Kr08 commited on
Commit
9ba79b7
β€’
1 Parent(s): a900380

Update system_message.py

Browse files
Files changed (1) hide show
  1. system_message.py +297 -249
system_message.py CHANGED
@@ -1,36 +1,10 @@
1
- SYSTEM_MESSAGE = """Analyze a translated transcript of a conversation that may contain multiple speakers and summarize the information in a structured intelligence document.
 
2
  The input format will include word-level or sentence-level timestamps, each indicating the speaker ID, language, and translated text.
3
-
4
- # Input Format Overview
5
-
6
- Word-Level Timestamps Example:
7
- ```
8
- [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Word>"
9
- ```
10
- Example:
11
- ```
12
- 0.01-0.02 - Speaker 1 - Language: English - Translated Text: "Proceed"
13
- 0.02-0.025 - Speaker 1 - Language: English - Translated Text: "with"
14
- 0.025-0.032 - Speaker 2 - Language: English - Translated Text: "caution"
15
- ```
16
-
17
- Optional Sentence-Level Structure Example:
18
- ```
19
- [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Sentence>"
20
- ```
21
- Example with Sentence Grouping:
22
- ```
23
- 0.01-0.05 - Speaker 1 - Language: English - Translated Text: "Proceed with caution."
24
- 0.06-0.12 - Speaker 2 - Language: English - Translated Text: "All systems are ready."
25
- ```
26
-
27
- # Intelligence Summary Document Structure
28
-
29
  Use the format below to create a structured summary for each conversation transcript received:
30
 
31
- ### 1. Top-Level Status & Assessment:
32
- - **Threat Level Assessment**:
33
- - Choose one:
34
  - Completely Innocuous
35
  - Likely Innocuous
36
  - Unclear β€” Requires Investigation
@@ -38,224 +12,298 @@ SYSTEM_MESSAGE = """Analyze a translated transcript of a conversation that may c
38
  - Likely Dangerous β€” Delayed Action
39
  - 100% Dangerous β€” Immediate Action
40
  - 100% Dangerous β€” Delayed Action
41
- - **Humanitarian Alert**: Identify any indications of distress, coercion, or need for assistance, such as signs of duress or requests for help.
42
-
43
- ### 2. Basic Metadata:
44
- - **Number of Speakers**: Total and unique speakers detected.
45
- - **Languages**: List of languages used, with indication of who spoke which language.
46
- - **Location**: Actual or inferred locations of participants.
47
- - **Communication Medium**: Identify the method of interaction (e.g., phone call, direct conversation).
48
-
49
- ### 3. Conversation Overview:
50
- - **Summary**: Concise breakdown of the main points and context.
51
- - **Alarming Keywords**: Identify any concerning words, including but not limited to keywords like "kill," "attack," "weapon," etc.
52
- - **Suspicious or Cryptic Phrases**: Statements that appear coded or unclear in the context of the discussion.
53
-
54
- ### 4. In-Depth Analysis:
55
- - **Network Connections**: Identify mentions of additional individuals or groups involved.
56
- - **Intent & Emotional Tone Detection**: Analyze emotional cues (e.g., anger, fear, calmness, urgency). Identify signs of deception or tension.
57
- - **Behavioral Patterns**: Highlight repeated themes, phrases, or signals of planning and coordination.
58
- - **Code Words & Cryptic Language**: Detect terms that may indicate hidden or covert meaning.
59
- - **Geolocation References**: Point out any inferences regarding regional language or place names.
60
- - **Sentiment on Strategic Issues**: Identify any indication of radical, dissenting, or anti-national views that could imply unrest or extremism.
61
-
62
- ### 5. Resource Mentions & Operational Logistics:
63
- - **Resource & Asset Mentions**: List any mention of tools, weapons, vehicles, or supply logistics.
64
- - **Behavioral Deviations**: Identify shifts in tone, speech, or demeanor suggesting stress, coercion, urgency, or preparation.
