Introduction
According to Jones and Libicki (2013), Border and Transport Security is an important component of a nation’s security effort, which forms a critical component of the protection of citizens from terrorists and other forms of destruction. Massey (2012) holds the same opinion with the only difference being the introduction of a systems approach perspective. This way, Massey (2012) suggests that Border and Transportation Security (BTS) appears as a “series of concentric circles that from a shell-like structure in which the outer shell is comprised of all the preventive efforts operating beyond the country’s borders” (p.6). Therefore, BTS forms a very important function of the government in ensuring that the interests of the citizens are well protected and that their safety is kept at its peak. Consequently, this document seeks to discuss the concept of borders and transportation security systems by analyzing the possible and existing strengths and weaknesses in BTS. The document will also identify the strengths and weaknesses of the different types of BTS systems predominantly the physical systems and cyber-systems. Finally, the document will also give short outline of some recommendations for best practices for improving border and transportation security systems in both physical systems and cyber-systems.
The Concept of Border and Transportation Security (BTS)
As mentioned in the previous section of this research paper, Wilner (2010) posits that Border and Transport Security forms an imperative component of the security of a country as it is comprised of all activities that culminate in the protection of citizens from terrorists and other forms of destruction. Using the systems approach, Massey (2012) holds it that BTS appears as a “series of concentric circles that from a shell-like structure” (p.5). Using this model, the outer shell is comprised of all the preventive efforts operating beyond the country’s borders. The activities in this shell include arresting suspected and confirmed terrorists and confiscating their weapons even before they gain access to the nation. This makes the outer most shell of the BTS system a very critical aspect of national security and governance. Border screening and interdiction, using security systems dominate the next shell of the concentric circles making up the BTS fabric. Within the BTS fabric, other smaller concentric circles entail the progressively moving resource meant to neutralize any situation in case of an emergency by ensuring that the preparedness and response rate of the border and transport system is at its peak. Due to the criticality of BTS, different nations in the world have put in place strategies meant to ensure that relevant authorities have the highest level of knowledge on the nature of terrorist threats their countries face.
BTS systems are involved in all levels of activities revolving around internationally shipped cargoes by monitoring all movements using a complex set of intertwined conveyance systems run using various types of infrastructure. BTS systems also encompass the conveyance of all internationally shipped cargoes through a number of places for screening and assessment. The cargoes are also held in the custody of various authorities and organizations that scrutinize more than 40 separate documents required to fully compete the stringent assessment process from the source zone to the distribution one (Wilner, 2010). Using this approach to BTS, it is evident that the entire system is more than a physical border as it also entails the flexible and virtual concept of the limiting factors that emanating from one’s interest in travelling to another country. Therefore, the BTS systems can be visualized as the virtual and abstract idea of a border that starts from the point cargoes or people commence their journey to another country (Wilson, 2010).
The Strengths and Weaknesses of BTS systems
One of the most pertinent weaknesses of BTS is the lack of dynamism and adaptability to the changing conditions in the border-to-border interactions (Jones and Libicki, 2013). For instance, different BTS systems in the world have recorded consecutive or simultaneous breaches because of planned terror attacks. Despite the attacks, most of the BTS systems have recorded minimal changes in their structure and functionality since the first officially recorded terror attack. The 90s recorded one of the most rampant terror events in history. This led to the revolution of BTS systems as different governments sought to reinforce their border protection strategies. In 1993, the World Trade Center was attacked, followed by two subsequent attacks in Riyadh and Khobar Towers in Saudi Arabia in 1995 and 1996 respectively (Massey, 2012). Two years later, there were two simultaneous attacks in the Kenyan and Tanzanian Embassies (Jones and Libicki, 2013). These events were followed by the historic attacks on the World Trade Center and the U.S. Pentagon in 2001 (Massey, 2012). Evidently, there had been several attacks recorded each year in different regions of the world despite the existence of BTS systems in such nations. Therefore, the lack of dynamism and adaptability to the changing nature and conditions surrounding border-to-border interactions forms an eminent weakness of the systems.
However, this weakness can be easily countered by one of the eminent strengths of BTS systems; flexibility. The system nature of BTS systems enables it to record the highest level of flexibility in its nature and structure. For instance, since the simultaneous attacks in the Kenyan and Tanzanian U.S. Embassies, BTS systems were compelled to shift their structures to focus on understanding the terrorist threats facing their countries (Stuart and Levis, 2014). In order to understand the nature and extent of terror threats better, BTS systems focused on assessing the countries’ preparedness to cope with and neutralize weapons of mass destruction at the domestic level. This has been a major aspect of the cyber-systems in BTS that has sought to develop sensitive sensors and radar systems to track and identify any potential or existing threats (Wilner, 2010). Even though physical BTS systems play a role in the creation of preparedness, it is highly likely that such systems are fabricated to cope with situations that have not been deciphered early enough.
