
Advocating on Key Government Contracting Issues
Protecting Our Borders: A Compendium of Federal Contracting Success Stories
Protecting Our Borders: A Compendium of Federal Contracting Success Stories
Table of Contents:

Over the next few years, the United States will take center stage as the world tunes in for the biggest events on the planet — the 2025 Ryder Cup, the 2026 FIFA World Cup, the 250th anniversary of American independence, and the 2028 Olympic and Paralympic Games. These are not just sporting and cultural milestones, they are defining moments that will shape how the world sees America.
To put this into some perspective, consider that a typical modern Super Bowl might pull in 200,000 travelers and generate a billion dollars for the lucky host city.123 By contrast, the 2026 World Cup tournament alone, consisting of 104 matches, is projected to draw around 6.5 million spectators and generate $17.2 billion in GDP for the U.S., Mexico, and Canada, which are jointly hosting the games.4 The U.S.-hosted portion of the tournament is by far the largest, spanning 78 matches across 11 cities.5
This string of mega-events that the United States is set to host offers a once-in-a-generation opportunity for the nation — and for the many federal agencies mobilizing to support them.
Accenture Federal Services conducted extensive research to develop a clear understanding of the challenges and demands that agencies are facing as they plan for these events. Based on that research, we outline clear steps that federal agencies will need to take in areas such as public safety, security, border protection, and travel — and offer concrete solutions to meet them head-on.
Our insights are focused on these five key areas:
- Coordinating across agencies and jurisdictions
- Enhancing public experience and trust
- Modern tools for mega-event security
- Meeting capacity and demand
- Critical technologies for success
To meet this moment, we need new solutions and approaches. We must learn from tactics that have worked previously, but that alone won’t suffice. We’ll also need more technology enablement, more proactivity, more centralization, more visibility and insights, more data-driven decision-making, and more speed to keep pace with today’s dynamic threat landscape.
“We’ll also need more technology enablement, more proactivity, more centralization, more visibility and insights, more data-driven decision-making, and more speed to keep pace with today’s dynamic threat landscape.”
For federal agencies, the question becomes: what capabilities will they invest in to prepare for these events that they can leverage in the years ahead?
Here are five critical technologies that can dramatically improve how agencies prepare for and execute mega-event operations:
- Data mesh: A decentralized data architecture that pulls data from functional silos so it can be easily and rapidly aggregated and analyzed in one place.
- Artificial Intelligence: From fast visa screening to threat detection and citizen services, AI provides the responsiveness and precision mega-events demand.
- Agentic AI: Take AI to the next level by enabling AI agents to act autonomously on behalf of users from completing tasks to initiating workflows.
- Edge Computing: Move data processing closer to where data is generated and deliver rapid insights without waiting for data to be sent to a central system.
- Augmented/Virtual Reality: Bring training, planning and citizen engagement into immersive environments. Simulate scenarios, visualize builds and deliver high-impact training.
Mega-events offer more than spectacle — they present a rare and powerful opportunity for the United States to lead by example. If federal agencies act strategically, these moments can catalyze enduring improvements in security, infrastructure, diplomacy, and public trust.
Read this and more in the full report: www.accenture.com/megaevents.
1https://www.uschamber.com/economy/how-the-super-bowl-crates-economic-impact-across-the-country
2https://www.nlc.org/article/2025/02/07/civic-pride-and-spening-what-the-super-bowl-means-for-host-cities/
3https://www.statista.com/statistics/1362951/super-bowl-attendance/
4https://digitalhub.fifa.com/m/152f754a8e1b3727/original/FFA-World-Cup-2026-Socioeconomic-impact-analysis.pdf
5https://www.nytimes.com/athletic/live-blogs/world-cup-2026-schedule-announcement-live-updates-final/r7oDr4oG9qK4/
The United States' northern and southern borders span vast distances and encompass diverse environments, ranging from densely populated urban areas to remote, uninhabited regions. These borders face persistent threats, including contraband smuggling and human trafficking, which can occur anywhere along their length. While border crossings equipped with customs clearance, cargo inspections, and passport control may appear secure, illegal activities continue to exploit vulnerabilities. Remote areas, in particular, are often easier to cross due to limited monitoring.
To address these challenges, border security efforts increasingly rely on advanced technologies tailored to the unique needs of each environment—from urban centers to isolated regions. These technologies are rapidly deployed, followed by operational startup and comprehensive training to ensure their effective use. Amentum adopts a vendor- and manufacturer-neutral approach to provide the U.S. government access to the latest innovations in border security technology.
Autonomous and Unmanned Systems
Autonomous and Unmanned Systems offer transformative solutions to enhance border security across diverse environments. These systems provide continuous monitoring, rapid response capabilities, and operational efficiency, particularly in areas that are difficult to patrol by foot or vehicle. As a global leader in unmanned aerial systems (UAS) and counter-UAS (C-UAS) services, Amentum delivers cutting-edge solutions to complex challenges, integrating technologies to meet a wide range of operational requirements.
For the U.S. Air Force (USAF) and U.S. Marine Corps (USMC), Amentum supports the entire MQ-9 Reaper enterprise, including global command and control, sophisticated SATCOM nodes, aircraft and sensor maintenance, and ground control station reliability. This expertise is fully transferable to DHS agencies operating similar systems. Beyond the MQ-9, Amentum specializes in re-engineering and sustaining Group 1, 2, and 3 UAS for the U.S. Navy and USMC, leveraging unique solutions developed at its Camarillo, CA facility. These assets are actively engaged in security operations worldwide.
