Integrated border protection in the 21st century

1 October 2014 Access Control & Identity Management

Border safeguarding is constantly challenged by the ever-changing threats of the 21st century. It is vital to providing a strong defence against external threats such as international terrorism, drugs and foreign disease. Border safeguarding must also be highly efficient, presenting no obstacles to legitimate trade and travel.

The central idea is to protect the homeland from external threats and aggression using integrated strategic, operational and tactical defensive and offensive measures as the situation requires. The ability to detect, deter, prevent or if necessary defeat threats is a required capability for protection of the border.

Crossing the Colombia-Ecuador border. Attribution: Some rights reserved by Fabulousfabs. Image via Flickr Creative Commons (www.flickr.com/photos/fabulousfabs/)
Crossing the Colombia-Ecuador border. Attribution: Some rights reserved by Fabulousfabs. Image via Flickr Creative Commons (www.flickr.com/photos/fabulousfabs/)

Border safeguarding incorporates all applications of land, air and naval power designed to detect, pre-empt, respond to, mitigate, and recover from the full spectrum of incidents and threats to the country, whether man-made or natural. It involves a unique collection of government departments, civil agencies and in some instances non-governmental organisations, which present a number of challenges that can be summarised as follows:

* Border safeguarding operations are distinguished by reliance on coordination rather than control.

* The multiplicity of government departments, civil agencies and non-governmental organisations and wide variety of potential types of border safeguarding operations make a common operational picture (COP) very difficult. A government department and civil agencies’ COP is often dependent upon the type of scenario in which it is involved and its functions, roles, and responsibilities in relation to the scenario.

* The processes used by civil agencies are complex and the number of different agencies involved adds to the complexity, and

* Different departments and agencies have different rules of engagement.

It is thus very important that these aspects must be addressed in a national management system for border safeguarding that must integrate effective practices in emergency preparedness and response into a comprehensive national framework. It requires a coordinated commitment with cooperation among all levels of government, the private sector, and individual citizens to be successful.

Employment of the latest ICT

The world of command and control is in the midst of a paradigm shift, a change in the way we think about the subject. Information Age concepts and technologies offer opportunities to do things we could never do before. It is time to recognise that, if we are to be successful in meeting the 21st century challenges that we face, there will be major discontinuities between the command and control concepts and practices being taught and practiced today and those of tomorrow.

Today’s missions differ from traditional military missions, and are simultaneously more complex and more dynamic, requiring the collective capabilities and efforts of many organisations in order to succeed. This requirement for assembling a diverse set of capabilities and organisations into an effective coalition is accompanied by shrinking windows of response opportunity. Traditional approaches to command and control are not up to the challenge. Simply stated, they lack the agility required in the 21st century. Fortunately, advances in information technologies have created a new space within which individuals and organisations can operate.

In order to ensure that the border safeguarding environment remains at the forefront of technology innovative ideas will have to be adopted and implemented taking into consideration the rapid change in technology and the resultant cost. This will be no more visible than in the acquisition of a suitable C2 solution for border safeguarding when conducting Joint, Integrated, Inter-agency and Multi National [JI2M] operations.

It is in the light of this experience, and the role that technology has played in improving the command and control capabilities of military forces, that one should review the advantages to be gained from:

* The effective utilisation of proven technology, and

* The capabilities of industry to support the functional requirements of the military for border safeguarding command and control.

Everyone must have 'the picture', the same picture, the only picture, fully integrated, secure, identified, in time, covering all land, sea and airborne forces. The key, however, lies in the approach at military level, the clear definition of the requirement, the identification of all the role players (including industry), effective utilisation of national assets and building on past experience, and lastly, applying the right level of technology to suit the environment.

Some of the questions vital to the process of shaping the future of border safeguarding command and control capabilities of the military should focus on:

* The role that modern technology will play in providing effective border safeguarding, and

* How industry must support the efforts of the military.

The need for faster, more accurate, more reliable, available information to support integrated command and control continues to grow at an ever-increasing pace.

Impact of the increasing dependency on MOTS and COTS

Technology is constantly evolving and as such it will be difficult to keep pace with the development of technology. In order to address this challenge in the border safeguarding environment the idea is increasingly turning to the acquisition of military-off-the-shelf (MOTS) and commercial-off-the-shelf (COTS) products integrated to provide an effective solution.

