5781704C1 Grant Abstract An expert system method is provided that performs crime site analysis in a criminal activity area to determine a likely center of criminal activity. The method uses distances from related crime sites to determine a probability surface for the entire criminal activity area. A target area having highest values of probability becomes the center of criminal activity. The expert system can be used to access other crime databases such as witness reports to further define the criminals; residence or workplace.”
“Digital Fires Instructor Serco – [Marine Corps Base] Camp Pendleton, CA Uses information derived from all military disciplines (e.g., aviation, ground combat, command and control, combat service support, intelligence, and opposing forces) to determine changes in enemy capabilities, vulnerabilities, and probable courses of action.”
“Jerome H. Lemelson’s Prisoner tracking and warning system and corresponding methods Priority date 1998-06-04 2000-04-25 US6054928A Grant Abstract A system and method for tracking, monitoring and learning prisoner or parolee behavior involves obtaining prisoner or parolee data and monitoring data for at least one individual prisoner or parolee, storing the prisoner or parolee data and monitored data into a database, learning prisoner or parolee behavior from the prisoner or parolee data and the monitored data in the database, and updating the prisoner or parolee data and the monitored data in the database. Expert system (i.e. including but not limited to fuzzy logic, reinforcement learning, neural networks, artificial intelligence, etc.) algorithms are executed for determining and analyzing deviated behavior by the prisoner or parolee. A parole level is assigned to the prisoner or parolee and it is determined whether the prisoner or parolee is to be moved up or down a parole level depending on whether the prisoner or parolee behavior does not constitute or does constitute prisoner or parolee violations. Furthermore, the system tracks, monitors, and learns the behavior of the prisoner or parolee by controlling and regulating the permitted/prohibited locations or sectors, the permitted/prohibited location or sector dwell times, the permitted/prohibited travel routes, the permitted/prohibited travel times that the prisoner or parolee spends at or between various locations.
FIG. 3 illustrates a prisoner/parolee tracking and monitoring system and method in accordance with the herein disclosed inventions. The system and method of FIG. 3 permits simultaneous tracking and monitoring of multiple prisoners or parolees 38. The individual prisoners/parolees 38 each have securely attached to their body a prisoner sensor/processor unit 52. The unit 52 may be attached to the arm, the leg, the waist or in any convenient manner to each prisoner/parolee 38. Such attachment is, however, secured and may only be removed by an authorized person. The prisoner or parolee sensor/processor unit 52 permits tracking the location of individual prisoners/parolees 38 as well as monitoring audio sounds, communicating with the prisoner/parolee 38 or other personnel in the vicinity of the prisoner/parolee 38, and monitoring physical conditions of the prisoner/parolee 38 including, for example, his/her heart rate, pulse, blood pressure, respiration, temperature, and chemical properties of selected body fluids such as sweat and/or breath. The unit 52 is a compact electronic system specifically designed for comprehensive monitoring, tracking, and learning of prisoners/parolees 38.”
“Jerome H. Lemelson’s Friend or foe detection system and method and expert system military action advisory system and method Priority date 1999-01-13 …. 2001-03-13 US6201495B1 Grant Abstract A friend or foe detection system and method is disclosed. Friend or foe warning unit 20 has a geographic locating system, a communication system for communicating with each of the warning units, and a military force detection system for detecting military forces in a combat area and has a signal routing and control circuitry 50 for controlling operations. A number of components, devices, or sub-systems, such as a transmitter/receiver radio 28, an antenna 26, a microphone 30, a speaker 32, a battery 34, a display 36, a microprocessor 38, a memory 40, a camera 56, a radarilidar input 54, on/off switch 52, a GPS location system 45 that includes a GPS processor 46, a GPS receiver 42, a GPS antenna 44, are coupled to the circuitry 50. Display 36 provides a display to the user of the unit 20 and shows the location of friendly forces as well as unfriendly or unidentified forces in the area. Display 36 displays text messages for the user of the warning unit 20. The microprocessor 38 together with memory 40 provide microprocessor control of the operations of the warning unit 20. The geographic locating system includes GPS processor 46, GPS receiver 42, and GPS antenna 44, and it is used to determine the exact location of the warning unit 20. The unit 20 is able to broadcast and receive military force information, such as location and status (i.e. friendly, unfriendly, unidentified statuses). An expert system military action advisory system and method for advising military troops or personnel of firing decisions is also disclosed. A firing index is determined based on the membership variables, and the firing index is used to help make the firing decisions. The membership variables and the firing index are defined for an expert system or fuzzy logic system, and the expert system or fuzzy logic system helps determine making the firing decisions. The system and method operate by transmitting target and friendly force GPS coordinate information to determine danger. Alternatively, only target coordinates are transmitted with fire danger indices calculated on a distributed basis by individual warning units and transmitted to the source of fire without friendly force location coordinates to assist in making final firing decisions.”
“Prisoner Escorting and Court Services Serco delivers safe and secure prisoner escort services on behalf of justice departments. We quickly and efficiently move people between prisons or police stations and court appearances, and care for them within the court environment.
We have unparalleled experience in the management of this complex prisoner care, planning, and logistics service, and understand the varied requirements of the stakeholder community.
Serco puts welfare and security at the heart of its escorting services, at the same time delivering the best value possible. With an extensive fleet of specialist cellular and multi-purpose vehicles, our services are carried out with compassion and care by highly trained and security cleared staff.
We innovate in partnership with customers and have trialled initiatives such as Mobile Video Court Services. This has not only helped us to reduce travel times, reduce the impact of the journey on the prisoner, increase court productivity, and reduce costs, it also continues to demonstrate that justice can be done digitally, securely, and still ‘in person’.”
“Joanne O’Rourke Isham is espionage and security expert from the United States. She is a former member of the Central Intelligence Agency(CIA) and currently involved in geospatial intelligence. Isham graduated from the University of Notre Dame in the mid 1970s. She started working in the Central Intelligence Agency (CIA) at the age of 20 doing background checks. Isham was Director of Congressional Affairs at the CIA during Aldrich Ames spy case, Associate Deputy Director for the CIA’s Directorate for Science and Technology, Deputy Director of National Geospatial-Intelligence Agency from November 2003 to April 2006. She was Deputy Director of National Imagery and Mapping Agency from September 2001 to October 2003. Isham retired from the CIA in 2006 as a member of the Senior Intelligence Service, and a career officer at the Central Intelligence Agency, which she had joined in 1977. In August 2017, she joined defense technology firm Polaris Alpha’s advisory board. Accolades Isham was awarded CIA’s Distinguished Intelligence Medal by Director John Deutch on March 18, 1995; in recognition for her outstanding leadership and management of the Office of Congressional Affairs. She was awarded the National Intelligence Medal of Achievement. She also received the Director’s Award in recognition of extraordinary service.”