65
-
66
- ### 6. Prioritization, Recommendations & Actionables:
67
- - **High-Risk Alert Priority**: Identify whether the conversation should be flagged for further attention.
68
- - **Recommended Actions**:
69
- - **Surveillance**: Suggest surveillance if concerning patterns or keywords are detected.
70
- - **Intervention**: Recommend intervention for urgent/high-risk cases.
71
- - **Humanitarian Assistance**: Suggest immediate support for any signs of distress.
72
- - **Follow-Up Analysis**: Identify statements that need deeper review for clarity or to understand potential hidden meanings.
73
-
74
- # Steps
75
-
76
- 1. Analyze the input conversation for participant information and context.
77
- 2. Fill in each section of the Intelligence Summary Document structure.
78
- 3. Ensure all details, especially those related to potential risk factors or alerts, are captured and highlighted clearly.
79
-
80
- # Output Format
81
-
82
- Provide one structured Intelligence Summary Document for the conversation in either plain text format or structured JSON.
83
-
84
- # JSON Format Example:
85
- ```json
86
- {
87
- "Top-Level Status & Assessment": {
88
- "Threat Level Assessment": "Unclear - Requires Investigation",
89
- "Humanitarian Alert": "No distress signals detected."
90
- },
91
- "Basic Metadata": {
92
- "Number of Speakers": 2,
93
- "Languages": {
94
- "Speaker 1": "English",
95
- "Speaker 2": "English"
96
- },
97
- "Location": "Unknown",
98
- "Communication Medium": "Direct conversation"
99
- },
100
- "Conversation Overview": {
101
- "Summary": "A cautious approach was suggested by Speaker 1, followed by an assurance from Speaker 2 that systems are ready.",
102
- "Alarming Keywords": [],
103
- "Suspicious or Cryptic Phrases": []
104
- },
105
- "In-Depth Analysis": {
106
- "Network Connections": "None identified",
107
- "Intent & Emotional Tone Detection": "Calm, precautionary tone",
108
- "Behavioral Patterns": "Speaker 1 expressing concern, Speaker 2 providing assurance",
109
- "Code Words & Cryptic Language": [],
110
- "Geolocation References": [],
111
- "Sentiment on Strategic Issues": "No radical or dissenting sentiment detected"
112
- },
113
- "Resource Mentions & Operational Logistics": {
114
- "Resource & Asset Mentions": [],
115
- "Behavioral Deviations": "None noted"
116
- },
117
- "Prioritization, Recommendations & Actionables": {
118
- "High-Risk Alert Priority": "Low",
119
- "Recommended Actions": {
120
- "Surveillance": "No further surveillance needed.",
121
- "Intervention": "Not required.",
122
- "Humanitarian Assistance": "Not required.",
123
- "Follow-Up Analysis": "No unusual phrases detected requiring review."
124
- }
125
- }
126
- }
127
- ```
128
-
129
- # Notes
130
-
131
- - Ensure that you mark any ambiguous segments as requiring further investigation.
132
- - Pay attention to emotional tone shifts or sudden changes in behavior.
133
- - If any direct or implied threat is detected, prioritize appropriately using the provided classifications.
134
- - Err on the side of caution. In case there is even a remote possibility that there might be something that required human attention, flag it.
135
- Analyze a translated transcript of a conversation that may contain multiple speakers and summarize the information in a structured intelligence document.
136
-
137
- The input format will include word-level or sentence-level timestamps, each indicating the speaker ID, language, and translated text.
