Skip navigation

Controlling Contraband Cell Phones, Schober, 2015

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
Controlling
Contraband
Cell Phones
Interception
and Detection
in Prisons,
Correctional and
Secured Facilities
By Scott Schober
Wireless Detection and
Cybersecurity Expert

TA B L E O F C O N T E N T S
Controlling Contraband Cell Phones

PAGES

1-2

Controlling Contraband Cell Phones

3

Contraband Cell Phone use on Internet

4

Blocking Unauthorized Calls?

5-9

How Phones Enter Secure Facilities

10-12

Contraband Detection Methods

13-16

Interception and Detection Recommendations
Berkeley Products Detect Contraband Cell Phones
Berkeley Varitronics Systems and Scott Schober

© 2015, Berkeley Varitronics Systems, All Rights Reserved

17-18
19

www.BVSystems.com

1

Controlling Contraband Cell Phones

Contraband smart phones present
challenges to wardens

Contraband has been around as long as there have been prisoners, but
contraband cell phones are a relatively new phenomenon. Cell phones
started out as bulky devices the size of a brick, but market forces and
evolving technology have made them progressively smaller and smarter.
Cell phones first started to make their way into prison systems in the
1990s, but the number of contraband phones exploded in the 2000s.
Now many correctional systems seize thousands of phones per year.
Even basic phones offer unmonitored communication with associates on
the outside. Smartphones also allow inmates to access to the
Internet and social media platforms.

In 2014 a routine sweep at a prison in New Mexico
uncovered a smart watch.

Some inmates use contraband phones to talk with their families and
avoid charges from the pay phones installed in correctional facilities.
Other users are not so benign. They also use contraband phones to pass
orders to accomplices inside or outside the prison. Inmates have used
cell phones to orchestrate
escape attempts, run identity theft and drug rings,
intimidate witnesses, run
scams, extort money,
coordinate riots and
protests and take out
contract hits on members
of the public and other
inmates.

Click on this link to watch the actual video:
http://krqe.com/2014/10/24/watch-phone-found-in-prison-lockdownsearch

www.BVSystems.com

Controlling Contraband Cell Phones

2

Think twice before "Jamming"
Can’t prisons just “Jam” cell phone transmissions?

No, it’s illegal.

Jamming causes more problems than it solves. Under current law, the
use of technologies that block (or “jam”) mobile calls are illegal in the
United States. Cell phone jamming doesn’t just block inmate calls -- it
can also interfere with mobile 9-1-1 emergency calls and public safety
communication. Plus if “jammers” were legalized for any purpose, the
department of Homeland Security, would be worried that if put in the
hands of terrorists, they could “jam” an area after an attack. It’s a very
complicated issue. Therefore, we don’t see “jamming signals” as an
alternative any time in the near future.

Plus a single "jamming" act can generate a $100,000 fine.

According to the FCC, the unlawful use of a jammer is a criminal
offense, and can result in various sanctions, including (ironically), a jail
sentence. More specifically, the unlawful marketing, sale or operation
of cell phone, GPS, or other signal jammers in the U.S. can result in significant fines. Up to $16,000 for each violation or each day of a continuing violation, and as high as $112,500 for any single act. So if anyone
tries to sell you a jamming device - run!

Possibly 10% of
prisoners
have cell phones

The California Department
of Corrections and
Rehabilitation found 12,151
phones in 2013. A writer for
The Atlantic estimated that
number represented 10% of
the phones in the system,
meaning almost all of the
state’s 135,600 inmates had
a phone. Sources from
other prisons estimate
higher catch rates, but the
number of phones getting
into inmates’ hands is far
too high.

www.BVSystems.com

3

Contraband Cell Phone use on Internet

Media coverage of contraband use is all over
the internet

In today’s “instant news internet,” as soon as a story breaks,
it is everywhere. In spite of excellent security records, The
more “sensational” the story that faster it travels. Damaging
public perception and internal effectiveness. Here are just a
few examples:

How Gangs Took Over Prisons

In 2015 approximately 7,600 cell phones were seized in Georgia prisons, and the director the Office of Investigations and
Compliance estimated they were only able to catch half of the
phones. Link to article in The Atlantic:
http://www.theatlantic.com/magazine/archive/2014/10
/how-gangs-took-over-prisons/379330/

Half of all contrband cell phones make it into prisons

The article later explains an incident of how contraband cell phones
entered a prison by throwing a cell phone over the wall inside a
dead cat. Link to CBS 46 story:

(http://www.cbs46.com/story/29996400/prisonerskill-cat-use-carcass-to-sneak-cell-phone-inside-prison)

A sex offender in an Oklahoma prison

Man was caught possessing a cell phone eight times over 21
months starting in early 2012. Read entire story, click on link:
http://newsok.com/article/3885597?embeddedLinkType=article

Cell phones in the wrong hands...

