1 / 34

PRISON SECURITY DYNAMICS

PRISON SECURITY DYNAMICS. BY SP. GEORGE OUKO KENYA POLICE SERVICE. Learning Outcomes. At the end of the module the participant should have an understanding of prison security dynamics;

basilm
Télécharger la présentation

PRISON SECURITY DYNAMICS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PRISON SECURITY DYNAMICS BY SP. GEORGE OUKO KENYA POLICE SERVICE.

  2. Learning Outcomes • At the end of the module the participant should have an understanding of prison security dynamics; • To demonstrate an enhanced understanding of the importance of effective keys and tool control in the prisons.

  3. Structure of Presentation • Introduction • Key and tool control • Interaction with prisoners • Inmate safety and security • Searches • Challenges • Conclusion

  4. Introduction • Effective control of keys is one of the most essential security elements of any correctional operation, regardless of security level. • In order to maintain effective security, the staff must control the doors, gates, and other locking devices that comprise physical security both inside and outside the perimeter

  5. Cont • The security of an institution depends on effective key control; • Its compromise may pose a threat to the safety of inmates, staff and the general public.

  6. Basic Jail Security Procedures An effective jail security plan will include: • Admission of the inmate • Escorting inmates to court, medical appointments, funeral homes, hospitals  and other jails or institutions • Counts • Release procedures • Control of drugs and medications

  7. Cont. • Use and maintenance of security equipment • Control of contraband • Tool and key control • Development of security policies, plans, and procedures

  8. Gate keeping • This involves controlled movement and maintaining prison security by providing guide lines and procedures for the operation of the main gate.

  9. Gates should be managed by experienced and well trained officers. • The officer assigned should verify through peep hole to identify any person outside the gate before opening. • All visitors should be searched upon entering the facility. • He should ensure that no unauthorized persons get in or out of the main get.

  10. Items brought in for the in mates should be properly checked for any contrabands. • Vehicles entering and leaving the facility must be properly checked • Visitors names should be entered in the gate log. • No weapons should be carried into the facility without the permission of the officer in charge. • No unauthorized properties should leave or enter the facility.

  11. Key Systems

  12. Keys system • There shall be two key safes – main key safe and duplicate key safe. • Main set of keys should be used in the daily operation and the duplicate set of keys shall be kept in the office of the head of the institution.

  13. Cont • A key log shall be maintained in the security office of all the keys in the facility. • Each set of keys shall be labeled and hanged on a separated corresponding hook. • No keys shall be taken out without authorization of officer in charge of the facility.

  14. Listing of every key in the institution • The list of the number of key in each ring. • The trade name of each key and the lock it fits. • The location of the locks. • The code number of the ring on which it is located. • During final lock up the key to the main key safe shall be sealed and kept by the senior most officer on night duty.

  15. Tool Control • Effective tool control prevents their use as weapons and in escape attempts. • As with keys, account for all tools at each shift change.

  16. Tool Classification • While it may be difficult to classify every specific tool used in the facility, • all tools should be categorized by classification as hazardous or non- hazardous • The classification scheme for tools will vary by facility depending upon the • Security level of the facility. A general guide for classifications is as follows:

  17. Hazardous-Class A • Hazardous or Class A tools are tools that can be used by inmates either in effecting an escape or causing death or serious injury to staff or other inmates. • These tools generally include but are not limited to the following

  18. Examples of Class A tools • Metal Cutting Blades • Bolt Cutters • Core Drills • Ladders • Jacks • Hacksaw Blades • Pipe • Knives • Metal Cutting Equipment

  19. Cont • Wire Cutters • Files • Cutting Torch and Cutting Tips • Pipe Cutters and Bolt Cutters • Axes and Drill Bits • Portable Grinders or Similar Machines • Other tools, such as scissors

  20. Non-Hazardous-Class B. • Non-hazardous tools will be considered as Class B tools and will be subject to less restriction than Class A tools. • Tools in this category normally do not pose a direct threat to the security of the facility but do require accountably and control

  21. Tool Control Techniques • All institution staff are responsible for tool control. Tool control is maintained through proper MARKING, STORAGE, and INVENTORIES AND ACCESS. • ALL new tools must be marked according to the assigned class as defined in the Correctional Services manual.

  22. Tool Identification And Marking • All tools are marked in each work location with an identification symbol identifying the department or detail. • The Tool Control Officer is responsible for assuring the correct markings. • Tools which cannot be marked are inventoried and kept locked. In addition Class A tools are marked as to the storage location.

  23. Tool Control and Use • All tools must be closely supervised and monitored. Tools are to be checked in and out on a check-out log. • Class A tools pose an imminent threat to the facility and must be used under the supervision of an appropriate employee. When not in use, Class A tools shall be securely stored. Where feasible, this should be outside the secure perimeter of the facility

  24. Cont • Class B tools should be used under the supervision of an appropriate employee. • Class B tools may be stored within the secure perimeter in a secure location.

  25. Disposition of Tools. • Tools broken or worn beyond use will require proper disposal. • Upon disposal, responsible staff must document and make adjustments to the inventory and advise other accountable staff. • Annual evaluations should occur to identify tools infrequently used or no longer needed with consideration given to moving these tools to an area outside the perimeter of the institution.

  26. Interaction with Prisoners • Visibility • Staff presence sends out several messages to the inmate population that staff are interested, available, and responsive and; • that they are maintaining constant surveillance of the facility. Staff can respond to concerns, deficiencies and problems before they escalate to crisis.

  27. Communication • Communication serves as the “lifeblood” of any organization and is especially critical in a prison. • Through constant and effective communications with inmates, staffs stay informed and can react to problems before they escalate

  28. Inmates Observation/Supervision • Being observant is paramount in maintaining a secure and safe correctional facility. • Inmate’s observation is the ability of the correctional staff to supervise inmates 24 hours a day, 7 days a week, and 365 days in a year.

  29. Reasons for Inmates’ Observation • Ensure security and good order. • Ensure early detection of infractions of correctional discipline. • Ensure inmates’ accountability. • Observed changes in inmates’ behavior and environment can be closely monitored.

  30. What are the challenges?

  31. Challenges • The lack of security • Inhuman conditions due to lack of appropriate infrastructure • Insufficient budgetary provisions • Lack of professional staff.

  32. Conclusion • key and tool control is vital to the security of the institution. • If we do lose control of a key or tool, your safety, the safety of other staff members, the community and inmates are compromised. • As stated earlier, we are all responsible for key and tool control.

  33. Questions.

More Related