SlideShare a Scribd company logo
1 of 5
Download to read offline
NORTH AMERICAN
                                            EDITION
                                            Vol

                                        ™




Corridors of power
Texas joins Canada in the smart highway revolution




                      POLICY BEYOND POLITICS
                      Š‹Ž ƒ”‘ ‘ ƒ‹–ƒ‹‹‰ –Š‡
Ž‡‰ƒ…›
18T
18TH ITS WORLD
         WO
   CONGRESS
      N
SHOW PREVIEW
 H          E
                      MOTIVATION AND INCENTIVE
                      Randy Salzman meets the ultimate
                      transport planner
                      MOBILITY FIRST
                      The multimodal goals behind
                      the formation of ITMA
SURVEILLANCE AND SECURITY




Threat
assessment
Lee J Nelson discusses the latest developments helping the US to


I
 
        n today’s asymmetrical world, one         United States Customs and Border                  United States Visitor and Immigrant Status
        ought to understand how threats           Protection (CBP) is the unified agency            Indication Technology. In addition, data
        can and do come from any angle            within the Department of Homeland                 furnished by the Automated Targeting
        at any time. The transportation           Security (DHS; Washington, DC) which              System, the Automated Export System and
        infrastructure, areas where people        embraces the workforces and safeguarding          the Trade Act of 2002 Advance Electronic
assemble to take advantage of various             authorities of Citizenship and Immigration        Information Regulations (originally
conveyance modalities, poses an obvious           Services, Immigration and Customs                 entered into The Federal Register in
“soft” target. We can be certain that             Enforcement, the Animal and Plant Health          December 2003), help spot perilous cargo.
terrorists view airports, train and bus           Inspection Service and the Border Patrol.            The Office of Intelligence and Operations
terminals, highway interchanges and               CBP employs multiple strategies and draws         Coordination, restructured this past July
maritime ports as high-value assets;              on leading-edge technologies to                   into the Office of Intelligence and
waiting for the opportunity to convert one        accomplish its two-part goal: preventing          Investigative Liaison, furthers the above
into an astonishing news event.                   terrorists and terrorist weapons from             initiatives: planning, collection, processing,
   Ensuring contemporaneous security for          entering the country while fostering              analyzing, producing and disseminating
all such touchpoints would be challenging         legitimate trade, travel and tourism.             all-source intelligence. Functioning as
in a peaceful environment.                                                                          CBP’s situational awareness hub, the newly
   Consider the pressure on Federal, State        A COORDINATED EFFORT                              streamlined Office provides timely, relevant
and local governments to protect citizenry        To assess every US-bound passenger, CBP           and actionable information to operators
and property when, with scarcely a                relies on the Advance Passenger                   and decision-makers..
moment’s notice, the daily order around           Information System, the Student and                  Using risk management techniques,
any of those sites might give way to chaos.       Exchange Visitor System and US VISIT,             suspicious individuals can be designated




                                                                                                                                                     Photo © US Customs and Border Protection




A commercial driver presenting credentials for accelerated border clearance at a dedicated FAST processing lane.


48                                                           thinkinghighways.com                                      Vol 6 No 3 North America
Border control technology

                                              “By creating ‘smarter boundaries’, the zone
                                              of security can be extended beyond
                                              physical borders”



secure its borders
prior to reaching North American
shores. Meanwhile, the Container
Security Initiative targets and prescreens
freight at foreign departure ports. By
uncovering additional investigative leads,
the Initiative aims to mitigate the threat




                                                                                                                                              Photo © US Customs and Border Protection
of transporting a weapon, concealed
in cargo and destined for the US.

