Jail Technology PPT

1896 days ago, 816 views
PowerPoint PPT Presentation
Utilizing Hard Innovation to Make Detainment facilities and Correctional facilites More secure : Does It Truly Work? Dec.1, 2009 Address Educator James Byrne. E xamples of Hard Innovation Advancements in Jail and Correctional facility Settings. Stash recognition gadgets utilized as a part of jail/prison

Presentation Transcript

Slide 1

Utilizing Hard Technology to Make Prisons and Jails Safer : Does It Really Work? Dec.1, 2009 Lecture Professor James Byrne

Slide 2

E xamples of Hard Technology Innovations in Prison and Jail Settings Contraband identification gadgets utilized as a part of jail/prison Duress alert frameworks for prison guards in indoor and open air settings Language interpretation gadgets for use inside detainment facilities Remote observing of detainee developments in cells and all through jail Perimeter security innovation New cell extraction innovation Less than deadly compel in jail Other hard innovation applications in penitentiaries and correctional facilites (e.g. the Supermax jail)

Slide 3

1.Contraband identification gadgets utilized as a part of jail/correctional facility

Slide 4

3 Types of Contraband Detection Devices Used in Prisons and Jails Concealed Weapon and Contraband Imaging Detection Systems (CWCIDS): Hand-held and stroll through metal indicators are the most as often as possible utilized gadgets in detainment facilities and correctional facilites. Constraints : can not recognize non-metallic protests, and medications. Particle Mobility Spectrometer (IMS) Scanning: compelling in recognizing drugs, yet better at distinguishing coke(90% exact) than pot (24%). Portable IMS scanners can be utilized as a part of cells. Backscatter X-Ray : can identify metallic and non-metallic stash. Constraints security, presentation to radiation

Slide 5

NIJ Public-Private Development Initiatives: New Directions One NIJ-supported experimental run program that delighted in achievement utilized a millimeter wave imaging framework to sweep guests at the Graterford State Correctional Institution in Pennsylvania . The imaging framework can look through apparel to recognize weapons, phones and nonmetallic items. As of now utilized by the TSA to output travelers at air terminals, the framework was tried and assessed at Graterford, a greatest security office that houses around 3,100 prisoners outside Philadelphia.

Slide 6

The Effectiveness of New Scanner Technology Speed : The Graterford framework finished in the vicinity of 400 and 600 outputs in an average week, and each sweep was finished in seconds. "It truly didn't back off the [screening] procedure ." Cost : The producer made the framework accessible for nothing amid the testing time frame, and NIJ facilitated the pilot extend in light of the fact that it gave a chance to do an operational assessment in a restorative situation that included a financially accessible framework . Location : Overall, the millimeter wave framework enhanced the stash circumstance at Graterford. On a few events, the framework distinguished phones. It seems to prevent carrying. Constraints : Although this innovation identifies booty covered up under attire, it doesn't recognize stash emitted in body depressions Privacy Concerns : Millimeter wave frameworks have been disputable in light of the fact that they display pictures of bodies so well — like bare photos — that a few people consider the frameworks meddling.

Slide 7

New Portable Scanner Spots Improvised weapons

Slide 8

2.Duress Alarm Systems for prison guards in indoor and open air settings Type I: Panic Button Alarm . These fundamental frameworks utilize catches situated on dividers, underneath work areas, and close entryways. Pushing a catch transmits a devoted flag to a focal caution comfort. Utilizing unmistakable or potentially discernable articulations, the alert reassure recognizes the area of the occasion where the caution was activated. Sort II: Identification Alarm . In Type II frameworks, convenient transmitters communicate a remote flag to an adjacent sensor, which advances the alert to a focal reassure. The alert flag incorporates a distinguishing proof code that tells the dispatcher who sounded the caution. Since officers convey these transmitters with them, they can sound a caution from anyplace inside an office. Sort III: Identification/Location Alarm . Sort III frameworks work much like Type II frameworks, with the additional element of following revisions office staff individuals and pinpointing the alert area. A broad remote framework recognizes, confines, and tracks the transmitting gadget; the framework may create a situating image on a comfort board or a guide like show at a focal caution area.

Slide 9

TPASS 3 Evacuate IS-R Two-Way Signaling Radio Transceiving Personal Alert Safety System (PASS) Device.

Slide 10

There is no Independent Research on the Effectiveness of Duress Alarm Systems Identification/Location cautions are seen as the ebb and flow "best in class" yet the cost of buying these frameworks is considerably higher than the cost of the other two frameworks. No autonomous assessment discoveries can be found to approve merchant cases of the adequacy of these 3 coercion frameworks in decreasing officer wounds and passings. New Duress frameworks are being intended to fuse both GPS and RFID innovation.

Slide 11

3.Language Translation Devices for use inside penitentiaries

Slide 12

Types of Language Translation Devices Voice Response Translators (VRT): a compact electronic interpretation gadget that transmits short, prerecorded expressions in a few dialects. CopTrans: a two-way interpretation programming that permits two clients to talk, each in his or her own language,and then converts into the other dialect. Phraselator: a handheld, one-path, voice-to-voice interpretation framework that makes an interpretation of English into at least one target dialects. SYSTRAN Software : offers desktop items, customer/server frameworks, and Internet benefits that might be pertinent to law implementation and rectifications in interpreting site content, reports, letters, messages, and other content into 36 dialects.

Slide 13

Voice Response Translators The Voice Response Translator (VRT ) is right now being tried in both military and different CJ conditions. The U.S. Bureau of Defense's Special Operations Command and the Coast Guard have put orders for the VRT, which costs $3,000 per unit and incorporates a 5-year guarantee, preparing, and specialized support. The VRT client chooses a dialect and talks a trigger expression in English into the VRT. The VRT utilizes voice acknowledgment innovation to figure out which expression to transmit in light of the talked summon. http://www.au.af.mil/au/awc/awcgate/nij/nothlostfall03.pdf

Slide 15

4.Remote Monitoring of prisoner developments in cells and all through jail

Slide 16

Three Types of Remote Monitoring Technology 1.Radio Frequency Identification Devices (RFID): used to track detainee developments inside jail. RFID frameworks are remote; detainees wear transmitters that convey constant detainee area information to a focal data focus Extent of Use : executed in a few vast state jail frameworks, including California, Illinois, Michigan, and Ohio 2.Biometric Monitoring Systems , utilizing hand geometry or unique mark identification gadgets to permit/confine access to areas inside jail. Degree of Use : No huge scale use to date 3 . Brilliant Card Systems , utilizing charge card measured shrewd cards that contain the prisoner's photograph and a circuit chip that stores data about every detainee. Degree of Use : No substantial scale use to date

Slide 17

Pinpointing Prison Hotspots: RFID Technology One conceivably encouraging methodology includes radio recurrence ID (RFID) innovation, which utilizes little transponders called "labels" to track developments. RFID labels can be connected to or joined into an assortment of articles, for example, wristbands. Each tag has a coordinated circuit and a small recieving wire to deal with radio flags and can be utilized with a system of sensors — called RFID perusers — to track developments.

Slide 18

Offender Location, Movement and Prison Management: Research Findings Extent of Use : RFID innovation has been utilized to track stock in stockrooms, however its utilization in remedial offices is generally new. A couple of restorative foundations have utilized the frameworks to give data on detainees' developments and to ready staff if there is an unordinary grouping of individuals in a specific territory. Development data may demonstrate valuable in examinations to figure out who was available in a specific piece of a working at a specific time.

Slide 19

Expected RFID Outcomes : Short Term Detection Increase RFID makes conceivable closer and nonstop observing of detainees and, therefore, is relied upon to expand the discovery of disallowed practices. Many approved developments, notwithstanding when they result in detainee on-prisoner strikes, may have beforehand gone undetected or if nothing else undocumented. With RFID, these developments ought to bring about an archived alert, activating conventions for officer reaction and documentation in office episode information. The fleeting result of RFID presentation is a normal increment , as opposed to diminish, in the quantity of prisoner conduct related occurrences followed in office information .

Slide 20

Expected RFID Outcomes : Long Term Deterrence Indicators of unapproved detainee exercises are relied upon to "pinnacle" right on time in the period taking after full usage, (i.e., the time when RFID achieves its most extreme capacity to distinguish beforehand undetected exercises). Therefore, pointers of unapproved prisoner exercises would start to decay (thus of prevention). This would be normal as (1) prisoners turn out to be progressively sure that such exercises will be distinguished and negative outcomes will result and (2) staff reaction conventions are balanced for specific sorts of RFID cautions. http://www.ncjrs.gov/pdffiles1/nij/gifts/225449.pdf

Slide 21

5.New Perimeter Security Correctional offices ought to dependably have a security innovation improvement arrange (STEP).A STEP has a few operational fragments : • Perimeter security . Incorporates lighting, fencing materials, electronic discovery of development on the edge, gear for staff obligation stations (sally ports, towers and vehicles) and electronic stash recognition. • Staff and detainee correspondence . Includes innovation identified with radios, radios, phones, crisis callback frameworks, pagers