System and method for anonymous tracking of individuals

ABSTRACT

A system and method for eliciting information anonymously from a user are provided. The anonymously provided information is received from at least one of a plurality of broadcasting units via a respective transmitter. The anonymously provided information is received via a dedicated broadcast reception component that is configured to interface with the broadcasting unit. The plurality of broadcasting units are each configured with the respective transmitter and configured to receive and transmit information from the user. The plurality of broadcasting units are also configured to communicate over a communication network. Information representing at least one physical characteristic of the user is received from the at least one of the plurality of broadcasting units. The at least one physical characteristic identifies the user. The information representing the at least one physical characteristic of the user is matched with the anonymously provided information. The incentive to be provided to the user or a third party associated with the user is provided in exchange for the anonymously provided information.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation-in-part of prior U.S. patentapplication Ser. No. 11/513,731, filed Aug. 30, 2006, now U.S. Pat. No.7,835,755, which claims priority to U.S. Provisional Patent ApplicationSer. No. 60/712,489, filed Aug. 30, 2005, the entire contents of all ofwhich are hereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to tracking, and, moreparticularly, to enabling an individual to report anonymously of thewhereabouts of another individual.

2. Description of the Related Art

Rewards are often offered for information that leads to the apprehensionof a wanted person, such as a fugitive and/or outlaw. By offering areward, it is believed that people will be motivated to act asinformants and/or to risk a degree of personal harm in order to collectthe reward. Occasionally, rewards are significantly large, and typicallycorrelate with the degree of danger associated with the wantedindividual.

Unfortunately, potential informants are often unable to provideinformation leading to the apprehension or to the tracking of a wantedindividual, who may be indigenous to a location, due to a substantialrisk that the informant's identity will be revealed or identified bythose in association with the person(s) being tracked. It is perceivedthat the danger, regardless of the size of the reward, is simply toohigh.

SUMMARY OF THE INVENTION

Accordingly, the present invention provides an easy and secure way forindividuals to communicate information over a wide area. Thecommunicating provides a very low risk endeavor, and includes incentivesfor individuals to communicate such that they cannot be tracked, therebyproviding a fail proof way to associate a reward for useful information.

Accordingly, a system and method for eliciting information anonymouslyfrom a user are provided. The anonymously provided information isreceived from at least one of a plurality of broadcasting units via arespective transmitter. The anonymously provided information is receivedvia a dedicated broadcast reception component that is configured tointerface with the broadcasting unit. The plurality of broadcastingunits are each configured with the respective transmitter and configuredto receive and transmit information from the user. The plurality ofbroadcasting units are also configured to communicate over acommunication network. Information representing at least one physicalcharacteristic of the user is received from the at least one of theplurality of broadcasting units. The at least one physicalcharacteristic identifies the user. The information representing the atleast one physical characteristic of the user is matched with theanonymously provided information. The incentive to be provided to theuser or a third party associated with the user is provided in exchangefor the anonymously provided information.

In an embodiment, other unique identification information may be used inplace of the physical characteristic, if desired.

Other features and advantages of the present invention will becomeapparent from the following description of the invention that refers tothe accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

For the purpose of illustrating the invention, there is shown in thedrawings a form which is presently preferred, it being understood,however, that the invention is not limited to the precise arrangementsand instrumentalities shown. The features and advantages of the presentinvention will become apparent from the following description of theinvention that refers to the accompanying drawings, in which:

FIG. 1 illustrates various elements in accordance with a preferredembodiment, including cellular phone units, receiving station, celltower and incentive reward.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The present invention enables persons desiring to provide information,for example, regarding the location of an individual, to do so safelyand anonymously. In a preferred embodiment, the invention includescellular telephone-like units that may be coupled with permanent ortemporary cell “towers.” In a preferred embodiment, the units areoperable for reception and cover a geographic area where such units aredisseminated. The units may be disseminated by air and, thereafter,micro-parachuted and distributed in packages designed to protect theunits. In one embodiment, a power cord is provided in the package foruse in the case of loss of battery power, and/or a battery unit isprovided in the package that is capable of long term use are provided.In one embodiment, the unit deactivates and conserves energy when notengaged, in case a single unit must travel through hands and time toreach an informant of value.

