By 2020 US Immigration Will Be Digitised

Military lawyers are headed to the US-Mexico border to help with a daunting task: reducing the enormous backlog of immigration cases that are clogging the system and contributing to the chaotic situation there.  The  US Army Judge Advocate General's Corps (JAGs) won’t have much in the way of information technology to help them; the US Citizenship and Immigration Services is just starting a two-year effort to digitize its records.

Recent estimates put the backlog at more than 700,000 cases; it takes an average of more than 600 days to have a case read by one of 312 specialised judges.The US Defense Department has recently announced that it would send 21 military lawyers to see what they could do to help.

During the Obama administration, immigrants who weren’t considered priorities for deportation were often granted stays of a year for agreeing to show up before an immigration judge. President Trump changed that soon after taking office, issuing an executive order that made it easier to deport virtually anyone living in the country illegally. 

With that order, Trump turned misdemeanors, crossing illegally into the United States for the first time is a misdemeanor offense, into crimes worthy of deportation. That overwhelmed the system and the backlog started to grow.

Digitising immigration is one of the “top priorities” of USCIS, said Robert Brown, a developer in the agency’s infrastructure enterprise division. “We are digitising a lot of Truman-era processes that exist within CIS,” Brown said at the AWS Public Sector Summit on Wednesday 20th June. 

The effort is aimed at reducing the backlog, he said. “So far, we’ve done our first program planning session. We had 100 different technologists, both federal and contractors, as well as business and product owners.”

It’s not the first time the government has tried to digitise immigration services. Similar efforts under the Obama administration brought delays and cost overruns without the promised efficiency improvements.

Brown said his group has yet to spend a dime; they’re still figuring out what to buy and build and what to tear down. They hope commercial cloud providers will help the government succeed where it had previously failed.

A big part of the problem is organisational; too many contracts went to small projects that don’t benefit the larger whole. “It’s a very siloed and money-driven-down-to-contracts structure. Silos exist because the money is delivered based on what that mission, sub-mission, or sub-sub mission is,” he said.

So how do you digitise a Truman-era process? “We are…trying to leverage a lot of core technology from cloud providers and data analytics,” said Brown. That includes natural language processing and optical character recognition, in essence, getting software to read many of the forms now processed by humans.

Brown is also interested in applying “robotic process automation”: using software to identify tasks that can be automated. “We’re trying to move to 80 percent automatic processing,” he said. 

This, too, can be a challenge, since some robotic processing might be duplicative across facilities and data centers. Brown said “proper orchestration” and transparent workload sharing would keep software bots from doing the same thing.

But perhaps the biggest challenge will be getting everybody who uses CIS’s services and website, a group that includes immigration lawyers, ICE deportation officers, judges and immigrants themselves, to trust the new system. It will certainly be controversial. Given ICE’s Trump-era effort to hunt down and deport all undocumented residents, the agency will no doubt try to put the new system to use.

DefenseOne

You Might Also Read: 

Can Tech Solve The Brexit Border Puzzle?:

Terrorism Prevention & Border Protection – New Face Recognition Platform:
 

« So Much Hot Air About Virtual Currencies
Israel Gets 20% Of Global Cybersecurity Investment »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.