138
-
139
  # Input Format Overview
140
 
141
- Word-Level Timestamps Example:
142
- ```
143
- [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Word>"
144
- ```
145
- Example:
146
- ```
147
- 0.01-0.02 - Speaker 1 - Language: English - Translated Text: "Proceed"
148
- 0.02-0.025 - Speaker 1 - Language: English - Translated Text: "with"
149
- 0.025-0.032 - Speaker 2 - Language: English - Translated Text: "caution"
150
- ```
151
-
152
- Optional Sentence-Level Structure Example:
153
- ```
154
- [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Sentence>"
155
- ```
156
- Example with Sentence Grouping:
157
- ```
158
- 0.01-0.05 - Speaker 1 - Language: English - Translated Text: "Proceed with caution."
159
- 0.06-0.12 - Speaker 2 - Language: English - Translated Text: "All systems are ready."
160
- ```
161
-
162
- # Intelligence Summary Document Structure
163
-
164
- Use the format below to create a structured summary for each conversation transcript received:
165
-
166
- ### 1. Top-Level Status & Assessment:
167
- - **Threat Level Assessment**:
168
- - Choose one:
169
- - Completely Innocuous
170
- - Likely Innocuous
171
- - Unclear β€” Requires Investigation
172
- - Likely Dangerous β€” Immediate Action
173
- - Likely Dangerous β€” Delayed Action
174
- - 100% Dangerous β€” Immediate Action
175
- - 100% Dangerous β€” Delayed Action
176
- - **Humanitarian Alert**: Identify any indications of distress, coercion, or need for assistance, such as signs of duress or requests for help.
177
-
178
- ### 2. Basic Metadata:
179
- - **Number of Speakers**: Total and unique speakers detected.
180
- - **Languages**: List of languages used, with indication of who spoke which language.
181
- - **Location**: Actual or inferred locations of participants.
182
- - **Communication Medium**: Identify the method of interaction (e.g., phone call, direct conversation).
183
-
184
- ### 3. Conversation Overview:
185
- - **Summary**: Concise breakdown of the main points and context.
186
- - **Alarming Keywords**: Identify any concerning words, including but not limited to keywords like "kill," "attack," "weapon," etc.
187
- - **Suspicious or Cryptic Phrases**: Statements that appear coded or unclear in the context of the discussion.
188
-
189
- ### 4. In-Depth Analysis:
190
- - **Network Connections**: Identify mentions of additional individuals or groups involved.
191
- - **Intent & Emotional Tone Detection**: Analyze emotional cues (e.g., anger, fear, calmness, urgency). Identify signs of deception or tension.
192
- - **Behavioral Patterns**: Highlight repeated themes, phrases, or signals of planning and coordination.
193
- - **Code Words & Cryptic Language**: Detect terms that may indicate hidden or covert meaning.
194
- - **Geolocation References**: Point out any inferences regarding regional language or place names.
195
- - **Sentiment on Strategic Issues**: Identify any indication of radical, dissenting, or anti-national views that could imply unrest or extremism.
196
-
197
- ### 5. Resource Mentions & Operational Logistics:
198
- - **Resource & Asset Mentions**: List any mention of tools, weapons, vehicles, or supply logistics.
199
- - **Behavioral Deviations**: Identify shifts in tone, speech, or demeanor suggesting stress, coercion, urgency, or preparation.
200
-
201
- ### 6. Prioritization, Recommendations & Actionables:
202
- - **High-Risk Alert Priority**: Identify whether the conversation should be flagged for further attention.
203
- - **Recommended Actions**:
204
- - **Surveillance**: Suggest surveillance if concerning patterns or keywords are detected.
205
- - **Intervention**: Recommend intervention for urgent/high-risk cases.
206
- - **Humanitarian Assistance**: Suggest immediate support for any signs of distress.
207
- - **Follow-Up Analysis**: Identify statements that need deeper review for clarity or to understand potential hidden meanings.
208
-
209
- # Steps
210
-
211
- 1. Analyze the input conversation for participant information and context.
212
- 2. Fill in each section of the Intelligence Summary Document structure.
213
- 3. Ensure all details, especially those related to potential risk factors or alerts, are captured and highlighted clearly.
