Investigative Tools

CenturyLink offers a wide array of biometric and investigative applications. Whether integrated within our ITS/VVS or if a customer need requires a 3rd party application, CenturyLink is committed to bringing the latest data analytic technology to its customers. Depending on your Correctional Facility's needs, optional products and capabilities shown below can be provided.

image of investigation and data analytics

Investigative Analysis & Data Mining

Multiple data analytics tools and enhanced link analysis to aid investigations and provide leads.

voice biometrics graphic></div>
				<div class=

Continuous Voice Biometrics

Most advanced biometric identification system available that exceeds the needs of today’s most discerning agencies. Includes called party voice analysis.

graphic for keyword search capability

Keyword Search

Phonetic keyword search to improve staff productivity related to investigations and listening to call recordings. CenturyLink has successfully deployed this feature in County and State DOC agencies.

case management personalization graphic

Case Management

Gain access to a single, investigation framework that provides comprehensive case & evidence management functionality, and powerful data mining tools; drawing from unlimited data sources.

nationwide data forensics graphic

Nationwide Forensic Database

Through Enhanced LIDB and CenturyLink’s exclusive access to LERG, additional Billing Name and Address information – in addition to carrier contact information for records requests – are available to authorized investigative personnel.

location based service graphic

Location Based Services

Locate parties who receive inmate calls, increasing investigative capabilities.

reverse lookup graphich

Reverse Look Up

Validated billing, name, and address, readily available from multiple screens in the ITS.

graphic of contraband cellphone

Contraband Cell Phone Detection & Control

Hands on experience with a variety of detection and control methods, for State and County implementations.