Preventing Contraband Cell Phone Use in Prisons, 26733-26738 [2010-11350]

Download as PDF Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices subject merchandise; and (3) no compelling reasons for denial exist, we are granting this request and are postponing the final determination until no later than 135 days after the publication of this notice in the Federal Register. Suspension of liquidation will be extended accordingly. WReier-Aviles on DSKGBLS3C1PROD with NOTICES ITC Notification In accordance with section 733(f) of the Act, we have notified the ITC of the Department’s preliminary affirmative determination. If the Department’s final determination is affirmative, the ITC will determine before the later of 120 days after the date of this preliminary determination or 45 days after our final determination whether imports of copper pipe and tube from Mexico are materially injuring, or threatening material injury to, the U.S. industry. See section 735(b)(2) of the Act. Because we are postponing the deadline for our final determination to 135 days from the date of the publication of this preliminary determination, the ITC will make its final determination no later than 45 days after our final determination. Public Comment Interested parties are invited to comment on the preliminary determination. Interested parties may submit case briefs to the Department no later than seven days after the date of the issuance of the last verification report in this proceeding. See 19 CFR 351.309(c)(1)(i). Rebuttal briefs, the content of which is limited to the issues raised in the case briefs, must be filed within five days from the deadline date for the submission of case briefs. See 19 CFR 351.309(d)(1) and 19 CFR 351.309(d)(2). A list of authorities used, a table of contents, and an executive summary of issues should accompany any briefs submitted to the Department. Executive summaries should be limited to five pages total, including footnotes. Further, we request that parties submitting briefs and rebuttal briefs provide the Department with a copy of the public version of such briefs on diskette. In accordance with section 774(1) of the Act, the Department will hold a public hearing, if timely requested, to afford interested parties an opportunity to comment on arguments raised in case or rebuttal briefs, provided that such a hearing is requested by an interested party. See also 19 CFR 351.310. If a timely request for a hearing is made in this investigation, we intend to hold the hearing two days after the rebuttal brief deadline date at the U.S. Department of Commerce, 14th Street and Constitution Avenue, NW, Washington, DC 20230, at VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 a time and in a room to be determined. Parties should confirm by telephone, the date, time, and location of the hearing 48 hours before the scheduled date. Interested parties who wish to request a hearing, or to participate in a hearing if one is requested, must submit a written request to the Assistant Secretary for Import Administration, U.S. Department of Commerce, Room 1870, within 30 days of the publication of this notice. Requests should contain: (1) the party’s name, address, and telephone number; (2) the number of participants; and (3) a list of the issues to be discussed. At the hearing, oral presentations will be limited to issues raised in the briefs. This determination is issued and published pursuant to sections 733(f) and 777(i)(1) of the Act. Dated: May 5, 2010. Ronald K. Lorentzen, Deputy Assistant Secretary for Import Administration. [FR Doc. 2010–11342 Filed 5–11–10; 8:45 am] BILLING CODE 3510–DS–S DEPARTMENT OF COMMERCE National Telecommunications and Information Administration [Docket No. 100504212–0212–01] Preventing Contraband Cell Phone Use in Prisons AGENCY: National Telecommunications and Information Administration, U.S. Department of Commerce. ACTION: Notice of inquiry. SUMMARY: The U.S. Department of Commerce’s National Telecommunications and Information Administration (NTIA) seeks comment on technical approaches to preventing contraband cell phone use in prisons. Congress tasked NTIA with developing, in coordination with the Federal Communications Commission (FCC), the Federal Bureau of Prisons (BOP), and the National Institute of Justice (NIJ), a plan to investigate and evaluate how wireless jamming, detection and other technologies might be utilized for law enforcement and corrections applications in Federal and State prison facilities. To assist in its evaluation of these technologies, NTIA requests information from the public on technologies that would significantly reduce or eliminate contraband cell phone use without negatively affecting commercial wireless and public safety services (including 911 calls and other PO 00000 Frm 00028 Fmt 4703 Sfmt 4703 26733 government radio services) in areas surrounding prisons. DATES: Comments are requested on or before June 11, 2010. ADDRESSES: Parties may mail written comments to Richard J. Orsulak, Emergency Planning and Public Safety Division, Office of Spectrum Management, National Telecommunications and Information Administration, U.S. Department of Commerce, 1212 New York Avenue, NW., Suite 600B, Washington, DC 20005, with copies to Edward Drocella, Spectrum Engineering and Analysis Division, Office of Spectrum Management, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue, NW., Room 6725, Washington, DC 20230. Alternatively, comments may be electronically submitted in Microsoft Word format to contrabandcellphones@ntia.doc.gov. Comments will be posted on NTIA’s Web site for viewing at https:// www.ntia.doc.gov/osmhome/ contrabandcellphones/. FOR FURTHER INFORMATION CONTACT: Richard J. Orsulak, Emergency Planning and Public Safety Division, Office of Spectrum Management, National Telecommunications and Information Administration, U.S. Department of Commerce, 1212 New York Avenue, NW., Suite 600B, Washington, DC 20005; telephone (202) 482–9139 or email rorsulak@ntia.doc.gov. SUPPLEMENTARY INFORMATION: Overview The mobile phone industry has enjoyed significant growth since the inception of the analog wireless cell phone network in the early 1980s.1 The 1990s saw the development of digital networks, and thereafter, high-speed data networks became available to consumers. The growth of the mobile phone industry has been fueled, in part, by consumer demand for instant access anywhere and anytime. Features such as data, image, and video communications have also contributed to the overwhelming demand for mobile 1 For the purpose of this Notice of Inquiry (NOI), the use of the word ‘‘cell phone’’ will refer to any wireless, portable device that is available to the public on a subscription or prepaid basis for delivering voice and/or data services such as text messages. It includes, for example, phones operating within the Cellular Radio Service in the 800 MHz bands; broadband Personal Communications Services (PCS) in the 1.9 GHz bands; the Advanced Wireless Services (AWS) in the 1.7 GHz band; Specialized Mobile Radio (SMR) services in the 800 and 900 MHz bands; and any future mobile wireless devices that plan to operate in bands such as the 700 MHz band. E:\FR\FM\12MYN1.SGM 12MYN1 26734 Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices WReier-Aviles on DSKGBLS3C1PROD with NOTICES services and applications. As of December 2009, there were approximately 286 million wireless subscriber connections in the United States compared to nearly 208 million in December of 2005, which represents an increase of 38 percent.2 During this same time period, the number of minutes used (on an annual basis) increased by 150 percent, while the wireless penetration (as a percentage of total U.S. population) increased from 69 percent to 91 percent.3 These trends indicate that more people are relying on wireless mobile devices to communicate for their daily business and personal needs. The use of contraband cell phones by inmates has risen as the U.S. prison population continues to expand.4 The number of cell phones confiscated by prison officials has dramatically increased in only a few years. For example, during 2006 California correctional officers seized approximately 261 cell phones in the State’s prisons and camps; by 2008, that number increased ten fold to 2,811.5 Maryland and other States have also seen a rise in the number of confiscated cell phones in their State prisons. In 2009, Maryland prison officials confiscated nearly 1,700 phones, up from approximately 1,200 phones the year before.6 This increase in cell phone use by inmates is a mounting concern among correctional administrators across the country.7 2 CTIA Wireless Quick Facts, available at https:// www.ctia.org/advocacy/research/index.cfm/AID/ 10323. 3 Id. 4 At the end of 2008, Federal and State correctional authorities had jurisdiction over roughly 1.6 million prisoners, of which over 200,000 (about 13 percent) were housed in Federal facilities. The Federal and State prison population rose by approximately 1 percent from year-end 2007 to 2008. See Sabol, William J., Heather C. West, and Matthew Cooper, ‘‘Prisoners in 2008,’’ Bureau of Justice Statistics Bulletin, U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, Dec. 2009, page 16, available at https:// bjs.ojp.usdoj.gov/content/pub/pdf/p08.pdf. 5 Special Report, Inmate Cell Phone Use Endangers Prison and Public Safety, Office of the Inspector General, State of California, May 2009, available at https://www.oig.ca.gov/media/reports/ BCI/Special%20Report%20of%20Inmate %20Cell%20Phone%20Use.pdf. 6 State of Maryland Fact Sheet, Keeping Communities Safe, Maryland Department of Public Safety and Correctional Services, Feb. 2010. 7 See, e.g., Department of Justice, Office of Justice Programs, National Institute of Justice, Cell Phones Behind Bars, Dec. 2009, available at https:// www.ncjrs.gov/pdffiles1/nij/227539.pdf; Washington Examiner, Drug Dealer Who Planned Murder Gets Life Sentence, Scott McCabe, May 4, 2009, available at https:// www.washingtonexaminer.com/local/crime/Drugdealer-who-planned-murder-gets-life-sentence44327767.html; Wired Magazine, Prisoners Run Gangs, Plan Escapes, and Even Order Hits With VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 Recognizing the need to take action to curb contraband cell phone use, the United States Senate passed a bill in 2009 that would amend the Communications Act of 1934 to authorize the FCC to permit the supervisory authority of a correctional facility to operate a system within the facility to prevent, jam, or otherwise interfere with unauthorized wireless communications by individuals held in the facility.8 Also, legislation has been introduced and passed in the U.S. Senate that would prohibit Federal prisoners from possessing or using cell phones and similar wireless devices.9 In December 2009, Congress inserted language in the Conference Report to the Department of Commerce FY 2010 Appropriations tasking NTIA, in coordination with the FCC, BOP, and NIJ, to develop a plan to investigate and evaluate how wireless jamming, detection, and other technologies might be utilized for law enforcement and corrections applications in Federal and State prison facilities.10 Congress also asked that the plan consider the adverse effects that these technologies impose on commercial wireless and public safety services in areas surrounding the prisons.11 This NOI seeks public input to assist NTIA with its evaluation of technologies to prevent the use of contraband cell phones in Federal and State facilities.12 Smuggled Cellphones, Vince Beiser, May 22, 2009, available at https://www.wired.com/politics/law/ magazine/17-06/ff_prisonphones. Contraband cell phone use is a problem in Federal prison facilities as well. See Testimony of Harley J. Lappin, Director, U.S. Bureau of Prisons before the U.S. Congress, Hearing on the Fiscal Year 2009 Budget Request for the Bureau of Prisons, the U.S. Marshal Service, and the Office of the Federal Detention Trustee, available at https://www.november.org/ stayinfo/breaking08/LappinTestimony.html. 8 S. 251, Safe Prisons Communications Act of 2009, available at https://frwebgate.access.gpo.gov/ cgi-bin/getdoc.cgi?dbname=111_cong _bills&docid=f:s251es.txt.pdf. The Bill is under consideration in the House. 