System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions

ABSTRACT

A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No.14/945,145 filed on Nov. 18, 2015 which claims the benefit of U.S. Pat.No. 9,271,145 issued on Feb. 23, 2016, which claims the benefit of U.S.Pat. No. 8,478,234 issued on Jul. 2, 2013. The application claims thebenefit of U.S. Provisional Application No. 61/441,161 filed Feb. 9,2011 which is incorporated by reference in its entirety.

FIELD OF THE DISCLOSURE

The present disclosure is in the field of telecommunications services.More particularly, the present disclosure is in the technical field ofwireless telecommunications services provided to detainees in penalinstitutions.

BACKGROUND OF THE DISCLOSURE

Detainees in jails, penitentiaries and other penal facilities seekingtelephone contact with outside parties such as family members typicallyuse public pay telephones provided by the facilities. Such telephonesare located in common areas of a penal facility and provide littleprivacy for the detainee. Penal officers must oversee the movement ofdetainees to the telephone area. Officers also oversee a plurality ofdetainees waiting in line for telephone access in close contact witheach other, a situation presenting safety risks for officers anddetainees. Prison telephone usage is generally limited to outgoing callsonly that are usually collect to the called party and often expensive.

Pay telephones in penal facilities are also limited in number due tospace and cost limitations as well as manpower requirements associatedwith moving and guarding detainees using the phones. The limitedquantity of phones, long waiting lines, limited call duration, andsupervisory manpower requirements may result in higher financial andother costs to management of penal facilities. These factors alsonegatively impact detainee quality of life and safety of detainees andpenal employees.

Contraband mobile telephones have become an increasing problem in penalfacilities, further reducing penal facility earnings, compromisingsafety and presenting opportunities for penal employee corruption. Whilepenal officials have taken steps to reduce contraband mobile phones, theexpanded capabilities of small portable devices have made such devicesmore valuable to detainees. This has increased economic incentives forpenal employees to facilitate the smuggling and trafficking of thesedevices in prisons.

With a contraband mobile device that has Internet access, a detainee mayview telephone directories, maps and photographs for criminal purposes.Gang violence and drug trafficking are increasingly being managedonline, allowing persons in penal facilities to continue engaging incriminal activity while incarcerated. Traditional solutions such asblocking or jamming cell phone signals have proven impractical.

SUMMARY OF THE DISCLOSURE

In an embodiment, a system for controlling, monitoring, and recording ofwireless telecommunications services associated with penal institutionsis provided. The system comprises a portable electronic device and anapplication that, when executed on the portable electronic device,presents a listing of available call destinations based on receiving afirst instruction from a first authorized party in possession of theportable electronic device. The application also receives a secondinstruction comprising a choice of a first call destination from thelisting. The application also transmits a third instruction requestingconnection with the first call destination. The application also joins asecond authorized party associated with the first call destination in afirst voice session. The application also joins the first authorizedparty to the first voice session, wherein the application further joinsthe first authorized party to a second voice session initiated by thesecond authorized party based on the application determining that thesecond authorized party initiated the second voice session from thefirst call destination and wherein the portable electronic deviceoriginates and receives transmissions solely upon approval of theapplication.

In an embodiment, a method of remotely reassigning detainee profiles toportable electronic devices in penal institutions is provided. Themethod comprises creating a first profile for a first detainee, thefirst profile linked to a first schedule file, a first permitted partiesfile, and a first accounts file associated with the first detainee. Themethod also comprises assigning a previously unassigned portableelectronic device to the first profile. The method also comprisesproviding the portable electronic device to the first detainee for usesubject to limitations described at least in the first profile. Themethod also comprises creating a second profile for a second detainee,the second profile linked to a second schedule file, a second permittedparties file, and a second accounts file associated with the seconddetainee. The method also comprises cancelling assignment of theportable electronic device to the first profile. The method alsocomprises providing the portable electronic device to the seconddetainee for use subject to limitations described at least in the secondprofile.

In an embodiment, a system for monitoring and controlling wirelesstelecommunications services in penal institutions is provided. Thesystem comprises a processor, a memory, and an application, that, whenexecuted on the processor monitors activities engaged in by a pluralityof detainees using portable electronic devices in at least one penalfacility. The system also determines that a first monitored activityengaged in by a first detainee violates at least one rule associatedwith the at least one penal facility. The system also remotely disablesa first portable electronic device in possession of the first detaineein response to a command entered in to one of a monitoring stationassociated with the application and an official portable electronicdevice associated with the application and in possession of a penalfacility official.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a block diagram of a system for controlling, monitoring,and recording of wireless telecommunications services associated withpenal institutions in accordance with an embodiment of the presentdisclosure.