SECURE BORDER INITIATIVE
In 2005, DHS established the Secure
Border Initiative (SBI), a comprehensive,
multi-year plan to implement tighter
restraints. The Initiative’s mission to
develop, deploy and integrate technology
into tactical infrastructures, bolsters       Aerial view of an extensive crossing complex along the US-Mexican border
control efforts at terrestrial borders.
   Effective border management is achieved    systems, positioned at ports-of-entry,          Computer Assisted Detection (ICAD)
not only through situational awareness        contain x-ray and γ-ray (gamma ray)             database. RVS combines multiple color and
but by rapid and appropriate responses.       imaging modalities.                             infrared cameras, mounted atop various
To realize operational success, CBP              CBP does not rely on any single              structures, into a single remote-controlled
depends on personnel and equipment.           approach: officers and agents utilize diverse   subsystem. The sensor network consists of
A major enterprise, known as SBInet,          technologies, in differing combinations, to     magnetic, seismic and thermal devices,
began combining existing and novel            heighten the likelihood that terrorist          acting as electronic tripwires, to expose and
technologies to enable front-line agents      weapons – including nuclear or radiological     track intrusions. And, ICAD software
and officers to detect, identify, classify    devices – are spotted and interdicted.          coordinates data collection and helps
and react to incursions. Earlier this year,   Personal detectors, isotope identifiers,        manage personnel deployment when
however, following a lengthy period           radiation monitors and trained dogs all aid     responding to alarm notifications.
of reassessment, DHS Secretary Janet          in locating explosives and hazardous               In 2003, CBP began developing
Napolitano cancelled the program.             chemicals. In short, Border Patrol agents       America’s Shield Initiative (ASI) to
   Funding, previously requested for SBInet   are augmenting security through a               integrate surveillance, communications
and provided in the fiscal 2011 continuing    wide-ranging enforcement strategy;              and visualization tools while maintaining
resolution, prompted a new plan. The          intensifying, integrating and coordinating a    and modernizing ISIS - that formally was
Alternative Border Technology employs         rich repertoire of technologies and             subsumed by ASI in 2005.
towers, truck-mounted surveillance            communications protocols.                          The rejuvenation of ISIS under ASI
systems, ground sensors and hand-held                                                         addresses upgraded and expanded
units as well as fixed- and rotary-wing       AMERICA’S SHIELD INITIATIVE                     equipment as well as enhanced detection
aircraft and unmanned drones. By creating     Command, control and intelligence               and monitoring. Those measures also
“smarter boundaries”, the zone of security    applications also assist CBP operators,         involve superior links for CBP agents to
can be extended beyond physical borders.      through a common operating picture,             guide the collection of visual and related
   Given the magnitude of CBP’s               to facilitate tactical decision-making          data. Similarly, new air, ground and marine
responsibility, development and               and coordinate law enforcement                  resources underscore improvements for
deployment of sophisticated tools is a        responses. To that end, the Integrated          all-weather, around-the-clock capabilities.
foregone conclusion. Non-intrusive            Surveillance Intelligence System                   According to CBP, more robust
inspection is on the increase and viewed as   (ISIS) was established in 1998.                 surveillance technologies could be an
a “force multiplier”, permitting CBP to         Three basic components comprised ISIS:        effective adjuvant, reducing static
screen or examine a larger portion of the     remote day/night video surveillance (RVS),      observation requirements while
commercial traffic stream. Some of those      in ground sensor arrays and the Integrated      engendering intelligence-based           

North America Vol 6 No 3                                thinkinghighways.com                                                      49
SURVEILLANCE AND SECURITY

                                           “We must also marry our
                                           various programs together
                                           and ensure that all
                                           participants are vetted to
                                           the same high standards”