9 S. 1749, The Cell Phone Contraband Act of 2010, available at https://frwebgate.access.gpo.gov/ cgi-bin/getdoc.cgi?dbname=111_cong_bills &docid=f:s1749is.txt.pdf. 10 H.R. Conf. Rep. No. 111–336 (2009), Division B, Title 1, Page 619, available at https:// frwebgate.access.gpo.gov/cgi-bin/ getdoc.cgi?dbname=111_cong_reports &docid=f:hr366.111.pdf. The language specifically refers to methods of preventing contraband cell phone use within prison facilities. Jamming and detecting cell phone uses for other applications (such as within movie theaters) are not germane to either this NOI or NTIA’s evaluation. 11 Id. 12 Although other contraband interdiction technologies may help to prevent the use of, or access to, contraband cell phones in prisons (such as x-rays, dogs, body scanning imagery, and other methods which detect contraband phones hidden on prison employees, visitors, and inmates), this NOI and NTIA’s subsequent report will be limited PO 00000 Frm 00029 Fmt 4703 Sfmt 4703 NTIA understands that a number of technological approaches exist that could help prison officials block or reduce unauthorized use of cell phones by inmates provided that these approaches could be legally implemented. NTIA, in coordination with the FCC, BOP, and NIJ, have preliminarily identified three categories of contraband cell phone intervention: jamming, managed network access, and detection. Jamming Radio jamming is the deliberate radiation, re-radiation, or reflection of electromagnetic energy for the purpose of disrupting use of electronic devices, equipment, or systems—in this case, mobile devices such as cell phones. A cell phone works by communicating with its service network through a cell tower or base station. These cell towers divide an area of coverage into cells, which range in size from a few city blocks to hundreds of square miles. The base station links callers into the local public switched telephone network, another wireless network, or even the Internet. A jamming device transmits on the same radio frequencies as the cell phone, disrupting the communication link between the phone and the cell phone base station, essentially rendering the hand-held device unusable until such time as the jamming stops. Jamming devices do not discriminate among cell phones within range of the jamming signal—both contraband and legitimate cell phones are disabled. Currently, the operation by non-Federal entities of transmitters designed to jam or block wireless communications violates the Communications Act of 1934, as amended.13 Nonetheless, several groups have filed with the FCC petitions for waivers to permit the use of cell phone jammers in prisons.14 Groups such as to radio frequency (RF)-based, wireless technology solutions. 13 47 U.S.C. Sections 301, 302a, 333. The FCC had reiterated this fact in a Public Notice, Sale or Use of Transmitters Designed to Prevent, Jam or Interfere with Cell Phone Communications is Prohibited in the United States, DA–05–1776, June 27, 2005, available at https://hraunfoss.fcc.gov/ edocs_public/attachmatch/DA-05-1776A1.pdf. 14 See, e.g., Letter from Devon Brown, Director, District of Columbia Department of Corrections, to Michael Copps, Acting Chairman, Federal Communications Commission, Feb. 2, 2009; Letter from Howard Melamed, CEO, CellAntenna Corporation, to Marlene H. Dortch, Secretary, Federal Communications Commission, March 3, 2009. The cellular radio service and other commercial wireless services fall under the auspices of the FCC rules and regulations, which are promulgated in Title 47 of the Code of Federal Regulations (C.F.R.). See https://wireless.fcc.gov/ index.htm?job=rules_and_regulations. E:\FR\FM\12MYN1.SGM 12MYN1 Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices the Association of Public Safety Communications Officials International, Inc. and CTIA have opposed the use of jamming for fear of interference to critical public safety operations and legitimate cell phone use in and around prisons.15 Others, however, have supported its use in prisons.16 Stating that it did not have the authority to permit such jamming, the FCC has denied the petitions.17 Managed Access WReier-Aviles on DSKGBLS3C1PROD with NOTICES Managed access systems intercept calls in order to allow corrections officials to prevent inmates from accessing carrier networks. The cell signal is not blocked by a jamming signal, but rather, is captured (or rerouted) and prevented from reaching the intended base station, thereby disallowing the completion of the call. This technology permits calls by known users (i.e., prison-authorized cell phone numbers) by handing them off to the network, and prevents others by denying access to the network. It is unclear whether or how well these systems can discriminate among prisonauthorized cell phone numbers and ‘‘unknown’’ phones to avoid capturing/ cancelling calls that do not involve inmates. As a tool to deal with contraband cell phone use, some of these systems employ passive technology that detects cell phone use and collects data from active cell phones. Some systems deny access to calls from numbers they do not 15 Letter from Chris Fischer, President, Association of Public Safety Communications Officials International, Inc. to Michael Copps, Acting Chairman, Federal Communications Commission, March 13, 2009, available at https:// files.ctia.org/pdf/CTIA_Position_Papers_ Letter_APCO_Re _cell_phone_jamming_3_13_09.pdf; CTIA Policy Topics, Contraband Cell Phones in Prisons, available at https://www.ctia.org/advocacy/ policy_topics/topic.cfm/TID/58. 16 See, e.g., Wired, Prison Mobile Phone Debate Jammed up in the System, Ryan Singel, March 15, 2010, available at https://www.wired.com/epicenter/ 2010/03/prison-mobile-phone-debate-jammed-upin-the-system/. Also, a recent survey at the International CTIA Wireless Conference showed that nearly three-quarters of respondents favor jamming of cell phones in prisons. See https:// www.earthtimes.org/articles/show/survey-atinternational-ctiawireless,1231800.shtml#ixzz0ju7Exz3B. 17 See, e.g., Letter from James D. Schlichting, Acting Chief Wireless Telecommunications Bureau, Federal Communications Commission to Devon Brown, Director, District of Columbia Department of Corrections, DA 09–354, Feb. 18, 2009, available at https://fjallfoss.fcc.gov/edocs_public/attachmatch/ DA-09-354A1.pdf; Letter from James D. Schlichting, Acting Chief Wireless Telecommunications Bureau, Federal Communications Commission to Howard Melamed, CEO, CellAntenna Corporation, DA 09– 622, March 17, 2009, available at https:// fjallfoss.fcc.gov/edocs_public/attachmatch/DA-09622A1.pdf. VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 recognize. Other techniques redirect cell phone transmissions to portable antennas set up specifically around the prison, and only allow communication from prison-authorized cell phones to be forwarded to carrier cell towers. Denial of service approaches use electronic hardware located in the vicinity of the cell phone user to ‘‘spoof’’ the cell phone into thinking it is communicating with the carrier tower. The cell phone user receives a message that indicates that there is no service available. This type of denial of service system operates independently of the carrier and spoofs all cell calls. In an effort to eliminate the unauthorized use of cell phones in Maryland State prisons, in 2009 the Maryland Department of Public Safety and Correctional Services hosted a demonstration of various non-jamming technologies, including managed access systems.18 In January 2010, they issued a follow-on report.19 The demonstration showed, among other things, that: (1) Several intelligence gathering abilities could be implemented depending upon specific laws governing each State; and (2) the types of technology tested could allow certain phones to operate and allow 911 calls to be processed.20 Detection Detection is the process of locating, tracking, and identifying various sources of radio transmissions—in this case, cell phone signals. Detection, or direction finding, is used in a wide variety of applications including, for example, cell phone assignments, the location of 911 emergency calls and marine distress calls. For accurate position location in an environment such as within a prison facility, detection technology triangulates a cell phone signal and requires the use of correctional staff to physically search a small area (such as a prison cell) and seize the identified cell phone. This may involve placing direction-finding antennas or sensors (connected wire18 Maryland Department of Public Safety and Correctional Services, Overview of Cell Phone Demonstration, available at https:// www.dpscs.state.md.us/publicinfo/media/pdf/ FinalReport_2008-09-10.pdf. One managed access technology was demonstrated and operated pursuant to an experimental license granted by the FCC for this occasion. 19 Maryland Department of Public Safety and Correctional Services, Non-Jamming Cell Phone Pilot Summary, Jan. 20, 2010, available at https:// www.dpscs.state.md.us/media/Cell-Phone-PilotSummary_Final.pdf. 20 Supra note 18 at page 5. The conclusions reached from the demonstrations were that each State will have to identify its own specific needs since the technology is such that one solution may not work for every facility within a given State. Supra note 18 at page 6. PO 00000 Frm 00030 Fmt 4703 Sfmt 4703 26735 line or wirelessly) to a computer to identify a cell phone call and locate the origin of the call. Additionally, handheld cell phone detectors are able to scan frequencies within correctional facilities and detect the location of the caller. These systems can only detect a cell phone when it is in use—either placing or receiving a call. The devices are generally ‘‘passive’’ receive-only devices, and do not necessarily require any authorization or license for the equipment or the user to operate. Additionally, the Maryland Department of Public Safety and Correctional Services demonstration included a number of detection technologies, and the report concluded that there were varying degrees of accuracy in terms of cell phone detection based upon each vendor’s technological abilities.21 Request for Comments NTIA requests comment on the questions below in order to assist in evaluating technology solutions to prevent contraband cell phone use in prisons. These questions are not a limitation on comments that may be submitted. When making reference to studies, research, and other empirical data that are not widely published, commenters should provide copies of the referenced material with the submitted comments. Comments will be posted on the NTIA Web site for viewing at https://www.ntia.doc.gov. 1. Technologies or Approaches We have initially identified three broad categories of approaches that provide solutions for preventing contraband cell phone use: jamming, managed access, and detection. Are these characterizations accurate and complete? Are there technologies other than these categories, and if so, how do they work? What approaches can be taken to jam within irregular structures such as prisons, within indoor and outdoor areas and within rural versus urban settings? What specific types of managed access and detection techniques are available? What risk does each system pose to legitimate cell phone use by the general public outside the prison? What risk does each system pose to public safety and government use of spectrum? How can any of the foregoing risks be mitigated or eliminated? What are the benefits and drawbacks of implementing these techniques? Are certain systems more suitable for certain prison environments or locations? To what extent does the installation of each system require a 21 Id. E:\FR\FM\12MYN1.SGM 12MYN1 26736 Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices WReier-Aviles on DSKGBLS3C1PROD with NOTICES customized approach for each prison? How disruptive is the installation process? What approaches can be used in the implementation of systems employing detection techniques? How does each system provide for completion of critical calls or radio communications such as those from public safety officers (including use of handheld two-way radios) or 911? What ability does each of these technologies possess for upgrades to include new frequency bands, technologies, modulation techniques, etc. as they are introduced into the marketplace? How quickly can they be upgraded? 2. Devices and Frequency Bands Many types of wireless mobile devices are available to consumers from a plethora of commercial carriers (e.g., push-to-talk, cell phones, smart phones, personal digital assistants). These devices operate, consistent with FCC rules, in a number of frequency bands depending upon the types of services and capabilities/features that the wireless carriers offer. To eliminate contraband cell phone use in prisons, techniques must be identified that have the capability to thwart the use from the gamut of devices and spectrum bands/ frequencies in which these phones operate. These devices and associated frequency bands are: Cellular (824–849/ 869–894 MHz); PCS (1850–1990 MHz); AWS (1710–1755/2110–2170 MHz); and SMR (806–824 and 851–869; 896–901 and 935–940 MHz). Additionally, spectrum bands, such as the 698–806 MHz (700 MHz) band, 2110–2170 MHz, and the 2500–2690 MHz band, will soon offer newer, faster, and more bandwidth-intensive features to the public. Further, other devices that operate in such radio services as the Family Radio (462.5625–467.7125 MHz band) and General Mobile Radio (462— 467 MHz band) Services present possible avenues for illegal or unauthorized communications by inmates. While the range of these two services is relatively small, both use handsets for two-way voice communication and could be attractive to inmates in urban environments. Undoubtedly, any of these devices could find their way to prison inmates as well. What other frequency bands could be used by technologies that inmates could acquire with which to communicate? Do, or will, the technologies identified above effectively cover all of the bands likely to be used for commercial wireless services and how do, or will, they do so? Specifically, which frequency bands does each approach currently best address, and VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 which could they best address in the future? How can the technologies prevent an inmate from communicating with a device employing proprietary technology (e.g., SMR radios)? Will the technologies deal with phones that plan to operate in other bands where new services will be offered in the future, such as in the 700 MHz band? What will be necessary to extend the capabilities of the technologies to new bands (new hardware or software, new antennas, agreements, etc.)? 3. Interference to Other Radio Services Avoiding interference to authorized cell phone reception E83A; as well as other radio services outside the cell phone bands E83A; is a critical element in evaluating the various technologies. The longstanding radio spectrum regulation principle, embodied in the Communications Act of 1934, is to preclude harmful interference and not to block access to or receipt of information transmitted wirelessly.22 In addition to producing emissions in specific bands and within specific areas to deny service, jamming systems also produce unwanted signals outside of their intended operating bands and are not naturally confined to a prescribed area. These signals have the potential to produce interference to other radio services operating in numerous frequency bands (including Federal Government operations) and outside of the prison facility. If jamming configurations are set up properly (that is, based upon sitespecific radio frequency (RF) engineering), can these unwanted emissions be reduced or eliminated at a distance that is based on jammer and site parameters at each individual prison? Is the location of the prison (rural versus urban) also a factor, and if so, why and how would that affect the feasibility or implementation of a jamming system? What jammer system parameters (e.g., power levels, modulation, antennas) can be used to control out-of-band (OOB) and unwanted emissions? Which of these parameters have the greatest impact on the effectiveness of the jammer transmitter? Swept frequency techniques are often employed in jamming systems.23 What other jamming techniques can be employed to disrupt wireless communication systems? Are filters commercially available that could be used to reduce the OOB and unwanted emission levels 22 Supra note 13. 23 A swept frequency jammer transmitter operates by repetitively frequency-sweeping (referred to as chirping) a carrier wave signal across the bands to be jammed. PO 00000 Frm 00031 Fmt 4703 Sfmt 4703 from jammer transmitters? Commenters should provide details on the specifications for the filter (e.g., manufacturer, model number). Will jamming multiple frequency bands simultaneously affect the emission characteristics of the jammer transmitter (e.g., generation of intermodulation products)? NTIA also seeks comment on other techniques that cell phone jammers can implement to reduce interference to other radio services. Can spectrum sensing be used in conjunction with jamming techniques to reduce the transmit duty cycle of the jammer transmitter? 24 Are there variable strength cell phone jammers that are capable of dynamically adjusting their strength? What are the factors that can vary the signal strength of the jammer if it is putting out too much power? The emissions from jammer transmitters can potentially cause interference to receivers beyond the intended jamming area. A critical parameter necessary to assess the potential impact to a receiver is the interference protection criteria (IPC).25 There are currently no industry-adopted or Federally-mandated standards for inband interference from other systems to wireless mobile handset receivers. How should the IPC for these handsets be established? What IPC values should be used for assessing potential interference to these handset receivers? An approach to regulating jammer transmitters could be to establish a distance at which the jammer signal must be below a specified level necessary to protect in-band and out-ofband receivers. An alternative approach could be to specify maximum allowable equivalent isotropically radiated power (EIRP) limits necessary to protect inband and out-of-band receivers as a function of frequency. Since the variations in the jammer configurations, effects of multiple jamming transmitters, structural characteristics of buildings, and propagation factors will be different depending on the installation and the facility, can analytical analysis techniques be used to develop the distances or EIRP limits necessary to protect in-band and out-of-band receivers? If analytical analysis techniques can be employed, explain the methodology to be used and all appropriate conditions considered in the analysis, including, but not limited to, propagation loss modeling and 24 The duty cycle is the fraction of time that a transmitter is in an ‘‘active’’ state. 25 The IPC is a relative or absolute interfering signal level at the receiver input, under specified conditions, such that the allowable performance degradation is not exceeded. E:\FR\FM\12MYN1.SGM 12MYN1 WReier-Aviles on DSKGBLS3C1PROD with NOTICES Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices building attenuation modeling. How should the effect of multiple jammer transmitters and antennas be taken into consideration? Are there other approaches that can be used to regulate jammer systems? The impact of jamming signals would also depend on the prison environment. Outside of the facility, will the variations in the measured levels of the jammer transmitter signal make it difficult to distinguish such a signal from the cellular and PCS signals in the environment, for example? If so, is this problem exacerbated in areas where there is a high density of cellular and PCS signals, such as in and around an urban prison location. The variations in the measured jammer transmitter signal levels could likely be due to propagation effects and building attenuation losses that will be different at each facility and for each jammer installation. Furthermore, depending on the relative signal levels, it can be difficult to differentiate between the measured jammer transmitter signal and the cellular and PCS signals. Given variations in signal levels and the potential to distinguish the jammer signal from the background signals, is it possible to measure accurately the jammer transmitter signal outside of a facility? Within a facility, is it possible to distribute the jammer transmitter power spatially across an array of antennas (or, in some cases, lossy cables) in order to better control and provide lower power density around individual antennas than could be produced if a single antenna were used to radiate a highpower signal? What techniques can be employed in the design of the jamming system to reduce the potential for interference to in-band and out-of-band receivers? Can restrictions be placed on the jammer transmitter antenna height to minimize the potential for interference outside of the area that is being jammed? Is it possible to employ directional or sector antennas to focus the jammer transmitter signal in the intended areas within a facility while minimizing the signal levels outside of the facility? Can down tilting the antennas be used to minimize the jammer transmitter signal level at the horizon? What restrictions can be placed on the antennas without impacting the effectiveness of the jamming system? Each prison is unique in size, location and structure. Jammer set-up configurations cannot be applied broadly to all jammer systems in all locations. The variations in the jammer transmitter signal levels outside of the facility depend on a number of factors VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 such as building structures, antenna deployment, and background signals. These factors could have an effect on the ability to measure accurately jammer transmitter emission levels. Given all of the possible variations in a jammer system installation, will operators need to conduct on-site compliance measurements at each facility? What techniques should be used to measure the emissions of a jammer system? Is it possible to accurately measure the jammer transmitter signals in the presence of other background signals? How shall an operator, in its request for authorization of such equipment, be required to demonstrate that it meets any interference protection requirements? Do other technologies or approaches have the potential to interfere with other authorized radio services within the same bands or adjacent bands? If so, under what conditions and how can an operator mitigate interference? In some of the bands identified above, public safety frequencies are interleaved or operate in close proximity with frequencies used by mobile devices, for instance in the 800 MHz SMR and 700 MHz bands. How will internal and external land mobile systems, including systems used by the prisons themselves, as well as other public safety operations, be protected? Are there other radio communications systems within prisons that could also experience interference, such as internal private land mobile systems used by prison officials or medical telemetry devices in prison infirmaries? 