Third party monitoring of activity within a monitoring platform

ABSTRACT

The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 15/611,598, filed Jun. 1, 2017, which claims the benefit ofU.S. Provisional Patent Appl. No. 62/508,106, filed May 18, 2017, eachof which is incorporated herein by reference in its entirety.

BACKGROUND Related Art

Correctional facilities provide inmates with the ability to communicatewith friends, families, and visitors as it improves recidivism andprovides incentives for inmates to follow rules and policies of thefacility. In addition to traditional telephone calls and telephonevisitations, correctional facilities seek to offer a wide variety ofcommunication services to inmates, such as video visitation and videocalls, among others. However, as the amount of communication optionsavailable to inmates increases, an increased amount of monitoring isrequired for these communications.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

Embodiments of the disclosure are described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears. In the accompanying drawings:

FIG. 1 illustrates an exemplary monitoring platform according to anexemplary embodiment of the present disclosure;

FIG. 2 illustrates an exemplary monitoring center of the exemplarymonitoring platform according to an exemplary embodiment of the presentdisclosure;

FIG. 3 is a flowchart of exemplary operational steps for the exemplaryoperation center according to an embodiment of the present disclosure;and

FIG. 4 illustrates a block diagram of an exemplary computer system forimplementing the exemplary design environment according to an exemplaryembodiment of the present disclosure.

The disclosure will now be described with reference to the accompanyingdrawings. In the drawings, like reference numbers generally indicateidentical, functionally similar, and/or structurally similar elements.The drawing in which an element first appears is indicated by theleftmost digit(s) in the reference number.

DETAILED DESCRIPTION OF THE DISCLOSURE

Overview

The present disclosure describes a monitoring environment that monitorsan activity for activity that may be indicative of being prohibited bythe local, the state, and/or the national governing authorities, namelysuspicious activity, or activity that is prohibited by the local, thestate, and/or the national governing authorities, namely prohibitedactivity. The monitoring environment verifies the activity is actuallybeing monitored within the monitoring environment. The verification canrequire one or more monitoring persons monitoring the activity toperform one or more tasks to verify their attentiveness in monitoringthe activity. The one or more tasks can be as simple as activating acheckbox or providing a code or an electronic signature to provide someexamples, although more complicated tasks, such as a biometricverification such as a retinal, a facial, and/or a voice verification toprovide some examples, are possible as will be recognized by thoseskilled in the relevant art(s) without departing from the spirit andscope of the present disclosure.

Exemplary Monitoring Platform

FIG. 1 illustrates an exemplary monitoring platform according to anexemplary embodiment of the present disclosure. As illustrated in FIG.1, a monitoring environment 100 monitors an activity for activity thatmay be indicative of being prohibited by the local, the state, and/orthe national governing authorities, namely suspicious activity, oractivity that is prohibited by the local, the state, and/or the nationalgoverning authorities, namely prohibited activity. Moreover, themonitoring environment 100 verifies the activity is actually beingmonitored within the monitoring environment 100. In the exemplaryembodiment illustrated in FIG. 1, the monitoring environment 100includes a controlled environment 102, an uncontrolled environment 104,and a monitoring platform 106 that are communicatively coupled to eachother via a communication network 108. Although the controlledenvironment 102 is to be described in terms of an institutionalenvironment, such as a local, a state, and/or a national prison,correctional facility, detention center, jail, penitentiary or remandcenter to provide some examples, those skilled in the relevant art(s)will recognize that the teachings described herein are equallyapplicable to any other suitable environment that is prescribed by thelocal, the state, and/or the national governing authorities withoutdeparting from a spirit and scope of the present disclosure. This othersuitable environment can include a military environment, a hospitalenvironment, an educational environment, a business environment, or agovernmental environment to provide some examples.

The controlled environment 102 can be characterized as including one ormore access restriction controls to control access to the controlledenvironment 102, access from the controlled environment 102, and/oraccess within the controlled environment 102. For example, the one ormore access restriction controls can restrict entry by the generalpublic into the controlled environment 102, can restrict those withinthe controlled environment 102 from leaving the controlled environment102, and/or can restrict activity of those within the controlledenvironment 102. In some situations, the access restriction controls canbe prescribed by the local, the state, and/or the national governingauthorities.

As illustrated in FIG. 1, the controlled environment 102 can include oneor more insider persons 110. The one or more insider persons 110 caninclude one or more persons occupying the controlled environment 102,such as one or more prisoners, inmates, or detainees to provide someexamples, and/or one or more persons needed for operation of thecontrolled environment 102, such as one or more prison officers,corrections officers, correctional officers, detention officers, orpenal officers to provide some examples. In some situations, the one ormore insider persons 110 can access one or more insider communicationdevices 112 such as one or more mobile telephony devices, such as one ormore mobile phones, one or more mobile computing devices; one or moremobile internet devices, such as one or more tablet computers and/or oneor more laptop computers; one or more personal digital assistants; oneor more handheld game consoles; one or more portable media players; oneor more digital cameras; one or more pagers; one or more personalnavigation devices; and/or other suitable communication devices that arecapable of communication within the monitoring environment 100 that willbe apparent to those skilled in the relevant art(s) without departingfrom the spirit and scope of the present disclosure. These othersuitable communication devices can include one or more wiredcommunication devices, such as one or more telephones, and/or one ormore personal computing devices to provide some examples. In thesesituations, the one or more insider persons 110 can utilize the one ormore insider communication devices 112 for communication, such as audiocommunication, video communication, and/or data communication to providesome examples, within the controlled environment 102 and/or between thecontrolled environment 102 and the uncontrolled environment 104.

Preferably, the uncontrolled environment 104 is situated in a locationthat is remote from the controlled environment 102, namely outside ofthe controlled environment 102, such that the uncontrolled environment104 does not include the one or more access restriction controls of thecontrolled environment 102. For example, the general public is free toenter and/or to exit the uncontrolled environment 104 without beingsubject to the one or more access restriction controls of the controlledenvironment 102. However, those skilled in the relevant art(s) willrecognize that the uncontrolled environment 104 can include other accessrestriction controls that can be prescribed by the local, the state,and/or the national governing authorities without departing from thespirit and scope of the present disclosure.

As additionally illustrated in FIG. 1, the uncontrolled environment 104can include one or more outsider persons 114. In some situations, theone or more outsider persons 114 have access to one or more outsidercommunication devices 116 such as one or more mobile telephony devices,such as one or more mobile phones, one or more mobile computing devices,one or more mobile internet devices, such as one or more tabletcomputers and/or one or more laptop computers, one or more personaldigital assistants, one or more handheld game consoles, one or moreportable media players, one or more digital cameras, one or more pagers,one or more personal navigation devices, and/or other suitablecommunication devices that are capable of communication within themonitoring environment 100 that will be apparent to those skilled in therelevant art(s) without departing from the spirit and scope of thepresent disclosure. These other suitable communication devices caninclude one or more wired communication devices, such as one or moretelephones, and/or one or more personal computing devices to providesome examples. In these situations, the one or more outsider persons 114can utilize the one or more outsider communication devices 116 forcommunication, such as audio communication, video communication, and/ordata communication to provide some examples, between the controlledenvironment 102 and the uncontrolled environment 104.

