Title: Border Security
1Border Security Commerce No Compromise
- VC Kumar
- Manager, Government ID
- TI RFid Systems
2Agenda
- The issue and what needs to be resolved
- The parallel computing example
- The challenge
- The solution
- The future
3What are We Talking About?
- Border states and interaction with our neighbors
- 5,096 miles land border 2,381 miles water
- 790B goods trade with Canada and Mexico (2005)1
- 62 by trucks (4 CAGR)
- 15 by rail
- 1.1 million people cross border daily2
- Families
- Work
- Commerce
- 9/11 changed perception of border security
1 Bureau of Transportation Statistics, 2006 2 CBP
fact sheet, 2007
4Texas and Mexico Stats
- More than1,240 miles of border
- 22 of 50 busiest land border ports in US
- 84.5B trade with Mexico (2006)1
- 12 separate industries in Texas export more than
1B in goods and products to Mexico each year - 66 million people crossings (2006)1
- Over119,000 OTM illegal aliens apprehended
January-July 20052
1 Bureau of Transportation Statistics, 2006 2
www. governor.state.tx.us
5Security at Our Borders
- SBI (2005)
- Patrol officers
- Illegal crossings
- Electronic sensors, night vision scopes, ground
vehicles, aircraftand unmanned aerial vehicles - At the ports of entry (legal points of entry)
- Air
- Water
- Land
photo by James R. Tourtellotte 1
photo by James Tourtellotte 1
1 http//www.cbp.gov/xp/cgov/newsroom
6Need Resolution Ports at Entry Issue
- Enable security at the speed of business
- Increase security no compromise
- Dont impede commerce / business
- Dont increase processing time
- ? Augmenting security vs. increasing processing
time - Privacy issues
- Cost impact
Use technology to facilitate legitimate trade and
travel between Texas (and the US) and Mexico
7The Parallel Computing Parallel
- History
- Single processors not powerful, fast enough
- Parallel processors invented
- Philosophy of government ID security
- Layers of security address applicable threat
scenarios - Document (optical, material, chips)
- Back-end (database) hot lists
- Physical observation of trained inspectors
http//www.tsa.gov/approach/
http//www.sandia.gov/ASCI/TFLOP
8The Challenge
- Number of acceptable documents, formats
- Range of security features
- Old security features were only static
signatures - Proves document integrity
- Allows entry at borders based on what you have
- Document cloning, counterfeit documents
9How can Technology Help?
- Eliminate loopholes
- Add biometric angle to add the who you are
dimension - ? Enter chip based documents
- Add robust operational needs
- Remote, environmentally challenging locations
- ? Contactless technology
10The Solution
- Adding real time biometrics check
- Face
- Fingerprint?
- IRIS?
- Other?
- Todays technology
- Biographic and biometric data stored securely on
chip - Matches at reader/inspector station
- The appropriate technology is key
- Security to protect the holder
11Todays Technology
- FAST(cargo)
- NEXUS(Canada), SENTRI(Mexico)
- ePassports.
- Coming soon?
- WHTI for land borders
- Pilots with voluntary hi-tech drivers licenses
www.rfid-weblog.com/50226711/us_epassport_rule_pa
ssed.php
Biometrics, prescreening and contactless
technology
12The Future
- Biometric sensors and match on cards/document
capability - Eliminate concerns of privacy advocates
- No unauthorized eavesdropping
- Most secure
- Continue raising bar
13Texas A Technology Hub
- Proven security solutionsfor today
- Ready to meet tomorrows challenges
GOAL Protect our security and our economy
14Thank You
VC KumarManager, Government ID214.567.2484vcku
mar_at_ti.comTexas InstrumentsRFid
Systemswww.ti-rfid.com