Integration of cellular phone detection and reporting into a prison telephone system

ABSTRACT

The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/582,520 filed Sep. 25, 2019, which is a continuation of U.S.application Ser. No. 15/883,985 filed Jan. 30, 2018, now U.S. Pat. No.10,432,343, issued Oct. 1, 2019, which is a continuation of U.S.application Ser. No. 15/262,842, filed Sep. 12, 2016, now U.S. Pat. No.9,887,800, issued Feb. 6, 2018, which is a continuation of U.S.application Ser. No. 14/096,291, filed Dec. 4, 2013, now U.S. Pat. No.9,444,574, issued Sep. 13, 2016, which is a continuation of U.S.application Ser. No. 13/562,057, filed Jul. 30, 2012, now U.S. Pat. No.8,606,229, issued Dec. 10, 2013, which is a continuation of U.S.application Ser. No. 11/504,979, filed Aug. 16, 2006, now U.S. Pat. No.8,233,880, issued Jul. 31, 2012, which are incorporated by referenceherein in their entireties.

BACKGROUND OF THE INVENTION

The present subject matter relates generally to a method and apparatusfor detecting reporting the operation of cellular telephones withinselected or predetermined areas. More particularly, the present subjectmatter relates to a method and apparatus for detecting the unauthorizedoperation of cellular telephones within security facilities includingprisons and reporting such operation to selected officials.

The present subject matter is directed in one aspect, although notexclusively, towards the corrections environment. Various lawenforcement entities find it desirable, even necessary (for example,such as required by law or circumstances), to monitor telephoneconversations conducted by inmates in penal institutions or otherdetainees in similar facilities. Highly specialized telecommunicationsequipment and facilities must be provided to meet the various needs ofgovernmental officials and others in addressing the desire to monitorand/or record telephone conversations under varying circumstances.

As telephone technology and, in particular, cellular technology, hasbecome more advanced, workers in the corrections environment have foundthat it has become easier to hide and smuggle into correctionsfacilities very small cellular telephones that may be used by inmate andothers to circumvent the required monitoring and/or recordingoperations. As a non-limiting example, the remainder of the presentdisclosure will refer to monitoring for cellular telephone activitywithin the above noted particular environment. It is to be strictlyunderstood, however, that the present technology may be applied toand/or used within other areas where monitoring of cellular telephoneactivity may be of interest. For example, it may be desirable, forsecurity or other purposes, to monitor cellular telephone activity inbusiness or governmental environments where confidential or classifiedinformation is being discussed. Alternatively, there could be aninterest in monitoring cellular telephone activity where operation ofsuch devices is restricted or, for courtesy, deemed undesirable such asin restaurants, places of worship, theaters and similar locations. Assuch, it should be understood that the present technology hasapplicability to any situation where there is a need or desire tomonitor cellular telephone activity within a prescribed area.

It has been common practice for many years in the correctionsenvironment to record and/or monitor inmates' conversations. Suchrecording and monitoring takes place in the very controlled atmosphereof permitted inmate communications with individuals outside of thefacilities housing prisoners or inmates. Normally prisoners are limitedto a small number of individuals that they are permitted to call. Thesemay include family members, their lawyers, and friends and mayspecifically exclude others, for example judges, jury members,witnesses, former co-conspirators and other like individuals to whomcalls from a particular inmate may be of a harassing or other undesirednature. There may be time of day, length of call, three-way call orother restrictions on calls, all of which must be controlled by way ofvarious instrumentalities that may include computer controlled equipmentat the facility and/or at remote locations in addition to humanmonitoring and/or control. In almost all instances, such telephone callsmust be recorded; yet even in those instances, there are conditions thatmay impact on the desire, ability, or legal right to record suchconversations. For example, it is inappropriate to record or monitorconversations between an inmate and his/her attorney, and thus, measuresmust be taken to insure that, where calls are made from an inmate tohis/her attorney, no recording is made or monitoring is allowed.

The particular needs described above have been addressed in the priorart, which, in major part, has provided responses to accommodate themajority of the needs addressed. Examples of such include LazerPhone™and LazerVoice®, products provided by the assignee of the presentsubject matter. LazerPhone™ is a centralized, PC-based, integratedtelephone system with features that provide control of inmatetelecommunications activities. The system provides call blocking andmonitoring, account control including personal identification number(PIN) setup and control, report generation including automated troublereports, call activity reports and other administrative reports as wellas numerous other features.

LazerVoice® is an optional feature of LazerPhone™ and provides arecording function for the LazerPhone™ system. LazerVoice® is a modularsystem that provides the ability to record at its installation siteselected telephone conversations, permit monitoring by appropriateauthorities of selected conversations, and store for later retrievalrecorded conversations as well as other functions and operationsinvolving the recording of telephone conversations. Additionalinformation regarding these products may be found at the World Wide Website, www.gtl.us, of the corporate owner of the present applicationinterests.

While it is considered well known that the recording of inmate telephoneconversations is advantageous to governmental agencies and appropriateauthorities in that information regarding the security of facilities andgeneral continuing or past criminal activity may be found in suchrecordings, advances in the cellular telephone technology have openedavenues for inmates to circumvent such monitoring and/or recordingadvantages. Maintaining the ability to insure control and/or monitoringof communications from or to a controlled facility is, therefore, animportant aspect to previously implemented telecommunications systems.As noted, with the advances in cellular communications technology, suchmaintenance of capability is hindered by such issues as the clandestinedelivery of prohibited equipment into a monitored facility. Due to thesmall size of certain of the more recently developed devices, such mayavoid detection by more conventional search techniques including, butnot limited to, walk through and manual metal detectors and evenphysical “pat-down searches.

While various aspects and alternative features are known in the field oftelecommunications and telephone conversation monitoring, no one designhas emerged that generally integrates all of the ideal features andperformance characteristics as discussed herein.

SUMMARY OF THE INVENTION

The present subject matter recognizes and addresses several of theforegoing shortcomings, and others concerning certain aspects ofmonitoring telephone conversations within a corrections environment.

Thus, broadly speaking, aspects of some embodiments of the presentlydisclosed technology concern the provision of improved apparatus andcorresponding methodology to provide for the continued monitoring oftelephone conversation(s) between individuals within a correctionsfacility and called or calling parties outside such facilities. Moreparticularly, certain aspects of some embodiments of the disclosedtechnology relate to an improved apparatus and corresponding methodologyusing radio frequency (RF) monitoring device(s), the provision andpractice of which will help insure that any telephone conversations madefrom or to a corrections facility will have the maximum possibleavailability to authorized personnel.

Another aspect of certain embodiments of the present subject matter isto provide an improved apparatus and corresponding methodology thatprovides simple integration with existing corrections facilitiestelephone systems or, alternately, a significant option for newcorrections facilities telephone system installations.

A further aspect of certain embodiments of the present subject matter isto provide an improved apparatus and corresponding methodology forconveniently notifying appropriate personnel of the operation ofunauthorized telephone equipment within a corrections facility.

A still further aspect of certain embodiments of the present subjectmatter is to provide an improved apparatus and corresponding methodologyfor locating unauthorized telephone equipment within a correctionsfacility.

Additional aspects and advantages of the present subject matter are setforth in or will be apparent to those of ordinary skill in the art fromthe detailed description herein. Also, it should be further appreciatedby those of ordinary skill in the art that modifications and variationsto the specifically illustrated, referenced, and discussed features andsteps hereof may be practiced in various embodiments and uses of thissubject matter without departing from the spirit and scope thereof, byvirtue of present reference thereto. Such variations may include, butare not limited to, substitution of equivalent means and features,materials, or steps for those shown, referenced, or discussed, and thefunctional, operational, or positional reversal of various parts,features, steps, or the like.

Still further, it is to be understood that different embodiments, aswell as different presently preferred embodiments, of this subjectmatter may include various combinations or configurations of presentlydisclosed features, steps, or elements, or their equivalents (includingcombinations of features or steps or configurations thereof notexpressly shown in the FIGURE or stated in the detailed description).

A first exemplary embodiment of the present subject matter relates to animproved apparatus and corresponding methodology for monitoring for thepresence of cellular telephones within a defined area.

Another exemplary embodiment of the present subject matter relates to animproved apparatus and corresponding methodology for automaticallygenerating reports of violations of cellular telephone use regulations.

