Skip to main content
U.S. flag

An official website of the United States government

Tracking Prisoners in Jail With Biometrics: An Experiment in a Navy Brig

"Keeping track of inmates within a prison or jail is a constant challenge, especially as they move from one part of the facility to another. Monitoring their movements requires corrections officers to accurately identify individual prisoners by sight as they pass through security posts. It also requires frequent telephone and radio communications between officers at two or more security posts, paper passes authorizing inmates’ movements, and dry-erase or clip boards with handwritten records to note when prisoners left one area and entered another.

Welcome to Interagency Use of Facial Recognition… Does it work? (2013)

"The Pinellas County Sheriff’s Office (PCSO) began efforts with FR technology in 2001 and has since emerged as a primary provider of law enforcement applications for face recognition. PCSO uses FR for corrections processing, mobile identification, investigations, and allows access to trained authorized users via Florida’s CriminalJustice Network (CJNET)."

Biometrics in Corrections (2000)

"Simply put, biometric identification is based on the statistical measurement of physiological characteristics. In this sense, biometrics is the science of using a particular biological aspect of the human body to recognize a person for security, attendance, or any other purposes for which proof of identity is required. A buzzword right now, biometric identification actually has been around for a while. The most widely used biometric is fingerprints.

10 fitness and health apps for corrections officers (2014)

"Staying in shape is the easiest thing you can do to keep yourself safe as a corrections officer. But where can you find time to work out when you’re working a 12-hour shift? These ten phone apps, varied between iOS and Android, are just for that. Whether it’s a handful of minutes or a break on your weekend, make the most of your free time and get a few extra push-ups in."

Black Box Justice (2017)

"Richard Berk designs computer algorithms that predict crime. As courts and cops increasingly use his and similar tools to shape everything from parole decisions to street policing, Berk has a warning: accuracy comes at the cost of fairness, and citizens must decide where justice lies."

Should Social Media Be Banned in Prison? (2017)

"Planning for Saturday’s protest duplicates how inmates in 24 states used Facebook, Twitter and YouTube in September to stage a work strike on the 45th anniversary of the Attica prison uprising to protest prison conditions, which they called “modern-day slavery.”"

NCSC - Workload and Resource Assessment Resource Guide

More than 25 states currently rely upon NCSC weighted caseload formulas to determine the need for judges, court staff, prosecutors, and/or public defenders, support funding requests, and allocate justice system personnel within the state in an efficient and equitable fashion.

When a Computer Program Keeps You in Jail (2017)

"Technological advancement is, in theory, a welcome development. But in practice, aspects of automation are making the justice system less fair for criminal defendants. The root of the problem is that automated criminal justice technologies are largely privately owned and sold for profit. The developers tend to view their technologies as trade secrets. As a result, they often refuse to disclose details about how their tools work, even to criminal defendants and their attorneys, even under a protective order, even in the controlled context of a criminal proceeding or parole hearing."

Promoting Collaboration Between Victim Advocates and Sex Offender Management Professionals: A Resource Package (2016)

Sexual violence results from a complex interaction of individual, relationship, community, and societal factors. Multiple interventions are required to address these factors not only before, but also after sexual violence occurs as identified in the Social-Ecological Model for Prevention. Intervening with individuals who have committed sexual violence is an important part of this comprehensive sexual violence prevention framework.

Subscribe to