26 4. Protecting 911 Calls and Authorized Users The preservation and protection of calls to 911 from cell phones is a paramount concern as more consumers rely on mobile devices.27 The number of cell phones calling 911 has been steadily increasing as more consumers are using them. The National Emergency Number Association estimates that wireless telephone users account for 26 State governmental entities are eligible to hold authorizations for frequencies in the Public Safety Pool to operate radio stations for transmission of communications essential to its official activities. See 47 CFR 90.20. BOP uses medical telemetry at Federal Medical Centers and at some non-medical prisons. Additionally, some inmates have devices that are monitored remotely by local hospitals. 27 More than one in five households have discontinued wireline service (or chosen not to use it) and rely solely on wireless communications as their primary telephone service. See Centers for Disease Control and Prevention, Wireless Substitution: Early Release of Estimates from the National Health Interview Survey, July-Dec. 2008, May 6, 2009, available at https://www.cdc.gov/nchs/ data/nhis/earlyrelease/wireless200905.pdf. PO 00000 Frm 00032 Fmt 4703 Sfmt 4703 26737 nearly half of the calls to 911.28 Jamming radio signals in and around prisons cannot differentiate between normal cell phone traffic and 911 calls.29 Managed access systems, however, can be selective and designed to ignore 911 calls (i.e., letting them connect to the network), and detection systems typically use passive devices that do not affect transmission or reception. How are 911 calls preserved in areas around the prisons where the public is making a call to 911 if they come in proximity to the prison? Are there any other technologies identified that can protect 911 calls and how do they do so? Wireless consumers expect their wireless calls to be completed without being dropped or busy. In and around prisons, consumers and public safety officials, as authorized users of the system, will expect their wireless devices to communicate. How are authorized users allowed to make calls with the technologies described? If the caller passes through a ‘‘dummy’’ cell site set-up within the prison vicinity, will the call go through if a call is initiated within that cell (e.g., will it result in a busy signal or a dropped call)? Are calls handed off to the carrier cell site and network? How does managed access work if the caller is an authorized user, but the phone number is not known (i.e., in the database of authorized users) to the managed access system? 5. Cost Considerations The cost of preventing cell phone use in prisons is a factor that must be considered and varies according to the type of technology, area to be covered, and additional features. What factors impact the cost of implementing each of the technologies as described above? Are there on-going or recurring costs associated with each? To what extent will installation costs vary in light of the particular characteristics of each prison (e.g., geographic setting)? What 28 National Emergency Number Association, Cell Phones and 911, https://www.nena.org/cellularwireless-911. See also FCC Consumer Facts, Wireless 911 Services, available at https:// www.fcc.gov/cgb/consumerfacts/ wireless911srvc.html. As a case-in-point, there has been a sharp increase by residents of Jefferson County, Arkansas dialing 911 from cell phones, where there are three State prisons. Nearly 70 percent of calls to 911 in 2008 were made from a cell phone. See Arkansas Daily-Gazette, Cell Phone Calls Place Burden on Ark. 911 Dispatch Center, Mike Linn, Oct. 5, 2009, available at https:// www.firerescue1.com/fire-products/ communications/articles/595629-Cell-phone-callsplace-burden-on-Ark-911-dispatch-center/. 29 However, at some distance away from the prison which is unique to each prison’s features and jammer set-up, jamming contraband cell phone signals should not affect authorized or 911 calls. E:\FR\FM\12MYN1.SGM 12MYN1 26738 Federal Register / Vol. 75, No. 91 / Wednesday, May 12, 2010 / Notices characteristics are most likely to affect costs? What are the ancillary costs for each type of approach (e.g., maintaining network connectivity for managed access systems, resources required to physically locate the phone for detection/location systems such as canines, staff time, etc.)? Are there typical costs or a range for each, and if so, what are they? Is training required for prison staff to properly operate the equipment? What staff costs are associated with each technology? 6. Locating Contraband Phones In order to completely eradicate contraband cell phone use, the cell phone must be physically located and removed, which can be labor-intensive. Inmates may use them for a short period of time and turn them off and then move them, making the devices more difficult to locate. Jamming cannot identify the specific location of a contraband cell phone. How do managed access and detection technologies locate a cell phone caller? What software and hardware is needed? How accurate are detection technologies? With the insertion of GPS chip-sets into mobile devices, are cell phone locations easily identifiable through managed access or are other means necessary (e.g., hardware or software)? Do managed access and detection technologies have the capability of providing intelligencegathering information for prison officials, and if so, what type of information? What other means are necessary to physically locate the phones once a position is known? WReier-Aviles on DSKGBLS3C1PROD with NOTICES 7. Regulatory/Legal Issues The Communications Act of 1934 established the FCC and set specific rules on wireless radio services.30 Both the operation of mobile wireless devices, and effective means and solutions to deny the use of them have regulatory and legal implications. The FCC has primary responsibility for regulating spectrum issues for the types of systems typically used within the State and local prisons and jails (for example, private internal radio communications and commercial systems used by prison staff). NTIA, on behalf of the President, authorizes the use of the radio frequencies for equipment operated by Federal entities, including the BOP.31 30 For example, cellular service rules are set forth in 47 CFR parts 1 and 22; AWS in 47 CFR part 27; and SMR in 47 CFR part 90. 31 See generally, NTIA Manual of Regulations and Procedures for Federal Radio Frequency Management, Sept. 2009, Section 1, available at https://www.ntia.doc.gov/osmhome/redbook/1.pdf. VerDate Mar<15>2010 15:00 May 11, 2010 Jkt 220001 While the Communications Act prevents the FCC from authorizing jamming or other acts of intentional interference to the radio communications of authorized stations, those same provisions do not apply to the Federal government itself. Therefore, NTIA is not limited in its authority to permit jamming at Federal prison facilities. We seek comment on State/local or Federal laws, rules, or policies that need clarification or that may hinder deployment of any of these technologies or others that may be raised by commenters. These might include not only radio regulatory issues, such as the approval necessary to operate or conduct experimentation and demonstration, but also ancillary issues such as the privacy and legal implications of trap-and-trace technologies? What agreements, agency relationships, or licensing requirements between the prison, service provider, and access provider would be required for temporary or experimental demonstration or for permanent operation? alternative to talking. Is there a need to differentiate between voice and data, such as text messages, and are the technologies discussed above effective against data use by prison inmates? Does shorter air-time use from text messaging present problems with detection and/or capturing the call and ultimately locating the phone? Will the technologies identified above be effective against high-speed, highcapacity data formats, such as Long Term Evolution (LTE) for devices that are expected to operate in the 700 MHz band? Please note that all comments received will be posted on NTIA’s Web site. Commenters that submit any business confidential or proprietary information in response to this notice should clearly mark such information appropriately. Commenters should also submit a version of their comments that can be publicly posted on NTIA’s Web site. 8. Technical Issues The identification of technical issues is another factor in investigating and evaluating contraband cell phone use in prisons. Are there any technical issues to be considered for the technologies identified above? For example, the actual range of a jammer depends on its power, antenna orientation, and the local environment (size and shape), which may include hills or walls of a building (that could be made of a variety of materials) that block the jamming signal. How accurate are the location technologies? Does each site need specific RF engineering for each of the approaches? How do the technologies allow authorized users, including 911 calls, to be protected? How are different modulation schemes or channel access methods (for example, Global System for Mobile Communications—GSM, or Code Division Multiple Access—CDMA) handled for each category and does the solutions depend on the type of access method that the wireless carrier is using? Text-messaging continues to increase as a form of communication from handheld wireless devices.32 Wireless handheld devices in the possession of prison inmates afford them this option as an [FR Doc. 2010–11350 Filed 5–11–10; 8:45 am] 32 CTIA estimates that the number of monthly text messages sent increased from 9.8 billion in December 2005 to 152.7 billion in December of 2009. Supra note 2. See also CNet News, U.S. Text Usage Hits Record Despite Price Increases, Marguerite Reardon, Sept. 10, 2008, available at https://news.cnet.com/8301-1035_3-1003863494.html. PO 00000 Frm 00033 Fmt 4703 Sfmt 4703 Dated: May 7, 2010. Kathy D. Smith, Chief Counsel. BILLING CODE 3510–60–P COMMODITY FUTURES TRADING COMMISSION Sunshine Act Meeting Notice AGENCY HOLDING THE MEETING: Commodity Futures Trading Commission. DATE AND TIME: May 19, 2010 at 9:30 a.m. PLACE: Three Lafayette Centre, 1155 21st St., NW., Washington, DC, Lobby Level Hearing Room (Room 1000). STATUS: Open. MATTERS TO BE CONSIDERED: Agenda: (1) Consideration of the trading of futures and binary options based on motion picture box office receipts and to gather the views of interested parties; and (2) Reestablishment of the CFTC Technology Advisory Committee. CONTACT PERSON: Sauntia Warfield, Assistant Secretary, 202–518–5084. SUPPLEMENTARY INFORMATION: The Commission is undertaking a review of issues related to the trading of futures or options related to motion picture box office receipts. The Commission will have oral presentations by panels of invited witnesses representing Media Derivatives Exchange (MDEX), Cantor Exchange (Cantor), segments of the motion picture industry, and other interested parties. E:\FR\FM\12MYN1.SGM 12MYN1

