Introduction
Corrections Intelligence represents an enormous opportunity for innovation in law enforcement. Still an under-recognized and arguably under-leveraged sector, the body of research in Corrections Intelligence, specifically surrounding the value and impact of corrections data, is sparse due to its nascent stage. This white paper seeks to contribute to this growing field of interest by retracing its historical development and examining contemporary trends and technologies birthed from continuously evolving needs.
For the purposes of this writing, “Corrections Intelligence” refers to the systematic gathering, analysis, and dissemination of information within correctional facilities to enhance security, prevent criminal activities, and support broader law enforcement efforts. The suggestions and recommendations provided in this paper largely focus on ways that CI units can transform robust existing resources into actionable, intelligence-led operational strategies.
Table of Contents
Corrections Intelligence: A Brief History
"History cannot give us a program for the future, but it can give us a fuller understanding of ourselves."
-- Robert Penn Warren
Corrections Intelligence has its roots in the broader field of criminal intelligence, which first gained prominence in the mid-20th century. The formalization of Corrections Intelligence began in the 1970s, in part driven by the realization that prisons were not mere holding facilities – but rather dynamic, multifaceted micro-economies.
Initially, intelligence in corrections was heavily influenced by military and law enforcement practices, which prioritized the gathering and analysis of data to investigate escapes, drug trafficking and violence.1 Corrections intelligence units were already being established as early as the 1990s. https://www.ojp.gov/pdffiles1/Digitization/124114NCJRS.pdf This approach, while effective, was largely reactive in nature and focused primarily on addressing immediate threats within the confines of the physical prison environment.
Over time, the advent of new consumer technologies (e.g., the Internet, smartphone) drove the proliferation of increased illegal activity within jails and prisons: organized crime, gang activity and contraband smuggling. Thus, a clear need for a more structured approach to data gathering within corrections facilities began to emerge. By the 1980s and 1990s, specialized intelligence units were being established, particularly in larger jurisdictions, to address these specific challenges.
The September 11, 2001 terrorist attacks on the World Trade Center highlighted a critical need for not only comprehensive intelligence gathering, but also seamless sharing across various sectors, including corrections. The need for intelligence in national security prompted police executives to incorporate intelligence more effectively into their operations.
This marked the beginning of a global shift across all spheres of law enforcement from traditional policing to intelligence-led policing (ILP) as a proactive means to control crime and prevent future terrorist attacks.2https://uk.sagepub.com/sites/default/files/upm-assets/120159_book_item_120159.pdf
Since that time, ILP has been further enhanced through the leveraging of publicly available data and other technologies to address complex threats.3https://policinginsight.com/feature/advertisement/the-evolving-role-of-open-source-intelligence-for-policing/ The Ontario Corrections Intelligence Programme, introduced in March 2019, represents a significant step taken in formalizing a framework for corrections intelligence, adapting models from ILP to enhance safety and security within corrections facilities.4https://justice-trends.press/prison-intelligence-contributions-of-decision-makers-from-belgium-canada-and-argentina/
Contemporary Trends in Corrections Intelligence Technology
Over recent years, Corrections Intelligence has evolved to address the dynamic challenges facing corrections facilities across the United States.
Current trends in the field reflect a growing emphasis on leveraging gathered data in novel ways, enhancing collaboration and further adopting proactive strategies to improve the safety and security of both the resident population, and the public at large:
-
Technology Integrations: The use of advanced technologies such as AI-powered open-source intelligence (OSINT) and biometric systems is becoming more prevalent. These technologies help with the gathering and analysis of high volumes of data, aiding in the identification of security threats and accelerating the investigative process.5https://www.corrections1.com/enhancing-department-of-corrections-investigative-units-with-ai-powered-osint
-
Proactive Intelligence Gathering: Correctional facilities are increasingly adopting intelligence-led approaches to anticipate and mitigate risks. This involves the proactive collection and analysis of information to prevent organized crime and other security threats within the penitentiary system. 6https://www.police1.com/police-products/police-technology/articles/intelligence-gathering-in-corrections-the-price-of-prevention-is-much-lower-than-the-cost-of-response-UFpRVWNIDu31WrAT/
-
Focus on Organized Crime and Radicalization: Modernization efforts are addressing issues such as organized crime and radicalization within correctional institutions – including, but not limited to, the proactive investigation of organized crime affiliations and implementing strategies to reduce gang violence and human trafficking.7https://justice-trends.press/navigating-challenges-in-ontarios-correctional-services-transforming-the-future/
- Multi-Agency Collaboration: Major cases that have been brought to resolution through multi-agency collaboration serve to emboss the importance of fostering strong partnerships across law enforcement networks. For example, various sheriff’s offices have integrated police staff into CI units with an aim to strengthen their teams’ collective skillsets through diversification of approach.
