Get your inmate the BEST inmate text service for federal inmates, above on the contactmeasap.com logo

Federal Inmate Communication Operations

Before pay telephones were introduced, calls would be randomly monitored by staff using primitive recording equipment in an institution phone room.

The BOP contracts with one or more providers to supply inmate communications services and has come under criticism for imposing excessive rates and fees for additional services provided to prisoners.

Inmate Telephone System (ITS)

Phones have been part of federal prisons since the early 1970s, providing inmates with positive effects while raising concerns over security and cost efficiency. While phones can have various positive benefits on inmate welfare, their deployment raises many security and cost efficiency concerns.

The ITS system, created and fully implemented in 1988 and fully realized in 1992, utilizes computer hardware and software programs to track, record, and regulate inmate calls. It enables BOP to debit an inmate’s commissary account for costs related to calls; additionally it is compatible with AIMS so correctional staff may search and analyze call records.

ITS allows inmates to call approved parties and provides call forwarding. Non-approved callers must pay the cost of calling non-approved numbers including long distance charges. Unlike commercial telecom providers offering inmate calling services, BOP does not disclose its rates publicly.

USP Allenwood SIS officers informed us that it takes at least 10-12 hours for ITS staff to record five hours of inmate phone conversations due to subpoena obligations placed upon SIS staff, which take priority over investigations. GTL plans on proposing its next contract for ITS services in September to address such concerns.

Inmate Visitation System (IVS)

The IVVS system enables family and friends of inmates who do not qualify for in-person visits to visit them remotely or via KIOSKs. All visits must be approved by an inmate’s approved visitor list and monitored, plus visitors must complete a Visitor Application with photo identification in order to be permitted a visit; any visitors found posing a security risk, or possessing criminal backgrounds requiring further monitoring, may not be approved as visitors.

ITS was implemented in 1988 to replace an outdated system allowing inmates to make collect calls and place the financial burden of those calls onto their families. AIMS allows BOP to search and monitor inmate telephone call records; additionally it debits commissary accounts for costs related to phone and video calls made during that period; furthermore it prevents inmates from dialing specific numbers, thus eliminating unauthorized calls by outsiders.

Although no-contact visitation policies limit an inmate’s physical contact with loved ones, the Supreme Court determined in Overton v. Bazzetta (539 U.S. 126) that such restrictions do not violate due process rights of inmates. They can still see them through no-contact visits and letters; write letters; call and correspond; as well as communicate by telephone and e-mail with loved ones while in jail.

Inmate Video System (IVS)

Prison video systems enable visitors to interact with inmates via digital videoconferencing platforms. These systems are typically deployed on independent networks so as to not affect mission-critical data networks. They come equipped with many standard and optional features designed to meet facility, family and inmate communications needs creatively.

SIS plays an essential role in gathering intelligence about inmates or groups who pose risks to the security of an institution and its inmates, by analyzing transactional data, monitoring telephone calls made by inmates (on an occasional sampling basis), maintaining tape libraries of recordings as well as identifying those responsible.

IVVS offers an effective alternative to traditional inmate visitation that saves both inmates and staff both time and resources. Based on high-definition hardware and software programs, this visitation method operates out of a secure facility-owned server, and profits generated from inmate purchases such as commissary items or telephone services are used to fund it.

IVVS allows prisons to provide email access privileges through Corrlinks and TRULINCS to certain prisoners. Applicants for these services are subject to case manager review of their presentence investigation report, and agree to undergo regular monitoring of their online activities. TRULINCS public messaging features also provide a function that verifies whether an inmate has engaged in child pornography or other illegal content.

Inmate Mail System (IMS)

IMS allows friends and family of inmates to send letters which will then be scanned, opened, read and delivered directly. In addition, there is also a voicemail service where inmates can receive secure messages from friends and family members.

Inmates may receive money from outside sources and deposit it directly into their commissary accounts via the GTL inmate call management application, where it can then be used to purchase phone time or items at their facility’s commissary store.

General written correspondence may be limited to six pieces of paper (no larger than 8.5x 11 inches) per week to and from one recipient at the discretion of the Warden, with double-sided writing permitted. There is no volume or frequency restriction on mail sent or received from attorneys, courts, U.S. Attorney’s offices, Federal judges, Members of Congress and law enforcement entities (privileged, unmonitored communications only).

Inmates may request that their outside contacts not forward emails to others as this could violate institutional security rules. If an inmate is found asking their contacts to forward emails, this may result in a disciplinary incident report and/or the loss of public messaging privileges for several months. For this reason, it is advisable that any envelopes sent include no names. SFPF files are available to companies looking to remove email addresses from marketing lists in order to protect these individuals’ rightful privacy.