New Technology To Really Close The US / Mexican Border

President Trump’s new executive orders to extend walls along the US-Mexico border and deport undocumented individuals may have a popular appeal, but achieving real border security will likely take longer than many Trump supporters hope.

“We’re not ready to do it yet,” said one US Customs and Border Protection, (CBP) official told Defense One on condition of anonymity at the 11th annual Biometrics for Government and Law Enforcement Summit. “I think it will take years.”

Even CBP officials who spoke on the record said challenges to fully securing the border and identifying undocumented aliens will extend well beyond the construction of a wall.

Right now, CBP catches 85 to 95 percent of undocumented people crossing the border, according to Antonio Trindad, CBP’s director of enforcement systems.

Simply keeping records on people who cross the border illegally is in many ways far more useful for law enforcement than walls that can be tunneled under or, perhaps, bypassed with false credentials. That’s because walls treat every migrant the same, when in fact many people who enter illegally do so repeatedly, according to Trindad.

Crossing the border under difficult conditions, in secret and under cover of night, often requires a guide. In his address at the summit, Trindad said that focusing on guides can dramatically reduce illegal crossings.

The push now to is to collect photographic data, rapidly process it, and send it to officers who can apprehend people.

But it’s no simple task for a variety of reasons.

“We have some challenges collecting photos,” said Trindad. The number of cameras currently stationed on the border, including some that collect near-infrared imagery, number “in the hundreds,” he said.

But age, pose, illumination and expression, what technologists in the field refer to as the A-PIE problem, constrains how well the computers can recognise faces.

The intelligence community, through the Intelligence Advanced Research Projects Agency, or IARPA, also has a facial recognition program. Called Janus, it promises dramatically better recognition, especially where visual conditions are less than ideal, the resolution is low, the person is not staring at the camera, or A-PIE challenges are particularly severe.

Janus is currently producing fewer than .01% false positives. But while even a one percent false positive rate for a system that’s presiding over a barren stretch of desert might not be a small problem, it’s still too high for use in environments, like airport security, where pulling aside even a small percentage of the wrong people can produce huge delays and subject a lot of innocent people to useless screening, said Christopher Boehnen, an IARPA program manager.

The Janus program, which is currently in phase two, won’t be ready for deployment until mid-2018. (IARPA just produces the software; it’s up to agencies to deploy it.)

Trindad said that CBP is working with Carnegie Mellon and other institutions on software to do image recognition from 7 miles away. But that, too, is an effort that is in its infancy.

Today, CPB has three mobile processing centers, basically large trailers, where officers can collect biometric data on people and transmit the data via a satellite link to a larger CPB headquarters and facilities.

“They are right now in Texas and Arizona and being used quite a bit,” Trindad said.

Some officers are also using mobile biometric identification kits, essentially little suitcases for collecting and processing facial, iris, and fingerprint data. Others also use a handheld device called Secure Electronic Enrollment Kit, or SEEK, first used by the military, for iris capture.

Cool gadgets all, but Trindad says the bigger problem isn’t lack of equipment, or lack of a wall, but bandwidth and connectivity.

“On the Southwest border, if you look at the Verizon or AT&T map, it’s covered. But we’re in canyons. Mountains block things. It’s small areas we have to worry about not being covered,” he said. Connectivity in some areas along the border remains an issue, one that a wall won’t fix.

DefenseOne:    

 Anti-Surveillance Clothing Thwarts Facial Recognition:    

US Cybersecurity Strategy In The Trump Era:    New US Biometric Passport Regulations Will Prevent Entry To Millions:

 

« True Extent Of UK Cybercrime & Fraud Revealed
Spanish Police Arrest Banking Malware Suspect »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.