Technology Priorities and Institutional Corrections

Technology Priorities and Institutional Corrections

Institutional Corrections Technology Priorities
NIJ's research, development, technology, and evaluation process involves the convening of technology working groups. The Institutional Corrections Technology Working Group has identified the following technology needs:
Improved contraband detection. Technologies that can be incorporated into a single transportable device that will detect a broad spectrum of contraband.
Data analysis, integration, and sharing. Technology to analyze data sets of the scale and complexity of those that reside in correctional institutions (e.g., inmate telephone calls or inmate financial transactions) to identify related data or extract hidden actionable information related to criminal activity. NIJ is particularly interested in:
• Concepts for technologies that provide integrated access to the information assets of correctional institutions, regardless of where the information resides, without requiring custom programming.
• Concepts that promote and provide standards-based electronic information, exchanged in a secure and trusted environment between correctional agencies and/or other public safety organizations.
Duress alarm systems. Technology that will offer cost-effective, accurate, and reliable duress alarm systems that enhance correctional officer safety and function effectively both indoors and outdoors. Also, technologies that provide correctional staff the ability to remotely monitor and manage inmates at risk of self-harm.
Identification and tracking. Technology for continuous real-time indoor and outdoor identification, location, and tracking of correctional staff and inmates with tamper-resistant design and minimal network infrastructure.
Surveillance and monitoring. Technology for automated detection systems that require minimal human monitoring, such as technologies that automatically alert officials when specific actions occur (e.g., escape attempts, violence, and other criminal activities). Other...

Similar Essays