140 likes | 248 Views
Border Security & Commerce – No Compromise. VC Kumar Manager, Government ID TI RFid Systems. Agenda. The issue and what needs to be resolved The parallel computing example The challenge The solution The future. What are We Talking About?.
E N D
Border Security & Commerce – No Compromise VC Kumar Manager, Government ID TI RFid Systems
Agenda • The issue and what needs to be resolved • The parallel computing example • The challenge • The solution • The future
What are We Talking About? Border states and interaction with our neighbors 5,096 miles land border; 2,381 miles water $790B goods trade with Canada and Mexico (2005)1 62% by trucks (4% CAGR) 15% by rail 1.1 million people cross border daily2 Families Work Commerce 9/11 changed perception of border security 1Bureau of Transportation Statistics, 2006 2CBP fact sheet, 2007
Texas and Mexico Stats More than1,240 miles of border 22 of 50 busiest land border ports in US $84.5B trade with Mexico (2006)1 12 separate industries in Texas export more than $1B in goods and products to Mexico each year 66 million people crossings (2006)1 Over119,000 OTM illegal aliens apprehended January-July 20052 1 Bureau of Transportation Statistics, 2006 2 www. governor.state.tx.us
Security at Our Borders photo by James R. Tourtellotte 1 SBI (2005) Patrol officers Illegal crossings Electronic sensors, night vision scopes, ground vehicles, aircraftand unmanned aerial vehicles At the ports of entry (legal points of entry) Air Water Land photo by James Tourtellotte 1 1 http://www.cbp.gov/xp/cgov/newsroom
Need Resolution: Ports at Entry Issue Enable security at the speed of business Increase security – no compromise Don’t impede commerce / business Don’t increase processing time Augmenting security vs. increasing processing time Privacy issues Cost impact Use technology to facilitate legitimate trade and travel between Texas (and the US) and Mexico
The Parallel Computing Parallel http://www.tsa.gov/approach/ History Single processors not powerful, fast enough Parallel processors invented Philosophy of government ID security Layers of security address applicable threat scenarios Document (optical, material, chips) Back-end (database) hot lists Physical observation of trained inspectors http://www.sandia.gov/ASCI/TFLOP
The Challenge Number of acceptable documents, formats Range of security features Old security features were only static ‘signatures’ Proves document integrity Allows entry at borders based on what you have Document cloning, counterfeit documents
How can Technology Help? Eliminate loopholes Add biometric angle to add the ‘who you are’ dimension Enter chip based documents Add robust operational needs Remote, environmentally challenging locations Contactless technology
The Solution Adding real time biometrics check Face Fingerprint? IRIS? Other? Today’s technology Biographic and biometric data stored securely on chip Matches at reader/inspector station The appropriate technology is key Security to protect the holder
Today’s Technology FAST(cargo) NEXUS(Canada), SENTRI(Mexico) ePassports…. Coming soon? WHTI for land borders Pilots with voluntary hi-tech drivers’ licenses www.rfid-weblog.com/50226711/us_epassport_rule_passed.php Biometrics, prescreening and contactless technology
The Future Biometric sensors and match on cards/document capability Eliminate concerns of privacy advocates No unauthorized eavesdropping Most secure Continue raising bar
Texas: A Technology Hub • Proven security solutionsfor today • Ready to meet tomorrow’s challenges GOAL: Protect our security and our economy
Thank You VC KumarManager, Government ID214.567.2484vckumar@ti.comTexas InstrumentsRFid Systemswww.ti-rfid.com