U.S. flag

An official website of the United States government, Department of Justice.

Dot gov

The .gov means it’s official.
Federal government websites always use a .gov or .mil domain. Before sharing sensitive information online, make sure you’re on a .gov or .mil site by inspecting your browser’s address (or “location”) bar.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Case Study of Mississippi State Penitentiary's Managed Access Technology

NCJ Number
250262
Date Published
Author(s)
Eric Grommon Ph.D., Jeremy G. Carter Ph.D., Fred Frantz, Phil Harris
Annotation
This case study of the use of “managed access technology” to counter the use of contraband cell phones by inmates in Mississippi’s State penitentiary (MSP) focuses on this technology’s capability, functionality, and impact on contraband cell phone use.
Abstract
Managed access technology allows the completion of authorized calls placed from approved phone numbers (numbers that have been vetted and entered into a database) while blocking calls to or from devices or numbers that have not been pre-approved. This process is often referred to as “white-listing.“ The overall conclusion of this study is that managed access technology does capture a large quantity of cellular transmissions, but it is impossible to determine the rate with which attempted calls or texts successfully elude detection by the system. Even if a hypothetical rate of successful transmission detection was only 40 percent, however, that 40 percent would provide a substantial value-added effect to combating contraband cell phones. Thus, the decision about whether or not to use managed access technology is whether its possibly limited impact (blocking less than 100 percent of contraband calls) is sufficient to warrant the cost of installing and maintaining the managed access system. A series of interviews and teleconferences, in addition to the secondary analysis of managed-access system data, were used to produce a fundamental understanding of managed access technology operations, identify challenges and lessons learned, and develop a baseline of contraband cell phone activity. This report acknowledges that the study did not attempt to quantify potential vulnerabilities or manipulations of managed access systems. Although such an evaluation would be beneficial, it was beyond the scope of this study. 18 figures, 13 tables, 40 references, and appended examples of contraband cell phone activity, MSP managed access system infrastructure, and evaluation protocols
Date Created: October 16, 2016