Agencies

[Federal Register Volume 75, Number 91 (Wednesday, May 12, 2010)]
[Notices]
[Pages 26733-26738]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-11350]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Telecommunications and Information Administration

[Docket No. 100504212-0212-01]


Preventing Contraband Cell Phone Use in Prisons

AGENCY: National Telecommunications and Information Administration, 
U.S. Department of Commerce.

ACTION: Notice of inquiry.

-----------------------------------------------------------------------

SUMMARY: The U.S. Department of Commerce's National Telecommunications 
and Information Administration (NTIA) seeks comment on technical 
approaches to preventing contraband cell phone use in prisons. Congress 
tasked NTIA with developing, in coordination with the Federal 
Communications Commission (FCC), the Federal Bureau of Prisons (BOP), 
and the National Institute of Justice (NIJ), a plan to investigate and 
evaluate how wireless jamming, detection and other technologies might 
be utilized for law enforcement and corrections applications in Federal 
and State prison facilities. To assist in its evaluation of these 
technologies, NTIA requests information from the public on technologies 
that would significantly reduce or eliminate contraband cell phone use 
without negatively affecting commercial wireless and public safety 
services (including 911 calls and other government radio services) in 
areas surrounding prisons.

DATES: Comments are requested on or before June 11, 2010.

ADDRESSES: Parties may mail written comments to Richard J. Orsulak, 
Emergency Planning and Public Safety Division, Office of Spectrum 
Management, National Telecommunications and Information Administration, 
U.S. Department of Commerce, 1212 New York Avenue, NW., Suite 600B, 
Washington, DC 20005, with copies to Edward Drocella, Spectrum 
Engineering and Analysis Division, Office of Spectrum Management, 
National Telecommunications and Information Administration, U.S. 
Department of Commerce, 1401 Constitution Avenue, NW., Room 6725, 
Washington, DC 20230. Alternatively, comments may be electronically 
submitted in Microsoft Word format to 
contrabandcellphones@ntia.doc.gov. Comments will be posted on NTIA's 
Web site for viewing at https://www.ntia.doc.gov/osmhome/contrabandcellphones/.

FOR FURTHER INFORMATION CONTACT: Richard J. Orsulak, Emergency Planning 
and Public Safety Division, Office of Spectrum Management, National 
Telecommunications and Information Administration, U.S. Department of 
Commerce, 1212 New York Avenue, NW., Suite 600B, Washington, DC 20005; 
telephone (202) 482-9139 or e-mail rorsulak@ntia.doc.gov.

SUPPLEMENTARY INFORMATION: 

Overview

    The mobile phone industry has enjoyed significant growth since the 
inception of the analog wireless cell phone network in the early 
1980s.\1\ The 1990s saw the development of digital networks, and 
thereafter, high-speed data networks became available to consumers. The 
growth of the mobile phone industry has been fueled, in part, by 
consumer demand for instant access anywhere and anytime. Features such 
as data, image, and video communications have also contributed to the 
overwhelming demand for mobile

[[Page 26734]]

services and applications. As of December 2009, there were 
approximately 286 million wireless subscriber connections in the United 
States compared to nearly 208 million in December of 2005, which 
represents an increase of 38 percent.\2\ During this same time period, 
the number of minutes used (on an annual basis) increased by 150 
percent, while the wireless penetration (as a percentage of total U.S. 
population) increased from 69 percent to 91 percent.\3\ These trends 
indicate that more people are relying on wireless mobile devices to 
communicate for their daily business and personal needs.
---------------------------------------------------------------------------

    \1\ For the purpose of this Notice of Inquiry (NOI), the use of 
the word ``cell phone'' will refer to any wireless, portable device 
that is available to the public on a subscription or prepaid basis 
for delivering voice and/or data services such as text messages. It 
includes, for example, phones operating within the Cellular Radio 
Service in the 800 MHz bands; broadband Personal Communications 
Services (PCS) in the 1.9 GHz bands; the Advanced Wireless Services 
(AWS) in the 1.7 GHz band; Specialized Mobile Radio (SMR) services 
in the 800 and 900 MHz bands; and any future mobile wireless devices 
that plan to operate in bands such as the 700 MHz band.
    \2\ CTIA Wireless Quick Facts, available at https://www.ctia.org/advocacy/research/index.cfm/AID/10323.
    \3\ Id.
---------------------------------------------------------------------------

    The use of contraband cell phones by inmates has risen as the U.S. 
prison population continues to expand.\4\ The number of cell phones 
confiscated by prison officials has dramatically increased in only a 
few years. For example, during 2006 California correctional officers 
seized approximately 261 cell phones in the State's prisons and camps; 
by 2008, that number increased ten fold to 2,811.\5\ Maryland and other 
States have also seen a rise in the number of confiscated cell phones 
in their State prisons. In 2009, Maryland prison officials confiscated 
nearly 1,700 phones, up from approximately 1,200 phones the year 
before.\6\ This increase in cell phone use by inmates is a mounting 
concern among correctional administrators across the country.\7\
---------------------------------------------------------------------------

    \4\ At the end of 2008, Federal and State correctional 
authorities had jurisdiction over roughly 1.6 million prisoners, of 
which over 200,000 (about 13 percent) were housed in Federal 
facilities. The Federal and State prison population rose by 
approximately 1 percent from year-end 2007 to 2008. See Sabol, 
William J., Heather C. West, and Matthew Cooper, ``Prisoners in 
2008,'' Bureau of Justice Statistics Bulletin, U.S. Department of 
Justice, Office of Justice Programs, Bureau of Justice Statistics, 
Dec. 2009, page 16, available at https://bjs.ojp.usdoj.gov/content/pub/pdf/p08.pdf.
    \5\ Special Report, Inmate Cell Phone Use Endangers Prison and 
Public Safety, Office of the Inspector General, State of California, 
May 2009, available at https://www.oig.ca.gov/media/reports/BCI/Special%20Report%20of%20Inmate%20Cell%20Phone%20Use.pdf.
    \6\ State of Maryland Fact Sheet, Keeping Communities Safe, 
Maryland Department of Public Safety and Correctional Services, Feb. 
2010.
    \7\ See, e.g., Department of Justice, Office of Justice 
Programs, National Institute of Justice, Cell Phones Behind Bars, 
Dec. 2009, available at https://www.ncjrs.gov/pdffiles1/nij/227539.pdf; Washington Examiner, Drug Dealer Who Planned Murder Gets 
Life Sentence, Scott McCabe, May 4, 2009, available at https://www.washingtonexaminer.com/local/crime/Drug-dealer-who-planned-murder-gets-life-sentence-44327767.html; Wired Magazine, Prisoners 
Run Gangs, Plan Escapes, and Even Order Hits With Smuggled 
Cellphones, Vince Beiser, May 22, 2009, available at https://www.wired.com/politics/law/magazine/17-06/ff_prisonphones. 
Contraband cell phone use is a problem in Federal prison facilities 
as well. See Testimony of Harley J. Lappin, Director, U.S. Bureau of 
Prisons before the U.S. Congress, Hearing on the Fiscal Year 2009 
Budget Request for the Bureau of Prisons, the U.S. Marshal Service, 
and the Office of the Federal Detention Trustee, available at https://www.november.org/stayinfo/breaking08/LappinTestimony.html.
---------------------------------------------------------------------------

    Recognizing the need to take action to curb contraband cell phone 
use, the United States Senate passed a bill in 2009 that would amend 
the Communications Act of 1934 to authorize the FCC to permit the 
supervisory authority of a correctional facility to operate a system 
within the facility to prevent, jam, or otherwise interfere with 
unauthorized wireless communications by individuals held in the 
facility.\8\ Also, legislation has been introduced and passed in the 
U.S. Senate that would prohibit Federal prisoners from possessing or 
using cell phones and similar wireless devices.\9\
---------------------------------------------------------------------------

    \8\ S. 251, Safe Prisons Communications Act of 2009, available 
at https://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_bills&docid=f:s251es.txt.pdf. The Bill is under consideration 
in the House.
    \9\ S. 1749, The Cell Phone Contraband Act of 2010, available at 
https://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_bills&docid=f:s1749is.txt.pdf.
---------------------------------------------------------------------------

    In December 2009, Congress inserted language in the Conference 
Report to the Department of Commerce FY 2010 Appropriations tasking 
NTIA, in coordination with the FCC, BOP, and NIJ, to develop a plan to 
investigate and evaluate how wireless jamming, detection, and other 
technologies might be utilized for law enforcement and corrections 
applications in Federal and State prison facilities.\10\ Congress also 
asked that the plan consider the adverse effects that these 
technologies impose on commercial wireless and public safety services 
in areas surrounding the prisons.\11\ This NOI seeks public input to 
assist NTIA with its evaluation of technologies to prevent the use of 
contraband cell phones in Federal and State facilities.\12\
---------------------------------------------------------------------------

    \10\ H.R. Conf. Rep. No. 111-336 (2009), Division B, Title 1, 
Page 619, available at https://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_reports&docid=f:hr366.111.pdf. The 
language specifically refers to methods of preventing contraband 
cell phone use within prison facilities. Jamming and detecting cell 
phone uses for other applications (such as within movie theaters) 
are not germane to either this NOI or NTIA's evaluation.
    \11\ Id.
    \12\ Although other contraband interdiction technologies may 
help to prevent the use of, or access to, contraband cell phones in 
prisons (such as x-rays, dogs, body scanning imagery, and other 
methods which detect contraband phones hidden on prison employees, 
visitors, and inmates), this NOI and NTIA's subsequent report will 
be limited to radio frequency (RF)-based, wireless technology 
solutions.
---------------------------------------------------------------------------

    NTIA understands that a number of technological approaches exist 
that could help prison officials block or reduce unauthorized use of 
cell phones by inmates provided that these approaches could be legally 
implemented. NTIA, in coordination with the FCC, BOP, and NIJ, have 
preliminarily identified three categories of contraband cell phone 
intervention: jamming, managed network access, and detection.

