classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


The complexity of borders
November 2017, Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions, IT infrastructure

There are many aspects of security that governments need to be aware of and be on top of in terms of having control and insight. When a government’s resources can be wasted trying to ban a book, it would be reasonable to expect they have the time at hand because all their other security issues are well in hand. Sadly we know this is not the case.

Of all the security issues a government should be dealing with, protecting the borders of a country must be one of the prime concerns. Over the past year or two, border control has become a hot topic globally, where in places like the EU it is harder and more expensive than ever to legally gain entry, but seemingly simple to get in illegally. The same can be said, to a lesser degree, about South Africa.

To write an article covering all aspects of border control would require a book, probably many books, so in this feature we limit ourselves to two primary aspects of border control. The first is the issues faced when trying to control long borders where there are an infinite number of places to cross into a country illegally, simply putting up a fence is of limited value, but installing all manner of technology, while it would be far more effective, is far too costly.

The second area is one everyone who has travelled internationally is familiar with, that of entry to a country through the normal border controls at an airport or port, for example. Simply getting your passport stamped by a grumpy official doesn’t cut it anymore, but what else can be done to ensure those entering are who they claim and aren’t trying to get through with fake documents and malicious intent? And it would also be better to do it faster without losing control.

The higher you build your wall

Building a wall isn’t always the best border control solution. If you have a limited area to protect and you can ensure you patrol that area efficiently, a wall can make a difference. However, you still need to have technology solutions in place along the wall to stop those determined to cross from coming over, under or through the barrier.

So, when looking at long borders, adding technology to a wall or fence of some kind is the only real way in which a country can manage and protect the border. Fortunately, today’s advances in security systems make this somewhat easier. Charles Harrison, MD of Secu-Systems explains that the traditional security technologies we use in residential estates or mines, among other areas, while very effective in those situations, are not up to the task when it comes to long borders.

“When you have a perimeter that is hundreds or thousands of kilometres long, you can’t expect to set up a chain of surveillance cameras as this would be far too expensive. What you can do is have a physical barrier (a wall) and make use of specialised technology that can handle the long distances while still being accurate enough to guide human resources to any locations where an incursion has occurred. And of course, there are areas where there is no fence or wall for various reasons and technology is your only option.”

One way to manage the area is via military-grade thermal cameras, which can identify people moving over ranges of up to 50 km (depending on the technology and how much you can pay). While the technology is there, it is expensive and requires special licences from the country selling them as well as the buying country (for example, for an American thermal of this type one would need authorisation from the US government to export it and authorisation from the South African government to import it).

There are also solutions available that allow for the detection of friend or foe at a distance, allowing control centres or analytical software to easily determine which side detected people are on. Harrison adds that the Panoptes MTI (moving target indicator) software has been used by Secu-Systems with great success in various scenarios where distant intruders have been identified and tracked after they crossed the border line.

And tracking is important in border control. Simply recognising an intrusion and dispatching a patrol will seldom result in catching the intruders due to the distances involved. Apart from thermals, Harrison says radar is another option for border security as it allows for long-distance observation. With a ground radar system, the movement of intruders can be tracked over time to allow for effective response.

Hotpot surveillance

The one potential issue with the solutions mentioned is that of terrain. They work well in flat areas without too many hills and valleys. No radar or thermal technology can see through everything, however. This, according to Harrison, is where UAVs (drones) come into the picture. When fitted with thermal and visual cameras, they can offer surveillance and tracking in any lighting conditions, although the length of time they can stay in the air is an issue. Another option is mobile surveillance solutions that can be driven around to different locations, also equipped with thermal and visual cameras, as well as analytical software.

Yet even this is not enough when it comes to borders. The reality is you simply can’t be everywhere all the time, even with technology’s help. Harrison therefore suggests that intelligence is key in effective border control. “You need to know where your hotspots are. In other words, the areas where most of the intrusion happens, and then focus on those areas.”

The Kruger National Park is a South African national treasure, but it is also an area many people use to enter South Africa illegally. It is also a hotspot in terms of poaching and other criminal activities. Focusing your resources on these areas will result in more ‘successes’ in preventing crime than randomly trying to control an almost endless border.

It’s critical to note that there is no single solution to the border problem. Harrison says decisions must be made according to the location and environment under investigation, its importance in terms of the goals of the country, and then an integrated and tiered solution designed to meet those specific requirements.

He adds that there are also some quick wins to make. It’s not unheard of that people reach a border post that they won’t be allowed to cross, and simply walk a hundred metres or so down the road where there is no security and stroll across unhindered. “It’s not always a million dollar solution that can make a difference, but knowing what the problem is and designing an effective solution to deal with it.”

At the border

Of course, most people enter countries at border posts (one hopes), where they present a document such as a passport containing a visa and so forth. As noted above, even this is not a simple identity document anymore as forgers are masters of their art. Today’s border controls require more complex technology vetting both with respect to identity documents like passports and external technology (mixed with human insight).

Sanjay Dharwadker.
Sanjay Dharwadker.

Sanjay Dharwadker, head of the Global ID Consultancy Practice at WCC Smart Search & Match in Europe, explains that identification in these scenarios is changing. “There are two trends that are simultaneously emerging in this respect: strengthening legal identification and physical identification as well. Both are causing additional stress on the passport issuance process as well as at border control.”

