via WordPress ift.tt/2h6PBTj
Greater than a wall: Building border security technology – GCN.com
Greater than a wall: Building border security technology
By Stephen Maloney
Dec 09, 2016
The recent U.S. election cycle has intensified the already significant pressure to address border protection and illegal immigration, with similar movements crystallizing in Europe. Some of the impetus is opportunistic nationalism, but concerns about vulnerable borders have been building for years as rapid globalization highlights the need for stronger controls.
From political pontifications to the stark realities of a global refugee crisis as well as unprecedented human displacement because of global changes in weather, protecting national boundaries and securing ports of entry has become a top priority for many governments. Given the current spotlight on national security and immigration, there will be a significant push for measurable progress on border security in 2017.
The impracticality of physical barricades
With 328 ports of entry, more than 7,000 miles of borderlands and 95,000 miles of shoreline, the United States cannot rely on physical barricades and security checkpoints alone. Customs and Border Protection is tasked not only with catching criminals, contraband and unauthorized entry but also with enabling the movement of lawful travelers and goods in and out of the country. U.S. citizens who commute across the northern and southern borders for work and school wait in line for hours. It’s not a simple matter of building barricades, but a complex one of efficiently sorting through massive haystacks to find dangerous needles.
We probably won’t see “the wall” being built along the Mexican border in 2017, but the passions that inspired the idea won’t dissipate overnight. The most effective measures the U.S. government could take depend on biometric data capture, ID verification and algorithmic intelligence technologies. Mobilizing these technologies in border environments will enhance the coverage, responsiveness and flexibility of field operations. As biometric identity verification becomes more reliable and widespread, mobile devices and self-service kiosks in airports and customs checkpoints will enable more thorough screenings in less time.
While it is nearly impossible to physically secure the thousands of miles of borders and shoreline, the power of big data enables us to weave a tighter virtual web: reducing identity fraud, tracking visas and detecting threat patterns through advanced analytics. Disseminating and interconnecting border control technology solutions nationally and internationally will streamline and harmonize processes for lawful travelers and businesses while leaving fewer systemic gaps for bad actors to exploit.
Sophisticated security at ports of entry
According to studies by the Center for Risk and Economic Analysis of Terrorism Events, airport wait times have increased dramatically in recent years, negatively impacting the economy. CREATE estimates that adding just one CBP agent to each of 33 airports could increase the gross domestic product by $61.8 million and create more than 1,000 jobs.
An increase in security personnel at airports and checkpoints would certainly help, but technology solutions are rightly viewed as a powerful force multiplier. The less time required for the tedium of inspecting documents, the more security agents are free to focus on suspicious activity and behavioral indicators. Data capture is relatively frictionless and more comprehensive, accurate and immediate with chip-and-scan technology.
Programs like e-Passports, online visa applications and customs declarations apps are already making a difference. The next steps include:
Promoting more widespread adoption of e-Passport, e-Visa and trusted traveler programs.
Holding employers accountable for the legal status of their workers via e-Verify.
Streamlining security checkpoints at borders and airports.
Bringing U.S. programs into alignment with international standards developed by the International Civil Aviation Organization, the United Nations agency that works with member states and the civil aviation sector to support safe, efficient air travel around the globe.
In an effort to foster the success of such programs, government agencies like CBP and the Transportation Security Administration must not delay in coordinating their efforts and widely deploying the identity capture and verification technology available today, including self-service kiosks, biometric scanners and radio-frequency ID passport scanners.
To get the most out of identity capture and verification solutions, the databases containing relevant information must become better integrated. E-Passports can be strengthened by cross-border chip certification. Interpol, the Department of Homeland Security, FBI, CBP, Coast Guard, TSA and state law enforcement agencies all compile records and track patterns of illicit activity. Without comprehensive intelligence sharing and reliable data integration across agencies, there will always be gaps in border security. With tighter integration, security agencies can produce predictive and prescriptive algorithmic intelligence that will help them prevent attacks, respond quickly and accurately to threats, deploy resources to hot spots and deter systemic abuse of visas.
The challenge of tracking visitor departures
Using ID verification technology to authorize visitors coming into the country is the solution to one side of the issue, but one of the most pervasive immigration problems is visa overstays — visitors who travel to the United States legally but “disappear” on arrival, staying well past their visa expiration dates (often indefinitely). According to DHS, more than half a million people overstayed their visas in 2015 alone. Various estimates claim that overstays make up a third or more of the 10-20 million people illegally residing in the country.
Let’s block ads! (Why?)
For additional technology articles, visit my site: Through The Eyes of Geek
The post Greater than a wall: Building border security technology – GCN.com appeared first on Through the Eyes of Geek.
View my site: Through The Eyes of Geek