Jamming

    Radio jamming is the deliberate radiation, re-radiation, or 
reflection of electromagnetic energy for the purpose of disrupting use 
of electronic devices, equipment, or systems--in this case, mobile 
devices such as cell phones. A cell phone works by communicating with 
its service network through a cell tower or base station. These cell 
towers divide an area of coverage into cells, which range in size from 
a few city blocks to hundreds of square miles. The base station links 
callers into the local public switched telephone network, another 
wireless network, or even the Internet.
    A jamming device transmits on the same radio frequencies as the 
cell phone, disrupting the communication link between the phone and the 
cell phone base station, essentially rendering the hand-held device 
unusable until such time as the jamming stops. Jamming devices do not 
discriminate among cell phones within range of the jamming signal--both 
contraband and legitimate cell phones are disabled. Currently, the 
operation by non-Federal entities of transmitters designed to jam or 
block wireless communications violates the Communications Act of 1934, 
as amended.\13\ Nonetheless, several groups have filed with the FCC 
petitions for waivers to permit the use of cell phone jammers in 
prisons.\14\ Groups such as

[[Page 26735]]

the Association of Public Safety Communications Officials 
International, Inc. and CTIA have opposed the use of jamming for fear 
of interference to critical public safety operations and legitimate 
cell phone use in and around prisons.\15\ Others, however, have 
supported its use in prisons.\16\ Stating that it did not have the 
authority to permit such jamming, the FCC has denied the petitions.\17\
---------------------------------------------------------------------------

    \13\ 47 U.S.C. Sections 301, 302a, 333. The FCC had reiterated 
this fact in a Public Notice, Sale or Use of Transmitters Designed 
to Prevent, Jam or Interfere with Cell Phone Communications is 
Prohibited in the United States, DA-05-1776, June 27, 2005, 
available at https://hraunfoss.fcc.gov/edocs_public/attachmatch/DA-05-1776A1.pdf.
    \14\ See, e.g., Letter from Devon Brown, Director, District of 
Columbia Department of Corrections, to Michael Copps, Acting 
Chairman, Federal Communications Commission, Feb. 2, 2009; Letter 
from Howard Melamed, CEO, CellAntenna Corporation, to Marlene H. 
Dortch, Secretary, Federal Communications Commission, March 3, 2009. 
The cellular radio service and other commercial wireless services 
fall under the auspices of the FCC rules and regulations, which are 
promulgated in Title 47 of the Code of Federal Regulations (C.F.R.). 
See https://wireless.fcc.gov/index.htm?job=rules_and_regulations.
    \15\ Letter from Chris Fischer, President, Association of Public 
Safety Communications Officials International, Inc. to Michael 
Copps, Acting Chairman, Federal Communications Commission, March 13, 
2009, available at https://files.ctia.org/pdf/CTIA_Position_Papers_Letter_APCO_Re_cell_phone_jamming_3_13_09.pdf; CTIA 
Policy Topics, Contraband Cell Phones in Prisons, available at 
https://www.ctia.org/advocacy/policy_topics/topic.cfm/TID/58.
    \16\ See, e.g., Wired, Prison Mobile Phone Debate Jammed up in 
the System, Ryan Singel, March 15, 2010, available at https://www.wired.com/epicenter/2010/03/prison-mobile-phone-debate-jammed-up-in-the-system/. Also, a recent survey at the International CTIA 
Wireless Conference showed that nearly three-quarters of respondents 
favor jamming of cell phones in prisons. See https://www.earthtimes.org/articles/show/survey-at-international-ctia-wireless,1231800.shtml#ixzz0ju7Exz3B.
    \17\ See, e.g., Letter from James D. Schlichting, Acting Chief 
Wireless Telecommunications Bureau, Federal Communications 
Commission to Devon Brown, Director, District of Columbia Department 
of Corrections, DA 09-354, Feb. 18, 2009, available at https://fjallfoss.fcc.gov/edocs_public/attachmatch/DA-09-354A1.pdf; Letter 
from James D. Schlichting, Acting Chief Wireless Telecommunications 
Bureau, Federal Communications Commission to Howard Melamed, CEO, 
CellAntenna Corporation, DA 09-622, March 17, 2009, available at 
https://fjallfoss.fcc.gov/edocs_public/attachmatch/DA-09-622A1.pdf.
---------------------------------------------------------------------------

Managed Access

    Managed access systems intercept calls in order to allow 
corrections officials to prevent inmates from accessing carrier 
networks. The cell signal is not blocked by a jamming signal, but 
rather, is captured (or re-routed) and prevented from reaching the 
intended base station, thereby disallowing the completion of the call. 
This technology permits calls by known users (i.e., prison-authorized 
cell phone numbers) by handing them off to the network, and prevents 
others by denying access to the network. It is unclear whether or how 
well these systems can discriminate among prison-authorized cell phone 
numbers and ``unknown'' phones to avoid capturing/cancelling calls that 
do not involve inmates.
    As a tool to deal with contraband cell phone use, some of these 
systems employ passive technology that detects cell phone use and 
collects data from active cell phones. Some systems deny access to 
calls from numbers they do not recognize. Other techniques redirect 
cell phone transmissions to portable antennas set up specifically 
around the prison, and only allow communication from prison-authorized 
cell phones to be forwarded to carrier cell towers. Denial of service 
approaches use electronic hardware located in the vicinity of the cell 
phone user to ``spoof'' the cell phone into thinking it is 
communicating with the carrier tower. The cell phone user receives a 
message that indicates that there is no service available. This type of 
denial of service system operates independently of the carrier and 
spoofs all cell calls.
    In an effort to eliminate the unauthorized use of cell phones in 
Maryland State prisons, in 2009 the Maryland Department of Public 
Safety and Correctional Services hosted a demonstration of various non-
jamming technologies, including managed access systems.\18\ In January 
2010, they issued a follow-on report.\19\ The demonstration showed, 
among other things, that: (1) Several intelligence gathering abilities 
could be implemented depending upon specific laws governing each State; 
and (2) the types of technology tested could allow certain phones to 
operate and allow 911 calls to be processed.\20\
---------------------------------------------------------------------------

    \18\ Maryland Department of Public Safety and Correctional 
Services, Overview of Cell Phone Demonstration, available at https://www.dpscs.state.md.us/publicinfo/media/pdf/FinalReport_2008-09-10.pdf. One managed access technology was demonstrated and operated 
pursuant to an experimental license granted by the FCC for this 
occasion.
    \19\ Maryland Department of Public Safety and Correctional 
Services, Non-Jamming Cell Phone Pilot Summary, Jan. 20, 2010, 
available at https://www.dpscs.state.md.us/media/Cell-Phone-Pilot-Summary_Final.pdf.
    \20\ Supra note 18 at page 5. The conclusions reached from the 
demonstrations were that each State will have to identify its own 
specific needs since the technology is such that one solution may 
not work for every facility within a given State. Supra note 18 at 
page 6.
---------------------------------------------------------------------------

Detection

    Detection is the process of locating, tracking, and identifying 
various sources of radio transmissions--in this case, cell phone 
signals. Detection, or direction finding, is used in a wide variety of 
applications including, for example, cell phone assignments, the 
location of 911 emergency calls and marine distress calls. For accurate 
position location in an environment such as within a prison facility, 
detection technology triangulates a cell phone signal and requires the 
use of correctional staff to physically search a small area (such as a 
prison cell) and seize the identified cell phone. This may involve 
placing direction-finding antennas or sensors (connected wire-line or 
wirelessly) to a computer to identify a cell phone call and locate the 
origin of the call. Additionally, hand-held cell phone detectors are 
able to scan frequencies within correctional facilities and detect the 
location of the caller. These systems can only detect a cell phone when 
it is in use--either placing or receiving a call. The devices are 
generally ``passive'' receive-only devices, and do not necessarily 
require any authorization or license for the equipment or the user to 
operate.
    Additionally, the Maryland Department of Public Safety and 
Correctional Services demonstration included a number of detection 
technologies, and the report concluded that there were varying degrees 
of accuracy in terms of cell phone detection based upon each vendor's 
technological abilities.\21\
---------------------------------------------------------------------------

    \21\ Id.
---------------------------------------------------------------------------

Request for Comments

    NTIA requests comment on the questions below in order to assist in 
evaluating technology solutions to prevent contraband cell phone use in 
prisons. These questions are not a limitation on comments that may be 
submitted. When making reference to studies, research, and other 
empirical data that are not widely published, commenters should provide 
copies of the referenced material with the submitted comments. Comments 
will be posted on the NTIA Web site for viewing at https://www.ntia.doc.gov.

