classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Guaranteed cellular detection
August 2014, Integrated Solutions, IT infrastructure

During 2012, members of the correctional fraternity in South Africa approached Eavesdropping Detection Solutions (EDS) to help them find a solution to detect contraband cellular telephones in the prison and custodial environment. They were looking for a ‘black box’ or an all-in-one solution. Unfortunately, such an easy solution does not exist. The only solution that comes close is the jamming of cellular communications inside the prison, but jamming is prohibited in South Africa and interferes with legitimate users in the same environment.

EDS conducted research and visited equipment manufacturers in the USA and UK to learn what they were doing and what equipment is available on the market. It seems that most equipment manufacturers were just focusing on one aspect of detection and were trying to promote their product as the ultimate solution. We quickly realised that there is not one equipment solution that can work under all circumstances. One thing led to another and towards the end of 2013 the company CellDetect was born with the exclusive aim to bring solutions to the correctional and custodial communities. CellDetect was officially launched at the IFSCE 2014 security exhibition in May 2014.

CellDetect designed a strategy and solution called The CellDetect Solution. The solution rests on a few pillars namely prevention, detection, localisation and neutralisation supported by intelligence (research), technical knowledge and training. The best equipment from five different global manufacturers are combined in the solution which will ensure that correctional and custodial personnel will have the advantage when applying The CellDetect Solution.

The foundation of the strategy rests on intelligence and research. The type of facility and its level of contact with the outside world drives The CellDetect Solution.

A facility that mainly hosts awaiting trial prisoners will focus their efforts on the prevention of cellular telephones coming into the facility by concentrating on the awaiting trial prisoners themselves when they return from their court appearances and the contact that they have while in the court and in transit to and from the courts.

There is specific equipment that is designed to help with the prevention of devices getting into facilities such as the SentryHound Cellular Detection Portal, the Mastiff body orifice scanning chair and the Manta Ray personal cell phone detection scanner. Recently a drone was used in Australia to fly drugs and a cell phone into a prison. The CellDetect Solution will soon include a Drone Detection System as part of its detection strategy.

A facility hosting prisoners serving life sentences who have very limited outside contact will focus their efforts on the wardens, correctional, support personnel and visitors who may have contact with these inmates from time to time.

Once a device makes its way into the prison environment there are basically two options to detect, locate and to neutralise it. The first is to conduct regular physical searches. This is sometimes like searching for a needle in a haystack. It is time consuming and without the right equipment not easy to do.

A more convenient way is to monitor the cellular radio frequencies for activities behind the prison walls. There are various pieces of equipment available depending on budget, etc. Each has its own advantages and disadvantages.

The CellDetect Solution for radio frequency monitoring and detection consists of a handheld portable spectrum analyser such as the Oscor Green SA (which acts as the RF cockpit), a passive GSM monitoring system such as the SearchLight GSM detector that provides real- time intelligence about the telephones, make, SIM cards, network and enables the operator to trace the cellular telephone to the cell from where it is operated. There are other portable handheld supporting detectors carried by the correctional services personnel while on duty and patrol such as the PocketHound, the WolfHound Pro and the Delta V RF detector.

With the above information and intelligence physical searches are conducted with the aid of a non-linear junction detector (NLJD) such as the Orion 2.4 NLJD which has been specifically designed for the correctional and custodial environments. The NLJD scans for electronic components and is an important aid to scan mattresses, walls, furniture and other hiding places for electronic components. The Orion 2.4 NLJD is so sensitive that it will even detect a hidden SIM card in a mattress, under a carpet, hidden in a chair or other furniture.

Focusing just on detecting and preventing cellular telephones alone could be a huge mistake. Wi-Fi based communication devices have been detected recently in a local maximum prison. Routers are getting smaller and more portable and are easy to hide. Some are now smaller than cellular telephones. The CellDetect Solution caters for such devices and the YellowJacket DF Wi-Fi Detector has been specifically designed to detect Wi-Fi based communications.

It also makes provision for Bluetooth operated devices. Recently 35 Bluetooth headsets were found in an Irish prison where jamming of the cellular frequencies are done to prevent cellular communications. The inmates have shifted away from GSM to making use of Bluetooth technology to communicate with each other and others.

Wi-Fi and Bluetooth operate on different frequencies than cellular based devices. The GSM jamming has no effect on Wi-Fi (2.4 GHz and 5 GHz) and Bluetooth (2.4 GHz)based devices.

All of these devices once in and operating within the prison environment presents a technical problem but the wardens and others supposed to prevent and detect these devises do not have any technical knowledge or nor do they receive any training. CellDetect has designed a three-day practical training course to provide basic technical knowledge to increase understanding as well as teaching the CellDetect strategy to deal with the prevention, detection, localisation and neutralisation of these devices.

For more information contact, CellDetect,+27 (0)12 664 3157, www.celldetect.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Taking the pain out of maintenance
    June 2017, Integrated Solutions, IT infrastructure
    Technologies that allow for predictive and preventative maintenance are not available to the mass market inside the security industry, but Naxian is changing this with its smart services offering.
  • Commercial sector security requires an integrated approach
    June 2017, Enforce Security, Integrated Solutions
    Crime risks are higher than ever in the commercial space, but clear planning can address the threats. Derek Lategan, MD of Enforce Security explains.
  • Simpler, faster and more secure
    June 2017, G4S Secure Solutions, Rhyco Risk Projects, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions asked three experts in the field of visitor management – Mark Paynter of TerPay Security Advisors, Gary Swart of Rhyco Risk Projects and Tim Timmins of G4S Secure Solutions – to share their insights into the features and future of visitor management solutions.
  • Throwing the book at visitor management
    June 2017, neaMetrics, Powell Tronics, iPulse Systems, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    There are a number of portable devices that can be used to replace the visitors’ book, all of which offer a heightened level of security and accuracy.
  • Workforce management beyond T&A
    June 2017, EOH Security & Building Technologies, Solution House, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    True workforce management covers all aspects of looking after your most important assets, your employee workforce.
  • Data governance and the security industry
    June 2017, Technews Publishing, Cyber Security, IT infrastructure, Security Services & Risk Management
    So how does all the talk about data governance and data protection impact the security industry? Or does it?
  • Integration and open standards
    June 2017, Pelco by Schneider Electric, Integrated Solutions, Security Services & Risk Management
    What are the critical factors for the BMS of the future? Cybersecurity and IoT play a role, but in the end integration and open standards pave the way.
  • Keeping it simple
    June 2017, Johnson Controls, Asset Management, EAS, RFID, Integrated Solutions
    The future of building automation systems (BAS) is here with IoT, simplicity and integration bringing BAS to smaller buildings.
  • Integration enhances simplicity
    June 2017, ZKTeco, Integrated Solutions
    Due to heightened awareness as well as compliance requirement around occupational health and safety issues, commercial business has had to include security as a critical component of its core operations.
  • BaaS: Biometrics as a service
    June 2017, Bytes Systems Integration, Access Control & Identity Management, Integrated Solutions
    Bytes Systems Integration has launched BioVault, a cloud-based biometric solution to enable a broad range of financial services providers access to the power of biometrics.
  • Integrating access with everything
    June 2017, Suprema, neaMetrics, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Suprema enhances its solutions through third-party integration with NX-Witness, Avigilon and Arteco.
  • The Spotter container solution
    June 2017, Perimeter Security, Alarms & Intruder Detection, IT infrastructure
    Secu-Systems’ Spotter is a wide-area ­surveillance solution that uses thermal and visual surveillance cameras, as well as Panoptes MTI (Movement Target Indicators) software.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.