WCC Group - Passenger Screening to combat illegal immigration & cross border crime

In this informative webinar, WCC will provide a high-level overview of the challenges posed when governments use passenger data to secure their borders. This webinar series is of particular interest to government bodies seeking more information on API/PNR passenger screening systems. All governments face increasing demands to control illegal immigration, cross border crime while keeping their citizens safe. More recently, the spread of pandemics such as COVID-19 has added health controls to governments’ priorities.  During the first in a series of webinars on Passenger Screening, WCC will discuss international passenger screening legislation. Passenger Screening plays a crucial role in enabling governments to ensure watertight security at air, sea, and land borders. In this webinar, we look at the legislative aspects of Passenger Screening, such as the ICAO Annex 9 statement, which in 2018 made it mandatory for all UN member states to operate an API (Advance Passenger Information) system. Furthermore, we consider the national legislation options available to governments required to obtain this passenger data from carriers. Our focus is also on a vital - but often overlooked – aspect of Passenger Screening. How must border agencies handle the data once it is made available? We discuss factors such as effective data screening, identifying travelers on watchlists, performing risk assessments, and the actions needed when finding matches. Upon third parties’ requests, or due to certain indicators, specific passengers will require in-depth investigation. The findings are returned to the requesting authority, always respecting data privacy regulations. In future sessions, we will look more closely at other aspects of Passenger Screening such as poor data quality management, watchlist matching & rule-based targeting. We will also demonstrate how advanced Artificial Intelligence algorithms can help with trend analysis and resource planning while identifying the unknown through anomaly detection.

Topics