SlideShare a Scribd company logo
1 of 14
Download to read offline
CONTROL CONTRABAND
CELL PHONES WITHOUT
INVESTMENT

7”
6”
5”

#43567

#43651
#43828

Addressing management, expense,
controls, and recidivism considerations.

meshIP, LLC
www.meshIP.com
1.800.795.3195

4”
3”
SOLVING PROBLEMS

› meshIP
♦
♦
♦
♦
♦

HQ - DFW, Texas
Technology innovation
Integrated technology services
Important/unique partnerships
Serving private and public
operations

© 2011 meshIP, LLC
IT WOULD BE NICE TO DO IT LEGITIMATELY

› For today:
♦

♦

♦

A look at the past, while
looking to the future
New service options mean
new opportunities
More simply address
contraband for all parties
concerned

One prisoner's wife says her
husband regularly calls her
on a clandestine mobile. She
works evenings, so is unable
to talk to him through legal
channels. She accepts he is
breaking prison rules, but
believes regular contact is
important. I like to keep him
abreast of family life, involve
him in decision making, it
makes him feel part of the
family he is away from, she
says. But it would be nice to
do it legitimately.
Eric Allison, Guardian, May 17, 2011.

© 2011 meshIP, LLC
THE CRIMINAL CELL PHONE

› Current charges:
♦
♦
♦
♦
♦

Bribery
Smuggling
Extortion
Collusion
Espionage

› Says he’s innocent!

© 2011 meshIP, LLC
DEFENDING AGAINST THE CELL PHONE

›
›
›
›
›

Process
Personnel
Removal
Jamming controls
Others to come

© 2011 meshIP, LLC
CURRENT STRATEGY RESULTS

›
›
›
›
›
›
›

Costly
Inconsistent
Contentious
Divisive
Political
Promotes value of contraband
Problem not solved

© 2011 meshIP, LLC
REHABILITATION OF THE CELL PHONE

›
›
›
›
›
›
›

Embraces new rules
Follows the rules
Incentivizes others
Works with others
Transparent
Accountable
Enhances law enforcement

© 2011 meshIP, LLC
FUTURE PROOF
email &
media
options
coming

CONTROL OPTIONS
unique
device
appearance

various
minute
packaging

time of day
access

voice only
configs to
start

approved
call lists

recording
and
monitoring

inbound
and/or
outbound

© 2011 meshIP, LLC
EASY ACCESS AND STRICT CONTROLS
1

prepaid
accounts

2

meshDETECT™
pre-configured
secure phones

authorized
users dial

3

cellular network
connection

4

approved
call security

meshDETECT™
platform

5

approved
call connection

authorized
recipients
and/or authorized
inbound callers

6
secure access to:
recording - monitoring - forensics

© 2011 meshIP, LLC
THE MODEL SECURE CELL PHONE
›
›
›
›
›
›
›

Mature cell technologies
Adapted for hostile environments
Mirrors pay phone/wall phone systems
Automated inventory controls
D.O
Streamlined detainee access
.C.
Affordable communications
No burden on operations

© 2011 meshIP, LLC
THE VALUE OF SECURE CELL PHONE ACCESS

›
›
›
›
›
›
›
›

Increases access
Devalues contraband
Revitalizes current phones
Creates new applications
Improves detainee morale
Increases safety
Supports any agenda
Without investment expense

Readily available telephony
reduces smuggled mobile
phones. The number of
prisoners failing random
mandatory drug tests also
fell... fewer assaults, less
bullying and fewer incidents of
self-harm… the frequency and
quality of contact with their
families increased… a proven
factor in reducing the
likelihood that prisoners will
reoffend; consequently, an
improvement in rehabilitation.
Vicky O’Dea prison operations director

© 2011 meshIP, LLC
ROUND TABLE
›
›
›
›

Questions and answers
Let’s discuss your unique environment
Consider a trial deployment
Please share information with colleagues

© 2011 meshIP, LLC
CONTACT
Brian Byrne
1.800.795.3195 x201
BByrne@meshIP.com
www.meshDETECT.com

© 2011 meshIP, LLC
THANK YOU

› Please, let us know how to help!
© 2011 meshIP, LLC

More Related Content

Similar to Control Contraband Cell Phones Securely

Get an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic ServicesGet an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic ServicesICFECI
 
Telehealth and Medical Billing both Franchise Opportunity together at Low Cost
Telehealth and Medical Billing both Franchise Opportunity together at Low CostTelehealth and Medical Billing both Franchise Opportunity together at Low Cost
Telehealth and Medical Billing both Franchise Opportunity together at Low CostMichael Smith
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning sorabh2312
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11Irsandi Hasan
 
Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)dplsurve
 
Citcall : Real-Time User Verification with Missed-Call Based OTP
Citcall : Real-Time User Verification with Missed-Call Based OTPCitcall : Real-Time User Verification with Missed-Call Based OTP
Citcall : Real-Time User Verification with Missed-Call Based OTPTech in Asia ID
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
CharlesDionneResume.docx
CharlesDionneResume.docxCharlesDionneResume.docx
CharlesDionneResume.docxCharles Dionne
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignEleanor McHugh
 