In embodiments in which units are disseminated or deployed by air, oneor more deployment devices may be provided other than or in addition toparachutes. For example, an “airbag” or other device may be used duringdeployment. One or more air management devices may further be employed,such as provided via a shape/component that affects the flow of airaround a unit as the unit is disseminated from the air.

In one or more other embodiments, units are deployed in ways other thanair. For example, units may be driven to one or more locations andsimply dropped at one or more locations.

The units preferably enable a person to transmit a message regardinganother individual, such as that individual's physical location, and,thereafter, to collect a reward or other incentive for the informationwithout requiring the person to keep the unit.

In one embodiment, the units are configured with a recording module thatenable messages from the units to be recorded automatically (orsubstantially automatically, which require at least some user input)along with the Subscriber Identification Module or Subscriber IdentityModule (“SIM”) or other card data or other single unit identification ofthe units, or their “number.” This information is the same, orcorresponds to simple identification data provided in printedinformation with the phone, in the package dropped, and in a preferredconfiguration as a large printed aspect of the phone for easy reading inthe language(s) native to potential informants.

Such “codes” are preferably used to identify informant's communicationdevices, might for example be three letters. For example, in English,three letters allow for over 15,000 such units and unique, simpleidentifiers.

The identifier enables an informant who makes the call to provideinformation which may be recorded preferably with the phone unit ID datato collect a reward or other incentive that is posted, Preferably thecode is very visible on the phone unit as printed text as well, and willbe used by the informant or a contact of the informant to make contactwith indicated departments of the United States government (orselectively any soldiers or personnel in the field or elsewhererepresenting the government of USA).

In one or more embodiments, audio and/or visual information is exchangedbetween the user and the unit, which may be provided substantially inreal-time or which may be respectively recorded and transmitted over aperiod of time. The unit(s) may be configured with a camera or othervisual recording component that enables a user to submit visualinformation relating to, for example, the user's face, nose, mouth,eye(s), fingerprints, or other measurable or identifiable characteristicof the user.

In one or more embodiments, other user-specific and identifiableinformation may be sampled, recorded, or otherwise captured by one ormore components included with or accessible by the unit, and are usefulfor discreetly identifying a user. For example, vocal quality aspects,eye quality aspects (e.g., iris) breath quality aspects, body odor,hair, and/or other passive, biometric and/or identification aspects(possibly including measured or determined by the user's DNA) areacquired and used for future correlation with the user for reward orother redemption. Such captured aspects are useful to identify a userand preclude the user from having to remember or otherwise know anyother information. Once the physical characteristic is matched to theuser, and all other remaining criteria for redemption are satisfied, theuser may be identified and entitled, for example, to a reward.

For example, an informant uses the unit to make a call to provideinformation. The informant is recorded and unique vocal characteristicsare determined and stored for future use, for example, in media locatedremotely from the unit to identify the user.

In one or more embodiments, the units are configured to not retainphysical or other identifying aspects of the user for any significantperiod of time. For example, fingerprint data, scent, iris or otherinformation, such as relating to the user's DNA, is deleted or destroyedafter the information is successfully transmitted from user. In anembodiment, self-destruct functionality, which may include temperatureincrease or other functionality, may be preset and operable to destroyany evidence a hostile entity might use to link the discovered unit toone or more informants, including physically.

The invention enables informants to be not associated with, or inpossession of or linked to the phone that is used to provide criticalinformation. The informant preferably knows the unique three letter (orother simple) code, and only the “message” received by the governmentthat was useful or deemed to meet the criteria of the reward, would bytracking means, be associated with the unique identifier (e.g., threeletter code). This code is known only by the informant or those he/shemay have contacted on their behalf, after apprehension of theindividual(s) being tracked, and when the situation is perhaps more safefor the informant to make contact and claim the reward.

