Page 59 - Cover Page Sequence-2020.cdr
P. 59
detect flaws and system failures in equipment the specific modus operandi and technical inputs required
before they occur. Use deep learning and to man the respective borders will be impacted by the
planning algorithms to determine maintenance geophysical, demographic and political uniqueness of each
schedules based on operating standards for various border.
components, reducing accidents and unplanned
delays.
21 st century border security challenges need to be
9. Enhanced operations with precision: Use sensor dealt differently than with those of 14 th century solutions
technology to track company movements and i.e. building physical walls and fences – the future requires
quickly identify unknown objects in the field, us to envisage intangible walls which will be less costly, less
thereby better informing command decisions. disruptive, and less politically controversial than a physical
10. Cybersecurity threats: IT and security professionals barrier. The vision should be to build a technological barrier
across government departments are required to - “smart wall” made up of a patchwork of tools like drones
protect their assets, ensuring that sensitive data is and sensors to help surveil and identify unauthorized
secure and the organization is not compromised. individuals crossing the border, specifically in remote
Security operations managers, for example, require stretches of land between established ports of entry. This
on-demand reporting to assist in the management
of security operations. IT administrators need to smart wall is not only highly cost effective and efficient
understand what assets are at the highest risk and in guarding the borders but it will prove instrumental in
what areas need to be patched first. Security analysts ensuring that lives and livelihood of border population is
would be better supported with what-if analyses not disrupted by erection of fences or walls – an aspect
to predict and prevent future cyberattacks and which is critical to cross-cultural profile of the our friendly
activate security control functions. By analyzing Indo-Nepal and Indo-Bhutan borders.
current asset connectivity, vulnerability, and risks
to critical assets, AI can illustrate the current state As the Indo-Nepal and Indo-Bhutan trade
of cybersecurity and demonstrate the path of least environment becomes more interconnected (which is a
resistance an outside threat may take to gain access.
Data analytics, powered by advanced machine positive development) and the movement of people and
learning algorithms, can map threat scenarios, goods across borders increases in complexity, detecting
attack signatures, and vulnerabilities to drive a threats to national security becomes more difficult. A
recommendation engine that provides multiple central goal of SSB’s modernization agenda should be to use
options for remediation, ensuring that emerging innovation and technology to improve its border guarding
threats are flagged in near-real time.
and vigilance ability. The obligation to modernize is
partially driven by the rapidly evolving nature of the threat
landscape – use of new technology is critical to ensure we
are ahead of, or at least keeping up with, our adversaries’
adaptability – but it also reflects political and budgetary
change, meaning the perennial pressures to do more with
less.
With the push to innovate and streamline, it is no
surprise there is keen interest in the potential of Artificial
Intelligence (AI) to enhance scanning and threat detection.
BORDER GUARDING PERSPECTIVE:
On paper, the automation of decisions would enhance both
Guarding international borders in a nutshell means mission effectiveness and governance.
maintaining strict control over the cross border movement
of men and material. This aspect becomes more complex But if AI is the future, the path to get there rests
and critical when we apply it to friendly, open and porous heavily on SSB’s starting point. AI’s success should be built
borders which can be easily misused by anti-national upon a solid foundation of appropriate inputs, including
elements to achieve their ulterior motives. While all border a significant body of scanned images and the appropriate
security agencies share a common overarching mission, algorithms to guide machine learning towards reasonable,
accurate outcomes.
54 57 Anniversary Issue - 2020
th