Resumen. - En este documento se presenta una descripción de los avances y nuevas tecnologíasdesarrolladas para el control de la seguridad fronteriza y de uso militar. Se realizó una revisión sistemáticaconsiderando artículos científicos de bases relacionadas con avances tecnológicos de donde se obtuvoinformación referente a nuevas técnicas, aplicativos, algoritmos, dispositivos para el monitoreo y sistemasbiométricos que operan con inteligencia artificial, aprendizaje de máquina para dar soporte a la seguridad ycontrol en el paso fronterizo de personas, armamento, productos y objetos no permitidos por lasreglamentaciones vigentes de las naciones. El avance tecnológico alrededor del mundo permite el constantedesarrollo de nuevas alternativas que se contraponen a las nuevas y mejoras en las técnicas fraudulentas parael paso de personas y objetos de manera ilegal. Keywords: Tecnologías, control fronterizo, seguridad fronteriza, inteligencia artificial.Abstract. - This document describes the advances and new technologies developed for border securitycontrol and military use. A systematic review was conducted, considering scientific articles on technologicaladvances from which information was obtained on new techniques, applications, algorithms, surveillancedevices, and biometric systems that use artificial intelligence and machine learning to support bordersecurity and control of persons, weapons, products, and objects that are not allowed under the currentregulations of nations. Technological advances worldwide enable the continuous development of newalternatives to counter the new and improved fraudulent techniques for illegal border crossing of people andobjects. Palabras clave: Technologies, border control, border security, artificial intelligence.New technologies for border control andsecurityISSN-E: 2697-3650Minerva JournalAyala et al. Technologies for border control and securityAyala Henryhttps://orcid.org/0000-0002-4918-4395leon_artillery@hotmail.com Ejército EcuatorianoGrupo de Artillería Lanzadores Nro. 80 “Calderón”Quito-EcuadorNuevas tecnologías para el control y seguridad fronteriza9Recibido(16/04/2022), Aceptado(15/05/2022)Vol.4, Issue N°10, (pp. 9-19)Yange Willianshttps://orcid.org/0000-0002-2711-1398 williansyangeenriquez@gmail.comEjército EcuatorianoGrupo de Artillería Lanzadores Nro. 80 CalderónQuito-EcuadorEnríquez Carolinahttps://orcid.org/0000-0002-4832-1386isis_30_m90@hotmail.comEjército Ecuatoriano Comando de Apoyo Logístico N°9Quito-Ecuadorhttps://doi.org/10.47460/minerva.v4i10.91Tamayo Heidyhttps://orcid.org/0000-0002-3538-3748heidyantonela@hotmail.comEjército Ecuatoriano Batallón de Infantería Nº2 “Imbabura”.Ibarra-Ecuador
I. INTRODUCTION Borders are a critical part of a country's security, protecting citizens and keeping them safe from individualsand groups that threaten security on multiple levels. In addition, border patrol teams are essential inmaintaining peace in the region and keeping invaders and malicious individuals out of the country. Many technologies, such as surveillance cameras, biometric scanners, and thermal imaging systems, canbe used to protect borders. These technologies have advanced significantly over the years. For example,facial recognition software is an essential technological advancement in border control, which can easily andquickly identify individuals. This software can gather information about who enters or exits a region byscanning their faces at borders or airports. Modern border control is a complex system. It has multiple layers of security, and more than one countrymanages the border. Border control has evolved from being a physical barrier to the digital world,developing various technologies for this purpose, classified into two groups: (1) Technologies for thedetection and prevention of illegal activities and (2) Technologies for the identification and verification oftravelers. This work describes multiple cases of land border security control technologies that have been effectivelyapplied in various countries of the world, as well as those in development, in the development section. Themethodology section specifies the process of obtaining reference information for this work. The resultssection explains and discusses some findings, approaches, and dilemmas. Finally, the conclusions arepresented.DEVELOPMENT Currently, multiple operational technologies for land border control are shown in Figure 1 (Fig. 1). Wirelessdevices, mobile security units, fiber optics for communications, and fixed and mobile monitoring stationsexist. ISSN-E: 2697-3650Minerva Journal10Fig. 1. Technologies used in land border security control systemsThe security of fiber optic communication is a technology that was developed to provide more securecommunication. It has become the most popular technology for border control, being used in the UnitedStates since the 1990s.The use of fiber optic communication security has been implemented for decades in the military andgovernment sectors. The technology has been developed to its current state through decades of research anddevelopment. The use of fiber optic communication security has made it possible for border control agenciesto detect intruders and track their movements, as well as provide protection for their employees againstterrorist attacks.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