This last point is worth consideration in the context of broader society. Over recent years, we as a collective have recognized a general need for both consolidation and diversification. This has inspired a profound shift in various industries. As time has elapsed, we now benefit from examining the results and impacts of knowledge consolidation on various industries, including but not limited to, Law Enforcement.
The Pooling Effect & Application Breadth
The whole is something different than the sum of its parts."1“The whole is greater than the sum of its parts” is often mistakenly attributed to Aristotle, whereas the concept is more accurately associated with Gestalt Psychology of the early 20th Century. Kurt Koffka is reported to have said: “The whole is something else than the sum of its parts.”
-- Kurt Koffka
The ‘pooling effect’ refers to the significant advantages gained when intelligence and data are shared across multiple units, organizations, or jurisdictions.8The term “pooling effect” originates from the concept of resource management in system dynamicsc, where it refers to the grouping of resources to maximize advantages or minimize risks for users. It is a strategic approach widely applied across the fields of finance, computing, supply chain and operations management, aimed at optimizing resources and improving efficiency. https://en.wikipedia.org/wiki/Pooling_%28resource_management%29
A few examples of the ‘pooling effect’ and its far-reaching impact within the context of seemingly disparate industries, include:
-
Financial Services. Banks and financial institutions sharing information about fraudulent activities, including but not limited to organized fraud rings, have reduced the incidence of financial crimes, thus protecting consumers and businesses alike.
-
Environmental Science. The Intergovernmental Panel on Climate Change IPCC pools climate data from scientists and research institutions around the world. By aggregating data and normalizing data streams from various regions, the IPCC has developed comprehensive assessments of climate change impacts, helping organizations and governments strategize to mitigate global warming.
- Pharmaceutical Industry. During the COVID-19 pandemic, pharmaceutical companies pooled clinical trial data to accelerate vaccine development. Through sharing research findings, trial results and adverse event data, companies were able to bring vaccines to market on a significantly accelerated timeline.
Though these fields may seem disparate in terms of discipline and/or market cap, there exists a commonality between them: a cultural shift towards alignment with the Information Age and its various data-sharing implications. It is interesting to consider that the industries cited in the above examples have, historically, been considered notorious for being secretive, siloed, and generally change-averse. However, following collaborative experiments whereupon the effects of the pooling effect could quantifiably be measured, they have become more open to data-sharing – even, in some cases, with industry competitors – to the great benefit of all parties involved.
A by-product of the pooling effect is the ‘network effect,’ which theorizes that the more entities that join a given data network, the more powerful and valuable said network becomes.9The term “network effects” originated from the concept of the telephone network in the early 20th century. The idea was initially articulated by Theodore Bail, one of the early presidents of Bell Telephone. He argued that the telephone network’s value increased as more people joined it. This concept has been reiterated by Robert Metcalfe (creator of Ethernet), Jeffrey Rolhffs (economist) and W. Brian Author. The latter’s definition of network effects is most broad and is used to describe increasing returns within the context of widely adopted technology. https://future.com/podcasts/network-effects-increasing-returns-trends/
One could argue that this newfound willingness to share data is merely symptomatic of the age in which we currently live. If we consider technologies that have disrupted our concept of “shareability” since the turn of the millennium – the World Wide Web (e.g., OSINT data), Social Media, the Sharing Economy (e.g., Uber, Airbnb) – it is not difficult to conceptualize how this profound shift towards a democratization of information has affected various industries through a global trickle-down effect.
This has, however, created a new challenge of an inverse nature: having amassed such an incredible wealth of data, we must now sort, index and filter that data in a manner that still remains faithful to accomplishing focused objectives.
The Pooling Effect & Potential Impact on Law Enforcement
There is compelling evidence to suggest that Corrections may be more optimally positioned to benefit from the pooling effect than other areas of law enforcement. This is likely attributed to several unique personality traits that tend to motivate self-selection into a career in Corrections.
Individuals that self-select into careers in law enforcement tend to possess several common traits, such as:
- Social Responsibility – strong sense of duty and a desire for fair outcomes
- Realism and Practicality – preference for hands-on problem-solving
- Desire to Learn – adaptability to evolving community needs
Additionally, those who elect to specialize in a career in Corrections, are often possessed of additional qualities, correlated with the specific demands of their roles:
- Extraversion, Interpersonal Skills – high-level of engagement and dedication
- Emotional Stability – ability to remain calm under extraordinary pressure
- Intellect – ability to think strategically, openness to new experiences
The final grouping of personality traits speak not only to the profile of individuals that self-select into careers in Corrections, but also describe the aggregate of the broader Corrections community. Interestingly, an important determinant factor for the efficacy of the pooling effect is the existence of communal openness — a willingness to share and receive knowledge, as well as to embrace change.