Amentum has also deployed UAS for partner nations along international borders, integrating systems into a unified network that provides real-time video feeds to patrols, regiments, and headquarters. Some UAS are equipped with CBRN sensors to detect chemical, biological, radiological, and nuclear threats, enabling border guards to monitor larger areas and respond more effectively to potential adversaries.
In the realm of C-UAS, Amentum is the premier provider of research, development, testing, and evaluation (RDT&E) services for DHS. Amentum leads efforts to identify, develop, demonstrate, and assess technologies that address emerging threats, directly supporting DHS components such as the U.S. Secret Service, U.S. Coast Guard, Customs and Border Protection (CBP), Federal Protective Service, Transportation Security Administration (TSA), and Immigration and Customs Enforcement (ICE). Key activities include:
- Testing and evaluating late-stage technical readiness level (TRL 6-9) C-UAS systems across various mission areas, including rural, urban, mobile, and static operations.
- Integrating C-UAS systems into commercial and Government cloud information sharing architectures and user interfaces.
- Developing C-UAS analytics products that leverage sensor data to identify emerging threats in specific geographies and events.
- Procuring, installing, integrating, training, and providing field service support for C-UAS systems across DHS components.
- Delivering C-UAS training and integration for agencies with immediate security requirements, ensuring effective decision-making and operational outcomes.
“To address these challenges, border security efforts increasingly rely on advanced technologies tailored to the unique needs of each environment—from urban centers to isolated regions.”
Amentum’s innovative "Drone Defense as a Service" (DDaaS) offers end-to-end, scalable solutions tailored to small, medium, or large operational security needs. As a systems-agnostic service provider, Amentum ensures rapid integration of evolving technologies influenced by artificial intelligence (AI), machine learning (ML), and global events.
Amentum recommends a strong integrator with a broad portfolio of both UAS and C-UAS to lead Golden Dome C-UAS integration “under the Dome” where the challenges to security are as critical as the challenges above the Dome. Amentum is a company offering broad expertise that can facilitate spiral integration of rapidly changing technologies influenced by AI/ML, proliferation, and global events that necessitate rapid engagement.
Land Border Security Systems
Amentum has deployed relocatable, fixed, and vehicle-mounted surveillance towers at international borders, including remote mountainous, desert, and floodplain environments. These towers feature advanced cameras with short- and long-range electro-optical/infrared (EO/IR) and pan-tilt-zoom capabilities. Site selection is informed by geographic, terrain, and seasonal factors, as well as stakeholder insights into typical crossing patterns. Surveillance assets, including radars, EO/IR systems, and communications equipment, are integrated into a common operational picture (COP) at central, regional, and remote sites, enabling seamless coordination with mobile response units. Amentum also designs and implements repair and maintenance facilities, autonomous off-grid solar power sites, and fixed Aerostat systems deployed directly to border regions.
Maritime Border Security
Amentum enhances maritime border security through a comprehensive suite of capabilities, including patrol vessels, onshore and offshore infrastructure, and advanced surveillance systems. These efforts encompass:
- Boat launching systems, maintenance facilities, and
ship simulation training systems. - Docking and mooring infrastructure, vessel hotel services (water, power, fuel, oil, firefighting systems, etc.), and civil maritime infrastructure such as piers, breakwaters, quay walls, basins, and docks.
- Maritime domain awareness systems, including COP/C4ISR platforms, automatic identification systems (AIS), VHF/HF/UHF/LTE communications, radars, and EO/IR cameras.
Integrated Solutions for Comprehensive Border Security
Across air, land, and sea domains, Amentum provides law enforcement and border security agencies with state-of-the-art operational equipment. This includes handheld detection tools (e.g., heart detection devices, vibration ground sensors, radiological detectors) and multiband handheld/desktop radios for reliable communication.
Amentum’s expertise in integrating advanced technologies ensures tailored solutions that address the unique challenges of border security while maintaining operational efficiency and effectiveness.
Partnering with U.S. Customs and Border Protection (CBP) for Mission Achievement
AMERICAN SYSTEMS’ commitment to the CBP’s mission is unwavering: safeguard America’s borders while enabling legitimate trade and travel. The security of our nation’s borders is fundamental to our country’s future, so we built our support on a foundation of operational excellence and innovative concepts, enabling CBP Agents and Officers to perform their duties more effectively and efficiently.
AMERICAN SYSTEMS’ supports two programs that directly advance border protection: the Office of Field Operations (OFO) Arrival and Departure Information System (ADIS) Vetting Unit, and the U.S. Border Patrol (USBP) Program Management Office Directorate (PMOD) Unattended Ground Sensors (UGS) JUMP Team.
OFO, ADIS Vetting Unit: Data-Driven National Security
We provide OFO ADIS technical and analysis expertise, directly affecting border security. The ADIS Vetting Unit’s mission is to vet arrival and departure records, detect overstays, and support interdiction.
Key Activities:
- Overstay Vetting: We help vet overstay cases—critical for maintaining the integrity of U.S. entry and exit systems—by optimizing vetting workflows, implementing robotic process automation, and leveraging data analytics.
- Rapid Response to Operational Needs: We respond to inquiries from field officers, adjudicate redress requests, and supply actionable intelligence. We support decision-making, enabling OFO officers at ports of entry to intercept inadmissible individuals and illicit activities.
- Process Automation/Innovation: By modernizing workflows, we ensure CBP can operate at the pace of emerging threats.
Impacts: The ADIS Vetting Unit delivers tangible benefits to frontline officers, enabling quicker identification of overstays and persons of interest and providing advanced analytics to inform enforcement actions.
“The security of our nation’s borders is fundamental to our country’s future, so we built our support on a foundation of operational excellence and innovative concepts, enabling CBP Agents and Officers to perform
their duties more effectively and efficiently.”
