Countering Threats to Correctional Institution Security is a Rand Corporation report by Joe Russo, Dulani Woods, John S. Shaffer, and Brian A. Jackson.

The security of correctional institutions has long been threatened by various factors, such as violence, escape attempts, and contraband, which have persisted since the inception of these institutions. However, as society and technology evolve, new challenges have emerged, including computer hacking, synthetic drugs, cell phones, and drones. Many of these contemporary threats endanger institutional security and pose risks to public safety.

Recognizing the ongoing challenges confronting the corrections sector in addressing these diverse threats, researchers at RAND organized an expert workshop. The aim was to gain deeper insights into these challenges and identify the most critical needs for maintaining institutional security.

Regrettably, resource constraints and staffing limitations hinder correctional institutions’ ability to adapt to evolving threats and adjust their security and staffing strategies accordingly. Additionally, the persistent lack of empirical data impedes efforts to develop effective interventions to mitigate these threats.

To address these challenges, it is imperative to prioritize research needs and develop tools and resources, as highlighted by workshop participants. This approach offers a pathway to provide correctional institutions with the necessary support to confront security threats in the future effectively.

Publication Date– July 2019

Countering Threats to Correctional Institution Security contains the following major sections:

  • Key Findings (11)
  • Methodology
  • Human Resources
  • Contraband
  • Information Technology and Cyber Threats
  • Security Threat Groups and Criminal Activity
  • Emergency Preparedness
  • Conclusion

This document does not note distribution limitations. Rand Corporation offers readers the opportunity to download the eBook for free.

C-UAS Hub does not own this content and provides a link for users at the bottom of the page to access the document in its original location. This allows the author(s) or organizations to track important metrics related to their work. All credit goes to its rightful owner(s).

See the C-UAS Hub Corrections Sector resource page for more information and references.

Post Image Credit- envatoelements by akophotography