SlideShare a Scribd company logo
1 of 21
The Winter 2012 Biometrics Summit
Miami, FL February 27 – March 1, 2012




    Identifying Prisoners And Visitors
                   Using
              Localized AFIS

 Mizan Rahman              Jim Rokosky
  Founder & CEO          Sr. VP, DSI Operations
 M2SYS Technology     Global Tel*Link Corporation
Who are we?
M2SYS Overview

• Biometric R&D company focus on technology innovation
  for rapid biometric adoption
• Winner of 2007 Frost & Sullivan Biometrics Technology
  Innovation of the Year Award
• Winner of 2011 Frost & Sullivan New Product Innovation
  Award
• Primary Markets Served: Public Safety – Law
  Enforcement, Electoral, Healthcare, Banking, Education,
  POS, Childcare, Transportation, Workforce Management,
  Membership Management, Application Security
• Tens of Thousands of Customer Deployments in 100
  Countries Worldwide
GTL Overview – Nationwide Presence
   Leading provider of telecom and technology products and services in the corrections industry
   Provides network based collect and prepaid call processing and digital recording infrastructure
    platforms in conjunction with monitored telecommunications systems
   Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties
   Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest




                 GTL DOC Customer
                 GTL with no DOC




                                            GTL Confidential and Proprietary                           4
M2SYS & GTL - Synergy

                                     Visitor
                                   Management




                      Biometrics



                                             Inmate
                                           Management




• M2SYS focuses on biometrics and enabling software providers to
  rapidly integrate biometric functionalities
• GTL focuses on providing end-to-end solutions for prisons
What brings us together ?
Statistics from DOJ

• Of the 272,111 persons released from prisons in 15
  States in 1994, an estimated 67.5% were rearrested
  for a felony or serious misdemeanor within 3
  years, 46.9% were reconvicted, and 25.4%
  resentenced to prison for a new crime.
• The 272,111 offenders discharged in 1994 accounted
  for nearly 4,877,000 arrest charges over their
  recorded careers.
• Sex offenders were less likely than non-sex offenders
  to be rearrested for any offense –– 43% of sex
  offenders versus 68% of non-sex offenders.
The Magic Number


                     ~ 40%
Almost 40% of the prison population are repeat offenders. Some of our
clients came up with a perfect euphemism for these offenders – “The
frequent flyers”


• The same criminals are coming back to the jails over and over again
• The same visitors are also coming back over and over again
Releasing the wrong inmate



                                          Releasing officer fails
  Swap badge with       Pretend to be      to prevent because
 someone else being   someone else with   of ethnic diversity or
     released            false badge          sophisticated
                                                execution
Need for localized AFIS

  1     • Prompt identification of
          returning offenders


  2     • Release the right inmate
          not his friend


  3     • Ensure security & prompt
          visitor processing
What drives the successful
         implementation?

• Fully integrated solutions
• Merge both companies           Integrated    Usability
  expertise to understand
  end user culture and deliver
  exactly what is needed not
                                 Versatility   Training
  what we want to sell
Challenges
• Age of users                              • Intuitive design
• Working class                             • User feedback
                                            • Footprint




                  Demography   Ergonomics




                   Weather        Cost

• Cold                                      • Biometric module
• Dry                                         can’t be more
• Wet                                         expensive then
                                              main JMS system
Who is using it?

M2SYS & GTL together deployed our integrated solutions in
  over 100 jails, managing millions of biometric records.



            Country                           Project
  Prominent private correction   70 Jails, centrally connected
  facility
  Dekalb County, Atlanta, GA     3,500 beds – largest jail in the
                                 South
Future…



                                        Adoption


                     Collaboration
                   (cloud biometrics)
                    Regional Data
                       Sharing
More integration
(medication
dispensing, move
ment tracking)
M2SYS’s Strategy
Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that
supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with
any of these biometric modalities, ensuring near 100% read rates for any biometric
technology implementation.
                                                Features/Benefits:
                                                • One integration provides access to an
                                                  enterprise-ready, Hybrid Biometrics™
                                                  system
                                                • Immediately utilize fingerprint, finger
                                                  vein, palm vein, and iris recognition
                                                • Unlike four, separate low-level
                                                  SDKs, Hybrid Biometric Platform™ is
                                                  pre-built, scalable, easily integrated, and
                                                  lowers total cost of ownership
                                                • Ensure 100% read rates, regardless of
                                                  environmental, demographic, or other
                                                  factors that negatively impact some
                                                  forms of biometrics
GTL’s Strategy

                                    Latest Correctional
                                     Applications and Consumer
                                     Payment Technology
                                    Products/Services that
                                     Increase Call Volume and
                                     Improve Satisfaction
                                    Tools that Increase
                                     Efficiency and Effectiveness
                                     of Investigations
                                    Applications that Increase
                                     Efficiency and Effectiveness
                                     for the DOC and Friends
                                     and Families




GTL Confidential and Proprietary                 20
Thank You

(Questions?)