USBP PMOD Unattended Ground Sensors (JUMP Team)
Border security demands cutting-edge solutions and dependable support. With CBP, AMERICAN SYSTEMS established the JUMP Team to supplement Agent capabilities and boost sensor reliability/effectiveness.
Key Activities:
- Deploying/Maintaining UGS Technology: The JUMP Team rapidly deploys, troubleshoots, and supports ground sensors across all border sectors. These sensors provide 24/7 situational awareness.
- Providing Training/Technical Solutions: We field equipment and provide training on sensor operations/troubleshooting, maximizing the utility of deployed technology.
- Inventory and Process Optimization: The JUMP Team drives continuous improvement and streamlines asset management, so agents can focus on mission-critical tasks.
- Proactive Operational Support: By anticipating requirements, we initiate sector communications and develop/implement best practices, reducing downtime and amplifying CBP’s operational reach.
Impacts: Agents/stations using UGS technology receive reliable, responsive support that enhances their ability to detect, assess, and respond to incursions or illicit activities. The JUMP Team expands USBP’s capabilities without requiring additional agents.
Conclusion: Mission-First, Agent-Focused
Our partnership with CBP is guided by a simple principle: the success of the mission is defined by the success of those who carry it out. Every process optimized, technology deployed, and technology request fulfilled by AMERICAN SYSTEMS ultimately empowers CBP Agents/Officers to better protect America’s borders—and, by extension, our collective future.
Founded in 1975, AMERICAN SYSTEMS is one of the largest employee-owned companies in the United States. Based in Tysons Corner, Virginia, we provide IT Solutions, Program Mission Support, Engineering and Analysis, Test & Evaluation, and Training services to Civilian, DoD, and Intel Government customers.
Effective Border Security depends on an integrated and holistic national strategy to physically prevent illegal crossings while reducing the incentive to cross illegally. At the border, this requires a sophisticated network of physical barriers, fixed and mobile sensors, integrated communications, and powerful data analysis capabilities. Increased Artificial Intelligence adoption by both friends and foes will make all of these technologies even more critical.
However, as important as these physical and technological advances are, experience shows that implementing and operating these solutions rarely goes smoothly without close attention to less flashy, but very important, organizational issues.
These physical and technological improvements must be guided and supported by:
- Governance and Coordination to collectively make and enforce the right decisions
- Stakeholder Communications to include the public as participants in solutions
- Workforce Enablement and Empowerment to strengthen each organization’s most vital assets
- Organizational Learning and Innovation to continuously learn and stay ahead of threats
Governance and Coordination processes and bodies are critical in planning interoperable solutions and helping multi-organizational initiatives stay focused. Arc Aspicio has helped Department of Homeland Security (DHS) agencies to establish and manage governance councils and to coordinate over 2,000 Federal, state, local, tribal, and territorial participants in a nationwide emergency communications network.
Stakeholder Communications can do far more than simply build buy-in for initiatives. With border issues, effective communications help to prepare legitimate travelers so they do not distract from enforcement focus, and effective messaging can also help to deter illegitimate travelers. Arc Aspicio has developed and implemented public-facing communications strategies for several DHS agencies related to trade, law enforcement, and risk management.
Workforce Enablement and Empowerment focuses on creating a workforce that has the skills, tools, and mindsets to achieve an agency’s mission. This is especially critical when the workforce must absorb transformational initiatives involving new technologies, mission focus areas, and expectations. Arc Aspicio has supported workforce planning, training, culture development, and HR process improvements across DHS.
"With border issues, effective communications help to prepare legitimate travelers so they do not distract from enforcement focus, and effective messaging can also help to deter illegitimate travelers.”
Organizational Learning and Innovation enables agencies to effectively apply experience insights to continuously improve while also injecting new ideas to dramatically transform operations. Innovation does not just happen-- it is nurtured by a range of clearly identifiable organizational factors. Arc Aspicio has applied these factors through our Innovation Maturity Model to help organizations across DHS to build the processes, culture, and innovation support necessary to learn, adapt, and grow.

CBP and the cloud
Over the last five years, CBP has gradually migrated over 85 percent of their application tier and 40 percent of their database tier to the cloud. This year, the agency expects to receive funding earmarked for the completion of the cloud migration process. Deputy Assistant Commissioner of Software Applications and Services at CBP’s Office of Information and Technology Jay Alalasundaram stated that the push to adopt cloud technology at the agency started in earnest over four years ago, but the use of AI and machine learning technology at CBP is not new. The agency has been using these tools for years by building them into the backbone of their analysis and processing engines. While technology already plays a key role in completing CBP’s mission, generative AI and the cloud have revolutionized what’s possible for the agency.
"The cloud analyzes the images to help officers determine the level of any threats posed to themselves and their K9s before they physically encounter potentially dangerous objects or substances.”
Fentanyl at the border
CBP is using cloud technology to aid in the detection of drug trafficking across US borders. “The officers cannot possibly inspect every car that’s coming to our country. Technology becomes extremely critical to be able to detect some of that stuff,” said Alalasundaram. In these noninvasive inspection (NII) situations, cloud technology helps keep CBP officers safe while inspecting vehicles.
Executive Director of Border Enforcement and Management Systems at CBP Baibhav Devkota described how the agency built a ubiquitous cloud environment at ports of entry, including physical infrastructure and network connectivity.
This system enables CBP to take images of potential threats and ingest them directly into their cloud environment.
The cloud analyzes the images to help officers determine the level of any threats posed to themselves and their K9s before they physically encounter potentially dangerous objects or substances. The panelists emphasized that CBP takes a human-in-the-loop approach to all their technology use: While the cloud provides information, the officer always makes the final decision.
