IDENTIFICATION OF CONVICTS IN HUNGARIAN PRISONS

 
CONTINUE READING
IDENTIFICATION OF CONVICTS IN HUNGARIAN PRISONS
Land Forces Academy Review
                                     Vol. XXVI, No. 2(102), 2021

                 IDENTIFICATION OF CONVICTS
                    IN HUNGARIAN PRISONS

                                                                                        Katalin KONDÁS
                                                                    Óbuda University, Budapest, Hungary
                                                                             kondaskatalin@gmail.com

              ABSTRACT
                      Personal identification is a crucial element of some safety-technology
              systems. The same applies to facilities brimming with safety devices, in particular, in
              penalty institutions, prisons. My goal is to present a comprehensive picture of the
              identification method used in Hungarian prisons. There is no other summarizing
              document available on identification. My present paper is based on the 12 years of
              experience that I have gained in the Penalty Enforcement Organisation in the area
              of information technology since 2007. I have been analyzing and researching the
              personal identification of convicts based on their biometric characteristics. In 2004,
              a well-functioning, object-based identification method was established. This article
              will give an overall picture of the identification system(s) used in Hungarian prisons
              as well as of my former plans to renew the identification methods of convicts.

              KEYWORDS: prison, biometrics, identification

      1. Introduction                                         number of people requires an extensive
      Biometric identification is one of the                  database.
most wide-spread and most modern                                    In the penal institution, the personal
personal identification methods, whose goal                   identification of inmates is particularly
is to establish an individual’s identity with                 crucial in the following situations:
confidence, rapidity and credibility. Due to the                    – admission,
explosive and dynamic progress of                                   – receiving visitors,
information technology, biometric identification                    – starting work in prison,
methods are undergoing continuous and                               – shopping in the prison shop,
quick development. This type of                                     – using the public phone attached to
identification can be diverse depending on                              the corridor wall,
the requirements, goals and the allocated                           – the activities of right enforcement
budget and how the desired identification                               (Kondás & Szűcs, 2020).
system can be implemented.                                          It is my goal to describe the operation
      In Hungarian penalty enforcement,                       of the identification system used in
biometric identification is not yet wide-                     Hungarian prisons. In this paper, I will
spread. I will outline the identification                     mainly focus on the identification process
method of convicts used in the penalty                        during inmates’ use of the public phone and
organisation and its importance in prison                     the prison shop.
residents' lives. In total, there are over                          My research still concentrates on how
17.000 convicts in Hungarian prisons.                         identification      methods      and    their
The data management of this significant                       effectiveness could be improved and

DOI: 10.2478/raft-2021-0017
© 2017. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License.

                                                        118
IDENTIFICATION OF CONVICTS IN HUNGARIAN PRISONS
implemented      during     the    time     of                   Ensuring      the     availability   of
imprisonment and in the various systems                    information and the protection of data from
operated in the different professional areas.              the access of unauthorised individuals are
      I genuinely believe that the physical                permanent tasks within the framework of
implementation of a long-desired biometric                 the operation of the IT system. For the basic
identification system is already on our                    traceability of the management and use of
doorstep in the Hungarian Penalty                          special data, the identification of users and
Enforcement Organisation.                                  the authentication process of information
                                                           are of pivotal importance (Kondás, 2018).
      2. Identification of Prisoners                             Although the inmate record database
      After a custodial sentence has been                  is multi-layered, the database of the Penalty
imposed,      the    Penalty      Enforcement              Enforcement Organisation is not identical
Organisation determines when and in which                  to that of the organs of the criminal justice
prison the convict will apply to complete                  system.
their sentence. The convict’s identity must
be checked.                                                       2.2. Register Number
      As soon as the prisoner arrives at the                      All prisoners receive an individual
penal institution, their data are registered in            register number when they are taken into
the central database; all available                        confinement or custody; upon admission to
information gets recorded in a computer                    the penal institution. This register number is
programme specially developed for this                     a code consisting of two letters and four
purpose. The database contains the current                 numbers, which remain with the convicts
and past data and the documents related to                 during their entire imprisonment period,
the sentence and the enforcement of                        even if they are transferred to another penal
measures (Hungarian Prison Service in                      institution. Should they be sentenced to
Service of Justice, 2020). Personal                        confinement again for an already known
identification is necessary during the                     crime, the individual’s register number will
admission process of inmates and in the                    regularly stay the same. In other words,
course of their daily activities, e.g. phone               they will be registered under the same code.
use or shopping.
                                                                  2.3. Barcode Cards
       2.1. Prison Register                                       Upon admission to prison, personal
       Upon the admission of a prisoner,                   items and money are deposited, so inmates
they get photographed and receive a register               have no ID cards or money with them.
number. These can be disclosed only with                   These items are safeguarded by the penal
relevant permission. Information is stored                 institution and will be returned to their
in a database, where the personal records of               owners upon release. As convicts are not to
any inmate can be searched at any time.                    own cash, but shopping in the prison shop
The personnel of the various units                         or using the prison phone works only with
(disciplinary, security, registration, healthcare,         money, they can make use of these services
re-integration, prison employment) can                     with the help of a virtual account.
view and have access only to the functions                 To resolve this issue, a method using a card
and data relevant to their use. Should                     has been devised. All inmates receive this
further information be added to the personal               card upon entering confinement, which also
records, the time of entering the new data                 serves as a means of identification. With the
and the name of the officer documenting                    help of this so-called barcode card,
them are also recorded and can be searched.                the available amount can be established
The record database is severely monitored.                 from the data records of the prison.

