STATE of GEORGIA DEPARTMENT of CORRECTIONS ADDITIONAL SCORED RESPONSE DOCUMENT Attachment K

STATE of GEORGIA DEPARTMENT of CORRECTIONS ADDITIONAL SCORED RESPONSE DOCUMENT Attachment K

STATE OF GEORGIA DEPARTMENT OF CORRECTIONS ADDITIONAL SCORED RESPONSE DOCUMENT Attachment K GDC is requesting additional information regarding potential value-added technologies, solutions and support. Contractors are encouraged (but not required) to provide a complete written response to each of the additional scored items listed in Attachment K of the eRFP. Several of the additional scored items may require Contractor to provide exhibits and/or visual aids which clearly reference the specific eRFP section. All information contained in Contractor’s response shall be relevant to the section or specified item of the eRFP. Please note, GDC will not be a “beta test site” for any unproven technology. DO NOT INCLUDE ANY COST/PRICING/REVENUE SHARE INFORMATION IN YOUR RESPONSE TO THIS ATTACHMENT K – ADDITIONAL SCORED RESPONSE DOCUMENT. AS1: Continuous Voice Biometric Technology: Contractor shall provide an overview of its continuous voice biometric technology, detail the enrollment process and the continuous verification of the inmate’s voice. This feature must be an integrated part of the ITS and shall include analytical tools and reporting. SECURUS HAD READ, UNDERSTANDS AND COMPLIES. Developed by JLG Technologies, now owned and operated by Securus Technologies Inc., Investigator Pro is a powerful evidence-gathering and investigative analysis tool that is proven and in use in facilities nationwide making corrections officers and communities safer every day. Investigator Pro is integrated with SCP and uses unprecedented state-of- the-art technology to “identify” the voices of all inmates speaking on telephone calls and exposes inmates who try to beat the system by hiding their identities using other inmate’s Personal Identification Numbers (PINs) to engage in criminal activity. GDC Inmate Telephone Service RFP Additional Scored Response Document Page 1 Securus Technologies announced the acquisition of JLG Technologies on June 11, 2014. JLG Technologies, LLC is the leading supplier of continuous voice biometric analysis and investigative tools to the corrections and law enforcement sectors. "We are very happy to be able to combine with JLG Technologies, LLC and their affiliates – Voice Analytics, LLC and JLG ICER Technologies, LLC," said Richard A. ("Rick") Smith, Chief Executive Officer of Securus Technologies, Inc. "They have the best continuous voice biometric technology in our industry – very sophisticated software that not only identifies unauthorized users on a particular call, but goes on to identify the user's identification." JLG Technologies, LLC currently has over 40 active patent applications at the U.S. Patent Office and expects the first of them to be issued within 12 months – so they have developed a valuable intellectual property portfolio." Investigator Pro Continuous Voice Identification (CVI) Investigator Pro’s advanced voice identification technology was originally developed for the U.S. Department of Proven Inmate Defense. The Department of Defense was facing a huge Telephone challenge which was to find terrorist phone calls out of the System millions of phone calls made every day to and from the Reliable United States. The U.S. DOD contracted with a major U.S. Investigative Results technical university with some of the best voice analysis Proven Investigative engineers in the world to find a way to detect the phone Tools calls. Over a 12 year period the engineers created a system to automatically monitor and analyze millions of daily phone calls and delivered a cutting-edge solution which today serves to help protect the U.S. Investigator Pro analyzes inmate call voices immediately after the call has been completed. Alerts are instantly available to investigators in the real time status screen at the completion of each voice analysis. Every second of every call is analyzed. Investigator Pro does not use intermittent verification because this type of identification allows inmates to converse undetected by passing the telephone when the verification is prompted. The Investigator Pro gleans a vast amount of data from the continuous biometric voice identification technology that can provide a wealth of high value intelligence information. The system is easy to use and all training is provided initially and throughout the term of the agreement to ensure your officers get the most value from the system. As an additional benefit, Securus is the ONLY provider that can take that intelligence and import it into our industry leading THREADS investigative tool so that investigators have a full view of connections between conversations and inmate activities. GDC Inmate Telephone Service RFP Additional Scored Response Document Page 2 When used in unison with our other capabilities