Improving Turkish-Iraqi Border Security: an Agent-Based Modeling and Simulation Approach

Total Page:16

File Type:pdf, Size:1020Kb

Improving Turkish-Iraqi Border Security: an Agent-Based Modeling and Simulation Approach CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Browse Reports & Bookstore TERRORISM AND Make a charitable contribution HOMELAND SECURITY For More Information Visit RAND at www.rand.org Explore the Pardee RAND Graduate School View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the Pardee RAND Graduate School (PRGS) dissertation series. PRGS dissertations are produced by graduate fellows of the Pardee RAND Graduate School, the world’s leading producer of Ph.D.’s in policy analysis. The dissertation has been supervised, reviewed, and approved by the graduate fellow’s faculty committee. Dissertation Improving Turkish-Iraqi Border Security An Agent-Based Modeling and Simulation Approach Mustafa Oguz C O R P O R A T I O N Dissertation Improving Turkish-Iraqi Border Security An Agent-Based Modeling and Simulation Approach Mustafa Oguz This document was submitted as a dissertation in September 2014 in partial fulfillment of the requirements of the doctoral degree in public policy analysis at the Pardee RAND Graduate School. The faculty committee that supervised and approved the dissertation consisted of Bart Bennett (Chair), Mahyar Amouzegar, and Veysi Isler. PARDEE RAND GRADUATE SCHOOL The Pardee RAND Graduate School dissertation series reproduces dissertations that have been approved by the student’s dissertation committee. The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/permissions.html). Published 2014 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface This dissertation analyzes several policy options that could help increase border security by reducing militant actions from safe havens in foreign territory. In particular, this dissertation focuses on a particularly section of the Turkish-Iraqi border that is difficult to protect. The main threat along the border is militant infiltrations and militant attacks on border security outposts. Policy options considered are relocating outposts, additional soldiers, unattended ground sensors and foreign border guards that provide early warning of militant movements. A simulation model is developed to evaluate the effects of these options. Infiltrators and border guards are assigned simple behavior rules. Outcomes are collected from their interaction on a virtual segment of the border. The results are analyzed to find the least costly way of increasing the percentage of militant infiltration attempts interdicted and decreasing soldier casualties in outposts. This dissertation will be useful to policy makers who need to implement cost-effective policies to control land borders. The agent-based modeling and simulation methodology presented in this dissertation will be of interest to researchers interested in innovative approaches to policy problems. The dissertation was written as a degree completion requirement for the Pardee RAND Graduate School. RAND Arroyo Research Center provided generous funding for the dissertation. iii Table of Contents Preface ............................................................................................................................................ iii Figures............................................................................................................................................ ix Tables ........................................................................................................................................... xiii Abstract ......................................................................................................................................... xv Summary ..................................................................................................................................... xvii Acknowledgments........................................................................................................................ xxi Abbreviations ............................................................................................................................. xxiii 1. Introduction ................................................................................................................................. 1 Motivation ............................................................................................................................................ 2 Organization of this Paper .................................................................................................................... 6 2. Case Studies: Border Security Challenges and Solutions ........................................................... 7 Border security challenges and solutions ................................................................................................. 7 PAVN Infiltration in South Vietnam .................................................................................................... 7 French Algeria borders ....................................................................................................................... 13 Cordon Sanitaire in Rhodesia ............................................................................................................. 16 India’s borders with Bangladesh and Pakistan ................................................................................... 20 Israel Separation Barrier (Israel Security Fence) ............................................................................... 25 Iraq’s borders ...................................................................................................................................... 28 Turkish-Iraqi border ........................................................................................................................... 30 Lessons from the review of border security practices ........................................................................ 31 3. Border Security Models and Simulations ................................................................................. 35 Analytical border security models .......................................................................................................... 35 v Sensor networks for border security ....................................................................................................... 39 Creating a New Border Security Methodology ...................................................................................... 