Using Hard Technology to Make Prisons and Jails Safer : Does It Really Work? Professor James Byrne.

Slides:



Advertisements
Similar presentations
Amateur Radio Technician Class Element 2 Course Presentation
Advertisements

Mobile Computing and Commerce And Pervasive Computing
1 Copyright 2011 Hero Security & Surveillance, Inc. Mesquite Solar Energy Plant Security & Surveillance Plan By Brian Levy.
Communications Systems
Airport Security – Post 9/11
AVIATION SAFETY & SECURITY LECTURE 6 X-RAY TECHNOLOGY & BASIC EQUIPMENTS.
Johan de Clerk 14 June 2012 Smart Cities from a Civil Security Perspective.
Technology Solutions. There are a variety of technologies—old and new—that have been developed to warn drivers and operators when workers on foot are.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Rafrex LLC - RFID Solutions
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
Investigations in the Correctional Environment. 2 The Prison Environment A changing, more complex and difficult to manage offender population Increased.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
New Technology in Prisons and Jails: Impact on Safety, Cost, and Offender Rehabilitation Nov.17 th 2009 Lecture Professor James Byrne.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
Introduction Definition of information security Importance of information security Survey Results-Bank account information Protecting your bank accounts.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Twenty-One Police Technology Emergingand.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
Basic Radio Usage AWIN Network Support.
Personal Safety Take Responsibility. 2 Section I Introduction.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Dependencies on NETS Presented by UCAR Technical Security.
Cell Phone Jammer Sick of cell phones? Then jam them!
Envisioned Role for NTI Concerning ITS Deployment in Egypt by Dr. Mahmoud EL-HADIDI Professor of Telecommunications at Cairo U & Consultant at NTI 3 rd.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
1 IT Governance 2006 Strategy/Business Case Presentation CORRECTIONS & REHABILITATION DEPARTMENT.
Personal Alert and Safety System CS 410 Blue Group Ray Bland, Daniel Cox, Brittany Dufort, Braden Gibson, Marcus Henry, Jon Szewczak.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Chapter 16 The Future Landscape of Corrections 1.
Lecture 5: AIRPORT SECURITY
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Data Communications & Computer Networks, Second Edition1 Chapter 3 The Media: Conducted and Wireless.
Technology and the Courts: An Overview of Hard and Soft Technology Innovations Professor James Byrne Lecture: Tuesday, November 16, 2010.
Learning Objective 1 Explain the procedures for receiving emergency and nonemergency external communications.
Firefighter III Module C Communications (4-4) Identify the policy and procedures concerning the ordering and transmitting of multiple alarms.
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Dr. Parag Gujarathi MUHS 28 Sept Security of what? - Assets of the hospital.
LBS Division INDOOR POSITIONING SYSTEM Indoors Independent infrastructure that communicates via wireless connection standards: RFID Technology: Continuous.
IS3220 Information Technology Infrastructure Security
FUNCTIONS OF THE COMPUTER.  A programmable machine that performs high-speed processing of numbers, as well as of text, graphics, symbols, and sound.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
Development, Validation, Implementation and Enhancement for a Voluntary Protection Programs Center of Excellence (VPP CX) Capability for the Department.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
RFID in Education and Childcare By Analytica Overview What is RFID? RFID Components ARIES Software RFID Applications Selling RFID Summary Sales Power.
Unit 1: Protecting the Facility (Virtual Machines)
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Nexbase Invites You To Our Special Products
Communications Systems
Perimeter Security Products
سیستم های محافظتی و مکان یابی الکترونیکی
Presentation transcript:

Using Hard Technology to Make Prisons and Jails Safer : Does It Really Work? Professor James Byrne

E xamples of Hard Technology Innovations in Prison and Jail Settings E xamples of Hard Technology Innovations in Prison and Jail Settings  Contraband detection devices used in prison/jail  Duress alarm systems for corrections officers in indoor and outdoor settings  Language translation devices for use within prisons  Remote monitoring of inmate movements in cells and throughout prison  Perimeter security technology  New cell extraction technology  Less than lethal force in prison  Other hard technology applications in prisons and jails (e.g. the Supermax prison)

1.Contraband detection devices used in prison/jail

3 Types of Contraband Detection Devices Used in Prisons and Jails  Concealed Weapon and Contraband Imaging Detection Systems (CWCIDS): Hand-held and walk through metal detectors are the most frequently used devices in prisons and jails.  Limitations: can not detect non-metallic objects, and drugs.  Ion Mobility Spectrometer (IMS) Scanning: effective in identifying drugs, but better at detecting coke(90% accurate) than pot (24%). Mobile IMS scanners can be used in cells.  Backscatter X-Ray: can detect metallic and non-metallic contraband.  Limitations privacy, exposure to radiation

NIJ Public-Private Development Initiatives: New Directions NIJ Public-Private Development Initiatives: New Directions   One NIJ-sponsored pilot program that enjoyed success used a millimeter wave imaging system to scan visitors at the Graterford State Correctional Institution in Pennsylvania.   The imaging system can look through clothing to detect weapons, cell phones and nonmetallic objects.   Currently used by the TSA to scan passengers at airports, the system was tested and evaluated at Graterford, a maximum-security facility that houses about 3,100 inmates outside Philadelphia.

