In today's rapidly evolving correctional environment, the initiation of Telmate Verified marks a transformative step in inmate communications, demonstrating a significant leap forward in the pursuit of safety and efficiency. Designed with the unique needs of investigators in mind, this automated identity verification system is seamlessly integrated into every Telmate installation, providing an unprecedented level of transparency and insight into the web of interactions surrounding inmates. Notably, the Telmate system, bolstered by this innovative technology, allows for the tracking and processing of an extensive array of user actions including phone calls, video visits, and messages, thereby empowering investigators to conduct more thorough and effective probes into criminal networks. The sophistication of Telmate Verified lies in its ability to craft automatic user dossiers, thereby offering investigators a more nuanced understanding of the individuals they're scrutinizing, beyond just the basic data. This facilitates the undeslivered unveiling of complex relationships, gang alliances, and potential evidential leads that might have otherwise remained obscured. Moreover, in addressing the critical challenge of transparent and accurate identity verification—where traditional modes fall short—Telmate Verified stands out as a beacon of innovation, ensuring every contact within the correctional system is accounted for, and thereby significantly tightening the net around potential criminal activities. As such, Telmate Verified not only enhances the capabilities of law enforcement officials but also introduces a new era in the realm of corrections management, where clarity, efficiency, and security are paramount.
Question | Answer |
---|---|
Form Name | Telmate Verify |
Form Length | 8 pages |
Fillable? | No |
Fillable fields | 0 |
Avg. time to fill out | 2 min |
Other names | telmate verified form, intelmate com, phone verify at intelmate, intelmate login |
TELMATE VERIFIED
Six Degrees of Identification
THE CASE FOR TELMATE VERIFIED AND TRANSPARENT IDENTITY VERIFICATION
TRANSFORMING INMATE COMMUNICATIONS
Table of contents
Telmate Verified and Telmate Investigator tools defined |
pg 03 |
Challenges: when inmates communicate, who |
|
are they really connecting with? |
pg 03 |
Complexities of investigation today |
pg 04 |
Telmate and rapid innovation |
pg 05 |
How Telmate Verified creates automatic user dossiers |
pg 05 |
Benefits of Telmate Verified |
pg 06 |
Better tools make better investigators |
pg 07 |
Standard Telmate Investigator workflow |
pg 08 |
telmate verified | | 2
Telmate Verified: Designed by Investigators for Investigators
Telmate Verified and Telmate Investigator tools defined
Telmate Verified is an automated identity verification system included in every Telmate installation that authenticates all users. It is the core of Telmate Investigator, our
of tools. Telmate Verified is the technology additive that optimizes the performance of Telmate Investigator, allowing the tools to track and process every action including phone calls, deposits, video visits, messages, and shared photos.
Telmate Verified makes it possible for investigators to strengthen the acuity of their investigations and go
Our advanced investigator tools work in tandem with Telmate Verified to search, extract and decipher data, turning inmate’s personal networks and crumbs of information into usable insights that help investigators connect the dots, and unlock unprecedented crime fighting intelligence. With a database of hundreds of thousands of verified users, investigators can search warrants, flag deposits, unravel gang alliances and find new evidence to incriminate suspects under investigation.
Telmate Verified empowers investigators by giving them the ability to uncover unknown relationships and positively identify their suspect, which is one of the most crucial processes and steps in a criminal investigation. It also provides
Challenges: When inmates communicate, who are they really connecting with?
Finding suspects who have a criminal record or a warrant is easy, but investigators report the real challenge is finding the often invisible connections – those people who are “off the radar.”
Connections mean nothing if you don’t know the identity of the individual who is out there having contact with an inmate. It’s not about what device is connected to what device; it’s about which person is connected to which person; and the person the device is attached to.
telmate verified | | 3
Today, there are thousands of tools available to analyze
Within a jail or prison, there are myriad ways that inmates, friends, family and even staff, connect — including phone calls, video visits, deposits, messages, photo sharing, commissary orders, requests, grievances, and more. The sheer amount of individuals and possible combinations of connections through these various channels becomes staggering, especially when an investigator is trying to uncover clues and key relationships.
While most inmate communication systems track some user identities, Telmate Verified is the only system in corrections that literally makes it possible to track every user and every action within the Telmate system. In short, Telmate Verified tells investigators: who did what, when, and from where. This means that investigators know that “Paul” called “Mary” (Paul is an inmate and Mary is a Telmate Verified friends and family member in the Telmate system) from Facility X. And that in an instant, the investigator can know that Paul, who was booked on drug charges, was using a phone, in Pod 4, to contact Mary, who called from San Diego, CA, and who is also connected with another known drug dealer in the same facility. With Telmate Verified what was a hunch now becomes empirical fact.
Complexities of investigation today
For years, traditional police work has been carried out with
Today investigators are dealing with ever growing numbers of cases and complex evidence sources. These investigators are often overworked with too many piled up cases, and in need of more than traditional investigator tools to stay ahead of criminal activity.
The traditional linear approach to
As to why investigators benefit when they implement technology like Telmate Verified and Telmate Investigator. For example, the addition of Telmate Verified technology acts as a powerful force multiplier, giving one investigator the strength and capability of five investigators. And investigators quickly realize the benefits of technology in ways they
telmate verified | | 4
never imagined possible. Nearly all investigators report that once they start being adopters of
Telmate and rapid innovation
Telmate introduced technology into the corrections industry at a swift pace. We began by modernizing phone communications and rapidly expanded into today’s business, which includes secure forms of what we mostly use in our modern,
As a result of Telmate’s expansion, we have accumulated a significant amount of big data around criminal human networks. This human network behind crime is immensely valuable to investigators. Recognizing that advantage, Telmate has gone a step beyond any other corrections provider in the industry with Telmate Verified, to ensure that we have rich data on the identity of every person within the criminal network. In other words, we know and have verified the identity of every person that comes into our system.
Why does Telmate do this? There are a number of reasons. For example: Telmate Verified makes it easy to discover attempted or ongoing criminal behavior early on, allowing us to intervene and take appropriate action. Telmate Verified can prevent extortion and money laundering, while having the positive side benefit of crime reduction. In addition to crime prevention and reduction, the information we obtain is a treasure trove to investigators.
How Telmate Verified creates automatic user dossiers
From the initial point of contact to every subsequent interaction, Telmate Verified is automatically building comprehensive user dossiers. Each different point of contact into the Telmate system brings more information and continues to fill in a dynamic, rich data picture for investigators. This information is then confirmed and verified by third party sources, ensuring that the information provided is correct.
Information collection begins at account creation. When friends and family of an inmate want to receive calls, deposit funds, leave a voicemail, or schedule a video visit, they are first prompted to create an account through one of the following Telmate touch points:
-At a facility lobby kiosk
-Over the phone
-Online at www.GettingOut.com
telmate verified | | 5
As a result, from moment one Telmate Verified begins to harvest data and connect each user with inmates.
At the Kiosk
When an individual creates an account at the lobby kiosk, they must scan or swipe the front/ back of a photo ID, typically a drivers license. At this touchpoint, Telmate Verified harvests additional information such as:
Over the Phone
When an individual creates an account over the phone, they are required to go through an automated process confirming their identity by answering a series of questions that are matched against a national database and background checks. At this touchpoint, Telmate Verified harvests:
Online at GettingOut Website
When an individual creates an account online, they are required to provide a valid credit card. At this touchpoint, Telmate Verified harvests:
Once a user has created an account and becomes Telmate Verified, additional information is constantly being updated and gathered through any subsequent interaction they have with the Telmate system. For example, if a user makes any type of connection with an inmate, uses a new credit card, scans a new ID, or has a new photo taken at a kiosk, Telmate Verified automatically adds the information to the user profile, which bolsters the individual’s overall data picture. With our system, typically in only a few weeks of standard deposits, phone calls, visits and messages, Telmate Verified creates a user dossier that used to take investigators months to amass.
Benefits of Telmate Verified
When investigators use Telmate Verified and associated investigator tools, they bring speed, precision, efficiency and quality to their facility and investigations, while experiencing the following benefits:
Location and Linkage
“Telmate Verified has become an essential tool for our facility and the Investigations division in gathering intelligence on criminal activity as well as locating and linking individuals
telmate verified | | 6
together who have previously been off of the Law Enforcement radar. It has the ability to provide a snapshot of associated individuals who may be involved in activities of interest that cannot be discovered otherwise.”
— Matt Martin, Dekalb County Sheriff’s Office
Identity and Intelligence
“The Covington County Sheriff’s Office uses Telmate Verified to gather intelligence and uncover covert operatives within our community. We believe it provides an excellent investigative tool to our investigators and jail staff to build and solve criminal cases. The technology that Telmate provides us is surpassed by none that I have encountered and we as an agency are thankful for that.”
— David Anderson, Covington County Sheriff’s Office
Time Savings
“Caseloads for investigators in Lake County have doubled in 5 years, I can’t simply rely on my old proven methods, I’ve now added to my tool chess, technology like Telmate Verified to stay ahead of crime.”
—Detective Sergeant Jamie Harris, Lake County
Evidence Gathering
“With the use of the Telmate system, I have made felony cases, solved felony cases, located needed evidence, identified witnesses, obtained incriminating statements from defendants, the list goes on and on.”
— Lieutenant Rick Archer, Decatur Police Department
Better tools make better investigators
We created Telmate Verified and Telmate Investigator, for investigators looking to use the best and most sophisticated set of tools in corrections today.
Our investigative system is the result of rapid and
Telmate is the
telmate verified | | 7
strategies in ways that were never before anticipated. Investigators want to solve crimes, protect communities and make the world a better place. They want tools to help carry out that mission. But traditional investigative work has lost its efficacy. With the Telmate system and its
Standard Investigator Workflow Using Telmate Investigator
Phase 1
OBJECTIVE
Get new case, gather background on person of interest, and identify all key actions and relationships.
TOOL USED Connections Tool to analyze inmate’s per- sonal network both in and outside facility.
Phase 2
OBJECTIVE
Look for anomalies in behavior and levels of association by com- piling inmate history.
TOOL USED Timeline Tool to filter and sort inmate data history such as video visits, deposits, mes- sages, and more.
Phase 3
OBJECTIVE Intercept covert infor- mation information by monitoring inmate calls with contacts.
TOOL USED
Phase 4
OBJECTIVE Continue building investigative data picture and credible case based on verifiable information and data.
TOOL USED Telmate Verified to track every user action in the Telmate system, connect the dots, and bolster investigation.
The typical investigation is not about X marks the spot, but X moving along the path toward successful conviction.
telmate verified | | 8