The monitoring platform 106 can operate in a monitor mode of operationor in a verification mode of operation. In an exemplary embodiment, themonitoring platform 106 can simultaneously operate in the monitor modeof operation or in the verification mode of operation; however, in somesituations, the monitoring platform 106 can operate in the monitor modeof operation or in the verification mode of operation and can switchbetween the monitor mode of operation and the verification mode ofoperation when appropriate. In the monitoring mode of operation, themonitoring platform 106 monitors the activity within the monitoringenvironment 100. In the exemplary embodiment as illustrated in FIG. 1,the monitoring platform 106 is situated in a location that is remotefrom the controlled environment 102 and the uncontrolled environment104, namely outside of the controlled environment 102 and theuncontrolled environment 104. However, in some situations, themonitoring platform 106 can be integrated within the controlledenvironment 102 or the uncontrolled environment 104.

In the monitoring mode of operation, the monitoring platform 106monitors the activity within the monitoring environment 100 as it occursin real-time, or near-time, or the activity within the monitoringenvironment 100 can be stored and monitored by the monitoring platform106 after its occurrence. In an exemplary embodiment, the monitoringplatform 106 can monitor less than all of the activity within themonitoring environment 100. In this exemplary embodiment, the specificnumber of activities to be monitored, for example a percentage of theactivity within the monitoring environment 100, can be prescribed by thelocal, the state, and/or the national governing authorities or acontract between the monitoring platform 106 and the local, the state,and/or the national governing authorities can specify the specificnumber of activities. In this exemplary embodiment, the monitoringplatform 106 can measure the specific number of activities monitoredand/or verified to be monitored by the monitoring platform 106 to ensurethe monitoring platform 106 is performing in accordance with regulationsof the local, the state, and/or the national governing authoritiesand/or the contract between the monitoring platform 106 and the local,the state, and/or the national governing authorities. In somesituations, payment to the monitoring platform 106 for monitoring theactivity within the monitoring environment 100 can be based upon whetherthe monitoring platform 106 is performing in accordance with theregulations by the local, the state, and/or the national governingauthorities and/or the contract between the monitoring platform 106 andthe local, the state, and/or the national governing authorities.

Generally, the activity can include activity within the controlledenvironment 102 and/or activity between the controlled environment 102and the uncontrolled environment 104. In an exemplary embodiment, theactivity within the controlled environment 102 can includecommunication-related activity which relates to communication, such asaudio communication, video communication, and/or data communication toprovide some examples, among the one or more insider persons 110 withinthe controlled environment 102. This communication-related activity caninclude incoming telephone calls to the controlled environment 102,calls from informants to the controlled environment 102, inmate toinmate calling within the controlled environment 102, inmate to inmateelectronic message relay within the controlled environment 102,electronic messaging, text messaging, video conferencing, or otherreal-time communication within the controlled environment 102, voicemailmessaging, or other non-real-time communication, within the controlledenvironment 102, visitation within the controlled environment 102,teletypewriter (TTY), or other types of signaling, within the controlledenvironment 102, Internet browsing within the controlled environment102, pre-incarceration communication within the controlled environment102, post-incarceration communication within the controlled environment102, chatbot interaction within the controlled environment 102,non-scheduled video communication within the controlled environment 102,covert audio and/or video communication within the controlledenvironment 102, and/or transcriptions of communication within thecontrolled environment 102 to provide some examples.

In another exemplary embodiment, the activity within the controlledenvironment 102 can additionally, or alternatively, includenon-communication activity which typically involves observation of theone or more insider persons 110 within the controlled environment 102.For example, the non-communication activity within the controlledenvironment 102 can include movement of the one or more insider persons110 within the controlled environment 102. In this example, thecontrolled environment 102 can include one or more security cameras toview and/or to record the movement of the one or more insider persons110 within the controlled environment 102. Other non-communicationactivity within the controlled environment 102 that can be monitored bythe monitoring platform 106 can include visitations between the one ormore insider persons 110 and the one or more outsider persons 114occurring within the controlled environment 102, exercising activity ofthe one or more insider persons 110 within the controlled environment102, leisure time activity of the one or more insider persons 110 withinthe controlled environment 102, mealtime activity of the one or moreinsider persons 110 within the controlled environment 102, educationalactivity of the one or more insider persons 110 within the controlledenvironment 102, and/or employment activity of the one or more insiderpersons 110 within the controlled environment 102.

In a further exemplary embodiment, the activity between the controlledenvironment 102 and the uncontrolled environment 104 can further, oralternatively, include communication-related activity which relates tocommunication, such as audio communication, video communication, and/ordata communication to provide some examples, between the one or moreinsider persons 110 and the one or more outsider persons 114. Thiscommunication-related activity can include telephone calls between thecontrolled environment 102 and the uncontrolled environment 104,electronic messaging, text messaging, video conferencing, or otherreal-time communication between the controlled environment 102 and theuncontrolled environment 104, voicemail messaging, or othernon-real-time communication, between the controlled environment 102 andthe uncontrolled environment 104, teletypewriter (TTY), or other typesof signaling, between the controlled environment 102 and theuncontrolled environment 104, non-scheduled video communication betweenthe controlled environment 102 and the uncontrolled environment, covertaudio and/or video communication between the controlled environment 102and the uncontrolled environment 104, and/or transcriptions ofcommunication between the controlled environment 102 and theuncontrolled environment 104 to provide some examples.

As additionally illustrated in FIG. 1, the monitoring platform 106 canbe utilized by one or more monitoring persons 118 to monitor theactivity within the monitoring environment 100. Generally, the one ormore monitoring persons 118 review the activity for the presence of thesuspicious activity and/or the prohibited activity. Typically, the oneor more monitoring persons 118 generate one or more warning alerts, suchas an annotation, a flag, a bookmark, an audible alert, and/or a videoalert to provide some examples, when the suspicious activity and/or theprohibited activity is present within the activity within the monitoringenvironment 100. The simplest warning alerts can include one or moreannotations of the suspicious activity and/or the prohibited activity,although warning alerts of much greater complexity can be used, suchnotifying the local, the state, and/or the national governingauthorities of the suspicious activity and/or the prohibited activity toprovide an example, without departing from the spirit and scope of thepresent disclosure. In some situations, the generating of the one ormore warning alerts can affect the activity within the monitoringenvironment 100. For example, communication between the one or moreinsider persons 110 and the one or more outsider persons 114 can beinterrupted and/or disconnected upon the one or more monitoring persons118 generating the one or more warning alerts. In an exemplaryembodiment, the monitoring platform 106 can store a listing of warningalerts indexed to various actions to be performed by the monitoringplatform 106. In this exemplary embodiment, the monitoring platform 106can proceed with the action, such as annotating the suspicious activityand/or the prohibited activity, interrupting and/or disconnecting thecommunication between the one or more insider persons 110 and the one ormore outsider persons 114, and/or notifying the local, the state, and/orthe national governing authorities of the suspicious activity and/or theprohibited activity to provide some examples, corresponding with the oneor more warning alerts as prescribed in the listing of warning alerts.

