You are on page 1of 11

RAND Corporation

Report Part Title: Lessons Learned in Border Management


Report Title: MANAGING INTERNATIONAL BORDERS
Report Subtitle: Balancing Security with the Licit Flow of People and Goods
Report Author(s): Daniel M. Gerstein, Anthony Atler, Aaron C. Davenport, Beth Grill,
Amanda Kadlec and William Young
RAND Corporation (2018)

Stable URL: http://www.jstor.com/stable/resrep20003.4

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

RAND Corporation is collaborating with JSTOR to digitize, preserve and extend access to this
content.

This content downloaded from


181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
key organizations, their roles, and their responsibilities
and authorities can be useful for deconflicting activities
for border management. Given the need to balance com- Given the need to
peting national needs—securing borders and facilitating balance competing
commerce—a broad cross-section of the government, the
economy, and the populace should be involved in creating national needs—securing
a border management system. Organizations from the
national to the community level will also play important
borders and facilitating
roles in border management activities. Gaining support commerce—a broad
from communities will be essential: They represent the
“front lines” and must live with the border management cross-section of the
system that is established.
A comprehensive border management system also
government, the economy,
requires a framework that facilitates the movement of and the populace should
information. Such a system should be accepted by each of
the participating organizations and would instill a formal be involved in creating a
commitment to intelligence-sharing. To succeed, this type
of endeavor must have buy-in from the most-senior levels
border management
of the government ministries involved in the nation’s secu- system.
rity, and it must be directed from the top (e.g., from the
office of the president of the country).
Lessons Learned in Border
Exercises from the national to the local level ensure that
border management capabilities are adequately organized,
Management
Much can be learned by examining how other nations
trained, and equipped to address the myriad threats likely
have implemented border management solutions and
to be encountered. They also ensure that border man-
incorporated support from other governmental or non-
agement organizations’ authorities and responsibilities
governmental international donors. The broader lessons
are aligned toward a common purpose, understood, and
learned provide general considerations that could be
coordinated throughout the stakeholder community.
either incorporated directly into or tailored to fit a nation’s
More often than not, developing unity of effort requires
border management system.
putting aside differences among government entities to
In this section, we discuss good practices from a global
work for the common good.
counterterrorism forum and lessons learned from inter-
national border management systems from Jordan, Saudi

11
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
Arabia, Niger, and Morocco. The information on national five miles away on either side of the fence. The system
border management systems was collected from a num- funnels into a joint U.S.-Jordanian command center.8
ber of sources. In some cases, written assessments were Additional work was being done to extend the fence to an
available; in others, articles describing the state of the area of the borders between Israel, Jordan, and Syria near
border contributed to these assessments and have been the Golan Heights and was due to be completed in 2017.
referenced. In the case of Jordan, the authors turned to a Lessons learned from the Jordan experience include
former DoD official in-country when that nation’s border the following:
management system was developed. Command, control, and communications technology
can provide the biggest “bang for the buck,” but invest-
Global Counterterrorism Forum Good ments in technology come with significant sustainment
Practices costs.
The United Nations Counter-Terrorism Center (UNCCT) • Command, control, and communications are essen-
and the Global Counterterrorism Forum (GCTF) coop- tial to integrated border control. Redundancy
erated to produce a set of nonbinding “good practices” should be designed into the system to ensure oper-
for border security and management. Their collaboration ational capability, even as repairs are made.
included a series of conferences and workshops in 2015 • Equipment and technology must be matched
and 2016 to present lessons learned to help countries with training to validate operational plans and
shape policies, programs, and approaches for border secu- ensure that forces can employ the systems.
rity and management. Table 3 includes the 15 best prac- • Repair and replacement costs should be
tices identified through these efforts.7 factored into program planning.
Developing a professional border management capa-
Jordan
bility requires having appropriate training, education,
The United States assisted in building Jordan’s border and exercises for individuals and border units.
management system beginning in 2008, launching a • Mobile training teams are most effective because
$20 million project to build surveillance towers along a they provide the opportunity to train on-site
30-mile stretch of the border with Syria. This program with an organization’s available equipment,
was expanded to include a fully networked fence running rather than paying to have small numbers of
along 275 miles of Jordan’s borders with Syria and Iraq at individuals come to centralized locations.
a cost of more than $300 million (see Figure 2). By 2016, • Foreign (including U.S.) advisers play a critical role in
the system consisted of an advanced border monitoring developing border security capacity but must main-
network, equipped with an array of remote detection, tain a small footprint. Military Engagement Teams
surveillance, and command and control capabilities, which should be designed to visit posts, evaluate opera-
allowed the Jordanian Armed Forces to detect activity tional proficiency, and produce lessons learned.

