I.INTRODUCTIONBordersareacriticalpartofacountry'ssecurity,protectingcitizensandkeepingthemsafefromindividualsandgroupsthatthreatensecurityonmultiplelevels.Inaddition,borderpatrolteamsareessentialinmaintainingpeaceintheregionandkeepinginvadersandmaliciousindividualsoutofthecountry.Manytechnologies,suchassurveillancecameras,biometricscanners,andthermalimagingsystems,canbeusedtoprotectborders.Thesetechnologieshaveadvancedsignificantlyovertheyears.Forexample,facialrecognitionsoftwareisanessentialtechnologicaladvancementinbordercontrol,whichcaneasilyandquicklyidentifyindividuals.Thissoftwarecangatherinformationaboutwhoentersorexitsaregionbyscanningtheirfacesatbordersorairports.Modernbordercontrolisacomplexsystem.Ithasmultiplelayersofsecurity,andmorethanonecountrymanagestheborder.Bordercontrolhasevolvedfrombeingaphysicalbarriertothedigitalworld,developingvarioustechnologiesforthispurpose,classifiedintotwogroups:(1)Technologiesforthedetectionandpreventionofillegalactivitiesand(2)Technologiesfortheidentificationandverificationoftravelers.Thisworkdescribesmultiplecasesoflandbordersecuritycontroltechnologiesthathavebeeneffectivelyappliedinvariouscountriesoftheworld,aswellasthoseindevelopment,inthedevelopmentsection.Themethodologysectionspecifiestheprocessofobtainingreferenceinformationforthiswork.Theresultssectionexplainsanddiscussessomefindings,approaches,anddilemmas.Finally,theconclusionsarepresented.DEVELOPMENTCurrently,multipleoperationaltechnologiesforlandbordercontrolareshowninFigure1(Fig.1).Wirelessdevices,mobilesecurityunits,fiberopticsforcommunications,andfixedandmobilemonitoringstationsexist.ISSN-E:2697-3650MinervaJournal10Fig. 1. Technologies used in land border security control systemsThesecurityoffiberopticcommunicationisatechnologythatwasdevelopedtoprovidemoresecurecommunication.Ithasbecomethemostpopulartechnologyforbordercontrol,beingusedintheUnitedStatessincethe1990s.Theuseoffiberopticcommunicationsecurityhasbeenimplementedfordecadesinthemilitaryandgovernmentsectors.Thetechnologyhasbeendevelopedtoitscurrentstatethroughdecadesofresearchanddevelopment.Theuseoffiberopticcommunicationsecurityhasmadeitpossibleforbordercontrolagenciestodetectintrudersandtracktheirmovements,aswellasprovideprotectionfortheiremployeesagainstterroristattacks.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) Theuseoffiberoptictechnologyforbordercontrolhasbeenaroundforsometime.CountriesliketheUnitedStates,Canada,Mexico,andAustraliahaveusedthistechnologyfordecadestokeeptheirborderssafeandsecure.Multipletechnologiescanbeusedforbordercontrol.SometechnologiesusedinbordercontrolsystemsarepresentedinTable1,alongwiththeirapplication,scope,andtechnicalcharacteristics.ISSN-E:2697-3650MinervaJournal11Table 1. Technologies used in land border security control systems.Table2presentstechnologiesusedinbordersystemsfordetectingobjects(weapons,drugs,etc.)onpeople'sbodies,aswellastrackingvehiclespassingthroughrestrictedareas.ThetechnologiesinTable2employmultipletechnologiessuchasradiofrequency,X-ray,gamma-ray,radar,thermalcameras,andimageanalysis.TheadvantageofthetechnologiesdescribedinTable2istoprovidevisualizationthroughorganictissue,solidobjects,andgaseoussubstancesandevendetecthotzonessuchasengines,people,andfirearmsinareasofpoorvisibilitywithoutaffectingthepeopletowhomthesetechnologiesareapplied.Currently,surveillancedronesareusedatbordercrossingstodetectandtrackobjects,people,andvehicleswiththeadvantagethattheseactivitiescanbecontrolledfromfixedposts,eliminatingtheneedforhelicoptersandtheneedtoapproachsafelywithoutriskingthesafetyofbordercontrolpersonnel.Table 2. Some technologies are used in border control systems for object tracking anddetection.