Tales from jails: How I helped network a prison

18.04.2006

Stark reality

The stark reality involves much more. Create computer accounts quickly for many novice users. Administer e-mail for unenlightened users. Set up dozens of desktops and laptops with remote access capability, as well as all necessary applications, vendor patches and antivirus protections. Enable file sharing on a need-to-know basis. Adjust permissions by global groups, not individuals. Use access control lists judiciously.

Backup all data online and off-line -- and often. Record and track all changes to the satisfaction of prison officials. Lastly, but no less important, be aware that you must accomplish all of the above in conjunction with older, on-site legacy equipment. And much of it must be done remotely.

All access is controlled. Prison network operators don't divulge their router addresses easily. Files must be secured from within and without. A prison has a culture and it must be respected; it's their turf. There may also be IP address jurisdictional disputes. Once these are resolved, then use dynamic addressing rather than static addressing for improved network management.

All tech support staff must register in advance and wear a special photo ID at all times. Technicians may be magnetic-wanded, frisked and searched. Travel light because all bags and boxes are thoroughly examined. Two-way pagers and cell phones will likely be confiscated and held until you leave (these devices are hot commodities inside a prison). Avoid bringing sharp objects or anything that could become a sharp object. Be psychologically prepared for constant surveillance.