New Technology To Really Close The US / Mexican Border

President Trump’s new executive orders to extend walls along the US-Mexico border and deport undocumented individuals may have a popular appeal, but achieving real border security will likely take longer than many Trump supporters hope.

“We’re not ready to do it yet,” said one US Customs and Border Protection, (CBP) official told Defense One on condition of anonymity at the 11th annual Biometrics for Government and Law Enforcement Summit. “I think it will take years.”

Even CBP officials who spoke on the record said challenges to fully securing the border and identifying undocumented aliens will extend well beyond the construction of a wall.

Right now, CBP catches 85 to 95 percent of undocumented people crossing the border, according to Antonio Trindad, CBP’s director of enforcement systems.

Simply keeping records on people who cross the border illegally is in many ways far more useful for law enforcement than walls that can be tunneled under or, perhaps, bypassed with false credentials. That’s because walls treat every migrant the same, when in fact many people who enter illegally do so repeatedly, according to Trindad.

Crossing the border under difficult conditions, in secret and under cover of night, often requires a guide. In his address at the summit, Trindad said that focusing on guides can dramatically reduce illegal crossings.

The push now to is to collect photographic data, rapidly process it, and send it to officers who can apprehend people.

But it’s no simple task for a variety of reasons.

“We have some challenges collecting photos,” said Trindad. The number of cameras currently stationed on the border, including some that collect near-infrared imagery, number “in the hundreds,” he said.

But age, pose, illumination and expression, what technologists in the field refer to as the A-PIE problem, constrains how well the computers can recognise faces.

The intelligence community, through the Intelligence Advanced Research Projects Agency, or IARPA, also has a facial recognition program. Called Janus, it promises dramatically better recognition, especially where visual conditions are less than ideal, the resolution is low, the person is not staring at the camera, or A-PIE challenges are particularly severe.

Janus is currently producing fewer than .01% false positives. But while even a one percent false positive rate for a system that’s presiding over a barren stretch of desert might not be a small problem, it’s still too high for use in environments, like airport security, where pulling aside even a small percentage of the wrong people can produce huge delays and subject a lot of innocent people to useless screening, said Christopher Boehnen, an IARPA program manager.

The Janus program, which is currently in phase two, won’t be ready for deployment until mid-2018. (IARPA just produces the software; it’s up to agencies to deploy it.)

Trindad said that CBP is working with Carnegie Mellon and other institutions on software to do image recognition from 7 miles away. But that, too, is an effort that is in its infancy.

Today, CPB has three mobile processing centers, basically large trailers, where officers can collect biometric data on people and transmit the data via a satellite link to a larger CPB headquarters and facilities.

“They are right now in Texas and Arizona and being used quite a bit,” Trindad said.

Some officers are also using mobile biometric identification kits, essentially little suitcases for collecting and processing facial, iris, and fingerprint data. Others also use a handheld device called Secure Electronic Enrollment Kit, or SEEK, first used by the military, for iris capture.

Cool gadgets all, but Trindad says the bigger problem isn’t lack of equipment, or lack of a wall, but bandwidth and connectivity.

“On the Southwest border, if you look at the Verizon or AT&T map, it’s covered. But we’re in canyons. Mountains block things. It’s small areas we have to worry about not being covered,” he said. Connectivity in some areas along the border remains an issue, one that a wall won’t fix.

DefenseOne:    

 Anti-Surveillance Clothing Thwarts Facial Recognition:    

US Cybersecurity Strategy In The Trump Era:    New US Biometric Passport Regulations Will Prevent Entry To Millions:

 

« True Extent Of UK Cybercrime & Fraud Revealed
Spanish Police Arrest Banking Malware Suspect »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.