Method, system and computer program product for law enforcement

ABSTRACT

From a first patrol unit, first data are received for identifying a location of the first patrol unit. From the first patrol unit, second data are received for identifying a subject. The subject includes at least one of: a subject vehicle; and a subject person. A database is queried about the subject and, in response to the querying, a determination is made about whether the subject is a likely threat. In response to determining that the subject is a likely threat, and in response to the first data, a predetermined number of second patrol units are identified that are most geographically proximate to the location of the first patrol unit, and a message is output to the predetermined number of second patrol units about: the subject; the likely threat; and the first patrol unit.

CLAIM TO EARLIER APPLICATION

This application claims priority to U.S. Provisional Patent ApplicationNo. 61/421,195, filed Dec. 8, 2010, entitled METHOD, SYSTEM AND COMPUTERPROGRAM PRODUCT FOR LAW ENFORCEMENT, naming Jason Shane Rapp et al. asinventors.

BACKGROUND

The disclosures herein relate in general to information handlingsystems, and in particular to a method, system and computer programproduct for law enforcement.

BRIEF SUMMARY

In a first aspect, from a first patrol unit, first data are received foridentifying a location of the first patrol unit. From the first patrolunit, second data are received for identifying a subject. The subjectincludes at least one of: a subject vehicle; and a subject person. Adatabase is queried about the subject and, in response to the querying,a determination is made about whether the subject is a likely threat. Inresponse to determining that the subject is a likely threat, and inresponse to the first data, a predetermined number of second patrolunits are identified that are most geographically proximate to thelocation of the first patrol unit, and a message is output to thepredetermined number of second patrol units about: the subject; thelikely threat; and the first patrol unit.

In a second aspect, in response to the first and second data, apredetermined number of second patrol units are identified that are mostgeographically proximate to the location of the first patrol unit, and amessage is output to the predetermined number of second patrol unitsabout the subject.

In a third aspect, in response to the second data, second patrol unitsare identified that belong to a specified one or more categories ofpatrol units, and a message is output to the second patrol units aboutthe subject.

In a fourth aspect, from a first patrol unit, information is receivedfor identifying a geographic area. From the first patrol unit, acommunication is received. In response to the information and thecommunication, second patrol units are identified within the geographicarea, and the communication is output to the second patrol units.

In a fifth aspect, from a patrol unit that is associated with a humanofficer, a record is received of the human officer contacting a subject.The subject includes at least one of: a subject object; a subjectperson; and a subject location. In response to the receiving, the recordis stored in a database, irrespective of whether the record has beenadjudicated.

In a sixth aspect, from a patrol unit that is associated with a humanofficer, data are received for identifying a location of the patrolunit. From the patrol unit, a record is received of the human officerpursuing a subject. The subject includes at least one of: a subjectvehicle; and a subject person. In response to the receiving, the dataand the record are stored in association with one another in a database.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a block diagram of an information handling system of theillustrative embodiment.

FIG. 2 is a block diagram of a representative computing system of theinformation handling system of FIG. 1.

FIG. 3 is a flowchart of a first operation of the information handlingsystem of FIG. 1.

FIG. 4 is a flowchart of a second operation of the information handlingsystem of FIG. 1.

FIG. 5 is a flowchart of a third operation of the information handlingsystem of FIG. 1.

FIG. 6 is an illustration of a first screen displayed by a displaydevice of the information handling system of FIG. 1.

FIG. 7 is an illustration of a second screen displayed by a displaydevice of the information handling system of FIG. 1.

FIG. 8 is an illustration of a third screen displayed by a displaydevice of the information handling system of FIG. 1.

FIG. 9 is an illustration of a fourth screen displayed by a displaydevice of the information handling system of FIG. 1.

DETAILED DESCRIPTION

FIG. 1 is a block diagram of a system, indicated generally at 100,according to the illustrative embodiment. The system 100 includes: (a) anetwork 102, such as a Transport Control Protocol/Internet Protocol(“TCP/IP”) network (e.g., the Internet or an intranet); (b) acrime-fighting services platform 104 (“CSP”) for executing a CSPprocess; (c) federal agencies 106 and 108, each for executing respectivefederal agency processes; (d) state agencies 110 and 112, each forexecuting respective state agency processes; (e) local agencies 114 and116, each for executing respective local agency processes; and (f)mobile patrol units 118, 120, 122, 124, 126 and 128 (e.g., located inrespective patrol cars), each for executing respective patrol unitprocesses.

