Computer-based system for facilitating the execution of law enforcement duties

ABSTRACT

A computer-based system for facilitating the execution of law enforcement duties is disclosed. More particularly, according to one aspect of the invention, an electronic system is configured to facilitate the performance of law enforcement duties by quasi-instantaneously providing actionable intelligence to its users, such as front-line law enforcement officers, in response to a real-time query. According to another aspect of the invention, a system implements a set of automated status classifications for subjects with suspected or confirmed involvement in criminal activities. The status classifications specifically and concisely establish the subject&#39;s involvement in criminal activities. According to yet another aspect of the invention, a system executes a streamlined electronic process for handling and processing seized items so as to ensure that criminal assets are efficiently and effectively seized, and that asset forfeiture actions are effectively initiated against the seized items.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims priority to, and incorporates byreference in its entirety, U.S. Provisional Patent Application No.62/170,633, entitled “Computer-Based System For Facilitating TheExecution Of Law Enforcement Duties”, filed on Jun. 3, 2015.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable.

NAMES OF THE PARTIES TO A JOINT RESEARCH AGREEMENT

Not Applicable.

INCORPORATION BY REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISK

Not Applicable.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The invention generally relates to a system for facilitating theexecution of law enforcement duties. More particularly, the inventionrelates to an electronic computer-based system that is adapted tofacilitate the performance of law enforcement duties byquasi-instantaneously providing actionable intelligence to front-linelaw enforcement officers in response to a real-time query.

2. Background Description

The successful enforcement of local, state, and federal criminalstatutes greatly rely upon the effectiveness with which law enforcementagencies carry out their mission to protect the public by preventing,investigating, and solving crimes and preventing terrorist attacks. Thedegree of effectiveness achieved by law enforcement in this endeavor isdependent upon numerous critical factors, one of the most critical beingits ability to collect, document, analyze, disseminate, and utilize themassive amounts of criminal intelligence information developed by lawenforcement daily. The events of Sep. 11, 2001, hastened the developmentof numerous data management systems and processes that succeeded inimproving the quality and availability of criminal intelligenceinformation; however, these systems have been typically designed todistribute information to selected groups of system users within a localor regional footprint. Of particular significance is the fact that thesenew and disparate systems failed to create a national data managementsystem which quasi-instantaneously and in real-time provides (1)criminal intelligence information in an actionable form, (2) on anational scale, (3) to all law enforcement agencies, to include local,state, tribal, and federal; most notably the front-line officer.Consistent success in the modern criminal environment dominated byconstantly changing and improving technology requires that lawenforcement make more effective and efficient use of its criminalintelligence information; information that must not only be accurate,reliable, and accessible, but also be available in an actionable form toall law enforcement officers both quasi-instantaneously and directly.

Considering the complex and often unpredictable nature of crime, theexecution of law enforcement duties is a difficult and dangerous task.Routinely during the course of their daily mission to fight crime, lawenforcement officers must make expeditious decisions not only to ensurethe safety of the public and the officers themselves, but also to ensurethe preservation of evidence; decisions which necessarily must alsostrictly adhere to the rules of criminal procedure. One tool that wouldimmediately and dramatically improve a law enforcement officer's abilityto perform these duties more effectively and efficiently—all whileincreasing officer safety—would be direct, quasi-instantaneous access toa national criminal intelligence database containing reliable, concise,actionable intelligence about a particular subject, or suspectedcriminal property. In jurisdictions throughout the United States,valuable criminal intelligence information exists and, in many cases, isbeing maintained in some form of data or records management system;criminal intelligence information that in many circumstances would, ifprovided to front-line officers directly, quasi-instantaneously, and inan actionable form, provide them with sufficient information to satisfythe requisite legal standards to support a desired enforcement action.Unfortunately, as discussed above, the current data and recordsmanagement systems and processes for collecting, storing, accessing, anddistributing the aforementioned criminal intelligence information arenot designed to provide this information in an actionable form to anofficer in the field quasi-instantaneously, in real-time, on a nationalscale. Resultantly, these systems not only fail to make efficient use ofthe criminal intelligence information already developed and maintainedby law enforcement, they also fail to effectively facilitate criticallyimportant law enforcement procedures commonly utilized by front-lineofficers such as investigative detentions, searches, and seizures.

Yet another deficiency of the current data and records managementsystems available to law enforcement are the limitations and inherentweaknesses of reports-based systems. The current systems create large,scalable databases comprised of law enforcement reports which are storedwithin these databases and can thereafter be searched in response to alaw enforcement query. When matches are identified in a reports-baseddatabase, the querying user is presented with the opportunity to reviewthe contents of any reports determined by the system to match the searchcriteria. A reports-based database system creates two significantproblems when employed in the law enforcement environment which limitthe capabilities and effectiveness of such systems, namely (1) the needfor participating agencies to submit copies of their reports to thesesystems for viewing and potential use by other system participants and(2) the formation of a database containing too much information for thefront-line officer to effectively analyze and use on-scene.

Concerning the first problem identified above, one of the primaryconcerns of a law enforcement agency considering whether to participatein a multi-agency reports-based database is its capability to maintaincontrol of the use and dissemination of its agency reports and theinformation they contain. Such reports-based databases create seriousinformation control and security issues for many agencies and thereforeinspire a reluctance to contribute information to such systems. Securitycontrols and protocols for reports-based systems can be designed toaddress this problem, but necessarily result in limiting access to theinformation and thereby diminishing the system's effectiveness. In somecases, agency policy or statutes governing the sharing of informationwith outside agencies may even prevent participation in such a system.

Concerning the second problem identified above, the use of areports-based database by front-line officers necessitate an on-scenereview of the reports contained in that database and a concurrentsubjective analysis of that information. This review and analysis mustbe accomplished by those officers before the information the report(s)contains can be utilized.

Because reports-based database systems contain all information detailedin the reports comprising such a database, they consequently contain toomuch information. Instead, what is needed is system and method designedto accomplish the sharing of only actionable criminal intelligenceinformation, providing front-line officers with exactly the informationthey need to know about a given subject; information classified in suchway that it doesn't require an officer to review one or more reports anddraw a subjective conclusion about that subject, based on theinformation contained in the report(s), before proceeding with aninvestigation.

Current database and records management systems claim to provideactionable intelligence, but actually fall well short of thatclaim—providing a database full of reports is not the same as providingactionable intelligence. It is also important to note that actionableintelligence alone doesn't give an officer probable cause or reasonablesuspicion, but it does serve to color his perception of the subject withwhom or which he is dealing. Truly actionable intelligence enablesofficers to better articulate and support their actions and result inlaw enforcement conducting safer, better informed, better supported, andconsequently, more effective investigations.

One of the most important law enforcement procedures available in thefight against crime is the seizure of criminal assets, also known asasset forfeiture. Asset forfeiture is the confiscation of assets, bylocal, state, and federal agencies which are either (1) the allegedproceeds of crime or (2) the alleged instrumentalities of crime.Criminal proceeds or profits refer to the money and/or propertygenerated from criminal activity, whereas instrumentalities of crimerefer to property that is used to facilitate the commission of a crime.Criminal proceeds and instrumentalities can be associated with aplethora of different crimes such as, but not limited to drugtrafficking and terrorist activities.

One of the most important law enforcement procedures available in thefight against crime is the seizure of criminal assets, also known asasset forfeiture. Asset forfeiture is the confiscation of assets, bylocal, state, and federal agencies which are either (1) the allegedproceeds of crime or (2) the alleged instrumentalities of crime.Criminal proceeds or profits refer to the money and/or propertygenerated from criminal activity, whereas instrumentalities of crimerefer to property that is used to facilitate the commission of a crime.Criminal proceeds and instrumentalities can be associated with aplethora of different crimes such as, but not limited to drugtrafficking and terrorist activities.

In general, civil forfeiture can occur by means of one of the followingthree procedures: (1) summary forfeiture, (2) administrative forfeiture,or (3) judicial forfeiture. The property subject to a summary forfeitureproceeding is very limited in nature and normally involves a limitedcategory of property specified under the Controlled Substances Act(“CSA”). In contrast, an administrative forfeiture proceeding can becommenced by a seizing agency against most property valued at $500,000or less, as well as any amount of cash. The administrative action mustbe contested by the original owner in a timely manner or the originalowner loses any legal claim to the property and the government acquiresownership thereof. A judicial forfeiture procedure occurs before a judgeand is carried out in a manner analogous to that of a trial. If thevalue of the property exceeds $500,000, a claim of ownership is filedduring an administrative procedure; if however, real property isinvolved, then a judicial forfeiture procedure is required.

All forms of asset forfeiture are very important mechanisms forcombating crime in our society. The effective enforcement of assetforfeiture enactments directly attacks the economic basis of criminalenterprises, significantly diminishing their ability to profit fromcriminality and depleting the funds from their operations. Additionally,law enforcement agencies, many of which are desperately in need ofeconomic resources, utilize the proceeds of asset forfeitures to hireadditional police officers, fund overtime expenses, and to purchasevital equipment necessary to support their mission to prevent,investigate, solve and prosecute crime.

In order for asset forfeiture laws to be effectively utilized by today'slaw enforcement agencies, its front-line officers must have actionableintelligence, available to them quasi-instantaneously, so it can beutilized to produce or aid in the development of the probable causerequired to seize criminal assets. As previously discussed, the systemscurrently in use by law enforcement are not capable of providing thecriminal intelligence information they contain in an expeditious mannersuch that it can be consistently employed by front-line officers in theperformance of their duties. Moreover, the current format of thiscriminal intelligence information is not actionable, furthercontributing to the dilution of its usefulness. Because the informationcontained in these systems is typically maintained in a format that iseither of inadequate detail or too voluminous, a time consuming,subjective analysis of the information is often required before it canbe considered actionable intelligence. As a consequence, valuablecriminal intelligence information already collected, documented, andmaintained by law enforcement is effectively unusable by the front-lineofficer for asset forfeiture investigations conducted in the field. Thisfailure by law enforcement to maximize the use of available criminalintelligence information in support of its enforcement of existing assetforfeiture laws greatly diminishes the ability of the government toutilize these laws for their designed purpose—that being to facilitatethe dismantling of criminal enterprises through the confiscation ofcriminal assets.

