Correctional facilities face a new threat: contraband delivered by drones. Contraband isn’t new, but drones are already being exploited in prisons and jails around the world. Even though correctional facilities have robust physical security infrastructure, drones can easily bypass even the highest security installations by simply flying over the top into a facility.
Kentucky Department of Corrections is getting ahead of drone threats, including contraband delivery and spying, with Dedrone technology.
After deploying Dedrone, the opportunity for contraband delivery is greatly reduced. The prison receives valuable data on drone activities on the site, for example number of drone intrusions, times, drone models, recurring drones. Searches are performed selectively, greatly facilitating the work of staff.
Drones delivering contraband represent a threat to correctional facilities, as FOX 5 from Atlanta reports. Recently during one just one day at one prison, officials saw 10 drones flying overhead. Dedrone’s counter-drone solution is now helping prison officials combat the threat.
Dedrone RF Sensors detect drones up to a mile away and give early warning of drone-based threats, often even before the drone takes off.
Warnings and alerts are triggered automatically and can be sent to a mobile phone, monitoring platform, or any API-compatible system.
By knowing exactly when and where a rogue drone intrudes, authorities can seize any contraband the drone drops.
Once a drone is disabled, it can be retrieved, confiscated, and examined to determine the nature of the threat.
By incorporating sensors such as RF or video cameras, users can track the flight path of the drone and reveal the location of the pilot.
All alerts, flight paths, and video footage of drone threats are automatically recorded and catalogued. These are easily exported to share with law enforcement.
Dedrone’s direction-finding technology locates the positions of drones and their pilots, adding important situational awareness of the airspace.
Drones often look for security gaps, on both physical and IT infrastructure. By identifying potential areas of exploit, teams can examine their security for potential gaps.