                                                     119
The front of the card contains the                that the barcode will be allocated to each
following data:                                         convict based on their register number
      prisoner’s name,                                  (Kondás, 2013).
      prisoner’s register number,
      prisoner’s photo,                                        3.3. Making Phone Calls
      individual barcode.                                      The primary and most crucial step for
                                                        making phone calls in the phone system is
       3. Identification of Prisoners in                to identify the given inmate quickly and
Hungarian Prisons                                       confidently. Upon initiating a phone call,
       3.1. Phone System with Barcode Card              the convict picks up the phone and receives
       A prison phone system has been                   an oral instruction to display their barcode
operated in all penal institutions of this              on their card to the barcode reader and to
country since 2004. The basic concept of                face the camera. Following this step, the
the system is that all convicts are given a             fading of the flash of the barcode reader
barcode ID card, which is registered in the             demonstrates that the identification has been
central prison database alongside a biometric           automatically performed. Should the camera’s
identifier of the inmate. In practice, the              just-taken photo not agree with the one
database also includes a photograph of the              stored in the database, the phone indicates a
convict. When the given individual wishes               defect and does not permit the call.
to make a phone call, the phone device                         Then, the system immediately finds
attached to the wall will detect the barcode            the relevant, necessary and accessible
card, then the camera installed in the phone            (for the given institution) data belonging to
takes a photo of the user and compares it to            the barcode card in the database and displays
that featured in the database. If they prove            those on the screen in an appropriate order.
to show the same person, the inmate can                 These data will be hereinafter be referred to
start dialling.                                         as the regulation system belonging to a
                                                        given inmate. Within this regulation
       3.2. The Purpose of and the Use of               system, a module of the phone system will
Barcode Cards in the Phone System                       retrieve the list of phone numbers the
       The fundamental purpose of the                   convict is allowed to call based on their
prison phone system is to enable the prison             permitted contact list from the institution’s
personnel to check and listen into the phone            prison registry.
calls of inmates. Another goal is to make all                  The identification of the inmate is
conversation should be controlled, all their            possible, therefore, through the comparison
features should be recorded and that the                of the photo retrieved from the prisoners’
telecommunication fee should be automatically           database and that made by the webcam
paid through the payment system.                        placed next to the phone displayed on the
       It is cardinal that the prison’s IT              officer’s screen. This is the process of
system can provide data in an event-driven              biometric identification. The webcam image
manner to independent sub-systems, among                shot at the time of visual identification and
others, the phone system and can                        displayed on the screen – alongside the
communicate online with the shop’s money                other parameters of the phone call – get
register. All in all, the barcode card can be           stored and can be retrieved later. With this
used for making phone calls and for                     method, makers of unpermitted phone calls
shopping, provided the convict has the                  can also be confidently identified, and
necessary funds. The use of this card is                further control processes are facilitated.
similar to that of bank cards in civilian life.                Figure no. 1 shows the phone cabinet
After comparing the appropriate sums, the               with the telephone receiver, the camera and
card codes must be updated, which means                 the barcode reader.

