May 21 - 23, 2012, Hilton Tucson El Conquistador Resort
Register by April 6 and receive up to $100 off!
Download the Border Management Summit Southwest 2012 Final Onsite Brochure
Download the Border Southwest 2011 Attendee List
Want the latest research and policy on special operation efforts worldwide?
Access the Resource Library for free downloads.
Learn more about sponsor & exhibit opportunities
Mark Your Calendar
Tell a Colleague
Become a IDGA Member and receive our weekly newsletter!
Don’t miss this in-depth workshop on emerging border technologies from leading subject matter experts. During this focus day, you can expect smaller, classroom-style sessions and intensive discussions with distinguished class leaders and fellow attendees
The primary challenge of the U.S.-Mexico border is securing it while facilitating
legitimate trade and commerce, and this session will address this through discussing
various modern technology solutions. The UA Tech Park through its Border TEC
program is helping to identify, evaluate, test and deploy new border security
technologies developed by companies, universities and governments.
What will be covered?
How will you benefit?
Bruce A. Wright
Associate Vice President for University Research Parks
The University of Arizona
A recent study analyzed the effectiveness of the various border security technologies
to find the most crucial elements. NACTS surveyed border security professionals,
security specialists, law enforcement officers, members of academia and technology
experts. They compiled a comprehensive list of vital border security technologies
ranging from surveillance cameras to radio repeaters and portable fingerprint
scanners to compare them.
NACTS also designed a system dynamics model to analyze these tools’ effectiveness
and overlay them at the points of interest at the border. After over 40 interviews, a
collection of technologies known as Command, Control, Communication, Computers,
Intelligence, Surveillance, and Reconnaissance (C4ISR) was found to be the strongest
force multiplier along the border. It allows for efficient communication and intelligence
sharing between agencies, more cost-effective operations, stronger operational control
of the border, and increased productivity of personnel, infrastructure and technologies.
D. Rick Van Schoik
Director, North American Center for Transborder Studies
Arizona State University
This presentation will discuss the improved effectiveness and efficiency of credibility assessment in the border environment through the use of AVATAR kiosks. Automated agents (AVATARs) can assist border management officials by automating credibility screening processes and freeing personnel to focus on mission-critical tasks. Because AVATAR kiosks can be replicated, they function as force multipliers to alleviate the traffic load on officers and improve their decision-making. As operational demands increase, the current model of one officer/agent conducting one interview at a time is unsustainable.
Dr. Jay F. Nunamaker
BORDERS Director and Principle Investigator; Regents’ and Soldwedel Professor of MIS
CS and Communication at the University of Arizona
Dr. Elyse Golob
BORDERS Executive Director at the University of Arizona
Mobile Biometric Identification Technologies are being used by a number of federal, state and local jurisdictions. This presentation will discuss the future use of advanced mobile identification technologies based on pilot projects sponsored by the Department of Homeland Security Science and Technology Directorate/Human Factors Division and managed by Sandia National Laboratories.
Principal Member Technical Staff, Systems Research and Analysis Department
Sandia National Laboratories
[ Register Now ]