Role of Predictive Analytics in Border Security
Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from passengers and cargo that enters the country. LineSight software was developed by Unisys, which uses advanced analytics and assesses risks in near real time.
Apart from relying on pattern recognition based on historical data, LineSight assesses risk from initial intent to travel and refines the assessment as current information is available –from a traveler’s visa application to reservation, ticket purchase, seat selection, check-ins and arrivals. LineSight provides similar risk assessment for cargo shipments based on patent forms, customs declaration, or airline bills.
“Once the border agencies rely on patterns to spot and fix border threats, the smugglers and terrorists become smarter on how to avoid the patterns,” says Mark Forman, global head of Unisys Public Sector. “It became clear very recently that statistical methods and analytical tools would be a better approach than trying to consolidate watch lists to find patterns,” adds Forman.
John Kendall, director of border security programs at Unisys says, “Today the approach being used by most border agencies is fairly inaccurate, and they are finding out that up to 90 percent of the travelers that they stop to inspect turn out to be false positives”. He also says that Unisys is trying to get that percentage down by using machine learning and predictive analytics.
LineSight generates risk assessments in less than two seconds by processing multiple high-volume transaction streams which helps the border guards and forces to take faster and quicker decisions while crossing the border. The solution first determines if a shipment or traveler matches any of the watch lists from the US and other global agencies like Interpol. Thereafter, it makes a deep threat assessment by using threat analysis in finding irregularities in the data collected about the cargo or passenger.
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sergey Cherkasov, CIO, PhosAgro
By Pascal Becotte, MD-Global Supply Chain Practice for the...
By Stephen Caulfield, Executive Director, Global Field...
By Shamim Mohammad, SVP & CIO, CarMax
By Ronald Seymore, Managing Director, Enterprise Performance...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
By Jim Whitehurst, CEO, Red Hat
By Clark Golestani, EVP and CIO, Merck
By Scott Craig, Vice President of Product Marketing, Lexmark...
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
By Amit Bahree, Executive, Global Technology and Innovation,...
By Greg Tacchetti, CIO, State Auto Insurance