FIG. 2 depicts a flowchart of a method of remotely reassigning detaineeprofiles to portable electronic devices in penal institutions

DETAILED DESCRIPTION OF THE INVENTION

The present disclosure teaches systems and methods of providing incomingand outgoing telecommunications services to persons incarcerated inpenal facilities. A plurality of controls is provided herein that mayreduce contraband devices and encourage good behavior by detainees,penal employees, and others. Portable electronic devices, primarilymobile telephones, are provided to detainees that have exhibitedacceptable behavior and are not determined to be security risks. Thedevices are configured to allow only transmissions with a singletelephone number associated with an application taught herein. Afterapplying controls, the application then connects outside calling partiesto the detainee or connects the calling detainee to the destinationparty. In contrast to existing implementations, inbound calls to adetainee are permitted.

The application executes on a computer, for example a private branchexchange (PBX) that may be located on the premises of a penalinstitution or away from the penal institution. A family member,attorney, or other preapproved party calling from a preapprovedtelephone number and telephone initiates a call to a telephone numberassociated with the application. The calling party is asked to enter aname or other identification of the detainee with whom they wish tospeak. The calling party speaks or otherwise enters this information.The application consults stored records listing names and otheridentifying information of detainees permitted to receive incoming callsfrom external calling parties. The application verifies that thedetainee is included in these records and is permitted to receiveincoming calls from approved external calling parties and telephones onthat day of the week and during that time period. The application alsoverifies that the calling party and originating external telephonenumber are included in a list of preapproved calling parties andtelephone numbers. The application finally verifies that sufficientfunds are in a detainee account to pay for the incoming call. Once theapplication has completed these verification steps, the application thenplaces a separate call to a specially modified portable electronicdevice in possession of the detainee. When the detainee answers, theapplication joins the separate call legs and remains on the line,recording the call. The application monitors the call for unusualactivity such as the external calling party allowing a different partyto join the call or attempting to switch the call to a differenttelephone or number or conference another number into the call. Theincoming call is timed and the detainee's account is charged. The callmay also be monitored by at least one authorized person who may join,interrupt or terminate the call at any time.

The present disclosure also teaches a detainee making outgoing calls ina similar manner as with incoming calls. A detainee provided a portableelectronic device taught herein makes a keypad entry that contacts thePBX. The PBX receives this transmission and the application executingthereon consults stored records describing permitted days and times foroutgoing calls by the detainee. The stored records also list thedestination telephone numbers of parties, for example family members oran attorney, that the detainee is permitted to call at the allowedtimes. The stored records also contain account information for thedetainee regarding calling minutes remaining and/or available funds ondeposit to pay for phone usage.

After determining that the detainee's request is on a permitted day andwithin a permitted time period and that minutes and funds are available,the application consults the list of permitted recipient telephonenumbers. The detainee may be provided the list and/or may enter or speakthe desired name or telephone number he or she wishes to call. Theapplication then calls the designated recipient telephone number and ifthe individual with which the detainee wishes to speak is available, theapplication connects the detainee with the called party, for example thedetainee's spouse or children.

As with incoming calls, the detainee and the called party may remainconnected as two separate call legs with the application remaining onthe line and actively monitoring the conversation. The call may besubject to time limitations associated with program rules or based onaccount balances. The application may interrupt or terminate theconversation at any time and an authorized person may “barge in” ifnecessary. All conversations are recorded and are subject to review.

The portable electronic device provided to the detainee is locked downto prevent tampering or hacking. It is securely configured to place andreceive calls only with a single telephone number associated with theapplication taught herein executing on the PBX. The portable electronicdevice is unable to engage in any short message service (SMS) messaging,commonly referred to as text messaging, and cannot access any Internetservices. The only actions permitted with the device are placing callsto and receiving calls from the one number associated with theapplication and specific to the device. The device is physically securedsuch that it cannot be opened or otherwise tampered with. The device maybe configured to allow its movements to be tracked within and/or outsidea penal facility. This feature may be especially useful when portableelectronic devices are provided to persons in work release programs.

By providing deserving detainees telephone privileges that they may usein the safety and privacy of their cells or living areas, the system andmethods of the present disclosure may reduce contraband cell phones inpenal facilities by removing incentives for penal employees to engage incorrupt behavior. The legitimate provision of incoming and outgoingtelephone service to deserving detainees may result in less temptationfor penal employees to become derelict or corrupt by assisting in thesmuggling of contraband devices into penal facilities.

The systems and methods taught herein may also reduce the need forpublic telephones in penal facilities that may only be used for outgoingcollect calls and present security risks. With public phones, detaineesmust physically leave their secure areas and wait in line. Public phonesare also often very expensive which may be a burden on family members orothers that must pay the collect phone charges. The present disclosureprovides fairer and more private systems for deserving detainees whereinincentives for penal employee corruption are reduced and overall penalfacility safety may be enhanced.