Cloud at the edge
Devkota prioritizes perfecting the agency’s data pipeline and expanding the use of generative AI technology at what he calls the “edge” of CBP’s mission.
The edge is where CBP officers and agents are operating in remote environments without connectivity or physical infrastructure. Before the cloud, technological aid to officers and agents in such situations involved tools like static computer vision models, which scanned the environment for preprogrammed threats. These legacy models couldn’t be updated remotely because they had no connectivity, which meant they were working with potentially outdated information. With the introduction of cloud access, traditional computer vision models have been augmented with generative AI capabilities to provide CBP with a more thorough analysis to stop drug and weapon trafficking attempts.
CBP border screening with the cloud
CBP uses the cloud to enhance passenger and baggage screening at the border. The agency currently uses cloud technology when scanning baggage. Images of suspicious baggage are sent to CBP, which uses tools like Amazon Bedrock, Amazon SageMaker, and other cloud-based tools to detect anomalies. CBP systems sends any anomalous images to their Office of Field Operations officers and operators at the National Targeting Center, who examine the images and determine what actions to take. The use of this technology means travelers don’t have to recheck their bags during domestic layovers, which saves time for passengers transiting through busy airports.
To learn more about how cloud technologies can support your mission, contact AWS.
Homeland Security investigators have access to large volumes of data. But transforming that data into border management intelligence and actionable insight takes unique technology and expertise. DLH builds upon decades of experience developing technology-based solutions and specialized services for DHS to drive mission readiness and protect U.S. borders. Through our partnership with DHS Immigration and Customs Enforcement (ICE) Enforcement Removal Operations (ERO), DLH has built a trustworthy alliance to enforce accountability measures which reduce unauthorized border entry.
DHS increasingly leverages the types of intelligence, surveillance, and reconnaissance (ISR) systems that the U.S. military has depended on - and DLH has supported - for years. While these cutting-edge systems will exponentially increase the quantity and quality of data available to immigration policy makers, data fusion, machine-learning risk scoring, and sophisticated data analysis will be required to ensure leaders are empowered to produce breakthroughs.
Mission-critical AI systems can process dozens of data streams simultaneously, tailored to specific scientific domains. Top-line systems like those DLH deploys can be fed data from a nearly unlimited set of potential sources, including geospatial and biometric data from non-intrusive inspection (NII) systems and Air & Marine Operation Centers (AMOC), for a common operating picture and real-time situational awareness.
"While these cutting-edge systems will exponentially increase the quantity and quality of data available to immigration policy makers, data fusion, machine-learning risk scoring, and sophisticated data analysis will be required to ensure leaders are empowered to produce breakthroughs”
At DLH, machine learning and semantic ontologies organize diverse data elements into logic data models which facilitate real-time analysis. Armed with state-of-the-art processing speeds, stakeholders are presented with real-time analytics, visualizations, threat recognition and decision-support information, and data repositories which can be used to refine processes. Data scientists can produce big-data border insights, including biometric exit analytics, predictive asset maintenance, and more. In sum, data transformation implemented with industry-leading accuracy, fidelity, and speed has the potential to greatly improve agency results, efficiency, and productivity.
Of course, with more data comes a need for heightened security, particularly as it pertains to missions as sensitive as those DHS and CBP undertake. DLH data experts elevate enterprise-level data analysis with zero trust cloud architecture and unmatched precision. Deep insights are extracted from complex data housed within secure systems which minimize risk and leverage DevSecOps automation.
Within the Department of Homeland Security, Customs and Border Protection (CBP) delivers on a critical, two-fold mission: facilitating lawful international travel and trade, and keeping bad actors and their wares from crossing our borders – whether by land, sea or the air.
One essential element of CBP’s work involves screening cargo at ports of entry to make sure it is both correctly labeled and legal to import. With national and economic security on the line, CBP agents must do this effectively and quickly, knowing that delays at the border or ports can disrupt the entire U.S. economy.
According to DHS, on a typical day, CBP screens more than 100,000 shipping containers, processes $9.2 billion worth of imported products, quarantines more than 3,200 biologic products, confiscates more than $180,000 in illicit currency, and seizes more than 2,300 pounds of drugs.
Every. Day.
It’s impossible to screen every single package that comes into the country. So, CBP extends the border to the point of origin by maintaining a network of trusted suppliers and vetted cargo programs. Partnerships on both sides of the border streamline crossings and improve checkpoint efficiency. Technology modernizes screening, accelerates processing, and enhances detection, while generating vast amounts of data for analysis.
CBP’s National Targeting Center acts as a clearinghouse for cargo and trade data, and teams there manage and mine this data looking for insights to help CBP improve the screening process. This is accomplished by targeting the highest risk cargo for closer investigation. The center consolidates data from suppliers, governments and passenger facilitators like cruise lines and airlines. Then analytics are performed on the data to find and mitigate risk, saving time on searches while increasing safety. Insights are shared with field officers in real time.
All of this work requires an intricate combination of intelligence, diplomacy, technology, and mission understanding:
- Intelligence to identify risks
- Diplomacy to build trusted supplier programs
- Technology, advanced analytics and screening tools to accelerate processes; and
- Mission understanding to align the right tools with operational needs
Modernizing Surveillance Tower Systems for a More Agile, Technology-Driven Approach to Border Operations
At the core of CBP’s mission to safeguard the nation’s borders is the need for reliable, advanced and integrated surveillance systems. The modernization and expansion of surveillance tower solutions along the border through the Consolidated Tower and Surveillance Equipment (CTSE) program is mission-critical for the US Border Patrol, by enabling agents to detect, identify, and respond to threats across challenging terrain with increased speed and accuracy.