                                                                                                                                                                                                     Nelson
                                                                                                                                                                                            © Lee J.
                                           responses. ASI would incorporate a means          undesirables. CBP currently operates six      concentrate our resources on suspect
                                           to evaluate enforcement actions, collect          Predator Bs (the MQ-9 Reaper from             people and goods. Our Trusted Traveler
                                           performance metrics and provide managers          General Atomics Aeronautical Systems,         Program, Global Entry, which is growing
                                           with analyses and efficiency reports.             San Diego, California): three from the        at a rapid rate, is helping improve our
                                              The US Congress approved additional            National Air Security Operations Center       ability to identify low-risk travelers. We
                                           resources in the Emergency Supplemental           (NASOC) in Sierra Vista, Arizona, two         must continue to expand participation
                                           for Border Security (passed and signed into       located at Grand Forks, North Dakota and      in similar efforts, such as SENTRI,
                                           law in August of 2010) that included 1,000        a maritime variant, the Guardian, from        NEXUS, and FAST,” remarked CBP
                                           extra Border Patrol agents, 250 CBP               Cocoa Beach, Florida. Most recently, a        Commissioner Alan Bersin. “We must
                                           officers, two more Unmanned Aircraft              second Guardian was delivered to NASOC,       also marry our various programs together
                                           Vehicles (UAVs) and two new Forward               Corpus Christi, Texas in further support of   and ensure that all participants are
                                           Operating Bases.                                  interagency missions.                         vetted to the same high standards.”
                                                                                                                                              All program applicants voluntarily
                                           UNMANNED AERIAL VEHICLES                          TRUSTED TRAVELER PROGRAMS                     undergo a background investigation against
                                           Equipped with sophisticated on-board              The Global Entry pilot program                criminal, law enforcement, customs,
                                           sensors, UAVs, also called Unmanned               streamlines the international arrival         immigration and terrorist indices, a ten-
                                           Autonomous Vehicles or Unmanned                   process for pre-approved travelers. Once      fingerprint law enforcement check and an
                                           Aircraft Systems, confer unparalleled, long-      inducted, Global Entry members may            interview with a CBP officer. Each approved
                                           range reconnaissance. They are able to            avoid lengthy waits by proceeding directly    Trusted Traveler receives a WHTI-
                                           remain “on-station” longer than other             to special kiosks. There, the system          compliant (Western Hemisphere Travel
                                           airborne assets and, therefore, are               confirms one’s identity by scanning a         Initiative) card. The card fulfills WHTI’s
                                           particularly useful in isolated areas.            passport (or lawful permanent resident        requirement for “a passport or other secure
                                              UAVs gather intelligence on border             card) and compares fingerprints against       travel document that denotes identity
                                           activities and survey open waters. The high       those already on-file.                        and citizenship” by all North American
                                           endurance of larger-class drones permits             Enrollment in the quartet of CBP’s         citizens, entering the US by air, land or sea.
                                           overnight or 24-hour vigils while their size      Trusted Traveler Programs – Global Entry,     Conscription to all programs is managed
                                           and operating altitude make them                  NEXUS, SENTRI (Secure Electronic              via GOES, the Federal Government’s Global
                                           practically imperceptible by ears or unaided      Network for Travelers Rapid Inspection)       Online Enrollment System.
                                           eyes. UAVs contribute to enforcement              and FAST (Free and Secure Trade) – has           SENTRI provides expedited processing
                                           efficacy as well as officer safety, complement    exceeded one million members.                 for motor vehicle drivers and passengers
                                           incursion detection and help to quell entry          “If we are able to identify low-risk       who are inbound from Mexico. First
                                           of terrorists, smugglers and other                travelers and cargo, we will be able to       implemented at Otay Mesa, California in
                                                                                                                                           1995, SENTRI has grown to include sixteen
                                                                                                                                           lanes at the nine busiest crossing points
                                                                                                                                           along the US-Mexico border. When an
                                                                                                                                           accepted international visitor approaches
                                                                                                                                           in a distinctly marked SENTRI lane, a
                                                                                                                                           video-based license plate reader
Photo © US Customs and Border Protection




                                                                                                                                           automatically recognizes the automobile.
                                                                                                                                           Each occupant is verified through records
                                                                                                                                           maintained in an on-line database
                                                                                                                                           (containing digitized facial photographs),
                                                                                                                                           together with a radio-frequency
                                                                                                                                           identification (RFID) card and an officer’s
                                                                                                                                           visual authentication.
                                                                                                                                              NEXUS is a joint CBP-Canada Border
                                                                                                                                           Services Agency (Ottawa, Ontario)
                                           An unmanned aircraft vehicle poised for take-off on a border surveillance mission.              endeavor for enhancing security while


                                           50                                                           thinkinghighways.com                                  Vol 6 No 3 North America

More Related Content

Viewers also liked

Caribbean Sun News July 09 Part 1[1]
Caribbean Sun News July 09 Part 1[1]Caribbean Sun News July 09 Part 1[1]
Caribbean Sun News July 09 Part 1[1]kirtonbrian
 
Lynn Corse
Lynn CorseLynn Corse
Lynn CorseFalascoj
 
TIK Presentasi Bab 1 Bhs. Inggris
TIK Presentasi Bab 1 Bhs. InggrisTIK Presentasi Bab 1 Bhs. Inggris
TIK Presentasi Bab 1 Bhs. Inggrissofiii9g30
 