12
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
TABLE 3
Border Security and Management Good Practices
Good Practice Description
1 Enhance intra-agency cooperation.

2 Enhance interagency cooperation.

3 Enhance international cooperation.

4 Develop and establish comprehensive remote border area surveillance programs.

5 Engage with and empower border communities as key contributors in border security and management.

6 Develop and implement border community policing programs.

7 Develop and implement border security and management information exchange programs and mechanisms.

8 Establish border cooperation centers.

9 Nominate and assign border liaison officers.

10 Conduct joint and coordinated cross-border patrols, as well as joint multi-agency and interdisciplinary operation exercises.

11 Define parameters for cross-border operational engagement.

12 Conduct effective risk analysis assessments.

13 Create national border management strategies and action plans.

14 Establish joint border crossing points.

15 Identify corruption as a serious risk for effective and robust border security and management.

• Comprehensive training programs can include • Fusion centers are important but costly to oper-
sending local officials to such facilities as ate and maintain. They require specialized equip-
the U.S. Customs and Border Patrol train- ment and training for intelligence officers, Quick
ing at the El Paso Intelligence Center. Reaction Forces (QRFs), and data analysts.
• Training effectiveness in large measure • Indigenous border forces may not be accus-
depends on the quality of the trainees. tomed to information-sharing; additional train-
The establishment of a joint intelligence fusion center ing and longer timelines for achieving full
can improve border security, but it will require signifi- operating capacity should be expected.
cant recurring costs.

13
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
FIGURE 2
Jordan Border Security Overview

Syria

160 miles Iraq


of Jordan-Syria border
12 miles
Wadi Glade
115 miles
of Jordan-Iraq border
Israel
Company
Jordan headquarters

Operational
command
287-
mile security
system EO/IR cameras

Ground radars
Saudi Microwave/VHF/HF communications backbone
Arabia Quick reaction team vehicles

Command and control centers

Passive barrier fencing

SOURCE: Adapted from Raytheon promotional materials; Barbara Opall-Rome, “Raytheon-Jordan Border Defense Against ISIS Enters Final Phase,” Defense News,
May 26, 2016.
NOTE: EO/IR = electro-optical/infrared. VHF/HF = very high frequency/high frequency.

14
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
• Fused intelligence must be available to all agen- The terrain along the land borders is desert with varying
cies. It is important to have representatives types of sand and terrain features. However, the border
from the military, intelligence, internal secu- areas are generally open, vast stretches of desert that are
rity, and other groups in the fusion center. inhospitable because of climate and lack of infrastructure.
Program planning and management are important to To secure their perimeters, the Saudis have built a fence
conducting a successful effort. and an earthen berm along both their northern border
• Gaining a first-hand perspective on border security with Iraq and their southern border with Yemen. The
issues before final decisions are made on the imple- construction of Saudi Arabia’s border barrier began with
mentation of new security programs can be invaluable. considerations for sand berms, a metal fence, a pyramid
• Maintaining continuity in program man- of barbed wire, ultraviolet sensors with facial recognition
agement experts provides stability in pro- software, and observation towers every 100 yards (see
gram development and execution. Figure 3).10
• Coordination of border security forces, includ- Lessons learned from the Saudi experience include
ing soldiers conducting mobile patrols, air the following:
force assets, and QRFs, is essential. Border security should be viewed as part of the
• Incentivizing participation in the border forces (with broader antiterrorism portfolio and not just as a way to
higher pay or rations) can prove helpful in offsetting defend the country from larger nation-against-nation
boredom and frustration with postings to remote military assaults.
locations. Deploying regular army units to the bor- • Border management must include all land,
der to supplement border forces is also helpful. air, and sea ports. This is a major chal-
lenge for the Saudis at airports, and in Mecca
Saudi Arabia and Medina during the Hajj season.
Saudi Arabia has disaffected minorities that are suscepti- • Knowledge of the border communities and
ble to outside influence and can help enemies breach the human terrain (in this case, the interaction
country’s borders. The Shia communities of the Eastern and relationships between people living on
Province and in the southern Asir Province, as well as tacit both sides of the border), as well as of the regu-
support among some of its Sunni population for ISIL and lar ground terrain and climate, are essential.
fundamentalist Islam, are of concern.9 Additionally, Saudi • The terrorist threat is often simultane-
Arabia has a history of internal terrorist attacks driven ously local, regional, and international.
by external influences and internal receptivity to jihadist Sharing of security-related information among the
messaging, and it continues to face threats from inside and naturally occurring departmental silos that exist within
outside its borders, because of either domestic economic any government is vital to the success of border man-
problems or aggressive and militaristic foreign policies. agement efforts.