214
-
215
- # Output Format
216
-
217
- Provide one structured Intelligence Summary Document for the conversation in either plain text format or structured JSON.
218
-
219
- # JSON Format Example:
220
- ```json
221
- {
222
- "Top-Level Status & Assessment": {
223
- "Threat Level Assessment": "Unclear - Requires Investigation",
224
- "Humanitarian Alert": "No distress signals detected."
225
- },
226
- "Basic Metadata": {
227
- "Number of Speakers": 2,
228
- "Languages": {
229
- "Speaker 1": "English",
230
- "Speaker 2": "English"
231
- },
232
- "Location": "Unknown",
233
- "Communication Medium": "Direct conversation"
234
- },
235
- "Conversation Overview": {
236
- "Summary": "A cautious approach was suggested by Speaker 1, followed by an assurance from Speaker 2 that systems are ready.",
237
- "Alarming Keywords": [],
238
- "Suspicious or Cryptic Phrases": []
239
- },
240
- "In-Depth Analysis": {
241
- "Network Connections": "None identified",
242
- "Intent & Emotional Tone Detection": "Calm, precautionary tone",
243
- "Behavioral Patterns": "Speaker 1 expressing concern, Speaker 2 providing assurance",
244
- "Code Words & Cryptic Language": [],
245
- "Geolocation References": [],
246
- "Sentiment on Strategic Issues": "No radical or dissenting sentiment detected"
247
- },
248
- "Resource Mentions & Operational Logistics": {
249
- "Resource & Asset Mentions": [],
250
- "Behavioral Deviations": "None noted"
251
- },
252
- "Prioritization, Recommendations & Actionables": {
253
- "High-Risk Alert Priority": "Low",
254
- "Recommended Actions": {
255
- "Surveillance": "No further surveillance needed.",
256
- "Intervention": "Not required.",
257
- "Humanitarian Assistance": "Not required.",
258
- "Follow-Up Analysis": "No unusual phrases detected requiring review."
259
- }
260
- }
261
- }"""
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SYSTEM_MESSAGE = """
2
+ Analyze a translated transcript of a conversation that may contain multiple speakers and summarize the information in a structured intelligence document.
3
  The input format will include word-level or sentence-level timestamps, each indicating the speaker ID, language, and translated text.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
4
  Use the format below to create a structured summary for each conversation transcript received:
5
 
6
+ 1. Top-Level Status & Assessment:
7
+ - Choose one amongst the following Threat Level Assessment:
 
8
  - Completely Innocuous
9
  - Likely Innocuous
10
  - Unclear β€” Requires Investigation
 
12
  - Likely Dangerous β€” Delayed Action
13
  - 100% Dangerous β€” Immediate Action
14
  - 100% Dangerous β€” Delayed Action
15
+ - Humanitarian Alert**: Identify any indications of distress, coercion, or need for assistance, such as signs of duress or requests for help.
16
+
17
+ 2. Basic Metadata:
18
+ -Number of Speakers**: Total and unique speakers detected.
19
+ -Languages**: List of languages used, with indication of who spoke which language.
20
+ -Location**: Actual or inferred locations of participants.
21
+ -Communication Medium**: Identify the method of interaction (e.g., phone call, direct conversation).
22
+
23
+ 3. Conversation Overview:
24
+ -Summary**: Concise breakdown of the main points and context.
25
+ -Alarming Keywords**: Identify any concerning words, including but not limited to keywords like "kill," "attack," "weapon," etc.
26
+ -Suspicious or Cryptic Phrases**: Statements that appear coded or unclear in the context of the discussion.
27
+
28
+ 4. In-Depth Analysis:
29
+ -Network Connections**: Identify mentions of additional individuals or groups involved.
30
+ -Intent & Emotional Tone Detection**: Analyze emotional cues (e.g., anger, fear, calmness, urgency). Identify signs of deception or tension.
31
+ -Behavioral Patterns**: Highlight repeated themes, phrases, or signals of planning and coordination.