Vetronics Ecosystem
Vetronics EcosystemVetronics Ecosystem
Vetronics EcosystemFalascoj
 
Vetronics Ecosystem
Vetronics EcosystemVetronics Ecosystem
Vetronics EcosystemFalascoj
 
Ppt3 Tests For Cations
Ppt3  Tests For CationsPpt3  Tests For Cations
Ppt3 Tests For Cationssitinurbaiyah
 
Jmet Ppt3 Higher Maths
Jmet   Ppt3   Higher MathsJmet   Ppt3   Higher Maths
Jmet Ppt3 Higher Mathskapil1312
 
Smart Highway-Innovation
Smart Highway-InnovationSmart Highway-Innovation
Smart Highway-InnovationSouzana Angeli
 
Nano materials in concrete
Nano materials in concreteNano materials in concrete
Nano materials in concreteBismillah Arif
 
automated highways system
automated highways systemautomated highways system
automated highways systemHarish Naicker
 
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...Swapneil Patwari
 
nanotechnology in civil engineering
nanotechnology in civil engineeringnanotechnology in civil engineering
nanotechnology in civil engineeringSameer Charan
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil EngineeringColloquium
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 

Viewers also liked (17)

Caribbean Sun News July 09 Part 1[1]
Caribbean Sun News July 09 Part 1[1]Caribbean Sun News July 09 Part 1[1]
Caribbean Sun News July 09 Part 1[1]
 
Lynn Corse
Lynn CorseLynn Corse
Lynn Corse
 
TIK Presentasi Bab 1 Bhs. Inggris
TIK Presentasi Bab 1 Bhs. InggrisTIK Presentasi Bab 1 Bhs. Inggris
TIK Presentasi Bab 1 Bhs. Inggris
 
Vetronics Ecosystem
Vetronics EcosystemVetronics Ecosystem
Vetronics Ecosystem
 
Vetronics Ecosystem
Vetronics EcosystemVetronics Ecosystem
Vetronics Ecosystem
 
Ppt3 Tests For Cations
Ppt3  Tests For CationsPpt3  Tests For Cations
Ppt3 Tests For Cations
 
Jmet Ppt3 Higher Maths
Jmet   Ppt3   Higher MathsJmet   Ppt3   Higher Maths
Jmet Ppt3 Higher Maths
 
Smart Highway-Innovation
Smart Highway-InnovationSmart Highway-Innovation
Smart Highway-Innovation
 
Nano materials in concrete
Nano materials in concreteNano materials in concrete
Nano materials in concrete
 
Smart Highways
Smart HighwaysSmart Highways
Smart Highways
 
automated highways system
automated highways systemautomated highways system
automated highways system
 
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...
 
nanotechnology in civil engineering
nanotechnology in civil engineeringnanotechnology in civil engineering
nanotechnology in civil engineering
 
Nano concrete ppt3
Nano concrete ppt3Nano concrete ppt3
Nano concrete ppt3
 
Civil engineering
Civil engineeringCivil engineering
Civil engineering
 
Nanotechnology In Civil Engineering
Nanotechnology   In Civil   EngineeringNanotechnology   In Civil   Engineering
Nanotechnology In Civil Engineering
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 

Similar to Thinking Highways

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project ProposalChris Young
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentationsvito
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewGeeks and Com'
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewEricsson France
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxsimonithomas47935
 
Ten Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved SecurityTen Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved SecuritySocialKwan
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorEuropean Services Institute
 

Similar to Thinking Highways (20)

IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
403 3
403 3403 3
403 3
 
FS_WP_Rapiscan_111014
FS_WP_Rapiscan_111014FS_WP_Rapiscan_111014
FS_WP_Rapiscan_111014
 
Mark Borkowski Presentation
Mark Borkowski PresentationMark Borkowski Presentation
Mark Borkowski Presentation
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson Review
 
Networked security has arrived - Ericsson Review
Networked security has arrived - Ericsson ReviewNetworked security has arrived - Ericsson Review
Networked security has arrived - Ericsson Review
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
GTSC's CBP Day 2019
GTSC's CBP Day 2019GTSC's CBP Day 2019
GTSC's CBP Day 2019
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
 
