https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Getty Images

Physical Security: Using IoT to Control US Borders

The prospect of building a border wall has itself hit a brick wall. Building an IoT-based virtual wall would face less resistance.
  • Written by Mary Scott Nabers
  • 24th October 2018

Since his earliest campaign days, Donald Trump has promised to build a physical wall along the U.S border with Mexico. The wall, however, sparks so much controversy from all sides, it is likely to be DOA with Congress.

The cost of a wall would add billions more to the national debt and almost every expert says there is no way that type of structure would ever achieve Trump’s physical security objectives. A wall as the President has suggested would ignore all environmental and land regulations in place today. Despite President Trump’s insistence, Mexico would pay for the project, that country’s president, Enrique Peña Nieto, has vehemently refuted that assertion. If the discussion of the border wall has stoked increase tension between the U.S. and Mexico, actually building a physical wall would undoubtedly heighten them further.

Despite such hurdles, President Trump and the U.S. Department of Homeland Security (DHS) remains committed to the project. DHS has given its U.S. Customs and Border Protection (CBP) agency permission to ignore environmental and land regulations that could otherwise block the construction of the wall. But it is unlikely that Congress will approve the full amount of funding needed to complete the physical security project.

A traditional border fence separating Mexico and the United States.


In the near future, there is a very strong possibility that the Administration and Congress may consider a virtual wall or a virtual border between the two countries.

Using readily-available technology rather than bricks and mortar, border patrol agents could monitor all 2,000 miles of the border in real time. This possibility seems to be leading many politicians to the idea of a virtual border for physical security. Most believe that a virtual border would be more effective, less costly and more humane than a physical wall.

[IoT Security Summit is the conference where you learn to secure the full IoT stack, from cloud to the edge to hardware. Get your ticket now.]

Regardless of the politics surrounding the border, if a virtual wall gets serious consideration, it could result in a windfall of funding for new public safety technology. Once such a virtual is erected, similar public-safety technology could make its way into many of the country’s cities, schools, churches, theaters, restaurants and music venues as a way to protect Americans where they live.

Texas A&M AgriLife was awarded a $3.85 million grant from DHS earlier this month to lead a consortium known as a Center of Excellence for cross-border threat screening and supply chain defense. More universities are likely to receive similar funding.

Last year’s government funding bill provided $1.6 billion for border wall construction. The House is currently considering the Build the Wall, Enforce the Law Act, which provides $23.4 billion to fully fund Trump’s proposed wall along the country’s southern border with Mexico. In 2018, the U.S. spent $22 billion on border security and Trump’s budget calls for $23 billion for 2019.

That’s a lot of funding for any objective. Because of the possibility that a virtual border might replace the concept of a physical wall, many new technologies stand waiting for an opportunity to prove their potential.

The use of drones to survey borders is nothing new. In fact, CBP broke a record last year by flying more drone missions than ever before along America’s borders. CBP completed 635 missions in the 2017 fiscal year, totaling more than 5,625 hours of flight. However, just as agents are using drones, many drug smugglers are using their own drones to watch law enforcement. To counter this, DHS is considering a new drone shield which targets trespassing drones with a radio jammer mounted on a rifle-like stock that allows controlled management of unmanned aerial vehicles up to a kilometer away. In fact, the technology can force them to land via a controlled vertical descent feature.

Facial recognition is also being used for public safety and border security is no exception. DHS has launched a Vehicle Face System which conducts an identity check without requiring individuals to ever leave a vehicle. Secretive tests of the system carried out in Arizona and Texas allowed authorities to collect massive amounts of data almost effortlessly.

The technology allowed agents to capture images of people as they went about their daily routines. The images captured by the Vehicle Face System were then compared to images stored in government databases, including passports, visas and other documents. The objective was to target and identify unauthorized individuals.

Another technology in high demand is geospatial mapping. Efforts are currently underway to map the entirety of the U.S.-Mexico border using the 3D software. While many facets of the project are unknown because of national security, the objective is to help border patrol integrate even more data into an activity detection system.

One final example of technology being used for public safety would have to be photovoltaic (PV) energy harvesting fabrics. While that may sound like something straight out of a science fiction novel, this technology may soon be used at the border. The fabric produces and stores electricity within a fabric weave that is capable of powering portable devices, essentially turning any uniform into a large, portable, external battery. DHS is deploying the technology which allows border patrol agents to be farther from a power source for long periods of time and control drones from their shirt sleeve via a touch screen that is powered by the fabric in their clothing. DHS has issued $800,000 to study and facilitate the implementation of this technology.

Truly, it is a new world. Technology will likely be the best and most economical way to protect America’s borders. If virtual borders become possible, the marketplace for public safety technology could explode.

Mary Scott Nabers is president and CEO of Strategic Partnerships Inc., a business development company specializing in government contracting and procurement consulting throughout the U.S. Her recently released book, Inside the Infrastructure Revolution: A Roadmap for Building America, is a handbook for contractors, investors and the public at large seeking to explore how public-private partnerships or joint ventures can help finance their infrastructure projects.

 

Tags: Security Smart Environments Opinion

Related


  • IoT security
    IoT Device Security: Risk Assessment, Hygiene Are Key
    As devices and data proliferate at the edge of the network, IT pros have encountered new challenges in securing enterprise IT systems.
  • Build Connected Devices on Twilio IoT’s New Platforms
    Does your embedded IoT development team need a tightly integrated, ready-to-deploy IoT platform that lets you quickly build and commission your connected devices to the field? Or does it need a highly flexible IoT platform that lets you reuse your code and do things your way, but still take care of critical security and reliability? […]
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • Addressing Heightened IoT Risk in Health Care
    As digital health technologies proliferate in 2020, there is newfound hope for monitoring patients remotely and triaging patient care. But there is also heightened IoT security risk.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Smart Transportation Projects Foundational for Sustainable Cities
  • IoT Security Best Practices for Industry and Enterprise
  • Tactics for Successfully Selling IoT Technologies
  • Securing IoT at the Edge Is Key to Safe IoT Operations

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

Zero Trust Manufacturing: Navigating Complex Supply Chains to Build Trusted IoT Devices

27th January 2021

IoTConnect and How to Get Started

27th January 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

Zero Trust Manufacturing: Navigating Complex Supply Chains to Build Trusted IoT Devices dlvr.it/RrTDP4 https://t.co/fuH0GrHJrX

27th January 2021
IoTWorldToday, IoTWorldSeries

PKI: The Solution for Designing Secure IoT Devices dlvr.it/RrTDNF https://t.co/KBWcsksAQi

27th January 2021
IoTWorldToday, IoTWorldSeries

Five Guiding Tenets for IoT Security dlvr.it/RrTDGS https://t.co/Ss17Vn4sFw

27th January 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD Silver Sponsor @ONETech_AI! 💡 Learn more about sponsoring Embedded IoT World here:… twitter.com/i/web/status/1…

27th January 2021
IoTWorldToday, IoTWorldSeries

IoTConnect and How to Get Started dlvr.it/RrT1gl https://t.co/6Vci1hvOV2

27th January 2021
IoTWorldToday, IoTWorldSeries

RT @IoTWorldToday: #IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing. https://t.co/S…

27th January 2021
IoTWorldToday, IoTWorldSeries

#IoTsecuritytrends in 2021 will feature new threats given #remotework, #digitalhealth and #edgecomputing.… twitter.com/i/web/status/1…

25th January 2021
IoTWorldToday, IoTWorldSeries

Protecting Your Network Against Ripple20 Vulnerabilities dlvr.it/RrJhpD https://t.co/Q2xe5hoy4U

25th January 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X