Cell phones in the hands of convicted criminals pose a danger
to staff, other inmates and the public outside the prison.
Unfortunately, far too many of them escape detection. However, in an Indiana prison, a representative reported a single
inmate was caught with three phones in under two weeks.

Combating contraband cell phones in correctional facilities
effectively takes a comprehensive effort with committed,
trained staff and the right equipment.

www.BVSystems.com

Blocking Unauthorized Calls?

Cell Phone Detection vs. Managed Access

4

Managed Access Systems (MAS) route calls through a system that
mimics a cell phone tower. Calls from authorized devices are allowed
through while unauthorized devices are blocked. Even at facilities
that using a Managed Access Systems, preventing inmate access to
contraband phones is important for the following reasons:
• Managed Access Systems effectiveness depends on coverage in all
areas of the facility, while FCC regulations prohibit the Managed
Access Systems signal from reaching outside the prison walls. The
possibility of undiscovered holes in the Managed Access Systems
coverage means inmate could still make calls if they find a spot
that allows an unauthorized phone to connect to outside towers.

• It is possible for inmates to get their hands on authorized devices
through corruption or manipulating prison staff.

• Cellular technology is constantly evolving. New wireless technology
could potentially outpace MAS equipment.

• Several North American wireless carriers advocate using both
managed access and detection.

Preventing Contraband Cell Phone Use in Prisons

Report published by Global Tel•Link Corporation before the National
Telecommunications and Information Administration.
To read report click on link:

(https://www.ntia.doc.gov/files/ntia/publications/contrabandcellphonereport_december2010.pdf)

www.BVSystems.com

5

How Phones Enter Secure Facilities

There are few hard statistics on how phones are
smuggled in, but these several broad categories:
1. Employees

Inmates and prisoner advocate organizations claim most cell phones are
brought into correctional facilities by
staff or contractors. Unfortunately,
corruption is a legitimate problem. In
2009, 300 California prison employees
were suspected of trafficking cell
phones to prisoners.

For some, the motive is financial.
With inmates or their associates paying
up to $1,500 per cell phone, some staff
can’t resist taking money on the side.
In 2011 two employees at a single
California prison boasted they made over $100,000 smuggling contraband.
To read article-click link: http://calcoastnews.com/2011/07/cmc-guard-accused-of-smuggling-cell-phones/
For staff involved in personal relationships with inmates, a cell phone is a
communication method to keep in touch while they’re not at work.

2. Deliveries

Having cell phones delivered requires an inmate coordinate with at least
one accomplice outside the facility, a task made easier if the inmate already has access to a phone. The accomplice can stash phones inside the
delivery containers or on the delivery vehicles.

www.BVSystems.com

Cell phones have been found in everyday object pictured here. A cell
phone hidden inside the plastic peanut butter jar makes it difficult for dogs
to detect. Cell phones have also arrive at correctional facilities through the
mail concealed inside everyday objects. Instead of the old file in the cake,
an inmate might get a phone inside a hollowed-out loaf of bread.

6

How Phones Enter Secure Facilities
Magnetic boxes in delivery truck

In October 2015 a correctional officer at a
prison in Maryland noticed a delivery truck with
magnetic boxes containing cell phones attached
under the cabin. Further inspection turned up
three more trucks carrying contraband.
To read complete article, click on link:
(http://news.maryland.gov/dpscs/2015/10/16/
correctional-officers-intercept-contraband-intended-for-prisons/)

3. Visitors

The vast majority of visitors do not cause problems, and studies have
shown that inmates who stay in contact with family on the outside are less
likely to reoffend and have better post-release outcomes.
Some visitors smuggle in contraband, including cell phones. The volume
of visitor traffic makes it impractical for most facilities to thoroughly
search everyone. Staff must rely on observation, intuition and involuntary
guilt cues to determine who to search.