Thus, to effectively combat the threat posed to the public by criminalactivity, today's law enforcement agencies need a national data andrecords management system capable of providing front-line lawenforcement officers with mobile, direct, real-time, quasi-instantaneousaccess to, and delivery of, actionable intelligence in support of theirinvestigative, asset forfeiture, officer safety, and public safetyresponsibilities. In addition, what is needed is one or more methods,carried out by such a system, which employ a set of classificationcriteria for subjects that specifically and concisely characterizes asubject's involvement in an unlawful activity. Such a system, andmethods carried out thereby, would greatly facilitate the execution oflaw enforcement duties, particularly those of the front-line officerswho are attempting to identify and seize the assets of criminals.

BRIEF SUMMARY OF EMBODIMENTS OF THE INVENTION

Accordingly, the present invention is directed to a computer-basedsystem for facilitating the execution of law enforcement duties thatsubstantially obviates one or more problems resulting from thelimitations and deficiencies of the related art.

In the system hereinafter described, the information contained in anagency's report is used to identify a subject (i.e. a person, vehicle,address, phone number, stolen property, evidence buy funds, bait money,etc.) and classify that subject's criminal nature prior to thatinformation being entered into the database. Although the identificationand classification of a subject is supported by the criminalintelligence contained in that agency report, the report itself is notneeded to populate the database. Instead, only the limited informationabout a subject, the agency's report number, and the agency's contactinformation are needed. Such a succinct presentation of only the mostpertinent information concerning a subject is what a front-line officerneeds in the time constrained environment of law enforcement operations.For example, a front-line officer working a traffic stop simply doesn'thave the time to read through reports in a database and developsubjective conclusions concerning the subjects (e.g. the driver, anypassengers, the vehicle, items located within the vehicle, etc.) he hasencountered. Rather, that officer only needs the identity of the subjectand the nature of that subject's criminal activity. Once a front-lineofficer has this basic, yet sharply focused, information, he canexpeditiously continue his investigation armed with what can be trulycharacterized as “actionable intelligence.”

In accordance with one or more embodiments of the present invention,there is provided a computer-based system for facilitating the executionof law enforcement duties. The computer-based system includes a dataprocessing and records management system including one or more computerswith one or more processors and one or more data storage meansoperatively coupled to the one or more processors. The data processingand records management system is configured and arranged to receive asubject query from a local digital computer or mobile digital device ofa first system user that contains information identifying a subject;conduct a search for a subject packet containing information thatmatches the information identifying the subject by accessing a databaseof subject packets stored on the one or more data storage means; anddetermine whether a match exists between the subject and any one of thesubject packets in the database. When the match is found not to existbetween the subject and any of the subject packets, the data processingand records management system is configured and arranged to generate andsend a negative response to the local digital computer or mobile digitaldevice of the first system user. Conversely, when the match is found toexist between the subject and at least one of the subject packets, thedata processing and records management system is configured and arrangedto further determine whether a criminal classification of the at leastone of the subject packets comprises one of a suspected or confirmedstatus of unlawful activity or illegal condition, when the criminalclassification is a suspected status of unlawful activity or illegalcondition, generate and send a suspected confirmation response to thelocal digital computer or mobile digital device of the first systemuser, and when the criminal classification is a confirmed status ofunlawful activity or illegal condition, generate and send a confirmedconfirmation response to the local digital computer or mobile digitaldevice of the first system user. Upon the generation of the suspectedconfirmation response or the confirmed confirmation response, the dataprocessing and records management system is further configured andarranged to determine, based upon the account settings of the firstsystem user, whether the at least one of the subject packets thatmatched the subject during the subject query comprises a subject packettype that is designated for the sending of an alternate notification toone or more other system users; and, when it is determined that the atleast one of the subject packets comprises a subject packet type that isdesignated for the sending of an alternate notification, generate andsend the alternate notification to the one or more other system users.

In a further embodiment of the present invention, prior to the step ofreceiving a subject query from the local digital computer or mobiledigital device of the first system user, the data processing and recordsmanagement system is further configured and arranged to generate a firstdrop-down menu for enabling the first system user to select a subjectpacket type for the subject query, the subject packet type including atleast one of: (i) a person, (ii) a vehicle, (iii) a location, (iv) aphone, and (v) currency; and further generate, based upon the subjectpacket type selected by the first system user, identification typedescriptive data fields for the selected subject packet type so that thefirst system user is capable of entering descriptive data for theselected subject packet type.

In yet a further embodiment, at least one of the suspected confirmationresponse and the confirmed confirmation response generated by the dataprocessing and records management system includes one or more of thefollowing: (i) the criminal classification of the at least one of thesubject packets, (ii) an identification type, (iii) an identificationnumber, and (iv) name and contact information for a second system user,the second system user being the user that originally entered the atleast one of the subject packets into the database of the system.

In still a further embodiment, upon the generation of the suspectedconfirmation response or the confirmed confirmation response, the dataprocessing and records management system is further configured andarranged to generate and send a suspected subject queried notificationor a confirmed subject queried notification to a local digital computeror mobile digital device of a second system user, the second system userbeing the user that originally entered the at least one of the subjectpackets into the database of the system. In this further embodiment, atleast one of the suspected subject queried notification or the confirmedsubject queried notification generated by the data processing andrecords management system includes one or more of the following: (i) aunique transaction identifier assigned to the at least one of thesubject packets when entered into the computer-based system by thesecond system user, (ii) a date and time of the subject query, (iii) anevent type associated with the subject query, (iv) the criminalclassification of the at least one of the subject packets, and (v) nameand contact information for the first system user.

In yet a further embodiment, the suspected subject queried notificationor the confirmed subject queried notification generated by the dataprocessing and records management system is in the form of a textmessage or e-mail.

In still a further embodiment, the alternate notification generated bythe data processing and records management system includes one or moreof the following: (i) the criminal classification of the at least one ofthe subject packets, (ii) an identification type, (iii) anidentification number, and (iv) name and contact information for asecond system user, the second system user being the user thatoriginally entered the at least one of the subject packets into thedatabase of the system.

In yet a further embodiment, the alternate notification generated by thedata processing and records management system is in the form of a textmessage or e-mail.

In accordance with one or more other embodiments of the presentinvention, there is provided a computer-based system for facilitatingthe execution of law enforcement duties. The computer-based systemincludes a data processing and records management system including oneor more computers with one or more processors and one or more datastorage means operatively coupled to the one or more processors. Thedata processing and records management system is configured and arrangedto generate an investigation screen for display on a local digitalcomputer or mobile digital device of a first system user, theinvestigation screen comprising a means for indicating that a seizurehas been made by a first system user; receive a first input signal fromthe local digital computer or mobile digital device of the first systemuser indicating that the seizure has been made by a first system user;generate, in response to receiving the first input signal indicatingthat the seizure has been made, a create seizure screen comprising oneor more descriptive data fields for allowing the first system user tocharacterize one or more seized items obtained during the seizure; andafter receiving a second input signal from the local digital computer ormobile digital device of the first system user indicating that the firstsystem user has completed entering information regarding the seizure,generate and send a seizure notification to at least another system userso that the at least another system user is able to initiate an assetforfeiture proceeding.

In a further embodiment of the present invention, the means forindicating that a seizure has been made by a first system user on theinvestigation screen is a check box that is capable of being checked andunchecked by the first system user.

In yet a further embodiment, the one or more descriptive data fields onthe create seizure screen generated by the data processing and recordsmanagement system include one or more of the following: (i) an item typedrop-down menu for classifying the seized item as one of the following:(a) cash, (b) a vehicle, (c) a weapon, and (d) other item; (ii) valuedata field for entering the monetary value of the seized item; (iii) anidentification number data field for the seized item; and (iv) a notesfield for entering text so as to further define the seized item.

In still a further embodiment, the data processing and recordsmanagement system is further configured and arranged to calculate atotal monetary value for all of the one or more seized items enteredinto the create seizure screen by the first system user; and output thecalculated total monetary value to the local digital computer or mobiledigital device of the first system user so that the total monetary valueis capable of being displayed on a visual display device of the localdigital computer or the mobile digital device. In this furtherembodiment, the seizure notification generated by the data processingand records management system and sent to the at least another systemuser comprises the calculated total monetary value for all of the one ormore seized items seized by the first system user.

In yet a further embodiment, the seizure notification generated by thedata processing and records management system and sent to the at leastanother system user further comprises at least one of the following: (i)a seizure type, (ii) a date and time of the seizure, (iii) name andcontact information for a first system user, and (iv) an active linkwhich, when activated by the at least another system user, directs theat least another system user to a login screen of the computer-basedsystem.

In still a further embodiment, after the at least another system userenters the appropriate login and password information into the loginscreen, the data processing and records management system is furtherconfigured and arranged to generate a view seizure screen for display ona local digital computer or mobile digital device of the at leastanother system user, the view seizure screen comprising additionalinformation regarding the seizure, wherein the additional informationregarding the seizure includes one or more of the following: (i) subjectquery type information for a subject query associated with the seizure,(ii) a query transaction identifier for the subject query, (iii) a dateand time of the subject query, (iv) a subject packet type for a matchedpacket of the subject query; (v) an identification type of the subjectquery; and (vi) information entered into the one or more descriptivedata fields of the seized items by the first system user.