BTS systems have also been re-structured to explore the terrorist threats and suggest the most potent means to prepare for them. This has been a major strength of cyber-systems that deploys information and communication technology in the gathering of intelligence that has been useful in the identification of suspected or actual criminal and terroristic activities even beyond the borders of the nation. By understanding the behavioral patterns of terrorist groups using intelligence-gathering resources that form an intricate part of a BTS system, the relevant authorities can deploy strategies that boost the preparedness of the nation for any contingencies (Wilner, 2010).
Even so, BTS systems have been recorded to struggle with understanding and mapping out the possible challenges facing national security in the 21st Century (Wilson, 2010). With the advent of globalization and technological advancement, BTS systems have been faced with a series of unprecedented challenges. Globalization has made it easier for people to move from one nation to another. This has fostered the movement of terrorist groups from one region to another especially in countries where extradition rules do not apply (Wilson, 2010). Additionally, technological advancements have created a new threat to the cyber-systems of a nation’s BTS since terrorists have managed to involve tech gurus and geniuses in their cyber attacks. The pre-existing BTS resources were not fabricated to anticipate and neutralize some types of threats that have erupted in the 21st Century (Wilson, 2010). The lack of anticipatory strategies in the cyber-systems of BTS systems has also created an eminent threat to the physical systems that either are caught unawares or lack the capability to handle and neutralize some types of threats. This makes it challenging for BTS systems to fully anticipate some of the terrorist threats faced by 21st Century border authorities.
Recommendations for Practices for Improving BTS
After the close analysis of some of the BTS systems in various countries and regions, the author has a series of recommendations that could culminate in their improvement in their identification, their anticipation, and neutralization of terrorist threats. First, Massey (2012) suggests that it is evident that most BTS systems envision their roles as being limited to the mere domain of physical boundaries. This makes most BTS systems vulnerable to cyber attacks. Therefore, in order to further boost the integrity of BTS systems, it is critical for the relevant authorities to adopt the concept that a BTA system should have a flexible framework. This framework should allow for the possibility that the borders of a country could be stretched to begin at the very point where cargoes and individuals make the decision to commence their journey to another nation. This will ensure that BTS systems are exposed to a significantly wider array of options for border management.
On another note, Wilson (2010) posits that BTS systems could be re-structured using a series of broad re-structuring strategies that culminate in the reinforcement of border security. The assessment of most BTS systems in various nations indicates that current programs and policies fall under several generic categories that include pushing the border outwards, making the border processes more stringent, and the anticipation of major terrorist threats. Even though these have been successful in the recent past, they could be enhanced with the adoption of information and communication technology. The outward movement of the border will ensure that BTS systems intercept and block off threatening people or goods even before they get access to a nation through programs such as the biometric identifiers would culminate in the hardening of borders that would boost their integrity and impermeability. Policymakers could also ensure that the policies and legislations governing borders promote and encourage legitimate trade and travel by making the borders more accessible to such individuals and organizations. Finally, BTS systems should ensure that they deploy the relevant resources required for the effective use of intelligence.
Conclusion
It has been established that Border and Transport Security is an important component of a nation’s security effort, which forms a critical component of the protection of citizens from terrorists and other forms of destruction. It takes the systematic structure described as a series of concentric circles that from a shell-like structure in which the outer shell is comprised of all the preventive efforts operating beyond the country’s borders. This makes BTS a very important function of the government in ensuring that the interests of the citizens are well protected and that their safety is kept at its peak. Due to the criticality of BTS, different nations in the world have put in place strategies meant to ensure that relevant authorities have the highest level of knowledge on the nature of terrorist threats their countries face. However, one of the most pertinent weaknesses of BTS is the lack of dynamism and adaptability to the changing conditions in the border-to-border interactions. Even so, this weakness can be easily countered by one of the eminent strengths of BTS systems; flexibility. The system nature of BTS systems enables it to record the highest level of flexibility in its nature and structure.
References
Jones, S. G., & Libicki, M. (2013). How terrorist groups end: Implications for countering al Qa’ida, Santa Monica, Calif: RAND Corporation.
Massey, D. (2012). Backfire at the border: Why enforcement without legalization cannot stop illegal immigration, Washington, DC: CATO Institute. Retrieved 30th June, 2016 from:http://www.ime.gob.mx/investigaciones/2005/articulos/migracion/backfire_at_the_border.pdf
Stuart, J. E., & Levis, A. E. (2014). The science of command and control: Coping with uncertainty, Washington, DC: AFCEA International Press.
Wilner, A. S. (2010). Targeted killings in Afghanistan: Measuring coercion and deterrence in counterterrorism and counterinsurgency. Studies in Conflict and Terrorism, 33(4), p.307–329.
Wilson, J. (2010). Thinking about crime. New York: Basic Books.