It stands to reason, therefore, that the opportunity for innovation specifically in Corrections could be enormous. There is already compelling evidence to suggest that the pooling effect can dramatically influence case resolutions.
Case Studies of Information Sharing Across Jurisdictions
The phenomenon of the pooling effect with respect to law enforcement is perhaps most well-documented in cases involving serial homicides and/or real-time manhunts. These cases combine an inherent sense of urgency – an immediate threat to public safety – with a need to manage external pressures and public expectations.
In such cases, history has shown that the pooling of data across law enforcement agencies to accelerate a real-time investigation – can be profoundly impactful:
-
Beltway Sniper Attacks (2002). During the sniper attacks in the Washington, D.C. area, multiple law enforcement agencies, including the Montgomery County Police Department (MCPD), the Virginia Department of Transportation, ATF, the FBI and the U.S. Secret Service, pooled resources and information. This collaboration quickly led to the arrest of John Allen Muhammad and Lee Boyd Malvo. The sharing of ballistic evidence and witness reports across jurisdictions was key to solving the case. Without this collaborative effort, the case might have taken much longer to resolve, potentially leading to more casualties.10In total, the snipers killed 17 people and wounded 10 within a 10-month timeframe. Had the investigation been further prolonged, it would have likely resulted in additional civilian deaths and/or critical injuries. https://en.wikipedia.org/wiki/D.C._sniper_attacks
-
Boston Marathon Bombing (2013). The manhunt for the Tsarnaev brothers involved a massive collaboration between local, state and federal law enforcement agencies. The sharing of surveillance footage, eyewitness accounts and other data across agencies was critical in identifying and apprehending Dzhokkhar Tsarnaev following a city-wide lockdown and intense manhunt.11The manhunt for the Tsarnaev brothers following the bombing of the 2013 Boston Marathon reportedly cost more than $1B, possibly making it the most expensive manhunt in history. https://people.howstuffworks.com/10-biggest-manhunts.htm
-
Christopher Dorner Manhunt (2013). The search for former LAPD officer Christopher Dorner involved a multi-agency effort, including local police, the FBI, and U.S. Marshals. The sharing of intelligence and coordination of operations across agencies helped track Dorner, who was eventually found in a cabin in Big Bear Lake, California.12https://en.wikipedia.org/wiki/Christopher_Dorner_shootings_and_manhunt
- The Long Island Serial Killer (2023). The case also known as the Gilgo Beach murders, has been a long-standing investigation dating back to as early as 1996, and has involved 11 official known victims.13The Long Island Serial Killer case, also known as The Gilgo Beach Murders, currently has 11 official victims, including eight women, one toddler and an additional debated female victim, who initially led to the discovery of other victims’ bodies. https://www.liskpodcast.com/victims In February 2022, a collaborative task force was formed, which included the Suffolk County Police Department, the Suffolk County Sheriff’s Office, the New York State Police and the FBI.14https://edition.cnn.com/2024/01/15/us/gilgo-beach-murder-case-timeline/index.html Working side-by-side, sharing intelligence across agencies and leveraging new-generation technologies to prioritize leads and sift through high volumes of data, investigators were able to tie their prime suspects directly to several victims. In January 2023, authorities arrested Rex Heuermann and charged him with the murder of several victims. More charges were filed the following year.
This final example is particularly noteworthy, as it underscores the level of impact that sharing intelligence can achieve for law enforcement agencies. A case that had remained unsolved for over two decades finally gained meaningful momentum, less than a year after a multi-agency task force had been created.
The case also champions the approach used by the task force to achieve its results: leveraging technologies to accelerate the analysis process. With high volumes of data incoming from multiple streams, the implementation of novel tech within the investigative process was likely a gamechanger for the task force.
The Role of Technology in Jail & Prison Systems
The advent of technology has dramatically transformed correctional facilities. From the implementation of sophisticated surveillance systems to the use of biometric identification, technology has enhanced security, streamlined operations, and improved the overall management of correctional institutions.
- Surveillance: Advanced video surveillance systems equipped with AI capabilities can now monitor inmate activities in real-time, alerting authorities to suspicious behavior.
- Communication Monitoring: Technologies that monitor inmate communications (phone calls, emails, financial transactions, and other) have become essential tools in detecting and preventing criminal activities organized from within prisons.
- Data Management Systems: Integrated databases allow for the efficient management of inmate information, helping staff to track behaviors, manage risks, and make informed decisions.
