Weapons, drugs, money, etc. are all risky and legal. But mobile devices and minicomputers that are allowed to connect to accomplices outside the walls do the most damage. With it, criminals can continue to do business and function as if they were outside of prison.
Smuggling cell phones to prisoners reaches out to co-conspiratorial guards, lawyers, or other smarter conspiracies. Some smugglers have resorted to drones or baking file versions of birthday cakes. Regardless of efforts to keep cellphones out of jails, some will get through.
a secondary grade
Ping An experts call the proliferation of cell phones an epidemic. In South Carolina, prison officials found and confiscated one cell phone for every three inmates. In Oklahoma, every 6 inmates succumbs and there is one legal phone.
About 2.4 million people are imprisoned across the country, and criminals have between 400,000 and 800,000 legitimate phones in the hands. Phones allow prisoners to use social media, conduct business, visit banks, and more.
This is not just an American problem. At least 15,000 mobile phones or SIM cards have been confiscated from prisons in England and Wales. To stand in the way of confrontation, officials scrambled to gain ground or blocked cell phone signals.
“Grab” allows legitimate phone and SIM access while blocking others. It’s expensive and limited to older technologies.
Blocking the signal won’t end the use of the phone
Interfering with cell signals is not foolproof. Cell phone jammer also have a human element. Blocked signals affect legitimate mobile phones as well as banned mobile phones. Mobile reception is completely blocked, jamming blocks all phones and SIM cards within range of the jammer.
Guards and other staff could “accidentally” cut power or otherwise disable signal blocker. Even long-lasting infixes allow the phone to connect to the inner world.
Cell phones used for computer functions can function normally without a signal. Smartphones are great for use as small computers and data storage devices. Connect to Wi-Fi for voice calls, data transfers, and ubiquitous social media.
Prisoners use the device to record messages and videos, then move the phone or SIM card. Accomplices pass data and information to prisoners inside or elsewhere on the facility.
Other precautions in correctional equipment should include the use of drone jammers for safety.