More Related Content

More from M2SYS Technology

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

More from M2SYS Technology (10)

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 

Recently uploaded (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Identifying Prisoners and Visitors using Localized AFIS

  • 1. The Winter 2012 Biometrics Summit Miami, FL February 27 – March 1, 2012 Identifying Prisoners And Visitors Using Localized AFIS Mizan Rahman Jim Rokosky Founder & CEO Sr. VP, DSI Operations M2SYS Technology Global Tel*Link Corporation
  • 3. M2SYS Overview • Biometric R&D company focus on technology innovation for rapid biometric adoption • Winner of 2007 Frost & Sullivan Biometrics Technology Innovation of the Year Award • Winner of 2011 Frost & Sullivan New Product Innovation Award • Primary Markets Served: Public Safety – Law Enforcement, Electoral, Healthcare, Banking, Education, POS, Childcare, Transportation, Workforce Management, Membership Management, Application Security • Tens of Thousands of Customer Deployments in 100 Countries Worldwide
  • 4. GTL Overview – Nationwide Presence  Leading provider of telecom and technology products and services in the corrections industry  Provides network based collect and prepaid call processing and digital recording infrastructure platforms in conjunction with monitored telecommunications systems  Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties  Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest GTL DOC Customer GTL with no DOC GTL Confidential and Proprietary 4
  • 5.
  • 6. M2SYS & GTL - Synergy Visitor Management Biometrics Inmate Management • M2SYS focuses on biometrics and enabling software providers to rapidly integrate biometric functionalities • GTL focuses on providing end-to-end solutions for prisons
  • 7. What brings us together ?
  • 8. Statistics from DOJ • Of the 272,111 persons released from prisons in 15 States in 1994, an estimated 67.5% were rearrested for a felony or serious misdemeanor within 3 years, 46.9% were reconvicted, and 25.4% resentenced to prison for a new crime. • The 272,111 offenders discharged in 1994 accounted for nearly 4,877,000 arrest charges over their recorded careers. • Sex offenders were less likely than non-sex offenders to be rearrested for any offense –– 43% of sex offenders versus 68% of non-sex offenders.
  • 9. The Magic Number ~ 40% Almost 40% of the prison population are repeat offenders. Some of our clients came up with a perfect euphemism for these offenders – “The frequent flyers” • The same criminals are coming back to the jails over and over again • The same visitors are also coming back over and over again
  • 10. Releasing the wrong inmate Releasing officer fails Swap badge with Pretend to be to prevent because someone else being someone else with of ethnic diversity or released false badge sophisticated execution
  • 11.
  • 12.
  • 13.
  • 14. Need for localized AFIS 1 • Prompt identification of returning offenders 2 • Release the right inmate not his friend 3 • Ensure security & prompt visitor processing
  • 15. What drives the successful implementation? • Fully integrated solutions • Merge both companies Integrated Usability expertise to understand end user culture and deliver exactly what is needed not Versatility Training what we want to sell
  • 16. Challenges • Age of users • Intuitive design • Working class • User feedback • Footprint Demography Ergonomics Weather Cost • Cold • Biometric module • Dry can’t be more • Wet expensive then main JMS system
  • 17. Who is using it? M2SYS & GTL together deployed our integrated solutions in over 100 jails, managing millions of biometric records. Country Project Prominent private correction 70 Jails, centrally connected facility Dekalb County, Atlanta, GA 3,500 beds – largest jail in the South
  • 18. Future… Adoption Collaboration (cloud biometrics) Regional Data Sharing More integration (medication dispensing, move ment tracking)
  • 19. M2SYS’s Strategy Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with any of these biometric modalities, ensuring near 100% read rates for any biometric technology implementation. Features/Benefits: • One integration provides access to an enterprise-ready, Hybrid Biometrics™ system • Immediately utilize fingerprint, finger vein, palm vein, and iris recognition • Unlike four, separate low-level SDKs, Hybrid Biometric Platform™ is pre-built, scalable, easily integrated, and lowers total cost of ownership • Ensure 100% read rates, regardless of environmental, demographic, or other factors that negatively impact some forms of biometrics
  • 20. GTL’s Strategy  Latest Correctional Applications and Consumer Payment Technology  Products/Services that Increase Call Volume and Improve Satisfaction  Tools that Increase Efficiency and Effectiveness of Investigations  Applications that Increase Efficiency and Effectiveness for the DOC and Friends and Families GTL Confidential and Proprietary 20