In one embodiment: (a) the agencies 106, 108, 110, 112, 114 and 116 arelaw enforcement agencies; and (b) the CSP aggregates, manages andcommunicates various information from and to the agencies and patrolunits in support of their law enforcement activities. Accordingly, asshown in FIG. 1, the CSP is coupled through the network 102 to each ofthe agencies and patrol units. Through the network 102, information iselectronically (e.g., wirelessly) communicated by the CSP, agencies andpatrol units, to and from one another. For example, through the network102, human users (from among the CSP, agencies and patrol units) mayelect to communicate such information to and from one another orally(e.g., voice-over-IP communications).

For clarity, FIG. 1 shows one representative CSP, but more such CSPs arelikewise connectable to the network 102. Also, FIG. 1 shows sixrepresentative agencies, but more such agencies are likewise connectableto the network 102 for operation with the CSP. Further, FIG. 1 shows sixrepresentative patrol units, but more such patrol units are likewiseconnectable (e.g., via wireless telecommunication) to the network 102for operation with the CSP.

The CSP is helpful for accurately and efficiently aggregating, managingand communicating various information from and to the agencies andpatrol units in support of their law enforcement activities, especiallyin view of: (a) the potentially large number of such agencies and patrolunits; (b) their even larger number of various activities, and potentialdifficulty in timely obtaining and sharing relevant information aboutsuch activities, which are potentially complex; (c) a wide range ofdifferent circumstances and preferences of such agencies and patrolunits; and (d) potentially frequent changes in such agencies, patrolunits, activities, circumstances and preferences.

FIG. 2 is a block diagram of a representative computing system 200 ofthe illustrative embodiment. Each of the CSP, agencies and patrol unitsincludes a respective computing system, such as the representativecomputing system 200, for executing a respective process and perfoHningrespective operations (e.g., processing and communicating information)in response thereto. Such computing system operates in association witha respective human user 202.

The system 200 is formed by various electronic circuitry components,including: (a) a general purpose computer 204, which is a generalpurpose computational resource such as a laptop computer, for executingand otherwise processing instructions, and for performing additionaloperations (e.g., communicating information) in response thereto; (b)input devices 206 for receiving information from the user 202; (c) adisplay device 208 (e.g., a conventional flat panel monitor) fordisplaying information to the user 202; (d) a print device 210 (e.g., aconventional electronic printer) for printing visual images on paper;(e) a computer readable medium (or apparatus) 212 (e.g., a hard diskdrive or other nonvolatile storage device) for storing information; (f)a portable computer readable medium (or apparatus) 214 (e.g., aremovable flash memory card or CD-ROM) for storing information; and (g)various other electronic circuitry for performing other operations ofthe system 200.

For example, the computer 204 includes: (a) a network interface (e.g.,circuitry) for communicating information with the network 102 (e.g.,outputting information to, and receiving information from, the network102), such as by transferring information (e.g. instructions, data,signals) between the computer 204 and the network 102; and (b) a memorydevice (e.g., random access memory (“RAM”) device and/or read onlymemory (“ROM”) device) for storing information (e.g., instructions ofsoftware executed by the computer 204, and data processed by thecomputer 204 in response to such instructions). Accordingly, the networkinterface of the computer 204 is coupled through a network connection216 to the network 102. Also, in the example of FIG. 2, the computer 204is connected to the input devices 206, the display device 208, the printdevice 210, the computer readable medium 212, and the computer readablemedium 214, as shown in FIG. 2. The computer 204 executes: (a) operatingsystem software for performing general purpose tasks; and (b) otherprocesses and applications.

In response to signals from the computer 204, the display device 208displays visual images, which represent information, and the user 202views such visual images. Also, the user 202 operates the input devices206 for outputting information to the computer 204, and the computer 204receives such information from the input devices 206. Moreover, inresponse to signals from the computer 204, the print device 210 printsvisual images on paper, and the user 202 views such visual images.

The input devices 206 include, for example, a conventional electronickeyboard (or keypad) and a pointing device, such as a conventionalelectronic “mouse” or rollerball. The user 202 operates the keyboard (orkeypad) to output alphanumeric text information to the computer 204,which receives such alphanumeric text information. The user 202 operatesthe pointing device to output cursor-control information to the computer204, and the computer 204 receives such cursor-control information. Theinput devices 206 also include, for example, touch-sensitive circuitryof a liquid crystal display (“LCD”) device.