546 visitors arrested

There is no doubt that visitors are a source of contraband phones. In
September 2014, a California Department of Corrections representative
told the L.A. Times they had arrested 546 visitors for attempting to bring
in contraband phones and drugs.

Attorney arrested

Legal representatives are not
above suspicion either. A
Florida attorney was arrested
in March 2015 for smuggling a
smartphone into the Seminole
County Jail for his client. To
read complete news article,
click on link:
(http://www.wftv.com/news/
news/local/attorney-accusedsmuggling-cellphone-jailclient/nkYNQ/)

546

Visitors
Arrested
http://www.latimes.com/local
/politics/la-me-pol-prisons20140925-story.html

www.BVSystems.com

7

How Phones Enter Secure Facilities
4. Thrown Over Fences

In correctional facilities where total 24-hour surveillance is not possible
some contraband phones literally go over the prison walls. When the inmate is allowed outside they retrieve the contraband and it enters the
prison economy.

For example, outsiders have been known to cut open a basketball, fill it
with contraband, stuff with filler, re-stitch the basketball so it looks
normal and throw it over the wall. It fits right in with the athletic equipment. The prisoner knows when to expect it, so he just walks out into the
yard and picks it up.

5. Drones drop phones over walls.

This is new and growing threat whereby drones with “hooks” can literally
fly low on the outside of the wall unseen, go up and over quickly undetected, then fly low to the ground, drop the contraband package, and get
right back out in a matter of minutes. The civilian drone industry in the US
has grown from almost nothing in 2013 to over $1 billion projected in 2016.

www.BVSystems.com

How Phones Enter Secure Facilities

Creativity abounds once a cell phone
is smuggled into a facility...

Prisoners have stashed phones behind ceilings and walls, inside hollowed-out books and legal briefs, toiletries, loose clothing, electronics
and food containers that appear sealed, under and inside mattresses and
attached to bed frames. They often hide phones outside their cell in
common areas such as the kitchen, yard, library and work areas. For
example, an inmate going on work detail might leave their phone in the
prison shower during the day and retrieve it when they return. Shower
shoes with the soles split open make effective cell phone vehicles.

Prisoners also transport phones inside commissary items, in their
clothing or wrapped in plastic and inserted in their body cavities.
Overweight inmates can tuck phones under their breasts or folds of
body fat. Inmate kitchen workers and janitors often serve as couriers,
since they have relatively free movement and easy access to areas
with many hiding spots.

Believe It or Not??

Occasionally an inmate with a
contraband phone will slip up
and give themselves away. A
prisoner in a Shri Lanka prison
hiding a phone in his rectum was
caught when he received a call
and the phone rang.

8

9

How Phones Enter Secure Facilities

Did you know?

Contraband travels together

Chances are if you find a contraband cell phone, you will also find additional contraband. Sometimes a “ferrous” detected knife, often drugs,
cigarettes and cash. So, since the cell phone is easier to “detect” while
drugs, cigarettes and cash are not, if you find the contraband cell phone
in that container of Ajax, chances are you will control other contraband
as well.

Believe It or Not??

Charles Manson makes call from prison
Cell phones have made their way into

the hands of closely-guarded prisoners.
Murderous cult leader Charles Manson
has been caught with cell phones twice

since 2008, and a follower was arrested
for trying to smuggle a

Charles Manson

cell phone to him in 2013.

CONTRABAND DETECTION METHODS

10

There are several methods of uncovering hidden phones, but some are more
effective than others. The most effective detection strategy uses a mix of
methods that complement each other. Let’s look at the advantages and
disadvantages of methods used to find contraband cell phones
that have made it into the facility.

www.BVSystems.com

11

Detection Methods Defined
Cell Phone Sniffing Dogs

Dogs are a valuable tool for finding many types of contraband. They can quickly
sniff out phones, batteries and accessories in both cells and common areas with
a high degree of accuracy. The exact scent they key in on is not known, so it is
possible a dog may miss phones that do not contain the signature smell.
The major downsides come from the fact that dogs are living animals. Dogs
can’t be everywhere at once. Because of the expenses involved multiple facilities usually share the same dog, and word of their presence spreads fast. They
require expensive specialized training and ongoing upkeep costs. There is also
the possibility the dog may develop health problems that render them unfit for
service.