This is very relevant in today’s defence environment where funds are scarce and the intervals at which large sums of funding is being availed for big and complex defence projects are becoming very long. The focus is thus on the procurement of COTS and MOTS products integrated in such a way that it provides the desired result. This is also mostly done to offset obsolescence management in reaction to shortening product and technology life cycles.

Although a lot of emphasis is placed on MOTS products and solutions, one will seldom find a product or solution that fully complies with all specific requirements, as such systems are usually developed according to pre-defined requirements and will in most instances require some changes and re-work in order to tailor it to own requirements.

Many of the military’s COTS-based systems also require modification to withstand the harsh conditions common in the soldier’s environment. Instead of starting from scratch, many designers are using a building-block approach, purchasing a basic COTS system and then adapting the configuration to meet application-specific requirements.

Ensuring safety and effectiveness

The emergence of new threats and measures taken by the military to adapt its capabilities accordingly has led to changes in operational requirements for the military. These changes have significantly enhanced the importance of interoperability with respect to matériel, doctrine, tactics, training, communication, and many other areas in which interoperability is a major factor for military forces and the systems that support them. This in effect entails that where possible standardisation of matériel, doctrine, tactics, training and communications should be established.

The objective of standardisation is to achieve the required critical level of interoperability with regard to all these aspects. Standardisation makes a vital contribution to the combined operational effectiveness of the military and promotes opportunities for the better use of economic resources.

Extensive efforts must be made to improve cooperation and to eliminate duplication in the research, development, production, procurement and logistic support of border safeguarding systems, primarily through the promulgation of standardisation agreements.

Implementation of standardisation agreements will assist the military to achieve the required levels of interoperability and to better accomplish the common strategic, operational and tactical tasks, to understand and execute command procedures, and to employ techniques, matériel and equipment more efficiently.

Due to the complexity of the JI2M environment and the role that border safeguarding will play in said environment it is of the utmost importance that safety and effectiveness of border safeguarding systems can be verified and validated.

The principal forum for the elaboration of standardisation policy can be an integrated development environment (IDE) or capability demonstration centre (CDC), which should aim to incorporate standardisation as an integral part of planning and acts as a coordinator between the military and the industry addressing standardisation requirements. For event management and disaster management support others role players like government departments, civil agencies and non-governmental organisations could also be included.

Facilities such as the IDE/CDC do have a role to play in verifying and validating system of systems interoperability and doctrine. What must however be kept in mind is that such an institution must at all times obtain guidelines from the user environment against which such actions can be measured.

It should undertake this by initiating, harmonising and coordinating standardisation efforts throughout the military and the defence industry and by providing support for standardisation activities. It should also act on behalf of the military in developing, coordinating and assessing operational standardisation matters.

The various arms of service should develop and implement concepts, doctrines, procedures and designs which will enable them to achieve and maintain interoperability. This requires the establishment of the necessary levels of compatibility, interchangeability or commonality in operational, procedural, material, technical and administrative fields in conjunction with the defence industry.

The IDE/CDC must provide an integrated planning, experimentation, development and preparation process to examine new concepts in doctrine, organisation and technology that is required for current and future joint command and control through workshops, symposia, experimentation, simulation, demonstrations and field exercises. It should also provide an integrating environment for transformation activities for services, joint forces, combatant commands and other key role-players and partners.

The IDE/CDC should support various military transformation events through live or virtual, classified/unclassified and JI2M experimentation and should also create an environment in which interoperability and the establishment of capabilities can be tested, evaluated, validated and verified and as such not become involved in the development of systems and capabilities other than providing standards and the validation of conformance thereto.

Conclusion

Securing a nation’s vast and diverse borders is a daunting task. The nature, size, and complexity of borders highlight the importance of the military, government departments, civil agencies and non-governmental organisations working together to enhance security.

Border safeguarding is an extremely challenging and demanding joint and combined operation. It requires detailed planning and execution that is a focused effort across the military, government departments, civil agencies and non-governmental organisations. The key to success is a system that can effectively employ the C4I structure to plan and execute a border safeguarding plan that supports Joint, Integrated, Inter-agency and Multi National [JI2M] operations at tactical and operational levels.

For more information contact Anne Lewis-Olsson, Saab sub-Saharan Africa, +27 (0)71 681 0429, www.saabgroup





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...