Closing the Loop

Border control, commercial security industry share challenges and solutions

THE security industry has a long and proud history of working side by side with the government to develop new technologies that result in an improved way of life for Americans. While commercial security products and practices have deep affiliation with both government applications, military and non-military, a new breed of security concerns gave birth to new security requirements and solutions–especially those pertaining to border control.

With more than 185 major airports, 22 major seaports, 7,000 miles of land border and 95,000 miles of shoreline, the United States is a large, vulnerable and porous country. Recent immigration, security and terrorism threats have provoked an unprecedented need for cooperation between private industry and multiple government agencies in to develop and deploy new security technologies that better monitor and alert officials to potential threats along U.S. borders.

In 2006, the Department of Homeland Security received proposals from a number many U.S. government and defense contractors to develop solutions to help protect the country’s borders. The multi-million-dollar proposals submitted included the design, development, system integration, deployment, management and support of what the current U.S. administration calls a "virtual fence" along the nation's land borders.

Sharing Technologies
In addition to assisting government agencies with border control programs, private entities are adopting many military technologies for commercial use. While many security innovations, such as facial recognition, pattern recognition, access control and digital video surveillance, may have debuted in government settings, the technologies also have made their way into everyday life.

Video surveillance has a long history of being very beneficial, starting with the world's first application of close-circuit television during World War II. Military personnel used CCTV technology to monitor testing of the V-2 missile, the first manmade object launched into space. Since then, CCTV has become a security staple in most government installations and applications, including border control. By the 1960s, video surveillance was commercialized and emerged in business and residential environments.

Similar to video surveillance, access control technology also can trace its roots back to the military. It was first designed in the 1960s, specifically for defense use. Physical access control technology has now migrated from military environments to commercial settings. Physical access control systems are now as common in government facilities and military bases as in hospitals, corporate offices, casinos and shopping malls.

While modern video surveillance and access control technologies are much more sophisticated and capable than early ancestors, both remain a mainstay in public and private sector security applications. This is especially true in some of the busiest border crossings in the world.

Supporting Security Investments
In the last decade, despite spending hundreds of millions of dollars, the government's track record has been less than perfect for successfully deploying cutting-edge technology to monitor and protect U.S. borders. Nearly half of video cameras ordered for border control in the late 1990s did not work or were not installed because of poor contract oversight, according to a May 2006 New York Times article. Ground sensors installed along the border frequently sounded false alarms, and communication networks often would not operate for days at a time. Because of the technology and contractor issues, Customs and Border Patrol agents would spend countless hours responding to what turned out to be wild animals, passing trains or other benign nuisances.

So why continue to invest in video surveillance at border access points? The private and public sectors now are working together to create new, more-effective solutions. In fact, recent security advances in the government and commercial sectors are proving to be good investments. Both settings are using an integrated combination of video surveillance and access control, leading to positive results.

Together, video surveillance and access control technologies continue to be the engines that drive most sophisticated and powerful security solutions. When integrated properly, effectively deter and help prevent economic loss while creating safer environments. From border access points and government installations to educational institutions and crowded shopping malls, security tools give officials comfort in knowing electronic physical security technology is in force, monitoring activity, tracking assets, alerting of potential threats and generally protecting people and property.

On any given day in 2005, the CBP used modern security technologies and practices to process 1.2 million travelers, half of whom were aliens; make 60 arrests at ports of entry; apprehend more than 3,000 illegal immigrants; seize 2,000 pounds of narcotics.

The retail industry also relies on security technology to help counteract staggering loss and theft. A few statistics highlight the magnitude of the issue:

• More than $46 billion in goods are stolen annually by shoppers, employees and organized theft rings.

• Nearly $750,000 of a million shoppers and employees were arrested for theft in 2004.

• An average employee theft case is valued at $725.

• Shoplifting is so prevalent that offenders are only caught once every 48 times they steal, according to the National Association for Shoplifting Prevention.

Building from the Ground Up
Through the Secure Border Initiative, the Bush administration has asked private sector defense contractors to devise and build a new border security solution. This approach is a 180-degree change from simply purchasing and installing an array of high-tech equipment—an expensive tactic that has yielded limited success in the past. SBI is lauded as the most significant and industrious effort to control the nation’s borders by the Department of Homeland Security. Learning from past mistakes, SBI is a fresh start in leveraging the combination of technology, infrastructure and manpower to safeguard U.S. borders.