In accordance with yet one or more other embodiments of the presentinvention, there is provided a computer-based system for facilitatingthe execution of law enforcement duties. The computer-based systemincluding a data processing and records management system including oneor more computers with one or more processors and one or more datastorage means operatively coupled to the one or more processors. Thedata processing and records management system is configured and arrangedto receive a paper currency query from a local digital computer ormobile digital device of a first system user that contains informationidentifying one or more items of paper currency; conduct a search for acurrency subject packet containing information that matches theinformation identifying the one or more items of paper currency byaccessing a database of currency subject packets stored on the one ormore data storage means; determine whether a match exists between anyone of the one or more items of paper currency and any one of thecurrency subject packets in the database. When the match is found not toexist between any of the one or more items of paper currency and any ofthe currency subject packets, the data processing and records managementsystem is configured and arranged to generate and send a negativeresponse to the local digital computer or mobile digital device of thefirst system user. Conversely, when the match is found to exist betweenat least one of the one or more items of paper currency and at least oneof the currency subject packets, the data processing and recordsmanagement system is configured and arranged to further determinewhether a criminal classification of the at least one of the currencysubject packets comprises one of a suspected or confirmed status ofunlawful activity or illegal condition, when the criminal classificationis a suspected status of unlawful activity or illegal condition,generate and send a suspected confirmation response to the local digitalcomputer or mobile digital device of the first system user, and when thecriminal classification is a confirmed status of unlawful activity orillegal condition, generate and send a confirmed confirmation responseto the local digital computer or mobile digital device of the firstsystem user.

In a further embodiment of the present invention, the data processingand records management system is further configured and arranged toreceive a currency batch file uploaded from the local digital computeror mobile digital device of a first system user that contains theinformation identifying the one or more items of paper currency; andconduct the currency packet search based upon the information containedin the currency batch file.

In yet a further embodiment, the information contained in the currencybatch file comprises one or more currency serial numbers identifying oneor more items of paper currency.

In still a further embodiment, the computer-based system furthercomprises a paper currency scanner operatively connected to the localdigital computer or mobile digital device of the first system user, thepaper currency scanner generating the information contained in thecurrency batch file.

In yet a further embodiment, the currency batch file is embedded on aportable data storage device, the portable data storage deviceconfigured to be operatively coupled to the local digital computer ormobile digital device of the first system user for uploading thecurrency batch file.

In still a further embodiment, the computer-based system furthercomprises a paper currency scanner operatively connected to the dataprocessing and records management system, the paper currency scannerconfigured to generate a currency batch file comprising informationidentifying one or more items of paper currency.

In yet a further embodiment, after the step of determining whether amatch exists, the data processing and records management system isfurther configured and arranged to generate a visual indicator adjacentto identifying information of the at least one of the one or more itemsof paper currency determined to have matched the at least one of thecurrency subject packets; and generate a pop-up window accessible bymeans of the visual indicator, the pop-up window containing additionalinformation regarding the at least one of the one or more items of papercurrency determined to have matched the at least one of the currencysubject packets, the additional information including one or more of thefollowing: (i) a currency subject packet type of the at least one of thecurrency subject packets, (ii) name of agency that originally enteredthe at least one of the currency subject packets into the database ofthe system, (iii) name of system user that originally entered the atleast one of the currency subject packets into the database of thesystem, and (iv) contact information for the system user that originallyentered the at least one of the currency subject packets into thedatabase of the system.

It is to be understood that the foregoing general description and thefollowing detailed description of the present invention are merelyexemplary and explanatory in nature. As such, the foregoing generaldescription and the following detailed description of the inventionshould not be construed to limit the scope of the appended claims in anysense.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The invention will now be described, by way of example, with referenceto the accompanying drawings, in which:

FIG. 1 is a block diagram of an exemplary system for facilitating theexecution of law enforcement duties and enhancing anti-terrorism andcounter-terrorism capabilities, according to an embodiment of thepresent invention;

FIG. 2 is a block diagram of an exemplary system for facilitating asubject query by a querying law enforcement agency (“QLEA”) through thesubject query application or program using a local digital computer ormobile digital device networked together or connected, via availableconnectivity, to the primary load balanced client interface server ofthe data processing and records management system (“CDMS”). Each localdigital computer or mobile digital device will be configured, arrangedand loaded with the subject query application or be connected to theCDMS, via available connectivity, making the subject packet queryapplication or program accessible to the system users. When availableconnectivity is unavailable, each local digital computer or mobiledigital device will be configured, arranged and loaded with the subjectpacket query application or program capable of storing the QLEA'ssubject query within the local digital computer or mobile digital deviceuntil available connectivity is available; at that time, the QLEA maysubmit the subject query to the CDMS. The data records management system(“DRMS”) of the CDMS will be configured and arranged to create, receive,and store every subject query submitted by a QLEA.

FIG. 3 is a screenshot illustrating an exemplary agency dashboardscreen, according to an embodiment of the present invention;

FIG. 4 is a screenshot illustrating an exemplary recent subject packetsscreen, according to an embodiment of the present invention;

FIG. 5 is a screenshot illustrating an exemplary navigation drop-downmenu, according to an embodiment of the present invention;

FIG. 6 is a screenshot illustrating an exemplary subject packetsdrop-down menu, according to an embodiment of the present invention;

FIG. 7 is a screenshot illustrating an exemplary investigation screen,according to an embodiment of the present invention;

FIG. 8 is a screenshot illustrating an exemplary seizure creationscreen, according to an embodiment of the present invention;

FIG. 9 is a screenshot illustrating an exemplary seizure notificatione-mail sent to a system user, according to an embodiment of the presentinvention;

FIG. 10 is a screenshot illustrating an exemplary seizure informationscreen viewable by the system user receiving the seizure notificatione-mail, according to an embodiment of the present invention;

FIG. 11 is a first screenshot illustrating an exemplary investigationscreen, wherein the investigation screen enables a system user toperform a subject query, according to an embodiment of the presentinvention;

FIG. 12 is a second screenshot illustrating the exemplary investigationscreen, wherein the screenshot includes a confirmation response providedthereon after the performance of a subject query in which the subjectthat was searched matched one of the subject packets, according to anembodiment of the present invention;

FIG. 13 is a screenshot illustrating an exemplary text message sent to asystem user (e.g., the SLEA) who originally entered the data for asubject packet resulting in a match during a subject query, according toan embodiment of the present invention;

FIG. 14 is a screenshot illustrating an exemplary e-mail message sent tothe system user (e.g., the SLEA) who originally entered the data for asubject packet resulting in a match during a subject query, according toan embodiment of the present invention;

FIG. 15 is a first screenshot illustrating an exemplary account settingsscreen for a system user, wherein the account settings of the systemuser are configured such that an alternate notification in the form ofboth a text and e-mail message is sent to another system user (e.g., aK-9 unit), according to an embodiment of the present invention;

FIG. 16 is a second screenshot illustrating the exemplary accountsettings screen for the system user, wherein the account settings of thesystem user are configured such that an alternate notification in theform of only an e-mail message is sent to another system user (e.g., aK-9 unit), according to an embodiment of the present invention;

FIG. 17 is a screenshot illustrating exemplary alternate notificatione-mail messages sent to another system user (e.g., a K-9 unit) after asubject query resulting in a match has occurred, according to anembodiment of the present invention;

FIG. 18 is a partial flowchart illustrating exemplary subject query andretrieval processes carried out by the system of FIGS. 1 and 2,according to an embodiment of the present invention;

FIG. 19 is a continuation of the flowchart of FIG. 18, which illustratesadditional steps of the exemplary subject query and retrieval processes,according to an embodiment of the present invention;

FIG. 20 is a continuation of the flowchart of FIG. 18, which illustratesadditional steps of the exemplary subject query and retrieval processes,according to an embodiment of the present invention;

FIG. 21 is a partial flowchart illustrating an exemplary data query andretrieval process for paper currency carried out by the system of FIGS.1 and 2, according to an embodiment of the present invention;

FIG. 22 is a continuation of the flowchart of FIG. 21, which illustratesadditional steps of the exemplary data query and retrieval process forpaper currency, according to an embodiment of the present invention; and

FIG. 23 is a block diagram of system architecture of an alternativeembodiment of an exemplary system for facilitating the execution of lawenforcement duties.

Throughout the figures, the same parts are always denoted using the samereference characters so that, as a general rule, they will only bedescribed once.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The present invention is described herein, in an exemplary manner, withreference to data processing system architecture and flowcharts thatillustrate exemplary processes carried out by the central datamanagement system (“CDMS”). In a preferred embodiment, functional blocksof the flowchart illustrations can be implemented by computer programinstructions. As such, it is to be understood that the operationsperformed in subsequent functional blocks of the flowchart illustrationsare typically carried out by the computer program instructions inresponse to operations performed in one or more preceding functionalblocks of the flowchart illustrations. These computer programinstructions may be loaded directly onto an internal data storage deviceof a data processing system (e.g., a hard drive of a computer).Alternatively, these computer program instructions could be stored on aportable computer-readable medium (e.g., a flash drive, a floppy disk, acompact disk, etc.), and then subsequently loaded onto a data processingsystem such that the instructions can be executed thereby. In otherembodiments, these computer program instructions could be embodied inthe hardware of the data processing system, rather than in the softwarethereof. Thus, as used herein, it is to be understood that, when acomputer or data processing system is said to be configured and arrangedto perform one or more steps or functions, this is equivalent toreciting that the computer or data processing system is specificallyprogrammed or specially programmed to carry out the one or more steps orfunctions.

For the sake of brevity, conventional data processing system components,conventional data networking, and conventional software coding will notbe described in detail herein. Also, it is to be understood that theconnecting lines shown in the block diagram(s) included herein areintended to represent functional relationships and/or operationalcouplings between the various components. Similarly, connecting linesare also used between the elements of the flowcharts in order toillustrate functional relationships there between. In addition to thatwhich is explicitly depicted, it is to be understood that manyalternative or additional functional relationships and/or physicalconnections may be incorporated in a practical application of thesystem.

1. Terminology

As used herein, the term “actionable intelligence” refers to informationof a defined quantity and quality “based upon an established legalstandard” that is concise and provided electronically in response to areal-time query.