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) Robotshavebecomewidespreadasaninstrumentfordetectingintrudersatthebordersandsendinginformationtothecontrolcenter.Inhostileenvironments,robotsshowexcellentperformance.Automatedvehicleswithmonitoringsystemsbasedonfacialrecognitionanddetectionalgorithmshavebeendeveloped.Thepresenceofhumanbeingsisverifiedthroughthesystem,whichthenexecutesthefacialrecognitionalgorithmtocomparethemwithknownsoldierdataandidentifyintruders.TheHAARalgorithmhasbeenemployedforfacedetection,andtheCNNalgorithmhasbeenusedforfacialrecognitioninthesedevelopments[1].Itisanticipatedthatinthefuture,therewillbemoreregularuseofrobots,radarnetworks,andcamerasforthesetasksduetothevastbordersforwhichmorepatrolpersonnelandvehicleswillberequired[2].TheintroductionofelectronicpassportscontainingchipsandRFIDtechnologyhasbeenproposedtoachievemoreintelligentandsafercontrol.Greatersecurityisconsideredbecausethechipinformationislockedandcannotbemodifiedortamperedwith,includingthestoredphoto.So,ifthereisaduplicate,thiswilltriggeralarms[3].Despitethebenefits,somepeopleviewbiometrictechnologiesasevokingfearsofprivacyandpubliclibertiesviolations.TheEuropeanUnionhasmadeadvancementsinmanagingitsmigratoryflows,forwhichithasincreaseditsrelianceontechnologyinbordermanagement.Developmentshavebeenimplementedprimarilyintwoareas:usingunmannedaerialvehiclesordronesandimprovinginformationandsurveillancetechnologies[4].ThetechniquesemployedforbordercontrolinTurkeyhaveseentheurgentneedforincreaseduseoftechnology.However,inadditiontodetecting,filtering,andpreventing"illegal"bordercrossings,smuggling,andterrorism,thehumanitarianaspectofsavingthelivesofmigrantshasalsobeenconsidered[5].TheIndianborderguardhasinstalledandadoptednewtechnologiessuchascameras,nightvisiondevices,andradars.TheneedfortheInternetofThings(IoT)hasbecomeevidentforbetterinformationmanagement,whichhasalreadybeenadoptedonasmallscaleandinlimitedareas.Thefast-decision-makingprocessprovidesreliabilityandappropriateresponsestosecuredangerousborderareas,eveninextremeweatherconditions,diverseterrain,riverineterrains,denseforestareas,andinaccessibleareasthatarecomplicatedtomonitorbypersonnel.Theproject"SmartBorderSecuritySystemusingInternetofThings"proposesalow-costsolutionusingPassiveInfraredSensors(PIR)andtheOV7670cameramoduletodetectthemovementofanyobjectwithinarangeandcaptureimagesofintruders,respectively,[6].ThealgorithmusedforobjectdetectioninvideobasedonmachinelearninginthisresearchistheViola-Jonesalgorithm.Thisalgorithmrequiresatrainingsetofpositiveandnegativeimages.Acollectionofpositiveandnegativeimageswasusedtotrainthealgorithmforobjectssuchashumans,vehicles,andguns.Athreatlevelclassifierandanalertwarningsystemwerealsoaddedtoclassifyandannotatethevideosinreal-timeforeachframe.Thethreatlevelclassifiercategorizesthereal-timevideointosafe,low,medium,andhigh(dangerous).Thealertsystemspecifiesthetypeofwarningbasedonthetypeofintrusion(human,vehicular,orgun)detected.Forthealgorithmproposedinthiswork,theaccuracyforhumandetectionisanaverageof94.93%,theaccuracyforvehicledetectionisanaverageof95.2%,andtheaccuracyforgundetectionisanaverageof97.67%.Theaccuracyoftheproposedmethod(97%)wasmuchhigherthanthatofthepreviouslypublishedcomparedmethod(64%)forobjectdetection[7].Quad-copterdronesenablesomeborderstocommunicateconstantlywiththebasetodetectandtracktargetseffectively.Thesystemhasfunctionalitiestosendreal-timealertswhenintrudershavebeendetectedsothatnearbypatrolscanact.GoodresultshavebeenshowninapplyingthesetechnologieswiththeuseofGPStodirectvehicles,imageanalysis,machineintelligencewithaerialvisualization,andtargetdetection[8].ISSN-E:2697-3650MinervaJournal12Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) Ithasbeenproposedtoincludeacontactlessidentificationsystemthatusesadvancedmobiledevicesforbordercontrol,focusingonusabilityandintegratingnewtechnologies.ThedeviceisbasedontheMobilePassdeviceandallowsforidentificationusing4fingerprintsinsteadofjustone,asinconventionalsystems.Therobustnessandcontributionstothebordersecuritysystemarestillbeingevaluated[9].Maritimeborderswheregroupsofmigrantsarrivetoenteranothernationhaveaparticularproblemregardingverifyinginformationduetothepresenceofships,weatherconditions,andextensivemonitoringareas.Therefore,maritimesurveillancehasfocusednotonlyontherescueandrecoveryofmigrantsbutalsoontakingsubsequentactionstoensurethewell-beingofindividuals[10].Sincethe9/11incidentinManhattan,theUnitedStates,bordershavebeenviewedasoneofthemainsecurityfiltersfornationalsecurity.Manycountrieshaveseentheneedtoimprovetheirautomatedbordercontrolsystemstorespondtothesechallenges(Heiskanen,2014).Anewresearchapproachforautomatedbordercontrol(ABC)systemshavebeenproposed.VarioussecuritytechnologiesareusedforthesecomplexABCsolutions,includingbiometrics,surveillance,certificateexchange,dataprotection,secureuserinteraction,andinformationsecurity.TheFastPassprojectproposesastakeholder-drivenapproachprovidingabetterunderstandingofsecuritytechnologiestoestimatetheautomatedapproach'srisks,challenges,andopportunities[11]."Toenhancebordersecurity,wirelesssensornetworks(WSN)poweredbysolarenergyhavebeendeveloped,allowingforautomatedmonitoring,targettracking,andintrusiondetection.Thesesystemshavebeennotedfortheirfeaturesregardingtheclassificationofdetectionenvironments,theirabilitytosurviveinadverseweatherconditions,andtheirefficientcollectionofsolarenergy.",[12].ISSN-E:2697-3650MinervaJournal13Fig. 2. WSN architecture with the use of wireless nodes.Fig2showsthenetworkarchitectureofoursolar-poweredad-hocWSNforbordersurveillance.Thewirelesssensornodesareinterconnectedtobuildasurveillancesystemforbordersecurity.Thegatewaybasestationorsinknodereceivesandaggregatesthedetectiondatafromthesensorslocatedinadistributedmannerandtransmitsorbroadcastscommandstothesensornodes,suchassuspensionandactivationcommands,tomanagethesensornodes.Remoteserviceisalsointegrated,thegatewaytransmitsthedetectiondatatotheoperationscenter,andaninferencesystemprocessesthedata.Thesensornodescanautomaticallyformsensorclustersandworkcollaboratively.Ournetworkarchitectureisflexibleandimposesnolimitsonthesizeofthesensornetworkandthenumberofsensors[12].Inaddition,sensornetworkssuchas"PACHENDRIYA"fromIndiahavealsobeendeveloped,whichincorporatesensorsofvarioustypessuchasgeophones,hydrophones,microphones,infraredsensors,andcamerasensorstoachieveeffectivesurveillanceanddetectionofhumanintrusionsinborderscenarios.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) GroundSurveillanceRadar(GSR)operationsallowforsecuringanareaandprovideoperatorsandagentswithmuchmoretimetoevaluate,prioritizeandstopintrudersthanatraditionalfencesystem.Additionalresponsetimeisoneofthecriticalcharacteristicsofthewide-areasurveillanceconcept,alongwithadditionalbenefitsforbothoperatorsandresponseteams.TwoleadingGSRtechnologiesexistFrequency-ModulatedContinuousWave(FMCW)andPulseDoppler.MostpulseDopplerradarsarederivedfromlegacymilitarybattlefieldradartechnologyappliedtowide-areasurveillance.Incontrast,anewgenerationofFMCWradartechnologyhasbeendevelopedforthisnewtypeofsurveillance,appliedtothesecurityofhigh-valuesites,airports,militarybases,ports,andborders[13].WithpropercontroloverX-rayexposuretothehumanbody(Fig.3),varioustechnicalconfigurationssuchastransmissionimaging(fluoroscopy),backscatterimaging,computedtomography,andothercombinationsareusedinbordercontrols.Inthisway,theinsideofthehumanbody,it'ssurface,clothing,andluggageisinspectedtodetectweapons,explosives,anddrugs.ISSN-E:2697-3650MinervaJournal14Fig 