In the verification mode of operation, the monitoring platform 106verifies the one or more monitoring persons 118 are monitoring theactivity within the monitoring environment 100. The monitoring platform106 determines whether the one or more monitoring persons 118 areattentive and reviewing the activity. For example, when the one or morewarning alerts are generated by the one or more monitoring persons 118within a predetermined amount of time, such as once every minute, onceevery couple of minutes, once every hour, or once every couple of hoursto provide some examples, the monitoring platform 106 presumes the oneor more monitoring persons 118 are attentive and reviewing the activity.However, in some situations, no warning alerts may be generated by theone or more monitoring persons 118 when reviewing the activity withinthe predetermined amount of time. In these situations, the monitoringplatform 106 can require the one or more monitoring persons 118 toperform one or more tasks to verify the one or more monitoring persons118 are attentive and reviewing the activity. The one or more tasks canbe as simple as activating a checkbox, entering a response to aquestion, or providing a code or an electronic signature to provide someexamples, although more complicated tasks, such as a biometricverification such as a retinal, a facial, and/or a voice verification toprovide some examples, are possible as will be recognized by thoseskilled in the relevant art(s) without departing from the spirit andscope of the present disclosure. In some situations, one or morepop-windows or dialog boxes can appear to the one or more monitoringpersons 118 notifying the one or more monitoring persons 118 to performthe one or more tasks and/or entering information requested by one ormore tasks to be performed by the monitoring persons 118 during theverification mode of operation.

The communication network 108 includes one or more wirelesscommunication networks and/or one or more wired communication networksfor communicatively coupling the controlled environment 102, theuncontrolled environment 104, and the monitoring platform 106. The oneor more wireless communication networks can include one or more cellularphone networks, wireless local area networks (WLANs), wireless sensornetworks, satellite communication networks, terrestrial microwavenetworks, and/or other suitable networks that transmit data over awireless-based communication technology that will be apparent to thoseskilled in the relevant art(s) without departing from the spirit andscope of the present disclosure. The one or more wired communicationnetworks include one or more telephone networks, cable televisionnetworks, internet access networks, fiber-optic communication networksand/or other suitable networks that transmit data over a wire-basedcommunication technology that will be apparent to those skilled in therelevant art(s) without departing from the spirit and scope of thepresent disclosure.

Exemplary Monitoring Center of the Exemplary Monitoring Platform

FIG. 2 illustrates an exemplary monitoring center of the exemplarymonitoring platform according to an exemplary embodiment of the presentdisclosure. A monitoring center 200 monitors the activity, as describedabove in FIG. 1, for the presence of the suspicious activity and/or theprohibited activity. Moreover, the monitoring center 200 verifies theactivity is actually being monitored within the monitoring center 200.In the exemplary embodiment illustrated in FIG. 2, the monitoring center200 includes a monitoring server 202, a monitoring storage 204,monitoring stations 206.1 through 206.n, and an administrative station208 that are communicatively coupled to each other via a communicationnetwork 210. The monitoring center 200 can represent an exemplaryembodiment of the monitoring platform 106.

Generally, the monitoring server 202 controls distribution of text,audio, and/or video information relating to the activity and/orscheduling of the monitoring stations 206.1 through 206.n, theadministrative station 208, monitoring persons 212.1 through 212.nassociated with the monitoring stations 206.1 through 206.n, and/or anadministrative person 214 associated with the administrative station 208to monitor the text, the audio, and/or the video information. In theexemplary embodiment illustrated in FIG. 2, the monitoring server 202receives the text, the audio, and/or the video information. In somesituations, the text, the audio, and/or the video information caninclude metadata describing the activity. This metadata can include theidentification of persons within the activity and/or the date, the time,the duration, and/or the location of the activity to provide someexamples. In an exemplary embodiment, this metadata can include a uniqueidentifier for the text, the audio, and/or the video informationcorresponding to the activity to allow the activity to be easily trackedthroughout the monitoring center 200.

The monitoring server 202 schedules the monitoring stations 206.1through 206.n, the administrative station 208, the monitoring persons212.1 through 212.n, and/or the administrative person 214 to review thetext, the audio, and/or the video information. For example, themonitoring server 202 schedules the monitoring stations 206.1 through206.n, the administrative station 208, the monitoring persons 212.1through 212.n, and/or the administrative person 214 to review the text,the audio, and/or the video information in a round-robin manner.Typically, the round-robin manner sequentially cycles through themonitoring stations 206.1 through 206.n, the administrative station 208,the monitoring persons 212.1 through 212.n, and/or the administrativeperson 214 one after another; however, those skilled in the relevantart(s) will recognize that the round-robin manner may cycle through themonitoring stations 206.1 through 206.n, the administrative station 208,the monitoring persons 212.1 through 212.n, and/or the administrativeperson 214 in any suitable order without departing from the spirit andscope of the present disclosure.

As another example, the monitoring server 202 schedules the monitoringstations 206.1 through 206.n, the administrative station 208, themonitoring persons 212.1 through 212.n, and/or the administrative person214 to review the text, the audio, and/or the video information basedupon abilities of the monitoring stations 206.1 through 206.n, theadministrative station 208, the monitoring persons 212.1 through 212.n,and/or the administrative person 214. In an exemplary embodiment, theabilities of the monitoring persons 212.1 through 212.n, and/or theadministrative person 214 can be stored by the monitoring server 202 inone or more monitoring profiles which can be maintained by theadministrative station 208. In this exemplary embodiment, the one ormore monitoring profiles can also include the type of information, suchas the text, the audio, and/or the video information, that themonitoring persons 212.1 through 212.n, and/or the administrative person214 is permitted and/or certified to review. In this example, themonitoring server 202 can schedule one or more monitoring persons fromamong the monitoring persons 212.1 through 212.n and/or theadministrative person 214 familiar with a particular language and/orcustom when the text, the audio, and/or the video information can becharacterized as being in the particular language and/or custom.Otherwise, or additionally, in this example, the monitoring server 202can schedule the monitoring persons 212.1 through 212.n and/or theadministrative person 214 based on scores or grades, which are to bedescribed in further detail below, of the monitoring persons 212.1through 212.n and/or the administrative person 214. In an exemplaryembodiment, those monitoring persons from among the monitoring persons212.1 through 212.n having higher scores or grades can be scheduled moreoften than those monitoring persons from among the monitoring persons212.1 through 212.n having lower scores or grades. As a further example,the monitoring server 202 can schedule the monitoring stations 206.1through 206.n, the administrative station 208, the monitoring persons212.1 through 212.n, and/or the administrative person 214 basedworkloads of the monitoring stations 206.1 through 206.n, theadministrative station 208, the monitoring persons 212.1 through 212.n,and/or the administrative person 214. In another exemplary embodiment,those monitoring stations and/or persons having higher workloads, forexample, scheduled more frequently, can be scheduled less often thanthose monitoring stations and/or persons having lower workloads. In somesituations, the monitoring server 202 can use a priority basedscheduling when scheduling the monitoring stations 206.1 through 206.n,the administrative station 208, the monitoring persons 212.1 through212.n, and/or the administrative person 214 to review the text, theaudio, and/or the video information. In these situations, the monitoringserver 202 schedules higher priority activity, such as real-timeactivity like electronic or text messages to provide some examples, tobe reviewed sooner than lower priority activity such as non-real-timeactivity like voicemail messages to provide some examples.

In some situations, the monitoring server 202 can process the text, theaudio, and/or the video information for automated review. In thesesituations, the monitoring server 202 automatically reviews the text,the audio, and/or the video information for the presence of thesuspicious activity and/or the prohibited activity, such as callforwarding, three way calling, and/or dialing during communication toprovide some examples, as described above in FIG. 1. Typically, themonitoring server 202 generates one or more automatic warning alerts,such as an annotation, a flag, a bookmark, an audible alert, and/or avideo alert to provide some examples, when the text, the audio, and/orthe video information include the suspicious activity and/or theprohibited activity as described above in FIG. 1. In an exemplaryembodiment, the monitoring server 202 provides an indication to themonitoring stations 206.1 through 206.n, the administrative station 208,the monitoring persons 212.1 through 212.n, and/or the administrativeperson 214 when the monitoring server 202 generates the one or moreautomatic warning alerts. In another exemplary embodiment, themonitoring server 202 can send the text, the audio, and/or the video andthe one or more automatic warning alerts, if generated, to themonitoring storage 204. In this other exemplary embodiment, themonitoring server 202 can time-stamp the one or more automatic warningalerts to correspond with the text, the audio, and/or the videoinformation to allow the text, the audio, and/or the video informationthat caused the one or more automatic warning alerts to be easilyreviewed at a later time.

In some situations, the monitoring server 202 converts the text, theaudio, and/or the video information, into a format that is suitable formonitoring by the monitoring stations 206.1 through 206.n and/or theadministrative station 208. For example, the monitoring server 202 cantranscribe the text, the audio, and/or the video information into othertext, audio, and/or video information that is suitable for monitoring bythe monitoring stations 206.1 through 206.n and/or the administrativestation 208. As an example of this transcription, the monitoring server202 can transcribe audio information corresponding to an audiocommunication and/or video information corresponding to a videocommunication into text information. In this example, the transcriptionof the audio information and/or the video information into the textinformation allows the monitoring server 202 to automatically search thetext information for one or more key words and/or key phrases from amonga dictionary of key words and/or key phrases and to generate the one ormore automatic warning alerts when the text information includes the oneor more key words and/or key phrases.

In some situations, the monitoring server 202 can compress, decompress,encrypt and/or decrypt the text, the audio, and/or the video informationin accordance with one or more compression algorithms and/or one or moreencryption algorithms. The one or more compression algorithms caninclude any suitable lossless data compression algorithm and/or anysuitable lossy data compression algorithm that will be apparent to thoseskilled in the relevant art(s) without departing from the spirit andscope of the present disclosure. The one or more encryption algorithmscan include any suitable symmetric key algorithm, any suitable privatekey algorithm and/or any suitable public key algorithm that will beapparent to those skilled in the relevant art(s) without departing fromthe spirit and scope of the present disclosure.

The monitoring storage 204 stores the text, the audio, and/or the videoinformation for review by the monitoring stations 206.1 through 206.n aswell as other data as to be described in further detail below. Themonitoring storage 204 can include a read only memory (ROM), arandom-access memory (RAM), a magnetic disk storage medium, asolid-state storage medium, an optical storage media, and/or a flashmemory device to provide some examples for storing the text, the audio,and/or the video information.

The monitoring stations 206.1 through 206.n can operate in the monitormode of operation or in the verification mode of operation as describedabove in FIG. 1. Each of the monitoring stations 206.1 through 206.n canbe implemented as a mobile communication device such as a smartphone toprovide an example, a desktop computer, a tablet computer, a personaldigital assistant (PDA), or any other suitable electronic device capableof performing the functions of the monitoring stations 206.1 through206.n as described herein that will be apparent to those skilled in therelevant art(s) without departing from the spirit and scope of thepresent disclosure. In the monitoring mode of operation, the monitoringstations 206.1 through 206.n retrieves the text, the audio, and/or thevideo information from the monitoring storage 204. However, in somesituations, the monitoring stations 206.1 through 206.n can retrieve thetext, the audio, and/or the video information from the monitoring server202. For example, the text, the audio, and/or the video information forhigher priority activity, such as real-time activity like electronic ortext messages to provide some examples, can be retrieved from themonitoring server 202, as opposed to the text, the audio, and/or thevideo information for lower priority activity such as non-real-timeactivity like voicemail messages to provide some examples, which can beretrieved from the monitoring storage 204. In an exemplary embodiment,each of the monitoring stations 206.1 through 206.n can receive amonitoring schedule from the monitoring server 202 which includes alisting of the text, the audio, and/or the video information that themonitoring stations 206.1 through 206.n and/or the monitoring persons212.1 through 212.n are scheduled to review. In this exemplaryembodiment, the monitoring stations 206.1 through 206.n retrieve thetext, the audio, and/or the video information that the monitoringstations 206.1 through 206.n and/or the monitoring persons 212.1 through212.n are scheduled to review in accordance with the monitoringschedule.

