U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Managing Security Threat Groups and Correctional Intelligence: A Case for Using Auditing Teams as a Threat Management Tool

NCJ Number
226303
Journal
Corrections Today Magazine Volume: 70 Issue: 5 Dated: October 2008 Pages: 50-53
Author(s)
Y. N. Baykan
Date Published
October 2008
Length
4 pages
Annotation
This article discusses the use of prison auditing teams as a threat-management tool in countering "security threat groups," a group of inmates who disrupt the normal operations of a prison or threaten the safety and security of staff and other inmates.
Abstract
“Enterprisewide risk management” requires that correctional intelligence systems provide more varied information than has traditionally been provided. Prison intelligence systems must be capable of collecting security-threat-group information from more than one area. Risk management efforts should monitor human resource issues, infrastructure vulnerability, and outside radical influences related to the security threat groups inside prisons. In addressing these tasks, audit teams assess whether the facility meets the effectiveness standards mandated by its agency. An operational audit team has the capabilities for collecting and analyzing information on prison facilities and inmate activity. In managing security-threat-group challenges, the personnel of audit teams are trained in finding deficiencies, weaknesses, and vulnerabilities in the prison’s security system. The audit team should be a small unit consisting of only a few personnel, with most being uniformed line staff. The correctional experiences of unit personnel will enable them to observe and interpret the features and dynamics of prison operations, whether on the cellblocks or in other areas of the prison. The audit team should be provided with the computer hardware and software needed to collect, analyze, and disseminate information. The audit team prepares reports after each audit, portraying the overall security status of a facility, including information on security treat groups. The report should identify security deficiencies, vulnerabilities, and existing security gaps. 4 notes