The reward information, details of the unit and how to use the unit,cautionary notes and the three letter code might all be aspects of anaudio recording played by a speaker or through an ear piece associatedwith the unit when activated. An initial message, for example, typed onthe phone itself prompts the user to activate the phone for thisinformation—if such information is not literally on the phone in type,and/or in some way within the overall unit dropped by air or otherwisedistributed under the method.

Further, cautionary notices are preferably provided for informants tonot disclose the code or write it down, unless there is a singlecritical contact that is safe. It is suggested that no such contact ismade and no codes are disclosed until clear, press covered capture ofindividuals related to the program occurs, as well. This increases alikelihood of safety for the informant.

Preferably, the invention comprises special cellular (or othercommunication measure, including any such electronic, “Walking talkie”or other communications known or unknown publicly) is provided in theform of simple, and even “single control,” or units that activate anddial simply by being “opened,” for example.

The units are preferably received by special cellular or otherelectronic receiving towers or means, and such information providedwould be recorded along with the unique number or SIM or otheridentifier of the unit used to provide information.

In one or more alternative embodiments, existing transmission structuresare used for a determined period of time, wherein cellular phones, forexample, receive special instructions and/or one or more messages thatallow any cellular telephone to provide information, including the userindicating a password, and/or receiving one, wherein that password, suchas the word “goat” (in English or another language) is later used, forexample in isolation or in conjunction with other identifyinginformation (e.g., vocal quality, DNA identifiers or the like) and/orcellular phone ID info, to provide a reward or other incentive for aperson.

In this way, existing cellular or other telephones can be used quickly,perhaps once before hostile entities are equipped to also gather such abroad range of cell information, to provide leads. For example, anannouncement comes over all cells, allowing for a “30 minute” window forall people with cellular or other mobile telephones to provideinformation and to indicate, provide, and/or receive identificationinformation, and to retain that information until the one or moredesired targets have been safely apprehended.

Thus, in one or more embodiments, an existing communication network maybe unexpectedly sequestered and used. In one or more embodiments, allcellular telephones within a predetermined area may receive only theinformation and interactivity with the present system/method, therebyavoiding a need for dialing or doing anything other than answering thecellular telephone and, thereafter, simply listening and providinginformant information, and also providing and/or receivingidentification information actively and/or passively to a computingdevice for future redemption of a reward or other incentive. This mayinclude the user's conventional telephone identification information,such as SIM information.

A network is used to solicit information from a plurality of phones.Each of the plurality of phones on one more networks rings and, whenanswered, information regarding one or more of an incentive and arequest for information is provided. A user provides the information andthe user is instructed about providing ways to collect or redeem theincentive. In an embodiment, the one or more networks is used in thefuture to provide ways to redeem the incentive.

Such information solicitation may be provided spontaneously, such as viapassing aircraft, satellites, unmanned drones, or the like.

In order to provide additional security to the informant, one or moreinstructions may be executed on the user's device, such as to erase orotherwise delete any record of the user's correspondence with thesolicitor.

In this way, a low or no-cost solution is provided that uses an existingnetwork with an ancillary computing device for providing thefunctionality disclosed herein. Once information is provided orexchanged, no record of the dialogue preferably remains on any unit orcell phone, with information and/or other imposed data clearing anyrecord of information/audio/video exchanged between the user and one ormore computing devices that has or have sequestered the cellular network(or other type of interactive network) for a particular period of timeand for that purpose.

