Role of Predictive Analytics in Border Security
Border security has been a top priority for most countries since the deadly terror strikes such as 9/11 and 26/11 took the world by storm. The border patrol agencies and the coastguards around the world stay on high alert and assess threats from passengers and cargo that enters the country. LineSight software was developed by Unisys, which uses advanced analytics and assesses risks in near real time.
Apart from relying on pattern recognition based on historical data, LineSight assesses risk from initial intent to travel and refines the assessment as current information is available –from a traveler’s visa application to reservation, ticket purchase, seat selection, check-ins and arrivals. LineSight provides similar risk assessment for cargo shipments based on patent forms, customs declaration, or airline bills.
“Once the border agencies rely on patterns to spot and fix border threats, the smugglers and terrorists become smarter on how to avoid the patterns,” says Mark Forman, global head of Unisys Public Sector. “It became clear very recently that statistical methods and analytical tools would be a better approach than trying to consolidate watch lists to find patterns,” adds Forman.
John Kendall, director of border security programs at Unisys says, “Today the approach being used by most border agencies is fairly inaccurate, and they are finding out that up to 90 percent of the travelers that they stop to inspect turn out to be false positives”. He also says that Unisys is trying to get that percentage down by using machine learning and predictive analytics.
LineSight generates risk assessments in less than two seconds by processing multiple high-volume transaction streams which helps the border guards and forces to take faster and quicker decisions while crossing the border. The solution first determines if a shipment or traveler matches any of the watch lists from the US and other global agencies like Interpol. Thereafter, it makes a deep threat assessment by using threat analysis in finding irregularities in the data collected about the cargo or passenger.
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...