                                                  120
Figure no. 1: Prisoners’ phone with the installed camera
                                    (Source: Author, 2012)

      During the call, the following data are          Naturally, the prison shop needs to comply
visible:                                               with the regulations of the National Tax and
      – Prior to the identification of the             Customs Administration. Nevertheless,
         inmate:                                       as no cash is used, the price of the various
         • the portrait photo taken by the             purchased articles must be deducted from
            camera;                                    their balance. This process is aided by the
         • the state of the device.                    barcode card. The goals of introducing a
      – After the identification of the                shopping system using a money register
         inmate:                                       were the following:
         • their personal data appear (name,                 The shop assistant can work with this
            cell number, penalty level, etc.);         money register licensed by the National Tax
         • photo of the inmate (upon                   and Customs Administration in a manner
            admission).                                they were used with the usual money
      – After the inmate has made a phone              registers.
         call to a permitted number:                         Financial flows should occur online.
         • the data of the dialled contact                   The convict can choose to spend their
            person (phone number, name,                money on making calls or shopping.
            address, degree of family                        Inmates can identify themselves with
            relationship);                             the same barcode card while making calls
         • remaining time in confinement               and while shopping. The system will deduct
            (Kondás, 2013).                            the used amount from the virtual bank
                                                       account associated with the barcode card in
     3.4. Shopping                                     both cases.
     The phone system and the shopping                       In order to prevent frauds, the
account system is one and the same.                    computer next to the money register (see
In other words, purchases immediately                  Figure no. 2) is to display the photo of the
show in the virtual account of the convict.            card owner upon each purchase.

                                                 121
Figure no 2: Money register in use
                                   (Source: Author, 2012)

       With the help of the shop computer,                  4. Effectiveness of Identification
the purchase procedure is the following:              Methods
       – The convict hands over their                       The identification system currently in
barcode card to the shop assistant who                use is effective. In the above chapters,
reads the barcode information with the                I summed up the Penalty Enforcement
barcode reader. The monitor placed on the             Organisation data management based on the
counter will display the card holder’s photo          identification of convicts. For the use of the
and the personal data that were permitted             various systems, the application of the
by the given penal institution. For privacy           barcode card is essential. Without it, convicts
reasons, only a moderate amount of data is            cannot contact their family members; neither
entered in the system. Also, the shop                 can they do shopping in the prison shop.
assistant can view the overall sum available                When an inmate enters the prison,
for use. The screen is visible for both the           their data are recorded, and they are
customer and the shop assistant, so the               photographed by the registration department.
convict can easily decide how much money              Thus, the information is available to release
they wish to spend in the shop, on making             the barcode card, which stays with the
calls or on shopping later.                           convict as long as they are in confinement.
       – At the outset of the purchase,                     The barcode card is basically a means
the inmate’s register number (the unique              of payment. If it is photocopied or perhaps
identity number) is printed on the paper roll         forged, then it will have duplicates.
of the money register. When the purchase is           The card may, on occasion, get stolen,
completed, the system deducts the spent               and its new “owner” might attempt to use it
amount from the convict's virtual account             too. However, in practice, copying has little
and lists the purchase among their financial          chance, even though we can never know
activities. The inmate signs the receipt              when it occurs. It is more frequent that
(which contains their register number), and           convicts lose their cards, and a new card
with this signature, they acknowledge the             must be released. The barcode of the new
completion of the purchase (Kondás, 2013).            card will be identical to that on the lost card.