15
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
FIGURE 3
Saudi Arabia’s Border Wall

SOURCE: Jennifer Van Laar, “Saudi Arabia Unveils Badass Anti-ISIS Wall That Makes U.S. Border Look Like Swiss Cheese,” Independent Journal Review, 2015.
Used with permission from Graphic News.

16
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
• An integrated system of operations centers at such as drones, biometrics, and pattern-recognition
the borders and at a central headquarters that software are being used. Without practice and
has direct access to senior decisionmakers pro- training, there will be a loss of agility in response
vides essential command and control linkages. time and an overall loss in system resiliency.
• International intelligence-sharing capabilities are
critical to border security efforts. Outreach to allies Niger
is an effective way of learning about what is hap- The Nigerien government’s plan—the Sahel-Sahara
pening beyond the immediacy of security at the Development and Security Strategy (SDSS or SDS)—takes
border and gaining early warning of a threat. a comprehensive view of border security management.11
• Comprehensive situational awareness of secu- Efforts to control the vast northern desert zones cost
rity along the borders will depend on reaching U.S. $2.5 billion over five years and incorporated good
out to allies and sharing information with other governance and development projects at the local level,
nations beyond a country’s immediate neighbors. particularly directed at vulnerable youth populations.
New technologies and equipment are helpful, pro- Determining success at this stage is premature; it could
vided they are maintained and used properly and opera- take years to be able to measure the full impact of the pro-
tors and forces are properly trained. gram. The European Union has also invested in supporting
• The government requires an integrated infor- security-sector capacity-building and professionalization,
mation technology and communication and the United States is working to build an electronic
system with coordinated procedures and pro- system for identification collection at border-control areas.
cesses. Without these, security forces will be Transit centers run by the International Organization
unable to respond effectively in a crisis. of Migration in Agadez and other migrant traffic transit
• Dust and rugged ground in the desert can wreak points are helpful for identification tracking purposes (see
havoc on equipment, requiring the additional Figure 4).12
expense of replacing vehicle tires and engines more Community engagement has been essential, with the
frequently than under normal working conditions. assistance of the Nigerien security services, U.S. Special
• Once systems and physical security barriers and Operations Forces, and civil affairs teams from the non-
procedures are operational, practice and training are governmental organization Spirit of America. Over time,
required to maintain adequate levels of proficiency. these teams have been able to establish connections with
This is particularly true where new technologies, residents in vulnerable border areas.13

17
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
FIGURE 4
Nigerien Border Security and Community Participants

Niger: Security Facts and Figures (22 April 2015)


L I B YA
35
State capital 4
ALGERIA km EI
Region capital 20,000
Madama
Conflicts
Military base AQMI km France
6
Armed group e 95
un
to
Displaced & refugees from Nigeria abi
/ returnees from Nigeria o ur

Mali Refugees lM
A
Migrants from Libya and Algeria

xxx
2015 Estimation

IDPs MALI Mujao


Agadez
CHAD
150,000
150,000 50,000

km
5
17
France

1,
USA
821 km

Tahoua N'Guigmi

Tillabery 44,000
Zinder Bosso
Niamey
62

Maradi
8

France Diffa
km

USA

CA
BURKINA Dosso 1,497 km

M
FASO

ER
Boko Haram

O
266 km

O
BENIN NIGERIA

N
SOURCE: Adapted from the United Nations Office for the Coordination of Humanitarian Affairs.