3. Transmission imaging (fluoroscopy). The image results of a scan: Theperson slides back and forth (1) for seconds. A pencil beam (2) scans theperson. This beam is adjusted to a line of detectors. The digitized imageappears on a screen (3).InTable3,themostcommonfunctionalrequirementsthatbordersecurityscanningsystemsmusthavebeenshown.Multipletechnologiesarespecifiedforspecifictasksthatdetectandrecognizeriskelements.Table 3. Most common functional requirements needed for border security scanningsystems.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) Table3outlinesessentialrequirementsforeffectivebordersecurityscanningsystems,includingclearandcrispimagecapture,threatdetection,patternrecognition,andintegrationwithrelevantdatabasestoidentifypotentialthreats.Thetableemphasizestheneedforaccessible,user-friendlysystemsensuringinformationsecurity.Toimprovetheclarityandconcisionofthesecondparagraph,itcouldberevisedasfollows:Thereareproposalstoenhanceborderprocessesbyemployingamulti-toolapproachincorporatingincreasedscanning,controls,andnearlysimultaneouspassengerqueries.Thisapproachcouldaddressseveralcommonproblems,includinglimitationsintraditionalinformationsystemsforimmigrationandportsecurity,carrierreservations,economicanddemographicstatistics,andpoliceandcounterterrorismagencies[14].TheOptaSense®DistributedAcousticSensing(DAS)systemisaninnovativetechnologythatutilizesfiberopticcommunicationcablesassensorstodetectsurfacecrossingsandtunnelconstructionforbordersecuritypurposes.Thislow-cost,high-reliabilitysystemhasbeenfield-proveninoveronehundredlocationsworldwideandcanworkwithexistingbordersurveillancetechnologies.OptaSense'sabilitytodetect,classify,andlocateactivityoverhundredsofkilometersinapreciseandactionablemannerhasprovenittobeacost-effectivesolutionforlong-bordermonitoring,withthesystemscalingtocoverupto1500kmandbecontrolledbyasinglecentralmonitoringstationinpipelineapplications[15].ISSN-E:2697-3650MinervaJournal15Fig 3. Principle of operation of the OptaSense DAS System.Figure4presentsarepresentationoftheoperatingprincipleofthecurrentgenerationDASOptaSensesystem.Eachrangecontainerissampled2000times/second(50kmoffiber)at20000cycles/sec(5kmoffiber)andprovidestheoutputofthe"virtual"strainsensor.Asimplesystemthatcanprovide4000programmablechannelsspacedat5,10,or12.5meters.Thesystemcandetectvariationsindecibelsfrom2micronsto2km,whichcanbedeterminedinpulsesof10-meterlength,generatinganopticalsignalthatisamplifiedandtransmittedtothecontrolstation,providingthepositionofthelocationwhereithascrossednearthecable,generatinganincreaseinthenoiseofthesignal.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) III.METHODOLOGYScientificarticlesweresearchedinrepositoriessuchasScienceDirect,Scopus,Taylor&Francis,WebofSciences,andIEEEXplore.Duplicatearticleswereremoved,andtheremainingworkswerescreenedaccordingtotheirtitles.Subsequently,theabstractswerereviewed,andthecontentswereverifiedtoobtain15articleswithrelevantinformation,whichservedasthebasisforthisdocument.Figure5showsthereviewprocessworkflow,consideringthePRISMAmethodologyguidelines.Thesearchkeywordsusedweretechnologies,control,security,andborders.Allarticlesthataddressedthetopicwithoutdescribingtheprincipleofoperationoftheappliedtechnologieswereexcluded.ISSN-E:2697-3650MinervaJournal16Fig 