SlideShare a Scribd company logo
1 of 33
Protecting Borders— Contributions from Technology and Innovation CES Government 2011  Mark S. Borkowski Assistant Commissioner,  Office of Technology Innovation and Acquisition January 6, 2011
CBP’s Dual Missions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Uses of Technology… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some Uses of Technology… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Focus of Much of the Public’s Attention…
Border Security and Capability (Between the Ports of Entry) Color-coded border control levels are generated by CBP’s ORBBP process and do not directly account for ICE and USCG efforts on the border. Status as of end of FY 2008
Border Security (Between the Ports of Entry) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Border Security Trends (Correlated to Personnel)
Border Security Trends (Correlated to Pedestrian Fence)
Remote Video Surveillance System  (RVSS) 80-foot Monopole Tower ,[object Object],[object Object],[object Object],[object Object]
Exemplar Technology Deployments (Existing RVSS)
El Centro—Apprehensions (as Share of Total SW Border) Success in San Diego deflects flow to El Centro RVSS Deployments to El Centro
Secure Border Initiative- Network  (SBI net) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
01/13/11 Electro-Optical and Infrared Sensor Package Telephonics ARSS-1 Long Range Ground Surveillance Radar SSCU - Sensor Signal Conditioning Unit  Unattended Ground Sensor (UGS) Receivers Shelter Microwave  Tower Power System SBI net  Block 1 Sensor Tower 2 1 3 5 7 4 6 8
Common Operating Picture (COP) ,[object Object],[object Object],[object Object],[object Object],01/13/11
TUS-1 Video
Current SBI net  Deployments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Departmental Re-assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example Technology Options
Mobile Surveillance Capability (MSS) 38 MSSs currently deployed to the Southwest Border 3 MSSs currently deployed on the Northern Border Provide immediate capability, fill gaps, and back-up other systems Day and night cameras Ground surveillance radar Laser illuminator Data displays Command and control links
Northern Border Integration Demonstration Operational Integration Center (OIC) Conceptual View of OIC Operations
SBI net —Status and Implications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consequences of SBI net  Experience in CBP ,[object Object],[object Object],[object Object],[object Object],[object Object],Along with other CBP experiences—highlighted the need for a more strongly denoted approach to technology innovation and acquisition
The Office of Technology Innovation and Acquisition ,[object Object],[object Object],[object Object],01/13/11
Some Uses of Technology… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Balance Prioritize Integrate Allocate Resources Manage Effectively Eliminate Redundancies
Commissioner’s Focus Programs--2011 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
We are the guardians of our Nation’s borders.  We are America’s frontline.  We safeguard the American homeland at and beyond our borders. We protect the American public against terrorists and the instruments of terror.  We steadfastly enforce the laws of the United States while fostering our nation’s economic security through lawful international trade and travel. We serve the American public with vigilance, integrity and professionalism.
 
Protecting the Border Is An Immense Job Every day, CBP deploys more than 42,000 frontline personnel  to protect nearly 7,000 miles of land border and 327 ports of entry.
… So Is Managing Our Massive Imports In FY 2009, CBP processed $1.7 trillion in commercial imports.
Recent Border Protection Successes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FY 2009 data
Trade Security ,[object Object],[object Object],[object Object],FY 2009 data
Drug Seizures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FY 2009 data; *measured by kilos of weight seized

More Related Content

Similar to Mark Borkowski Presentation

Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
Danie Schoeman
 
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and MergersAssessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
Melanie Brandt
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
Patrick Floto
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx
lorainedeserre
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Security
guest031790
 

Similar to Mark Borkowski Presentation (20)

2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public Transportation2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public Transportation
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
 
Critical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation SectorCritical Infrastructure and Cyber Sec in Transportation Sector
Critical Infrastructure and Cyber Sec in Transportation Sector
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Ten Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved SecurityTen Air Cargo Commandments for Improved Security
Ten Air Cargo Commandments for Improved Security
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
 
Managing the Unimaginable 2010-05-24.ppt
Managing the Unimaginable 2010-05-24.pptManaging the Unimaginable 2010-05-24.ppt
Managing the Unimaginable 2010-05-24.ppt
 