The use of fiber optic technology for border control has been around for some time. Countries like theUnited States, Canada, Mexico, and Australia have used this technology for decades to keep their borderssafe and secure.Multiple technologies can be used for border control. Some technologies used in border control systems arepresented in Table 1, along with their application, scope, and technical characteristics. ISSN-E: 2697-3650Minerva Journal11Table 1. Technologies used in land border security control systems. Table 2 presents technologies used in border systems for detecting objects (weapons, drugs, etc.) onpeople's bodies, as well as tracking vehicles passing through restricted areas. The technologies in Table 2employ multiple technologies such as radiofrequency, X-ray, gamma-ray, radar, thermal cameras, and imageanalysis. The advantage of the technologies described in Table 2 is to provide visualization through organic tissue,solid objects, and gaseous substances and even detect hot zones such as engines, people, and firearms inareas of poor visibility without affecting the people to whom these technologies are applied. Currently, surveillance drones are used at border crossings to detect and track objects, people, andvehicles with the advantage that these activities can be controlled from fixed posts, eliminating the need forhelicopters and the need to approach safely without risking the safety of border control personnel.Table 2. Some technologies are used in border control systems for object tracking anddetection.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
Robots have become widespread as an instrument for detecting intruders at the borders and sendinginformation to the control center. In hostile environments, robots show excellent performance. Automatedvehicles with monitoring systems based on facial recognition and detection algorithms have been developed.The presence of human beings is verified through the system, which then executes the facial recognitionalgorithm to compare them with known soldier data and identify intruders. The HAAR algorithm has beenemployed for face detection, and the CNN algorithm has been used for facial recognition in thesedevelopments [1]. It is anticipated that in the future, there will be more regular use of robots, radar networks,and cameras for these tasks due to the vast borders for which more patrol personnel and vehicles will berequired [2]. The introduction of electronic passports containing chips and RFID technology has been proposed toachieve more intelligent and safer control. Greater security is considered because the chip information islocked and cannot be modified or tampered with, including the stored photo. So, if there is a duplicate, thiswill trigger alarms [3]. Despite the benefits, some people view biometric technologies as evoking fears ofprivacy and public liberties violations. The European Union has made advancements in managing its migratory flows, for which it has increasedits reliance on technology in border management. Developments have been implemented primarily in twoareas: using unmanned aerial vehicles or drones and improving information and surveillance technologies[4]. The techniques employed for border control in Turkey have seen the urgent need for increased use oftechnology. However, in addition to detecting, filtering, and preventing "illegal" border crossings, smuggling,and terrorism, the humanitarian aspect of saving the lives of migrants has also been considered [5]. The Indian border guard has installed and adopted new technologies such as cameras, night vision devices,and radars. The need for the Internet of Things (IoT) has become evident for better informationmanagement, which has already been adopted on a small scale and in limited areas. The fast-decision-making process provides reliability and appropriate responses to secure dangerous border areas, even inextreme weather conditions, diverse terrain, riverine terrains, dense forest areas, and inaccessible areas thatare complicated to monitor by personnel. The project "Smart Border Security System using Internet ofThings" proposes a low-cost solution using Passive Infrared Sensors (PIR) and the OV7670 camera module todetect the movement of any object within a range and capture images of intruders, respectively, [6]. The algorithm used for object detection in video based on machine learning in this research is the Viola-Jones algorithm. This algorithm requires a training set of positive and negative images. A collection of positiveand negative images was used to train the algorithm for objects such as humans, vehicles, and guns. A threatlevel classifier and an alert warning system were also added to classify and annotate the videos in real-timefor each frame. The threat level classifier categorizes the real-time video into safe, low, medium, and high(dangerous). The alert system specifies the type of warning based on the type of intrusion (human, vehicular,or gun) detected. For the algorithm proposed in this work, the accuracy for human detection is an average of94.93%, the accuracy for vehicle detection is an average of 95.2%, and the accuracy for gun detection is anaverage of 97.67%. The accuracy of the proposed method (97%) was much higher than that of the previouslypublished compared method (64%) for object detection [7]. Quad-copter drones enable some borders to communicate constantly with the base to detect and tracktargets effectively. The system has functionalities to send real-time alerts when intruders have been detectedso that nearby patrols can act. Good results have been shown in applying these technologies with the use ofGPS to direct vehicles, image analysis, machine intelligence with aerial visualization, and target detection [8]. ISSN-E: 2697-3650Minerva Journal12Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