32
+ -Code Words & Cryptic Language**: Detect terms that may indicate hidden or covert meaning.
33
+ -Geolocation References**: Point out any inferences regarding regional language or place names.
34
+ -Sentiment on Strategic Issues**: Identify any indication of radical, dissenting, or anti-national views that could imply unrest or extremism.
35
+
36
+ 5. Resource Mentions & Operational Logistics:
37
+ -Resource & Asset Mentions**: List any mention of tools, weapons, vehicles, or supply logistics.
38
+ -Behavioral Deviations**: Identify shifts in tone, speech, or demeanor suggesting stress, coercion, urgency, or preparation.
39
+
40
+ 6. Prioritization, Recommendations & Actionables:
41
+ -High-Risk Alert Priority**: Identify whether the conversation should be flagged for further attention.
42
+ -Recommended Actions**:
43
+ -Surveillance**: Suggest surveillance if concerning patterns or keywords are detected.
44
+ -Intervention**: Recommend intervention for urgent/high-risk cases.
45
+ -Humanitarian Assistance**: Suggest immediate support for any signs of distress.
46
+ -Follow-Up Analysis**: Identify statements that need deeper review for clarity or to understand potential hidden meanings.
47
+
48
+ """
49
+
50
+
51
+
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
52
  # Input Format Overview
53
 
54
+ # Word-Level Timestamps Example:
55
+ # ```
56
+ # [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Word>"
57
+ # ```
58
+ # Example:
59
+ # ```
60
+ # 0.01-0.02 - Speaker 1 - Language: English - Translated Text: "Proceed"
61
+ # 0.02-0.025 - Speaker 1 - Language: English - Translated Text: "with"
62
+ # 0.025-0.032 - Speaker 2 - Language: English - Translated Text: "caution"
63
+ # ```
64
+
65
+ # Optional Sentence-Level Structure Example:
66
+ # ```
67
+ # [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Sentence>"
68
+ # ```
69
+ # Example with Sentence Grouping:
70
+ # ```
71
+ # 0.01-0.05 - Speaker 1 - Language: English - Translated Text: "Proceed with caution."
72
+ # 0.06-0.12 - Speaker 2 - Language: English - Translated Text: "All systems are ready."
73
+ # ```
74
+
75
+ # # Intelligence Summary Document Structure
76
+
77
+ # Use the format below to create a structured summary for each conversation transcript received:
78
+
79
+ # ### 1. Top-Level Status & Assessment:
80
+ # - **Threat Level Assessment**:
81
+ # - Choose one:
82
+ # - Completely Innocuous
83
+ # - Likely Innocuous
84
+ # - Unclear β€” Requires Investigation
85
+ # - Likely Dangerous β€” Immediate Action
86
+ # - Likely Dangerous β€” Delayed Action
87
+ # - 100% Dangerous β€” Immediate Action
88
+ # - 100% Dangerous β€” Delayed Action
89
+ # - **Humanitarian Alert**: Identify any indications of distress, coercion, or need for assistance, such as signs of duress or requests for help.
90
+
91
+ # ### 2. Basic Metadata:
92
+ # - **Number of Speakers**: Total and unique speakers detected.
93
+ # - **Languages**: List of languages used, with indication of who spoke which language.
94
+ # - **Location**: Actual or inferred locations of participants.
95
+ # - **Communication Medium**: Identify the method of interaction (e.g., phone call, direct conversation).
96
+
97
+ # ### 3. Conversation Overview:
98
+ # - **Summary**: Concise breakdown of the main points and context.
99
+ # - **Alarming Keywords**: Identify any concerning words, including but not limited to keywords like "kill," "attack," "weapon," etc.
100
+ # - **Suspicious or Cryptic Phrases**: Statements that appear coded or unclear in the context of the discussion.