Turning to FIG. 1, a system 100 of controlling, monitoring and recordingof wireless telecommunications services in penal institutions isprovided. The system 100 comprises a telecommunications server 110, acontrol application 120, a database 130, a penal facility 140, portableelectronic devices 150, 152, external telephones 160, 162, a managementcomputer 170, a monitoring computer 180, a base transceiver system 190,and a network 192.

The telecommunications server 110 is a software-based telecommunicationssystem server or private branch exchange (PBX) capable of receiving,switching, placing and monitoring voice and data transmissions. Thetelecommunications server 110 may be situated at the penal facility 140or may be situated elsewhere, for example on the premises of a centraloffice or other facility of a telecommunication services provider. Thetelecommunications server 110 may provide the services described hereinto more than one penal facility 140.

The control application 120 executes on the telecommunications server110 and provides the primary services associated with voicetelecommunications services taught herein for persons incarcerated in orassociated with the penal facility 140. The control application 120maintains a file of unique telephone numbers called by detainees fromthe portable electronic devices 150, 152 provided them. Each portableelectronic device 150, 152 is registered by the control application 120to a unique extension on the telecommunications server 110. The controlapplication 120 allows calls from the portable electronic device 150 tothe unique extension assigned to it in the telecommunications server110.

The portable electronic device 150 as configured and provided to thedetainee cannot receive calls from any number other than the numberassociated with the unique extension securely configured for it in thetelecommunications server 110. Likewise, the portable electronic device150 cannot place calls to any other number other than the numberassociated with the unique extension. The control application 120receives calls from external telephones 160, 162 wherein the calls areplaced by family members, attorneys or other persons approved to placecalls to certain detainees. The external telephones 160, 162 may usewired or wireless connections and their calls may be transmitted via theInternet using a protocol such as Voice Over Internet Protocol (VoIP).

The control application 120 employs various methods to ensure that thedevice originating the call to the telecommunications server 110 is infact the approved external telephone 160 and not an impostor or otherdevice. The control application 120 may analyze the initial andcontinuing electronic stream associated with the call from the externaltelephone 160 and may extract and analyze the International MobileEquipment Identifier (IMEI) or other identifying data contained in thesetransmissions. The control application 120 may compare the extracteddata with information stored in the telecommunications server 110 orelsewhere for verification. The control application 120 may employ otherwell known techniques to validate that the call is originated by theexternal telephone 160 and by a person authorized to place calls todetainees. The control application 120 may require the caller to enterinformation provided only to the caller and may use calleridentification and voice recognition software or other tools todetermine that the person calling from the external telephone 160 is infact an authorized caller. The control application 120 also starts arecording of some or all of these interactions.

After ascertaining that the call to the telecommunications server 110was in fact originated by the external telephone 160 and afterdetermining that the caller is authorized to place calls to detainees,the control application 120 instructs the caller to provide the nameand/or other identifying information for the detainee they wish to call.The control application 120 then performs a series of additional stepsbefore connecting the caller to the detainee. The control application120 analyzes a schedule file 132 stored in the database 130 to determinedays of the week and times of day that the detainee is permitted toreceive incoming calls. In an embodiment, some scheduling informationmay be stored locally in the portable electronic device 150. Theportable electronic device 150 may be configured such that it cannotreceive externally originated transmissions of any kind outside ofpermitted calling times.

After the control application 120 determines that the calling request isat an allowed time, the control application 120 consults a permittedparties file 134 stored in the database 130 describing detainees thatthe external telephone 160 and associated person may call. In anembodiment, an attorney may be authorized to call more than onedetainee. The permitted parties file 134 contains information aboutdetainees including names and other identification that is used toassure that only authorized detainees may receive calls. The permittedparties file 134 may also identify the portable electronic device 150assigned to a particular detainee at a particular time. Portableelectronic devices 150, 152 may be rotated among detainees at randomtimes for security reasons.

As noted, the calling party using the external telephone 160 isinstructed to enter the name or other identification of the detaineewith which the calling party wishes to speak. The control application120 checks this against the permitted parties file 134. The callingparty may provide selection information by keypad entry or verbally. Thecontrol application 120 may alternatively present a listing viewable onthe external telephone 160 of allowed detainees that the externaltelephone 160 the authorized caller may call. This is predicated on theexternal telephone 160 having functionality to display this informationand accept selections of items of this information.

When the control application 120 determines that calls to the selecteddetainee are permitted at that time by the calling party, the controlapplication 120 dials the portable electronic device 150 in thepossession of the detainee. This is done with the external telephone 160not yet on the line. The call from the external telephone 160 to thedetainee may be completed as two separate call legs by the controlapplication 120. The initial call by the external telephone to thetelecommunications server 110 may be a first call leg that is held bythe telecommunications server 110. The control application 120 theninitiates a second call leg to the portable electronic device 150 in thepossession of the detainee. When the portable electronic device 150 isanswered and the control application 120 determines that the personanswering is the detainee, the control application 120 then links thetwo call legs, effectively bringing the calling party into the call. Thecontrol application 120 remains present to monitor the call.

