New Technology To Really Close The US / Mexican Border

President Trump’s new executive orders to extend walls along the US-Mexico border and deport undocumented individuals may have a popular appeal, but achieving real border security will likely take longer than many Trump supporters hope.

“We’re not ready to do it yet,” said one US Customs and Border Protection, (CBP) official told Defense One on condition of anonymity at the 11th annual Biometrics for Government and Law Enforcement Summit. “I think it will take years.”

Even CBP officials who spoke on the record said challenges to fully securing the border and identifying undocumented aliens will extend well beyond the construction of a wall.

Right now, CBP catches 85 to 95 percent of undocumented people crossing the border, according to Antonio Trindad, CBP’s director of enforcement systems.

Simply keeping records on people who cross the border illegally is in many ways far more useful for law enforcement than walls that can be tunneled under or, perhaps, bypassed with false credentials. That’s because walls treat every migrant the same, when in fact many people who enter illegally do so repeatedly, according to Trindad.

Crossing the border under difficult conditions, in secret and under cover of night, often requires a guide. In his address at the summit, Trindad said that focusing on guides can dramatically reduce illegal crossings.

The push now to is to collect photographic data, rapidly process it, and send it to officers who can apprehend people.

But it’s no simple task for a variety of reasons.

“We have some challenges collecting photos,” said Trindad. The number of cameras currently stationed on the border, including some that collect near-infrared imagery, number “in the hundreds,” he said.

But age, pose, illumination and expression, what technologists in the field refer to as the A-PIE problem, constrains how well the computers can recognise faces.

The intelligence community, through the Intelligence Advanced Research Projects Agency, or IARPA, also has a facial recognition program. Called Janus, it promises dramatically better recognition, especially where visual conditions are less than ideal, the resolution is low, the person is not staring at the camera, or A-PIE challenges are particularly severe.

Janus is currently producing fewer than .01% false positives. But while even a one percent false positive rate for a system that’s presiding over a barren stretch of desert might not be a small problem, it’s still too high for use in environments, like airport security, where pulling aside even a small percentage of the wrong people can produce huge delays and subject a lot of innocent people to useless screening, said Christopher Boehnen, an IARPA program manager.

The Janus program, which is currently in phase two, won’t be ready for deployment until mid-2018. (IARPA just produces the software; it’s up to agencies to deploy it.)

Trindad said that CBP is working with Carnegie Mellon and other institutions on software to do image recognition from 7 miles away. But that, too, is an effort that is in its infancy.

Today, CPB has three mobile processing centers, basically large trailers, where officers can collect biometric data on people and transmit the data via a satellite link to a larger CPB headquarters and facilities.

“They are right now in Texas and Arizona and being used quite a bit,” Trindad said.

Some officers are also using mobile biometric identification kits, essentially little suitcases for collecting and processing facial, iris, and fingerprint data. Others also use a handheld device called Secure Electronic Enrollment Kit, or SEEK, first used by the military, for iris capture.

Cool gadgets all, but Trindad says the bigger problem isn’t lack of equipment, or lack of a wall, but bandwidth and connectivity.

“On the Southwest border, if you look at the Verizon or AT&T map, it’s covered. But we’re in canyons. Mountains block things. It’s small areas we have to worry about not being covered,” he said. Connectivity in some areas along the border remains an issue, one that a wall won’t fix.

DefenseOne:    

 Anti-Surveillance Clothing Thwarts Facial Recognition:    

US Cybersecurity Strategy In The Trump Era:    New US Biometric Passport Regulations Will Prevent Entry To Millions:

 

« True Extent Of UK Cybercrime & Fraud Revealed
Spanish Police Arrest Banking Malware Suspect »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.