such as location based services and managed access services to control and monitor cellular telephone usage, customers are put in the best possible position to provide truly secure inmate communications. CVI Actionable Intelligence The Investigator Pro voice biometric identification system goes beyond continuous verification of one inmate’s voice. InvestigatorPro continuously verifies the identity of all inmate voices that are speaking on a telephone call. Reporting of this fraudulent activity can easily be found with the QuickFind reporting tool. When accessing the QuickFind dashboard system, investigators will be presented with the “High Target Calls for Review” report showing the PIN that was used, the name or names of inmates whose voice print was identified during the call and name(s) of inmate that did not match the PIN being used. The High Target Calls for Review report provides actionable intelligence by highlighting suspicious calls to make the most of an investigator’s time. The system provides investigators with direct links to these recordings where inmates are attempting to hide their identity and provides the tools to review and annotate those conversations for further use in investigations. Securus calls our service, Continuous Voice Identification (CVI) because we identify and report each inmate on the call and give you the names of the inmates. We do not just continually verify the inmate’s voice during the call. Most of our competitors can only continuously verify the voice of one inmate during the call and cannot report the identity of a second or third inmate that participated on the same telephone call. The system’s easy-to-use dashboard automatically collects and analyzes a vast amount of information that would otherwise be labor-intensive to gather and interpret. This breakthrough technology changes the way evidence is gathered, shared, and used in the investigation and prosecution process. The Investigator Pro system provides the highest level of integrity, efficiency, and demonstrated effectiveness as an evidence case- management tool. Anatomy of Investigator Pro™ Investigator Pro comes with an advanced Call Player, multiple reports, and even an interactive dashboard – all designed to provide investigators with the tools they need to exposes inmates who try to beat the system by hiding their identities to engage in criminal activity. The modules in Investigator Pro include: . QuickFind™ – Puts critical information at your fingertips . Voice Search™ – Find calls where inmate’s voice is found . CallFinder™ – Filter calls based on dozens of criteria . MyCallReview™ – Return to the calls important to you . Suspicious CallFinder™ – Find all high-suspicion calls using analytics to make more of an investigators time GDC Inmate Telephone Service RFP Additional Scored Response Document Page 3 . NoteManager™ – View, filter, and create notes on calls . ReportMaker™ – Run reports on various telephone system abuses . Stats – View key messages and monitor analysis progress Sample Investigator Pro Modules CVI CallPlayer Pro As displayed in the screen print above, one of the most utilized modules of the CVI system is the CallPlayer Pro. This playback system gives you the power to play and annotate calls faster, with less duplication of effort by providing playback controls to split audio talk paths, speed up conversations or eliminate pauses. The system provides the following features: . Ability to separate recorded voices and select only one voice to play back at a time . Speed or slow a conversation or single voice within a recording . User friendly playback module with intuitive buttons . Saves time, allowing for more productive use of staff time, better distribution of staff resources, and cost savings . Report feature allows for supervisory oversight, accountability, and assessment of your staff’s investigative skills and activities The use of the Call Player Pro can reduce a ten minute call, with all pauses removed and use of the other tuning adjustments, into a five minute call doubling the use of time spent on recordings. GDC Inmate Telephone Service RFP Additional Scored Response Document Page 4 Enrollment Process The enrollment process is a vital part of securing a one time, high quality voiceprint from inmates. The two most important elements of any successful voice biometric identification system are excellent technology and supervised voice enrollment. Our enrolment process is proven in a large scale DOC environment as Securus very recently implemented Investigator Pro for the State of Pennsylvania Department of Corrections (PA DOC). The PA DOC awarded Securus their ITS contract late in 2014, as part of the transition from their existing vendor GTL and the installation of the Securus SCP and Investigator Pro solution,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    208 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us