The CTSE system consists of fixed and relocatable sensor towers, along with communications and power equipment, and delivers next-generation border technology by leveraging AI, cyber and advanced wireless capabilities. This results in secure, unified situational awareness for smarter decision-making. With built-in autonomy, CTSE systems deliver cost-effective border security with improved mission agility, allowing CBP to meet its current requirements and adapt to future needs.
"In every case, the goal is the same: deliver secure, actionable data quickly to the people in the field who protect America’s national and economic security.”
When the Risk is Real, Speed Matters
GDIT brings diverse technological capabilities and deep mission understanding to a broad array of DHS missions. Presently, we partner on cargo targeting; we collaborate with public affairs teams on time-sensitive communications on trade and sanctions; we enable biometric screening work at airports; we support the operations and management of multiple, complex immigration systems; and we integrate next-gen technology to modernize border tower surveillance systems.
In every case, the goal is the same: deliver secure, actionable data quickly to the people in the field who protect America’s national and economic security. We understand the mission, the technology and the needs of DHS’ users. And that’s a mission we’re proud to continuously support.
To secure our borders today and strengthen lawful immigration pathways into the future, our immigration and law enforcement professionals need modern applications that digitize the immigration process. Harmonia is proud to partner with the Department of Homeland Security (DHS) to build digital solutions that convert paper-based processes into automated, event-driven workflows. Our solutions support immigration policy and processes, empowering agents to carry out their missions more efficiently. We pride ourselves on our ability to quickly develop and deploy solutions that can be fielded to meet the immediate needs and scale to support our customers into the future.
Detecting fraud, accelerating legitimate asylum applications
Harmonia has streamlined asylum case handling, increased operational efficiency, and bolstered the nation’s fraud detection and vetting capabilities with the development of the Fraud Investigation National Coordinated Heuristics (FINCH) for the U.S. Citizenship and Immigration Services (USCIS).
In addition to mandatory forms, asylum seekers have to submit numerous artifacts including videos, articles, and other correspondence as part of the application. Additionally, USCIS looks at the social media accounts of the asylum seekers to identify any derogatory information and adds any content into the case file. Previously, this required manual submission, slowing the process and resulting in a high rate of data entry errors that further delayed review. replacing the error-prone, inefficient data entry practices, saving upwards of 10 minutes per document.
"To secure our borders today and strengthen lawful immigration pathways into the future, our immigration and law enforcement professionals need modern applications that digitize the immigration process.”
The FINCH solution refers approximately 24% of all cases reviewed to Fraud Detection and National Security (FDNS) for further investigation. Almost 90% of those cases are determined to contain fraudulent information, illustrating the accuracy of the FINCH review process. To enable this referral, Harmonia has implemented secure messaging pipelines to link FINCH with other DHS systems, including ELIS (Electronic Immigration System), Global, and eCISCOR (the USCIS data warehouse). These integrations allow automated submission of fraud referrals and Enhanced FDNS Review requests directly from source systems without requiring users to re-enter data or log in to separate platforms.
Connecting agencies for more efficient data sharing
The Enterprise Gateway and Integration Services (EGIS) acts as a conduit for the exchange of information between systems within USCIS, DHS, external government agencies, including the U.S. Postal Service and state departments of motor vehicles, and other authorized third parties. The system is used by USCIS as part of the immigration process to confirm addresses, examine financial records, and review criminal history. Harmonia eliminated proprietary middleware systems, implementing microservices to more cost-effectively facilitate the 70 million transactions per week between all of these disparate systems.
SPEEDing visa processing
In order to reduce the case backlog and improve processing times, USCIS embarked on a complete overhaul of the paper-based immigration process. Harmonia developed Service for Product Engineering and Enterprise Delivery (SPEED) to digitize immigration workflows and automate forms. The system improved and enhanced the H-1B lottery system, and was redesigned to better align with the USCIS vision to combat fraud in the H-1B process. Quick adoption of SPEED reduced case processing time from six seconds to one second and reduced H-1B lottery processing time from 35 minutes to five minutes.
Modernizing manual processes for improved efficiency
As part of DHS’s goal to modernize the immigration process, Harmonia has updated critical Enforcement and Removal Operations (ERO) applications, databases, and systems to allow ICE to replace physical paperwork and manual processes involved in case management.
The Enforcement Integrated Database Arrest Guide for Law Enforcement (EAGLE) is a booking application used by ICE law enforcement officers to process the biometric and biographic information of arrested individuals and manage the cases moving forward. Harmonia released a new web-based version of EAGLE nationwide that included all forms, biometric imaging updates, and support for flatbed, i3 and Kojak scanners. The new application significantly improved performance for searches, address validation, court scheduling, and more.
Additionally, Harmonia upgraded and released ICE’s electronic Review and Approval Portal (eRAP), a browser-based application that works with EAGLE Web. eRAP replaces the current manual process using physical file folders and non-digital (paper) content. This digitization now allows for electronic sharing with external partners within the U.S. Government and facilitates packet submissions even working for historic cases that still rely on paper content. This innovation improves operational effectiveness and contributes to a more responsive immigration process overall.
Working at the speed of the mission
Harmonia is proud to lead the digitization of the immigration process. From moving forms online to creating automated workflows to enabling cross-agency data sharing, our solutions speed time to action. We’re empowering agents to make informed field decisions by providing all needed data in easy-to-use applications.
Border security requires evolving solutions to new challenges arising every day. Border management agencies must balance security with the efficient movement of people and goods. From illicit activity to drone incursions, agencies need agile, integrated technologies to stay ahead and address today’s threats.
At Leidos, we work alongside government agencies to solve technical challenges and implement newfound efficiencies – with the goal of delivering solutions that help provide more secure borders and safer communities.
