/images/planning-header.webp

Planning a facility

In-cell technology specified too late in a facility design is expensive to retrofit and rarely delivers what a purpose-built solution would have.

Technology decisions made early in the design of a correctional facility are among the most consequential, and the hardest to reverse. Yet in-cell technology is frequently treated as a late-stage fit-out consideration, specified after the network infrastructure, cell furniture, and physical security systems have already been committed to.

That sequencing is a problem.

Assumptions that create expensive constraints

Many facility designs proceed with conventional televisions, radios, and entertainment devices as a baseline assumption for in-cell amenity. Separately, standard commercial computers may be considered for education delivery, and some form of managed email for family communication. Each of these is treated as a discrete procurement.

What that approach produces is a collection of devices in each cell, each with its own physical footprint, power requirements, cable management, and security implications. Each device is a potential source of contraband concealment. Each cable a potential ligature or weapon. Each unmanaged screen a potential vector for unauthorised content.

By the time a consolidated alternative is considered, the cell dimensions are fixed, the furniture is specified, the network topology is committed, and the budget has been allocated across separate line items. Retrofitting a purpose-built solution at that point is possible, but it costs more, takes longer, and delivers less than designing for it from the outset.

What a purpose-built PILS changes

A Prisoner Interactive Learning System consolidates television, radio, education, email, web access, and device management into a single hardened unit per cell. Designed specifically for the correctional environment, it addresses risks that off-the-shelf equipment cannot, not through add-on security measures, but through architecture.

Some of the risks addressed by a purpose-built PILS:

  • Improvised weapons and ligature points: compact, light hardware with short, fixed cables
  • Contraband concealment: all-in-one chassis with no accessible voids
  • Digital contraband: no writable storage, no USB, no removable media of any kind
  • Rogue devices: explicit allow-listing; any unapproved device is rejected at connection and triggers a staff alert
  • Unmonitored communications: all email and web activity logged, filtered, and archived
  • Clandestine software installation: no writable operating environment; the system state is immutable
  • Unpatched software: centrally managed, updated without physical access to cells

This reference guide, Designing Secure Prisoner Computer Systems, covers 25 distinct risk categories in detail, each with the rationale behind the mitigation, not just the mitigation itself.

The right time to consider this

If you are in the early stages of designing or procuring a correctional facility, at concept, schematic, or design development stage, now is the right time to understand how in-cell technology affects your network design, cell layout, furniture specification, and operational model.

If your design is more advanced, it is still worth understanding what is possible and what the constraints of your current assumptions are. Retrofitting is harder, but it is not always impossible.

In either case, we are experienced in working with facility designers, security consultants, and procurement teams at every stage of the process. A conversation early costs nothing. A conversation after construction is complete costs considerably more.

Download the reference guide · Get in touch