The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Introducing.

Slides:



Advertisements
Similar presentations
An Indispensable Quality Assurance Tool for Dairy Processing Plants.
Advertisements

Location Monitoring Program in the Federal Courts
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
How to Solve Test Problems Test Taking Strategy
Conducting Income Survey’s Indiana Office of Community and Rural Affairs “Serving Indiana’s rural communities through technical, financial and personal.
Importing Transfer Equivalencies: How to Maximize Efficiency How Columbia College Office of Registrar improved productivity through third party solutions.
Welcome to the CFC Assistant Webinar We will be using the phone bridge today. – The call-in number is: – The Passcode is:
Inmate Phone RFP Protest
CrimeLink Explorer: Lt. Jennifer Schroeder Tucson Police Department Jie Xu University of Arizona June 2, 2003 Using Domain Knowledge to Facilitate Automated.
ICASAS305A Provide Advice to Clients
PHONEXIA Can I have it in writing?. Discuss and share your answers to the following questions: 1.When you have English lessons listening to spoken English,
Today’s Goals Concepts  I want you to understand the difference between  Data  Information  Knowledge  Intelligence.
Business Intelligence Michael Gross Tina Larsell Chad Anderson.
Chapter 12: Intelligent Systems in Business
1 Making the Case for Speech Recognition in the Legal Environment Dragon ® NaturallySpeaking ® Legal from Nuance.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
Marketing CH. 4 Notes.
Actionable Intelligence via Speech Analytics
VIRTUAL BUSINESS RETAILING
© 2010 Nexidia Inc. CONFIDENTIAL. DO NOT DISTRIBUTE Nexidia ESI—Quality Strategic performance management through advanced speech analytics.
Business Communications & Presentations.  Numbers are so much a part of your life that you probably pay little attention to them:  “The unemployment.
Gaining Full-Time Employment Unit 2 – Task 20 Abbie Llewellyn.
HomeAway Confidential© 2009 HomeAway. All rights reserved. The Art of Getting Positive Reviews Antonio Bortolotti Founder, Vacation Rentals Secrets – Fully.
Computational Methods to Vocalize Arabic Texts H. Safadi*, O. Al Dakkak** & N. Ghneim**
1 I n t u i t C o n f i d e n t i a l Construction Estimating Software Jeff Gerardi | President | Solution Introduction.
 Much of the information needed by an organisation comes from within the organisation, and the organisation’s IT systems can be used to extract this.
Beyond Call Recording: Speech Improves Quality Assurance Larry Mark Chief Technology Officer SER Solutions, Inc.
Turning Audio Search and Speech Analytics into Business Intelligence.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
When Experts Agree: Using Non-Affiliated Experts To Rank Popular Topics Meital Aizen.
Access 2013 Microsoft Access 2013 is a database application that is ideal for gathering and understanding data that’s been collected on just about anything.