A more particular exemplary embodiment of the present technology relatesto an improved apparatus and corresponding methodology for automaticallynotifying authorized personnel in real time of the operation ofunauthorized communications equipment within a prescribed area.

Still another particular exemplary embodiment of the present subjectmatter involves a specialized phone system for use in relation to aprison environment, having an associated sensor system responsive to theoperation of selected telecommunications apparatus. Such a system mayinclude one or more cellular telephone detector(s) located at selectedor predetermined location(s) within a corrections facility; an interfacedevice, an inmate telephone system, and one or more report or alarmdelivering devices. With such system, advantageously inmates will not beable to circumvent monitoring and/or recording of conversation data frominmate conversations conducted by way of unauthorized telephoneinstruments surreptitiously brought into the corrections facility.

Yet another present exemplary embodiment may relate to a cellulartelephone detection system, comprising: a plurality of cellulartelephone transmission detectors, an interface device, and a telephonesystem. In such present exemplary cellular telephone detection system,each such detector is preferably operatively associated with apredetermined zone and configured to produce a detection signal upondetection of cellular telephone transmissions within its respectivepredetermined zone. Such exemplary interface device is preferablycoupled to each of the plurality of cellular telephone transmissiondetectors; and the exemplary telephone system is preferably coupled tosuch interface device, and otherwise configured to receive one or moredetection signals from one or more of the plurality of cellulartelephone transmission detectors and to generate one or morenotification messages indicative of detected cellular telephonetransmissions.

Present subject matter may likewise encompass a corresponding method formonitoring an area for cellular telephone transmissions.

Still further, present exemplary embodiments may relate to an inmatetelephone system, comprising a plurality of cellular telephonetransmission detectors, each detector operatively associated with apredetermined zone and configured to produce a detection signal upondetection of cellular telephone transmissions within its respectivepredetermined zone; and a telephone system. Such exemplary telephonesystem preferably is coupled to the plurality of cellular telephonetransmission detectors, and configured to receive one or more detectionsignals from one or more of the plurality of cellular telephonetransmission detectors and to generate one or more notification messagesindicative of detected cellular telephone transmissions.

Additional embodiments of the subject technology, not necessarilyexpressed in this summarized section, may include and incorporatevarious combinations of aspects of features, parts, or steps referencedin the summarized objectives above, and/or features, parts, or steps asotherwise discussed in this application.

Those of ordinary skill in the art will better appreciate the featuresand aspects of such embodiments, and others, upon review of theremainder of the specification.

BRIEF DESCRIPTION OF THE DRAWING

A full and enabling description of the present subject matter, includingthe best mode thereof, directed to one of ordinary skill in the art, isset forth in the specification, which makes reference to the appendedFIGURE, in which:

FIG. 1 is a generally representational block diagram illustrating anoverview of the present subject matter.

Repeat use of reference characters throughout the present specificationand appended drawing is intended to represent same or analogous featuresor elements of the present subject matter.

DETAILED DESCRIPTION OF THE DRAWING

As referenced in the Summary of the Invention section, supra, thepresent subject matter is directed towards an improved apparatus andcorresponding methodology for monitoring for the unauthorized use ofcellular telecommunications equipment within designated areas.

Reference will now be made to the presently disclosed technology,specifically with reference to FIG. 1 . It will be observed from FIG. 1that the present technology is directed to apparatus and a methodologyfor monitoring for the unauthorized use of certain types oftelecommunications equipment within designated areas. The presentsubject matter is primarily directed to the detection of theunauthorized presence and/or use of cellular telephones. It should beborne in mind, however, that the present subject matter is not solimited in that the present subject matter may be used to detect the useof other types of unauthorized communications equipment including, forexample text messaging devices, two-way pagers, and other types of radiofrequency transmitting and/or devices that may be used to transmitand/or receive messages to or from a corrections facility.