On the legal side, he says states are increasingly required to perform checks against (for example) birth and death records (civil registration). Traditionally, this involved more paperwork, but passport-issuing authorities are already making plans to do this digitally. The work in this area heavily depends on ‘biographics’ like names, dates, locations etc. This is further supplemented by what is being called ‘the social footprint’ (not to be mistaken with social media). For example, if you say you have lived in Johannesburg for twenty years, can you show educational or employment records, payslips, utility bills, etc?

“Such linkages to ‘evidence of identity’ are already postulated and are likely to become commonly deployed in the next two to five years. ICAO (the International Civil Aviation Organization, an agency of the United Nations) is already in the process of introducing the necessary policies in consultation with its 191 member states, especially during the period 2018 to 2020.”

On the physical side, the policy, standards and its legal enforcement for biometrics are already in place. Today, all travel documents are mandated to be machine readable (MRTDs). Further, there are interoperable standards for chips that might be part of such MRTDs. If a MRTD has a chip, then storage of facial biometrics is mandatory, while fingerprints and iris recognition are optional.

“In general, any MRTD chip can be read at any border crossing and an ICAO-managed public key interface ensures that the data is not tampered with,” Dharwadker adds. “Devices that do live capture of biometrics also need to conform to the standards, and thus comparison with the biometric data on an MRTD chip is already being done regularly. The automatic border control (ABC) gates are an example, and these predominantly use facial biometrics.”

Over 100 million new MRTDs are issued every year and it is estimated that at least half of them have chips with facial biometrics.

He adds that MRTDs follow the ISO biometric standards. These are formulated by diverse workgroups drawn from national standards bodies, academics, research, industry, professional bodies, UN organisations and governments. These come together under ISO/IEC JTC1/SC37 and after consolidation get incorporated (or referenced) in the ICAO Doc 9303 – the mother standard for MRTDs that is followed by its 191 member states. “ANSI and NIST do a lot of the heavy-lifting required for biometrics standards in their role as the US national standards bodies and also the SC37 hosts.”

Big brother pre-empts you

Whether we are too influenced by Hollywood visions of artificial intelligence and the ability of systems to run diagnostics on the fly, or whether we simply assume these ‘Big Brothers’ will be or are a reality, most people assume that automated biometric recognition is or will be a reality in future. The Chinese government’s multi-year project to roll out facial recognition in many large cities is an example of the future we all fear.

But is automated biometric recognition, such as facial recognition as you walk off a plane, or behavioural biometrics becoming a reality in border environments?

Dharwadker says technologies like these are in the prototyping stage and generally deployed post-facto for crisis management. “After the London subway and the Boston marathon bombing incidents, facial recognition biometrics was said to have been applied to the CCTV footage to help identify the perpetrators, and their movements were also studied.

“As I understand it, CCTV footage is regularly collected at airports. Behavioural biometrics is still in its infancy, but is fast catching up with fingerprint, face and iris due to its capability of more continuous detection in real-time and its application to both crime and fraud. As of now, I can imagine behavioural biometrics to be a potential disruptor amongst the more widely used physiological biometrics that tend to be static and do not add information on a continuous basis.

“The deployment of such technologies, he says, especially at airports, is clearly to minimise the burden on human fatigue, of officials trying to be alert and observe those curious exceptions which might prevent acts of terror.”

By the end of 2030, nearly seven billion individuals will pass through airports every year, a very large number that will mandate more technological eyes on people entering and exiting.

Electronic authorisation

With the use of modern technology and biometrics a given, it seems to be logical that having a paper book with a visa stuck inside is a bit outdated. And so it is.

One of the important components of the new air travel regime, says Dharwadker, will be the Entry and Exit System (EES). “This will go hand in hand with other measures being put in place that include: Electronic Travel Authorisation (in lieu of a paper visa), Advance Passenger Information (API), Passenger Name Record (PNR), check against watch-lists and the Interpol list of stolen and lost travel documents (SLTDs).

“The EES will come in two forms, on back-end systems and in the MRTD chip. However, it will essentially record when a person enters and leaves a country and that the entry and exists records are reconciled. An important measure that is likely to be legally enforced in as early as 2018 is that the outcome of the API can be used for a ‘board/no board’ decision for individuals on flights, thus barring individuals with doubtful credentials from travelling.”

Such measure will be enforced along with a closer look at other aspects of a travel-related profile, such as tickets purchased against cash, or short stay following long-haul flights. So the principle being applied is to take advance action as much as possible before the person reaches the border.

Complexity abounds

The reality is that border security always has and will be a critical issue for governments, and those with poor or incompetent controls are likely to be playing host to an ever increasing influx of criminals and potentially terrorists – not to mention the poor souls just looking for a better life. There is no simple solution, but by understanding the issues and addressing them head on, much of the chaos we find in border control today can be avoided and order re-established.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Facing the future
    November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
  • Automated facial recognition
    November 2017, Access Control & Identity Management, Integrated Solutions
    NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.
  • Using biometrics to prevent financial crime
    November 2017, Access Control & Identity Management, Integrated Solutions
    Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
  • Securing your access security
    November 2017, G4S South Africa, Impro Technologies, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.