Emission Inventory Quality Assurance/Quality Control (QA/QC) Melinda Ronca-Battista ITEP/TAMS Center.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Stanford University, Fall 2006 Persuasive Technology & Ribbit Murad, Brian, Dahwun, Yeong Slide #1 Ribbit A conceptual.
Presenter: Shanshan Lu 03/04/2010
Managing the Application Development. How system project Begun Information system applications originate from virtually all areas of firm and relate to.
WebFOCUS Magnify: Search Based Applications Dr. Rado Kotorov Technical Director of Strategic Product Management.
Marketing Research Approaches. Research Approaches Observational Research Ethnographic Research Survey Research Experimental Research.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
 LAN ◦ A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization.  WAN ◦ A WAN (Wide Area.
Hello, Who is Calling? Can Words Reveal the Social Nature of Conversations?
State of Washington Customer Management Staff Level Training Presentation.
COST OF INFORMATION. Cost of Information Information has a number of different costs. What are the costs of obtaining good quality information? 1. Financial.
Writing Overview. What to expect in the writing section… 2 tasks (1 independent tasks and 1 integrated tasks). – Integrated task: You will real a
Did I say that?? Speech Lab Spring 2009 February 03, 09 1 Montgomery College Did I Say That? Did I Say That? Automatic Keyword Spotting Using Crosscorrelation.
Jean-Yves Le Meur - CERN Geneva Switzerland - GL'99 Conference 1.
Quality Management in the Contact Center: Are you Listening to your Customers? February 25, 2016.
© 2014 Verint Systems Inc. All Rights Reserved Worldwide. Confidential and proprietary information of Verint Systems Inc. © 2016 Verint Systems Inc. All.
PREPARED BY MANOJ TALUKDAR MSC 4 TH SEM ROLL-NO 05 GUKC-2012 IN THE GUIDENCE OF DR. SANJIB KR KALITA.
Representing Individuals Nationwide Free Consultation U.S. Customs and Money Seizure Many American citizens traveling abroad are unaware of.
Solving the Twitter Home Feed Noise Problem by Qweboo Qweboo – A better way to keep up to date with your interests on Twitter.
Speaker Recognition UNIT -6. Introduction  Speaker recognition is the process of automatically recognizing who is speaking on the basis of information.
Lecture-6 Bscshelp.com. Todays Lecture  Which Kinds of Applications Are Targeted?  Business intelligence  Search engines.
Module 4 – Key Planning Topics Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Data Mining for Expertise: Using Scopus to Create Lists of Experts for U.S. Department of Education Discretionary Grant Programs Good afternoon, my name.
MIS Integration Set out expectations – overview of concepts. This isn’t a technical how-to guide – is too platform specific. Will be looking at the concepts.
The Measurement of Crime
Lecture 1: Introduction and the Boolean Model Information Retrieval
Session 23 Curriculum Vitae Preparation and Maintenance 50 Minutes
Simple and intuitive fare conditions
ProMax Outbound Call Tracking.
Speech Capture, Transcription and Analysis App
System Testing.
Chapter 2 The Incidence of Crime
Presented by Matt Simmonds, President Simtech Solutions Inc.
Presentation transcript:

