Technology

IPS:   Internal Perimeter Security

IPS is the functional name of the application and its modules.  The number and capability of modules is only limited by the inventiveness of the end user.  VJS can and will customize an application to suit the needs of the client.

The advantage of the application is that it can be based entirely on the client’s existing infrastructure.  There is no particular need to upgrade or replace existing equipment.  However, should the client determine that an expanded need is advantageous, VJS can design and implement the various hardware and software components.

While VJS is the offshoot of many years of correctional experience its application can serve a variety of Public and Private entities.  The end result of its implementation is better personal security for all participants including citizens, students, teachers, correctional officers, administrators and incarcerants.

Potential application modules:

Post Incident analysis:   Given the stored information on any enrolled closed group,  the video archive can be used to identify and determine participants in and around a particular incident.   This analysis can be performed on current or archived video information stores.   Good guy/bad guy can be identified and interviewed for further action.

Enrollment Database:  Logging, identification and recall of entity information.  This is the basis for future analysis. This can be used with student Id systems, inmate booking, inventory and future tracking and  event planning.

Perimeter Security:  This is particularly applicable for correctional facilities of all types.   Not only does it provide real time detection to supplement your hard wired intrusion system, it can be a preemptive detection system that alerts the user to impending security breaches.   Out of place, no man’s land and other off limit areas are no longer dependent on the human eye or physical interaction with fixed arrays for detection.  The system also reduces false alarms during weather events.

Aerial Intrusion Detection:  In this real world of drones it has become more difficult to prevent contraband from being delivered to innocuous places in a secure perimeter.  With the implementation of combined radar/video devices the sky above and the ground around the facility perimeter can be continuously monitored and thus defended in any weather condition.  No longer can snow and rain events provide cover for nefarious activities.

Facility Counts:   The existing infrastructure can be used to record incarcerant movement within a secure perimeter so as movement occurs an active and accurate count of the facility is maintained. More importantly, an administrator can with the use of a query determine where and how many are present in any defined location at any time. In addition, the identity of each of those individuals can be ascertained at any time.

Inmate Booking and Gang ID:   The capture of incarcerant information usually occurs at a central booking facility.  The demographic and offender information is captured at this stage.  Unfortunately, this information is really self-reported save for the modicum of information that may be passed on to the administrator from various law enforcement services.  The use of IPS provides unique identifiers for future reference and use.  The individual henceforth can be tracked securely.    In additona, a gang database can be assembled from recorded tattoo images which can be compared to pictures of individuals being booked. This information can be used  to determine affiliations,  potential enemies and even perhaps discovery of new affiliations.

Package tracking:  The system can be used post incident to determine the last individual to hold a weapon, package,  or other physical thing.   Usually a weapon is dumped upon committing a crime. Imagine being able to point to this weapon in place and query the system to determine direction it came from, the source  and ultimately providing an ID of the individual who possessed it.