While the call is ongoing, the telecommunications server 110 or anotherdevice take steps to assure that the detainee and the approved callerremain on the call and do not allow unauthorized persons to participatein the call. These steps may include the use of voice recognitionsoftware or technology that detects if the calling party attempts totransfer the call to another telephone number or device.

Before connecting the calling party with the detainee, the controlapplication 120 additionally consults an accounts file 136 stored in thedatabase 130 to determine a quantity of minutes and/or funds presentlyavailable for use by the detainee. Management of the penal facility 140may set policies limiting call durations or minutes of permitted usageper day, per weeks or during another time period. Detainees may becharged per minute used for outgoing as well as incoming calls.Detainees may deposit funds into accounts accessible by the controlapplication 120. In an embodiment, a detainee may be extended credit.

The present disclosure also provides for detainees to originate outgoingcalls to family members, attorneys, and other authorized persons undercertain conditions with method steps similar to those used in completingincoming calls to detainees. As with incoming calls, only authorizedexternal telephones 160, 162 and persons associated with those externaltelephones 160, 162 are permitted to receive outgoing calls originatedby detainees during specific time periods. In an embodiment, the groupof external telephones 160, 162 and parties that are permitted toreceive outgoing calls from the detainee may differ from the externaltelephones 160, 162 and associated numbers and parties that arepermitted to call the detainee in incoming calls.

The detainee seeking to call an external telephone 160 calls thetelephone number associated with the control application 150 and thetelecommunications server 110. This is the only telephone number thatthe detainee may call using the portable electronic device 150. In anembodiment, the detainee may enter press the keypad numeral 1 or makeanother entry to initiate an outgoing call. The control application 120receives the call, checks the schedule file 132, the permitted partiesfile 134, and the accounts file 136 as it does with incoming calls. Thecontrol application 120 ascertains that the day and time of the call arepermitted. The control application 120 also determines that the externaltelephone 160, its associated phone number and the person receiving theoutgoing call from the detainee are permitted and that there are fundsand/or minutes available in the detainee's account. Once theserequirements are determined to be met, the control application 120 callsthe external telephone 160 associated with the destination party. Aswith incoming calls, the control application 120 completes outgoingcalls as two separate call legs and remains on the line recording thecall and monitoring it for prohibited activity including participationby unauthorized parties in the call.

The system 100 also comprises at least one management station 170 thatis a computer used by persons with management responsibilities andassociated access privileges to manage the control application 120 andvarious aspects of the calling program provided herein. These personsare provided system administrator privileges that include the authorityto add and remove detainees to and from the calling program and makevarious changes to calling privileges. System administrators and othersprovided access to the management station 170 access a managementapplication 172 executing at least partially on the management station170. They use the management application 172 to configure the controlapplication 120 and manipulate files stored in the database 130. Inaddition to adding, removing and changing detainee calling privileges,schedules and accounts, these actions comprise adding and deleting phonenumbers of external telephones 160, 162 and associated personsauthorized to speak with detainees. System administrators may use abrowser as a “front end” or client software tool provided by themanagement application 172 to access the control application 120, thedatabase 130 and other components. The management application 172 mayprovide simplified web forms to add detainees and make other programchanges. System administrators may be wardens, senior correctionofficials, or others that develop and implement policies regardingprogram administration as a whole.

The system 100 also comprises at least one monitoring station 180 thatmay be a computer used by authorized persons to listen to outgoing orincoming detainee calls on a live or recorded basis. These authorizedpersons may also use a monitoring application 182 executing at leastpartially on the monitoring station 180 that comprises electronic toolsused in forensic activities made possible by the teachings of thepresent disclosure. These activities include assisting in the detectionof prohibited behavior by detainees, outside parties, and othersincluding penal officers who may be violating or compromising penalfacility regulations. The monitoring station 180 may be located on thepremises of the penal facility 140 or elsewhere. The monitoringapplication 182 may also use a browser to access information useful inperforming this analysis. As with the management application 172, thismay involve accessing some areas of the control application 120 and thedatabase 130.

The present disclosure also provides for client administrator privilegesto be provided to users of the monitoring station 180. These privilegesare less broad than system administrator privileges and includeselectively monitoring calls, accessing tools to analyze usage patterns,and managing and inventorying portable electronic devices 150, 152within and outside the penal facility 140. Monitoring may includepassive listening to calls as well as “barge in” wherein a clientadministrator or system administrator may intervene in the call andspeak to one or more parties to the call.

