A Case Study of Mississippi State Penitentiary’s Managed Access Technology
dc.contributor.author | Grommon, Eric | |
dc.contributor.author | Carter, Jeremy G. | |
dc.contributor.author | Frantz, Fred | |
dc.contributor.author | Harris, Phil | |
dc.date.accessioned | 2016-11-08T22:11:00Z | |
dc.date.available | 2016-11-08T22:11:00Z | |
dc.date.issued | 2015-08 | |
dc.description.abstract | Managed access technology allows the completion of authorized calls placed from approved phone numbers (numbers that have been vetted and entered into a database) while blocking calls to or from devices or numbers that have not been pre-approved. This process is often referred to as “white-listing.“ The overall conclusion of this study is that managed access technology does capture a large quantity of cellular transmissions, but it is impossible to determine the rate with which attempted calls or texts successfully elude detection by the system. Even if a hypothetical rate of successful transmission detection was only 40 percent, however, that 40 percent would provide a substantial value-added effect to combating contraband cell phones. Thus, the decision about whether or not to use managed access technology is whether its possibly limited impact (blocking less than 100 percent of contraband calls) is sufficient to warrant the cost of installing and maintaining the managed access system. A series of interviews and teleconferences, in addition to the secondary analysis of managed-access system data, were used to produce a fundamental understanding of managed access technology operations, identify challenges and lessons learned, and develop a baseline of contraband cell phone activity. This report acknowledges that the study did not attempt to quantify potential vulnerabilities or manipulations of managed access systems. Although such an evaluation would be beneficial, it was beyond the scope of this study. 18 figures, 13 tables, 40 references, and appended examples of contraband cell phone activity, MSP managed access system infrastructure, and evaluation protocols | en_US |
dc.description.sponsorship | National Institute of Justice (NIJ), U.S. Department of Justice | en_US |
dc.identifier.citation | Grommon, E., Carter, J.G., Frantz, F., Harris, P. (2015). A Case Study of Mississippi State Penitentiary’s Managed Access Technology. Engility Corporation, Rome NY. [U.S. DOJ Award Number: 2010-IJ-CX-K023] | en_US |
dc.identifier.uri | https://hdl.handle.net/1805/11433 | |
dc.language.iso | en_US | en_US |
dc.subject | Corrections | en_US |
dc.subject | Transmission security | en_US |
dc.subject | Corrections effectiveness | en_US |
dc.subject | Prison management | en_US |
dc.subject | Prison contraband | en_US |
dc.subject | Inmate misconduct | en_US |
dc.subject | Mississippi | en_US |
dc.subject | Correctional facility security | en_US |
dc.subject | Cell phones | en_US |
dc.title | A Case Study of Mississippi State Penitentiary’s Managed Access Technology | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Grommon-2015-MSP-managed-access-technology.pdf
- Size:
- 2.61 MB
- Format:
- Adobe Portable Document Format
- Description:
- Report
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.88 KB
- Format:
- Item-specific license agreed upon to submission
- Description: