SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
wh i te        pa p e r




                                      Border Security:
                                      The Other Story
                                      Common tactics to circumvent illegal border crossing, and
                                      effective deterrents of law enforcement to combat them
by Jake Lahmann
Vice President of Technology
Supercircuits, Inc.

Issued May 3, 2011
                                      When border security comes to mind, people typically think

                                      of long lines at border crossing stations, fence lines, and the

                                      reported apprehension of illegal immigrants. Although those

                                      quintessential images accurately depict daily life at the border,

                                      they certainly don’t tell the whole story.




                                                                                                                  Page 1 of 5



                                         Supercircuits
                                         11000 N. MoPac Expressway #300
                                         Austin, Texas 78759
                                         1-800-335-9777                            Trusted Video Security Solutions since 1989
© Copyright 2011 Supercircuits, Inc      www.supercircuits.com
During the 1990s in the San Diego area, a morning              A traditional method but an increasingly risky one
   southbound commute toward the border routinely                 for smugglers, concealing contraband and illegal
   met with the sight of hundreds of illegal aliens               passengers is still par for the course. To mitigate
   walking north. Today, a person taking the same                 the risk, smugglers are continuously changing how
   commute would be hard-pressed to see any illegal               and where they place the contraband. Smugglers
   foot traffic.                                                  are placing migrants in unimaginable locations,
                                                                  such as engine compartments, dashboards or faux
    Border SeCurity FenCe                                         walls of tractor trailers. Narcotics are typically con-
                                     Along with the               cealed in these areas, too, but they also are stored
                                     increased number             in anything from car tires and fuel tanks to under-
                                     of agents, the               carriage components.
                                     60- mile stretch of
                                     near-impervious              tunnels
                                     border fence has                                                 Another way
                                     dramatically                                                     cartels are circum-
   stemmed the flow of illegal traffic into the San                                                   venting border
   Diego area.                                                                                        security efforts is
   No doubt, the successes in the San Diego area                                                      tunneling. From
   should be celebrated, and many residents, no                                                       fiscal 2008 to 2009,
   longer tackling the large influx, are doing just that.                                             the number of
   However, this same success has caused both the                 tunnels crossing the border increased 62 percent,
   bad and good guys to change their tactics. It has              according to the Department of Justice. No solid
   prompted smugglers to operate in fewer, more-                  estimates exist to determine the value of these
   remote areas, use violence and engage in more                  tunnels to the cartels, but it’s clear that they provide
   elaborate strategies.                                          easy entrance to the United States for thousands of
                                                                  undocumented immigrants and millions of dollars
   On Dec. 14, 2010, U.S. Border Patrol Agent Brian               in smuggled narcotics.
   Terry was killed in southern Arizona by five armed
   bandits. According to agency statistics, Terry was             By sea
   the third agent killed in the line of duty this past           A scenario once common only to southern Florida,
   year; 34 have been killed in the past 15 years.                abandoned boats are now popping up on the
   Terry was assigned to a specialized unit of the CBP            shoreline of southern California. In other cases
   to counter cartel-related smuggling operations                 where the boats are being recovered, people are
   of people and drugs, and bandit activity where                 taking U.S. boats across the border under the guise
   criminal elements are taking advantage of migrants             of fishing trips only to leave the boat with cartel
   and smugglers alike. So, both Terry’s mission and              members and then later meet it with its cargo at a
   passing at the hands of bandits are an icon of the             California boat ramp.
   evolving and violent aspects of the border. Below
   are examples of smuggling activities on the rise.              interior foot traffic
                                                                  Another improvement for border security is inte-
   Vehicle concealments                                           rior border checks on major thoroughfares.

                                                                                                                             Page 2 of 5



                                           Supercircuits
                                           11000 N. MoPac Expressway #300
                                           Austin, Texas 78759
                                           1-800-335-9777                                     Trusted Video Security Solutions since 1989
© Copyright 2011 Supercircuits, Inc        www.supercircuits.com
These checkpoints are proving successful at nab-             cartels will simply threaten violence against a
   bing loads of contraband. However, crafty smug-              person’s family members to gain their service.
   glers are unloading migrants at predetermined                As with mob operations, members of cartels are
   drop-off locations just prior to the checkpoints.            not released from service and continually operate
   The migrants then travel on foot to a pickup point                                          with the knowledge
   for retrieval by the smugglers.                                                             that they or their
   Bribes and blackmail                                                                        family members will
                                                                                               be killed for leaving.
   In much the same way intelligence agents operated
   during the Cold War, cartels do their homework                                                 Gaps exploited
   by identifying proper agents responsible for key                                             Just 37 miles east
   points of entry. They later seek out how they might                                          of San Diego is
   bribe or even blackmail the agents for cooperation.          the Carrizo Gorge Railway, which runs north and
   Similar to the cartels, an inside asset means easy           south and handles both passenger trains and cargo
   traveling for the cartels.                                   crossing to and from Mexico. The railway’s border
   intelligence                                                 crossing is accomplished via a tunnel. To allow for
                                                                normal passage of trains, this tunnel is unsecured,
   In addition to securing and using inside informa-            which makes for an easy point of entry for the
   tion, some cartel members’ sole function is to               smugglers.
   gather intelligence on border security operations.
   Some forms of intelligence-gathering can be as               Carrizo tunnel
   simple as monitoring points of entry and feed-               On the southern side of the fence, this tunnel is
   ing to smugglers real-time information about the             considered property of the local controlling cartel,
   best lanes to use. Others include diligent efforts           which guards the tunnel with armed members to
   to identify undercover vehicles, habits and agency           keep out competing cartels. Migrants wishing to
   capabilities.                                                make passage must first seek permission and pay a
                                                                fee.
   Staging houses
                                                                The cartel’s use of the Carrizo Gorge tunnel in-
   Once inside the border, smugglers will stage both            cludes foot traffic as well as “rail speeders” that al-
   contraband and migrants. The smugglers’ preferred            low for deep and quick interior penetration. These
   buildings are normal, everyday houses in quiet               rail speeders are constructed using material such as
   neighborhoods.                                               bed frames, lawn tractor wheels and engines. Rail
   Kidnapping and threats                                       speeders can operate to speeds beyond 50 mph and
                                                                as they launch at night leave little opportunity for
   Especially in southern Arizona, cartels are kidnap-          border security agents to know the passage oc-
   ping people at rates estimated as high as one per            curred or apprehend them. The use of rail speeders
   day. Cartels are using victims for the purpose of de-        is yet another sign of how innovative and deter-
   manding straight cash payments from relatives and            mined smugglers are in finding alternate means to
   also for conscripting the relatives’ service in smug-        traffic their goods.
   gling operations. Sometimes, in lieu of kidnapping,


                                                                                                                           Page 3 of 5



                                         Supercircuits
                                         11000 N. MoPac Expressway #300
                                         Austin, Texas 78759
                                         1-800-335-9777                                     Trusted Video Security Solutions since 1989
© Copyright 2011 Supercircuits, Inc      www.supercircuits.com
the reSPonSe                                                 Marine operations
   Given the progression in the smugglers’ tactics,              In addition to intercepting the illegal flow of un-
   agencies tasked with securing the border are evolv-           documented migrants and narcotics, CBP plays a
   ing as well.                                                  vital role in providing a strong defense against ter-
   No longer are agencies limited to uniformed of-               rorism. The agency employs 250 vessels from 80 lo-
   ficers creating a visible deterrent and a reactionary         cations throughout the world. In 2009, it increased
   force. Agencies are developing unique attributes              investments by establishing 11 new marine units.
   and taking the best of notes from other law en-               SWAt operations
   forcement agencies and the military.
                                                                 CBP has continued to increase its tactical capabili-
   investigations                                                ties through its SWAT team known as BORTAC,
   A little-known but more notable change in recent              which has been in existence since the 1980s.
   years is the increased use of investigation teams.            BORTAC team members fulfill the role of a typi-
   These teams are conducting interdiction and denial            cal SWAT team by conducting raids and providing
   activities similar to the way the DEA fights drug             specialized assistance to mass disturbances. With
   rings and the FBI undermines organized criminal               their specialized training and many members hav-
   elements.                                                     ing experience in military special operations, the
                                                                 teams also are used for long-duration field surveil-
   Seeking to eradicate cartel assets and other large            lance and enforcement of critical traffic zones.
   illegal enterprises in the interior, CBP has formed
   investigative branches such as the Smuggling                  Politically speaking, it’s probably safe to say that no
   Interdiction Group. Operations include undercover             one has the answer. Will border fence construction
   missions, monitoring interstate traffic, locating             continue? Will additional agents and vital fund-
   drop-off points and stage houses, and stemming                ing be added? Will there be a relaxed immigration
   the flow of southbound cash and weapons.                      policy?
                                                                 What is clear is that no matter the course, there
   Airborne operations                                           will be a continued drive toward using technology-
   In 2005, CBP commissioned the Office of Air and               borne force multiplication tools that drive costs
   Marine, which included 260 aircraft. Today, the               down and increase the flow of information and
   OAM operates 290 unique aircraft modified not                 response.
   only to meet the security needs but also for the
   medical aid of injured migrants in remote areas.              thermal
   Taking benefits of airborne enforcement one step                                       Already seeing use in
   further, CBP is now using one of the military’s                                        border security operations,
   favorite tools, the unmanned aerial vehicle (UAV).                                     thermal imaging devices
   The UAV is delivering the benefits of force mul-                                       will likely experience an
   tiplication with long loiter capability, stealthy                                      even greater use. In recent
   operation and high-end thermal imaging. CBP is                                         years, the cost of thermal
   operating seven UAVs, and trends indicate future                                       imaging technology has
   purchases.                                                                             dropped significantly, while
                                                                                          costs for resolution, optics,

                                                                                                                            Page 4 of 5



                                          Supercircuits
                                          11000 N. MoPac Expressway #300
                                          Austin, Texas 78759
                                          1-800-335-9777                                     Trusted Video Security Solutions since 1989
© Copyright 2011 Supercircuits, Inc       www.supercircuits.com
storage features and durability have increased. Just          During the recent decade, several border surveil-
   a few years ago, handheld imagers retailed at                 lance initiatives and projects did not live out their
   $11,000 per unit, but today they’re available for             full potential. One of the weak areas in an initiative
   nearly half that price.                                       of that scale is developing and maintaining a reli-
                                                                 able, standalone wireless network.
   thermal imager
                                                                 Also during the recent decade, commercially avail-
   A single handheld imager in the hands of an agent             able wireless infrastructure has become prolific,
   tremendously shifts the odds of spotting smug-                secure and reliable.
   glers. Unlike other technologies, handheld imag-
   ers do not require that the target move in order to           Additionally, wireless networks have transformed
   detect it. A target under view of a thermal device            from simply carrying voice to now providing data
   puts off a far greater heat signature than normal             for mobile computing.
   environments do, leaving little chance of successful          Law enforcement across the country is quickly em-
   concealment.                                                  bracing the ease of access to commercial wireless
   In many environments, thermal imagers are so                  networks. It allows even small enforcement teams
   sensitive that fleeing suspects’ footprints and dis-          to deploy surveillance platforms both overtly and
   carded contraband are plainly visible.                        covertly to monitor in real-time from anywhere.
                                                                 It’s a tough job allowing the flow of legitimate traf-
   intelligent video surveillance                                fic while keeping the border secure, being in the
                                     The mere presence           political crosshairs and keeping pace with evolv-
                                     of surveillance             ing targets. It is necessary for readers to become
                                     cameras delivers            informed about the increasing needs of border se-
                                     force multiplica-           curity and how they might lend assistance through
                                     tion on its own by          ideas and technology.
                                     allowing one                After all, everyone is affected by border security,
                                     person to monitor           whether they know it or not.
   multiple sites quickly. However, progressive busi-
   nesses and institutions worldwide are now harness-
   ing the power of video analytics, which seems to be
   a viable tool for border security operations.
   Unlike traditional sensing devices, video analyt-
   ics devices are able to discern between benign and
   nefarious activity using programmed thresholds.
   Such devices have already proven invaluable in
   Israeli border operations.
   With analytic devices in place, agents’ attention can
   be devoted to alarms, rather than serving as the
   detector.

   Wireless infrastructure

                                                                                                                            Page 5 of 5



                                          Supercircuits
                                          11000 N. MoPac Expressway #300
                                          Austin, Texas 78759
                                          1-800-335-9777                                     Trusted Video Security Solutions since 1989
© Copyright 2011 Supercircuits, Inc       www.supercircuits.com

Mais conteúdo relacionado

Destaque

PM quality management
PM quality managementPM quality management
PM quality managementBagus Wahyu
 
Vancouver real estate stats package, August 2013
Vancouver real estate stats package, August 2013Vancouver real estate stats package, August 2013
Vancouver real estate stats package, August 2013Matt Collinge
 
Vancouver real estate stats package September 2011
Vancouver real estate stats package September 2011Vancouver real estate stats package September 2011
Vancouver real estate stats package September 2011Matt Collinge
 
Working class family
Working class familyWorking class family
Working class familydcbalfagon
 
ソーシャルメディアリスクマネジメントー炎上対策ー
ソーシャルメディアリスクマネジメントー炎上対策ーソーシャルメディアリスクマネジメントー炎上対策ー
ソーシャルメディアリスクマネジメントー炎上対策ーGoro Kosaka
 
Chemistry at the University of Leicester
Chemistry at the University of LeicesterChemistry at the University of Leicester
Chemistry at the University of LeicesterTeam MyRSC
 
Diabolic Str8ts #8
Diabolic Str8ts #8Diabolic Str8ts #8
Diabolic Str8ts #8SlowThinker
 
B-bread re-framing Assignment3 by Bread-Winners
B-bread re-framing Assignment3 by Bread-WinnersB-bread re-framing Assignment3 by Bread-Winners
B-bread re-framing Assignment3 by Bread-WinnersViroo Mirji
 
Patchouli livelihoods info for bop mobiles
Patchouli livelihoods info for bop mobilesPatchouli livelihoods info for bop mobiles
Patchouli livelihoods info for bop mobilesRichard Beresford
 
Effects of TMOF-Bti against Aedes outside lab
Effects of TMOF-Bti against Aedes outside labEffects of TMOF-Bti against Aedes outside lab
Effects of TMOF-Bti against Aedes outside labentogenex
 
Str8ts Weekly Extreme #53 - Solution
Str8ts Weekly Extreme #53 - SolutionStr8ts Weekly Extreme #53 - Solution
Str8ts Weekly Extreme #53 - SolutionSlowThinker
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta... Colorado State Library
 
Размещение рекламы в приложении Makeoveridea
Размещение рекламы в приложении MakeoverideaРазмещение рекламы в приложении Makeoveridea
Размещение рекламы в приложении MakeoverideaAleksandr Volodarsky
 
資訊圖表 - WIS 社群編輯室營運日程圖表
資訊圖表 - WIS 社群編輯室營運日程圖表資訊圖表 - WIS 社群編輯室營運日程圖表
資訊圖表 - WIS 社群編輯室營運日程圖表iProspect
 
Evaluation q1 presentation
Evaluation q1 presentationEvaluation q1 presentation
Evaluation q1 presentationAharkness2512
 

Destaque (20)

Manchester
ManchesterManchester
Manchester
 
PM quality management
PM quality managementPM quality management
PM quality management
 
Where we live
Where we liveWhere we live
Where we live
 
Vancouver real estate stats package, August 2013
Vancouver real estate stats package, August 2013Vancouver real estate stats package, August 2013
Vancouver real estate stats package, August 2013
 
Vancouver real estate stats package September 2011
Vancouver real estate stats package September 2011Vancouver real estate stats package September 2011
Vancouver real estate stats package September 2011
 
Working class family
Working class familyWorking class family
Working class family
 
ソーシャルメディアリスクマネジメントー炎上対策ー
ソーシャルメディアリスクマネジメントー炎上対策ーソーシャルメディアリスクマネジメントー炎上対策ー
ソーシャルメディアリスクマネジメントー炎上対策ー
 
Chemistry at the University of Leicester
Chemistry at the University of LeicesterChemistry at the University of Leicester
Chemistry at the University of Leicester
 
Diabolic Str8ts #8
Diabolic Str8ts #8Diabolic Str8ts #8
Diabolic Str8ts #8
 
B-bread re-framing Assignment3 by Bread-Winners
B-bread re-framing Assignment3 by Bread-WinnersB-bread re-framing Assignment3 by Bread-Winners
B-bread re-framing Assignment3 by Bread-Winners
 
Purdue Influential
Purdue InfluentialPurdue Influential
Purdue Influential
 
Patchouli livelihoods info for bop mobiles
Patchouli livelihoods info for bop mobilesPatchouli livelihoods info for bop mobiles
Patchouli livelihoods info for bop mobiles
 
Effects of TMOF-Bti against Aedes outside lab
Effects of TMOF-Bti against Aedes outside labEffects of TMOF-Bti against Aedes outside lab
Effects of TMOF-Bti against Aedes outside lab
 
Str8ts Weekly Extreme #53 - Solution
Str8ts Weekly Extreme #53 - SolutionStr8ts Weekly Extreme #53 - Solution
Str8ts Weekly Extreme #53 - Solution
 
CCNA part 2
CCNA part 2CCNA part 2
CCNA part 2
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
 
Размещение рекламы в приложении Makeoveridea
Размещение рекламы в приложении MakeoverideaРазмещение рекламы в приложении Makeoveridea
Размещение рекламы в приложении Makeoveridea
 
Covert Audio and the Law
Covert Audio and the LawCovert Audio and the Law
Covert Audio and the Law
 
資訊圖表 - WIS 社群編輯室營運日程圖表
資訊圖表 - WIS 社群編輯室營運日程圖表資訊圖表 - WIS 社群編輯室營運日程圖表
資訊圖表 - WIS 社群編輯室營運日程圖表
 
Evaluation q1 presentation
Evaluation q1 presentationEvaluation q1 presentation
Evaluation q1 presentation
 

Mais de Christian Watson

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a ProChristian Watson
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANChristian Watson
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramChristian Watson
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in StoresChristian Watson
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationChristian Watson
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeChristian Watson
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitorChristian Watson
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsChristian Watson
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERSChristian Watson
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchChristian Watson
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesChristian Watson
 

Mais de Christian Watson (12)

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
 
Sanluisobispo casestudy
Sanluisobispo casestudySanluisobispo casestudy
Sanluisobispo casestudy
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
 
Be Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on CrimeBe Prepared: Get the Real Facts on Crime
Be Prepared: Get the Real Facts on Crime
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

White Paper: Border Security: The Other Story

  • 1. wh i te pa p e r Border Security: The Other Story Common tactics to circumvent illegal border crossing, and effective deterrents of law enforcement to combat them by Jake Lahmann Vice President of Technology Supercircuits, Inc. Issued May 3, 2011 When border security comes to mind, people typically think of long lines at border crossing stations, fence lines, and the reported apprehension of illegal immigrants. Although those quintessential images accurately depict daily life at the border, they certainly don’t tell the whole story. Page 1 of 5 Supercircuits 11000 N. MoPac Expressway #300 Austin, Texas 78759 1-800-335-9777 Trusted Video Security Solutions since 1989 © Copyright 2011 Supercircuits, Inc www.supercircuits.com
  • 2. During the 1990s in the San Diego area, a morning A traditional method but an increasingly risky one southbound commute toward the border routinely for smugglers, concealing contraband and illegal met with the sight of hundreds of illegal aliens passengers is still par for the course. To mitigate walking north. Today, a person taking the same the risk, smugglers are continuously changing how commute would be hard-pressed to see any illegal and where they place the contraband. Smugglers foot traffic. are placing migrants in unimaginable locations, such as engine compartments, dashboards or faux Border SeCurity FenCe walls of tractor trailers. Narcotics are typically con- Along with the cealed in these areas, too, but they also are stored increased number in anything from car tires and fuel tanks to under- of agents, the carriage components. 60- mile stretch of near-impervious tunnels border fence has Another way dramatically cartels are circum- stemmed the flow of illegal traffic into the San venting border Diego area. security efforts is No doubt, the successes in the San Diego area tunneling. From should be celebrated, and many residents, no fiscal 2008 to 2009, longer tackling the large influx, are doing just that. the number of However, this same success has caused both the tunnels crossing the border increased 62 percent, bad and good guys to change their tactics. It has according to the Department of Justice. No solid prompted smugglers to operate in fewer, more- estimates exist to determine the value of these remote areas, use violence and engage in more tunnels to the cartels, but it’s clear that they provide elaborate strategies. easy entrance to the United States for thousands of undocumented immigrants and millions of dollars On Dec. 14, 2010, U.S. Border Patrol Agent Brian in smuggled narcotics. Terry was killed in southern Arizona by five armed bandits. According to agency statistics, Terry was By sea the third agent killed in the line of duty this past A scenario once common only to southern Florida, year; 34 have been killed in the past 15 years. abandoned boats are now popping up on the Terry was assigned to a specialized unit of the CBP shoreline of southern California. In other cases to counter cartel-related smuggling operations where the boats are being recovered, people are of people and drugs, and bandit activity where taking U.S. boats across the border under the guise criminal elements are taking advantage of migrants of fishing trips only to leave the boat with cartel and smugglers alike. So, both Terry’s mission and members and then later meet it with its cargo at a passing at the hands of bandits are an icon of the California boat ramp. evolving and violent aspects of the border. Below are examples of smuggling activities on the rise. interior foot traffic Another improvement for border security is inte- Vehicle concealments rior border checks on major thoroughfares. Page 2 of 5 Supercircuits 11000 N. MoPac Expressway #300 Austin, Texas 78759 1-800-335-9777 Trusted Video Security Solutions since 1989 © Copyright 2011 Supercircuits, Inc www.supercircuits.com
  • 3. These checkpoints are proving successful at nab- cartels will simply threaten violence against a bing loads of contraband. However, crafty smug- person’s family members to gain their service. glers are unloading migrants at predetermined As with mob operations, members of cartels are drop-off locations just prior to the checkpoints. not released from service and continually operate The migrants then travel on foot to a pickup point with the knowledge for retrieval by the smugglers. that they or their Bribes and blackmail family members will be killed for leaving. In much the same way intelligence agents operated during the Cold War, cartels do their homework Gaps exploited by identifying proper agents responsible for key Just 37 miles east points of entry. They later seek out how they might of San Diego is bribe or even blackmail the agents for cooperation. the Carrizo Gorge Railway, which runs north and Similar to the cartels, an inside asset means easy south and handles both passenger trains and cargo traveling for the cartels. crossing to and from Mexico. The railway’s border intelligence crossing is accomplished via a tunnel. To allow for normal passage of trains, this tunnel is unsecured, In addition to securing and using inside informa- which makes for an easy point of entry for the tion, some cartel members’ sole function is to smugglers. gather intelligence on border security operations. Some forms of intelligence-gathering can be as Carrizo tunnel simple as monitoring points of entry and feed- On the southern side of the fence, this tunnel is ing to smugglers real-time information about the considered property of the local controlling cartel, best lanes to use. Others include diligent efforts which guards the tunnel with armed members to to identify undercover vehicles, habits and agency keep out competing cartels. Migrants wishing to capabilities. make passage must first seek permission and pay a fee. Staging houses The cartel’s use of the Carrizo Gorge tunnel in- Once inside the border, smugglers will stage both cludes foot traffic as well as “rail speeders” that al- contraband and migrants. The smugglers’ preferred low for deep and quick interior penetration. These buildings are normal, everyday houses in quiet rail speeders are constructed using material such as neighborhoods. bed frames, lawn tractor wheels and engines. Rail Kidnapping and threats speeders can operate to speeds beyond 50 mph and as they launch at night leave little opportunity for Especially in southern Arizona, cartels are kidnap- border security agents to know the passage oc- ping people at rates estimated as high as one per curred or apprehend them. The use of rail speeders day. Cartels are using victims for the purpose of de- is yet another sign of how innovative and deter- manding straight cash payments from relatives and mined smugglers are in finding alternate means to also for conscripting the relatives’ service in smug- traffic their goods. gling operations. Sometimes, in lieu of kidnapping, Page 3 of 5 Supercircuits 11000 N. MoPac Expressway #300 Austin, Texas 78759 1-800-335-9777 Trusted Video Security Solutions since 1989 © Copyright 2011 Supercircuits, Inc www.supercircuits.com