Non-Intrusive Inspection (NII) Systems
Leidos helps U.S. Customs and Border Protection (CBP) secure ports of entry. Our large U.S. footprint of NII solutions includes both fixed and mobile X-ray systems, multi-energy and low-energy portal systems, integrated rail X-ray systems, and radiation portal monitors. These solutions leverage advanced, artificial intelligence (AI)-based technologies to screen cargo containers, trucks, rail cars, and passenger vehicles to enable the rapid detection of concealed threats and contraband.
NII systems are a foundational part of Leidos' border security capabilities — helping frontline officers make fast, informed decisions while minimizing disruption to lawful trade and travel. In one notable instance, Leidos’ VACIS M6500 system supported the seizure of a record-setting shipment of illicit narcotics at the Del Rio-Acuña Port of Entry in Texas.
By flagging inconsistencies in a routine cargo scan, the system helped CBP agents uncover a hidden cache, demonstrating the critical role advanced screening technology plays in disrupting criminal activity.
Breadth of Security Capabilities
While NII systems are central to our mission, they are just one part of Leidos’ comprehensive suite of solutions designed to address the full spectrum of border and homeland security challenges. We help agencies connect disparate systems, gain better situational awareness and respond to threats faster — whether on the ground, in the air, or in cyberspace.
Persistent Surveillance Sensors
Leidos’ Army Long Range Persistent Surveillance technologies integrate sensors that can help detect and classify information in real time under virtually any condition. Our Multi-Function X-Band Radar (MXR) offers advanced counter-drone defense, detecting and mitigating aerial threats proactively to protect our communities.
These solutions are also designed to support security efforts at high profile events with elevated threat levels, e.g. Presidential Inaugurations, professional national and international tournaments, college sports championships, and more.
Centralized Management System
By combining operational and information technologies (IT) with AI and machine learning, border management agencies can automate workflows, enable deeper data analysis of scanned images, and integrate a variety of sensors and data points to create a centralized management system.
With our software solutions, global information can be unified into a comprehensive operating picture, pushing actionable intelligence directly to boots on the ground and supporting accurate and educated decisions at every level. This approach helps CBP to better identify manifest discrepancies, understand risks in the supply chain, and resolve operational inefficiencies with the goal of reducing trade friction.
"Smart, agile, and integrated security leads to more secure borders, safer communities, and the efficient flow of trade.”
Full-Spectrum Cyber
Leidos also brings deep expertise in cyber and mission IT. Our Full-Spectrum Cyber capabilities constantly evolve to counter the cyber threats of tomorrow by encompassing AI and Zero Trust principles that are designed to enhance national security. We help defend government networks and critical systems from external and insider threats and optimize system resiliency.
A Trusted Partner for Smarter Borders
Whether through advanced screening systems, integrated intelligence platforms, persistent surveillance, or resilient cyber infrastructure, Leidos delivers innovative, mission-focused technologies that support CBP and other agencies in protecting the nation’s borders. Our work ensures safer communities, more secure borders, and the seamless flow of lawful trade and travel.
The Challenge: Modernizing DHS Alternatives to Detention
The U.S. Department of Homeland Security (DHS) faces significant challenges with its Alternatives to Detention (ATD) programs. Traditional electronic monitoring, like ankle monitors, is costly, uncomfortable and not suitable for all individuals, particularly minors and family units. This outdated technology limits the effectiveness and scalability of DHS’s oversight of over 7 million non-detained immigrants.
The Solution: Innovative Technology for Enhanced Oversight
To address these issues, MANTECH has partnered with TrustStamp to introduce a new, transformative approach. This partnership combines MANTECH’s advanced analytics with TrustStamp’s innovative Tap-In Band™. This wearable monitoring device is a significant upgrade from traditional ankle monitors, offering several key advantages:
Cost-Effective: It is extremely low-cost, allowing for large-scale deployment.
User-Friendly: Resembling a fitness band, it is unobtrusive, tamper-resistant, hypoallergenic and waterproof, causing no physical discomfort.
Maintenance-Free: The band requires no charging, which eliminates compliance failures due to power issues.
Versatile: It supports minors and family units and can be issued on first contact.
Complementing the Tap-In Band™, MANTECH provides a Tracking and Data Analytics Dashboard. This robust platform offers real-time data, geofencing capabilities and customizable reporting, giving border security organizations greater visibility and control. It supports progressive enforcement strategies and ensures secure, appropriate access to critical information.
"This partnership delivers a pragmatic and highly effective ATD framework, which reins in the costs associated with
current monitoring devices and aligns with the DHS mission to protect America from cross-border crime and illegal im- migration that threatens national security and public safety.”
The Impact: Effective and Scalable ATD
This innovative solution fundamentally transforms how non-detained immigrants are tracked, enabling them to remain in the U.S. under defined policies while maintaining necessary oversight.
By replacing intrusive, costly methods with the discrete and scalable Tap-In Band™, combined with MANTECH’s powerful analytics, the partnership can help border security organizations improve compliance, optimize resources by freeing up detention space and respect individual privacy. This pragmatic framework aligns with the DHS mission to protect national security while managing costs and ensuring a more effective approach to immigration oversight.
Modernizing Government IT with AI: MESA-RA
The Challenge: Modernizing Government IT
The U.S. government faces a major challenge in modernizing its IT systems, which heavily rely on outdated legacy code like COBOL. The pool of developers proficient in these languages is shrinking, and manually translating vast amounts of code is a slow, expensive and complex process. This delay in modernization creates significant security risks and leads to increased costs.
