|
|
Washington Technology home > web stories
04/02/04
Eyes in the sky are opening to stop illegal border crossings
By Gail Repsher Emery Staff Writer
Within months, the Customs and Border Protection Agency will begin using unmanned aerial vehicles to identify illegal intruders at U.S. land borders, agency Commissioner Robert Bonner told industry and government executives April 1.
Although hundreds of agents have been added to the border protection staff, securing U.S borders isnt just about people, Bonner said.
We have to use technology, especially in remote areas, Bonner said in Washington at a program sponsored by the McLean, Va.-based Homeland Security & Defense Business Council.
The issue is how we can develop technology that will tell us if people are penetrating our borders at places other than official posts. Were hoping UAVs will be a force multiplier in our detection capabilities, he said.
The agency also needs technology can tell whether cargo containers have been tampered with after they have been screened in a foreign port and are on their way to the United States, Bonner said.
At 18 foreign seaports where the departments Container Security Initiative is in place, containers that have been identified as high-risk for tampering by terrorists are screened by X-ray and radiation detection machines before transport, Bonner said.
But the current container is dumber than a fencepost, he said. We want a container that gives us information about whether it has been tampered with.
More news on related topics:
Homeland Security, Industry news
Intuit Help Desk & Network Monitoring Software Intuit provides Track-It! and Network Monitor - the leading help desk and network management solutions for call tracking, IT asset management, patch management, electronic software distribution, and network performance monitoring. Free demo & trial |
System Management for new Enterprise environments Request white paper which outlines the case for an IT Portal architecture to meet the new requirements placed on IT management. These requirements include IT security; FISMA compliance; managing outsourcing contracts; and more. |
Automating the FISMA process Click here to request our white paper, "Automating the FISMA Process", which describes how automated systems such as BelSecure can help U.S. Federal government agencies comply with the FISMA security process. |
Policy Management vs. Vulnerability Scanning Which is right for you? Vulnerability scanning products test for known vulnerabilities. Policy management products are pro-active by locking the doors in advance of a possible attack. Click to request our white paper. |
Security Within - Configuration based Security Configuration and policy based security systems are a pro-active way to defend against IT security attacks. Click here to request our white papers, "Security Within - Configuration based Security" and "Policy Management vs. Vulnerability Scanning". |
|
|