FIG. 3 is a flowchart of a first operation of the system 100. From anofficer (which is associated with a patrol unit) via the patrol unit'sassociated input devices (e.g., from a human officer, such as a policeofficer, a sheriff or a security person), the patrol unit receivesinformation for identifying a subject (“subject identification data”),such as: vehicle identification data (step 302) for identifying asubject vehicle; and person identification data (step 304) foridentifying a subject person. In response to the patrol unit's receiptof the subject identification data, the patrol unit automaticallyoutputs such data to the CSP (steps 306 and 308) through the network102. At a step 310, in response to such data, the CSP automatically: (a)receives and stores such data in association with such patrol unit'sreported then-current geographic location; and (b) through the network102 (e.g., via extensible markup language (“XML”) transmission), queriesmultiple law enforcement sources 312 about the subject, and receives(from the sources 312) information about the subject in responsethereto. The sources 312 include: (a) local agency databases; (b) theCSP's database; (c) state law enforcement telecommunications system(“LETS”) databases; and (d) federal LETS databases.

At a step 314, in response to the information (received by the CSP fromthe sources 312) about the subject (e.g., about such vehicle and/orperson), the CSP executes a software application for: (a) analyzing suchinformation; and (b) in response to such analysis, determining whetherthe subject is a likely threat (e.g., a probable danger to the patrolunit, its associated patrol car, and/or its associated officer). If theCSP determines (at the step 314) that the subject is an unlikely threat,then the CSP outputs (through the network 102) a message to inform thepatrol unit accordingly (step 316). Such message includes information(received by the CSP from the sources 312) about the subject.

Conversely, if the CSP determines (at the step 314) that the subject isa likely threat, then the CSP executes a software application foridentifying a predetermined number (e.g., 5) of other patrol units thatare most geographically proximate to the patrol unit in probable danger(step 318). As shown at a step 320, through the network 102, the patrolunits report their respective then-current geographic locations to theCSP at a periodic rate (e.g., once every 15 seconds), so that suchreports are periodically updated. The CSP automatically receives suchreports through the network 102, and the CSP accordingly updates itsrecord of such locations in a database of auto vehicle location (“AVL”)information (e.g., stored in the computer readable medium 212 of theCSP), so that the CSP: (a) stores a timeline record of each patrolunit's various geographic locations; and (b) is thereby enabled toidentify a predetermined number of other patrol units that are mostgeographically proximate to the patrol unit in probable danger.

After the step 318, the CSP outputs (through the network 102): (a) analert to the patrol unit in probable danger (step 322), plus a message(to such patrol unit) that includes information (received by the CSPfrom the sources 312) about the subject and the likely threat (step316); and (b) alert notifications (step 324) to other recipients 326about the subject and the likely threat. The other recipients 326include: (a) various global subscribers; (b) various dispatch units; (c)various short message service (“SMS”) devices; and (d) additionally,only those identified predetermined number of other patrol units thatare most geographically proximate to the patrol unit in probable danger.Accordingly, the CSP outputs the alert notifications to the otherrecipients 326 by one or more of the following techniques: (a) instanttext messaging; (b) broadcast messaging; and (c) “officer needsassistance” messages.

In response to those other patrol units' receipt of the alertnotifications from the CSP, they output (through their respectivelyassociated display devices) suitable information to their respectivelyassociated officers, who may respond accordingly (e.g., by assisting theofficer of the patrol unit in probable danger). For example, suchinformation includes display of: (a) a chat room screen (e.g., as shownin FIG. 6) for such officers to communicate (by alphanumeric textmessages) with one another about the probable danger and possibleresponses (step 328); and (b) a map screen (e.g., as shown in FIG. 7)for showing the then-current geographic location of the patrol unit inprobable danger, on a periodically updated basis (step 330).