As used herein, the term “subject” broadly refers to any one of thefollowing: a person, a motor vehicle, a marine vessel, an aircraft, anaddress, paper currency, a telephone number, an e-mail address, anInternet protocol address (“IP”), or any other thing that can bedescribed with specificity. In a non-limiting, exemplary embodiment, asubject is established in a data records management system (“DRMS”) of acentral data management system (“CDMS”) by a second system user whosubmits a subject packet.

As used herein, the term “descriptive data” refers to information usedto describe with specificity or identify a subject. In a non-limiting,exemplary embodiment of the invention, descriptive data for a person iscomprised of a person's full name, sex, and race, and other knowndescriptive information obtained from official government documentation,such as date of birth, social security account number, driver's licensenumber, state identification card number, state identification number(“SID”), alias(es), Integrated Automated Fingerprint IdentificationSystem (“IAFIS”) number, fingerprints, other biometric data, etc. Whilein a preferred embodiment, descriptive data for a motor vehiclecomprises a license plate number or Vehicle Identification Number(“VIN”), descriptive data for an aircraft comprises an aircraftregistration number, and descriptive data for a marine vessel comprisesa vessel registration number. The descriptive data for each of theaforementioned vehicles may also include the state and/or country inwhich the registration was issued. In one embodiment, descriptive datafor an address is comprised of a complete property address. Descriptivedata for real, personal or other property can be submitted to the CDMSif the item can be specifically described using official governmentidentification documentation or other available identifyingdocumentation. Furthermore, in one embodiment of the invention, aphotograph of a subject can be attached as descriptive data.

The term “subject packet” is used herein to describe a group of datapreferably consisting of the following four components: (1) a subject,(2) descriptive data, (3) a status classification, and (4) the secondsystem user's report number(s) documenting the information upon whichthe status classification is based.

The term “confirmation response” is used herein to refer to a responsemessage sent from a central data management system (“CDMS”) to the firstsystem user notifying the user of the results found when a subject queryis made of the data records management system (“DRMS”). In anon-limiting, exemplary embodiment, the response message is sent fromthe CDMS, via available connectivity, to the first system user's localdigital computer or mobile digital device.

The terms “querying law enforcement agency” or “querying LEA” or “QLEA”are used herein to refer to the one or more individuals of a lawenforcement agency who submit a subject query to the CDMS, via availableconnectivity, from a local digital computer or mobile digital device.

The terms “source law enforcement agency” or “source LEA” or “SLEA” areused herein to refer to the one or more individuals of a law enforcementagency who input data into the DRMS of the CDMS, via availableconnectivity, using a local digital computer or mobile digital device.

In an exemplary embodiment, the term “status classification” is usedherein to refer to the stipulative definition component of a subjectpacket submitted to the CDMS by a second system user that establishesthe subject packet as actionable intelligence. A status classificationis comprised of two elements, the first element being either of theterms “Confirmed” or “Suspected”, which are used to describe the qualityand quantity of articulable evidence or facts known or possessed by asecond system user about a particular subject, and the second elementbeing any definable criminal activity or illegal condition associatedwith that particular subject (e.g. drug dealer, kidnapper, bank robber,drug transport vehicle, bait money, drug buy money, terrorist meetinglocation, money launderer, stolen property, etc.). The first element ofa status classification is based on the legally recognized standards of“probable cause” or “reasonable suspicion.” For example, a statusclassification of “Confirmed—Drug Dealer,” indicates that, at a minimum,the second system user who submitted the subject packet has informationand/or evidence equivalent to the legal standard of probable cause; thatis to say, evidence in a quality and quantity of sufficient articulablefacts, supported by circumstances sufficiently strong to justify aprudent and cautious person's belief, that the subject is a drug dealer.A status classification of “Suspected—Drug Dealer,” indicates that, at aminimum, the second system user who submitted the subject packet hasinformation and/or evidence equivalent to the legal standard ofreasonable suspicion; that is to say, “specific and articulable facts,”“taken together with rational inferences from those facts,” such that areasonable person could have reasonable cause to suspect that thesubject is a drug dealer. The status classification, as defined in theCDMS, is not in and of itself to be considered by the first system useras probable cause or reasonable suspicion. Instead, the statusclassification provides a first system user with an objective minimumstandard upon which to evaluate the quality and quantity of the secondsystem user's information upon which the status classification is based.

2. Exemplary System

FIGS. 1 and 2 are schematic representations of an exemplary system 14and 16 for facilitating the execution of law enforcement duties,according to an embodiment of the invention. At its core, the system 14and 16 includes a central data management system (“CDMS”). In apreferred embodiment, as shown in FIG. 1, the CDMS 16 comprises acentral data processing system that is in the form of a central digitalcomputer or central server 10, (“primary server”), which has one or moreprocessors and one or more data storage means. Alternatively, apreferred embodiment of the CDMS 16 comprises a central data processingsystem that is in the form of multiple digital computers or serversarranged in a multi-tier web application 10, each having one or moreprocessors and one or more data storage means. In a preferred embodimentof the CDMS 16, the digital computers or servers may use virtualizationsoftware, such as VM Ware, Hyper-V or Xen, to more effectively utilizethe digital computer or server resources while providing applicationsoftware 30, storing system data 20, or serving as a webserver 10,database 20, record management system 20, or client interface server 10.Alternatively, in a preferred embodiment of the CDMS 16, the primaryload balanced client interface server 10 may be operatively coupled byEthernet or a cellular, Internet, network, radio, short-range wireless,or satellite connection (collectively “available connectivity”) 80. Theservers will generally be of the Intel, AMD, Sun, or mainframe varietyand will utilize Linux, Windows, Solaris, z/OS, or AIX operatingsystems.

The primary load balanced client interface server 10 will serve as theentry point for all CDMS system users. CDMS software applications willbe stored on the application server 30 while the database and/or recordsmanagement system will be stored in the database/records managementsystem 20. The primary load balanced client interface server 10,application server 30, and database/records management system 20 willall be operatively coupled together, via Ethernet or availableconnectivity. The primary load balanced client interface server 10 willhandle initial CDMS system user interactions while the applicationserver 30 will reside behind a firewall separating the primary loadbalanced client interface server 10 from the application server 30. Thedatabase/records management system 20 will reside behind a firewallseparating the application server 30 from the database/recordsmanagement system 20. This multi-tier configuration will allow securityto be maximized by allowing the integration of multi-level firewalls.

In a preferred embodiment, the application server 30 will store the CDMSsoftware applications used to accept, validate, match, and store allinput data submitted by system users to the CDMS 16. Additionally, in apreferred embodiment, the application server 30 will store allapplications and programs for the execution of a subject query, and forthe execution of the other features of the system (collectively“available software applications”).

The data, which includes a plurality of subject packets, investigativealerts, and the system archive, is compiled and maintained in thedatabase and record management system 20 and would include data storedon one or more data storage devices (e.g., hard drive(s)) of thedatabase and/or records management system 20. This preferred embodimentwould have the database and record management system 20, configured,arranged, and replicated through operative coupling via Ethernet, to theprimary load balanced client interface server 10, but may be connectedby other available connectivity. This multi-tier configuration providesfor maximum security of the database and/or records management systems20 by allowing the integration of multi-level firewalls. In a preferredembodiment, the primary load balanced client interface server 10 wouldnot function as an application server 30 for the CDMS system 16 or asthe database/records management system 20. However, by storing orserving applications to CDMS system users 40 and 60, the primary loadbalanced client interface server 10 could serve CDMS applications orprograms to include the subject query application 34 or otherapplications. Subject packet data is queried by a first system userthrough a local digital computer or mobile digital device running 54 or74, or queried by the subject query application 34. A local digitalcomputer 40 will be configured and arranged to include a centralprocessing unit, running an available operating system compatible withthe CDMS client interface or web-interface software, mouse, keyboard,monitor, among other optional hardware (collectively “local digitalcomputer”) 40.

Referring again to FIG. 1, it can be seen that the primary load balancedclient interface server 10 is accessed by a system user via availableconnectivity 80 using either a local digital computer 40 or a mobiledigital device 60. As used herein a “mobile digital device” 60 includesdevices such as a personal digital assistant (“PDA”), mobile orsmartphone, mobile internet device (“MID”), Ultra-Mobile PC (“UMPC”),Internet computer or tablet, or other short-range wireless, cellular,satellite, radio, or network enabled devices. As the name implies, amobile digital device 60 can be deployed in any setting for use by asystem user, so long as there is available connectivity 80.

A local digital computer 40 will be configured and arranged to include acentral processing unit, running an available operating systemcompatible with the CDMS client interface or web-interface software,mouse, keyboard, monitor, among other optional hardware (collectively“local digital computer”) 40. The first system user will query the CDMS14 using the subject query application or program 34, 54, or 74 throughthe use of multiple pieces of hardware connected, via wired or wirelessconnectivity, to a QLEA local digital computer 44 or QLEA mobile digitaldevice 64 to include: (1) keyboard, (2) mouse, (3) passive stylus ordigital pen. Alternatively, the first system user will query the CDMS 14using the subject query application 34 through the use of an on-screenvirtual keyboard. In one embodiment, the subject query application 34 isloaded directly on the CDMS 14 such that a first system user is able toaccess the subject query application 34 by logging onto the primary loadbalanced client interface server 10 from the QLEA local digital computer44 which is configured and arranged and operatively connected to theCDMS 14 via available connectivity 80. In other embodiments of theinvention, the subject query program 54 is loaded onto a QLEA's localdigital computer 44 and then, the subject query entered by the QLEA istransmitted from the QLEA's local digital computer 44 to the primaryload balanced client interface server 10 by available connectivity 80.The QLEAs will not always have the subject query application or programloaded on their local digital computer 44 or mobile digital device 64;therefore, the local digital computer 44 or mobile digital device 64will communicate with the primary load balanced client interface server10, which will communicate with the application server 30 to obtain thesubject query application 34. The QLEA's local digital computer 44 isconfigured and arranged to communicate with the primary load balancedclient interface server 10 through the utilization of client interfaceor web-interface software. As the name implies, a QLEA local digitalcomputer 44 will usually be located on the premises of a QLEA.