Transformative Tools in Corrections Intelligence
Contemporary corrections facilities rely on advanced technologies to monitor and manage inmate interactions, within the facility and external community. These systems are critical for maintaining security, ensuring safety, and effectively managing incarcerated individuals. As the volume of data captured by these technologies increases, so, too, does the challenge of integrating and analyzing this information to create actionable intelligence. This is where technology can play a pivotal role by providing a unified, holistic view of multiple data streams, to help law enforcement protect the well-being of the incarcerated population, as well as the broader community.
Monitoring Inmate Communications: Securus Technology
Securus Technology is an essential tool for managing inmate communications. It provides telephone and video chat services, enabling inmates to stay in contact with the outside world. More importantly, Securus captures and logs all communications, including phone calls and video chats, and extracts transcripts that can be analyzed for potential security threats. By monitoring conversations, correctional facilities can detect and prevent criminal activity, such as gang coordination and contraband smuggling. These capabilities also extend to external law enforcement agencies, assisting in the gathering of intelligence on organized crime activities beyond prison walls.
Financial Monitoring: Keefe Group
The financial activities of inmates are another critical point of surveillance. Keefe Group provides solutions for monitoring these transactions, including deposit services that allow family members and friends to add funds to inmate commissary accounts. These transactions can be tracked and audited to ensure transparency and identify suspicious financial activity, such as money laundering or funding illegal activities within the facility. Monitoring inmate spending behavior adds another layer of oversight, allowing facilities to gather intelligence that might otherwise go unnoticed.
Inmate Jail Management: Sallyport Jail Management System
Sallyport, an Offender Management System (OMS) developed by Black Creek Integrated Systems Corp, is an invaluable tool for tracking the operational information of a facility’s population. It records inmate profiles, movements, medical history, and incident reports, allowing correctional officers to maintain detailed records of each incarcerated individual. The OMS also facilitates the scheduling of inmate activities and ensures that operational details—such as transfers and disciplinary actions—are meticulously documented.
In addition to inmate management, Sallyport logs visitor records, capturing detailed information about who visits inmates and when. These logs are crucial in identifying potential security risks, as they help establish connections between inmates and external individuals. Analyzing these records allows facilities to gain deeper insights into the relationships between inmates and outside actors, and identify networks of inmate connections through common visitors. This information can be vital in uncovering organized crime activities or contraband smuggling rings, within and outside of, jails and prisons.
Alerts and Tracking: PINS
PINS (Prisoner Information Notification System) provides real-time updates on inmate release dates and recidivism patterns. By alerting authorities to changes in an inmate’s status—such as upcoming release or re-incarceration—PINS enhances the ability of corrections and law enforcement agencies to manage transitions and prevent repeat offenses. Tracking these events is crucial for community safety, ensuring that appropriate resources are allocated to prevent further criminal behavior and support reentry programs.
Aggregated Intelligence Management: VIXN
While each of these systems offers valuable insights into specific aspects of corrections intelligence, their true power is unlocked through the consolidation of their resources. VIXN, by Fermata Discovery, offers a critical advantage by aggregating data from multiple sources—visitor logs, communication records, financial transactions, and inmate records—to create a unified, common operating picture. This holistic view allows correctional facilities and law enforcement agencies to detect patterns and relationships within that would otherwise remain hidden, offering deeper insights into potential security risks and organized criminal activity.
VIXN’s strength lies in its ability to connect dots between these disparate data sources. For instance, by analyzing communication logs from Securus alongside financial transactions from Keefe and visitor records from Sallyport, VIXN can reveal sophisticated networks of criminal activity that span both inside and outside the facility. Patterns that may go unnoticed when each dataset is viewed in isolation—such as an individual visiting multiple inmates involved in suspicious financial transactions or coordinated communications—become clear when data is overlaid and analyzed collectively.
This comprehensive approach enables VIXN to enrich the data and surface deep networks of criminal association, providing law enforcement with actionable intelligence. Whether it’s uncovering gang activity, identifying contraband smuggling rings, or detecting external actors coordinating with incarcerated individuals, VIXN’s ability to harness the power of all these data streams ensures that critical connections are exposed. This allows for more proactive, informed decision-making, ultimately enhancing the safety and security of corrections personnel, incarcerated residents, and the broader community.
Conclusion
Corrections Intelligence is a fascinating sphere, which has continued to evolve over the past several decades. As modern-day challenges facing corrections facilities have continued to become increasingly complex, the need for robust, intelligence-driven strategic solutions has never been greater. Technology plays a critical role in this evolution, offering tools and capabilities that were unimaginable just a few years ago. With more law enforcement agencies establishing dedicated Corrections Intelligence units, and with a shift towards the pooling and sharing of intelligence across jurisdictions, Corrections is uniquely positioned to make an enormous impact in helping to create safer, more secure and more interconnected communities.