With further reference to FIG. 1 it will be observed that there isillustrated a block diagram of a cellular telephone detection system 100incorporated with an inmate telephone system. As mentioned earlierhereinabove, inmate telephone systems provide a number of features thatmay be used to assist law enforcement personnel in carrying out theirobligations to monitor and/or record communications to and from inmatesin a correctional facility. Such systems are readily available fromseveral sources including the assignee of the present subject matter.The present subject matter relates to optional capability of such knownsystems in the form of a plurality of specially designed detectors that,when combined with known inmate telephone systems and, in particular,those of the present assignee, provide operational benefits that, in theaggregate, provide superior capabilities that simply installing a cellphone monitor in selected or predetermined locations.

With further reference to FIG. 1 , it will be appreciated that there isillustrated a number of monitoring devices 1-8, each of which may beplaced in a cellblock within a corrections facility or in some otherappropriate location within the corrections facility includingconference rooms, recreational areas, libraries, medical facilities, orother locations within the correctional facility. Each such possiblelocation may be identified as a “zone” and designated with a zone number41-48 corresponding to monitoring devices 1-8.

Monitoring devices 1-8 may be coupled by way of individual cables to aninterface device 10 which is configured to couple signals by way ofcoupling cable 12 to an inmate telephone system 20. It should beappreciated that other connection methodologies may be employed tocouple the monitoring devices 1-8 to interface 10 including opticalcoupling as, for example, with an optical waveguide corresponding to anoptical cable, or by other communications methodologies including, butnot limited to radio frequency (RF) techniques including, but again notlimited to, Bluetooth @, WiFi, dedicated RF transmission systems, andother wired or wireless technologies. Interface device 10 may beconfigured to receive a signal from individual monitoring devices 1-8and to provide information to inmate telephone system 20 that, first, asignal has been detected by a monitoring device and, second, thelocation of the monitoring device from which the signal was detected.

Information as to location of the various monitoring devices 1-8 may bea part of a data stream sent from the device itself that also includesmonitoring activity signals, or may be added to monitoring activitysignals received from individual monitoring devices based onpre-established information recorded or entered into the interfacedevice at the time of installation of the monitor devices 1-8 as well asthe interface device 10. Alternatively, location information may berecorded within the inmate telephone system 20 itself as, for example, alook-up chart in a memory or file contained within, or as a part of, theinmate telephone system 20.

Regardless of the methodology by which information is conveyed from thedetection devices 1-8 and/or interface device 10, such information maybe supplied to inmate telephone system 20 in a form corresponding todate and time of detection as well as zone in which, or device fromwhich, a signal has been detected. Upon receipt of the detectioninformation, telephone system 20 may be configured to respond in one ormore selected ways. As will be appreciated by those of ordinary skill inthe prison telephone system art, prison telephone systems and inparticular those available from the assignee of the present subjectmatter, may be configured to respond in various manners upon detectionof specific telephone related events. Such may include the attemptedinitiation of a call by an inmate to an unauthorized called party oreven the utterance of selected words indicative or prohibitedactivities. In such instances pre-selected communications mayautomatically be initiated to alert appropriate personnel to theoccurrence of a potentially relevant event.

In a similar manner, the technology of the present subject matter allowsa user to designate selected responses to the detection of unauthorizedtelecommunication equipment by providing selected alarms or notificationmessages to appropriate personnel by way of the inmate telephone system20. In accordance with the present technology, upon detection ofoperation of unauthorized telecommunication equipment, signals are sentfrom one or more detector devices 1-8 in corresponding detection zones41-48 by way of interface device 10 to inmate telephone system 20.

Inmate telephone system 20 may have been previously configured torespond by sending or generating notification messages corresponding toany combination of emails 32, telephone messages 34 and or informationreports 36 to appropriate personnel and/or information storage systems.For purposes of the present disclosure, email may include any form ofnon-verbal electronic communication including standard email as well astext messages and instant messages, all of which may be transmitted byany available communications channel including those provided by bothwired and wireless transmission 5 technologies. Telephone messages 34may include pre-recorded voice messages or any form of automated audiblecommunications included simulated voice announcements as well as encodedtones or other human perceptible sounds.

It should be appreciated that the chosen responses or combinations of 0responses generated or sent by inmate telephone system 20 may bereconfigured from time to time as necessary or desirable. It shouldfurther be appreciated that emails 32 may be sent to locations within aswell as outside of the correctional facility. In addition, telephonemessages 34 may take the form of automated voice messages conveyingselected information to personnel both inside as well as outside thecorrections facility. Such information may convey only that a detectionof unauthorized telecommunications equipments has been made so as toalert appropriate personnel to take appropriate actions, or may includeany or all collected information including location or zone from whichthe detection of unauthorized use has occurred as well as date and timeinformation if desired. Finally, an information log or file 36 may becreated for current or future uses as desired.