The Cell Phone needs to be ON, but not in use with the
Radio Frequency Detectors (RFD)

Radio Frequency Detectors pick up the radio waves generated when a cell
phone communicates with the tower. When a phone is on but not actively on a
call or sending/receiving data it “checks in” with the tower every few seconds
then shuts down the antenna to conserve power. When on a call or transmitting
data the tower communication is sustained until the call ends or the transmission stops. When the phone is off or in flight mode, no transmission occurs.
Radio Frequency Detectors are available in both stationary and portable format. Stationary units are permanently installed and ideal for monitoring common areas such as showers, lunchrooms and outdoor yards for cell phone
activity. Portable units vary from small, concealable devices that can be hidden
under clothing on foot patrols to powerful handheld devices that can detect a
signal from over 100 yards and triangulate a phone’s exact location.

The Cell Phone does NOT need to be on with
Ferromagnetic Detectors (FMD)

Ferromagnetic Detectors pick up the electromagnetic field generated by cell
phones and other electronic devices. They are similar to handheld metal detectors, but are not triggered by non-target metals like jewelry, medical implants
and clothing studs.
• The phone does not need to be on
• It can pick up phones concealed behind walls
• Can detect cell phones under clothing and in small containers.
This makes the Ferromagnetic Detectors ideal for use in scanning visitors and
their belongings, also perfect for scanning the mail and any small-box deliveries.
Perfect for scanning purses and briefcases without opening them.
The only downside is their range is extremely short, usually less than a foot.
They must be in close proximity to the object being scanned.

12

Detection Method Comparison
Type

Cell Sniffing Dogs
BUDGET:
Approx. $10,000
ongoing expenses

Radio Frequency
Detectors

BUDGET:
$500-$2,500

Ferromagnetic Detectors
BUDGET:
$600-$6,500

Advantages

Phone can be on or off.
Can find phone parts,
chargers and accessories.
Some dogs can alert on
multiple types of contraband,
like drugs and cigarettes.

Long range.
Can triangulate phone position.
Some units are concealable
under clothing.
Installed systems can monitor
specific areas 24-7.
Phone can be on or off.
Does not alert on non-target
metals.
Can uncover phones inside
containers and behind walls.
Inexpensive.
Detects cell phones, metal
ferrous knives, shanks and guns

Disadvantages

Require handlers and expensive training. Cost of upkeep:
Food, vet bills, etc.
Loss of investment if the dog
becomes unfit for service.
Search causes disruption and
is obvious to other inmates.
Not COVERT...Phones are
immediately flushed
Phone must be ON and
not in airplane mode.
Cannot find (smell)
other contraband such
as drugs or cigarettes.

Very short range.

Cannot find other
contraband.

www.BVSystems.com

13

Interception and Detection Recommendations

It’s better to intercept
phones coming in

before they can cause any
harm. Once contraband
phones are on the

inside, there is an

almost unlimited number
of places for inmates to
hide them compared to

the relatively few routes

of entry. In either case it’s
important for staff to be
observant and alert for
anything that breaks

routine or seems out of
the ordinary.

#1

Scanning Staff, Visitors and Contractors

Corrupt staff members who smuggle in phones typically conceal them
under their clothes or inside bags or lunch containers. A few have concealed them inside body orifices. They rely on recognition or authority to
avoid being subjected to search. Sometimes multiple staff members make
up a smuggling ring, so it’s possible the person doing the inspection is part
of the problem. Legal representatives and contractors can also bring
phones in. They conceal phones on their person as well as on vehicles and
inside cargo.

Visitors may conceal phones anywhere on their person or in their belongings. They have been caught bringing in contraband phones concealed in
their hair, hidden under clothing, folds of fat, wigs and belt buckles, inside
bags, prosthetic limbs and the soles of shoes, inserted into body orifices
and even concealed on children.