After a wanted individual(s) is/are apprehended, (or accomplishment ofany task associated with the aspects of this invention or invention intotal,) the informant or those who represent him, or providedinformation on his/her behalf, (who “called,”) who provide the threedigit code to the authorities, those indicated in the type written onthe phone or other “contact” means suggested, are entitled to thereward. The code (e.g., three letters) correspond to the usefulinformation recorded and the phone unit used. Thus, a matching processis disclosed that links the caller's code to the information and,ultimately, the reward.

Preferably, information would be suggested to be disclosed (suggested)only to representatives of the USA, to avoid fraud and false claims forrewards. Further, such “claims” would clearly only be made after knownapprehension of the individual(s) in question.

To ensure continued protection and/or safety, various reward componentsfor a successful program include removal and relocation to, for example,the USA of family, and handling of all details, expense and logistics ofsuch means to keep the informant and his associates/family safe and withthe incentive to inform.

Through the system/method of the present invention, after many (e.g.,thousands) of units have been dropped into a selected area, for example,by air or distributed by other means, local or indigenous individualswho are privy to information that they would otherwise not be safe todisclose under present means, such as by contacting USA soldiers, mayprovide critical location information directly or by way of anassociate, avoiding known contact with any of the dropped cellular orother communications units.

Preferably, wide publicity of the units, the units' distribution, andcorresponding rewards/incentives, and related issues by news and othermedia outlets is preferred. Once the units are dropped they have noconfidential aspects anyway. Any individual who is being tracked (orhis/her associates) has no ability to knowingly police whether a tensecond even has occurred on any of the units. An informant simply opensthe cover of a unit, provides the critical, timely information forapprehension, and disposes of the unit. The likelihood of the wantedindividual becoming aware of informant is relatively low.

Referring now to FIG. 1, specifically configured cellular units 106 areprovided housed in a weather protective housing and include a kit ofmaterials 104 such as power cord to preclude empty battery issues, etc.,and are dropped by air with internal parachute 109 deployingoperability. The kit of materials 104 are preferably dropped within aforeign country (e.g., Pakistan or Afghanistan), and the kit ofmaterials 104 land selectively at random over a selected area. Oneskilled in the art will recognize that air dropping may not be thedeployment means of multiple such units however.

With potentially extremely easy usage, the “finder” of the unit isbeckoned, selectively by writing or other “visible” aspects on the unit106 or the unit's housing for example, to open the unit to learn aboutthe incentive 120 and anonymous, danger free option to collectinformation.

In one embodiment, a combination of literally visible type and/or imageon the unit, audio messages potentially playing automatically on asensed approach of an individual, (optional operability of the units forexample,) function to reduce fear and lure the potential user to freethe unit from the housing, (in an embodiment where this is not doneautomatically) and then to activate the unit, which in the preferredconfiguration is performed by lifting a familiar cell phone “cover” ormaking contact with the unit. All operations preferably designed toovercome the language and cultural barriers with the goal of getting theoperating instructions from the unit, including the incentive 120 andprocedure to provide information and receive such an incentive 120without danger, or with minimized risk, to the provider who has beenlikely intimidated from attempting such information providing, even ifaware of an incentive 120, due to the risk from potentially visiblecontact with others.

Once activated, in this configuration with an audio message and visualcues activated on a screen on the kit of materials 104 once anindividual opens a plastic protective “zip lock” bag containment aspect,108, the unit makes immediate contact with closed cellular networkreceiving station(s) 116, and identifies itself in a fashion similar toother known cellular units. In a preferred embodiment, a simple code orwith a number that links to codes visible or provided to a user simply,by the unit during use. By code, a simple “three letter” sequence in thenative language where such units may be dropped, is a good example ofthe simple memory based anonymous incentive system.

Preferably, the units 106 are provided without controls, such asbuttons, for simplicity, and are provided with recorded information forthe user to hear and see, on screen for example, and to avoid a receivedbroadcast being necessary to provide information creating a necessityfor clear transmission to the units, as opposed to transmission simplyfrom the units 106. Unit 106 guides the user quickly and simply throughthe process of leaving a recorded message. Selectively, preferably radiocontact is imperfect, the unit itself may record the message andcontinue to work automatically to get the message to home base recordingand computing component 118, to allow even weak radio contact to providemeans for such a unit to over time get the information it records to thereception station 116 for storage and review by personnel.