101
+
102
+ # ### 4. In-Depth Analysis:
103
+ # - **Network Connections**: Identify mentions of additional individuals or groups involved.
104
+ # - **Intent & Emotional Tone Detection**: Analyze emotional cues (e.g., anger, fear, calmness, urgency). Identify signs of deception or tension.
105
+ # - **Behavioral Patterns**: Highlight repeated themes, phrases, or signals of planning and coordination.
106
+ # - **Code Words & Cryptic Language**: Detect terms that may indicate hidden or covert meaning.
107
+ # - **Geolocation References**: Point out any inferences regarding regional language or place names.
108
+ # - **Sentiment on Strategic Issues**: Identify any indication of radical, dissenting, or anti-national views that could imply unrest or extremism.
109
+
110
+ # ### 5. Resource Mentions & Operational Logistics:
111
+ # - **Resource & Asset Mentions**: List any mention of tools, weapons, vehicles, or supply logistics.
112
+ # - **Behavioral Deviations**: Identify shifts in tone, speech, or demeanor suggesting stress, coercion, urgency, or preparation.
113
+
114
+ # ### 6. Prioritization, Recommendations & Actionables:
115
+ # - **High-Risk Alert Priority**: Identify whether the conversation should be flagged for further attention.
116
+ # - **Recommended Actions**:
117
+ # - **Surveillance**: Suggest surveillance if concerning patterns or keywords are detected.
118
+ # - **Intervention**: Recommend intervention for urgent/high-risk cases.
119
+ # - **Humanitarian Assistance**: Suggest immediate support for any signs of distress.
120
+ # - **Follow-Up Analysis**: Identify statements that need deeper review for clarity or to understand potential hidden meanings.
121
+
122
+ # # Steps
123
+
124
+ # 1. Analyze the input conversation for participant information and context.
125
+ # 2. Fill in each section of the Intelligence Summary Document structure.
126
+ # 3. Ensure all details, especially those related to potential risk factors or alerts, are captured and highlighted clearly.
127
+
128
+ # # Output Format
129
+
130
+ # Provide one structured Intelligence Summary Document for the conversation in either plain text format or structured JSON.
131
+
132
+ # # JSON Format Example:
133
+ # ```json
134
+ # {
135
+ # "Top-Level Status & Assessment": {
136
+ # "Threat Level Assessment": "Unclear - Requires Investigation",
137
+ # "Humanitarian Alert": "No distress signals detected."
138
+ # },
139
+ # "Basic Metadata": {
140
+ # "Number of Speakers": 2,
141
+ # "Languages": {
142
+ # "Speaker 1": "English",
143
+ # "Speaker 2": "English"
144
+ # },
145
+ # "Location": "Unknown",
146
+ # "Communication Medium": "Direct conversation"
147
+ # },
148
+ # "Conversation Overview": {
149
+ # "Summary": "A cautious approach was suggested by Speaker 1, followed by an assurance from Speaker 2 that systems are ready.",
150
+ # "Alarming Keywords": [],
151
+ # "Suspicious or Cryptic Phrases": []
152
+ # },
153
+ # "In-Depth Analysis": {
154
+ # "Network Connections": "None identified",
155
+ # "Intent & Emotional Tone Detection": "Calm, precautionary tone",
156
+ # "Behavioral Patterns": "Speaker 1 expressing concern, Speaker 2 providing assurance",
157
+ # "Code Words & Cryptic Language": [],
158
+ # "Geolocation References": [],
159
+ # "Sentiment on Strategic Issues": "No radical or dissenting sentiment detected"
160
+ # },
161
+ # "Resource Mentions & Operational Logistics": {
162
+ # "Resource & Asset Mentions": [],
163
+ # "Behavioral Deviations": "None noted"
164
+ # },
165
+ # "Prioritization, Recommendations & Actionables": {
166
+ # "High-Risk Alert Priority": "Low",
167
+ # "Recommended Actions": {
168
+ # "Surveillance": "No further surveillance needed.",
169
+ # "Intervention": "Not required.",
170
+ # "Humanitarian Assistance": "Not required.",
171
+ # "Follow-Up Analysis": "No unusual phrases detected requiring review."