South Africa Mutual Evaluation Report Ratings
South Africa Mutual Evaluation Report RatingsSouth Africa Mutual Evaluation Report Ratings
South Africa Mutual Evaluation Report Ratings
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1Money Laundering Risk Technological Perspective Fina Lv1
Money Laundering Risk Technological Perspective Fina Lv1
 
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and MergersAssessing IT Security and Compliance Risk for Acquisitions and Mergers
Assessing IT Security and Compliance Risk for Acquisitions and Mergers
 
CitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_AnalysisCitizenReporting_for_Crime_Analysis
CitizenReporting_for_Crime_Analysis
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx2Cloud computing threats One of the biggest challenges informa.docx
2Cloud computing threats One of the biggest challenges informa.docx
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Security
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 

More from svito

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentation
svito
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
svito
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentation
svito
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
svito
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
svito
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentation
svito
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1
svito
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Program
svito
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentation
svito
 

More from svito (9)

Kevin Plexico presentation
Kevin Plexico presentationKevin Plexico presentation
Kevin Plexico presentation
 
Paul nicholas presentation
Paul nicholas presentationPaul nicholas presentation
Paul nicholas presentation
 
David silverberg presentation
David silverberg presentationDavid silverberg presentation
David silverberg presentation
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Day 2 intro slide fr com score
Day 2 intro slide fr com scoreDay 2 intro slide fr com score
Day 2 intro slide fr com score
 
Evan Kohlmann Presentation
Evan Kohlmann PresentationEvan Kohlmann Presentation
Evan Kohlmann Presentation
 
CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1CES Government Conference Intro_slides_day1
CES Government Conference Intro_slides_day1
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Program
 
LTG. Michael Vane Presentation
LTG. Michael Vane PresentationLTG. Michael Vane Presentation
LTG. Michael Vane Presentation
 

Mark Borkowski Presentation

  • 1. Protecting Borders— Contributions from Technology and Innovation CES Government 2011 Mark S. Borkowski Assistant Commissioner, Office of Technology Innovation and Acquisition January 6, 2011
  • 2.
  • 3.
  • 4.
  • 5. Border Security and Capability (Between the Ports of Entry) Color-coded border control levels are generated by CBP’s ORBBP process and do not directly account for ICE and USCG efforts on the border. Status as of end of FY 2008
  • 6.
  • 7. Border Security Trends (Correlated to Personnel)
  • 8. Border Security Trends (Correlated to Pedestrian Fence)
  • 9.
  • 11. El Centro—Apprehensions (as Share of Total SW Border) Success in San Diego deflects flow to El Centro RVSS Deployments to El Centro
  • 12.
  • 13. 01/13/11 Electro-Optical and Infrared Sensor Package Telephonics ARSS-1 Long Range Ground Surveillance Radar SSCU - Sensor Signal Conditioning Unit Unattended Ground Sensor (UGS) Receivers Shelter Microwave Tower Power System SBI net Block 1 Sensor Tower 2 1 3 5 7 4 6 8
  • 14.
  • 16.
  • 17.
  • 19. Mobile Surveillance Capability (MSS) 38 MSSs currently deployed to the Southwest Border 3 MSSs currently deployed on the Northern Border Provide immediate capability, fill gaps, and back-up other systems Day and night cameras Ground surveillance radar Laser illuminator Data displays Command and control links
  • 20. Northern Border Integration Demonstration Operational Integration Center (OIC) Conceptual View of OIC Operations
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. We are the guardians of our Nation’s borders. We are America’s frontline. We safeguard the American homeland at and beyond our borders. We protect the American public against terrorists and the instruments of terror. We steadfastly enforce the laws of the United States while fostering our nation’s economic security through lawful international trade and travel. We serve the American public with vigilance, integrity and professionalism.
  • 28.  
  • 29. Protecting the Border Is An Immense Job Every day, CBP deploys more than 42,000 frontline personnel to protect nearly 7,000 miles of land border and 327 ports of entry.
  • 30. … So Is Managing Our Massive Imports In FY 2009, CBP processed $1.7 trillion in commercial imports.
  • 31.
  • 32.
  • 33.

Editor's Notes

  1. Source: CBP.gov “Securing America’s Borders: CBP Fiscal year 2009 In Review Fact Sheet”
  2. Source: “Securing America’s Borders” fact sheet, FY 2009
  3. Source: “Securing America’s Borders” fact sheet, FY 2009
  4. Source: “Securing America’s Borders” fact sheet, FY 2009