In an embodiment, the management station 170 and the monitoring station180 may be the same physical computer. The management station 170 andthe monitoring station 180 are general purpose computers. In anembodiment, there may exist a plurality of management stations 170 andmonitoring stations 180. While the management station 170 and themonitoring station 180 are depicted in FIG. 1 as being contained withinthe penal facility 140, in an embodiment these components may be locatedelsewhere. In an embodiment, some individuals may be provided accessrights to the control application 120, the database 130 and othercomponents that combine aspects of system administrator privileges andclient administrator privileges.

The portable electronic devices 150, 152 may be mobile telephones,personal digital assistants (PDA), media players or other wirelessdevices capable of originating and receiving voice transmissions. Asnoted, portable electronic devices 150, 152 are configured to havecontact with only a single telephone number associated with the controlapplication 120 executing on the telecommunications server 110. Thedetainee using the portable electronic device 150 hears various messagesprovided by the control application 120, for example a warning that aninbound or outbound call will soon terminate because of funds orschedule limitations. In an embodiment, portable electronic devices 150,152 and limited areas of the control application 120 may be accessibleby the detainee to obtain information such as detainees' current accountbalances and permitted calling schedules. In an embodiment, detaineesare provided voice mail accounts protected by personal identificationnumbers (PIN). Voice mail functionality may be used by management of thepenal facility 140 to provide general distribution messages andannouncements to individual detainees and groups of detainees. Detaineescannot delete voice mail messages and authorized persons may listen tovoice mail messages.

The limitations to and other aspects described herein of the portableelectronic devices 150, 152 may be configured directly into the devices.They may alternatively or in addition be configured from a remotecomputer such as the management station 170 or other device. Theportable electronic devices 150, 152 are physically configured such thatthey cannot be physically opened and the subscriber identificationmodules (SIM) therein cannot be removed or otherwise tampered with. Theymay bear visible insignia that designate them as legitimate portableelectronic devices 150, 152 associated with the program taught herein.

The portable electronic devices 150, 152 may be configured with globalpositioning system (GPS) functionality so that their physical movementwithin or outside the penal facility 140 may be monitored. In anexample, a first detainee with the portable electronic device 150 may behoused in a first cellblock and work as an assistant in the warden'soffice of the penal facility 140. A second detainee with the portableelectronic device 152 may be housed in a second cellblock and work inthe laundry of the penal facility 140. The first and second detaineesmay rarely or never move in the same areas of the penal facility 140 orbe in the same areas at specific known times. Movements of the portableelectronic devices 150, 152 may be tracked using GPS or other technologysuch that unusual activity may be detected and investigated.

The present disclosure also teaches the use of portable electronicdevices 150, 152 as provided herein by persons not confined to the penalfacility 140 but instead subject to parole or in a work release program.Offenders not physically incarcerated but subject to significantcorrectional oversight may be provided portable electronic devices 150,152 for use in parole and work release programs. GPS and other trackingtechnology incorporated into the portable electronic devices 150, 152may be useful in enforcing physical movement restrictions onnon-incarcerated offenders.

The penal facility 140 is a secure building or buildings comprising apenal institution used to incarcerate individuals as detainees subjectto court-imposed sentences. The penal facility 140 may be apenitentiary, prison, jail, camp, detention center or other facilityoperated by a federal, state, provincial, municipal, military or otherpublic body or agency. The penal facility 140 may alternatively beprivately operated under contract with a court, correctional agency orother public body. In an embodiment, the penal facility 140 may be apublic hospital or other institution in which non-offending personsreside as wards of a state, province, municipality or other public body.

The systems and methods of the present disclosure may provide a fairer,safer and less corruption-prone alternative to prison telephone systemscommonly in use. As taught herein, detainees may not have to bephysically moved to place and receive calls as they must be in the caseof public phones in prisons, an enhancement to detainee and penalemployee safety. Detainees therefore do not have to wait in line forphones, a situation that may create increased tension between detaineesbeing in close physical proximity to each other. Detainees are able toengage in calls in safety and privacy of their living quarters.Detainees are able to receive incoming calls, which is generally notpossible with existing prison phone systems. Detainees are relieved ofthe burden of making collect calls that are often very expensive to theparty accepting charges.

Detainees in penal facilities 140 demand and have a right to telephoneservices and have historically demonstrated that they will find ways tosatisfy this demand using legitimate means or not. Providing contrabandmobile telephones to inmates of penal facilities and allowing theirtrafficking is a temptation to penal employees when financial or otherincentives are offered. The systems and methods taught herein thatlegitimately satisfy demand for communications services for deservingdetainees may remove much of the economic incentive that may result incorruption of prison employees. The program taught herein reduces theexposure to corrupting influences on prison employees. It alsoencourages and rewards good behavior by detainees and may ultimatelyreduce recidivism given the increased amount of telephone contact andenhanced quality of voice interaction facilitated with family membersand others.