MANTECH's Solution: MESA-RA
MANTECH, a long-standing partner of the U.S. government, developed MESA-RA, a reference architecture and accelerator delivering AI-enabled code assist and translation capabilities. MESA-RA uses agency-selected advanced generative AI (on-prem or cloud-based) and prompt engineering to accelerate and streamline the modernization of this critical infrastructure. It functions as an intelligent assistant for development teams, enabling a "human-machine team" approach.
Developers submit prompts with legacy code snippets, requesting actions like translation, debugging or explanation. MESA-RA then rapidly generates responses, which human developers review and refine to ensure accuracy and compliance. This human oversight is central to MANTECH's commitment to ethical and responsible AI.
"Investing in AI-powered tools is not just about technological advancement; it’s about national security and operational
efficiency."
Key Capabilities and Benefits
MESA-RA offers several key capabilities that directly address the modernization challenge:
- Code Translation: It excels at converting legacy languages like COBOL to modern ones like C++ and Python, preserving functionality. This is crucial for overcoming the scarcity of legacy language experts.
- Code Debugging & Explanation: The tool identifies and suggests fixes for errors, reducing debugging time. It also provides clear explanations of code functionality and adds comments, improving readability for new developers.
- Rapid Development: By automating significant portions of the modernization process, MESA-RA provides near real-time output, saving time and accelerating the deployment of updated systems.
- Enhances Cybersecurity: Modernized codebases are inherently more secure and easier to patch, enhancing national security.
A Strategic Imperative for Congress
Investing in AI-powered tools like MESA-RA is essential for national security and operational efficiency. It helps reduce technical debt, optimize resource allocation and ensure the continuity of operations by mitigating risks associated with a dwindling workforce. MESA-RA is a key solution to support federal agencies in achieving their IT modernization goals, creating a more resilient and efficient digital future.
As border security challenges continue to evolve, the United States must implement innovative, technology-driven strategies to counter both present and emerging threats. Parsons leverages its advanced expertise in biometrics, counter unmanned aircraft systems (CUAS), and infrastructure protection, deploying and testing these solutions in real-world environments to deliver measurable outcomes.
Biometrics Identity Verification
Biometric technology plays a vital role in modern border security by enabling precise and efficient identity verification. At border crossings, airports, and ports of entry, biometric systems such as facial recognition, fingerprint scanning, and iris detection improve security while streamlining operations. For example, facial recognition systems can quickly confirm travelers' identities, reduce wait times, and verify the identities of individuals entering the country. Fingerprint and iris scanning technologies secure access to restricted areas and flag individuals attempting to use false credentials.
Parsons has advanced biometric solutions through initiatives like the Marine Corps Systems Command Rapid Innovation Fund program. This effort led to the development of hardware and software that enable rapid, secure collection and analysis of biometric data, including fingerprints, iris scans, and facial recognition. The technology was rigorously tested in tactical exercises replicating real-world scenarios, allowing users to quickly identify individuals and determine whether they pose a threat or are flagged on watchlists. These systems integrate seamlessly with existing infrastructure, providing real-time data to support informed decision-making.
"As border security challenges continue to evolve, the United States must implement innovative, technology-driven strategies to counter both present and emerging threats.”
CUAS: Growing Threat of Drones
The increase in drones for smuggling, surveillance, and other illicit activities has introduced new challenges to border security. DroneArmor uses radar, radio frequency detection, and AI-driven analytics to detect, track, and neutralize unauthorized drones in real time. This technology provides actionable intelligence to security teams and protects sensitive areas such as border checkpoints, critical infrastructure, and high-risk zones.
To ensure operational reliability, Parsons rigorously tests and refines its CUAS technologies at its Counter UAS Center of Excellence and Technology Integration Center (TIC). These facilities simulate real-world operational scenarios, enabling empirical assessments of detection, tracking, and mitigation systems. By validating these technologies in controlled environments, Parsons ensures their effectiveness in dynamic threat landscapes. These efforts have proven particularly valuable in regions where drones are used for smuggling contraband, allowing security teams to intercept devices before they complete their missions.
Advanced Surveillance and Cybersecurity
Parsons also employs advanced surveillance systems to monitor vast and remote border areas. AI-driven analytics and machine learning algorithms analyze data from radar, thermal imaging, and other sensors, enabling security teams to detect and respond to threats quickly. These systems are particularly effective in rugged or remote environments where traditional surveillance methods may fall short.
Cybersecurity is equally critical as border systems become increasingly interconnected. Parsons’ cybersecurity solutions actively protect communication networks and data systems that support border operations, ensuring data integrity and operational continuity. These capabilities prevent disruptions caused by malicious actors and safeguard the infrastructure that underpins border security efforts.
Collaborative Solutions for Real-World Challenges
Parsons emphasizes collaboration with government agencies, industry partners, and local communities to tailor solutions to specific mission needs. To date, Parsons has deployed over 270 integrated systems combining these technologies to provide comprehensive protection. These efforts are making a tangible difference in securing U.S. borders and ensuring a safer, more resilient future.
What is Adversarial AI?
Adversarial AI refers to malicious attempts by hostile actors—such as foreign nation-states, cybercriminals, and extremist groups—to intentionally deceive or disrupt artificial intelligence (AI) systems. These attacks exploit vulnerabilities in the way AI algorithms are trained or interpret information.
Examples of adversarial AI include:
- Data poisoning: Tricking AI models by subtly changing input data.
- Trojan attacks: Inserting hidden "backdoors" during AI training that enable systems to behave normally until activated by a trigger.
- AI model theft/exploitation: Stealing the internal logic of a U.S. AI system.
A Systemic Risk
AI plays an increasingly crucial role in the protection of critical infrastructure sectors. The U.S. military and federal agencies are actively leveraging AI for critical tasks supporting cybersecurity, surveillance, and secure communications.