At a step 332, in response to the patrol unit's receipt of a “be on thelookout” command (“BOLO”) from an officer via the patrol unit'sassociated input devices, the patrol unit automatically outputs a BOLOmessage to the CSP through the network 102. At the step 310, in responseto the BOLO message (which includes relevant subject identificationdata, such as vehicle identification data and/or person identificationdata), the CSP automatically: (a) receives and stores such data inassociation with such patrol unit's reported then-current geographiclocation; and (b) through the network 102, queries the sources 312 aboutthe subject, and receives (from the sources 312) information about thesubject in response thereto. After the step 310, the operation continuesas discussed hereinabove in connection with the steps 314 through 330.In one example, in response to the BOLO message: (a) at the step 318,the CSP executes a software application for identifying all other patrolunits that belong to a specified one or more categories of patrol units(e.g., all other patrol units that belong to a specified one or moretask forces, sectors, agencies, counties, states and/or othergovernments); and (b) at the step 324, the CSP outputs (through thenetwork 102) alert notifications to those other patrol units, inaddition to the other recipients 326. In one embodiment, the one or morecategories are specified in the BOLO message itself.

FIG. 4 is a flowchart of a second operation of the system 100. At a step402, in response to a patrol unit's receipt of a “geographic messaging”command from an officer via the patrol unit's associated input devices,the patrol unit automatically outputs (through its associated displaydevice) an interactive map (e.g., as shown in FIG. 8) for display to theofficer, so that the officer is enabled to specify a geographic area onthe interactive map (e.g., by suitably operating a touch-screen displaydevice, or by suitably operating the patrol unit's associated inputdevices). For example, the officer is enabled to specify the geographicarea (step 404) as either: (a) an area within a geographic proximity(e.g., within a 5-mile geographic radius) of the patrol unit'sthen-current geographic location; or (b) any other area (e.g., even anirregularly shaped area), irrespective of whether the patrol unit isthen-currently located within such area (e.g., as shown in FIG. 9).

At a step 406, from the patrol unit's associated input devices and/ordisplay device, the patrol unit: (a) receives the officer's specifiedgeographic area and the officer's specified communication (e.g.,alphanumeric text); and (b) in response thereto, automatically outputssuch information (e.g., the officer's specified geographic area and theofficer's specified communication) within a “geographic communication”message to the CSP. At a step 408, in response to the “geographiccommunication” message, the CSP automatically: (a) receives and stores arecord of the “geographic communication” message in association withsuch patrol unit's reported then-current geographic location; and (b)executes a software application for identifying all other patrol unitsthat are then-currently located within the officer's specifiedgeographic area (e.g., by analyzing the AVL information). As shown at astep 410, through the network 102, the patrol units report theirrespective then-current geographic locations to the CSP at a periodicrate (e.g., once every 15 seconds), as discussed hereinabove inconnection with the step 320 (FIG. 3).

After the step 408, the CSP outputs (through the network 102) theofficer's specified communication to only those other patrol unitsidentified at the step 408. In response to those other patrol units'receipt of the officer's specified communication from the CSP, theyoutput (through their respectively associated display devices) suitableinformation to their respectively associated officers, who may respondaccordingly. For example, such information includes display of: (a) theofficer's specified communication (step 412); and (b) a chat room screen(e.g., as shown in FIG. 6) for such officers to communicate (byalphanumeric text messages) with one another about possible responses(step 414). At a step 416, in response to those other patrol units'receipt of the officer's specified communication from the CSP, the CSPoutputs (through the network 102) a success message for indicating suchfact to the officer who issued the “geographic messaging” command.

FIG. 5 is a flowchart of a third operation of the system 100. At steps502 and 504, in response to a patrol unit's receipt of a “contacthistory” record from an officer via the patrol unit's associated inputdevices, the patrol unit automatically outputs a “contact” message andsuch record to the CSP through the network 102. For example, the patrolunit receives the “contact history” record from the officer via thepatrol unit's associated input devices, in response to the officer's:(a) communication with a person (e.g., pedestrian, occupant of abuilding, passenger of a motor vehicle, and/or operator of a motorvehicle); (b) visit to a location (e.g., physical address); and/or (c)encounter with an object (e.g., weapon, drugs, contraband, motorvehicle, and/or other property). At a step 506, in response to the“contact” message (which includes relevant subject identification data,such as vehicle identification data and/or person identification data),the CSP automatically receives and stores such record in the CSP'sdatabase (e.g., stored in the computer readable medium 212 of the CSP),irrespective of whether such record has been adjudicated (e.g.,adjudicated by a court of law).