1. Technologies or Approaches

    We have initially identified three broad categories of approaches 
that provide solutions for preventing contraband cell phone use: 
jamming, managed access, and detection. Are these characterizations 
accurate and complete? Are there technologies other than these 
categories, and if so, how do they work? What approaches can be taken 
to jam within irregular structures such as prisons, within indoor and 
outdoor areas and within rural versus urban settings? What specific 
types of managed access and detection techniques are available? What 
risk does each system pose to legitimate cell phone use by the general 
public outside the prison? What risk does each system pose to public 
safety and government use of spectrum? How can any of the foregoing 
risks be mitigated or eliminated? What are the benefits and drawbacks 
of implementing these techniques? Are certain systems more suitable for 
certain prison environments or locations? To what extent does the 
installation of each system require a

[[Page 26736]]

customized approach for each prison? How disruptive is the installation 
process? What approaches can be used in the implementation of systems 
employing detection techniques? How does each system provide for 
completion of critical calls or radio communications such as those from 
public safety officers (including use of handheld two-way radios) or 
911? What ability does each of these technologies possess for upgrades 
to include new frequency bands, technologies, modulation techniques, 
etc. as they are introduced into the marketplace? How quickly can they 
be upgraded?

2. Devices and Frequency Bands

    Many types of wireless mobile devices are available to consumers 
from a plethora of commercial carriers (e.g., push-to-talk, cell 
phones, smart phones, personal digital assistants). These devices 
operate, consistent with FCC rules, in a number of frequency bands 
depending upon the types of services and capabilities/features that the 
wireless carriers offer. To eliminate contraband cell phone use in 
prisons, techniques must be identified that have the capability to 
thwart the use from the gamut of devices and spectrum bands/frequencies 
in which these phones operate. These devices and associated frequency 
bands are: Cellular (824-849/869-894 MHz); PCS (1850-1990 MHz); AWS 
(1710-1755/2110-2170 MHz); and SMR (806-824 and 851-869; 896-901 and 
935-940 MHz). Additionally, spectrum bands, such as the 698-806 MHz 
(700 MHz) band, 2110-2170 MHz, and the 2500-2690 MHz band, will soon 
offer newer, faster, and more bandwidth-intensive features to the 
public. Further, other devices that operate in such radio services as 
the Family Radio (462.5625-467.7125 MHz band) and General Mobile Radio 
(462--467 MHz band) Services present possible avenues for illegal or 
unauthorized communications by inmates. While the range of these two 
services is relatively small, both use handsets for two-way voice 
communication and could be attractive to inmates in urban environments. 
Undoubtedly, any of these devices could find their way to prison 
inmates as well. What other frequency bands could be used by 
technologies that inmates could acquire with which to communicate?
    Do, or will, the technologies identified above effectively cover 
all of the bands likely to be used for commercial wireless services and 
how do, or will, they do so? Specifically, which frequency bands does 
each approach currently best address, and which could they best address 
in the future? How can the technologies prevent an inmate from 
communicating with a device employing proprietary technology (e.g., SMR 
radios)? Will the technologies deal with phones that plan to operate in 
other bands where new services will be offered in the future, such as 
in the 700 MHz band? What will be necessary to extend the capabilities 
of the technologies to new bands (new hardware or software, new 
antennas, agreements, etc.)?

3. Interference to Other Radio Services

    Avoiding interference to authorized cell phone reception E83A; as 
well as other radio services outside the cell phone bands E83A; is a 
critical element in evaluating the various technologies. The 
longstanding radio spectrum regulation principle, embodied in the 
Communications Act of 1934, is to preclude harmful interference and not 
to block access to or receipt of information transmitted 
wirelessly.\22\ In addition to producing emissions in specific bands 
and within specific areas to deny service, jamming systems also produce 
unwanted signals outside of their intended operating bands and are not 
naturally confined to a prescribed area. These signals have the 
potential to produce interference to other radio services operating in 
numerous frequency bands (including Federal Government operations) and 
outside of the prison facility.
---------------------------------------------------------------------------

    \22\ Supra note 13.
---------------------------------------------------------------------------

    If jamming configurations are set up properly (that is, based upon 
site-specific radio frequency (RF) engineering), can these unwanted 
emissions be reduced or eliminated at a distance that is based on 
jammer and site parameters at each individual prison? Is the location 
of the prison (rural versus urban) also a factor, and if so, why and 
how would that affect the feasibility or implementation of a jamming 
system?
    What jammer system parameters (e.g., power levels, modulation, 
antennas) can be used to control out-of-band (OOB) and unwanted 
emissions? Which of these parameters have the greatest impact on the 
effectiveness of the jammer transmitter? Swept frequency techniques are 
often employed in jamming systems.\23\ What other jamming techniques 
can be employed to disrupt wireless communication systems? Are filters 
commercially available that could be used to reduce the OOB and 
unwanted emission levels from jammer transmitters? Commenters should 
provide details on the specifications for the filter (e.g., 
manufacturer, model number). Will jamming multiple frequency bands 
simultaneously affect the emission characteristics of the jammer 
transmitter (e.g., generation of intermodulation products)?
---------------------------------------------------------------------------

    \23\ A swept frequency jammer transmitter operates by 
repetitively frequency-sweeping (referred to as chirping) a carrier 
wave signal across the bands to be jammed.
---------------------------------------------------------------------------

    NTIA also seeks comment on other techniques that cell phone jammers 
can implement to reduce interference to other radio services. Can 
spectrum sensing be used in conjunction with jamming techniques to 
reduce the transmit duty cycle of the jammer transmitter? \24\ Are 
there variable strength cell phone jammers that are capable of 
dynamically adjusting their strength? What are the factors that can 
vary the signal strength of the jammer if it is putting out too much 
power?
---------------------------------------------------------------------------

    \24\ The duty cycle is the fraction of time that a transmitter 
is in an ``active'' state.
---------------------------------------------------------------------------

    The emissions from jammer transmitters can potentially cause 
interference to receivers beyond the intended jamming area. A critical 
parameter necessary to assess the potential impact to a receiver is the 
interference protection criteria (IPC).\25\ There are currently no 
industry-adopted or Federally-mandated standards for in-band 
interference from other systems to wireless mobile handset receivers. 
How should the IPC for these handsets be established? What IPC values 
should be used for assessing potential interference to these handset 
receivers?
---------------------------------------------------------------------------

    \25\ The IPC is a relative or absolute interfering signal level 
at the receiver input, under specified conditions, such that the 
allowable performance degradation is not exceeded.
---------------------------------------------------------------------------

    An approach to regulating jammer transmitters could be to establish 
a distance at which the jammer signal must be below a specified level 
necessary to protect in-band and out-of-band receivers. An alternative 
approach could be to specify maximum allowable equivalent isotropically 
radiated power (EIRP) limits necessary to protect in-band and out-of-
band receivers as a function of frequency. Since the variations in the 
jammer configurations, effects of multiple jamming transmitters, 
structural characteristics of buildings, and propagation factors will 
be different depending on the installation and the facility, can 
analytical analysis techniques be used to develop the distances or EIRP 
limits necessary to protect in-band and out-of-band receivers? If 
analytical analysis techniques can be employed, explain the methodology 
to be used and all appropriate conditions considered in the analysis, 
including, but not limited to, propagation loss modeling and

[[Page 26737]]

building attenuation modeling. How should the effect of multiple jammer 
transmitters and antennas be taken into consideration? Are there other 
approaches that can be used to regulate jammer systems?
    The impact of jamming signals would also depend on the prison 
environment. Outside of the facility, will the variations in the 
measured levels of the jammer transmitter signal make it difficult to 
distinguish such a signal from the cellular and PCS signals in the 
environment, for example? If so, is this problem exacerbated in areas 
where there is a high density of cellular and PCS signals, such as in 
and around an urban prison location. The variations in the measured 
jammer transmitter signal levels could likely be due to propagation 
effects and building attenuation losses that will be different at each 
facility and for each jammer installation. Furthermore, depending on 
the relative signal levels, it can be difficult to differentiate 
between the measured jammer transmitter signal and the cellular and PCS 
signals. Given variations in signal levels and the potential to 
distinguish the jammer signal from the background signals, is it 
possible to measure accurately the jammer transmitter signal outside of 
a facility?
    Within a facility, is it possible to distribute the jammer 
transmitter power spatially across an array of antennas (or, in some 
cases, lossy cables) in order to better control and provide lower power 
density around individual antennas than could be produced if a single 
antenna were used to radiate a high-power signal? What techniques can 
be employed in the design of the jamming system to reduce the potential 
for interference to in-band and out-of-band receivers? Can restrictions 
be placed on the jammer transmitter antenna height to minimize the 
potential for interference outside of the area that is being jammed? Is 
it possible to employ directional or sector antennas to focus the 
jammer transmitter signal in the intended areas within a facility while 
minimizing the signal levels outside of the facility? Can down tilting 
the antennas be used to minimize the jammer transmitter signal level at 
the horizon? What restrictions can be placed on the antennas without 
impacting the effectiveness of the jamming system?
    Each prison is unique in size, location and structure. Jammer set-
up configurations cannot be applied broadly to all jammer systems in 
all locations. The variations in the jammer transmitter signal levels 
outside of the facility depend on a number of factors such as building 
structures, antenna deployment, and background signals. These factors 
could have an effect on the ability to measure accurately jammer 
transmitter emission levels. Given all of the possible variations in a 
jammer system installation, will operators need to conduct on-site 
compliance measurements at each facility? What techniques should be 
used to measure the emissions of a jammer system? Is it possible to 
accurately measure the jammer transmitter signals in the presence of 
other background signals? How shall an operator, in its request for 
authorization of such equipment, be required to demonstrate that it 
meets any interference protection requirements?
    Do other technologies or approaches have the potential to interfere 
with other authorized radio services within the same bands or adjacent 
bands? If so, under what conditions and how can an operator mitigate 
interference? In some of the bands identified above, public safety 
frequencies are interleaved or operate in close proximity with 
frequencies used by mobile devices, for instance in the 800 MHz SMR and 
700 MHz bands. How will internal and external land mobile systems, 
including systems used by the prisons themselves, as well as other 
public safety operations, be protected? Are there other radio 
communications systems within prisons that could also experience 
interference, such as internal private land mobile systems used by 
prison officials or medical telemetry devices in prison infirmaries? 
\26\
---------------------------------------------------------------------------