Referring again to FIG. 1, it can be seen that the primary load balancedclient interface server 10 is accessed by a system user via availableconnectivity 80 using either a local digital computer 40 or a mobiledigital device 60. As used herein a “mobile digital device” 60 includesdevices such as a personal digital assistant (“PDA”), mobile orsmartphone, mobile internet device (“MID”), Ultra-Mobile PC (“UMPC”),Internet computer or tablet, or other short-range wireless, cellular,satellite, radio, or network enabled devices. As the name implies, amobile digital device 60 can be deployed in any setting for use by asystem user, so long as, there is available connectivity 80. Referringagain to FIG. 2, in a preferred embodiment, a QLEA who is accessing theprimary load balanced client interface server 10 from a local digitalcomputer 44, enters a subject query into the CDMS 14 using availableconnectivity 80 and the subject query application 34 loaded on theapplication server 30, whereas a QLEA who is accessing the primary loadbalanced client interface server 10 from a QLEA mobile digital device 64enters a subject query into the CDMS 14 using a mobile digital devicesubject query application 74 which is loaded on the QLEA mobile digitaldevice 64 and connected to the CDMS 14 via available connectivity 80. Inanother embodiment, the QLEA mobile digital device 64 is configured andarranged to use the web browsing functionality of the QLEA mobiledigital device 64 and available connectivity 80 to access the subjectquery application 34 loaded directly on the application server 30 suchthat a QLEA is able to access the subject query application 34 bylogging onto the primary load balanced client interface server 10. TheQLEA mobile digital devices 64 use mobile device operating systems suchas Apple iOS, Google Android (Linux), Google Chrome OS, Hewlett-PackardwebOS, RIM BlackBerry Tablet OS (ONX Neutrino), Intel/Nokia MeeGo(Linux), Nokia Maemo (Linux), Microsoft Windows CE for MID, Palm OS,BlackBerry OS, Symbian, RIM, iOS, iOS 4, Windows CE/Pocket PC OS, andWindows 7 or 8 among numerous other mobile device operating systems. TheQLEA mobile digital device 64, configured and arranged with a mobileoperating system and available connectivity 80, communicates with theprimary load balanced client interface server 10 via client interface orweb-interface software located on the primary server 10. Additionally, aQLEA mobile digital device 64 can be configured and arranged to connectto a QLEA local digital computer 44 via a docking station or wiredconnection (collectively “optional connectivity”) 90. A QLEA mobiledigital device 64 can accept data input through multi-touch interface,keypad, keyboard, passive stylus or electronic pen, Bluetooth connectedinput device, USB connected device, dock connected device, 3.5 mm inputmini-jack among other wireless and wired input devices.

In another alternative illustrative embodiment, the softwarearchitecture of the exemplary system for facilitating the execution oflaw enforcement duties may comprise a plurality of different layers(i.e., an onion-type software architecture). In this illustrativeembodiment, the layers forming the software file structure may comprise(i) a core layer, (ii) a service layer, (iii) a bootstrapper layer, (iv)a cloud formation layer, (v) a data layer, (vi) an infrastructure layer,and (vii) a presentation layer. In this illustrative embodiment, thecore layer is where all of the primary domain models, interfaces,reference data, queries, commands and anything else common to theapplication are stored. In general, no implementations are placed intothe core, only the interfaces. The service layer contains allimplementations of interfaces, including query handlers, commandhandlers, validators, background job handlers, and the like. Thebootstrapper layer manages the inversion of control container, andoperatively couples all service implementations from the service layerto the interfaces in the core layer. The cloud formation layer containsall code associated with creating provisions for, and runningcloud-based servers based on the load, and shutting off and removing thecloud-based servers, which run the software environments. As will bedescribed hereinafter, these include web, database and image servers inthis illustrative embodiment. The cloud formation layer also builds therequired network that is needed to carry out the processes describedbelow. In this illustrative embodiment, the data layer is responsiblefor all creation, migration, and updates to the database. Theinfrastructure layer is responsible for various cross-cutting concernssuch as logging, security, permissions, transactions, validations, andthe like. In this illustrative embodiment, the presentation layer issubdivided into three (3) different virtual servers: (a) a virtualhangfire server, (b) a virtual image server, and (c) a virtual webserver. The presentation layer has been divided into different virtualservers so as to facilitate scaling when using a cloud-based webservices provider. In the presentation layer, the virtual hangfireserver is responsible for processing background tasks. When a processtakes longer than normal, the process is delegated to a background task.This is a private facing server with no external clients. In thepresentation layer, the virtual image server is responsible for handlingimage delivery from the cloud-based storage to the user's browser. Thisis also a private facing server with no external clients. In thepresentation layer, the virtual web server is the main web server whichthe software application runs on. This is a public server and passesthrough authentication with the image server to secure image viewing.

Now, with reference to the block diagram of FIG. 23, the systemarchitecture of the alternative illustrative embodiment of the exemplarysystem for facilitating the execution of law enforcement duties will beexplained. In this illustrative embodiment, the operations of thesoftware application are carried out using a cloud-based web service. Asmentioned above in the description of the software architecture, thecloud formation layer contains all of the code needed to mostefficiently manage the processing of data by activating additionalservers based on the demand and/or by controlling a cluster of serversto manage the processing load. Turning to the illustrative embodiment ofFIG. 23, it can be seen that all web servers are arranged behind a loadbalancer, which has alarms set to scale when needed. Upon receiving arequest from a user of the system, the load balancer directs the requestto one of the web servers (e.g., web server 1 or web server 2 in FIG.23). In FIG. 23, the image processing server is operatively coupled tothe web servers, and is capable of handling the processing for images ofvarious sizes. The image processing server is operatively coupled to theimage storage means of the cloud-based web service. The image storagemeans stores all of the images used in the system (e.g., a photograph ofa subject, etc.). Referring again to FIG. 23, a user request istransmitted from one of the web servers to one of a plurality of jobqueues so that the request is capable of being processed in thebackground so as not to overly burden the browser. In turn, the jobqueues are operatively coupled to the database, which resides on aseparate database server. Finally, with reference again to FIG. 23, thedatabase is operatively coupled to the system backups, which reside on aseparate backup server so as to protect the system data from being lost.In the illustrative embodiment, each of the servers illustrated in FIG.23 may be in the form of a virtual server.

3. Exemplary Data Query and Retrieval Processes

In accordance with an illustrative embodiment of the invention, aflowchart illustrating exemplary query and notification processes forconducting a query of the CDMS 14/16 and DRMS 20 is set forth in FIGS.18-20. At step 1200 in FIG. 18, the process starts, and at step 1210,the QLEA User logs into the CDMS 16 and is presented with the AgencyDashboard screen (refer to FIG. 3). The CDMS 16 Agency Dashboard screenpresents the QLEA User with numerous system-related statistical analysiscategories which include, but are not limited to Total Subject Packets,Currency Subject Packets, Location Subject Packets, Person SubjectPackets, Phone Subject Packets, and Vehicle Subject Packets (see FIG.3). Additional dashboard statistical categories can be designed andprogrammed to track both user performance and system performance, asrequired by the User's agency or the CDMS 16 System Administrator.

In a preferred embodiment of the invention, as part of the AgencyDashboard for the user, the CDMS 16 also generates and populates a “MyRecent Subject Packets” expandable field in which subject packetscreated by the user are displayed and from which each can be selectedand reviewed and/or edited (refer to FIG. 4).

In yet another preferred embodiment of the invention, the CDMS 16 AgencyDashboard also presents the User with the system Navigation section andgenerates an associated drop-down menu with available selectionsincluding, but not limited to (1) “Subject Packets” and (2) “AgencyAdministration” (see FIG. 5).

At step 1220 in FIG. 18, under the Subject Packets drop-down menu, theCDMS 16 generates a drop-down menu and presents the User with severaloptions which include, but are not limited to (1) Create Subject Packet,(2) Create Money Batch, (3) Investigative Detention, (4) InvestigativeQuery, (5) Traffic Stop, and (6) Traffic Accident (refer to FIG. 6). TheCreate Subject Packet and Create Money Batch options enable the User toenter directly into the process for creating a Subject Packet. TheInvestigative Detention, Investigative Query, Traffic Stop, and TrafficAccident categories provide the User access to the Query Features of theCDMS 16 application.

Upon the User's selection of one of the Query Features from the SubjectPackets drop-down menu, at step 1224 in FIG. 18, the User accesses theCDMS 16 “Investigation” screen (see FIG. 7). As part of the“Investigation” screen, the CDMS 16 generates and displays for the Userseveral fields to include the (1) “Current Investigation,” (2) a CDMS 16compiled drop-down menu listing all “Recent Unfinished Investigations,”(3) a “Resulted in seizure” check box, and (4) “Start Investigation” and“Complete Investigation” selection buttons. If the User's query is notpart of an on-going investigation, the Current Investigation fielddisplays “None.” Selecting “Recent Unfinished Investigations” from thedrop-down menu allows the User to select from a list of any of theUser's unfinished investigations compiled and stored by the DRMS 20 andthereafter continue the instant search as an additional search under theselected unfinished investigation. Yet another option is for the User tobegin a new search by selecting the “Start Investigation” button.

If at step 1240 in FIG. 18, if the QLEA User selects the “CompleteInvestigation” button, the User is enabled to close out a specificunfinished investigation which was previously started and remainsstored, in an unfinished status, in the DRMS 20.

