You Can Run, but You Can’t Hide

High-tech search tools help in a corrections environment

Maintaining the security of any large residential institution housing hundreds or thousands of people can be a daunting task. The problems faced by those in charge of preserving the peace in these facilities can mirror those of any urban police department. As in any diverse population, there are those who will remain lawful and those who look to circumvent the rules that serve to regulate the peace. In a correctional institution, however, these problems are magnified because the population is made up of inmates who have already violated societal law at least once and may have a predisposition for lawlessness, criminal enterprise and violence.

Most institutions have strict regulations on what prisoners are allowed to have in their possession, as well as rigorous screening procedures for new inmates and visitors. A key element to maintaining the safety and security of a correctional facility for both prisoners and staff members is to ensure that weapons, narcotics, cell phones and other types of contraband that further criminal activity are eliminated. These items can be minimized by frequent and thorough searches of the institution. Searches should be random to ward against preemptive acts by the institution’s population and to neutralize the search efforts

Ingenuity of Inmates
One thing prisoners have on their side is time. They can observe and study correctional protocol and operating procedures over long periods to look for holes in security regulations. Time also affords them the ability to engineer and fabricate dangerous jailhouse weapons from common items, such as scraps of steel or wood, toothbrushes and even old newspapers. Often these unauthorized items find their way into the population and are hidden in living spaces and/or common areas.

Appropriate search techniques can make a difference in minimizing violence and criminal activity. New video-based search tools allow officials to look into areas that are not easily accessible, increasing the efficiency, effectiveness and safety of search operations. Conducting more frequent and thorough searches ultimately results in fewer weapons and contraband in a population.

Look High, Look Low
When searching an area, it is best to break it up into two or three zones. These zones are typically defined by height. Low-level zones could be those areas that extend from the floor to a height of approximately 3 1/2 feet. A mid-level zone could extend from approximately 3 1/2 feet off the floor to 6 feet. Heights above 6 feet would be considered high-level zones. Each of the defined zones has its own issues relative to performing a thorough inspection.

Low-level zones usually require an inspector to search on hands and knees or crawl in order to look underneath furniture and fixtures and visually assess the conditions in these areas. Repetitive cell searches can create fatigue, compromising an official’s ability to detect suspicious items that may be hidden. A self-illuminating camera on a rolling trolley attached to a pole is a good tool to maximize the effectiveness of low-level searches. A high-resolution camera allows an officer to see things that might easily be missed when viewed on a portable, body-worn display.

High-level zones may require climbing, or the use of a ladder and possibly a second person, complicating and hindering the process. High-level searches can be accomplished with a camera on a telescoping pole. These pole cameras allow visual access to areas such as lighting fixtures, suspending ceilings, HVAC vents, high windowsills and ledges—all with the inspector’s feet on the ground.

Mid-level searches are best conducted with a small pole camera that allows the inspector to look in areas that would be difficult or hazard to assess using mirrors. The small pole camera can be inserted into tight areas, around corners or even into machinery to look for contraband and weapons. It’s also important to consider use of equipment that can be immersed in water. They can be used to look into such unpleasant areas as U-bends or toilets—a frequent location used to hide contraband and weapons.

Videoscopes and fiberscopes also can be used to gain visual access to small areas. A videoscope is an electronic device that can be up to two meters long and flexible with a 4- to 8- millimeter diameter. The tip can articulate in two or four directions, depending on the model. A light source can be used to generate light at the tip of the videoscope, if required. The inside of vents, sink drains, walls and any small opening can be inspected easily. Fiberscopes are similar to videoscopes, but they are optical instruments, not electronic. They are used for similar applications but typically produce a lower-resolution image.

Versatile Video
The use of technology-based video tools can expedite and improve the quality of a search operation. These tools usually feature a portable, battery-operated, body-worn video display that facilitates a close-up inspection of areas that are difficult to access or see. Modular systems that include interchangeable tools yield the most value because they allow a single system to be used in a variety of environments and conditions. The configuration of the video search system can be dynamically adjusted to deal with the challenges posed by inspecting the different search zones of a common area or personal living space. The tools typically consist of a high-resolution, low-light video camera that is optimized via its form factor to inspect a particular type of search zone or space. The cameras usually are ruggedly constructed to endure the rigors of repetitive use in a difficult environment and produce their own light for dark areas.

The video tools used in search operations also have value for tactical teams. Such teams are routinely deployed to quell inmate insurrections or riots. Once again, the modular approach maximizes the effectiveness and versatility of the tool by giving it additional capabilities with other accessories. The color camera used to search for contraband can be interchanged with an IR-illuminated, low-light camera on pole for tactical surveillance around corners, in stairwells and up high into windows or upper-tier cells. Other more exotic technologies also can be used, such as thermal imaging cameras and even small robots.

As technology marches forward, new video-based search tools allow correctional staff to be more efficient and effective in performing basic security sweeps in and around a facility. There are other, hidden benefits, as well. The conspicuous use of high-tech search tools can act as a deterrent against those who would consider smuggling contraband or hiding weapons within their living environment. The increased frequency and effectiveness of physical searches that can be accomplished using technology-based video search tools can play a significant role in increasing the safety of correctional officers and inmates alike.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3