Ten Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved SecurityTen Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved Security
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
isps code pp
isps code ppisps code pp
isps code pp
 
Cyber-Attack.pptx
Cyber-Attack.pptxCyber-Attack.pptx
Cyber-Attack.pptx
 

More from Falascoj

Thna Nelson Article
Thna Nelson ArticleThna Nelson Article
Thna Nelson ArticleFalascoj
 
Telecom Experience
Telecom ExperienceTelecom Experience
Telecom ExperienceFalascoj
 
Timeline&Background
Timeline&BackgroundTimeline&Background
Timeline&BackgroundFalascoj
 
Aerospace Ecosystem
Aerospace EcosystemAerospace Ecosystem
Aerospace EcosystemFalascoj
 
Project Mgt
Project MgtProject Mgt
Project MgtFalascoj
 
Next Technology Wave
Next Technology WaveNext Technology Wave
Next Technology WaveFalascoj
 
JTAS Review
JTAS ReviewJTAS Review
JTAS ReviewFalascoj
 
Avionics Paperdoc
Avionics PaperdocAvionics Paperdoc
Avionics PaperdocFalascoj
 
Spie2006 Paperpdf
Spie2006 PaperpdfSpie2006 Paperpdf
Spie2006 PaperpdfFalascoj
 
SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010Falascoj
 

More from Falascoj (12)

Thna Nelson Article
Thna Nelson ArticleThna Nelson Article
Thna Nelson Article
 
Telecom Experience
Telecom ExperienceTelecom Experience
Telecom Experience
 
Timeline&Background
Timeline&BackgroundTimeline&Background
Timeline&Background
 
Aerospace Ecosystem
Aerospace EcosystemAerospace Ecosystem
Aerospace Ecosystem
 
Project Mgt
Project MgtProject Mgt
Project Mgt
 
Next Technology Wave
Next Technology WaveNext Technology Wave
Next Technology Wave
 