The “Resulted in seizure” check box (see FIG. 7) enables the User todesignate a current investigation or an unfinished investigation ashaving resulted in a seizure. If the CDMS 16 determines at decision step1244 of FIG. 18 that a User selected the “Resulted in seizure” box instep 1224, and then selected the “Complete Investigation” button at step1240, at step 1248 the CDMS 16 directs the User to the “Create Seizure”screen, further depicted in FIG. 20. In FIG. 20, at step 1300, in theCreate Seizure screen (refer to FIG. 8), in the “Seizure Information”section, the CDMS 14 identifies for the User: (1) the “RelatedInvestigation” in which the claimed seizure occurred, (2) the “SeizureType”, (3) the “Agency” conducting the seizure, and (3) the“Jurisdiction”, which identifies the specific Designated Prosecutor'sOffice (DPO) to which the Seizure Notification will be directed. In the“Seized Items” section of the Create Seizure screen, the CMDS 16presents the User with Descriptive Data fields which include, but arenot limited to: (1) “Item Type”, (2) “Value”, (3) “IdentificationNumber”, and (4) “Notes”. For the Item Type Descriptive Data field, theCDMS 16 generates a drop-down menu for “Item Type” which includes, butis not limited to: (1) Cash, (2) Vehicle, (3) Weapon, and (4) Other. Inthe Create Seizure screen, the CDMS 16 also presents the User with a (1)“Value” field, an (2) “Identification Number” field, and a (3) free text“Notes” field, each of which is used to further describe the seizure. An“Add” button, a “Reset” button, and a “Finalize Seizure” button are alsopresented to the User in the Seized Items section. The Add buttonenables the User to submit a seizure item to the CDMS 16 after therequired Descriptive Data fields in the Seized Items section have beenpopulated. After a seized item has been submitted to the CDMS 16, theCDMS 16 compiles and summarizes the Descriptive Data for the seized itemin a summary chart displayed at the bottom of the Create Seizure screen.The CDMS 16 also displays a “Total” dollar value of a seized item.Multiple seized item entries may be entered individually using the “Add”button, each of which are subsequently added to the summary chartdisplayed at the bottom of the Create Seizure screen. If multiple seizeditem values are contained in the summary chart, the CDMS 16 calculatesthe collective total of the values of all the entered seized items anddisplays that value as a “Total” in dollars (i.e., U.S. Dollars). A“Remove” button is included in each line of the summary chart whichenables the User to remove an individual, seized item from the summarychart. The “Reset” button erases all characters typed in the DescriptiveData fields of the Seized Items section. After the seized item(s),including any related Descriptive Data, are entered, added, anddisplayed in the summary chart, selecting the “Finalize Seizure” buttonprompts the CDMS 16 to present the User with the “Save Seizure” button.At step 1310 of FIG. 20, if the User selects the Save Seizure button, atstep 1320 the CDMS 16 saves the seizure information, stores the seizurein the DRMS 20, and generates and sends, via the NDD 26, a SeizureNotification to the DPO identified in the Jurisdiction field of theCreate Seizure screen via (1) SMS text and/or (2) email, in accordancewith the Agency Account settings of the CDMS 16 for the QLEA and DPO.The process ends at step 1390 in FIG. 20.

In accordance with one preferred embodiment of the invention, the headerof the email version of the Seizure Notification received by the DPOidentifies the email of User's Account who created the seizure (refer toFIG. 9). The email version also displays (1) the “Seizure Type”, (2) the“Date & Time”, (3) the “Total” in dollars, (4) the “Created By” contactinformation, and (5) a link with the notation “Click to open”. If theDPO User selects the “Click to open” link, the CDMS 16 directs the DPOUser to the Login Screen for the CDMS 16. After entering in a valid UserEmail Address and Password, the CDMS 16 directs the DPO User to the“View Seizure” screen shown in FIG. 10. On the View Seizure screen, theCDMS 16 generates additional, detailed information concerning theseizure including, but not limited to the information contained in the(1) “Seizure Information” section, the (2) “Investigation Information”,and the (3) “Seizure Detail Summary” section. In the Seizure Informationsection of the View Seizure screen, the CDMS 16 displays the (1)“Seizure Type”, (2) the “Created On” date and time, (3) the “Agency”that created the seizure, (4) the “Created By”, that being the User whocreated the seizure, (5) the “Jurisdiction”, that being the DPO, and (5)the contact information for the User who created the seizure. Additionaluseful information which could also be displayed by the CDMS 16 in thissection could be the seizing agency's case number. In the InvestigationInformation section of the View Seizure screen, the CDMS 16 displays thequeries performed, which includes, but is not limited to anInvestigative Query, a Traffic Stop, an Investigative Detention, or aTraffic Accident, and its corresponding Query Transaction Number, aswell as the Date and Time, the Packet Type, the Identification Type, andIdentification Number of the query. Also displayed is the “Results ofQuery” subsection, which includes, but is not limited to the PacketType, the Agency, and the Identification Type, and the IdentificationNumber. In the Seizure Detail Summary section of the View Seizurescreen, the CDMS 16 displays a summary chart of the seizure whichincludes, but is not limited to the Descriptive Data fields (1) Type,(2) Value, (3) Identification Number, (4) “Notes”, and (5) a “Total”, indollars.

Referring again to the flowchart of FIG. 18, at step 1250, after theQLEA User selects either the “Start Investigation” button at step 1230or selecting an unfinished investigation from the “Recent UnfinishedInvestigations” list, the CDMS 16 presents the User with numerous fieldsin the “Search Parameters” section of the Investigation screen (refer toFIG. 11) which include, but are not limited to, “Packet Type,”“Identification Type,” “State,” and “Identification Number.” To conducta search of the CDMS 16 database, the User must first select a “PacketType” from the CDMS 16 generated drop-down menu which includes, but isnot limited to (1) Person, (2) Vehicle, (3) Location, (4) Phone, and (5)Currency. Thereafter, based on the specific Packet Type selected by theUser, the CDMS 16 generates and presents the User with the applicableIdentification Type Descriptive Data fields for each respective PacketType. For a Person, the CDMS 16 generates and presents the User with adrop-down menu containing the Identification Types including, but notlimited to, (1) “Driver's License”, (2) “State Identification Card”, (3)“SSN”, (4) “State Identification Number (SID)”, (5) “IAFIS Number”, (6)“FBI Number”, and (7) “Local Booking Number”. For a Vehicle, the CDMS 16generates and presents the User with a drop-down menu containing theIdentification Types (1) “License Plate” and (2) “VIN”. For a Location,the CDMS 16 generates and presents the User with a drop-down menucontaining the Identification Types including, but not limited to, (1)“Address” and (2) “Latitude/Longitude”. For a Phone, the CDMS 16generates and presents the User with a drop-down menu containing theIdentification Types including, but not limited to, (1) “Phone Number”,(2) “IMEI”, and (3) “MEDI”. For Currency, the CDMS 16 generates andpresents the User with a drop-down menu containing the IdentificationTypes including, but not limited to, (1) “Serial Number” and (2) “MoneyBatch Number”. The “State” Descriptive Data field remains the same foreach Packet Type selected. The “Identification Number” Descriptive Datafield remains the same for each Packet Type selected with the exceptionof the Location Packet Type. For the Location Packet Type, the CDMS 16presents the User with an “Identification Number” Descriptive Data fieldconnected to a commercially available address recognition softwareprogram. After the required Descriptive Data fields are populated and,at step 1260 in FIG. 18, the User selects the “Search” button, the CDMS14 conducts a search of DRMS 20 database for Subject Packets containingmatching Descriptive Data. For example, in the illustrative search ofFIG. 12, the search of the DRMS 20 database has resulted in the subjectsearched matching a “Suspected Drug Dealer” subject packet.

In a preferred embodiment of the invention, if the search of the DRMS 20database conducted in step 1260 determines at step 1270 of FIG. 18 thata Subject Packet(s) matches the Descriptive Data of the instant query,at step 1280 the CDMS 14 generates and sends, via the NDD 24, a (1)Confirmation Response to the User (see FIG. 12) which includes theCriminal Classification(s), the Identification Type, the IdentificationNumber, and the SLEA's name and contact information for the matchedSubject Packet(s), and (2) a Subject Queried Notification (SQN) to theSLEA(s)—see FIGS. 13 and 14.

The SQN is delivered to the SLEA based on the delivery preferences setin the User's agency account, with the delivery options being (1) SMStext (see FIG. 13) and/or (2) e-mail (see FIG. 14). As an example of anSMS text SQN for a search of a Person Subject Packet, its content andformat would be “SQN (UTN 2015-0002-3-000-002) 5/29/15, 23:42,Investigative Query—S Courier—QLEA: Shreveport PD—R. Fortune,318-555-1234”, which identifies the SMS as an “SQN”—Subject QueriedNotification, “(UTN 2015 . . . )”—the Unique Transaction Number (UTN)identifying the system transaction number originally assigned to theSLEA's Subject Packet to which the QLEA's query was matched, “5/29/15,23:42”—the date and time of the QLEA query resulting in the ConfirmationResponse and SQN, “Investigative Query”—the Event Type associated withthe QLEA query, “S—Courier”—the Status Classification of the SLEA'smatched Subject Packet, and “QLEA: Shreveport PD—R. Fortune,318-555-1234”—the QLEA's name and the name and contact information forthe querying User.

In accordance with yet another preferred embodiment of the invention, anemail version (see FIG. 14) of the SQN includes, in addition to theinformation contained in an SMS text SQN, more detailed informationincluding, but not limited to (1) the QLEA UTN, (2) a more detaileddescription of the SLEA's matched Subject Packet, to include the SubjectPacket Type, the Identification Type, Number, and State (if applicable),the SLEA's case number, and (3) any Public Notes and/or Private Notesentered by the SLEA. Public Notes are notes visible to both the QLEA andthe SLEA. Private Notes are visible only to the SLEA case agent.

