Take charge of your Inmate to Inmate Communications
Bring visibility to the Invisible threat
Stop Inmate Telephone Circumvention at the source
Inmate to Inmate circumventions often start with a simple phonecall to an individual outside the prison system
Another inmate calls the same individual, who then acts as a proxy between the two inmates
ICER Technology identifies these breaches as they occur, and notifies you of the situation

Tell me More about ICER Technology