The success of SBI is dependent upon engaging proven security contractors to provide solutions that integrate the expertise, technology and information of both private and government sectors. The winning contract will include some of the same sophisticated security tools already used in U.S. military overseas operations and installations such as motion detection video equipment and ground surveillance systems. The technology should significantly improve the CBP’s ability to effectively monitor the vast areas that separate Mexico and Canada from the United States.

SBI will breed a variety of integrated security technologies necessary to prevent illegal land border crossings and activities. These technologies will include systems, tools and peripherals that have been used successfully by the military: high-tech fences, new patrol roads, access control systems, movable barriers in rural areas, motion sensors, infrared cameras, several varieties of video surveillance or even unmanned aerial vehicles.

Homeland Security Secretary Michael Chertoff said interoperability of technologies used to secure U.S. borders will be the major theme this year. Full integration of all security systems, technologies and practices used by each U.S. government agency will result in better surveillance, tighter controls and comprehensive data collection, storage and sharing. Ultimately, this will lead to a higher level of security at—and within—American borders.

Integration and Cooperation
Integration and interoperability are as critical in the commercial arena as in the government and military sector. From the most simplistic technical perspective, seamless system integration is necessary to maintain tight security. If motion sensors or access control systems do not trigger video monitors, there is a breakdown in overall security.

Even in some of the most competitive industries, the commercial sector has realized the value of sharing information. For example, casinoes track and document suspicious people, and to survive as an industry, it must share data with other casinoes. They use facial recognition technology to capture, archive and share the images of suspected or known scammers in order to collectively protect properties, guests and assets from theft and other threats. In addition to tracking facial identities, casinoes also monitor financial records, hotel reservations, behaviors and gambling patterns to proactively identify, document and report suspicious trends.

In terms of the government sector, the United States has several existing means to protect and secure the country: physical barriers, manpower and technology. However, effective border protection also necessitates development and use of business processes and standardized policies and protocols, allowing for consistency and the seamless exchange of information. Successful security initiatives at borders require a combination of the factors.

To accomplish goals of the SBI, the government and security system manufacturers around the world will need to cooperate like never before. Only through a collective vision, common goals and spirit of cooperation will all parties be able to provide all U.S. national security agents, including those on land, air and sea, with the tools to successfully prevent illegal entry and exit of people and contraband through American borders. This should include nationwide information sharing, credentialing, identity management and biometrics, as well as the ability to conduct rapid searches and identification on suspicious and detained individuals.

Opportunities Abound
The multi-billion-dollar SBI contract, along with numerous DHS grants funded by port and transportation security contracts, will keep the security industry’s top manufacturers, dealers and integrators busy for years to come. While the work can be attributed to the unfortunate risks and threats that the nation must face in today’s environment, including the indefatigable flow of immigrants and mounting terrorist threats, the significant majority of work will result from the priority on interoperability and convergence among technologies.

With this in mind, the focus will be on building scalable, interoperable and fully integrated security solutions. It will not be enough to introduce standalone technology—no matter how cutting-edge it might be—if it is not compatible with other security components and systems involved in the initiative. The SBI contract also creates huge opportunities for information technology and networking integrators needed to ensure systems are communicating with one another; put systems in place for proper data storage and archiving; and ensure government agencies can quickly and effectively add, update and share data.

In September 2006, Boeing Corp. won the award to assist CBP with providing the most appropriate and effective security solutions tailored to each border environment. Under that contract, Boeing is accountable to drive new standards for security system integration, public-private industry cooperation and technological innovation.

Border control solutions will likely use technology, including sensors, thermal imagery, remote cameras, improved communications or other technologies, along with new or improved infrastructure such as roads, bridges, fences and lighting, depending on the needs of the entry location. The agency’s holistic expectation is that its border control personnel will be able to identify a person or item at entry, readily classify its threat, provide a means to efficiently respond to the entry, and bring the entry, expediently to the appropriate law enforcement resolution.

With security risks mounting and a collective commitment to improve border control efficiency and effectiveness, SBI will be an ideal platform for all security manufacturers, dealers and integrators to potentially impact change in industry practices and foster innovation in both public and private sectors.

Featured

  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX
  • How Much Carbon is Your Footprint Leaving?

    A more sustainable future is not only shared responsibility, it is increasingly critical. Securitas, is inviting clients and industry partners to make a difference in an ever-evolving world that faces diverse sustainability challenges. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3