It has been proposed to include a contactless identification system that uses advanced mobile devices forborder control, focusing on usability and integrating new technologies. The device is based on theMobilePass device and allows for identification using 4 fingerprints instead of just one, as in conventionalsystems. The robustness and contributions to the border security system are still being evaluated [9]. Maritime borders where groups of migrants arrive to enter another nation have a particular problemregarding verifying information due to the presence of ships, weather conditions, and extensive monitoringareas. Therefore, maritime surveillance has focused not only on the rescue and recovery of migrants but alsoon taking subsequent actions to ensure the well-being of individuals [10]. Since the 9/11 incident in Manhattan, the United States, borders have been viewed as one of the mainsecurity filters for national security. Many countries have seen the need to improve their automated bordercontrol systems to respond to these challenges (Heiskanen, 2014). A new research approach for automatedborder control (ABC) systems have been proposed. Various security technologies are used for these complexABC solutions, including biometrics, surveillance, certificate exchange, data protection, secure userinteraction, and information security. The FastPass project proposes a stakeholder-driven approachproviding a better understanding of security technologies to estimate the automated approach's risks,challenges, and opportunities [11]. "To enhance border security, wireless sensor networks (WSN) powered by solar energy have beendeveloped, allowing for automated monitoring, target tracking, and intrusion detection. These systems havebeen noted for their features regarding the classification of detection environments, their ability to survive inadverse weather conditions, and their efficient collection of solar energy.", [12].ISSN-E: 2697-3650Minerva Journal13Fig. 2. WSN architecture with the use of wireless nodes. Fig 2 shows the network architecture of our solar-powered ad-hoc WSN for border surveillance. Thewireless sensor nodes are interconnected to build a surveillance system for border security. The gatewaybase station or sink node receives and aggregates the detection data from the sensors located in adistributed manner and transmits or broadcasts commands to the sensor nodes, such as suspension andactivation commands, to manage the sensor nodes. Remote service is also integrated, the gateway transmitsthe detection data to the operations center, and an inference system processes the data. The sensor nodescan automatically form sensor clusters and work collaboratively. Our network architecture is flexible andimposes no limits on the size of the sensor network and the number of sensors [12]. In addition, sensornetworks such as "PACHENDRIYA" from India have also been developed, which incorporate sensors ofvarious types such as geophones, hydrophones, microphones, infrared sensors, and camera sensors toachieve effective surveillance and detection of human intrusions in border scenarios.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
Ground Surveillance Radar (GSR) operations allow for securing an area and provide operators and agentswith much more time to evaluate, prioritize and stop intruders than a traditional fence system. Additionalresponse time is one of the critical characteristics of the wide-area surveillance concept, along with additionalbenefits for both operators and response teams. Two leading GSR technologies exist Frequency-ModulatedContinuous Wave (FMCW) and Pulse Doppler. Most pulse Doppler radars are derived from legacy militarybattlefield radar technology applied to wide-area surveillance. In contrast, a new generation of FMCW radartechnology has been developed for this new type of surveillance, applied to the security of high-value sites,airports, military bases, ports, and borders [13]. With proper control over X-ray exposure to the human body (Fig. 3), various technical configurations suchas transmission imaging (fluoroscopy), backscatter imaging, computed tomography, and other combinationsare used in border controls. In this way, the inside of the human body, it's surface, clothing, and luggage isinspected to detect weapons, explosives, and drugs.ISSN-E: 2697-3650Minerva Journal14Fig 3. Transmission imaging (fluoroscopy). The image results of a scan: Theperson slides back and forth (1) for seconds. A pencil beam (2) scans theperson. This beam is adjusted to a line of detectors. The digitized imageappears on a screen (3). In Table 3, the most common functional requirements that border security scanning systems must havebeen shown. Multiple technologies are specified for specific tasks that detect and recognize risk elements.Table 3. Most common functional requirements needed for border security scanningsystems.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