The Effectiveness of New Scanner Technology  Speed :  Speed : The Graterford system completed between 400 and 600 scans in a typical week, and each scan was completed in seconds. “It really didn’t slow down the [screening] process.”  Cost:  Cost: The manufacturer made the system available for free during the testing period, and NIJ coordinated the pilot project because it provided an opportunity to do an operational evaluation in a correctional environment that involved a commercially available system.  Detection :  Detection : Overall, the millimeter wave system improved the contraband situation at Graterford. On several occasions, the system detected cell phones. It appears to deter smuggling.  Limitations:  Limitations: Although this technology detects contraband hidden under clothing, it does not detect contraband secreted in body cavities  Privacy Concerns:  Privacy Concerns: Millimeter wave systems have been controversial because they present images of bodies so well — similar to nude photographs — that some people consider the systems intrusive.

New Portable Scanner Spots Improvised weapons

2.Duress Alarm Systems for corrections officers in indoor and outdoor settings   Type I: Panic Button Alarm. These basic systems use buttons located on walls, underneath desks, and near doorways. Pushing a button transmits a dedicated signal to a central alarm console. Using visible and/or audible enunciations, the alarm console identifies the location of the event where the alarm was triggered.   Type II: Identification Alarm. In Type II systems, portable transmitters broadcast a wireless signal to a nearby sensor, which forwards the alarm to a central console. The alarm signal includes an identification code that tells the dispatcher who sounded the alarm. Because officers carry these transmitters with them, they can sound an alarm from almost anywhere within a facility.   Type III: Identification/Location Alarm. Type III systems operate much like Type II systems, with the added feature of tracking corrections facility staff members and pinpointing the alarm location. An extensive wireless infrastructure identifies, localizes, and tracks the transmitting device; the system may produce a positioning symbol on a console panel or a map-like display at a central alarm location.

TPASS 3 Evacuate IS-R Two-Way Signaling Radio Transceiving Personal Alert Safety System (PASS) Device. TPASS 3 Evacuate IS-R Two-Way Signaling Radio Transceiving Personal Alert Safety System (PASS) Device.

There is no Independent Research on the Effectiveness of Duress Alarm Systems  Identification/Location alarms are viewed as the current “state of the art” but the cost of purchasing these systems is much higher than the cost of the other two systems.  No independent evaluation findings can be found to validate vendor claims of the effectiveness of these 3 duress systems in in reducing officer injuries and deaths.  New Duress systems are being designed to incorporate both GPS and RFID technology.

3.Language Translation Devices for use within prisons

Types of Language Translation Devices   Voice Response Translators (VRT): a portable electronic translation device that emits short, prerecorded phrases in several languages.   CopTrans: a two-way translation software that allows two users to speak, each in his or her own language,and then translates into the other language.   Phraselator: a handheld, one-way, voice-to-voice translation system that translates English into one or more target languages.   SYSTRAN Software: offers desktop products, client/server systems, and Internet services that may be applicable to law enforcement and corrections in translating website content, documents, letters, s, and other text into 36 languages.

Voice Response Translators   The Voice Response Translator (VRT) is currently being tested in both military and various CJ environments.   The U.S. Department of Defense’s Special Operations Command and the Coast Guard have placed orders for the VRT, which costs $3,000 per unit and includes a 5-year warranty, training, and technical support.   The VRT user selects a language and speaks a trigger phrase in English into the VRT.   The VRT uses voice recognition technology to determine which phrase to emit in response to the spoken command. 

4.Remote Monitoring of inmate movements in cells and throughout prison 4.Remote Monitoring of inmate movements in cells and throughout prison

Three Types of Remote Monitoring Technology  1.Radio Frequency Identification Devices (RFID): used to track inmate movements within prison.  RFID systems are wireless; inmates wear transmitters that communicate real time prisoner location data to a central information center  Extent of Use: implemented in several large state prison systems, including California, Illinois, Michigan, and Ohio  2.Biometric Monitoring Systems, using hand geometry or fingerprint detection devices to allow/restrict access to locations within prison.  Extent of Use: No large scale use to date  3. Smart Card Systems, using credit card sized smart cards that contain the inmate’s photo and a circuit chip that stores info about each inmate.  Extent of Use: No large scale use to date

Pinpointing Prison Hotspots: RFID Technology   One potentially promising approach involves radio frequency identification (RFID) technology, which uses small transponders called “tags” to track movements.   RFID tags can be attached to or incorporated into a variety of objects, such as wristbands.   Each tag has an integrated circuit and a tiny antenna to handle radio signals and can be used with a network of sensors — called RFID readers — to track movements.

Offender Location, Movement and Prison Management: Research Findings Offender Location, Movement and Prison Management: Research Findings   Extent of Use: RFID technology has been used to track inventory in warehouses, but its use in correctional facilities is relatively new.   A few correctional institutions have used the systems to provide information on prisoners’ movements and to alert staff if there is an unusual concentration of people in a certain area.   Movement information may prove useful in investigations to determine who was present in a certain part of a building at a particular time.