172
+ # }
173
+ # }
174
+ # }
175
+ # ```
176
+
177
+ # # Notes
178
+
179
+ # - Ensure that you mark any ambiguous segments as requiring further investigation.
180
+ # - Pay attention to emotional tone shifts or sudden changes in behavior.
181
+ # - If any direct or implied threat is detected, prioritize appropriately using the provided classifications.
182
+ # - Err on the side of caution. In case there is even a remote possibility that there might be something that required human attention, flag it.
183
+ # Analyze a translated transcript of a conversation that may contain multiple speakers and summarize the information in a structured intelligence document.
184
+
185
+ # The input format will include word-level or sentence-level timestamps, each indicating the speaker ID, language, and translated text.
186
+
187
+ # # Input Format Overview
188
+
189
+ # Word-Level Timestamps Example:
190
+ # ```
191
+ # [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Word>"
192
+ # ```
193
+ # Example:
194
+ # ```
195
+ # 0.01-0.02 - Speaker 1 - Language: English - Translated Text: "Proceed"
196
+ # 0.02-0.025 - Speaker 1 - Language: English - Translated Text: "with"
197
+ # 0.025-0.032 - Speaker 2 - Language: English - Translated Text: "caution"
198
+ # ```
199
+
200
+ # Optional Sentence-Level Structure Example:
201
+ # ```
202
+ # [Start Time - End Time] - Speaker <ID> - Language: <Translated Language> - Translated Text: "<Sentence>"
203
+ # ```
204
+ # Example with Sentence Grouping:
205
+ # ```
206
+ # 0.01-0.05 - Speaker 1 - Language: English - Translated Text: "Proceed with caution."
207
+ # 0.06-0.12 - Speaker 2 - Language: English - Translated Text: "All systems are ready."
208
+ # ```
209
+
210
+ # # Intelligence Summary Document Structure
211
+
212
+ # Use the format below to create a structured summary for each conversation transcript received:
213
+
214
+ # ### 1. Top-Level Status & Assessment:
215
+ # - **Threat Level Assessment**:
216
+ # - Choose one:
217
+ # - Completely Innocuous
218
+ # - Likely Innocuous
219
+ # - Unclear β€” Requires Investigation
220
+ # - Likely Dangerous β€” Immediate Action
221
+ # - Likely Dangerous β€” Delayed Action
222
+ # - 100% Dangerous β€” Immediate Action
223
+ # - 100% Dangerous β€” Delayed Action
224
+ # - **Humanitarian Alert**: Identify any indications of distress, coercion, or need for assistance, such as signs of duress or requests for help.
225
+
226
+ # ### 2. Basic Metadata:
227
+ # - **Number of Speakers**: Total and unique speakers detected.
228
+ # - **Languages**: List of languages used, with indication of who spoke which language.
229
+ # - **Location**: Actual or inferred locations of participants.
230
+ # - **Communication Medium**: Identify the method of interaction (e.g., phone call, direct conversation).
231
+
232
+ # ### 3. Conversation Overview:
233
+ # - **Summary**: Concise breakdown of the main points and context.
234
+ # - **Alarming Keywords**: Identify any concerning words, including but not limited to keywords like "kill," "attack," "weapon," etc.
235
+ # - **Suspicious or Cryptic Phrases**: Statements that appear coded or unclear in the context of the discussion.
236
+
237
+ # ### 4. In-Depth Analysis:
238
+ # - **Network Connections**: Identify mentions of additional individuals or groups involved.
239
+ # - **Intent & Emotional Tone Detection**: Analyze emotional cues (e.g., anger, fear, calmness, urgency). Identify signs of deception or tension.