In accordance with yet another preferred embodiment of the invention, ifthe QLEA's Agency Account settings in the CDMS 16 have been soprogrammed in response to a Confirmation Response concerning anyspecifically designated Subject Packet Type generated by the CDMS 14 inresponse to a query by one of that agency's users at step 1280 of FIG.19, the CDMS 14 will determine at decision step 1284 in FIG. 19 if anyspecifically designated Subject Packet Type(s) is referenced inconjunction with a Confirmation Response being sent to the QLEA, and, ifso, at step 1288 in FIG. 19, in accordance with the QLEA's AgencyAccount settings, the CDMS 16 will generate and send, via the NDD 24, anAlternate Notification in the form of an (1) SMS text and/or (2) e-mailto any designated QLEA agency recipients. As shown in FIG. 15, theexemplary QLEA's Agency Account settings enable both SMS text messagesand e-mail notifications to be sent to the K-9 Officer (both boxes arechecked under the “Notifications” heading), while in FIG. 16, theexemplary QLEA's Agency Account settings only enable e-mailnotifications to be sent to the K-9 Officer (only the e-mailnotification box is checked under the “Notifications” heading). Forexample, the Agency Administrator for the Shreveport Police Department(SPD) can program the SPD Agency Account in the CDMS 16 to direct, inresponse to any Confirmation Responses routed to any SPD User query fora Confirmed Drug Transport Vehicle, an Alternate Notification to adesignated SPD Division (e.g. OSI—Office of Special Investigations),Unit (e.g. Intelligence Unit), or individual user (e.g. K-9 Officer).Continuing this example, upon the generation of a Confirmation Responseby the CDMS 14 involving a Confirmed Drug Transport Vehicle, the CDMS 14would send an Alternate Notification to the on-duty SPD K-9 Officer viaSMS text or e-mail (e.g., see FIG. 17).

If, at step 1270 of FIG. 19, the CDMS 14 determines that no matchresulted from the search of the DRMS 20, at step 1290, the CDMS 14generates and sends, via the NDD 24, a Negative Response to the QLEAUser. The process ends at step 1298 in FIG. 19.

4. Exemplary Data Query and Retrieval for Paper Currency

In accordance with an embodiment of the invention, a flowchartillustrating an exemplary query of the paper currency processes in thecentral data management system (“CDMS”) 14 and data records managementsystem (“DRMS”) 20 is set forth in FIGS. 21 and 22. In a preferredembodiment of the invention, the initial login and access steps to theCDMS 14 are the same as for those described in FIG. 18, steps 1200,1210. The described process thereafter commences at step 1400 and 1410of FIG. 21, where the QLEA User selects “Create” and “Money Batch” fromthe CDMS 14 generated drop-down menu. Upon selecting Create and MoneyBatch options, at step 1420 the CDMS 14 generates and presents the QLEAUser with the “Create Money Batch” screen which comprises (1) a “Browse”button, (2) a “Report/Case Number” field, (3) a “CriminalClassification” drop-down menu, and (4) an “Upload” button. The Browsebutton enables the QLEA User to select a money batch file, stored in theform of a comma separated value (.csv) computer file from the computer'savailable data storage files, to be uploaded into the CDMS 14 as aCurrency Subject Packet. The Report/Case Number field enables the QLEAUser to enter the report or case number to be referenced to the CurrencySubject Packet. The Criminal Classification drop-down menu presents theQLEA User with numerous available Currency Subject Packet Types whichinclude, but is not limited to (1) “Bank Robbery Funds”, (2) “DrugFunds—Incoming Seizure”, (3) “Drug Funds—Outgoing Buy”, and (4)“Washed”. Some additional Currency Subject Packet Types which could bemade available to the QLEA User are related to “Inmate Funds”, “MoneyLaundering Funds”, “Bulk Cash Smuggling Funds”, “Bribery Funds”, or“General Evidentiary Funds”.

In one or more embodiments, a money or currency scanner may beoperatively connected to the QLEA User's local digital computer ormobile digital device so that the User is able to scan in a seized moneybatch acquired during a seizure, and to create a comma separated value(.csv) computer file from the scanned money batch (i.e., the currencyscanner outputs a comma separated value (.csv) computer file for use bythe User after the money batch is scanned thereby). In addition to, orin lieu of, the money or currency scanner being operatively connected tothe QLEA User's local digital computer or mobile digital device, a moneyor currency scanner may also be operatively connected to the CDMS 14.Also, in another alternative embodiment, the comma separated value(.csv) computer file generated by the currency scanner may be initiallystored on a portable non-volatile memory storage device (e.g., a flashdrive, memory stick, an optical disc, etc.), and then transferred to theQLEA User's local digital computer or mobile digital device using theportable non-volatile memory storage device.

After the QLEA User has selected a money batch file from the Browsefield, entered the Report/Case Number field, and selected a CurrencySubject Packet Criminal Classification, selection of the “Upload” buttonat step 1430 prompts the CDMS 14 to upload the money batch file into theDRMS 20 and at step 1440 to conduct a search of existing CurrencySubject Packets stored therein for any matching individual serialnumbers. After completing its search of the DRMS 20 for any matchedserial numbers, at step 1450 the CDMS 14 generates and presents the Userwith the “Edit Money Batch” screen which includes, but is not limited tothe (1) “Batch Number”, referring to the instant Money Batch (2) “BatchTotal”, (3) “Created By”, (4) the “Type” (of Currency Subject Packet),(5) a “Search” field, (6) a chart of the individual serial numberscontained in the instant Batch Number, (7) a “Browse” button, (8) a“Delete Against Batch” button, and (9) a “Back” button. Concerning thedetail contained in the referenced chart of individual serial numbers,in this chart the CDMS 14 generates and presents the QLEA User with (1)individual “Select” check boxes which enable the QLEA User to selectindividual serial numbers contained in the instant Money Batch, (2)listings of the individual serial numbers of each bill contained in theinstant Money Batch, and (3) a listing of the given “Denomination” ofeach bill contained in the instant Money Batch. Concerning theindividual Select check boxes, at step 1450, if the check box for anyindividual serial number(s) is selected, the CDMS 14 presents the QLEAUser with a “Delete Selected” button. Selection of the Delete Selectionbutton prompts the CDMS 14 at decision step 1460 to delete any selectedbills from the instant Money Batch stored in the DRMS 20 at step 1462.At step 1450, if a Money Batch has been uploaded by the CDMS 14 andsearched against existing Currency Subject Packets contained in the DRMS20, any matched serial number(s) is denoted by a green “+” button on thechart line of said matched serial number(s). Selection of a green “+”button prompts the CDMS 14 to generate and present the QLEA User with anexpanded, individual line chart containing additional details concerningthe matched serial number which includes, but is not limited to (1) the“Type”, referring to the Currency Subject Packet Type of the matchedserial number, (2) the “Agency”, referring to the SLEA that entered thematched Currency Subject Packet (3) the “User”, referring to the SLEAUser who entered the matched Currency Subject Packet, and (4) the“Contact”, referring to the contact information for the SLEA User listedin the User field. When the green “+” button is selected, a red “−”button appears in its place. Selection of the red “−” button or any red“−” button prompts the CDMS 14 to collapse the expanded individual linechart and return the line to its initial form with the green “+” buttonagain displayed. The “Browse” button enables the QLEA User to access theQLEA User's computer memory files to select a secondary money batch forcomparison to the instant Money Batch. At step 1450, if selected, thefilename of the selected secondary money batch file appears immediatelyadjacent to the Browse button. Thereafter, if at step 1470 the CDMS 14determines the QLEA User selected the “Delete Against Batch” button, atstep 1510 the CDMS 14 (1) deletes the matched serial numbers from theinstant Money Batch and (2) displays for the QLEA User any serialnumbers which were contained in the secondary money batch which did notmatch any of the serial numbers in the instant Money Batch. Selection ofthe “Back” button prompts the CDMS 14 to return the QLEA User to theprior version of the Edit Money Batch screen.

Another option available to the QLEA User for processing a money batchis chosen by selecting the “Create” and “Direct Seizure” at step 1410from the CDMS 14 generated drop-down menu. Upon the QLEA User'sselection of Create Direct Seizure, the process continues as describedin FIG. 20, steps 1300-1390.

5. Additional Features of the System

In one preferred embodiment of the invention, additional categories ofsubject packets may be developed to include additional subject typespertaining to non-criminal subject, yet still law enforcement relatedsubjects and classifications. For example, a subject packet forclassifications such as: (1) “Juvenile”, for use in tracking andproviding notifications concerning law enforcement interactions withjuveniles, (2) “Weapon”, for use in providing law enforcement with amethod for tracking law enforcement encounters with general makes,models, and calibers of weapons and for generating investigativenotifications to law enforcement personnel concerning encounters withsuch weapons, and (3) “Site Survey”, for use in creating and storingphotographs, videos, blueprints, floor plans, sketches/diagrams, andelectronic scans of locations for use with tactical operations.Regarding one probable utilization of the Juvenile Subject Packet, aparent or guardian of a juvenile could request a Juvenile Subject Packetfor a minor child and list in that Subject Packet as contact informationthe guardian's telephone number, cellphone number, and/or email to whichnotifications could be directed concerning that juvenile subject'sinteractions with law enforcement. Regarding one probable utilization ofthe Weapon Subject Packet, QLEA Users may run a query for a make, model,or caliber of weapon, without requiring a serial number as descriptivedata, to develop lead information for investigators of gun-relatedcrimes. Regarding the Site Survey Subject Packet, in support of SWAT andtactical operations, law enforcement may store photographs, videos,blueprints, floor plans, sketches/diagrams, and electronic scans oflocations. Access to such Subject Packets may be restricted accordinglypursuant to the User's Agency Account settings.

In another preferred embodiment of the invention, commercially availabledigital recording technology utilized in jail/prison telephone systemsmay be connected via the NDD 26 to the CDMS 16. The telephone numbers ofoutgoing calls placed using the commercially available jail/prisontelephone system may be queried against the CDMS 20 database todetermine if the dialed telephone number matches any of the TelephoneSubject Packets contained therein; if a match is identified, thenotification process occurs as usual through the issuance ofConfirmation Response(s) to the SLEA(s). Additional features may alsoinclude a direct link from the QLEA's digital device which would link tothe jail telephone system and enable the QLEA User to listen to the jailcall.