JTAS Review
JTAS ReviewJTAS Review
JTAS Review
 
Dod Exp
Dod ExpDod Exp
Dod Exp
 
Avionics Paperdoc
Avionics PaperdocAvionics Paperdoc
Avionics Paperdoc
 
Spie2006 Paperpdf
Spie2006 PaperpdfSpie2006 Paperpdf
Spie2006 Paperpdf
 
SPIE 2008
SPIE 2008SPIE 2008
SPIE 2008
 
SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010
 

Thinking Highways

  • 1. NORTH AMERICAN EDITION Vol ™ Corridors of power Texas joins Canada in the smart highway revolution POLICY BEYOND POLITICS Š‹Ž ƒ”‘ ‘ ƒ‹–ƒ‹‹‰ –Š‡
  • 2. Ž‡‰ƒ…› 18T 18TH ITS WORLD WO CONGRESS N SHOW PREVIEW H E MOTIVATION AND INCENTIVE Randy Salzman meets the ultimate transport planner MOBILITY FIRST The multimodal goals behind the formation of ITMA
  • 3. SURVEILLANCE AND SECURITY Threat assessment Lee J Nelson discusses the latest developments helping the US to I   n today’s asymmetrical world, one United States Customs and Border United States Visitor and Immigrant Status ought to understand how threats Protection (CBP) is the unified agency Indication Technology. In addition, data can and do come from any angle within the Department of Homeland furnished by the Automated Targeting at any time. The transportation Security (DHS; Washington, DC) which System, the Automated Export System and infrastructure, areas where people embraces the workforces and safeguarding the Trade Act of 2002 Advance Electronic assemble to take advantage of various authorities of Citizenship and Immigration Information Regulations (originally conveyance modalities, poses an obvious Services, Immigration and Customs entered into The Federal Register in “soft” target. We can be certain that Enforcement, the Animal and Plant Health December 2003), help spot perilous cargo. terrorists view airports, train and bus Inspection Service and the Border Patrol. The Office of Intelligence and Operations terminals, highway interchanges and CBP employs multiple strategies and draws Coordination, restructured this past July maritime ports as high-value assets; on leading-edge technologies to into the Office of Intelligence and waiting for the opportunity to convert one accomplish its two-part goal: preventing Investigative Liaison, furthers the above into an astonishing news event. terrorists and terrorist weapons from initiatives: planning, collection, processing, Ensuring contemporaneous security for entering the country while fostering analyzing, producing and disseminating all such touchpoints would be challenging legitimate trade, travel and tourism. all-source intelligence. Functioning as in a peaceful environment. CBP’s situational awareness hub, the newly Consider the pressure on Federal, State A COORDINATED EFFORT streamlined Office provides timely, relevant and local governments to protect citizenry To assess every US-bound passenger, CBP and actionable information to operators and property when, with scarcely a relies on the Advance Passenger and decision-makers.. moment’s notice, the daily order around Information System, the Student and Using risk management techniques, any of those sites might give way to chaos. Exchange Visitor System and US VISIT, suspicious individuals can be designated Photo © US Customs and Border Protection A commercial driver presenting credentials for accelerated border clearance at a dedicated FAST processing lane. 48 thinkinghighways.com Vol 6 No 3 North America
  • 4. Border control technology “By creating ‘smarter boundaries’, the zone of security can be extended beyond physical borders” secure its borders prior to reaching North American shores. Meanwhile, the Container Security Initiative targets and prescreens freight at foreign departure ports. By uncovering additional investigative leads, the Initiative aims to mitigate the threat Photo © US Customs and Border Protection of transporting a weapon, concealed in cargo and destined for the US. SECURE BORDER INITIATIVE In 2005, DHS established the Secure Border Initiative (SBI), a comprehensive, multi-year plan to implement tighter restraints. The Initiative’s mission to develop, deploy and integrate technology into tactical infrastructures, bolsters Aerial view of an extensive crossing complex along the US-Mexican border control efforts at terrestrial borders. Effective border management is achieved systems, positioned at ports-of-entry, Computer Assisted Detection (ICAD) not only through situational awareness contain x-ray and γ-ray (gamma ray) database. RVS combines multiple color and but by rapid and appropriate responses. imaging modalities. infrared cameras, mounted atop various To realize operational success, CBP CBP does not rely on any single structures, into a single remote-controlled depends on personnel and equipment. approach: officers and agents utilize diverse subsystem. The sensor network consists of A major enterprise, known as SBInet, technologies, in differing combinations, to magnetic, seismic and thermal devices, began combining existing and novel heighten the likelihood that terrorist acting as electronic tripwires, to expose and technologies to enable front-line agents weapons – including nuclear or radiological track intrusions. And, ICAD software and officers to detect, identify, classify devices – are spotted and interdicted. coordinates data collection and helps and react to incursions. Earlier this year, Personal detectors, isotope identifiers, manage personnel deployment when however, following a lengthy period radiation monitors and trained dogs all aid responding to alarm notifications. of reassessment, DHS Secretary Janet in locating explosives and hazardous In 2003, CBP began developing Napolitano cancelled the program. chemicals. In short, Border Patrol agents America’s Shield Initiative (ASI) to Funding, previously requested for SBInet are augmenting