{"id":86300,"date":"2024-04-05T18:20:30","date_gmt":"2024-04-05T07:20:30","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=86300"},"modified":"2024-04-05T13:05:51","modified_gmt":"2024-04-05T02:05:51","slug":"how-the-australian-border-force-can-exploit-ai","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/","title":{"rendered":"How the Australian Border Force can exploit AI"},"content":{"rendered":"
<\/figure>\n

Our ability to plan for crises, to reduce the uncertainties they present and to quickly diagnose the effectiveness of our actions in novel scenarios\u2014all of this opens up a conversation about the possibilities and challenges of artificial intelligence.<\/p>\n

The extraordinary power of AI to support the Australian Border Force, to analyse data in close to real time, and at scale, is already helping our officers to detect and disrupt all manner of criminal activities. AI is giving us more capacity to detect and disrupt new threats at and before they even reach the border.<\/p>\n

The ABF is well advanced in developing our Targeting 2.0 capability, to incorporate all of our assessments of border-related threats, risks and vulnerabilities along with new data from industry and partners, to support our decision-making.<\/p>\n

Targeting 2.0 seeks to apply the extraordinary power of AI to complement and amplify the deep expertise of our people, to identify new patterns at speed and at scale, to detect and disrupt crime as it happens, and, in time, to get ahead of the perpetual evolution of criminal activities.<\/p>\n

As AI continues to evolve we\u2019re going to be able to look at an increasingly bigger picture and start addressing problems at the systems level\u2014whether in terms of threat discovery, modelling or disruption.<\/p>\n

Our jobs and the world in which we operate are going to be very different in the coming years because of AI\u2014whether it\u2019s strategic planning, preparedness, operational planning and response, augmented decision-making, or being able to respond to or get ahead of threats.<\/p>\n

The concept of digital twins\u2014virtual models designed to accurately mirror a physical process, object or system\u2014is one of the things that has grabbed our attention. And social systems are well in scope, opening the door for policy twins. A digital representation of a policy could include legislation as code, relevant data, modelling tools, impact monitoring and more.<\/p>\n

AI is only going to accelerate our ability to design and implement policy twins as well as other digital twins. Add in the incredible horsepower of quantum computing, and we\u2019ll be able to have digital and policy twins of things as complex as the entire Australian border and all its related infrastructure and systems. We should eventually be able to model the effects of a crisis across the whole border continuum, more easily, and on an enterprise scale.<\/p>\n

There are many other technological advances contributing to the immense power of AI, including neural network architectures, edge computing, blockchain, and augmented\/virtual reality.<\/p>\n

Another one of the tools at our disposal is Bayesian belief networks\u2014advanced decision-making maps that consider how different variables are connected and how certain or uncertain those connections are in determining an outcome. They aim reduce uncertainty in decision-making, and help to determine the probability of an event based on what we know.<\/p>\n

Imagine an array of sensors and data feeds, technology stacks with learning ability and visualisation tools; now incorporate digital twins, Bayesian belief networks and quantum computing. We\u2019ll be able to model crises and our responses, with augmented decision-making and the ability to monitor those decisions\u2019 impact on complex social systems, during a crisis.<\/p>\n

But the future is hard to predict, and we always have to factor people into our equation. Because AI won\u2019t supplant human judgment, accountability and responsibility for decision making; AI will augment it.<\/p>\n

For many governments, to gain the social license to implement AI systems like I\u2019ve described, building and maintaining trust is key. People must trust that our data is secure, have trust in the information we push to them and they pull from us, trust in our people, trust that we won\u2019t misuse personal information, trust that we won\u2019t act unlawfully or unethically.<\/p>\n

One of the best ways to build trust is to demonstrate, measurably, the benefits to people of sharing their information and data with us. Take truly seamless and contactless travel through digital borders. To collect the data we need from travellers, we need to emphasise the benefits of people providing their biometrics, for example. Travellers will reap economic and personal benefits like time saving and convenience.<\/p>\n