In one embodiment, by employing the Subject Packet and StatusClassification concepts to summarize a second system user's criminalintelligence on a given subject, the system and method does not requirethat law enforcement reports be stored in its database or be transmittedto a first system user in response to a query. Consequently, whencompared to a reports-based database, the Subject Packet-based systemand method results in dramatically reduced data storage spacerequirements. Furthermore, given the significantly reduced size of thedata files afforded by the use of the Subject Packet concept, the systemand method is capable of transmitting effectively the same actionableintelligence to system users with greater speed (i.e. Subject Packet vs.one or more law enforcement reports/documents).

Any of the features or attributes of the above described embodiments andvariations can be used in combination with any of the other features andattributes of the above described embodiments and variations as desired.

Although the invention has been shown and described with respect to acertain embodiment or embodiments, it is apparent that this inventioncan be embodied in many different forms and that many othermodifications and variations are possible without departing from thespirit and scope of this invention.

Moreover, while exemplary embodiments have been described herein, one ofordinary skill in the art will readily appreciate that the exemplaryembodiments set forth above are merely illustrative in nature and shouldnot be construed as to limit the claims in any manner. Rather, the scopeof the invention is defined only by the appended claims and theirequivalents, and not, by the preceding description.

The invention claimed is:
 1. A computer-based system for facilitatingthe execution of law enforcement duties, said computer-based systemcomprising: a data processing and records management system includingone or more computers with one or more processors and one or more datastorage devices operatively coupled to said one or more processors, saiddata processing and records management system being configured andarranged to: generate a first graphical user interface comprising adrop-down menu that includes a plurality of law enforcement supporttasks, wherein a selection of at least one of the plurality of lawenforcement support tasks on said drop-down menu by a first system userresults in generating an investigation screen for display on a localdigital computer or mobile digital device of said first system user, andwherein a selection of at least another one of the plurality of lawenforcement support tasks on said drop-down menu by said first systemuser results in generating a creation screen for a subject packet or amoney batch; receive a first input signal from said local digitalcomputer or mobile digital device of said first system user indicatingthe selection of said at least one of the plurality of law enforcementsupport tasks on said drop-down menu that results in generating saidinvestigation screen; generate, in response to receiving said firstinput signal, a second graphical user interface comprising saidinvestigation screen for display on said local digital computer ormobile digital device of said first system user, said investigationscreen comprising a user-selectable control element on said secondgraphical user interface that enables said first system user to indicatethat a seizure has been made; receive a second input signal from saidlocal digital computer or mobile digital device of said first systemuser indicating that said seizure has been made by said first systemuser; generate, in response to receiving said second input signalindicating that said seizure has been made, a create seizure screencomprising one or more descriptive data fields for allowing said firstsystem user to characterize two or more seized items obtained duringsaid seizure; calculate a total monetary value for all of said two ormore seized items entered into said create seizure screen by said firstsystem user; output said calculated total monetary value to said localdigital computer or mobile digital device of said first system user sothat said total monetary value is capable of being displayed on a visualdisplay device of said local digital computer or said mobile digitaldevice; after receiving a third input signal from said local digitalcomputer or mobile digital device of said first system user indicatingthat said first system user has completed entering information regardingsaid seizure, generate and send a seizure notification to at leastanother system user so that said at least another system user is able toeffectively and efficiently initiate an asset forfeiture proceeding bydirectly accessing concise seizure information in real-time, whereingenerating said seizure notification further comprises generating anactivatable link within said seizure notification, and wherein saidseizure notification generated by said data processing and recordsmanagement system and sent to said at least another system usercomprises said calculated total monetary value for all of said two ormore seized items seized by said first system user; receive a fourthinput signal from a local digital computer or mobile digital device ofsaid at least another system user that activates said activatable linkwithin said seizure notification; and generate, in response to receivingsaid fourth input signal that activates said activatable link, a loginscreen of said computer-based system that enables said at least anothersystem user to enter appropriate login and password information so as togain secure access to additional information regarding said seizure thatwas not included in said seizure notification.
 2. The computer-basedsystem according to claim 1, wherein said user-selectable controlelement on said investigation screen is a check box that is capable ofbeing checked and unchecked by said first system user.
 3. Thecomputer-based system according to claim 1, wherein said one or moredescriptive data fields on said create seizure screen generated by saiddata processing and records management system include one or more of thefollowing: (i) an item type drop-down menu for classifying said seizeditem as one of the following: (a) cash, (b) a vehicle, (c) a weapon, and(d) other item; (ii) a value data field for entering the monetary valueof said seized item; (iii) an identification number data field for saidseized item; and (iv) a notes field for entering text so as to furtherdefine said seized item.
 4. The computer-based system according to claim1, wherein said seizure notification generated by said data processingand records management system and sent to said at least another systemuser further comprises at least one of the following: (i) a seizuretype, (ii) a date and time of said seizure, and (iii) name and contactinformation for said first system user.
 5. The computer-based systemaccording to claim 4, wherein, after said at least another system userenters the appropriate login and password information into said loginscreen, said data processing and records management system is furtherconfigured and arranged to: generate a view seizure screen for displayon said local digital computer or mobile digital device of said at leastanother system user, said view seizure screen comprising additionalinformation regarding said seizure, wherein said additional informationregarding said seizure includes one or more of the following: (i)subject query type information for a subject query associated with saidseizure, (ii) a query transaction identifier for said subject query,(iii) a date and time of said subject query, (iv) a subject packet typefor a matched packet of said subject query; (v) an identification typeof said subject query; and (vi) information entered into said one ormore descriptive data fields of said seized items by said first systemuser.
 6. A method for facilitating the execution of law enforcementduties, said method comprising the steps of: providing a data processingand records management system including one or more computers with oneor more processors and one or more data storage devices operativelycoupled to said one or more processors; generating, by said dataprocessing and records management system, a first graphical userinterface comprising a drop-down menu that includes a plurality of lawenforcement support tasks, wherein a selection of at least one of theplurality of law enforcement support tasks on said drop-down menu by afirst system user results in generating an investigation screen fordisplay on a local digital computer or mobile digital device of saidfirst system user, and wherein a selection of at least another one ofthe plurality of law enforcement support tasks on said drop-down menu bysaid first system user results in generating a creation screen for asubject packet or a money batch; receiving, by said data processing andrecords management system, a first input signal from said local digitalcomputer or mobile digital device of said first system user indicatingthe selection of said at least one of the plurality of law enforcementsupport tasks on said drop-down menu that results in generating saidinvestigation screen; generating, by said data processing and recordsmanagement system, a second graphical user interface in response toreceiving said first input signal, said second graphical user interfacecomprising said investigation screen for display on said local digitalcomputer or mobile digital device of said first system user, saidinvestigation screen comprising a user-selectable control element onsaid second graphical user interface that enables said first system userto indicate that a seizure has been made; receiving, by said dataprocessing and records management system, a second input signal fromsaid local digital computer or mobile digital device of said firstsystem user indicating that said seizure has been made by said firstsystem user; generating, by said data processing and records managementsystem, a create seizure screen in response to receiving said secondinput signal indicating that said seizure has been made, said createseizure screen comprising one or more descriptive data fields forallowing said first system user to characterize two or more seized itemsobtained during said seizure; calculating, by said data processing andrecords management system, a total monetary value for all of said two ormore seized items entered into said create seizure screen by said firstsystem user; outputting, by said data processing and records managementsystem, said calculated total monetary value to said local digitalcomputer or mobile digital device of said first system user so that saidtotal monetary value is capable of being displayed on a visual displaydevice of said local digital computer or said mobile digital device;after receiving a third input signal from said local digital computer ormobile digital device of said first system user indicating that saidfirst system user has completed entering information regarding saidseizure, generating and sending, by said data processing and recordsmanagement system, a seizure notification to at least another systemuser so that said at least another system user is able to effectivelyand efficiently initiate an asset forfeiture proceeding by directlyaccessing concise seizure information in real-time, wherein generatingsaid seizure notification further comprises generating an activatablelink within said seizure notification, and wherein said seizurenotification generated by said data processing and records managementsystem and sent to said at least another system user comprises saidcalculated total monetary value for all of said two or more seized itemsseized by said first system user; receiving, by said data processing andrecords management system, a fourth input signal from a local digitalcomputer or mobile digital device of said at least another system userthat activates said activatable link within said seizure notification;and generating, by said data processing and records management system, alogin screen of said computer-based system in response to receiving saidfourth input signal that activates said activatable link, said loginscreen enables said at least another system user to enter appropriatelogin and password information so as to gain secure access to additionalinformation regarding said seizure that was not included in said seizurenotification.
 7. The method according to claim 6, wherein saiduser-selectable control element on said investigation screen is a checkbox that is capable of being checked and unchecked by said first systemuser.
 8. The method according to claim 6, wherein said one or moredescriptive data fields on said create seizure screen generated by saiddata processing and records management system include one or more of thefollowing: (i) an item type drop-down menu for classifying said seizeditem as one of the following: (a) cash, (b) a vehicle, (c) a weapon, and(d) other item; (ii) a value data field for entering the monetary valueof said seized item; (iii) an identification number data field for saidseized item; and (iv) a notes field for entering text so as to furtherdefine said seized item.
 9. The method according to claim 6, whereinsaid seizure notification generated by said data processing and recordsmanagement system and sent to said at least another system user furthercomprises at least one of the following: (i) a seizure type, (ii) a dateand time of said seizure, and (iii) name and contact information forsaid first system user.
 10. The method according to claim 9, whereinsaid method further comprises step of: after said at least anothersystem user enters the appropriate login and password information intosaid login screen, generating, by said data processing and recordsmanagement system, a view seizure screen for display on said localdigital computer or mobile digital device of said at least anothersystem user, said view seizure screen comprising additional informationregarding said seizure, wherein said additional information regardingsaid seizure includes one or more of the following: (i) subject querytype information for a subject query associated with said seizure, (ii)a query transaction identifier for said subject query, (iii) a date andtime of said subject query, (iv) a subject packet type for a matchedpacket of said subject query; (v) an identification type of said subjectquery; and (vi) information entered into said one or more descriptivedata fields of said seized items by said first system user.