While such AI tools can enhance productivity and speed response time, adversarial manipulation of AI can compromise classified information, lead to mission failures, and endanger American lives. Moreover, as AI use grows, so does the potential cyberattack surface.
The Threat to CBP’s Mission
The U.S. Customs and Border Protection (CBP) agency is enabling the integration of AI tools, automation, and decision analysis into its border security mission.
This forward-looking approach holds the promise of realizing CBP’s automated-capable border of the future model, with full technology integration. However, as with any system harnessing the power of AI, there is a real risk that hostile actors will aim to target it with adversarial AI.
In the case of CBP, adversaries might employ various tactics to create chaotic environments—such as missed map points, sensors failing to trigger at the levels needed, and learned predictive models failing to alert for an overflow or surge crossing point. Introducing these gaps into the border security system, in turn, would create opportunities for terrorists, smugglers, human traffickers, and other criminals to exploit.
"Proactive defense against adversarial AI is therefore essential to fortifying CBP’s border of the future model, and data provenance protection—ensuring the integrity, authenticity, and traceability of data throughout its lifecycle—is the critical next phase.”
AI Security is Essential to Border Security
Proactive defense against adversarial AI is therefore essential to fortifying CBP’s border of the future model, and data provenance protection — ensuring the integrity, authenticity, and traceability of data throughout its lifecycle — is the critical next phase. Building early data and learning protection into AI models defends against adversaries entering CBP networks, altering CBP data, and even stealing encrypted CBP data with an intent to eventually decrypt and access it in the future.
Ongoing Defensive Research
Peraton’s ongoing research and development, in partnership with U.S. government agencies, points to promising avenues for countering adversarial AI threats and ensuring data provenance protection, including:
- Building automatic systems that scan for hidden triggers in AI.
- Detecting malware that bypasses AI-based antivirus tools, achieving rates exceeding 90%.
- Preventing data spills.
This work also includes a living catalog of adversarial techniques with more than 30 years of tactics and support data that can be used to test new systems before deployment.
A Call to Action
Collaboration between federal agencies and corporate partners such as Peraton can effectively counter the adversarial AI threat.
This includes sustained funding for adversarial AI research and protection; mandatory AI assessments in testing and deployment; and robust, real-time communication among defense and civilian agencies to unify efforts against adversarial AI.
With strong leadership and public-private sector partnerships, AI tools can be fortified against any adversary’s efforts to turn national strength into vulnerability — at our border and beyond.
The Challenge: Siloed Systems in an Interconnected Mission
The complex nature of immigration enforcement demands seamless collaboration among federal agencies, yet current operations are hampered by siloed systems and manual processes that impede information sharing. Even when agencies have access to shared data systems, artificial barriers prevent efficient access, requiring officers
to manually cross-reference multiple databases.
"Every agency holds their information close to the vest," said Ramiro Garza, SOSi's Operations Manager and former Border Patrol Assistant Chief. "While Border Patrol consistently provides intelligence to the broader community, we receive very little information in return. It's largely a one-way street."
Critical data like entry records, citizenship information, and enforcement activities all reside on the same databases, yet remain walled off between agencies. "I'm asking other agencies to let me see the data because it helps me make a better determination on the ground in the moment," Garza said. "I can run through four other systems to get it, but I just want a direct feed."
The Human Cost of Disconnected Systems
The impact of siloed information extends beyond operational inefficiency — it affects human lives and public safety. Garza said he's seen cases where high-value targets under active investigation were inadvertently released due to lack of information sharing between departments.
Disconnected systems also create gaps in humanitarian protection efforts. Current fragmented systems make it difficult to identify human trafficking patterns. "The lack of a single source of truth, or a single interoperable digital immigration card that enables information sharing across agencies and can identify basic red flags, is a strain on the entire system," said SOSi Capture Director Ivan Veskov.
Without integrated data analysis, agencies may overlook warning signs, such as multiple unaccompanied minors being assigned to the
same sponsor using various aliases. "Vulnerable populations are exploited by bad actors," Veskov said. "However, the United States has an opportunity, through the power of our government agencies and industries, to set the global standard for immigration security.
The Path Forward: Technology as a Force Multiplier
Meaningful integration is achievable. "It isn't that there's a lack of will to share information," said former Border Patrol Chief Raul Ortiz. "I think what really stands in the way more than anything is the acquisition process."
The technology to enable transformation already exists. "Commercial industry doesn't have the restrictions that the government has, so it's
ahead," Ortiz said. "In the cloud environment now, system updates happen automatically."
"By embracing modern digital solutions, agencies can achieve more effective and humanitarian immigration
enforcement while maintaining operational security.”
Artificial intelligence offers particular promise for addressing workforce challenges. "I truly believe that the person who figures out AI and marries it to Border Patrol's ground sensors and all their historic data will be a hero," Garza said. "The data sets are all there. They just have to be willing to make the investment."
Modern systems can implement robust safeguards that enhance security compared to siloed approaches. "When you run a name, there's a log of who ran that name, and there has to be a case associated with that name," said Mark Nemier, SOSi's Director of Law Enforcement Services.
A Call to Action
The technology and expertise needed to transform immigration enforcement through integrated operations exists today. By embracing modern digital solutions, agencies can achieve more effective and humanitarian immigration enforcement while maintaining operational security. The path forward requires commitment to change, investment in technology, and collaboration between government and industry
partners to protect our borders and secure our future.

Questions? Contact events@pscouncil.org






-1.png?width=174&height=59&name=SOSi%20Logo%20Transparent%20(2)-1.png)