The safety aspect of the invention is provided in potential instructionsrelated to a message provided, to distance his or herself from the unitonce their message is complete. That they further need not leave nameand personal information unless they choose, and that under nocircumstances should they attempt contact with the indicated receiver,for example, the U.S. government, until the person they have disclosedinformation regarding has been apprehended and they perceive thesituation as resolved and as safe as possible.

In one embodiment, after recording a message, the user replaces the unitin its protective bag 108 and, thereafter, buries the unit or hides itwell, for future re-discovery and use. In this way, the actual codedunit having provided useful information will identify itself, the userwill be guided through the process of providing information for thereceiver to safely contact this information provider toward providingthe incentive, 120.

In instances where this is not possible, such a program might allowvirtually any representative, e.g., of the U.S. government who isbriefed of the possibility to be aware that (s)he might be contacted byinformation provider(s) who are due rewards. Thus, such personnel are apart of the system/method, aware of who and how to connect theinformation provider with those able to identify him/her by the threedigit code. As a further measure of security, the system/method may askthe information provider for a nickname provided by the unit 8 in amessage, which the informant remembers. The informant is then instructednever to disclose the three digit code until the informant is in contactwith a representative of the government (or other receiver) who confirmsthat they are the correct contact, by referring to the provider by thatnick-name.

Herein are aspects of the system to avoid theft of a code and incentiveor disclosure of information to hostile parties acting as the correctindividuals for providing incentive. In this modern age, such a providerwould likely understand that re-contacting after the risk aspects havereduced, (for example after capture of a subject individual,) wouldunderstand that if the phone unit itself cannot be used again, relocatedetc., That internet, phone and direct contact with certain visibleindividuals or agencies, would all be options toward collecting theincentive.

Thus, a direct link to information collecting personnel is made betweenintimidated individuals, typically, who may have, or may know others whohave, potentially critical information. Even thirty seconds of discreetcontact with a unit, and then permanent distancing from that unit, mayresult in an individual safely disclosing the critical information for“capture” or other contact purpose and leave that individual with the(unwritten preferably) record for their reward, in the form of a simplememorable code, keyword, number or other aspect comprehensible to themin their own native tongue.

The arrows in FIG. 1 illustrate a sequence of events that may occur inaccordance with a preferred embodiment of the invention. For example kitof materials 104 are air dropped, units 106 are used to communicateinformation to stations 116, and incentive 120 is provided, accordingly.

Thus, in accordance with the teachings herein, the present inventionprovides a simple, safe and relatively inexpensive way for informants todisclose information and receive incentives, such as rewards, therefore.Although the present invention has been described in relation toparticular embodiments thereof, many other variations and modificationsand other uses will become apparent to those skilled in the art. Forexample, information disclosed in accordance with the teachings hereinis not limited to apprehending wanted individuals. Any desiredinformation for achieving an objective may be solicited, and theincentive is provided only in response to the objective being met. Forexample, whistle blowers in a corporate environment can anonymously andsafely report wrongdoing without fear of repercussion.

It is preferred, therefore, that the present invention be limited not bythe specific disclosure herein.