: Short Term Detection Increase Expected RFID Outcomes : Short Term Detection Increase   RFID makes possible closer and continuous monitoring of inmates and, thus, is expected to increase the detection of prohibited behaviors.   Many authorized movements, even when they result in inmate-on-inmate assaults, may have previously gone undetected or at least undocumented.   With RFID, these movements should result in a documented alarm, triggering protocols for officer response and documentation in facility incident data. .  The short-term outcome of RFID introduction is an expected increase, rather than decrease, in the number of inmate behavior-related incidents tracked in facility data.

: Long Term Deterrence Expected RFID Outcomes : Long Term Deterrence   Indicators of unauthorized inmate activities are expected to “peak” early in the period following full implementation, (i.e., the point at which RFID reaches its maximum ability to detect previously undetected activities).   Subsequently, indicators of unauthorized inmate activities would begin to decline (as a result of deterrence).   This would be expected as   (1) inmates become more certain that such activities will be detected and negative consequences will result and (2) staff response protocols are adjusted for certain types of RFID alarms.  

5.New Perimeter Security   Correctional facilities should always have a security technology enhancement plan (STEP).A STEP has several operational segments :   Perimeter security. Includes lighting, fencing materials, electronic detection of movement on the perimeter, equipment for staff duty stations (sally ports, towers and vehicles) and electronic contraband detection.   Staff and inmate communication. Involves technology related to intercoms, radios, telephones, emergency callback systems, pagers and cell phones.   Contraband detection. Entails metal detectors, x-ray machines and technologies such as ion scanners.

Perimeter security technology  Intended to deter escape and prevent intrusion into prison environments, Oldcastle Security's Guardtower solution is a non-lethal electric fence that can detect wire movement in any direction.

Effectiveness of Perimeter Security Technology  Perimeter Security works: Escape Attempts are rare; successful escapes are even rarer. We do not know what works best, however.  New Technologies have not been evaluated:  1.Additional video cameras and increased lighting have been introduced in several large prison systems, but no independent evaluation of the cost effectiveness of these new investments have been conducted to date.  2.Sensor fences are also being implemented with claims of low cost, low maintenance, and low false alarm rates; but no research can back up these claims

6.New Cell Extraction Technology

7.Less than Lethal Force in Prison  Three Types of Non-Lethal Force Technology in Federal and State Prisons:  Oleoresin capsicum (pepper spray)  Diversionary (flash bang) devices  Impact Munitions( bean bags, plastic, or rubber, bullets)  Evaluation Research on the use of these weapons in prison is not available.  Issue :Private Prisons and Non-Lethal Force 

8.New Prison Design: The Supermax Prison  What is a Supermax? A New prison designed to control inmates defined as high violence risk, or who require special management due to their crime type( e.g. serial killers and terrorists)  Extent of Use: 1% of all prisoners( about 20,000 inmates) are currently housed in a super-max facility, where they are confined to their cell for up to 23 hours each day.  Evidence of Effectiveness: mixed; Prison Wardens like it, but questions can be raised on the use of this level of social isolation.

9.The Problem of Cell Phones in Prison: Detection Technology

Cell Phone Detection: New Technology  At the New Jersey State Prison inmate check-in starts with a seat on the B.O.S.S. chair.  At the New Jersey State Prison inmate check-in starts with a seat on the B.O.S.S. chair. New Jersey State PrisonNew Jersey State Prison  The "Bodily Orifice Security Scanner“( BOSS) detects any contraband prisoners may be hiding, anywhere inside themselves.  In the past corrections officers were looking for drugs and weapons but now they focus more and more on cell phones.  Across the country mobile phones are finding a way into prisoner's hands.  Nearly 400 cell phones were confiscated from prisoners in New Jersey last year. New JerseyNew Jersey

Why Do Prisoners Need Cell Phones? 3 Reasons  To Facilitate the commission of crimes on the outside,  To Help plan escapes,  To Tell friends on the outside to retaliate against witnesses who are going to testify at trial against some of the inmates in jail.

Dogs and Cell Phone Detection  NJ Department of Corrections developed a new program to sniff out cell phones once they get inside of prisons, and prisoners: Dogs. NJ Department of Corrections NJ Department of Corrections  New Jersey is one of the only states where the dogs are both trained and used by corrections officers.  New Jersey is one of the only states where the dogs are both trained and used by corrections officers.  "The [phone] odor is a little bit different from bomb training and narcotics training. [It] carries differently than those odors so we had to train the dogs how to get in there closer and a little tighter.”  The dogs, mostly Labradors, have found the phones where corrections officers cannot: inside shoes, electrical outlets, behind plumbing, even in toilets.  html html html

Effectiveness of Hard Technology: A Summary  Contraband detection devices: positive preliminary research at one prison site  Duress alarm systems: no evaluation research  Language translation devices : no evaluation research  Remote monitoring : ongoing evaluation, not yet completed  Perimeter security technology: no evaluation research  New cell extraction technology: no evaluation research  Less than lethal force in prison: no evaluation research  Supermax prison: limited and mixed evaluation research findings  Cell phone Detection Technology: in development