Here's a scenario that involves a triumph in contraband control. Suppose that through vigilance, shared observations and patience, you have uncovered the most insidious of contraband. You have found a smart phone inside the walls.
This is very good news, as it takes out of circulation a dangerous recorder and communicator. Firm in the knowledge that “information is knowledge,” you and your colleagues have disarmed a potential danger and enhanced safety in the facility.
Celebration seems warranted. However, there is more to do. With the evidence secured and key staff informed, the investigation begins. Some of the follow-up questions are:
• Which prisoner last had the phone?
• Did anyone else have it?
• How does the prisoner maintain a charge on the smart phone?
• Did the offender who had the smart phone work in concert with anyone else? In other words, is this a solo effort or part of a concerted effort through a security threat group?
• How did this smart phone come inside?
• Are there patterns with this incident that may aid in future searches?
With so much information to be gathered, it is easy to overlook one crucial question. Is there a data card with the smart phone?
All that one needs do is open up the phone and remove the mini card, SIM card, SD or whatever one would call it. The name is less important than its utility. The point is that it is a very small and potentially dangerous. And this part of the phone can be removed easily.
Why is this so important? Think of the data card as a removable brain in a mini computer. And this brain can be implanted in many other surprisingly easy to acquire smart phones. How can one describe the amazing storage capacity in something so small? Having all the information in the world on something the size of small coin might not be quite accurate. Still, micro storage technology is such that hundreds of pictures, contacts, texts and other data can be stored on a mini card that is smaller than a penny.
Through the eyes of corrections, let us view the nefarious utilities of data cards. The tiny titan of information storage can hold:
• Incriminating photographs of staff
• A store of all text messages sent and received
• Images that propagate gang activity
• Comprehensive directories of partners in crime
• Images of weak points in our defenses
• Lists for store and gambling
• Potential for internet access (granted, this is only under certain circumstances)
• A working social media function
It may be that the information on an easy to hide storage chip is more valuable than the phone itself. This is not to diminish the value of an illegal smart phone in the hands of a prisoner. It just points back to the notion that information is power.
Of course, this does not mean that every micro card that one comes across will contain sensitive information. In fact, the laws of numbers dictate that somewhere and at some time a data card will be found in a jail or prison that contains virtually no useful information in terms of investigation or incrimination.
However, as with any contraband search proposition, it behooves us to continue to search for the danger that is possible. Otherwise, we may overlook a valuable clue.
About the author
Joe Bouchard writes and presents on many corrections topics. He is a Librarian at Baraga Maximum Correctional Facility within the Michigan Department of Corrections. He is also a member of the Board of Experts for The Corrections Professional, Editor of The Correctional Trainer and MCA Today, and an instructor of Corrections for Gogebic Community College. Bouchard also has online writing clips at www.corrections.com/joe_bouchard. You can reach him at (906) 353-7070 ext 1321. He is also the author of the book "Icebreakers III," the third in IACTP's series of training exercises books. Order now.
These are the opinions of Joe Bouchard, a Librarian employed with the Michigan Department of Corrections. These are not necessarily the opinions of the Department. The MDOC is not responsible for the content or accuracy.