  • 4. the reSPonSe Marine operations Given the progression in the smugglers’ tactics, In addition to intercepting the illegal flow of un- agencies tasked with securing the border are evolv- documented migrants and narcotics, CBP plays a ing as well. vital role in providing a strong defense against ter- No longer are agencies limited to uniformed of- rorism. The agency employs 250 vessels from 80 lo- ficers creating a visible deterrent and a reactionary cations throughout the world. In 2009, it increased force. Agencies are developing unique attributes investments by establishing 11 new marine units. and taking the best of notes from other law en- SWAt operations forcement agencies and the military. CBP has continued to increase its tactical capabili- investigations ties through its SWAT team known as BORTAC, A little-known but more notable change in recent which has been in existence since the 1980s. years is the increased use of investigation teams. BORTAC team members fulfill the role of a typi- These teams are conducting interdiction and denial cal SWAT team by conducting raids and providing activities similar to the way the DEA fights drug specialized assistance to mass disturbances. With rings and the FBI undermines organized criminal their specialized training and many members hav- elements. ing experience in military special operations, the teams also are used for long-duration field surveil- Seeking to eradicate cartel assets and other large lance and enforcement of critical traffic zones. illegal enterprises in the interior, CBP has formed investigative branches such as the Smuggling Politically speaking, it’s probably safe to say that no Interdiction Group. Operations include undercover one has the answer. Will border fence construction missions, monitoring interstate traffic, locating continue? Will additional agents and vital fund- drop-off points and stage houses, and stemming ing be added? Will there be a relaxed immigration the flow of southbound cash and weapons. policy? What is clear is that no matter the course, there Airborne operations will be a continued drive toward using technology- In 2005, CBP commissioned the Office of Air and borne force multiplication tools that drive costs Marine, which included 260 aircraft. Today, the down and increase the flow of information and OAM operates 290 unique aircraft modified not response. only to meet the security needs but also for the medical aid of injured migrants in remote areas. thermal Taking benefits of airborne enforcement one step Already seeing use in further, CBP is now using one of the military’s border security operations, favorite tools, the unmanned aerial vehicle (UAV). thermal imaging devices The UAV is delivering the benefits of force mul- will likely experience an tiplication with long loiter capability, stealthy even greater use. In recent operation and high-end thermal imaging. CBP is years, the cost of thermal operating seven UAVs, and trends indicate future imaging technology has purchases. dropped significantly, while costs for resolution, optics, Page 4 of 5 Supercircuits 11000 N. MoPac Expressway #300 Austin, Texas 78759 1-800-335-9777 Trusted Video Security Solutions since 1989 © Copyright 2011 Supercircuits, Inc www.supercircuits.com
  • 5. storage features and durability have increased. Just During the recent decade, several border surveil- a few years ago, handheld imagers retailed at lance initiatives and projects did not live out their $11,000 per unit, but today they’re available for full potential. One of the weak areas in an initiative nearly half that price. of that scale is developing and maintaining a reli- able, standalone wireless network. thermal imager Also during the recent decade, commercially avail- A single handheld imager in the hands of an agent able wireless infrastructure has become prolific, tremendously shifts the odds of spotting smug- secure and reliable. glers. Unlike other technologies, handheld imag- ers do not require that the target move in order to Additionally, wireless networks have transformed detect it. A target under view of a thermal device from simply carrying voice to now providing data puts off a far greater heat signature than normal for mobile computing. environments do, leaving little chance of successful Law enforcement across the country is quickly em- concealment. bracing the ease of access to commercial wireless In many environments, thermal imagers are so networks. It allows even small enforcement teams sensitive that fleeing suspects’ footprints and dis- to deploy surveillance platforms both overtly and carded contraband are plainly visible. covertly to monitor in real-time from anywhere. It’s a tough job allowing the flow of legitimate traf- intelligent video surveillance fic while keeping the border secure, being in the The mere presence political crosshairs and keeping pace with evolv- of surveillance ing targets. It is necessary for readers to become cameras delivers informed about the increasing needs of border se- force multiplica- curity and how they might lend assistance through tion on its own by ideas and technology. allowing one After all, everyone is affected by border security, person to monitor whether they know it or not. multiple sites quickly. However, progressive busi- nesses and institutions worldwide are now harness- ing the power of video analytics, which seems to be a viable tool for border security operations. Unlike traditional sensing devices, video analyt- ics devices are able to discern between benign and nefarious activity using programmed thresholds. Such devices have already proven invaluable in Israeli border operations. With analytic devices in place, agents’ attention can be devoted to alarms, rather than serving as the detector. Wireless infrastructure Page 5 of 5 Supercircuits 11000 N. MoPac Expressway #300 Austin, Texas 78759 1-800-335-9777 Trusted Video Security Solutions since 1989 © Copyright 2011 Supercircuits, Inc www.supercircuits.com