5. Systematic review conducted, keywords: “Technologies AND control AND border”.IV.RESULTSBordercontroliscriticaltoensurethesecurityandprotectionofacountry'sborders.Theyhavedevelopedseveraltechnologiestoimprovetheireffectiveness.Someofthetechnologiesidentifiedforthesesecurity-relatedtasksaredescribedbelow.Videosurveillancesystemsallowsurveillanceofborderareasusingcamerasthattransmitimagesinreal-timetoacontrolcenter.Thetechnologyallowsdetectionpatternsandalertsoperatorsifanythingunusualisobservedwithinthefieldofvision.Movementsensorsdetectandsendinformationaboutthepresenceofpeople,vehicles,orotherobjectsinspecificborderareasandalertoperators.Thesensorscanalsodetectthepresenceoftunnelsandothersmugglingdevices.Intrusiondetectionsystemsallowalertingaboutthepresenceofpeopleorvehiclesthatcrosstheborderwithoutpermissionandirregularly.Intrusiondetectionsystemscanusemultipletechnologies,suchasvideocameras,motionsensors,radars,thermographicdetectors,andmultispectralimageanalysis.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) Frequentuseofbiometricidentificationhasbeenidentified.Thesesystemsallowtheidentificationofpeoplethroughuniquephysicalcharacteristics,suchasfingerprints,irisscans,andfacialrecognition,amongothers.Biometricidentificationsystemsareusedtoverifytheidentityofpeoplecrossingtheborderandtodetectpeoplewantedbythelaw.Baggageandcargoscanningsystemsprovideinformationondetectingdangerousorillegalobjectsinbaggageandcargoofvehiclescrossingtheborder.ThesescanningsystemsuseX-raytechnologyandotherscanningmethodstoidentifyobjectsbydetectingthemthroughothersolidsandmakingthemmoreaccessibleforcontrolpersonneltovisualize.CONCLUSIONSAdvancedtechnologiesarebeingusedtostrengthenbordersecurity:Bordercontroltechnologieshaveevolvedtremendouslyinrecentdecades.Advancedtechnologiessuchashigh-resolutioncameras,radarsystems,anddronesareusedtomonitorbordersanddetectpotentialthreats.Inaddition,dataanalysisandfacialrecognitiontechniquesarebeingusedtoidentifysuspiciouspersonsandpreventunauthorizedpersonsfromcrossing.Bordercontroltechnologiesimpactprivacyandhumanrights:Asadvancedtechnologiesstrengthenbordersecurity,therearealsolegitimateconcernsaboutprivacyandhumanrightsimpacts.Insomecases,thesetechnologiescanbeinvasiveandresultinthecollectionanduseofpersonaldatawithouttheconsentofindividuals,whichcanhavesevereconsequencesintermsofcivilliberties.Implementingbordercontroltechnologiesisacontentiousissue:Theperformanceofbordercontroltechnologiesiscontroversialinmanypartsoftheworld—somesupportusingthesetechnologiestostrengthenbordersecurityandpreventillegalimmigrationandcross-bordercrime.Incontrast,othersarguethatthesetechnologiesarecostly,invasive,andnotconsistentlyeffective.Itisessentialtoconsiderthesediverseviewswhenconsideringimplementingbordercontroltechnologiesandworkingtofindsolutionsthatbalancesecurityandhumanrights.REFERENCES[1]A.HanaaMohsinyS.E.Haider,«WITHDRAWN:Surveyofanintelligentsurveillancesystemformonitoringinternationalbordersecurity,»MaterialsToday:Proceedings,pp.2214-7853,2021.[2]P.Marks,«Sensorsandrobotsaimtobolsterbordersecurity,»NewScientworldwideenable0-21,2010.[3]«Bordercontrolgetssmarter–andsafer,»CardTechnologyToday,vol.19,nº11,pp.12-13,2007.[4]B.O.MartinsyM.G.Jumbert,«EUBordertechnologiesandtheco-productionofsecurity‘problems’and‘solutions’»JournalofEthnicandMigrationStudies,vol.48,nº6,pp.1430-1447,2022.[5]B.T.Koca,«Borderingprocessesthroughtheuseoftechnology:theTurkishcase,»JournalofEthnicandMigrationStudies,vol.48,nº8,pp.1909-1926,2022.