In an embodiment, aspects of the systems and methods taught herein mayexecute on the portable electronic device 150. A combination of hardwareand software components resident and executing on the portableelectronic device 150 may work in conjunction with the controlapplication 120 and the telecommunications server 110. For outgoingcalls by detainees, an application executing on the portable electronicdevice 150 may dial a first telephone number in response to receiving afirst key entry by a detainee. The application may then display a menupresenting a list of destination telephone numbers. It receives a secondkey entry comprising a selection of a first destination telephone numberfrom the displayed menu listing destination telephone numbers. Theapplication then transmits a request to initiate a voice communicationsession with the first destination telephone number based on receivingthe second key entry.

The systems and methods of the present disclosure teach the provision oftelecommunications services to detainees incarcerated in and otherwiseassociated with the penal facility 140. Lawful wireless and othercommunications by employees of and visitors to the penal facility 140 aswell as other non-detainees are not affected by the actions of thecomponents provided herein. In addition, the systems and methods of thepresent disclosure teach that wireless communication nodes and othersimilar wireless signal detecting and managing devices need not beplaced on the premises of the penal facility 140.

In an embodiment, selected functionality of the control application 120may execute on the portable electronic device 150. The system 100 alsocomprises a mobile app 154, 156 that resides and executes on theportable electronic device 150, 152, respectively. The mobile app 154,156 performs selected functions of the control application 120. Themobile app 154 may access the files accessed by the control application120 in other embodiments to determine whether a detainee is permitted tooriginate or receive a call. The files accessed by the mobile app 154include the schedule file 132, the permitted parties file 134, and theaccounts file 136. In an embodiment the schedule file 132, the permittedparties file 134, and the accounts file 136 may be stored on theportable electronic device 150 with updates periodically pushed to theportable electronic device 150 by the control application 120 orotherwise updated by the control application 120.

The mobile app 154 may receive a first instruction from a firstauthorized party who is in possession of the portable electronic device150 and desiring to place an outgoing call. The first authorized partymay be a detainee in the penal facility 140 who has receivedauthorization to originate telephone calls to certain outside partiesunder specified conditions. The outside parties may be in possession ofexternal telephones 160, 162. The first authorized party is provided theportable electronic device 150 to use in originating and/or receivingtelephone calls, subject to the specified conditions rules and subjectto parameters of the schedule file 132, the permitted parties file 134,and the accounts file 136. The first instruction may be a key entry orseries of key entries to a keypad of the portable electronic device 150.The first instruction may additionally or alternatively be a voicecommand spoken to the portable electronic device 150.

Upon receiving the first instruction, the mobile app 154 executing onthe portable electronic device 150 accesses the schedule file 132 andthe accounts file 130 in a manner similar to that of the controlapplication 120 in other embodiments. Whether the schedule file 132 andthe accounts file 136 are stored fully or partially on the portableelectronic device 150 or are stored in the database 130 as in otherembodiments, the mobile app 154 accesses these files to determine, as inother embodiments, whether the first authorized party, the detainee, mayoriginate a call at that time and on that day. The mobile app 154 maydetermine from the schedule file 132 whether the first authorized partyis permitted to originate a call at the present time. The mobile app 154may also determine from the accounts file 136 whether the firstauthorized party presently has a sufficient funds balance to originate acall.

If the mobile app 154 determines from its examination of the schedulefile 132 and accounts file 136 that the first authorized party mayoriginate a call, the mobile app 154 then presents a listing ofavailable call destinations to the first authorized party. The mobileapp 154 may access the listing from the permitted parties file 134 thatmay be stored on the portable electronic device 150, in the database130, or partially in each device. The mobile app 154 may present thelisting visually in a display of the portable electronic device 150 ormay present the listing in an audible manner. The mobile app 154 thenreceives from the first authorized party, the detainee, a secondinstruction comprising a choice of a first call destination from thelisting generated from the permitted parties file 134. The firstauthorized party chooses from the listing the first call destination,the name or destination telephone number associated with the externaltelephone 160 that the first authorized party wishes to call. The firstauthorized party made provide the second instruction in the form of akey entry or a spoken command.

The mobile app 154 then transmits a third instruction requestingconnection with the first call destination. The control application 120receives the third instruction from the mobile app 154 and dials thefirst call destination. The control application 120 determines whetherthe party answering at the first call destination is authorized to speakwith the first authorized party. If so, the answering party, referred toin this embodiment as the second authorized party, is instructed to stayon the line while the control application 120 joins the call to theportable electronic device 150. The mobile app 154 receives a messagefrom the control application 120 that the second authorized party is onthe line. The mobile app 154 then joins the first authorized party, thedetainee, to the second authorized party and the detainee and familymember, attorney, or other person authorized as the second authorizedparty commence and conduct their voice conversation subject to thecontrols and monitoring described in the previous embodiments.