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Introducing Call IQ The Intelligent Way to Monitor Calls

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Can I effectively investigate inmate calls? Overview of the Call Investigation Problem What is available to help solve my issue? How can I make gathering intelligence easy? Interesting facts about Call IQ

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Overview of the Call Investigation Problem Inmate telephone calls are recorded for future monitoring of criminal activities in most facilities The majority of facilities do not have enough staff to listen to all recorded calls. For example, the Federal BOP listens to less than 4% of all recorded calls. In a typical 500 bed jail, 166 fifteen minute calls will be recorded each day. This equates to 42 hours of recorded phone conversations On average, for every 1,000 inmates in a correctional facility, it would take nearly six investigators to listen to all of the inmates' calls each day Many facilities this size have no more than one or two investigators listening to recorded calls, meaning that many calls containing valuable information are ignored. The manpower required to increase the percentage of calls monitored by a fraction would be prohibitively expensive in terms of labor costs.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Overview of the Call Investigation Problem Like many criminal justice agencies, correctional institutions are sitting on a potential gold mine of information that is not being used. Inmate telephone calls contain information that is useful for both tactical and strategic intelligence. Inmate phone calls show evidence of drug dealing, witness intimidation, gang activities, and reveal the names of snitches and drug dealers, etc. To a lesser but equally important extent, recordings can contain evidence of terrorist recruitment and conversion to radical Islam. However, not all calls contain criminal activity so officers do not know which calls are important to listen to. They typically randomly select calls. The odds of uncovering criminal activity in recordings by randomly selecting calls can be as low as 3%.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Current Solutions Until now, the only solutions to this problem have been: Randomly select calls to monitor Throw more people at the problem Only listen to recordings for inmates suspected of engaging in criminal activity Monitor calls as a result of information provided by outside investigative agencies (AG, DA, Drug Task Force, etc) As a result of failing to effectively monitor all inmate calls, inmates often speak freely to called parties since there is little risk of being caught by engaging in criminal activities over the phone.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Speech Recognition / Audio Mining – Why Past Attempts Have Failed Until now speech recognition has not worked very well for inmate telephone calls. Most commercially available speech recognition systems are trained using language that is not typical of the language that inmates use. They consist of relatively small vocabularies (<10,000 words) that are most commonly used in every day language. There is a misconception that speech recognition has to be 100% accurate in order for it to be useful. But that is true only if the goal is perfectly accurate automated transcription. Gathering meaning or topics from conversations does not require 100% accuracy. The goal is to accurately tag telephone calls that discuss certain topics or phrases for further investigation. To do that we need to train speech recognition to respond to prison, gang and drug slang. We also need to be able to query telephone calls for phrase types without necessarily knowing the exact words. Simple keyword searches cannot do this.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link There Has to Be a Another Way! Call IQ is a better solution! Call IQ is a totally automated system that can: Automatically identify calls that contain criminal activity so you do not have to sort through calls that contain normal conversations. Further identify calls that contain specific criminal activity (drugs, weapons, violence, etc.) so that you only listen to calls containing the criminal activity you are looking for. Enable the investigator to listen only to the parts of the recorded conversation relevant to criminal activities and ignore the rest. Furthermore investigators can review transcripts where certain phrases were uttered without having to listen to the call. Enable an investigator to identify third party call completions and attempts and in many cases identify the phone number of the third party. Investigators can navigate directly to the point in the conversation where the third party call took place. All of this allows one investigator to process a minimum of ten times the number of calls they can effectively listen to now by prioritizing and identifying calls containing criminal activity. Increase the odds of uncovering criminal behavior in recordings to as high as 75%.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link How Does It Work Today? Automatically transcribes inmate recordings (Voice to Text) with no human intervention. Automatically extracts meaning from recordings and flags calls that contain criminal activity and should be further investigated. Provides much more than simple keyword searches by allowing an investigator to Search by topic (i.e.. drugs, weapons, bodily harm, radical religious conversion, etc.) Furthermore, since everything is indexed within a database, searches return results very quickly. Uses an expert-derived dictionary of slang terms for each topic so investigators search for a topic and the system automatically searches slang terms (ex. A search for ‘cocaine’ will also search recordings for ‘snow’, ‘white powder’, ‘blow’, etc.). Provides continuous updates of slang dictionaries and custom phrases entered by law enforcement experts and may also be customized by end-users. Contains a supervised learning system that gains more accuracy in converting voice to text over time A system solely designed to enable investigators to spend more time analyzing and evaluating information rather than gathering information

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link What is Call IQ Exactly? Utilizes state of the art speech recognition technology, capable of language models with a vocabulary of over 64,000 words. Based on language models developed by GTL that are unique to corrections and provide the greatest degree of accuracy for inmate telephony. All training of the speech recognition system was done using actual inmate telephone calls. Extensive research was conducted to compile an expert-derived dictionary of prison, gang, drug and other terms and phrases. These were then incorporated into the language model. With Call IQ speech recognition is just the first step. All calls are post-processed to attach topics, phrase types and custom phrases, and to extract telephone numbers. All processed calls are instantly searchable, either via keywords, or by topic, phrase or custom word. The language model and slang dictionaries will be continuously updated, providing increased accuracy and new phrases over time.

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link See it in Action!

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Query Form

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Transcript View

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Topic View

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Inmate View

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Map View

The information contained herein is CONFIDENTIAL and is not to be used or distributed in any manner without the express consent of Global Tel*Link Interesting Facts Call IQ has been in operation in correctional facilities for several years now. During that time we have amassed a massive database of inmate telephone calls that have created the backbone of our service- how massive you ask? Here are the figures: Call IQ now has a database consisting of 7.75 Million calls! This amounts to nearly 1.5 Million hours of recordings! All of these recordings are instantly searchable! Right now, it would take about 950 years to listen to all of these calls manually! It is this massive database that enables us to refine and develop our language models to provide better and better transcription quality and intelligence analysis. No other service comes close to having this much targeted information at their disposal.