Role of Predictive Analytics in Border Security
Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from passengers and cargo that enters the country. LineSight software was developed by Unisys, which uses advanced analytics and assesses risks in near real time.
Apart from relying on pattern recognition based on historical data, LineSight assesses risk from initial intent to travel and refines the assessment as current information is available –from a traveler’s visa application to reservation, ticket purchase, seat selection, check-ins and arrivals. LineSight provides similar risk assessment for cargo shipments based on patent forms, customs declaration, or airline bills.
“Once the border agencies rely on patterns to spot and fix border threats, the smugglers and terrorists become smarter on how to avoid the patterns,” says Mark Forman, global head of Unisys Public Sector. “It became clear very recently that statistical methods and analytical tools would be a better approach than trying to consolidate watch lists to find patterns,” adds Forman.
John Kendall, director of border security programs at Unisys says, “Today the approach being used by most border agencies is fairly inaccurate, and they are finding out that up to 90 percent of the travelers that they stop to inspect turn out to be false positives”. He also says that Unisys is trying to get that percentage down by using machine learning and predictive analytics.
LineSight generates risk assessments in less than two seconds by processing multiple high-volume transaction streams which helps the border guards and forces to take faster and quicker decisions while crossing the border. The solution first determines if a shipment or traveler matches any of the watch lists from the US and other global agencies like Interpol. Thereafter, it makes a deep threat assessment by using threat analysis in finding irregularities in the data collected about the cargo or passenger.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment