VP Task Force Public Safety Tools

The Citizen’s Public Safety Network (CPSN).

Our mission is to facilitate and promote Citizen to Citizen public safety reporting, technology, research, investigations, education and perpetrator behavior alerts of those whom present a public safety risk by their repeated exploitation of vulnerable persons. Premeditated exploitation of persons & their property are crimes that negatively effect all taxpaying citizens and entire communities; especially the elderly, those with disabilities, children, victims of domestic violence, bullying, harassment, person crimes as well as fraud, negligence, exploitation, malpractice, business, professional and facility violations. We provide resources to enable public aegis to those whom have had their civil and inalienable human rights violated — A voice for all persons whom are constitutionally protected under Federal Acts, State Statutes, Municipal Codes, Occupational License Ethics and Industry Regulations.

CPSN works with programmers to develop leading-edge data-gathering applications focused on tracking, profiling and comparing repeating perpetrator patterns. The software was designed to aggregate factual events, compare them with statutory code and forecast vulnerable person abuse, exploitation & negligence trends. Moreover, the applications have many additional educational features. The following PDF whitepapers explains in greater detail.

Figure 1: VP TASKFORCE™ White Collar Crime Tracking & Profiling.

Data-driven White & Silver Collar Fraud Perpetrator Profiling and Tracking System as an Integrated Software Suite.

VP TASKFORCE™ is public safety technology. The VP TASKFORCE™ public safety tool suite & platforms include the following integrated applications: CITIZEN SAFETY MAPS™, Sherlock AI™ data-curating Detective, AEGIS Reports and WHISTLEFIELD™ a mobile field gathering, perpetrator behavioral profiling, evidence tracking and knowledge repository App. Together these on and offline public-safety, social technology tools document, analyse poly-victimization trends and provide proximate based reporting features to provide vulnerable persons and the public relevant alerts, educational information and evidential support resources.

Access full size VP TASKFORCE™ Whitepaper.


VP TASKFORCE™ can pair & cross-reference system profiles to track and curate research on white-collar crime, white-collar criminal patterns, aligned-crony exploitation networks targeting a single or group of vulnerable person’s subject to financial exploitation, negligence, abuse, malpractice, collusion networks, industry and business compliance violations. The research and investigative applications provide trend-spotting, AI and crowd-source data-capture, repeating behavior risk analysis, tactical alert systems via multiple layer Geo API map overlays, gamut logistics, ranked threat detection, citizen-to-citizen/county/state legislature reporting features and the tertiary level alleged perpetrator educational awareness, repeat behavior tracking, evidence profiling and research access platforms. These privately funded products and services are not affiliated with any state board, professional regulatory authority or government agency; therefor public transparency is more accessible board, professional regulatory authority or government agency; therefor public transparency is more accessible.

CPSN’s 4 Public Safety Pillars: Education, Research, Public Unity and Technology. 

The CPSN educational mission is to:

  1. assist in knowledge proliferation concerning established vulnerable person statutes and public safety policy initiatives,
  2. provide  effective documenting, reporting, tracking & communication tools for individual vulnerable-person advocates and like-minded grassroots advocacy organizations,
  3. provide relevant research, educational resources and easily accessible technology to support the vulnerable person advocate, research team or any individual by enabling rapid learning of relevant matters & fraud awareness,
  4. assist victims more effectively navigate the complex and often manipulated civil court system.

Join CPSN or a regional elder rights grass roots organization to learn more about the vulnerable person collective community, research your states abuse, exploitation and negligence statutes, support current legislative initiatives and provide feedback on leading-edge technical developments underway. There is no obligations or financial requirements by joining as a CPSN member,  however multiple opportunities exist for those whom would like to assist. We encourage everyone to assist in the development of  Citizen to Citizen (C2C)  reporting. By connecting we can all work together to solve problems and help protect all persons affected by the scourge of abuse, exploitation, harassment, negligence, white-collar crime, fraud, malpractice,  aligned-cronyism in probate courts, clandestine estate transfers, related professional corruption, professional, business and facility standards violations.

CPSN & Altruesoft® Co-develop and Promote Citizen-to-Citizen & Civic Accountability Public Safety Reporting Technology. 

The Citizens Public Safety Network aided by Altruesoft’s public safety technology in unison with  social media & the advocacy campaigns create unity for the public to organize and report verifiable documented accounts of fraud and abuse.  The  reporting tools foundation is set upon  multiple data-sharing platforms that; 1) enable victims a voice, 2) ability to share information as a means to warn others,  3) support through sense of unity and shared problem-solving.

CPSN advocates are victims, family members of victims or friends of persons whom have been physically, financially and emotionally abused — to add insult to injury many of these same persons have also been directly damaged by professional negligence, malpractice and intentional financial exploitation (fraud). CPSN volunteer programmers, researchers and investigators utilize information and educational resources from the United States Dept. of JusticeOffice of Victims CrimesAmerican Bar AssociationAmerican Psychological AssociationElder Abuse Guide for Law Enforcement (EAGLE) the FBI Office of the Private Sector, the open source programming movement (GNU & FSS) and open data resources from data.govopensecrets.orgopencorporates.com. However the majority of the most useful evidence comes directly from the victim themselves or those assisting them, like-minded grassroots organizations, professional investigators/investigations, publicly available court records, news articles, focus groups, public forums & social media.

One Example of a Citizen to Citizen Machine Learning Reporting App.

FIGURE 2: ARTIFICIAL INTELLIGENCE DATA CURATOR

Sherlock AI   is a  researcher trained data-curating detective. As a researcher’s assistant  Sherlock AI is instructed to seek public data then rank the returned queries to narrow relevance via feedback loops. This tool is  most effectively used in tandem with public safety campaigns. This machine learning component of perpetrator profiling is based on relevancy – basically a linked computing system’s ability to seek and curate explicit actions or queries based on implicit indicators, then  query responses to  further cross-reference with other queries to identify: 1) repeating patterns, 2) historical patterns of repeating behavior, 3) organized collusion patterns, 4) recidivism, 5) trends and whom is at the greatest risk for future victimization.

Scroll over image above to Zoom View text. Hold mouse down to drag scroll.

Access full size  Sherlock AI  Whitepaper.

Step 1 of an AI dual topic search algorithm query.i.e.; two related keyword as “event topics” example can be entered to begin Sherlock AI Feedback Loop process: Step 1 Demo (prior to using AI software).

Nation Wide Advocate Collective Building The Bridge to Overdue Reform.

CPSN & Altruesoft® Co-develop and Promote Citizen-to-Citizen & Civic Accountability Public Safety Reporting Technology. 

The Citizens Public Safety Network aided by Altruesoft’s public safety technology in unison with  social media & the internet activism hashing campaign known as the #C2C Movement create unity for the public to organize and report verifiable documented accounts of fraud and abuse.  The  reporting tools foundation is set upon  multiple data-sharing platforms that; 1) enable victims a voice, 2) ability to share information as a means to warn others,  3) support through sense of unity and shared problem-solving.

CPSN advocates are victims, family members of victims or friends of persons whom have been physically, financially and emotionally abused — to add insult to injury many of these same persons have also been directly damaged by professional negligence, malpractice and intentional financial exploitation (fraud). CPSN volunteer programmers, researchers and investigators utilize information and educational resources from the United States Dept. of Justice, the FBI Office of the Private Sector, the open source programming movement (GNU & FSS) and open data resources from data.govopensecrets.orgopencorporates.com. However the majority of the most useful evidence comes directly from the victim themselves or those assisting them, like-minded grassroots organization, professional investigators/investigations, publicly available court records, news articles, public forums & social media.

FIGURE 3: WhistleDrive

CPSN’s VP Taskforce Tech Apps: WhistleDrive cloud-linked, crypto-secured “Evidence Gathering & Evidence Delivery System.”

WhistleField cloud-linked, crypto-secured Evidence Delivery System
WhistleField cloud-linked, crypto-secured Evidence Delivery System.

.—————–

Data aggregation sources and leads: regional newspapers, VP TaskforceAltrueSoft Tech PlatformsCitizen to Citizen ReportingNorthwest Journal News, The DEFALCATION Method, Grassroots Elder Advocate Organizations, State & national GAO research monitoring & grant projects. Key search terms: § 18-1505, § 39-5302, Adult Protective Services, Dept. of Health, Elder Abuse and Exploitation. Aggregated & direct interviews via Citizen research and complaints focused on corruption, professional cronyism among state licensed service providers such as Estate Planning Attorneys, Doctors, Physicians, Clinicians & coordinated medical/neurocognitive/capacity evaluations, Conservator, Court Visitor, LSW, Guardian, Guardianship, Trustee, Management Services, IRPC, Idaho State Bar, CMS, Hospital, Facility ManagementSECFINRACode of Federal Regulations, Tax Fraud, Wealth Management Services, Certified Financial Forensics & CPA Investigation manuals, Uniform Code and many more industry compliance guidelines . Supported by research from over site sources, Bureau of Occupational Licenses and all State Statutes relevant to Negligence, Exploitation & Abuse including Probate Court monitoring, Senate Hearing on “Toxic Conservatorships“, recent federal legislation, Acts of Congress, Elder Justice ActElder Abuse Guide For Law Enforcement (EAGLE), American Bar Association & American Psychologists Association Resources on & Elder Abuse & Vulnerable Person Legislation.

Courtesy of Spokane; Washington, Sandpoint & Coeur d’alene; Kootenai County, Idaho Elder Abuse Advocates & Grassroots Networks.