[6]M.BhattacharyayA.Roy,«SmartBorderSecuritySystemUsingInternetofThings,»pp.268-279,2020.[7]A.Goyalye.al,«AutomaticBorderSurveillanceUsingMachineLearninginRemoteVideoSurveillanceSystems,»2020,pp.751-760.[8]S.Darwanteye.al,«BorderSurveillanceMonitoringApplication,»de20195thInternationalConferenceOnComputing,Communication,ControlAndAutomation(ICCUBEA),Pune,India,2019.[9]A.Weissenfeldye.al,«TowardsMobileContactless4-FingerprintAuthenticationforBorderControl,»de2018EuropeanIntelligenceandSecurityInformaticsConference(EISIC),Karlskrona,Suecia,2018.[10]M.G.Jumbert,«¿Controlorescateenelmar?ObjetivosylímitesdelastecnologíasdevigilanciadefronterasenelmarMediterráneo,»Desastres,vol.42,nº4,pp.674-696,2018.[11]M.Clabian,«FastPass:automatedbordercontrolasachallengingcombinationofvarioussecuritytechnologies,»2014.ISSN-E:2697-3650MinervaJournal17Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) [12]J.He,R.Norwood,M.FallahiyN.Peyghambarian,«Solar-poweredad-hocwirelesssensornetworkforbordersurveillance,»ProceedingsofSPIE-TheInternationalSocietyforOpticalEngineering,vol.8377,2012.[13]W.Butler,«DesignConsiderationsforIntrusionDetectionWideAreaSurveillanceRadarsforPerimetersandBorders,»de2008IEEEConferenceonTechnologiesforHomelandSecurity,Waltham,MA,EstadosUnidos,2008.[14]C.Hurrey,«The'SwissArmyKnife'ApproachtoBorderControl:MultitaskinginaMulti-threatWorld,»deThe'SwissArmyKnife'ApproachtoBorderControl:MultitaskinginaMulti-threatWorld,Uppsala,Suecia,2013.[15]A.Owen,G.DuckworthyJ.Worsley,«OptaSense:FibreOpticDistributedAcousticSensingforBorderMonitoring,»de2012EuropeanIntelligenceandSecurityInformaticsConference,Odense,Dinamarca,2012.ISSN-E:2697-3650MinervaJournal18Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19) ISSN-E:2697-3650MinervaJournal19Henry Ayala, Artillery Captain in the Ecuadorian Army, Artillery Group Multiple LaunchersNo. 80 "CALDERON." 80 "CALDERON," Bachelor in Military Sciences Escuela SuperiorMilitar Eloy Alfaro, Knowledge in Human International Law (FAE War Academy), LawStudent UTPL (Ecuador), Human Talent Officer of GA7 "CABO MINACHO" 2017-2019,Logistics Officer GAAA5 "MAYOR VALENCIA" 2020-2021, Human Talent Officer GA5"ATAHUALPA" and GALM80 "CALDERON" 2021-2023. THEAUTHORSWillians Yange,Artillery Captain in the Ecuadorian Army, Multiple Launcher ArtilleryGroup No. 80 "CALDERON," Bachelor in Military Sciences at the Escuela Superior MilitarEloy Alfaro. Knowledge in chart digitalization, accident investigation, air defense planning,international humanitarian law and military technology, and human resources. Instructorof the Artillery School of the Ecuadorian Army 2015-2017. Carolina Enríquez,Transport Captain in the Ecuadorian Army, Logistic SupportCommand N°9, Bachelor in Military Sciences at the Eloy Alfaro Military School (Ecuador).Knowledge in management, maintenance, and supply of logistic resources. Commanderof the Supply Platoon in CL74 "HUANCAVILCA 2012-2014. Commander of light andmedium vehicles platoon in CL75 "AUCA" 2014-2016. Logistics platoon commander of theCL72 "SHYRIS" 2017-2020. Platoon Commander support of CAL9 2021.militarycommunications systems, pedagogy, languages, and human resources.Heidy Tamayo,Second Lieutenant of Communications in the Ecuadorian Army, InfantryBattalion No. 2 "Imbabura," Bachelor of Military Sciences at the Escuela Superior Militar"Eloy Alfaro". Instructor at the Conscripts Instruction Center at the Artillery Brigade Nº27"PORTETE". Knowledge in human rights.Ayala et al. Technologies for border control and securityVol.4,IssueN°10,(pp.9-19)