Table 3 outlines essential requirements for effective border security scanning systems, including clear andcrisp image capture, threat detection, pattern recognition, and integration with relevant databases to identifypotential threats. The table emphasizes the need for accessible, user-friendly systems ensuring informationsecurity. To improve the clarity and concision of the second paragraph, it could be revised as follows: There areproposals to enhance border processes by employing a multi-tool approach incorporating increasedscanning, controls, and nearly simultaneous passenger queries. This approach could address severalcommon problems, including limitations in traditional information systems for immigration and port security,carrier reservations, economic and demographic statistics, and police and counterterrorism agencies [14]. The OptaSense® Distributed Acoustic Sensing (DAS) system is an innovative technology that utilizes fiberoptic communication cables as sensors to detect surface crossings and tunnel construction for bordersecurity purposes. This low-cost, high-reliability system has been field-proven in over one hundred locationsworldwide and can work with existing border surveillance technologies. OptaSense's ability to detect, classify,and locate activity over hundreds of kilometers in a precise and actionable manner has proven it to be acost-effective solution for long-border monitoring, with the system scaling to cover up to 1500 km and becontrolled by a single central monitoring station in pipeline applications [15].ISSN-E: 2697-3650Minerva Journal15Fig 3. Principle of operation of the OptaSense DAS System. Figure 4 presents a representation of the operating principle of the current generation DAS OptaSensesystem. Each range container is sampled 2000 times/second (50 km of fiber) at 20000 cycles/sec (5 km offiber) and provides the output of the "virtual" strain sensor. A simple system that can provide 4000programmable channels spaced at 5, 10, or 12.5 meters. The system can detect variations in decibels from 2microns to 2 km, which can be determined in pulses of 10-meter length, generating an optical signal that isamplified and transmitted to the control station, providing the position of the location where it has crossednear the cable, generating an increase in the noise of the signal.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
III. METHODOLOGY Scientific articles were searched in repositories such as ScienceDirect, Scopus, Taylor & Francis, Web ofSciences, and IEEE Xplore. Duplicate articles were removed, and the remaining works were screenedaccording to their titles. Subsequently, the abstracts were reviewed, and the contents were verified to obtain15 articles with relevant information, which served as the basis for this document. Figure 5 shows the reviewprocess workflow, considering the PRISMA methodology guidelines. The search keywords used were technologies, control, security, and borders. All articles that addressed thetopic without describing the principle of operation of the applied technologies were excluded.ISSN-E: 2697-3650Minerva Journal16Fig 5. Systematic review conducted, keywords: “Technologies AND control AND border”.IV. RESULTS Border control is critical to ensure the security and protection of a country's borders. They have developedseveral technologies to improve their effectiveness. Some of the technologies identified for these security-related tasks are described below.Video surveillance systems allow surveillance of border areas using cameras that transmit images in real-timeto a control center. The technology allows detection patterns and alerts operators if anything unusual isobserved within the field of vision.Movement sensors detect and send information about the presence of people, vehicles, or other objects inspecific border areas and alert operators. The sensors can also detect the presence of tunnels and othersmuggling devices.Intrusion detection systems allow alerting about the presence of people or vehicles that cross the borderwithout permission and irregularly. Intrusion detection systems can use multiple technologies, such as videocameras, motion sensors, radars, thermographic detectors, and multispectral image analysis.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
Frequent use of biometric identification has been identified. These systems allow the identification ofpeople through unique physical characteristics, such as fingerprints, iris scans, and facial recognition, amongothers. Biometric identification systems are used to verify the identity of people crossing the border and todetect people wanted by the law. Baggage and cargo scanning systems provide information on detecting dangerous or illegal objects inbaggage and cargo of vehicles crossing the border. These scanning systems use X-ray technology and otherscanning methods to identify objects by detecting them through other solids and making them moreaccessible for control personnel to visualize.CONCLUSIONS Advanced technologies are being used to strengthen border security: Border control technologies haveevolved tremendously in recent decades. Advanced technologies such as high-resolution cameras, radarsystems, and drones are used to monitor borders and detect potential threats. In addition, data analysis andfacial recognition techniques are being used to identify suspicious persons and prevent unauthorizedpersons from crossing. Border control technologies