    \26\ State governmental entities are eligible to hold 
authorizations for frequencies in the Public Safety Pool to operate 
radio stations for transmission of communications essential to its 
official activities. See 47 CFR 90.20. BOP uses medical telemetry at 
Federal Medical Centers and at some non-medical prisons. 
Additionally, some inmates have devices that are monitored remotely 
by local hospitals.
---------------------------------------------------------------------------

4. Protecting 911 Calls and Authorized Users

    The preservation and protection of calls to 911 from cell phones is 
a paramount concern as more consumers rely on mobile devices.\27\ The 
number of cell phones calling 911 has been steadily increasing as more 
consumers are using them. The National Emergency Number Association 
estimates that wireless telephone users account for nearly half of the 
calls to 911.\28\ Jamming radio signals in and around prisons cannot 
differentiate between normal cell phone traffic and 911 calls.\29\ 
Managed access systems, however, can be selective and designed to 
ignore 911 calls (i.e., letting them connect to the network), and 
detection systems typically use passive devices that do not affect 
transmission or reception. How are 911 calls preserved in areas around 
the prisons where the public is making a call to 911 if they come in 
proximity to the prison? Are there any other technologies identified 
that can protect 911 calls and how do they do so?
---------------------------------------------------------------------------

    \27\ More than one in five households have discontinued wireline 
service (or chosen not to use it) and rely solely on wireless 
communications as their primary telephone service. See Centers for 
Disease Control and Prevention, Wireless Substitution: Early Release 
of Estimates from the National Health Interview Survey, July-Dec. 
2008, May 6, 2009, available at https://www.cdc.gov/nchs/data/nhis/earlyrelease/wireless200905.pdf.
    \28\ National Emergency Number Association, Cell Phones and 911, 
https://www.nena.org/cellular-wireless-911. See also FCC Consumer 
Facts, Wireless 911 Services, available at https://www.fcc.gov/cgb/consumerfacts/wireless911srvc.html. As a case-in-point, there has 
been a sharp increase by residents of Jefferson County, Arkansas 
dialing 911 from cell phones, where there are three State prisons. 
Nearly 70 percent of calls to 911 in 2008 were made from a cell 
phone. See Arkansas Daily-Gazette, Cell Phone Calls Place Burden on 
Ark. 911 Dispatch Center, Mike Linn, Oct. 5, 2009, available at 
https://www.firerescue1.com/fire-products/communications/articles/595629-Cell-phone-calls-place-burden-on-Ark-911-dispatch-center/.
    \29\ However, at some distance away from the prison which is 
unique to each prison's features and jammer set-up, jamming 
contraband cell phone signals should not affect authorized or 911 
calls.
---------------------------------------------------------------------------

    Wireless consumers expect their wireless calls to be completed 
without being dropped or busy. In and around prisons, consumers and 
public safety officials, as authorized users of the system, will expect 
their wireless devices to communicate. How are authorized users allowed 
to make calls with the technologies described? If the caller passes 
through a ``dummy'' cell site set-up within the prison vicinity, will 
the call go through if a call is initiated within that cell (e.g., will 
it result in a busy signal or a dropped call)? Are calls handed off to 
the carrier cell site and network? How does managed access work if the 
caller is an authorized user, but the phone number is not known (i.e., 
in the database of authorized users) to the managed access system?

5. Cost Considerations

    The cost of preventing cell phone use in prisons is a factor that 
must be considered and varies according to the type of technology, area 
to be covered, and additional features. What factors impact the cost of 
implementing each of the technologies as described above? Are there on-
going or recurring costs associated with each? To what extent will 
installation costs vary in light of the particular characteristics of 
each prison (e.g., geographic setting)? What

[[Page 26738]]

characteristics are most likely to affect costs? What are the ancillary 
costs for each type of approach (e.g., maintaining network connectivity 
for managed access systems, resources required to physically locate the 
phone for detection/location systems such as canines, staff time, 
etc.)? Are there typical costs or a range for each, and if so, what are 
they? Is training required for prison staff to properly operate the 
equipment? What staff costs are associated with each technology?

6. Locating Contraband Phones

    In order to completely eradicate contraband cell phone use, the 
cell phone must be physically located and removed, which can be labor-
intensive. Inmates may use them for a short period of time and turn 
them off and then move them, making the devices more difficult to 
locate. Jamming cannot identify the specific location of a contraband 
cell phone. How do managed access and detection technologies locate a 
cell phone caller? What software and hardware is needed? How accurate 
are detection technologies? With the insertion of GPS chip-sets into 
mobile devices, are cell phone locations easily identifiable through 
managed access or are other means necessary (e.g., hardware or 
software)? Do managed access and detection technologies have the 
capability of providing intelligence-gathering information for prison 
officials, and if so, what type of information? What other means are 
necessary to physically locate the phones once a position is known?

7. Regulatory/Legal Issues

    The Communications Act of 1934 established the FCC and set specific 
rules on wireless radio services.\30\ Both the operation of mobile 
wireless devices, and effective means and solutions to deny the use of 
them have regulatory and legal implications. The FCC has primary 
responsibility for regulating spectrum issues for the types of systems 
typically used within the State and local prisons and jails (for 
example, private internal radio communications and commercial systems 
used by prison staff). NTIA, on behalf of the President, authorizes the 
use of the radio frequencies for equipment operated by Federal 
entities, including the BOP.\31\
---------------------------------------------------------------------------

    \30\ For example, cellular service rules are set forth in 47 CFR 
parts 1 and 22; AWS in 47 CFR part 27; and SMR in 47 CFR part 90.
    \31\ See generally, NTIA Manual of Regulations and Procedures 
for Federal Radio Frequency Management, Sept. 2009, Section 1, 
available at https://www.ntia.doc.gov/osmhome/redbook/1.pdf.
---------------------------------------------------------------------------

    While the Communications Act prevents the FCC from authorizing 
jamming or other acts of intentional interference to the radio 
communications of authorized stations, those same provisions do not 
apply to the Federal government itself. Therefore, NTIA is not limited 
in its authority to permit jamming at Federal prison facilities. We 
seek comment on State/local or Federal laws, rules, or policies that 
need clarification or that may hinder deployment of any of these 
technologies or others that may be raised by commenters. These might 
include not only radio regulatory issues, such as the approval 
necessary to operate or conduct experimentation and demonstration, but 
also ancillary issues such as the privacy and legal implications of 
trap-and-trace technologies? What agreements, agency relationships, or 
licensing requirements between the prison, service provider, and access 
provider would be required for temporary or experimental demonstration 
or for permanent operation?

8. Technical Issues

    The identification of technical issues is another factor in 
investigating and evaluating contraband cell phone use in prisons. Are 
there any technical issues to be considered for the technologies 
identified above? For example, the actual range of a jammer depends on 
its power, antenna orientation, and the local environment (size and 
shape), which may include hills or walls of a building (that could be 
made of a variety of materials) that block the jamming signal. How 
accurate are the location technologies? Does each site need specific RF 
engineering for each of the approaches? How do the technologies allow 
authorized users, including 911 calls, to be protected? How are 
different modulation schemes or channel access methods (for example, 
Global System for Mobile Communications--GSM, or Code Division Multiple 
Access--CDMA) handled for each category and does the solutions depend 
on the type of access method that the wireless carrier is using?
    Text-messaging continues to increase as a form of communication 
from hand-held wireless devices.\32\ Wireless hand-held devices in the 
possession of prison inmates afford them this option as an alternative 
to talking. Is there a need to differentiate between voice and data, 
such as text messages, and are the technologies discussed above 
effective against data use by prison inmates? Does shorter air-time use 
from text messaging present problems with detection and/or capturing 
the call and ultimately locating the phone? Will the technologies 
identified above be effective against high-speed, high-capacity data 
formats, such as Long Term Evolution (LTE) for devices that are 
expected to operate in the 700 MHz band?
---------------------------------------------------------------------------

    \32\ CTIA estimates that the number of monthly text messages 
sent increased from 9.8 billion in December 2005 to 152.7 billion in 
December of 2009. Supra note 2. See also CNet News, U.S. Text Usage 
Hits Record Despite Price Increases, Marguerite Reardon, Sept. 10, 
2008, available at https://news.cnet.com/8301-1035_3-10038634-94.html.
---------------------------------------------------------------------------

    Please note that all comments received will be posted on NTIA's Web 
site. Commenters that submit any business confidential or proprietary 
information in response to this notice should clearly mark such 
information appropriately. Commenters should also submit a version of 
their comments that can be publicly posted on NTIA's Web site.

    Dated: May 7, 2010.
Kathy D. Smith,
Chief Counsel.
[FR Doc. 2010-11350 Filed 5-11-10; 8:45 am]
BILLING CODE 3510-60-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.