At a step 508, in response to the CSP's receipt (e.g., through thenetwork 102) of a suitable query command from a human user (e.g., fromamong the CSP, agencies and patrol units), the CSP searches and analyzesits various databases of information (e.g., the sources 312 of FIG. 3)to identify relevant ones of such records. In one example, the suitablequery command includes relevant subject identification data, such asvehicle identification data and/or person identification data (steps 510and 512). After the step 508: (a) the CSP outputs (e.g., through thenetwork 102) such identified records to the querying user at a step 514;and (b) from the CSP, the querying user receives and views suchidentified records for analysis.

The suitable query command includes hard and/or soft identifiers. Forexample: (a) hard identifiers identify a group of such records byspecifying a particular person, location or object; and (b) softidentifiers identify a group of such records by specifying other typesof attributes. The CSP automatically stores such records that itreceives from all patrol units within the system 100, irrespective ofwhether such patrol units belong to a particular agency. On asubstantially real-time basis after such receipt and storage by the CSP,and subsequently, the CSP makes such records available for such query byany agency or patrol unit within the system 100, irrespective of whethersuch records originated from patrol units that belong to a differentagency within the system 100.

In yet another operation of the system 100, in response to a patrolunit's receipt of a “pursuit mode” command from an officer via thepatrol unit's associated input devices, the patrol unit (“patrol unit inpursuit”) automatically: (a) outputs a “pursuit” message to the CSPthrough the network 102; and (b) reports its then-current geographiclocation to the CSP at a higher rate (e.g., once every second instead ofonce every 15 seconds), until either a predetermined amount of timeexpires or the patrol unit receives an “end pursuit mode” command fromthe officer via the patrol unit's associated input devices. In responseto the “pursuit” message, the CSP automatically receives and stores arecord of the “pursuit” message in association with such patrol unit'sreported then-current geographic location. Such record is stored in theCSP's database (e.g., stored in the computer readable medium 212 of theCSP).

In response to the CSP's receipt (e.g., through the network 102) of asuitable query command from a human user (e.g., from among the CSP,agencies and patrol units): (a) the CSP outputs (e.g., through thenetwork 102) such “pursuit” record to the querying user; and (b) fromthe CSP, the querying user receives and views such “pursuit” record foranalysis. The suitable query command includes hard and/or softidentifiers. On a substantially real-time basis after such receipt andstorage by the CSP, and subsequently, the CSP makes such “pursuit”record available for such query by any agency or patrol unit within thesystem 100, irrespective of whether such “pursuit” record originatedfrom a patrol unit that belongs to a different agency within the system100.

In one example, the patrol unit receives the “pursuit mode” command fromthe officer via the patrol unit's associated input devices, in responseto the officer's then-current encounter with a location of interest. Forexample, if the officer is driving a patrol car in pursuit of a suspectand then-currently views an object being thrown from the suspect'smoving vehicle at a particular geographic location, then such particulargeographic location becomes a location of interest. If the patrol unittimely receives the “pursuit mode” command from the officer via thepatrol unit's associated input devices, in response to the officer'sthen-current encounter with such location of interest, then the CSP (inresponse to the “pursuit” message from the patrol unit) automaticallyreceives and stores a record of the “pursuit” message in associationwith such patrol unit's reported then-current geographic location. On asubstantially real-time basis after such receipt and storage by the CSP,and subsequently, the CSP makes such “pursuit” record available forquery by any agency or patrol unit within the system 100, so that suchlocation of interest is more readily identifiable.

As will be appreciated by one skilled in the art, aspects of theillustrative embodiments may be embodied as a system, method or computerprogram product. Accordingly, aspects of the illustrative embodimentsmay take the form of an entirely hardware embodiment, an entirelysoftware embodiment (including, but not limited to, firmware, residentsoftware, or microcode) or an embodiment combining software and hardwareaspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, aspects of the illustrativeembodiments may take the form of a computer program product embodied inone or more computer readable medium(s) having computer readable programcode embodied thereon.