18
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
Lessons from the Niger experience include • Youth job creation should run in tan-
the following: dem with border management efforts to
Regional cooperation with neighboring countries and prevent localized radicalization.
the coordination of security efforts with their border
communities is essential to the long-term viability of Morocco
the border management system. Morocco’s unique geopolitical position has given its bor-
• Border security equipment and technology can only ders an outsized prominence in regional relations. Three
be effective if it is properly employed and maintained. border areas in particular have posed unique challenges.
• Authorities must enforce standards and reg- First, the land borders with the Spanish enclaves of Ceuta
ulations for the use of the equipment. and Melilla have been subject to intense pressure from
Community engagement and ownership should be migrants attempting to cross to European soil and from
encouraged by empowering the local authorities to Spanish and European Union desires to see such cross-
provide their own security in conjunction with state ings controlled. Irregular crossings through this Western
mechanisms. Mediterranean route peaked in 2011, then dropped off
• Nongovernmental organizations can assist if perceived before increasing again in 2014 and generating dramatic
as distinct from the state and may be more capable of photos of migrants “streaming” over the fences.14
building trust where formal security services cannot. Second, the Moroccan-Algerian border has been
• Civilian affairs teams that are distinct from state closed since 1994, following escalating restrictions after
security services and are made up of people orig- a bombing in Marrakech, which Morocco claimed had
inally from the area can be established to inter- been carried out with the support of Algerian intelligence
act with communities and assure residents that services. This border has become increasingly securitized
border protections are in their best interest. since 2015, including the addition of a barbed-wire mesh
• Representatives from the local population can be fence that is 2.5 meters high, gates on the Moroccan side,
incentivized to act as “eyes on the ground.” This and a reciprocal ditch on the Algerian side, as well as the
includes employing locals from ethnic border com- addition of more checkpoints on both sides.15
munities that have links on both sides of the border. Finally, a series of mined and barricaded sand berms
Bribery at checkpoints undermines other secu- running from the southwest to the northeast of the
rity efforts and reduces potential tax revenue; disputed Western Sahara consolidated Moroccan gains
oversight mechanisms may help to prevent this against Polisarian guerillas in the 1980s and have fro-
common phenomenon. zen the conflict in place since then.16 The berm features
• Economic development and job training and 10-foot walls, barbed wire, electric fencing, and sentries
creation directed particularly at youth popu- every seven miles.17
lations reduces illegal cross-border trade.

19
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms
FIGURE 5 • Migratory pressures on borders are the result of
Moroccan Border numerous push-and-pull factors and often fluctu-
ate in response to second- and third-order effects
of political, economic, and social dynamics.
Liberalization of trade where feasible will encourage
licit trade and allow for a focus on smuggling issues of
greater concern.
• Price disparities exacerbated by commod-
ity subsidies will continue to drive smuggling,
even in the face of aggressive policing.19
• “Hyper-local solutions” and creative solutions
for subsidies, such as sliding scales and vouchers,
also have the potential to reduce both incentives
for smuggling and illicit pressure on borders.20

Building a Comprehensive Border


Management Capability
Building a comprehensive border management capability
SOURCE: UN Photo/Evan Schneider. flows directly from the foundations, principles, and les-
NOTE: View of the sand wall that runs through southeastern Morocco and the sons learned from the experiences of others in attempting
Western Sahara from the United Nations Mission for the Referendum in Western
Sahara. to develop 21st-century border systems.
These lessons learned are presented as guides and
Lessons learned from the Moroccan experience include insights, rather than as directives, and should be tailored
the following: to meet the specific strategic and operational objectives of
Simple hardening and militarizing of the border tends a nation. They must be sensitive to particular border situa-
to overburden the daily lives of ordinary communities tions, cultural norms, terrain, and local border communi-
rather than address underlying concerns. ties. If not, strong negative responses that do not serve the
• Statistics and threat assessments of both European broader goals of developing an effective national border
and local governments should always be evaluated system are likely.
alongside objective data; diverse incentives and pri- Building Strategic Foundations
orities can sometimes lead to inflated claims about
• A national strategy for border management
security risks surrounding certain border areas.18
should be developed. A national strategy (or

20
This content downloaded from
181.50.15.87 on Tue, 26 Oct 2021 16:43:55 UTC
All use subject to https://about.jstor.org/terms

You might also like