The present embodiment, wherein functionality previously disclosed asexecuted by the control application 120 on the telecommunications server110 is instead executed by the mobile app 154, is similar to theprevious embodiments in which effectively two calls or sessions areseparately originated and then joined. The two calls are only joinedwhen determinations are satisfactorily made about authorizations of theoriginating party and the destination party and their full compliancewith requirements. The call or session initiated by the first authorizedparty is not joined with the call or session initiated by the controlapplication 120 with the second authorized party at the first calldestination until the control application 120 and the mobile app 154determine that all conditions associated with the first authorized partyoriginating the call have been met and that the identity of the outsideperson, the second authorized party, has been established and cleared.

The presently discussed embodiment wherein the mobile app 154 handlesfunctions previously described as handled by the control application 120also includes calls originated externally and directed to the firstauthorized party, the detainee. In this case of calls coming from theoutside and intended for the detainee, the control application 120 mayreceive the incoming call from the external telephone 160 of the outsideparty and contact the mobile app 154. In this case the controlapplication 120 and the mobile app 154 may coordinate the processes ofchecking the schedule file 132 and the accounts file 136 and thereafterthe permitted parties file 134 before permitting the first authorizedparty to be joined to the calling outside party.

In either the outbound calling or inbound call receiving cases of thepresently discussed embodiment, the portable electronic device 150originates or receives calls solely upon approval of the mobile app 154.Functionality described in previous embodiments as that of the controlapplication 120 may reside on the portable electronic device 150 and beexecuted by the mobile app 154.

The portable electronic device 150 may generate at least one of a textmessaging alert and an electronic mail alert if the portable electronicdevice 150 or other device detects that the portable electronic device150 has been physically or electronically tampered with. Although textmessaging and electronic mail are not available to a detainee providedthe portable electronic device 150 for voice usage, those services mayreside on the portable electronic device 150 for sending these alerts.The detainee cannot detect the presence of or access those services. Theportable electronic device 150 may also be automatically disabled upondetection by the portable electronic device 150 or other device that theportable electronic device 150 has been physically or electronicallytampered with which may include removal of the subscriber identitymodule (SIM) installed in the portable electronic device 150.

The control application 120 may be contacted by the mobile app 154 viaone of a telephone number, an Internet Protocol (IP) address, and aMedia Access Control (MAC) address associated with the controlapplication 120.

A first subscriber identity module (SIM) installed in the portableelectronic device 150 may be modified to permit transmissions only to apredetermined telephone number associated with the first instruction.The first SIM may become inoperable when not used in the portableelectronic device 150. The portable electronic device 150 may be unableto engage in outgoing or incoming calls when the first SIM is notinstalled.

The portable electronic device 150 may be verifiable as non-contrabandat least by one of locally reading an International Mobile StationEquipment Identity (IMEI) of the portable electronic device 150. Theportable electronic device 150 may be also verifiable as non-contrabandby manually verifying a non-removable application executing on theportable electronic device 150 that provides a digital validator orwatermark. Further, the portable electronic device 150 may be verifiableas non-contraband and by an officer of the penal facility 140 entering akeypad entry on the portable electronic device 150 that returns a uniquevalidation response verifiable by the officer.

Turing to FIG. 2, a method 200 of remotely reassigning detainee profilesto portable electronic device 150, 152 in penal institution is provided.Beginning at block 202, a computer, which may be the telecommunicationsserver 110, creates a first profile for a first detainee, the firstprofile linked to a first schedule file, a first permitted parties file,and a first accounts file associated with the first detainee. In anembodiment, the first schedule file, the first permitted parties file,and the first accounts are the schedule file 132, the permitted partiesfile 134, and the accounts file 136, respectively, of the system 100. Atblock 204, the computer assigns a previously unassigned portableelectronic device 150 to the first profile. At block 206, the computerprovides the portable electronic device 150 to the first detainee foruse subject to limitations described at least in the first profile. Atblock 208, the computer creates a second profile for a second detainee,the second profile linked to a second schedule file, a second permittedparties file, and a second accounts file associated with the seconddetainee. At block 210, the computer cancels assignment of the portableelectronic device 150 to the first profile. At block 212, the computerprovides the portable electronic device to 150 the second detainee foruse subject to limitations described at least in the second profile.

A profile created for a particular detainee may be linked to specificareas of the schedule file 132, the permitted parties file 134, and theaccounts file 136 associated with that detainee. Alternatively, specificinstances of the schedule file 132, the permitted parties file 134, andthe accounts file 136 may be created for the particular detainee.

Assignments of profiles for detainees to portable electronic device 150,152 may be remotely activated and cancelled. These actions may be takenusing the management station 170 and/or the monitoring station 180.Remote reassignment of detainee profiles to portable electronic device150, 152 and rotation of portable electronic device 150, 152 amongdetainees as provided in the method 200 may take place upon retakingpossession of the portable electronic device 150, 152. Reassignment ofdetainee profiles to the portable electronic device takes place on atleast one of a scheduled basis, on an emergency basis, on an ad hocbasis.