Any combination of one or more computer readable medium(s) may be usedin the illustrative embodiment. The computer readable medium may be acomputer readable signal medium or a computer readable storage medium. Acomputer readable storage medium may be, for example, but not limitedto, an electronic, magnetic, optical, electromagnetic, infrared, orsemiconductor system, apparatus, or device, or any suitable combinationof the foregoing. More specific examples (a non-exhaustive list) of thecomputer readable storage medium would include the following: anelectrical connection having one or more wires, a portable computerdiskette, a hard disk, a random access memory (“RAM”), a read-onlymemory (“ROM”), an erasable programmable read-only memory (“EPROM” orflash memory), an optical fiber, a portable compact disc read-onlymemory (“CD-ROM”), an optical storage device, a magnetic storage device,or any suitable combination of the foregoing. In the context of thisdocument, a computer readable storage medium may be any tangible mediumthat can contain or store a program for use by or in connection with aninstruction execution system, apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium (including, but not limited to, wireless,wireline, optical fiber cable, RF, or any suitable combination of theforegoing).

Computer program code for carrying out operations for aspects of theillustrative embodiments may be written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Microsoft .NET Framework, C#, Java, Smalltalk, C++ orthe like and conventional procedural programming languages, such as the“C” programming language, Python programming language, or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer, and partly on a remotecomputer or entirely on the remote computer or server. The remotecomputer may be connected to the user's computer through any type ofnetwork, including a local area network (“LAN”) or a wide area network(“WAN”), or the connection may be made to an external computer (e.g.,through the Internet using an Internet Service Provider).

Aspects of the illustrative embodiments are described with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to the illustrativeembodiments. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions (which execute via theprocessor of the computer or other programmable data processingapparatus) are processable to cause performance of the functions/actsspecified in the flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to operate in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture, including instructions thatimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process, such that the instructions that execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to theillustrative embodiments. In this regard, each block in the flowchart orblock diagrams may represent a module, segment, or portion of code,which includes one or more executable instructions for implementing thespecified logical operation(s). In some alternative implementations, theoperations noted in the block may occur out of the order noted in theFigures. For example, two blocks shown in succession may, in fact, beexecuted substantially concurrently, or the blocks may sometimes beexecuted in the reverse order, depending upon the functionalityinvolved. Each block of the block diagrams and/or flowchartillustration, and combinations of blocks in the block diagrams and/orflowchart illustration, can be implemented by either general purpose orspecial purpose hardware-based systems that perform the specifiedoperations or acts, or combinations of general or special purposehardware and computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the inventions.As used herein, the singular forms “a,” “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription herein has been presented for purposes of illustration anddescription, but is not intended to be exhaustive or limited to theinventions in the form disclosed. Many modifications and variations willbe apparent to those of ordinary skill in the art without departing fromthe scope and spirit of the inventions. The embodiment was chosen anddescribed in order to best explain the principles of the inventions andthe practical application, and to enable others of ordinary skill in theart to understand the inventions for various embodiments with variousmodifications as are suited to the particular use contemplated.