I think we have to introduce human-centric measures of success into our success criteria, budgeting and operating models, so that our AI systems aren\u2019t just based on being good value for money but also having a positive effect on people. We\u2019ll have to monitor for outputs and public impacts to ensure systems are operating as they should, and not leading to unintended bias or harm.<\/p>\n

In Australia more broadly, we\u2019re currently developing a whole-of-government AI policy and legislation and a consistent approach to AI assurance.<\/p>\n

In the ABF we\u2019re focused on developing practical and effective AI guardrails and governance, and robust data science.<\/p>\n

For us, it\u2019s not just about ethical and responsible design of AI systems. It\u2019s also about assurance\u2014monitoring of outputs and impact, ensuring independent oversight of our systems, and appropriate transparency measures.<\/p>\n

Given the threats we will face at our borders, and the likelihood of future crises, we have to start building now to be ready for the future\u2014by assembling vast amounts of data ready to be fed into AI, by getting our people ready to use it, and by genuinely reinforcing trust.<\/p>\n

Those who don\u2019t start building readiness for AI into their systems now are going to have a hard time adapting when it becomes imperative to do so.<\/p>\n","protected":false},"excerpt":{"rendered":"

Our ability to plan for crises, to reduce the uncertainties they present and to quickly diagnose the effectiveness of our actions in novel scenarios\u2014all of this opens up a conversation about the possibilities and challenges …<\/p>\n","protected":false},"author":1943,"featured_media":86302,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1291,1327],"class_list":["post-86300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-artificial-intelligence","tag-australian-border-force"],"acf":[],"yoast_head":"\nHow the Australian Border Force can exploit AI | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How the Australian Border Force can exploit AI | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Our ability to plan for crises, to reduce the uncertainties they present and to quickly diagnose the effectiveness of our actions in novel scenarios\u2014all of this opens up a conversation about the possibilities and challenges ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-05T07:20:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T02:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Outram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Outram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg\",\"width\":800,\"height\":570},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/\",\"name\":\"How the Australian Border Force can exploit AI | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#primaryimage\"},\"datePublished\":\"2024-04-05T07:20:30+00:00\",\"dateModified\":\"2024-04-05T02:05:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3189d49af13a5a30dac2464f757baf4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How the Australian Border Force can exploit AI\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3189d49af13a5a30dac2464f757baf4\",\"name\":\"Michael Outram\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65ff376e59b58dbcd035657d39b77694?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65ff376e59b58dbcd035657d39b77694?s=96&d=mm&r=g\",\"caption\":\"Michael Outram\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-outram\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How the Australian Border Force can exploit AI | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/","og_locale":"en_US","og_type":"article","og_title":"How the Australian Border Force can exploit AI | The Strategist","og_description":"Our ability to plan for crises, to reduce the uncertainties they present and to quickly diagnose the effectiveness of our actions in novel scenarios\u2014all of this opens up a conversation about the possibilities and challenges ...","og_url":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2024-04-05T07:20:30+00:00","article_modified_time":"2024-04-05T02:05:51+00:00","og_image":[{"width":800,"height":570,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg","type":"image\/jpeg"}],"author":"Michael Outram","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Outram","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2024\/04\/ANAO-ABF-a.jpg","width":800,"height":570},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/","url":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/","name":"How the Australian Border Force can exploit AI | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#primaryimage"},"datePublished":"2024-04-05T07:20:30+00:00","dateModified":"2024-04-05T02:05:51+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3189d49af13a5a30dac2464f757baf4"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/how-the-australian-border-force-can-exploit-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"How the Australian Border Force can exploit AI"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a3189d49af13a5a30dac2464f757baf4","name":"Michael Outram","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65ff376e59b58dbcd035657d39b77694?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65ff376e59b58dbcd035657d39b77694?s=96&d=mm&r=g","caption":"Michael Outram"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-outram\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/86300"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1943"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=86300"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/86300\/revisions"}],"predecessor-version":[{"id":86304,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/86300\/revisions\/86304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/86302"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=86300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=86300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=86300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}