security through a integrate surveillance, communications and provided in the fiscal 2011 continuing wide-ranging enforcement strategy; and visualization tools while maintaining resolution, prompted a new plan. The intensifying, integrating and coordinating a and modernizing ISIS - that formally was Alternative Border Technology employs rich repertoire of technologies and subsumed by ASI in 2005. towers, truck-mounted surveillance communications protocols. The rejuvenation of ISIS under ASI systems, ground sensors and hand-held addresses upgraded and expanded units as well as fixed- and rotary-wing AMERICA’S SHIELD INITIATIVE equipment as well as enhanced detection aircraft and unmanned drones. By creating Command, control and intelligence and monitoring. Those measures also “smarter boundaries”, the zone of security applications also assist CBP operators, involve superior links for CBP agents to can be extended beyond physical borders. through a common operating picture, guide the collection of visual and related Given the magnitude of CBP’s to facilitate tactical decision-making data. Similarly, new air, ground and marine responsibility, development and and coordinate law enforcement resources underscore improvements for deployment of sophisticated tools is a responses. To that end, the Integrated all-weather, around-the-clock capabilities. foregone conclusion. Non-intrusive Surveillance Intelligence System According to CBP, more robust inspection is on the increase and viewed as (ISIS) was established in 1998. surveillance technologies could be an a “force multiplier”, permitting CBP to Three basic components comprised ISIS: effective adjuvant, reducing static screen or examine a larger portion of the remote day/night video surveillance (RVS), observation requirements while commercial traffic stream. Some of those in ground sensor arrays and the Integrated engendering intelligence-based North America Vol 6 No 3 thinkinghighways.com 49
  • 5. SURVEILLANCE AND SECURITY “We must also marry our various programs together and ensure that all participants are vetted to the same high standards” Nelson © Lee J. responses. ASI would incorporate a means undesirables. CBP currently operates six concentrate our resources on suspect to evaluate enforcement actions, collect Predator Bs (the MQ-9 Reaper from people and goods. Our Trusted Traveler performance metrics and provide managers General Atomics Aeronautical Systems, Program, Global Entry, which is growing with analyses and efficiency reports. San Diego, California): three from the at a rapid rate, is helping improve our The US Congress approved additional National Air Security Operations Center ability to identify low-risk travelers. We resources in the Emergency Supplemental (NASOC) in Sierra Vista, Arizona, two must continue to expand participation for Border Security (passed and signed into located at Grand Forks, North Dakota and in similar efforts, such as SENTRI, law in August of 2010) that included 1,000 a maritime variant, the Guardian, from NEXUS, and FAST,” remarked CBP extra Border Patrol agents, 250 CBP Cocoa Beach, Florida. Most recently, a Commissioner Alan Bersin. “We must officers, two more Unmanned Aircraft second Guardian was delivered to NASOC, also marry our various programs together Vehicles (UAVs) and two new Forward Corpus Christi, Texas in further support of and ensure that all participants are Operating Bases. interagency missions. vetted to the same high standards.” All program applicants voluntarily UNMANNED AERIAL VEHICLES TRUSTED TRAVELER PROGRAMS undergo a background investigation against Equipped with sophisticated on-board The Global Entry pilot program criminal, law enforcement, customs, sensors, UAVs, also called Unmanned streamlines the international arrival immigration and terrorist indices, a ten- Autonomous Vehicles or Unmanned process for pre-approved travelers. Once fingerprint law enforcement check and an Aircraft Systems, confer unparalleled, long- inducted, Global Entry members may interview with a CBP officer. Each approved range reconnaissance. They are able to avoid lengthy waits by proceeding directly Trusted Traveler receives a WHTI- remain “on-station” longer than other to special kiosks. There, the system compliant (Western Hemisphere Travel airborne assets and, therefore, are confirms one’s identity by scanning a Initiative) card. The card fulfills WHTI’s particularly useful in isolated areas. passport (or lawful permanent resident requirement for “a passport or other secure UAVs gather intelligence on border card) and compares fingerprints against travel document that denotes identity activities and survey open waters. The high those already on-file. and citizenship” by all North American endurance of larger-class drones permits Enrollment in the quartet of CBP’s citizens, entering the US by air, land or sea. overnight or 24-hour vigils while their size Trusted Traveler Programs – Global Entry, Conscription to all programs is managed and operating altitude make them NEXUS, SENTRI (Secure Electronic via GOES, the Federal Government’s Global practically imperceptible by ears or unaided Network for Travelers Rapid Inspection) Online Enrollment System. eyes. UAVs contribute to enforcement and FAST (Free and Secure Trade) – has SENTRI provides expedited processing efficacy as well as officer safety, complement exceeded one million members. for motor vehicle drivers and passengers incursion detection and help to quell entry “If we are able to identify low-risk who are inbound from Mexico. First of terrorists, smugglers and other travelers and cargo, we will be able to implemented at Otay Mesa, California in 1995, SENTRI has grown to include sixteen lanes at the nine busiest crossing points along the US-Mexico border. When an accepted international visitor approaches in a distinctly marked SENTRI lane, a video-based license plate reader Photo © US Customs and Border Protection automatically recognizes the automobile. Each occupant is verified through records maintained in an on-line database (containing digitized facial photographs), together with a radio-frequency identification (RFID) card and an officer’s visual authentication. NEXUS is a joint CBP-Canada Border Services Agency (Ottawa, Ontario) An unmanned aircraft vehicle poised for take-off on a border surveillance mission. endeavor for enhancing security while 50 thinkinghighways.com Vol 6 No 3 North America