What is claimed is:
 1. A method performed by an information handling system, the method comprising: from a first patrol unit, receiving first data for identifying a location of the first patrol unit; from the first patrol unit, receiving second data identifying a geographic area on an interactive map presented to an officer associated with the first patrol unit and a first message from the officer related to the geographic area wherein the geographic area is proximate or unrelated to the location of the first patrol unit but does not include the location; and in response to the first and second data, identifying a predetermined number of second patrol units that are most geographically proximate to the geographic area, and outputting a second message to the predetermined number of second patrol units about the first message.
 2. The method of claim 1, wherein the second data are specified by a human officer that is associated with the first patrol unit.
 3. The method of claim 1, wherein receiving the first data, receiving the second data, and outputting the second message occur via a wireless telecommunications network.
 4. The method of claim 1, wherein receiving the first data comprises: receiving the first data at a periodic rate.
 5. The method of claim 1, wherein the second data include a be-on-the-lookout message.
 6. The method of claim 1, and comprising: querying a database about the subject and, in response to the querying, determining whether the subject is a likely threat; and in response to determining that the subject is a likely threat, outputting an additional message to the first patrol unit about the likely threat, and to the predetermined number of second patrol units about: the likely threat; and the first patrol unit.
 7. The method of claim 6, and comprising: in response to determining that the subject is an unlikely threat, outputting an additional message to the first patrol unit about the unlikely threat.
 8. The method of claim 6, wherein querying the database comprises: querying state law enforcement telecommunications system databases.
 9. The method of claim 6, wherein querying the database comprises: querying federal law enforcement telecommunications system databases.
 10. The method of claim 6, wherein the likely threat is a probable danger to a human officer that is associated with the first patrol unit.
 11. The method of claim 6, wherein outputting the additional message comprises: outputting the additional message to the predetermined number of second patrol units about the location of the first patrol unit, on a periodically updated basis.
 12. A method performed by an information handling system, the method comprising: from a patrol unit that is associated with a human officer, receiving data periodically for identifying a location of the patrol unit; from the patrol unit, receiving a record of the human officer pursuing a subject, wherein the subject includes at least one of: a subject vehicle; or a subject person; in response to the receiving, storing the data and the record in association with one another in a database; increasing a rate associated with the periodic receipt of data for identifying a location of the patrol unit after receipt of the record of the human officer pursuing the subject; determining a contact with the subject vehicle or subject person at a time subsequent to the storing; decreasing the rate after a predetermined time or after the determined contact; and retrieving the stored record from the database.
 13. The method of claim 12, wherein receiving the data and receiving the record occur via a wireless telecommunications network.
 14. The method of claim 12, wherein receiving the data comprises: in response to the record, increasing the periodic rate until a predetermined amount of time expires.
 15. The method of claim 12, wherein receiving the data comprises: in response to the record, increasing the periodic rate until a command is received from the human officer.
 16. The method of claim 12, and comprising: after storing the data and the record in association with one another in the database, making the data and the record available for query of the database.
 17. The method of claim 16, wherein the patrol unit is a first patrol unit, and wherein the data and the record are available for query of the database by a second patrol unit that belongs to an agency, irrespective of whether the first patrol unit belongs to the agency.
 18. The method of claim 16, wherein the data and the record are available for query of the database in response to a query command that includes at least one of: a hard identifier; and a soft identifier.
 19. An information handling system, comprising: a network connection for communicating information about at least one subject, wherein the subject includes at least one of: a subject vehicle; or a subject person; and a computer coupled to the network connection for: from a first patrol unit via the network connection, receiving first data for identifying a location of the first patrol unit; from the first patrol unit via the network connection, receiving second data identifying a geographic area on an interactive map presented to an officer associated with the first patrol unit and a first message from the officer related to the geographic area wherein the geographic area is proximate or unrelated to the location of the first patrol unit but does not include the location; and, in response to the first and second data, identifying a predetermined number of second patrol units that are most geographically proximate to the geographic area, and outputting a second message via the network connection to the predetermined number of second patrol units about the first message.
 20. The system of claim 19, wherein the second data are specified by a human officer that is associated with the first patrol unit.
 21. The system of claim 19, wherein the network connection is for communicating the information via a wireless telecommunications network.
 22. The system of claim 19, wherein the computer is for receiving the first data at a periodic rate.
 23. The system of claim 19, wherein the second data include a be-on-the-lookout message.
 24. The system of claim 19, and comprising a database, wherein the computer is for: querying the database about the subject and, in response to the querying, determining whether the subject is a likely threat; and, in response to determining that the subject is a likely threat, outputting an additional message via the network connection to the first patrol unit about the likely threat, and to the predetermined number of second patrol units about the likely threat and about the first patrol unit.
 25. The system of claim 24, wherein the computer is for: in response to determining that the subject is an unlikely threat, outputting an additional message via the network connection to the first patrol unit about the unlikely threat.
 26. The system of claim 24, wherein the database includes state law enforcement telecommunications system databases.
 27. The system of claim 24, wherein the database includes federal law enforcement telecommunications system databases.
 28. The system of claim 24, wherein the likely threat is a probable danger to a human officer that is associated with the first patrol unit.
 29. The system of claim 24, wherein the computer is for outputting the additional message via the network connection to the predetermined number of second patrol units about the location of the first patrol unit, on a periodically updated basis.
