Security

Big data: Border protection's first line of defense

US Canada border

The Department of Homeland Security's biggest weapon in securing American borders is not a fence or a fingerprint, but data -- and lots of it.

DHS and its component agencies clear some 1 million people across U.S. borders and process some 60,000 maritime and air-freight containers daily, just a small portion of the $2 trillion worth of imported goods that enter the country every year.

The incoming flow of goods and people also comprises massive datasets DHS continuously runs against other federal databases – no-fly and watch lists, for example – allowing the agency to differentiate among risks specific to a particular passenger or cargo.

DHS has been collecting and logging these datasets for upwards of 10 years, building petabyte-sized "haystacks of data" in which hide elusive needles of useful information. The department's evolutionary successes in handling the information has turned big data into a big part of its strategy in protecting borders, according to Alan Bersin, assistant secretary of international affairs and chief diplomatic officer for DHS.

Big data, he said, has changed the way DHS looks at borders.

"We typically think of borders as the first line of defense, with hard lines, but in the global context, our job is to keep dangerous people and dangerous things away from the homeland," said Bersin, speaking Oct. 30 at the Bipartisan Policy Center. "We don't do that by looking at borders as the first line of defense, but as the last line."

By Bersin's count, there are three ways to approach the problem. The government's post-Sept. 11 attempt at one of them – looking at every piece of data – was a failure, Bersin said, noting that border personnel can't possibly open every trunk of every vehicle that comes by.

The second, using specific intelligence such as a suspected terrorist's phone number to find the person works only if that specific intelligence is available.

Where DHS has been successful in recent years is with the third approach, making the proverbial haystack smaller, Bersin said. The ability to differentiate among risks "is where big data comes into play," he said.

The case of Umar Farouk Abdulmutallab, the Nigerian man jailed for attempting to bring down Northwest flight 253 over Detroit in 2009 with a bomb hidden in his underwear, is "the seminal case that changed the way we looked at using data," Bersin said.

Abdulmutallab purchased a one-way ticket to the U.S. in Africa and carried no luggage. Today those unusual data points would be scanned against previous flight records and a series of other databases, leading authorities to a rapid secondary examination of such a passenger.

Were Abdulmutallab's scenario to unfold again, DHS's big data efforts would likely have prevented him from getting aboard his target flight. As it was, he was foiled by a quick thinking flight attendant.

About the Author

Frank Konkel is a former staff writer for FCW.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Thu, Oct 31, 2013

A lot of this data is pure garbage and causes useless cargo examinations that produce nothing 99% of the time and only hamper efforts by personnel...

Thu, Oct 31, 2013

All the data in the world (which Big Data people not only lack but are unable to fully and quickly process what they do have) is useless to provide any sort of defense if you do not have a physical presence to identify, intercept, and stop the threat. So if Big Data is the first line of defense then we obviously have a poor line of defense and will continue to do so with that attitude running the show.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group