Greater than a wall: Building border security technology

INDUSTRY INSIGHT

Greater than a wall: Building border security technology

The recent U.S. election cycle has intensified the already significant pressure to address border protection and illegal immigration, with similar movements crystallizing in Europe. Some of the impetus is opportunistic nationalism, but concerns about vulnerable borders have been building for years as rapid globalization highlights the need for stronger controls.

From political pontifications to the stark realities of a global refugee crisis as well as unprecedented human displacement because of global changes in weather, protecting national boundaries and securing ports of entry has become a top priority for many governments. Given the current spotlight on national security and immigration, there will be a significant push for measurable progress on border security in 2017.

The impracticality of physical barricades

With 328 ports of entry, more than 7,000 miles of borderlands and 95,000 miles of shoreline, the United States cannot rely on physical barricades and security checkpoints alone. Customs and Border Protection  is tasked not only with catching criminals, contraband and unauthorized entry but also with enabling the movement of lawful travelers and goods in and out of the country. U.S. citizens who commute across the northern and southern borders for work and school wait in line for hours. It’s not a simple matter of building barricades, but a complex one of efficiently sorting through massive haystacks to find dangerous needles.

We probably won’t see “the wall” being built along the Mexican border in 2017, but the passions that inspired the idea won’t dissipate overnight. The most effective measures the U.S. government could take depend on biometric data capture, ID verification and algorithmic intelligence technologies.  Mobilizing these technologies in border environments will enhance the coverage, responsiveness and flexibility of field operations. As biometric identity verification becomes more reliable and widespread, mobile devices and self-service kiosks in airports and customs checkpoints will enable more thorough screenings in less time. 

While it is nearly impossible to physically secure the thousands of miles of borders and shoreline, the power of big data enables us to weave a tighter virtual web: reducing identity fraud, tracking visas and detecting threat patterns through advanced analytics. Disseminating and interconnecting border control technology solutions nationally and internationally will streamline and harmonize processes for lawful travelers and businesses while leaving fewer systemic gaps for bad actors to exploit. 

Sophisticated security at ports of entry

According to studies by the Center for Risk and Economic Analysis of Terrorism Events, airport wait times have increased dramatically in recent years, negatively impacting the economy. CREATE estimates that adding just one CBP agent to each of 33 airports could increase the gross domestic product by $61.8 million and create more than 1,000 jobs.

An increase in security personnel at airports and checkpoints would certainly help, but technology solutions are rightly viewed as a powerful force multiplier. The less time required for the tedium of inspecting documents, the more security agents are free to focus on suspicious activity and behavioral indicators. Data capture is relatively frictionless and more comprehensive, accurate and immediate with chip-and-scan technology. 

Programs like e-Passports, online visa applications and customs declarations apps are already making a difference. The next steps include:

  • Promoting more widespread adoption of e-Passport, e-Visa and trusted traveler programs.
  • Holding employers accountable for the legal status of their workers via e-Verify.
  • Streamlining security checkpoints at borders and airports.
  • Bringing U.S. programs into alignment with international standards  developed by the International Civil Aviation Organization, the United Nations agency that works with member states and the civil aviation sector to support safe, efficient air travel around the globe. 

In an effort to foster the success of such programs, government agencies like CBP and the Transportation Security Administration must not delay in coordinating their efforts and widely deploying the identity capture and verification technology available today, including self-service kiosks, biometric scanners and radio-frequency ID passport scanners. 

To get the most out of identity capture and verification solutions, the databases containing relevant information must become better integrated. E-Passports can be strengthened by cross-border chip certification. Interpol, the Department of Homeland Security, FBI, CBP, Coast Guard, TSA and state law enforcement agencies all compile records and track patterns of illicit activity.  Without comprehensive intelligence sharing and reliable data integration across agencies, there will always be gaps in border security. With tighter integration, security agencies can produce predictive and prescriptive algorithmic intelligence that will help them prevent attacks, respond quickly and accurately to threats, deploy resources to hot spots and deter systemic abuse of visas. 

The challenge of tracking visitor departures

Using ID verification technology to authorize visitors coming into the country is the solution to one side of the issue, but one of the most pervasive immigration problems is visa overstays -- visitors who travel to the United States legally but “disappear” on arrival, staying well past their visa expiration dates (often indefinitely). According to DHS, more than half a million people overstayed their visas in 2015 alone. Various estimates claim that overstays make up a third or more of the 10-20 million people illegally residing in the country.

While incoming visitors are verified at point of entry, tracking their departures is much more complicated, leading  to low enforcement of overstay violations and, thus, minimal deterrence. If issued visas are “stamped” onto the e-Passport chips and integrated with exit biometrics, enforcement of overstays becomes more automated, fewer visitors will risk travel sanctions and DHS will be better able to track the entry and exit of high-risk individuals. 

The challenge of visa overstays is one of many faced by the network of agencies tasked with border security. Factors such as gaps in regulations, inconsistent handling of lost and stolen passports, a complex visa system, a controversial influx of refugees and asylum seekers and the growing masses of people and goods entering the United States from around the globe all strain the government systems charged with protecting the country. Legitimate businesses, travelers and economic systems are negatively impacted by the resulting inefficiencies. 

I hope that the recent intense (if often misplaced) focus on borders and immigration will push the next administration to take action on long-promised initiatives to deploy advanced identity capture and verification technology and data-based intelligence solutions across all points of entry, moving us forward and closer to where we need to be in the new economy. 

inside gcn

  • Millions of formerly secret CIA documents available online (Photo by ShutterStock)

    Millions of formerly secret CIA documents available online

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group