The Efficacy of Using Jenovice Hunter™ to Locate Contraband Communications Devices in a Prison Using a Managed Access System (MAS)

The Efficacy of Using Jenovice Hunter™ to Locate Contraband Communications Devices in a Prison Using a Managed Access System (MAS)

The Efficacy of Using Jenovice Hunter™ to Locate Contraband Communications Devices in a Prison Using a Managed Access System (MAS)

Jeffrey M. Birnbach, Jenovice, Inc.

In November 2024 Jenovice, Inc., in coordination with the Department of Corrections of the state of Censored conducted a proof of concept (POC) using Jenovice Hunter™. The system consisted of a proprietary signal collection and analysis device (hardware) combined with artificial intelligence (software) that creates a turn-key solution to detect contraband communications devices within prisons, jails and other controlled environments. This DOC facility houses approximately <N> Censored inmates in a combination of maximum security and medium security units. The facility is approximately Censored acres in size and had, at the time of the POC, a Censored managed access system (MAS) installed that was intended to render all cellular communications inoperable. Despite the presence of the Censored MAS, the analysis conducted over a two week period identified numerous communications devices evading mitigation by the MAS, that could be used for malicious and nefarious purposes by inmates. In total, 19 contraband communication devices were identified and located by Jenovice during a brief 14 day deployment.

The use of MAS devices has increased in recent years, however, it has long been suspected that communications devices utilizing WiFi and Bluetooth (BT) protocols would be able to circumvent MAS systems and facilitate inmate communications, thereby evading detection. The purpose of this POC was to illustrate the limitations of MAS in preventing unauthorized communications, and further demonstrate the value of the Jenovice Hunter in detecting and locating contraband communications devices.

The use of contraband communications in detention facilities is a continually growing concern for facility administrators and guard staff. The presence of these devices has been linked to violence and criminal activity, both in and outside of the corrections systems throughout the world. From a planned kidnapping (2014 Polk Correctional Institution, NC) and riots (2018 Lee Correctional Institution, SC) to organized executions (2024 Smith State Prison, GA) and scams netting almost $1 million (2025 Avon Park, Hardee & DeSoto, FL) the use of contraband communications device facilitates crime and violence everywhere. When asked about the challenge of contraband cell phones, Ricky Dixon Secretary of the Florida Department of Corrections responded, “it’s one of the most prevalent problems in the prison system across the U.S.”

Though it’s difficult to get an accurate assessment of the scope of the problem, contraband communications devices are a leading issue for both state and local detention centers. In a 2024 report, the Urban Institute estimated 25,860 phones were confiscated in state prisons in the 20 states surveyed[1]. However, since Georgia alone reported confiscating 8,074 phones in 2023, it’s likely the numbers reported in the Urban Institute survey were dramatically lower than the actual volume of contraband communications devices in DOC facilities. Another report from the National Institute of Justice[2] issued in May 2021 stated that the prevalence of contraband phones ranges from one phone for every ten inmates to one phone for every three inmates. By all accounts, the problem is epidemic throughout most U.S. detention centers.

The Jenovice POC included the deployment of a Hunter monitoring unit which utilizes proprietary circuit design to increase the range and accuracy of RF (WiFi and BT) detection, coupled with advanced AI analysis of the collected data. A handheld unit was used in conjunction with the Hunter to pinpoint the location of specific devices.

The Jenovice Hunter was installed in a single day in cellblock <Censored> at the facility, which at the time of the POC, had a Censored MAS running, and was deployed for a period of 14 days. It was believed by the DOC administrators that the MAS would prevent contraband communication devices from operating in the facility. Using the Hunterlink™ AI platform, operators were able to identify 32 different devices and access points. Further analysis determined that 13 of these were legitimate and authorized devices. These were subsequently tagged as being “trusted” in the console. The remaining 19 access points and devices were identified, and subsequently confirmed as being contraband communications devices.

One device, Censored, was detected operating as both an access point and a WiFi device, and was seen over 1,287 times over the 14 day period. A total of 160 instances were observed where this device was detected as an access point for other devices. It is believed that this allowed several inmates to use this device as a hub to facilitate unauthorized communications. Another rogue device, previously identified but not found, was physically located using Hunter.

Although limited to only two weeks in a single cell block at one prison facility in Censored, the Jenovice Hunter was highly effective at detecting and locating contraband communications devices despite the facility having previously deployed a Censored MAS in an effort to combat unauthorized phone use by inmates. Further, this POC clearly demonstrated that deployment of a MAS alone is inadequate to prevent the use of contraband communications devices.

As of August 2025, Jenovice was continuing to accept requests from correction and detention facilities to perform field evaluations of the Jenovice Hunter on-site. For more information, please contact info@jenovice.com