1. A method for providing an incentive in exchange for anonymouslyprovided information from a user, the method comprising: receiving fromat least one of a plurality of broadcasting units via a respectivetransmitter, the anonymously provided information via a dedicatedbroadcast reception component including a computing device that isconfigured to interface with the broadcasting unit, wherein theplurality of broadcasting units are each configured with the respectivetransmitter and configured to receive and transmit information from theuser, and further wherein the plurality of broadcasting units areconfigured to communicate over a communication network; receiving, fromthe at least one of the plurality of broadcasting units, informationrepresenting at least one physical characteristic of the user, whereinthe at least one physical characteristic identifies the user; matchingthe information representing the at least one physical characteristic ofthe user with the anonymously provided information; and authorizing theincentive to be provided to the user or a third party associated withthe user in exchange for the anonymously provided information.
 2. Themethod of claim 1, further comprising receiving, from the at least oneof the plurality of broadcasting units, information representing one ormore of the user's voice, eye, nose, face, breath, fingerprint and hair.3. The method of claim 1, further comprising receiving, from the atleast one of the plurality of broadcasting units, informationrepresenting.
 4. The method of claim 1, wherein the broadcasting unit isfurther configured to self-destruct after the anonymously providedinformation and the information representing the at least one physicalcharacteristic of the user are received.
 5. The method of claim 1,wherein the at least one of the broadcasting units is further configuredwith an air management component for being deployed by air.
 6. Themethod of claim 1, wherein the at least one of the broadcasting units isfurther configured with an air management component that includes anairbag.
 7. The method of claim 1, wherein the at least one of thebroadcasting units is further configured with an image capturecomponent.
 8. The method of claim 1, wherein the at least one of thebroadcasting units is further configured with an image capture componentconfigured to record at least one image.
 9. The method of claim 1,wherein at least one of the plurality of broadcasting units isconfigured as a cellular telephone.
 10. A method for providing anincentive in exchange for anonymously provided information from a user,the method comprising: providing a plurality of broadcasting units thatare each configured with a respective transmitter and configured toreceive and transmit information from the user, wherein the plurality ofbroadcasting units are configured to communicate over a communicationnetwork; receiving from the at least one of the plurality ofbroadcasting units via the respective transmitter, the anonymouslyprovided information via a dedicated broadcast reception componentincluding a computing device that is configured to interface with thebroadcasting unit; receiving, from the at least one of the plurality ofbroadcasting units, unique identification information related to theanonymously provided information; matching the information representingthe anonymously provided information with the unique identificationinformation to identify the user or a third party associated with theuser; and confirming that incentive related criteria has been met by theuser or the third party associated with the user relative to theanonymously provided information.
 11. The method of claim 10, furthercomprising calling at least a plurality of the plurality of broadcastingunits, and further wherein the anonymously received information and theunique identification information are received as a function of thecalling.
 12. The method of claim 10, wherein at least one of theplurality of broadcasting units is configured as a cellular telephone.13. The method of claim 10, further comprising receiving, from the atleast one of the plurality of broadcasting units, a code.
 14. A methodfor providing an incentive in exchange for anonymously providedinformation from at least one user, the method comprising: receivingfrom at least one of a plurality of broadcasting units via a respectivetransmitter, the anonymously provided information via a dedicatedbroadcast reception component including a computing device that isconfigured to interface with the broadcasting unit, wherein theplurality of broadcasting units are each configured with the respectivetransmitter and configured to receive and transmit information from atleast one user, and further wherein the plurality of broadcasting unitsare configured to communicate over a communication network; receiving,from the at least one of the plurality of broadcasting units,information representing at least one identification characteristic ofthe user, wherein the at least one identification characteristicidentifies the user; matching the information representing the at leastone identification characteristic of the user with the anonymouslyprovided information; and authorizing the incentive to be provided tothe user or a third party associated with the user in exchange for theanonymously provided information.
 15. The method of claim 14, whereinthe communication network is configured to be at least partiallypositioned on aircraft.
 16. The method of claim 14, wherein thecommunication network is configured to communicate intermittently. 17.The method of claim 14, wherein the communication network is configuredto include repositionable components providing network communication toat least one of said broadcast units that was not within communicationwith the network in a previous position.
 18. The method of claim 17,wherein the communication network is configured to includerepositionable components configured to provide a variable networkcoverage area relative to said broadcast units configured and operableto change coverage at least every 24 hours.