Altigen Business Process Impact
Altigen Business Process ImpactAltigen Business Process Impact
Altigen Business Process ImpactKirkConvey
 

Similar to Control Contraband Cell Phones Securely (12)

Get an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic ServicesGet an Advance Cell Phone Forensic Services
Get an Advance Cell Phone Forensic Services
 
Lattice Inc. - Investor Presentation
Lattice Inc. - Investor PresentationLattice Inc. - Investor Presentation
Lattice Inc. - Investor Presentation
 
Telehealth and Medical Billing both Franchise Opportunity together at Low Cost
Telehealth and Medical Billing both Franchise Opportunity together at Low CostTelehealth and Medical Billing both Franchise Opportunity together at Low Cost
Telehealth and Medical Billing both Franchise Opportunity together at Low Cost
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11ITE v5.0 - Chapter 11
ITE v5.0 - Chapter 11
 
Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)Telephone Recorder (Buy or Rent!)
Telephone Recorder (Buy or Rent!)
 
Citcall : Real-Time User Verification with Missed-Call Based OTP
Citcall : Real-Time User Verification with Missed-Call Based OTPCitcall : Real-Time User Verification with Missed-Call Based OTP
Citcall : Real-Time User Verification with Missed-Call Based OTP
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
CharlesDionneResume.docx
CharlesDionneResume.docxCharlesDionneResume.docx
CharlesDionneResume.docx
 
Lattice (OTCQB:LTTC)
Lattice (OTCQB:LTTC)Lattice (OTCQB:LTTC)
Lattice (OTCQB:LTTC)
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
 
Altigen Business Process Impact
Altigen Business Process ImpactAltigen Business Process Impact
Altigen Business Process Impact
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Control Contraband Cell Phones Securely

  • 1. CONTROL CONTRABAND CELL PHONES WITHOUT INVESTMENT 7” 6” 5” #43567 #43651 #43828 Addressing management, expense, controls, and recidivism considerations. meshIP, LLC www.meshIP.com 1.800.795.3195 4” 3”
  • 2. SOLVING PROBLEMS › meshIP ♦ ♦ ♦ ♦ ♦ HQ - DFW, Texas Technology innovation Integrated technology services Important/unique partnerships Serving private and public operations © 2011 meshIP, LLC
  • 3. IT WOULD BE NICE TO DO IT LEGITIMATELY › For today: ♦ ♦ ♦ A look at the past, while looking to the future New service options mean new opportunities More simply address contraband for all parties concerned One prisoner's wife says her husband regularly calls her on a clandestine mobile. She works evenings, so is unable to talk to him through legal channels. She accepts he is breaking prison rules, but believes regular contact is important. I like to keep him abreast of family life, involve him in decision making, it makes him feel part of the family he is away from, she says. But it would be nice to do it legitimately. Eric Allison, Guardian, May 17, 2011. © 2011 meshIP, LLC
  • 4. THE CRIMINAL CELL PHONE › Current charges: ♦ ♦ ♦ ♦ ♦ Bribery Smuggling Extortion Collusion Espionage › Says he’s innocent! © 2011 meshIP, LLC
  • 5. DEFENDING AGAINST THE CELL PHONE › › › › › Process Personnel Removal Jamming controls Others to come © 2011 meshIP, LLC
  • 7. REHABILITATION OF THE CELL PHONE › › › › › › › Embraces new rules Follows the rules Incentivizes others Works with others Transparent Accountable Enhances law enforcement © 2011 meshIP, LLC
  • 8. FUTURE PROOF email & media options coming CONTROL OPTIONS unique device appearance various minute packaging time of day access voice only configs to start approved call lists recording and monitoring inbound and/or outbound © 2011 meshIP, LLC
  • 9. EASY ACCESS AND STRICT CONTROLS 1 prepaid accounts 2 meshDETECT™ pre-configured secure phones authorized users dial 3 cellular network connection 4 approved call security meshDETECT™ platform 5 approved call connection authorized recipients and/or authorized inbound callers 6 secure access to: recording - monitoring - forensics © 2011 meshIP, LLC
  • 10. THE MODEL SECURE CELL PHONE › › › › › › › Mature cell technologies Adapted for hostile environments Mirrors pay phone/wall phone systems Automated inventory controls D.O Streamlined detainee access .C. Affordable communications No burden on operations © 2011 meshIP, LLC
  • 11. THE VALUE OF SECURE CELL PHONE ACCESS › › › › › › › › Increases access Devalues contraband Revitalizes current phones Creates new applications Improves detainee morale Increases safety Supports any agenda Without investment expense Readily available telephony reduces smuggled mobile phones. The number of prisoners failing random mandatory drug tests also fell... fewer assaults, less bullying and fewer incidents of self-harm… the frequency and quality of contact with their families increased… a proven factor in reducing the likelihood that prisoners will reoffend; consequently, an improvement in rehabilitation. Vicky O’Dea prison operations director © 2011 meshIP, LLC
  • 12. ROUND TABLE › › › › Questions and answers Let’s discuss your unique environment Consider a trial deployment Please share information with colleagues © 2011 meshIP, LLC
  • 14. THANK YOU › Please, let us know how to help! © 2011 meshIP, LLC