impact privacy and human rights: As advanced technologies strengthen bordersecurity, there are also legitimate concerns about privacy and human rights impacts. In some cases, thesetechnologies can be invasive and result in the collection and use of personal data without the consent ofindividuals, which can have severe consequences in terms of civil liberties. Implementing border control technologies is a contentious issue: The performance of border controltechnologies is controversial in many parts of the world—some support using these technologies tostrengthen border security and prevent illegal immigration and cross-border crime. In contrast, others arguethat these technologies are costly, invasive, and not consistently effective. It is essential to consider thesediverse views when considering implementing border control technologies and working to find solutions thatbalance security and human rights.REFERENCES[1] A. Hanaa Mohsin y S. E. Haider, «WITHDRAWN: Survey of an intelligent surveillance system for monitoringinternational border security,» Materials Today: Proceedings, pp. 2214-7853, 2021. [2] P. Marks, «Sensors and robots aim to bolster border security,» New Scientworldwide enable0-21, 2010. [3] «Border control gets smarter and safer,» Card Technology Today, vol. 19, 11, pp. 12-13, 2007. [4] B. O. Martins y M. G. Jumbert, «EU Border technologies and the co-production of security ‘problems’ and‘solutions’» Journal of Ethnic and Migration Studies, vol. 48, 6, pp. 1430-1447, 2022. [5] B. T. Koca, «Bordering processes through the use of technology: the Turkish case,» Journal of Ethnic andMigration Studies, vol. 48, 8, pp. 1909-1926, 2022. [6] M. Bhattacharya y A. Roy, «Smart Border Security System Using Internet of Things,» pp. 268-279, 2020. [7] A. Goyal y e. al, «Automatic Border Surveillance Using Machine Learning in Remote Video SurveillanceSystems,» 2020, pp. 751-760.[8] S. Darwante y e. al, «Border Surveillance Monitoring Application,» de 2019 5th International ConferenceOn Computing, Communication, Control And Automation (ICCUBEA), Pune, India, 2019.[9] A. Weissenfeld y e. al, «Towards Mobile Contactless 4-Fingerprint Authentication for Border Control,» de2018 European Intelligence and Security Informatics Conference (EISIC), Karlskrona, Suecia, 2018. [10] M. G. Jumbert, «¿Control o rescate en el mar? Objetivos y límites de las tecnologías de vigilancia defronteras en el mar Mediterráneo,» Desastres, vol. 42, 4, pp. 674-696, 2018. [11] M. Clabian, «FastPass: automated border control as a challenging combination of various securitytechnologies,» 2014. ISSN-E: 2697-3650Minerva Journal17Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
[12] J. He, R. Norwood, M. Fallahi y N. Peyghambarian, «Solar-powered ad-hoc wireless sensor network forborder surveillance,» Proceedings of SPIE - The International Society for Optical Engineering, vol. 8377, 2012. [13] W. Butler, «Design Considerations for Intrusion Detection Wide Area Surveillance Radars for Perimetersand Borders,» de 2008 IEEE Conference on Technologies for Homeland Security, Waltham, MA, EstadosUnidos, 2008. [14] C. Hurrey, «The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World,» deThe 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World, Uppsala, Suecia,2013. [15] A. Owen, G. Duckworth y J. Worsley, «OptaSense: Fibre Optic Distributed Acoustic Sensing for BorderMonitoring,» de 2012 European Intelligence and Security Informatics Conference, Odense, Dinamarca, 2012. ISSN-E: 2697-3650Minerva Journal18Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)
ISSN-E: 2697-3650Minerva Journal19Henry Ayala, Artillery Captain in the Ecuadorian Army, Artillery Group Multiple LaunchersNo. 80 "CALDERON." 80 "CALDERON," Bachelor in Military Sciences Escuela SuperiorMilitar Eloy Alfaro, Knowledge in Human International Law (FAE War Academy), LawStudent UTPL (Ecuador), Human Talent Officer of GA7 "CABO MINACHO" 2017-2019,Logistics Officer GAAA5 "MAYOR VALENCIA" 2020-2021, Human Talent Officer GA5"ATAHUALPA" and GALM80 "CALDERON" 2021-2023. THE AUTHORSWillians Yange, Artillery Captain in the Ecuadorian Army, Multiple Launcher ArtilleryGroup No. 80 "CALDERON," Bachelor in Military Sciences at the Escuela Superior MilitarEloy Alfaro. Knowledge in chart digitalization, accident investigation, air defense planning,international humanitarian law and military technology, and human resources. Instructorof the Artillery School of the Ecuadorian Army 2015-2017. Carolina Enríquez, Transport Captain in the Ecuadorian Army, Logistic SupportCommand N°9, Bachelor in Military Sciences at the Eloy Alfaro Military School (Ecuador).Knowledge in management, maintenance, and supply of logistic resources. Commanderof the Supply Platoon in CL74 "HUANCAVILCA 2012-2014. Commander of light andmedium vehicles platoon in CL75 "AUCA" 2014-2016. Logistics platoon commander of theCL72 "SHYRIS" 2017-2020. Platoon Commander support of CAL9 2021.militarycommunications systems, pedagogy, languages, and human resources.Heidy Tamayo, Second Lieutenant of Communications in the Ecuadorian Army, InfantryBattalion No. 2 "Imbabura," Bachelor of Military Sciences at the Escuela Superior Militar"Eloy Alfaro". Instructor at the Conscripts Instruction Center at the Artillery Brigade Nº27"PORTETE". Knowledge in human rights.Ayala et al. Technologies for border control and securityVol.4, Issue N°10, (pp. 9-19)