 30. An information handling system, comprising: a network connection for communicating information about at least one subject, wherein the subject includes at least one of: a subject vehicle; or a subject person; a database for storing the information; a computer coupled to the network connection for: via the network connection, from a patrol unit that is associated with a human officer, receiving data periodically for identifying a location of the patrol unit; from the patrol unit via the network connection, receiving a record of the human officer pursuing a subject; and, in response to the receiving, storing the data and the record in association with one another in the database; increasing a rate associated with the periodic receipt of data for identifying a location of the patrol unit after receipt of the record of the human officer pursuing the subject; determining a contact with the subject vehicle or subject person at a time subsequent to the storing; decreasing the rate after a predetermined time or after the determined contact; and retrieving the stored record from the database.
 31. The system of claim 30, wherein the network connection is for communicating the information via a wireless telecommunications network.
 32. The system of claim 30, wherein the computer is for: in response to the record, increasing the periodic rate until a predetermined amount of time expires.
 33. The system of claim 30, wherein the computer is for: in response to the record, increasing the periodic rate until a command is received from the human officer.
 34. The system of claim 30, wherein the computer is for: after storing the data and the record in association with one another in the database, making the data and the record available for query of the database.
 35. The system of claim 34, wherein the patrol unit is a first patrol unit, and wherein the data and the record are available for query of the database by a second patrol unit that belongs to an agency, irrespective of whether the first patrol unit belongs to the agency.
 36. The system of claim 34, wherein the data and the record are available for query of the database in response to a query command that includes at least one of: a hard identifier; and a soft identifier.
 37. A computer program product, comprising: a non transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to: from a first patrol unit, receive first data for identifying a location of the first patrol unit; from the first patrol unit, receive second data identifying a geographic area on an interactive map presented to an officer associated with the first patrol unit and a first message from the officer related to the geographic area wherein the geographic area is proximate or unrelated to the location of the first patrol unit but does not include the location; and, in response to the first and second data, identify a predetermined number of second patrol units that are most geographically proximate to the geographic area, and output a second message to the predetermined number of second patrol units about the first message; wherein the subject includes at least one of: a subject vehicle; or a subject person.
 38. The computer program product of claim 37, wherein the second data are specified by a human officer that is associated with the first patrol unit.
 39. The computer program product of claim 37, wherein the computer readable program code is configured to receive the first data, receive the second data, and output the second message via a wireless telecommunications network.
 40. The computer program product of claim 37, wherein the computer readable program code is configured to receive the first data at a periodic rate.
 41. The computer program product of claim 37, wherein the second data include a be-on-the-lookout message.
 42. The computer program product of claim 37, wherein the computer readable program code is configured to: query the database about the subject and, in response to the querying, determine whether the subject is a likely threat; and, in response to determining that the subject is a likely threat, output an additional message to the first patrol unit about the likely threat, and to the predetermined number of second patrol units about the likely threat and about the first patrol unit.
 43. The computer program product of claim 42, wherein the computer readable program code is configured to: in response to determining that the subject is an unlikely threat, output an additional message to the first patrol unit about the unlikely threat.
 44. The computer program product of claim 42, wherein the database includes state law enforcement telecommunications system databases.
 45. The computer program product of claim 42, wherein the database includes federal law enforcement telecommunications system databases.
 46. The computer program product of claim 42, wherein the likely threat is a probable danger to a human officer that is associated with the first patrol unit.
 47. The computer program product of claim 42, wherein the computer readable program code is configured to output the additional message to the predetermined number of second patrol units about the location of the first patrol unit, on a periodically updated basis.
 48. A computer program product, comprising: a non transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to: from a patrol unit that is associated with a human officer, receive data periodically for identifying a location of the patrol unit; from the patrol unit, receive a record of the human officer pursuing a subject; and, in response to the receiving, store the data and the record in association with one another in a database, increase a rate associated with the periodic receipt of data for identifying a location of the patrol unit after receipt of the record of the human officer pursuing the subject, determine a contact with a subject vehicle or subject person at a time subsequent to the storing, decrease the rate after a predetermined time or after the determined contact, and retrieve the stored record from the database; wherein the subject includes at least one of: the subject vehicle; or the subject person.
 49. The computer program product of claim 48, wherein the computer readable program code is configured to receive the data and receive the record via a wireless telecommunications network.
 50. The computer program product of claim 48, wherein the computer readable program code is configured to: in response to the record, increase the periodic rate until a predetermined amount of time expires.
 51. The computer program product of claim 48, wherein the computer readable program code is configured to: in response to the record, increase the periodic rate until a command is received from the human officer.
 52. The computer program product of claim 48, wherein the computer readable program code is configured to: after storing the data and the record in association with one another in the database, make the data and the record available for query of the database.
 53. The computer program product of claim 52, wherein the patrol unit is a first patrol unit, and wherein the data and the record are available for query of the database by a second patrol unit that belongs to an agency, irrespective of whether the first patrol unit belongs to the agency.
 54. The computer program product of claim 52, wherein the data and the record are available for query of the database in response to a query command that includes at least one of: a hard identifier; and a soft identifier. 