Role of Predictive Analytics in Border Security
148
![]() 247
![]() 42
![]() |
Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from passengers and cargo that enters the country. LineSight software was developed by Unisys, which uses advanced analytics and assesses risks in near real time.
Apart from relying on pattern recognition based on historical data, LineSight assesses risk from initial intent to travel and refines the assessment as current information is available –from a traveler’s visa application to reservation, ticket purchase, seat selection, check-ins and arrivals. LineSight provides similar risk assessment for cargo shipments based on patent forms, customs declaration, or airline bills.
“Once the border agencies rely on patterns to spot and fix border threats, the smugglers and terrorists become smarter on how to avoid the patterns,” says Mark Forman, global head of Unisys Public Sector. “It became clear very recently that statistical methods and analytical tools would be a better approach than trying to consolidate watch lists to find patterns,” adds Forman.
John Kendall, director of border security programs at Unisys says, “Today the approach being used by most border agencies is fairly inaccurate, and they are finding out that up to 90 percent of the travelers that they stop to inspect turn out to be false positives”. He also says that Unisys is trying to get that percentage down by using machine learning and predictive analytics.
LineSight generates risk assessments in less than two seconds by processing multiple high-volume transaction streams which helps the border guards and forces to take faster and quicker decisions while crossing the border. The solution first determines if a shipment or traveler matches any of the watch lists from the US and other global agencies like Interpol. Thereafter, it makes a deep threat assessment by using threat analysis in finding irregularities in the data collected about the cargo or passenger.
Read Also
Featured Vendor
EveryCloud Technologies: Delivering Powerful Email Filtering Services" title="Graham O'Reilly, CEO & Co-Founder" style="float:left; margin-right:10px; margin-bottom:20px;" width="60px" height="50px">
EveryCloud Technologies: Delivering Powerful Email Filtering Services
Onepath: A Responsive Info-Security Management Framework – the easier way to dramatically improve your overall info-security posture
Covenant Security Solutions, Inc.: Revolutionary Solutions to Mitigate Security and Compliance Risks
EDITOR'S PICK
Leverage The Customer's Personal Mobile Interaction Point
By Debra Jensen, CIO, Charlotte Russe
Use Technology to Understand Customer Better
By Phil Jordan, CIO, Telefonica
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
IT Competing in a Segmented Marketplace
By Sven Gerjets, SVP-IT, DIRECTV
Fueling Your Business through Insights- Driven...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
The Next 10 Years in Wireless: A Vision for Enterprise...
By Mike Fitton, Wireless Business Unit Director, Altera
Leveraging Cloud and Big Data to Enable Mobile Work...
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
Cisco Stakes Its Claim on the Data Center -Even Your...
By Michael Watkins, Senior Product Director, Global Knowledge
Cloud Computing- Revolutionizing the Education Industry
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
4Must-Have Technologies for Metals & Mining
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
Optimized Customer Experience through Technology
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
Your Next Transportation Management System: TMS 2.0
By Mike Dieter, CTO, Transplace
Connecting People and Technology to Deliver the Best...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
The Exchanges Sector Need to Evolve Technologically
By Kevin Kometer, CIO, CME Group
You better watch out, You better not pout, IOT is...
By John Landwehr, Public Sector CTO, Adobe
Four Cybersecurity Weak Spots You Should Care About When...
By Marc Probst, CIO & VP, Intermountain Healthcare
Change Agents in a Digital Healthcare World: People,...
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
Revolutionizing Industrial Mining through Smart Tools
By Jeff Bauserman, VP-Information Systems & Technology,...