Security technology for modern remediation sites


By CN personnel

Modern correctional facilities face a number of security challenges. From a flood of contraband and the growing risk of cyber threats, to understaffing and the continued impacts of the COVID-19 pandemic, these challenges have driven the need to adopt new security technologies.

CN met with Gallagher CTO Steve Bell to discuss how today’s security technology can play a central role in supporting correctional facilities to streamline operations, deter escapees and ensure the safety of staff, inmates and visitors.

Biometric technology

The high population density and the inherent proximity to correctional facilities have presented challenges in preventing the spread of COVID-19. A recent study by the Marshall Project showed that from the onset of the COVID-19 pandemic until June 2021, at least 398,627 U.S. prisoners and 114,237 prison staff have tested positive for the disease.

“Using a contactless biometric technology like IDEMIA MorphoWave for access control, reduces physical contact between staff and visitors and helps support physical distance,” said Gallagher’s Bell.

Integrations such as the Invixium IXM TITAN provide facilities with a non-contact facial recognition access solution that also provides mask detection and temperature control. Additionally, he adds, Gallagher’s Proximity and Contact Tracing Report enables establishments to quickly identify where a staff member or visitor has been on site through a quick and efficient contact tracing. . Its smart functionality helps sites act quickly and educate affected people about the risk of infection, enabling them to take action, request tests, and minimize the spread of the virus.

Stay cyber-secure

As security technology continues to evolve, one important factor will remain: cybersecurity protection.

“Cyber ​​attacks are among the most active security attacks organizations experience in the world, and correctional facilities are not immune to them. When choosing security technology, an end-to-end approach that protects every component, from the fence to the alarm system, is crucial, ”Bell told CN. “Choosing a responsible cyber security provider who is backed by government standards is your best bet. “

Smart perimeter protection

For prison sites, it is crucial that perimeter security is as sensitive as possible to tampering with the fence line to deter and detect perimeter violations. For this reason, tension sensor fence line technology is quickly becoming the preferred solution.

“Due to its intelligent detection of fence wire disturbances, the tensioned fence wire overcomes the shortcomings often encountered in conventional tension wire technologies,” Bell commented.

Perimeter solutions, he adds, such as Gallagher’s Z10 tension sensor, continuously measure and report the tension and integrity of cables in real time and identify when maintenance is needed or when the fence has been closed. damaged. It also minimizes the frequency of false alarms by distinguishing between environmental changes and intruder attacks.

Centralized site visibility and situational awareness

As the nerve center of most modern prison facilities, a smart control room is essential to simplify workflow and minimize fatigue. A centralized site security management tool can streamline day-to-day security operations, while saving time and staff resources.

“A centralized interface, such as Gallagher’s sitemap viewer, provides full-screen visibility into site management and situational awareness for all buildings and perimeter,” Bell told CN. “An operator simply clicks on an element on the site to reveal associated information and can perform the required action without leaving the screen. This ensures a rapid and appropriate response to the violations identified.

He added that integrating your site’s security interface with a Spot Monitor screen gives prison officers a quick way to view the highest priority alarm at a glance, and is especially useful for areas at high risk which may have multiple alarms at one time. time.

With so much going on in the control room, the process of handing over between guards and the various secondary control rooms can present its own challenges. Using integrated security software like the Gallagher Command Center, correctional facilities can configure a process to consolidate surveillance in a control room during the night lockout, then distribute to multiple secondary control rooms during the night. the day. It also ensures the diversion of intercoms and video surveillance to the correct control room.

“Not only does this create operational efficiencies, but also provides facilities with an audit trail that shows that operators have accepted responsibility for the different areas they were monitoring and that procedures are being maintained,” Bell explained.

Editor’s Note: This story originally appeared in the September / October issue of Correctional News.

Source link

Leave A Reply

Your email address will not be published.