In certain additional, though generally limited, circumstances, it maybe desirable for the inmate telephone system to be configured forcontrolling and activating jamming technology, as generally representedby jammer device 38. For example, in a hostage situation, or in riotconditions, it may be authorized and desirable for the non-authorizeduse of cell phones to be jammed. In those instances, an appropriatelyconfigured inmate telephone system 20 in accordance with the presentsubject matter, could activate and appropriately control representativejammer device 38.

The present technology is designed primarily to detect unauthorizedoperation of telecommunication equipment within one or more detectionzones based on the detection capabilities of the detector device 1-8. Itis contemplated that such detection devices may incorporate sensitivityadjustment means that may include, but are not limited to; signal levelcomparators, antenna sensitivity adjustment means, as well as othersignal discriminating methodologies to provide a measure ofadjustability to individual detection zones.

In certain alternatives, it may be desired to have the subject detectordevices 1-8 be capable of also detecting non-cellular two-waycommunication devices (for example, two-way radios, such as used byguards). However, in those instances, in may further be desired andwithin the present subject matter that the resulting system is providedso as to be selectively responsive to such non-cellular basedcommunications devices, depending on particular needs in a givencircumstance.

It should be noted that while the principal concept according to thepresent technology is to limit detection to a particular zone ofdetection by the above enumerated methodologies, the present subjectmatter may incorporate triangulation features based on relative signallevels within monitored zones. Such triangulation methodologies wouldthen include an indication of detected signal level within a detectionzone which information may also be sent to inmate telephone system 20for analysis. The preferred detection method, however, is a zonedetection method wherein even if a single unauthorized piece oftelecommunications equipment triggers plural zone detections, all suchzones will “report in” to the inmate telephone system 20 which wouldthen generate plural indications of unauthorized operation oftelecommunications equipment.

As may be observed from an inspection of FIG. 1 , certain of thedetection zones 41-48 may partially overlap other of the detectionzones, while others of the detection zones may not be overlapped. Forinstance, detection zones 41, 46, and 48 are independent detection zoneswhile zones 44 and 47 partially overlap and zone 45 partially overlapsboth zones 42 and 43. Should a signal be detected from any of thedetection zones, each zone may then be investigated by appropriatepersonnel as necessary or required. Such multiple reporting provides afar simpler and, possibly, more reliable detection system than having torely on triangulation methodologies involving signal levels that may beadversely affected by a great variety of signal absorbing entitiesincluding not only permanent elements including building structure butalso indeterminate elements including numbers of individuals within aspecific area.

Thus there has been described an apparatus and methodology for detectingoperation of unauthorized telecommunication equipment in designatedlocations. Moreover the disclosed apparatus and methodology permitsselected communication of such detection to appropriate personnel inselected ways in real time so that appropriate responses may be made.

While the present subject matter has been described in detail withrespect to specific embodiments thereof, it will be appreciated thatthose skilled in the art, upon attaining an understanding of theforegoing may readily produce alterations to, variations of, andequivalents to such embodiments. Accordingly, the scope of the presentdisclosure is by way of example rather than by way of limitation, andthe subject disclosure does not preclude inclusion of suchmodifications, variations and/or additions to the present subject matteras would be readily apparent to one of ordinary skill in the art.

