Relevant Items

5 Steps Governments Can Take to Secure Their Borders

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Over with 10 countries now issue these more-secure documents and 81 percent of new passports issued now including a smart chip. More than 62% of national IDs issued now include some form of biometrics. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:

Secure Databases

Securely bind the physical identity to the cyber or online identity. The database is a critical resource that can help safeguard borders and travel — when properly used — to assess and verify passengers. Enforce credential-based strong authentication for e-services, leverage the trusted identity profile and work to maintain the chain of trust.

Train Field Officers/Agents

Ensuring that those vetting passengers have the proper training and know what to look for in both arrival and outbound travelers is important. This helps with the noticing of behavior and body language clues, understanding the technologies and electronic components of smart credentials, etc.

Outbound Validation

Proper electronic validation — of both incoming and outgoing passengers — provides high assurance of the integrity and authenticity of the document and allows complete, closed-loop tracking of travelers, significantly mitigating the threat of forgery. While the potential for technology failures is always a possibility, it still provides the means to appropriately process travel documents for secondary inspection.

Advanced Identification Technology

Continuous advancement in technology will be key for identifying passengers. In particular, biometrics of the individual such as fingerprints or even facial recognition could be used. Leveraging these advanced biometric technologies can further mitigate the impersonation threat.

Physical Security of Documents

The physical security features of these documents are essential to validation. Tools like Datacard® Security at Time of Personalization™ can complement supply chain security by reducing the value of blank documents. Variable security features added during the personalization process make fraud more difficult, requiring not only the raw materials, but access to, and understanding of, these personalization technologies.   Learn more about border security and how Entrust Datacard is trailblazing the industry in addressing the challenges of record breaking travel. Download our whitepaper "The Leading Edge of Border Security."

Entrust Datacard