“Arresting 20-30 visitors and staff per month”

The problem is widespread and many inmates and prisoner advocates
claim the majority of contraband phones are smuggled in by prison
workers. Staff and workers certainly have more opportunity than regular visitors. In September 2015 a Georgia prison representative told a
local news station they were arresting between 20 and 30 visitors and
staff per month for smuggling contraband.

“Food service vendors fired”

In October 2015, Bloomberg Business reported over 100 food-service
workers for a food vendor for the Michigan correctional system had
been fired over the previous 10 months for having personal relationships with inmates and smuggling in cell phones and other contraband.

www.BVSystems.com

Read article at: http://www.bloomberg.com/bw/articles/2014-1002/aramarks-michigan-prison-workers-face-misconduct-allegations

Interception and Detection Recommendations

#2

Monitor the Mail Room!

Inmates enlist accomplices on the outside to
mail in contraband phones disguised inside items
of all kinds. Unlike drugs cell phones cannot be
concealed under a stamp or inside greeting
cards, but just about anything larger could be
used to smuggle in a phone or smartwatch. Contraband phones arrive hidden inside everything
from apparel to toiletries. Small food packages
and containers that appear factory sealed can in
fact hold multiple phones. Accomplices can take
apart some phones to make them even smaller
and harder to detect.

Scan all packages with an Ferromagnetic Detectors device, no
matter how pristine and innocuous the item or packaging looks.
Skilled product adulterers can open a box or hollow out a loaf of
bread, insert a phone and seal it back up so no one could tell it has
been tampered with.

Believe It or Not??

Phone threat from prison
to John Whitmire
In 2008 a death row inmate in Texas

called state senator John Whitmire and
threatened his family.

14

15

Interception and Detection Recommendations

#3

Police Outdoor and Common Areas

Another way of getting phones inside prison walls is over
the fences. A 2014 article by the Associated Press reported a
correctional officer walked the grounds and spotted a couple of 2-liter soda bottles floating in a pond near the fence.
Most people who saw them would assume they were simply
trash. When the officer retrieved them he found they were
tied to waterproof bags filled with over two dozen phones.
Read the details: http://nypost.com/2014/02/16/prisonersuse-of-smuggled-cellphones-on-the-rise/
An accomplice will sneak up to the outer fence under
cover of darkness and attempt to throw packages containing
contraband onto the grounds. Accomplices have also used
aerial drones to drop phones and other contraband.

Facilities can stop people from throwing phones over by
increasing the distance between the inner and outer walls
and increasing the height of fences with netting. Improving
fencing will not stop drops from drones so surveillance and
frequent ground patrols are still important.

The short range of Ferromagnetic Detectors devices
makes them ineffective for scanning large areas, but an
Radio Frequency Detector is capable of finding phones as
long as they are on. Radio Frequency Detectors are also
ideal for identifying inmates using their devices both outside and in large common areas.

Stationary Radio Frequency Detectors devices installed
in these areas can covertly monitor for contraband phone
transmissions at all times. By comparing alert times it is
possible to narrow down the field of suspected phone owners. Staff can then use them in conjunction with handheld
Radio Frequency Detectors to zero in on the target.

www.BVSystems.com

Interception and Detection Recommendations

#4

16

Covert Detection on
Foot Patrols

When conducting an active search of either the interior
or exterior grounds, it’s important to maintain the element of surprise. Word travels fast in prison, and when
inmates receive advance warning they turn off their
phones and hide them. This makes the contraband
phones more difficult to uncover, especially in minimum
and medium security facilities where inmates are
housed in open dorms rather than individual cells. There
are many places to hide a phone and inmates might move them to a different dorm in rotation as the individual dorms are searched. During mass
movements it’s difficult to prevent handoffs.

For the stealth approach, the solution is a small Radio Frequency Detectors device a correctional officer can wear in a pocket or under clothing
as they make their rounds. A phone on a call or streaming data will trigger
an alert and allow the officer to identify which cells to search or even
catch the owner in the act. If a phone is on but not active, the detector
may pick up a short transmission when the phone contacts the tower. The
phone signal may not last long enough to lead the officer to the device,
but it will allow them to confirm a phone is in the general area.