Thereafter, the monitoring stations 206.1 through 206.n process thetext, the audio, and/or the video information for review by themonitoring persons 212.1 through 212.n. Generally, the monitoringpersons 212.1 through 212.n review the text, the audio, and/or the videoinformation that they are scheduled to review for the presence of thesuspicious activity and/or the prohibited activity as described above inFIG. 1. In an exemplary embodiment, the monitoring stations 206.1through 206.n authenticate credentials, such as a username, a password,and/or an authentication code to provide some examples of the monitoringpersons 212.1 through 212.n, before the monitoring persons 212.1 through212.n can access the monitoring stations 206.1 through 206.n to reviewthe text, the audio, and/or the video information that they arescheduled to review. In another exemplary, the monitoring stations 206.1through 206.n and/or the administrative station 208 can track review thetext, the audio, and/or the video information by the monitoring persons212.1 through 212.n. For example, the monitoring stations 206.1 through206.n and/or the administrative station 208 can track portions the text,the audio, and/or the video information that have been reviewed by themonitoring persons 212.1 through 212.n and/or yet to be reviewed by themonitoring persons 212.1 through 212.n. Also, in this example, the themonitoring stations 206.1 through 206.n and/or the administrativestation 208 can track which reviewer from among the monitoring persons212.1 through 212.n has reviewed the text, the audio, and/or the videoinformation. Typically, the monitoring persons 212.1 through 212.ngenerate one or more manual warning alerts, such as an annotation, aflag, a bookmark, an audible alert, and/or a video alert to provide someexamples, when the text, the audio, and/or the video informationincludes the suspicious activity and/or the prohibited activity asdescribed above in FIG. 1. In further exemplary embodiment, themonitoring stations 206.1 through 206.n provide an indication to themonitoring server 202 and/or the administrative station 208 when themonitoring persons 212.1 through 212.n generate the one or more manualwarning alerts. In a yet further exemplary embodiment, the monitoringstations 206.1 through 206.n can send the text, the audio, and/or thevideo and/or the one or more manual warning alerts, if generated, to themonitoring storage 204. In this yet further exemplary embodiment, themonitoring stations 206.1 through 206.n can time-stamp the one or moremanual warning alerts to correspond with the text, the audio, and/or thevideo information to allow the text, the audio, and/or the videoinformation that caused the one or more manual warning alerts to beeasily reviewed at a later time. In some situations, the monitoringstations 206.1 through 206.n review the text, the audio, and/or thevideo information having the one or more manual automatic alertsgenerated by the monitoring server 202 to verify the presence of thesuspicious activity and/or the prohibited activity within the text, theaudio, and/or the video information.

Often times, the monitoring stations 206.1 through 206.n include one ormore graphical user interfaces (GUIs) for interfacing with themonitoring persons 212.1 through 212.n. In an exemplary embodiment, themonitoring stations 206.1 through 206.n can display the text, the audio,and/or the video information using one or more graphical user interfaces(GUIs) to allow the text, the audio, and/or the video information to bemonitored by the monitoring persons 212.1 through 212.n. In thisexemplary embodiment, a first portion of the one or more GUIs includesone or more activity display areas for displaying the text, the audio,and/or the video information. This activity display area can include oneor more activity display area controls allowing the monitoring persons212.1 through 212.n to pause, stop, fast forward, rewind, and/or playthe text, the audio, and/or the video information. The activity displayarea can also include one or more metadata display areas for displayingthe metadata included within the text, the audio, and/or the videoinformation and/or other data derived from the metadata included withinthe text, the audio, and/or the video information. Additionally, oralternatively, in this exemplary embodiment, a second portion of the oneor more GUIs includes a warning alert area for generating the one ormore manual warning alerts and/or for verifying the one or moreautomatic warning alerts. Further, or in the alternative, in thisexemplary embodiment, one or more pop-windows or dialog boxes can appearto the monitoring persons 212.1 through 212.n notifying the monitoringpersons 212.1 through 212.n to perform the one or more tasks and/orentering information requested by one or more tasks to be performed bythe monitoring persons 212.1 through 212.n during the verification modeof operation as to be described in further detail below.

In the exemplary embodiment illustrated in FIG. 2, the monitoring server202, the monitoring stations 206.1 through 206.n, and/or theadministrative station 208 verifies the monitoring persons 212.1 through212.n are monitoring the text, the audio, and/or the video informationduring the verification mode of operation. The monitoring server 202,the monitoring stations 206.1 through 206.n, and/or the administrativestation 208 determines whether the monitoring persons 212.1 through212.n are attentive and reviewing the activity. For example, when theone or more manual warning alerts are generated by the monitoringpersons 212.1 through 212.n within a predetermined amount of time, suchas once every minute, once every couple of minutes, once every hour, oronce every couple of hours to provide some examples, the monitoringserver 202, the monitoring stations 206.1 through 206.n, and/or theadministrative station 208 presumes the monitoring persons 212.1 through212.n are attentive and reviewing the activity. However, in somesituations, no warning alerts may be generated by the monitoring persons212.1 through 212.n when reviewing the activity within the predeterminedamount of time. In these situations, the monitoring server 202, themonitoring stations 206.1 through 206.n, and/or the administrativestation 208 can require the monitoring persons 212.1 through 212.n toperform the one or more tasks to verify the monitoring persons 212.1through 212.n are attentive and reviewing the activity as describedabove in FIG. 1. As another example, the monitoring persons 212.1through 212.n can be required to electrically certify, for example, byelectronically signing, their monitoring of the text, the audio, and/orthe video information after their review of the text, the audio, and/orthe video information is complete. In this other example, the one ormore GUIs, as described above, can include a textual box for entry ofthe electronically signatures of the monitoring persons 212.1 through212.n. As a further example, the monitoring stations 206.1 through 206.ncan include microphones and/or video cameras for recording audio and/orvideo of the monitoring persons 212.1 through 212.n while they arereviewing the text, the audio, and/or the video information. In thisfurther example, the audio and/or the video of the monitoring persons212.1 through 212.n can be stored in the monitoring storage 204 foraccess by the administrative station 208 to verify the monitoringpersons 212.1 through 212.n are monitoring the text, the audio, and/orthe video information.

The administrative station 208 and/or the administrative person 214oversee operation of the monitoring center 200. Generally, theadministrative person 214 can be characterized as being a root user, anadministrator, an administrative user, or a supervisor user having moreprivileges than the monitoring persons 212.1 through 212.n. For example,the administrative person 214 can edit the one or more monitoringprofiles of the monitoring persons 212.1 through 212.n, edit the one ormore manual warning alerts, such as the annotation, the flag, thebookmark, the audible alert, and/or the video alert to provide someexamples, generated by the monitoring persons 212.1 through 212.n, editthe monitoring schedule from the monitoring server 202, and/or edit thescores or grades of the monitoring persons 212.1 through 212.n.

The administrative station 208 can be implemented as a mobilecommunication device such as a smartphone to provide an example, adesktop computer, a tablet computers, a personal digital assistants(PDA), or any other suitable electronic device capable of performing thefunctions of the administrative station 208 as described herein thatwill be apparent to those skilled in the relevant art(s) withoutdeparting from the spirit and scope of the present disclosure. In anexemplary embodiment, the administrative station 208 can review thetext, the audio, and/or the video information in a substantially similarmanner as the monitoring stations 206.1 through 206.n.