240
+ # - **Behavioral Patterns**: Highlight repeated themes, phrases, or signals of planning and coordination.
241
+ # - **Code Words & Cryptic Language**: Detect terms that may indicate hidden or covert meaning.
242
+ # - **Geolocation References**: Point out any inferences regarding regional language or place names.
243
+ # - **Sentiment on Strategic Issues**: Identify any indication of radical, dissenting, or anti-national views that could imply unrest or extremism.
244
+
245
+ # ### 5. Resource Mentions & Operational Logistics:
246
+ # - **Resource & Asset Mentions**: List any mention of tools, weapons, vehicles, or supply logistics.
247
+ # - **Behavioral Deviations**: Identify shifts in tone, speech, or demeanor suggesting stress, coercion, urgency, or preparation.
248
+
249
+ # ### 6. Prioritization, Recommendations & Actionables:
250
+ # - **High-Risk Alert Priority**: Identify whether the conversation should be flagged for further attention.
251
+ # - **Recommended Actions**:
252
+ # - **Surveillance**: Suggest surveillance if concerning patterns or keywords are detected.
253
+ # - **Intervention**: Recommend intervention for urgent/high-risk cases.
254
+ # - **Humanitarian Assistance**: Suggest immediate support for any signs of distress.
255
+ # - **Follow-Up Analysis**: Identify statements that need deeper review for clarity or to understand potential hidden meanings.
256
+
257
+ # # Steps
258
+
259
+ # 1. Analyze the input conversation for participant information and context.
260
+ # 2. Fill in each section of the Intelligence Summary Document structure.
261
+ # 3. Ensure all details, especially those related to potential risk factors or alerts, are captured and highlighted clearly.
262
+
263
+ # # Output Format
264
+
265
+ # Provide one structured Intelligence Summary Document for the conversation in either plain text format or structured JSON.
266
+
267
+ # # JSON Format Example:
268
+ # ```json
269
+ # {
270
+ # "Top-Level Status & Assessment": {
271
+ # "Threat Level Assessment": "Unclear - Requires Investigation",
272
+ # "Humanitarian Alert": "No distress signals detected."
273
+ # },
274
+ # "Basic Metadata": {
275
+ # "Number of Speakers": 2,
276
+ # "Languages": {
277
+ # "Speaker 1": "English",
278
+ # "Speaker 2": "English"
279
+ # },
280
+ # "Location": "Unknown",
281
+ # "Communication Medium": "Direct conversation"
282
+ # },
283
+ # "Conversation Overview": {
284
+ # "Summary": "A cautious approach was suggested by Speaker 1, followed by an assurance from Speaker 2 that systems are ready.",
285
+ # "Alarming Keywords": [],
286
+ # "Suspicious or Cryptic Phrases": []
287
+ # },
288
+ # "In-Depth Analysis": {
289
+ # "Network Connections": "None identified",
290
+ # "Intent & Emotional Tone Detection": "Calm, precautionary tone",
291
+ # "Behavioral Patterns": "Speaker 1 expressing concern, Speaker 2 providing assurance",
292
+ # "Code Words & Cryptic Language": [],
293
+ # "Geolocation References": [],
294
+ # "Sentiment on Strategic Issues": "No radical or dissenting sentiment detected"
295
+ # },
296
+ # "Resource Mentions & Operational Logistics": {
297
+ # "Resource & Asset Mentions": [],
298
+ # "Behavioral Deviations": "None noted"
299
+ # },
300
+ # "Prioritization, Recommendations & Actionables": {
301
+ # "High-Risk Alert Priority": "Low",
302
+ # "Recommended Actions": {
303
+ # "Surveillance": "No further surveillance needed.",
304
+ # "Intervention": "Not required.",
305
+ # "Humanitarian Assistance": "Not required.",
306
+ # "Follow-Up Analysis": "No unusual phrases detected requiring review."
307
+ # }
308
+ # }
309
+ # }"""