                                                122
Consequently, if the old card is retrieved,            began in 2010, making use of European
there will be two identical cards registered           Union funds. The restructuring affected the
in the system. Therefore, it is necessary that         modernisation of the networks, the increase in
greater attention is paid to the registration          the number of termination points, the entirety
of barcode cards to prevent duplication.               of the IT system (servers, workstations) and
      Personal identification can be made              the replacement of the registration system
even more secure by introducing more                   that used to be based on an obsolete
advanced technology. To identify convicts,             software-technology. The purpose of this
a biometric identification system should be            restructuring process was to set up a
introduced in prisons so that convicts would           homogenous, standardised, firm and – on a
not need to carry any identification items             national level – closed IT system, which –
with them. As a result, the theft or loss of           thanks to a homogenous office environment
barcode cards would not represent a problem.           – will ensure an identical infrastructural
                                                       background for the operation of newly
      5. Conclusions                                   developed databases on each site of the
      The barcode card-based identification            organisation. Simultaneously, former IT
of convicts was introduced nation-wide in              systems have been replaced by new ones
Hungarian penal institutions in 2004.                  (Magyar, 2012).
The system works logically, meets the                        The operation of penality enforcement
requirements, and consequently, the financial          was given a new legal basis in 2013.
transactions of inmates can be managed in a            Act CCXL of 2013 on the Enforcement of
practical and easy way. The execution time
                                                       Penalties, Measures, Certain Coercive
of shopping and phone call has also been
                                                       Measures and Detention for Misdemeanours
reduced.
                                                       also refers to the identification of convicts:
      The identification of convicts, however,
                                                       “The penal institution operating within the
would deserve to use new technologies
                                                       framework of the Penalty Enforcement
keeping pace with the technological
                                                       Organisation is obliged to check the
advances of the world. An identification
system based on unique physical features – a           personal identity of convicts. During this
biometric identification system – would be             process, the personal identification data
most suitable.                                         specified in the documents on which the
      Should the present system of object-             prison admission is based are transferred to
based identification remain in force for a             the criminal database and the photo-based
more extended period of time, a more                   of the penal institution; the authenticity of
robust and sturdy item, an RFID card,                  the data is re-checked” (Évi CCXL.
should be applied instead of the currently             Törvény, 2013). The penal institution also
used barcode cards. The new card could                 takes the convict's fingerprint and initiates
also have a hologram and the card owner’s              the comparison with the criminal registration
photo on it. There is a wide range of                  organ, in compliance with Part (5) b) of
options available; the application of our              Section 82 of Act XLVII of 2009 on
dream technology is only limited by the                Criminal Conviction Records of Hungarian
budget available to us.                                Citizens in any EU country and also on
      The possibilities and defects of the             Criminal and Law Enforcement Biometric
current identification system help us set up           Data Records.
our requirements regarding the future                        This comparison is conducted
identification method.                                 electronically by reading the fingerprint
      An overall restructuring process of              with a dedicated electronic device
the Hungarian penalty enforcement system               (Évi XLVII. Törvény, 2009).

                                                 123
Thanks to the legal changes, convicts         prison shop is still card-based but
have the possibility to keep in touch with           modernised with a new IT system.
their family via mobile phones provided by                 It is, therefore, still a relevant goal in
the organisation. These are simplified cell          Hungarian penal institutions to use an
phones whose use does not require self-              identification based on a more modern
identification. Phones attached to the wall          technology, where there is already an
are taken out of service. Shopping in the            updated IT-background to support it.

     Acknowledgements
     This article was supported by Óbuda University.

                                      REFERENCES

       Évi XLVII. Törvény. (2009). Törvény a bűnügyi nyilvántartási rendszerről, az Európai
Unió tagállamainak bíróságai által magyar állampolgárokkal szemben hozott ítéletek
nyilvántartásáról, valamint a bűnügyi és rendészeti biometrikus adatok nyilvántartásáról,
available at: https://net.jogtar.hu/jogszabaly?docid=a0900047.tv, accessed on 05 January 2021.
       Évi CCXL. Törvény. (2013). Törvény a büntetések, az intézkedések, egyes
kényszerintézkedések és a szabálysértési elzárás végrehajtásáról, available at:
https://net.jogtar.hu/jogszabaly?docid=a1300240.tv, accessed on 10 January 2021.
       Hungarian Prison Service in Service of Justice. (2020). Available at:
https://bv.gov.hu/hu/befogadasi-eljaras, accessed on 15 December 2020.
       Kondás, K. (2013). Fogvatartotti azonosítás a büntetés-végrehajtásban. Diplomamunka,
13-40.
       Kondás, K. (2018). Adatok védelme a börtönökben. Hadmérnök, Vol. XIII, Issue 1,
269-277, available at: http://hadmernok.hu/181_21_kondas.pdf, accessed on 08 January 2021.
       Kondás, K., & Szűcs, E. (2020). Special rules on personal identification in prison.
Safety and Security Sciences Review, Vol. 2, No. 2, 15-21, available at:
https://biztonsagtudomanyi.szemle.uni-obuda.hu/index.php/home/article/view/64/59, accessed
on 13 December 2020.
       Magyar, K. (2012). Magyar Közlöny 90. szám, 1236/2012. (VII. 12.) Korm. határozat
Az Elektronikus Közigazgatás Operatív Program 2011–2013. évi akciótervének
elfogadásáról, valamint kiemelt projektek nevesítéséről az Elektronikus Közigazgatás
Operatív Program 2011– 2013.évi akciótervében és az Államreform Operatív Program 2011–
2013. évi akciótervében, 2012 július 12), available at: https://magyarkozlony.hu/
dokumentumok/18148aa0c2ceff79db386b015f0b7a8e06036041/letoltes, accessed on 08
January 2021.

                                               124
You can also read