In some situations, the administrative station 208 and/or theadministrative person 214 receives a notification, such as a textmessage, an electronic mail message, or other electronic message,audible alert, video alert, from the monitoring stations 206.1 through206.n when the one or more manual warning alerts have generated by themonitoring persons 212.1 through 212.n indicating further review of thetext, the audio, and/or the video information. In these situations, theadministrative station 208 can retrieve the text, the audio, and/or thevideo information and the one or more manual warning alerts from thestorage monitoring storage 204.

Preferably in these situations, the administrative person 214 reviewsthe text, the audio, and/or the video information having the one or moremanual warning alerts and/or the one or more automatic alerts to verifythe presence of the suspicious activity and/or the prohibited activitywithin the text, the audio, and/or the video information. In anexemplary embodiment, the administrative station 208 authenticatescredentials, such as a username, a password, and/or an authenticationcode to provide some examples of the administrative person 214, beforethe administrative person 214 can access the administrative station 208to review the text, the audio, and/or the video information. In anotherexemplary embodiment, the administrative station 208 includes asubstantially similar GUI as the monitoring stations 206.1 through 206.nto allow the administrative person 214 to verify the suspicious activityand/or the prohibited activity within the text, the audio, and/or thevideo information. In some situations, the administrative station 208,as well as the monitoring stations 206.1 through 206.n, can affect theactivity when the presence of the suspicious activity and/or theprohibited activity within the text, the audio, and/or the videoinformation has been verified. For example, communication within themonitoring environment can be interrupted and/or disconnected uponverification of the presence of the suspicious activity and/or theprohibited activity. In an exemplary embodiment, the administrativestation 208, as well as the monitoring stations 206.1 through 206.n, canstore a listing of automatic and/or manual warning alerts which isindexed to various actions to be performed by the monitoring stations206.1 through 206.n and/or the administrative station 208. In thisexemplary embodiment, the monitoring stations 206.1 through 206.n and/orthe administrative station 208 can proceed with the action, such asannotating the suspicious activity and/or the prohibited activity,interrupting and/or disconnecting the communication within themonitoring environment, and/or notifying the local, the state, and/orthe national governing authorities of the suspicious activity and/or theprohibited activity to provide some examples, corresponding with the oneor more automatic warning alerts and/or the one or more manual warningalerts as prescribed in the listing of warning alerts.

In the exemplary embodiment illustrated in FIG. 2, the administrativestation 208 can utilize various statistical indicators to evaluateperformance of the monitoring persons 212.1 through 212.n and/or theadministrative person 214. For example, these statistical indicators caninclude the number of the one or more manual warning alerts generated bythe monitoring persons 212.1 through 212.n and/or the administrativeperson 214 over a predetermined amount of time, for example, peractivity, a day, a week, or a month, the number of the one or moremanual warning alerts generated by the monitoring persons 212.1 through212.n and/or the administrative person 214 and verified by theadministrative station 208 over a predetermined amount of time, forexample, per activity, a day, a week, or a month, the number ofactivities that have been monitored by the monitoring persons 212.1through 212.n and/or the administrative person 214 over a predeterminedamount of time, for example, a day, a week, or a month, and/or thenumber of times the monitoring persons 212.1 through 212.n and/or theadministrative person 214 have been required to perform the one or moretasks over a predetermined amount of time, for example, per activity, aday, a week, or a month. In this exemplary embodiment, theadministrative station 208 can score or grade the monitoring persons212.1 through 212.n and/or the administrative person 214 based upon thevarious statistical indicators. For example, a first monitoring personfrom among the monitoring persons 212.1 through 212.n can be scored orgrader higher than a second monitoring person from among the monitoringpersons 212.1 through 212.n when the statistical indicators indicate thefirst monitoring person is more efficient, for example, more warningalerts generated by the first monitoring person over the predeterminedamount of time, more warning alerts generated by the first monitoringperson verified by the administrative station 208 over the predeterminedamount of time, more activities have been monitored by the firstmonitoring person over the predetermined amount of time, and/or lesstasks have been required to be performed by the first monitoring person,at monitoring the activity than the second monitoring person.Additionally, the administrative station 208 can measure the specificnumber of activities monitored and/or verified to be monitored themonitoring by the monitoring persons 212.1 through 212.n and/or theadministrative person 214 to ensure the monitoring center 200 isperforming in accordance with the regulations by the local, the state,and/or the national governing authorities and/or the contract betweenthe monitoring center 200 and the local, the state, and/or the nationalgoverning authorities as described above in FIG. 1. Further, theadministrative station 208 can store a communication log indicating theactivity that has been affected by the monitoring stations 206.1 through206.n and/or the administrative station 208 for including the suspiciousactivity and/or the prohibited activity. This communication log can beindexed to the persons within the activity and/or the date, the time,the duration, and/or the location of the activity to provide someexamples to allow the text, the audio, and/or the video information tobe correlated with other text, audio, and/or video information of otheractivities by the same persons, the same date, the same time, the sameduration, and/or the same location.

The communication network 210 includes one or more wirelesscommunication networks and/or one or more wired communication networksfor communicatively coupling the monitoring server 202, the monitoringstorage 204, the monitoring stations 206.1 through 206.n, and theadministrative station 208. The one or more wireless communicationnetworks can include one or more cellular phone networks, wireless localarea networks (WLANs), wireless sensor networks, satellite communicationnetworks, terrestrial microwave networks, and/or other suitable networksthat transmit data over a wireless-based communication technology thatwill be apparent to those skilled in the relevant art(s) withoutdeparting from the spirit and scope of the present disclosure. The oneor more wired communication networks include one or more telephonenetworks, cable television networks, internet access networks,fiber-optic communication networks and/or other suitable networks thattransmit data over a wire-based communication technology that will beapparent to those skilled in the relevant art(s) without departing fromthe spirit and scope of the present disclosure.

Exemplary Operation of the Monitoring Center

FIG. 3 is a flowchart of exemplary operational steps for the exemplaryoperation center according to an embodiment of the present disclosure.The disclosure is not limited to this operational description. Rather,it will be apparent to ordinary persons skilled in the relevant art(s)that other operational control flows are within the scope and spirit ofthe present disclosure. The following discussion describes an exemplaryoperational control flow 300 for a monitoring center, such as monitoringcenter 200 to provide an example, in monitoring the text information,the audio, and/or the video information of the activity.

At step 302, the operational control flow 300 reviews text, audio,and/or video information relating to the activity for the suspiciousactivity and/or the prohibited activity. Typically, the operationalcontrol flow 300 generate one or more manual warning alerts, such as anannotation, a flag, a bookmark, an audible alert, and/or a video alertto provide some examples, when the suspicious activity and/or theprohibited activity is present within the activity. The simplest warningalerts can include one or more annotations of the suspicious activityand/or the prohibited activity, although warning alerts of much greatercomplexity can be used, such notifying the local, the state, and/or thenational governing authorities of the suspicious activity and/or theprohibited activity to provide an example, without departing from thespirit and scope of the present disclosure.