The control application 120 may remotely disable the portable electronicdevice 150 in possession of the detainee based on a command entered intothe management station 170 and/or the monitoring station 180. Thecontrol application 120 may additionally or alternative remotely disablethe portable electronic device 150 in possession of the detainee basedon a command entered into an official electronic device (not shown inFIG. 1) in possession of an official of the penal facility 140 whereinthe official's electronic device sends a message to at least one of thecontrol application 120, the management station 170 and the monitoringstation 180. The message may be sent as a text message or an electronicmail message. These actions may take place based upon a determination bythe official or the control application 120 or other component that amonitored activity engaged in by the detainee violates at least one ruleof the penal facility 140.

For example, a guard may carry the official portable electronic deviceand may disable the portable electronic device 150 in possession of thedetainee by entering a command that sends a message. The message is sentto at least one of the control application 120, the management station170 and the monitoring station 180 whereupon another message is sentfrom at least one of those devices to the portable electronic device 150in possession of the detainee that disables the portable electronicdevice 150.

The monitored activity by the detainee referred to above that may resultin disabling of the portable electronic device 150 in possession of thedetainee may be a voice transmission received or transmitted by theportable electronic device 150. The monitored activity may be a keypadentry entered into the portable electronic device 150. The monitoredactivity may be at least one physical movement of the portableelectronic device 150.

The control application 120, the management station 170, and/or themonitoring station 180 may remotely disable a plurality of portableelectronic devices 150, 152 that are located in at least one physicalarea of the penal facility 140. Remote disabling of multiple portableelectronic devices 150, 152 may take place based on a command receivedfrom a guard or other official carrying the electronic device (not shownin FIG. 1) described previously.

The control application 120, the management station 170, and/or themonitoring station 180 may accept a plurality of commands to remotelydisable a plurality of portable electronic devices 150, 152 in detaineepossession. For example, a particular group or classification ofdetainees may need to be selectively cut off from use of portableelectronic devices 150, 152 in their possession for security or otherreasons.

The portable electronic device 150 may be manually or automaticallydisabled when detected via cell tower signaling activity to have beenmoved from a predetermined area. This may apply to the portableelectronic device 150 being in possession of a person not confined tothe penal facility 140 but subject to a work release program.

In an embodiment, the portable electronic device 150 may generate a textmessage or electronic mail message and be automatically disabled upondetection that the portable electronic device 150 has been physically orelectronically tampered with. The detainee in possession of the portableelectronic device 150 would be unable to access text messaging andelectronic mail messaging functionality of the portable electronicdevice 150 and would be unaware that these services are present on theportable electronic device 150.

In an embodiment, portable electronic devices 150, 152 may be providedwith global positioning system (GPS) capabilities so that detaineemovement may be monitored. Specifically, congregation of some detaineesmay not be permitted and such congregation may be detected andprevented. Such monitoring may be done from the management station 170and/or the monitoring station 180.

Detainees may purchase additional time to be loaded into their accountsfiles 136 by approaching kiosks located at the penal facility. Detaineesmay also download updates to the schedule file 132 and the permittedparties file 134 in this manner.

What is claimed is:
 1. A system for monitoring and controlling wirelesstelecommunications services in penal institutions, comprising: aprocessor a memory; and an application, that, when executed on theprocessor: monitors activities engaged in by a plurality of detaineesusing portable electronic devices in at least one penal facility,determines that a first monitored activity engaged in by a firstdetainee violates at least one rule associated with the at least onepenal facility, and remotely disables a first portable electronic devicein possession of the first detainee in response to a command entered into one of a monitoring station associated with the application and anofficial portable electronic device associated with the application andin possession of a penal facility official.
 2. The system of claim 1,wherein the first monitored activity comprises one of a voicetransmission one of received by and transmitted by the portableelectronic device, a keypad entry entered into the portable electronicdevice, and at least one physical movement of the portable electronicdevice.
 3. The system of claim 1, wherein the application remotelydisables a plurality of portable electronic devices in at least a firstphysical area of the penal facility.
 4. The system of claim 1, whereinthe instruction entered into the official portable electronic device isone of a text message and an electronic mail message to the application.5. The system of claim 1, wherein the monitoring station and theofficial portable electronic device accept a plurality commands toselectively disable a plurality of portable electronic devices indetainee possession.
 6. The system of claim 1, wherein the firstportable electronic device is automatically disabled when detected inconnection with cell tower signaling activity to have been moved from apredetermined physical area.
 7. The system of claim 1, wherein the firstportable electronic device generates at least one of a text message andan electronic mail message and is automatically disabled upon detectionof at least one of electronic tampering and physical tampering of thefirst portable electronic device.