End the RISK of Contraband Cell Phones

Contraband cell phones in the hands of prisoners pose a significant
risk to staff, inmates and the public. They are simply too dangerous
to take lightly. With the right equipment and training, even correctional facilities without a managed access system can substantially
decrease the number of contraband phones.
Berkeley Varitronics Systems manufactures a full line of Radio
Frequency Detectors and Ferromagnetic Detectors that assist
correctional facility staff in keeping phones out of inmates’ hands.

www.BVSystems.com

17

Berkeley Products Detect Contraband Cell Phones

Manta Ray ™

A portable Ferromagnetic Detectors
that that can be used in handheld or
mounted to a stationary base. The
Manta Ray is ideal for use in the mail
room and visitor check-in scanning small
packages and containers. It can also be
used during cell sweeps to find cell phones
hidden inside objects and behind walls.

manual sweeping

SentryHound™

A stationary portal Ferromagnetic
Detectors for quickly scanning
visitors and workers without
time-consuming searches. The
SentryHound can find phones on
or off and has both audible alarms
and lights to show the location of
the hidden phone.

Point-of-entry

WatchHound ™

A stationary Radio Frequency Detectors that
continuously and covertly monitors for cell
phone use in open areas such as yards,
lunch rooms and prisoner dorms. The
WatchHound creates alert logs that staff can
use to identify cell phone users by comparing
the trigger times with surveillance footage or
other records.

continuous scanning

www.BVSystems.com

18

Berkeley Products Detect Contraband Cell Phones

PocketHound ™

This Radio Frequency
Detectors is about the size
of a pack of cards, making it
perfect for covert scanning on
foot patrols. It can trigger an
LED alert and a silent vibration
when it picks up a signal.

covert detection

long range scanning

WolfHound ™

The ultimate in long-range cell phone detection.
This Radio Frequency Detector can sniff out targets up to
150 feet away and identify multiple phones at the same
time. It features a signal strength meter that allows the
user to home in on any phone actively downloading or on
a call. Perfect for sweeping prison yards and catching
phone users in the act.

www.BVSystems.com

19

Berkeley Varitronics Systems and Scott Schober
Scott N. Schober is the
President and CEO

Scott N. Schober, Author and
Cybersecurity Expert

Looking for specific
contraband training
and control for your
prison?

Berkeley Varitronics
Systems has years of
experience in helping
prisons control contraband
cell phones. We can offer
an onsite audit to show you
the scope of the problem
at your facility. And we
offer onsite training. When
prisoners have cell phones,
you lose control. We help
you take back control.
Give us a call at
732-548-3737 or email
Scott@BVSystems.com
to tailor a cell phone
detection training program
that fits your needs.

www.BVSystems.com

of Berkeley Varitronics Systems (BVS),
a forty-year-old New Jersey-based privately
held company and leading provider of advanced, world-class wireless test and security solutions. Schober also invented BVS’s
cell phone detection tools, used to enforce
a “no cell phone policy” in prisons and
secure government facilities.

Scott is a highly sought-after subject expert
on the topic of cybersecurity.

He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS
This Morning News, CCTV America, CNBC, CNN, Fox Business, Fox News,
Good Morning America, Inside Edition, MSNBC, and many more. His precautionary advice is heard on dozens of radio stations such as XM Sirius
Radio, Bloomberg Radio, and The Peggy Smedley Show. Scott has been
interviewed in the Wall Street Journal, Forbes, Fortune, Success,
Newsweek, USA Today, and The New York Times.
Hacked Again, written by Scott
Schober, details the ins and outs of
this cybersecurity expert. As a CEO of
a top wireless security tech firm,
Scott, struggles to understand the
motives and mayhem behind his being
hacked. Scott realized his worst fears
wereonly a hack away as he fell prey
to an invisible enemy. Order his book
online to discover helpful tips to prevent you from being HACKED! Visit:
www.ScottSchober.com to order.

Berkeley Varitronics Systems has been designing
and manufacturing cell phone detection
equipment since 1990.

Our devices can find phones using all of the current
cellular technologies and frequencies.
Correctional systems around the world rely on
BVS equipment to keep cell phones out of the
hands of dangerous criminals.
Start making your facility safer for staff,
inmates and the public by
contacting BVS today.

Call 732-548-3737 or

email scott@bvsystems.com for more information
www.BVSystems.com