At step 304, the operational control flow 300 determines whether the oneor more manual warning alerts have been generated in step 302 within apredetermined amount of time. The operational control flow 300 proceedsto step 306 to verify a monitoring person is attentive and reviewing thetext, the audio, and/or the video information when the one or moremanual warning alerts have not been generated in step 302 within thepredetermined amount of time. Otherwise, the operational control flow300 reverts to step 302 to continue reviewing the text, the audio,and/or the video information.

At step 306, the operational control flow 300 requires the monitoringperson to perform one or more tasks to verify the monitoring person isattentive and reviewing the activity. The one or more tasks can be assimple as activating a checkbox or providing a code or an electronicsignature to provide some examples, although more complicated tasks,such as a biometric verification such as a retinal, a facial, and/or avoice verification to provide some examples, are possible as will berecognized by those skilled in the relevant art(s) without departingfrom the spirit and scope of the present disclosure.

Exemplary Computer System for Implementing the Exemplary DesignEnvironment

FIG. 4 illustrates a block diagram of an exemplary computer system forimplementing the exemplary design environment according to an exemplaryembodiment of the present disclosure. A computer system 400 can be usedto implement the monitoring server 202, the monitoring storage 204, themonitoring stations 206.1 through 206.n, and the administrative station208 as described above in FIG. 2. After reading this description, itwill become apparent to a person skilled in the relevant art how toimplement embodiments using other computer systems and/or computerarchitectures.

The computer system 400 includes one or more processors 404, alsoreferred to as central processing units, or CPUs, to execute operationsof the monitoring server 202, the monitoring storage 204, the monitoringstations 206.1 through 206.n, and the administrative station 208 asdescribed above in FIG. 2. The one or more processors 404 can beconnected to a communication infrastructure or bus 406. In an exemplaryembodiment, one or more of the one or more processors 404 can beimplemented as a graphics processing unit (GPU). The GPU represents aspecialized electronic circuit designed to rapidly processmathematically intensive applications on electronic devices. The GPU mayhave a highly parallel structure that is efficient for parallelprocessing of large blocks of data, such as mathematically intensivedata common to computer graphics applications, images and videos.

The computer system 400 also includes user input/output device(s) 403,such as monitors, keyboards, pointing devices, etc., which communicatewith communication infrastructure 406 through user input/outputinterface(s) 402.

The computer system 400 also includes a main or primary memory 408, suchas a random-access memory (RAM) to provide an example. The main memory408 can include one or more levels of cache. The main memory 408 hasstored therein control logic (i.e., computer software) and/or data, toperform operations of the monitoring server 202, the monitoring storage204, the monitoring stations 206.1 through 206.n, and the administrativestation 208 as described above in FIG. 2

The computer system 400 can also include one or more secondary storagedevices or memory 410 to store data for performing operations of themonitoring server 202, the monitoring storage 204, the monitoringstations 206.1 through 206.n, and the administrative station 208 asdescribed above in FIG. 2. The one or more secondary storage devices ormemory 410 can include, for example, a hard disk drive 412 and/or aremovable storage device or drive 414. The removable storage drive 414may be a floppy disk drive, a magnetic tape drive, a compact disk drive,an optical storage device, tape backup device, and/or any other storagedevice/drive. The removable storage drive 414 may interact with aremovable storage unit 418. The removable storage unit 418 includes acomputer usable or readable storage device having stored thereoncomputer software (control logic) and/or data. The removable storageunit 418 may be a floppy disk, magnetic tape, compact disk, DVD, opticalstorage disk, and/any other computer data storage device. The removablestorage drive 414 reads from and/or writes to removable storage unit 418in a well-known manner.

According to an exemplary embodiment, the one or more secondary storagedevices or memory 410 may include other means, instrumentalities orother approaches for allowing computer programs and/or otherinstructions and/or data to be accessed by computer system 400. Suchmeans, instrumentalities or other approaches may include, for example, aremovable storage unit 422 and an interface 420. Examples of theremovable storage unit 422 and the interface 420 may include a programcartridge and cartridge interface (such as that found in video gamedevices), a removable memory chip (such as an EPROM or PROM) andassociated socket, a memory stick and USB port, a memory card andassociated memory card slot, and/or any other removable storage unit andassociated interface.

The computer system 400 may further include a communication or networkinterface 424. The communication or network interface 424 enables thecomputer system 400 to communicate and interact with any combination ofremote devices, remote networks, remote entities, etc. (individually andcollectively referenced by reference number 428). For example, thecommunication or network interface 424 may allow the computer system 400to communicate with the remote devices 428 over a communication path426, which may be wired and/or wireless, and which may include anycombination of LANs, WANs, the Internet, etc. Control logic and/or datamay be transmitted to and from the computer system 400 via communicationpath 426.

In an embodiment, a tangible apparatus or article of manufacturecomprising a tangible computer useable or readable medium having controllogic (software) stored thereon is also referred to herein as a computerprogram product or program storage device. This includes, but is notlimited to, the computer system 400, the main memory 408, the secondarymemory 410, and the removable storage units 418 and 422, as well astangible articles of manufacture embodying any combination of theforegoing. Such control logic, when executed by one or more dataprocessing devices (such as computer system 400), causes such dataprocessing devices to operate as described herein.

Based on the teachings contained in this disclosure, it will be apparentto persons skilled in the relevant art(s) how to make and use theinvention using data processing devices, computer systems and/orcomputer architectures other than that illustrated in FIG. 4. Inparticular, embodiments may operate with software, hardware, and/oroperating system implementations other than those described herein.

CONCLUSION

The Detailed Description referred to accompanying figures to illustrateexemplary embodiments consistent with the disclosure. References in thedisclosure to “an exemplary embodiment” indicates that the exemplaryembodiment described include a particular feature, structure, orcharacteristic, but every exemplary embodiment can not necessarilyinclude the particular feature, structure, or characteristic. Moreover,such phrases are not necessarily referring to the same exemplaryembodiment. Further, any feature, structure, or characteristic describedin connection with an exemplary embodiment can be included,independently or in any combination, with features, structures, orcharacteristics of other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described within the disclosure have beenprovided for illustrative purposes, and are not intend to be limiting.Other exemplary embodiments are possible, and modifications can be madeto the exemplary embodiments while remaining within the spirit and scopeof the disclosure. The disclosure has been described with the aid offunctional non-building blocks illustrating the implementation ofspecified functions and relationships thereof. The boundaries of thesefunctional non-building blocks have been arbitrarily defined herein forthe convenience of the description. Alternate boundaries can be definedso long as the specified functions and relationships thereof areappropriately performed.