What is claimed is:
 1. An unauthorized wireless communication detectionsystem within a controlled environment facility, comprising: a pluralityof detection devices distributed throughout the controlled environmentfacility, each of the plurality of detection devices having acorresponding location; a plurality of signal jammers distributedthroughout the controlled environment facility, the plurality of signaljammers each having a corresponding location within the controlledenvironment facility and being configured to jam wireless signaltransmission and/or reception in a nearby region; an interface deviceconfigured to receive a detection signal from the plurality of detectiondevices and transmit detection information to a central processingserver; and the central processing server having one or more processorsconfigured to: receive the detection information from the interfacedevice, the detection information including a time of a detection, alocation of a detection device that made the detection, and whether thedetection was of a cellular transmission or a non-cellular transmission;determine, based on the detection information, an unauthorized wirelesscommunication location within the controlled environment facility;transmit a jamming instruction and the unauthorized wirelesscommunication location to the interface device; and take remedial actionin response to the determining, the remedial action varying depending onwhether the detection was of a cellular transmission or a non-cellulartransmission, wherein the interface device is further configured to:identify a signal jammer from among the plurality of signal jammers thatis closest to the unauthorized wireless communication location based ona comparison of the unauthorized wireless communication location tostored locations of the plurality of signal jammers; and activate thesignal jammer closest to the unauthorized wireless communication.
 2. Thesystem of claim 1, wherein the remedial action includes notifying anadministrator of the unauthorized wireless communication location. 3.The system of claim 1, wherein the interface device includes a memorythat stores the corresponding locations of the plurality of detectiondevices.
 4. The system of claim 3, wherein the detection signal includesan identifier that identifies a detection device from among theplurality of detection devices from which the detection signaloriginates.
 5. The system of claim 3, wherein the interface device isconfigured to generate the detection information by matching theidentifier to a corresponding location stored in the memory.
 6. Thesystem of claim 1, wherein the central processing server is configuredto determine the unauthorized wireless communication location based onthe detection information and previously-received detection information.7. A device, comprising: a plurality of detectors distributed throughouta controlled environment facility, each of the plurality of detectorshaving a corresponding location within the controlled environmentfacility and being configured to detect an unauthorized wirelesscommunication; a plurality of signal jammers distributed throughout thecontrolled environment facility, the plurality of signal jammersconfigured to jam wireless signal transmission and/or reception in anearby region, the plurality of signal jammers each having acorresponding location within the controlled environment facility; amemory that stores the corresponding locations of the plurality ofdetectors in association with detector identifiers as well as thecorresponding locations of the plurality of signal jammers, and aplurality of different remedial actions to be taken depending on whethera detected wireless transmission is a cellular transmission or anon-cellular transmission; a transmitter configured to transmitdetection information to a central processing server, the detectioninformation including a location of a first detector, a time of adetection by the first detector, and whether the detection was of acellular transmission or a non-cellular transmission; and a signalinterface configured to: receive a detection event signal from the firstdetector from among the plurality of detectors, the detection eventsignal including a first detector identifier, receive a jamminginstruction from the central processing server and the location of thefirst detector; identify a signal jammer from among the plurality ofsignal jammers that is closest to an unauthorized wireless communicationlocation based on a comparison of the unauthorized wirelesscommunication location to the corresponding locations of the pluralityof signal jammers; and activate the signal jammer closest to theunauthorized wireless communication location.
 8. The device of claim 7,wherein the detection event signal further includes the time of thedetection.
 9. A method for detecting an unauthorized wirelesscommunication within a controlled environment facility, the methodcomprising: detecting, by one of a plurality of detectors, theunauthorized wireless communication; transmitting a detection eventsignal to an interface device; generating detection information based onthe detection event signal; transmitting the detection information to acentral processing server, the detection information including a time ofa detection, a location of a detection device that made the detection,and whether the detection was of a cellular transmission or anon-cellular transmission; determining, based on the detectioninformation, an unauthorized wireless communication location within thecontrolled environment facility; receiving a jamming instruction at theinterface device from the central processing server that includes thelocation of the detection device; identifying a signal jammer from amonga plurality of signal jammers that is closest to the location of thedetection device; taking remedial action in response to the determining,the remedial action varying depending on whether the detection was of acellular transmission or a non-cellular transmission, the remedialaction including activating the signal jammer closest to the location ofthe detection device.
 10. The method of claim 9, wherein the remedialaction includes notifying an administrator of the unauthorized wirelesscommunication location.
 11. The method of claim 9, further comprisingstoring locations of the plurality of detectors in a memory.
 12. Themethod of claim 11, wherein the detection event signal includes anidentifier that identifies a detector from among the plurality ofdetectors from which the detection event signal originates.
 13. Themethod of claim 12, further comprising generating the detectioninformation by matching the identifier to a corresponding locationstored in the memory.