  • 6. Border control technology Left: The author’s Global Entry WHTI- compliant ID card with embedded RF tag. A US-Canadian border-crossing lane, equipped with a NEXUS card reader as well as a video camera for license plate recognition. Photo © US Customs and Border Protection simplifying entry for low-risk visitors. NEXUS was established in 2002 and currently counts more than 500,000 members. Applicants must agree to background checks in both Canada and the US. FAST offers dedicated lanes and state-of-the-art security methods, the “The US border security system should accelerated border clearance for importers, program will enable inspectors to be integrated into a larger network of carriers and commercial drivers who have concentrate on threat-sensing and screening points that includes our passed rigorous assessments. response activities. transportation system and access to vital Through International Trade Data facilities, such as nuclear reactors. The AUTOMATED COMMERCIAL System initiatives, ACE will become the President should direct DHS to lead the ENVIRONMENT “solitary window” for electronic collection effort to design a comprehensive screening Advances in non-invasive inspection of of all harmonized information required by system, addressing common problems and containerized freight are proving effective Federal agencies for clearance of cargo setting common standards with at stemming the flow of contraband, versus reams of paper which was the norm. systemwide goals in mind. Extending those principally illicit drugs, smuggled into the There are more than 19,000 ACE portal standards among other governments could US by sea and land. The armamentarium of account-holders who have filed about dramatically strengthen America and the imaging technologies generates an 475,000 entry summaries (since that world’s collective ability to intercept unfathomable data volume and does so on functionality was introduced in April 2009). individuals who pose catastrophic threats.” nearly a continuous basis. Highlighting, Published in the Summer of 2004, that interpreting and communicating the BETTER NOW THAN NEVER statement encapsulated one essential elements is a Herculean task. Over the past two years, DHS has been recommendation of the National Originated in 2001, the Automated focusing humanpower, technology and Commission on Terrorist Attacks Upon the Commercial Environment (ACE) offers a infrastructure on the US’s Southwest United States (also known as the 9/11 single, consolidated venue for commercial border which experiences one-half of the Commission). transactions, trade enforcement and nation’s illegal traffic. The Border Patrol is As Thinking Highways went to press, we compliance, while abiding multi-agency better staffed, presently, than at any time in observed the 10th anniversary of the practices. Previously, CBP officers had to its 87-year history; doubling the agent pool terrorist attacks on the East Coast of the toggle among seven different computer from 10,000 in fiscal year 2004 to US: New York City, Shanksville, screens, and review paper forms, when approximately 20,500 at the close of 2010. Pennsylvania and The Pentagon in deciding whether to allow cargo to pass into Beside the Border Patrol, CBP’s workforce Arlington, Virginia. Now, seven years after the country or detain it for further scrutiny. of roughly 58,000 employees consists of the Commission’s findings and despite ACE affords government users a unified more than 2,300 agriculture specialists and significant undertakings, the assurance of and systematic approach to analytical 20,600 port-based officers. contemporaneous and complete security targeting of equipment and freight. In 2010, CBP deployed 17 new Mobile remains elusive. ACE’s evolving trade processing system Non-Intrusive Inspection Systems and 22 is helping to facilitate cargo handling, modernize business processes, speed the additional large-scale Non-Intrusive Inspection imaging units. Mobile X-ray fyi flow of legitimate shipments and target technology permits officials to detect Lee Nelson is an Independent analyst and President of H3B Media North America ellicit goods. ACE ultimately will extend stowaways and contraband such as (to CBP and other participating currency, drugs and explosives in lnelson@rcn.com government entities) the ability to access passenger vehicles and in freight. Those http://www.garlic.com/biz data throughout the international supply systems already have conducted more than chain and to anticipate, identify, track and 7.3 million examinations and resulted in Read more in our ARCHIVES at intercept high-risk shipments and persons. over 1,300 seizures, including 288,000 thinkinghighways.com/archives.aspx By incorporating electronic devices, such pounds (130.6 tonnes) of narcotics. Full The author acknowledges invaluable as transponders, RFID tags and smart cards and final deployment of ACE is scheduled assistance from James Falasco (Sachse, Texas) together with biometric applications and for the Winter of 2012. North America Vol 6 No 3 thinkinghighways.com 51