The Detailed Description of the exemplary embodiments fully revealed thegeneral nature of the disclosure that others can, by applying knowledgeof those skilled in relevant art(s), readily modify and/or adapt forvarious applications such exemplary embodiments, without undueexperimentation, without departing from the spirit and scope of thedisclosure. Therefore, such adaptations and modifications are intendedto be within the meaning and plurality of equivalents of the exemplaryembodiments based on the teaching and guidance presented herein. It isto be understood that the phraseology or terminology herein is for thepurpose of description and not of limitation, such that the terminologyor phraseology of the present specification is to be interpreted bythose skilled in relevant art(s) in light of the teachings herein.

What is claimed is:
 1. A monitoring environment for monitoring aplurality of communications, the monitoring environment comprising: acontrolled environment configured to provide the plurality ofcommunications between a plurality of insider persons within thecontrolled environment and a plurality of outsider persons within aplurality of uncontrolled environments remote from the controlledenvironment; and a monitoring platform configured to: monitor apercentage of the plurality of communications as prescribed by local,state, or national governing authorities, the percentage of theplurality of communications being less than all the plurality ofcommunications provided by the controlled environment, schedule amonitoring person from among a plurality of monitoring persons tomonitor a communication from among the percentage of the plurality ofcommunications, and instruct the monitoring person to perform a task toverify the monitoring person is monitoring the communication.
 2. Themonitoring environment of claim 1, wherein the controlled environmentcomprises an institutional environment, a military environment, ahospital environment, an educational environment, a businessenvironment, or a governmental environment.
 3. The monitoringenvironment of claim 1, wherein the percentage of the plurality ofcommunications is prescribed by a regulation or a contract between themonitoring platform and the local, the state, or the national governingauthorities.
 4. The monitoring environment of claim 3, wherein themonitoring platform is further configured to measure the percentage ofthe plurality of communications being monitored by the plurality ofmonitoring persons to ensure the monitoring platform is performing inaccordance with the regulation or the contract.
 5. The monitoringenvironment of claim 1, wherein the monitoring platform is furtherconfigured to receive a warning alert from the monitoring person whenthe monitoring person indicates suspicious activity or prohibitedactivity is present in the communication.
 6. The monitoring environmentof claim 5, wherein the monitoring platform is further configured tonotify the local, the state, or the national governing authorities ofthe suspicious activity or the prohibited activity corresponding to thewarning alert.
 7. The monitoring environment of claim 5, wherein thewarning alert comprises: an annotation, a flag, a bookmark, an audiblealert, and/or a video alert indicating presence of the suspiciousactivity or the prohibited activity in the communication.
 8. Themonitoring environment of claim 1, wherein the task comprises: entry ofa response to a question by the monitoring person; entry of a code bythe monitoring person; or entry of a biometric verification by themonitoring person.
 9. A monitoring platform for monitoring a pluralityof communications between a plurality of insider persons within acontrolled environment and a plurality of outsider persons within aplurality of uncontrolled environments remote from the controlledenvironment, the monitoring platform comprising: a memory configured tostore instructions for monitoring a percentage of the plurality ofcommunications as prescribed by local, state, or national governingauthorities, the percentage of the plurality of communications beingless than all the plurality of communications provided by the controlledenvironment; and a processor, configured to execute the instructions,the instructions, when executed by the processor, configuring theprocessor to: schedule a monitoring station from among a plurality ofmonitoring stations to monitor a communication from among the percentageof the plurality of communications, and cause the monitoring station toinstruct a monitoring person from a plurality of monitoring personsassociated with the monitoring station to perform a task to verify themonitoring person is monitoring the communication.
 10. The monitoringplatform of claim 9, wherein the controlled environment comprises aninstitutional environment, a military environment, a hospitalenvironment, an educational environment, a business environment, or agovernmental environment.
 11. The monitoring platform of claim 9,wherein the percentage of the plurality of communications is prescribedby a regulation or a contract between the monitoring platform and thelocal, the state, or the national governing authorities.
 12. Themonitoring platform of claim 11, wherein the instructions, when executedby the processor, further configure the processor to measure thepercentage of the plurality of communications being monitored by theplurality of monitoring persons to ensure the monitoring platform isperforming in accordance with the regulation or the contract.
 13. Themonitoring platform of claim 9, wherein the instructions, when executedby the processor, further configure the processor to receive a warningalert from the monitoring station when the monitoring person indicatessuspicious activity or prohibited activity is present in thecommunication.
 14. The monitoring platform of claim 13, wherein theinstructions, when executed by the processor, further configure theprocessor to notify the local, the state, or the national governingauthorities of the suspicious activity or the prohibited activitycorresponding to the warning alert.
 15. The monitoring platform of claim13, wherein the warning alert comprises: an annotation, a flag, abookmark, an audible alert, and/or a video alert indicating presence ofthe suspicious activity or the prohibited activity in the communication.16. The monitoring platform of claim 9, wherein the task comprises:entry of a response to a question by the monitoring person at themonitoring station; entry of a code by the monitoring person at themonitoring station; or entry of a biometric verification by themonitoring person at the monitoring station.
 17. A method for monitoringa plurality of communications, the method comprising: scheduling amonitoring person from among a plurality of monitoring persons tomonitor a communication from among a percentage of the plurality ofcommunications between a plurality of insider persons within acontrolled environment and a plurality of outsider persons within aplurality of uncontrolled environments remote from the controlledenvironment, wherein the percentage of the plurality of communicationsis prescribed by local, state, or national governing authorities and isless than all the plurality of communications provided by the controlledenvironment; and instructing the monitoring person to perform a task toverify the monitoring person is monitoring the communication.
 18. Themethod of claim 17, wherein the percentage of the plurality ofcommunications is prescribed by a regulation or a contract between amonitoring platform and the local, the state, or the national governingauthorities.
 19. The method of claim 18, further comprising: measuringthe percentage of the plurality of communications being monitored by theplurality of monitoring persons to ensure performance in accordance withthe regulation or the contract.
 20. The method of claim 17, furthercomprising: receiving a warning alert from the monitoring person whenthe monitoring person indicates suspicious activity or prohibitedactivity is present in the communication.
 21. The method of claim 20,further comprising: notifying the local, the state, or the nationalgoverning authorities of the suspicious activity or the prohibitedactivity corresponding to the warning alert.
 22. The method of claim 20,wherein the warning alert comprises: an annotation, a flag, a bookmark,an audible alert, and/or a video alert indicating presence of thesuspicious activity or the prohibited activity in the communication. 23.The method of claim 17, wherein the task comprises: entry of a responseto a question by the monitoring person; entry of a code by themonitoring person; or entry of a biometric verification by themonitoring person.