43 Decisions External to the Model ........................................................................................................ 45 Militant Missions ................................................................................................................................ 47 Border Security Policy Options .......................................................................................................... 49 Model Parameters ............................................................................................................................... 54 Outcomes ............................................................................................................................................ 55 4. Comparison of Current and Preferred Locations ...................................................................... 58 Baseline results ....................................................................................................................................... 58 Infiltration results in the preferred locations case .............................................................................. 59 Casualty results in the preferred locations case .................................................................................
Recommended publications
  • The Right of Persons Employed in Polish Public Services to Association in Trade Unions
    Studia z Zakresu Prawa Pracy i Polityki Społecznej Studies on Labour Law and Social Policy 2020, 27, nr 1: 23–27 doi:10.4467/25444654SPP.20.003.11719 www.ejournals.eu/sppips Krzysztof Baran https://orcid.org/0000-0001-5165-8265 Jagiellonian University THE RIGHT OF PERSONS EMPLOYED IN POLISH PUBLIC SERVICES TO ASSOCIATION IN TRADE UNIONS Abstract The article aims at presenting the reconsidered model of association of public servants under the Polish legal system. In the past, there was a statutory imposed limiting monism in the trade union movement of military services officers. Since 2019 trade union pluralism has been introduced for the Police, Border Guard, and Prison Service officers, which is analyzed in the paper. Another issue discussed in this article is the right of association of persons employed in civil public administration. Słowa kluczowe: związek zawodowy, służby mundurowe, straż graniczna, policja, służba więzienna Keywords: trade union, public services, Border Guard, Police, Prison Service ASJC: 3308, JEL: K31 On 19 July 2019, the Parliament of the Republic of Poland adopted the Act extending the right of officers of the Police, Border Guard and Prison Services to form and join trade unions (Dz.U. 2019, item 1608). The newly adopted regulation is an inspiration to recon- sider the model of association of public servants under the Polish legal system. The term “public servants” or “those employed in public services” refers not only to those employed in widely understood public administration, but also those serving in military services. The starting point for further discussion will be the statement that persons who are employed in Polish public service structures perform work under various legal regimes, starting from labour law, through civil law to administrative law.
    [Show full text]
  • Border Fence Presentation
    Secura Fence System by Alabama Metal Industries Corporation U.S. / Mexico Border San Diego, CA Sector Pacific Ocean to the Otey Mesa Crossing Retired General Michael Hayden recently addressed a meeting of the Metals Service Center Institute. General Hayden was appointed to the post of the Director of National Security Agency and served from 1999- 2005. From April 2005 to May 2006 General Hayden was the number one intelligence officer in the country and in this capacity he oversaw the entire intelligence community, including the CIA, NSA, the National Geospatial – Intelligence Agency and the National Reconnaissance Office. In 2006 General Hayden served as the Director of the CIA. General Hayden addressed the Institute on the four hot spots in the world that jeopardize the security of the United States. Number one on his list was Iran. Number two, and this came as a real surprise to the Institute was Mexico, followed by Al Qaeda, and then North Korea. Mexico being so close to the United States and so high on his list of hot spots should not be underestimated. In 1997 the San Diego Sector of the U.S. border with Mexico was the number one illegal crossing point on the entire US / Mexico border. Because of the illegal crossing activity this area was identified for the first installation of new security border fencing. The area designated actually extended 1/4-mile out in the Pacific Ocean and eastward 16 miles to the Otey Mesa Border Crossing. This new fence was designed and installed to replace the old fence made from World War II landing mats.
    [Show full text]
  • Recollections and Notes, Vol. 1 (1887–1945) Translated by Abe
    Vita Mathematica 18 Hugo Steinhaus Mathematician for All Seasons Recollections and Notes, Vol. 1 (1887–1945) Translated by Abe Shenitzer Edited by Robert G. Burns, Irena Szymaniec and Aleksander Weron Vita Mathematica Volume 18 Edited by Martin MattmullerR More information about this series at http://www.springer.com/series/4834 Hugo Steinhaus Mathematician for All Seasons Recollections and Notes, Vol. 1 (1887–1945) Translated by Abe Shenitzer Edited by Robert G. Burns, Irena Szymaniec and Aleksander Weron Author Hugo Steinhaus (1887–1972) Translator Abe Shenitzer Brookline, MA, USA Editors Robert G. Burns York University Dept. Mathematics & Statistics Toronto, ON, Canada Irena Szymaniec Wrocław, Poland Aleksander Weron The Hugo Steinhaus Center Wrocław University of Technology Wrocław, Poland Vita Mathematica ISBN 978-3-319-21983-7 ISBN 978-3-319-21984-4 (eBook) DOI 10.1007/978-3-319-21984-4 Library of Congress Control Number: 2015954183 Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
    [Show full text]
  • Trafficking in Human Beings
    TemaNord 2014:526 TemaNord Ved Stranden 18 DK-1061 Copenhagen K www.norden.org Trafficking in Human Beings Report from a conference on Identification of victims and criminals Trafficking in Human Beings – why we do not notice them In the Nordic countries, most of the reported cases of trafficking in human beings today concern women and girls trafficked for sexual exploitation, but experiences from Europe indicate that human trafficking has increased also in farming, household work, construction, and house building, as well as in begging, shoplifting and thefts. The conference Identification of victims and criminals – why we do not notice them on 30–31 May 2013 in Tallinn, Estonia formed the conclusion of a Nordic-Baltic-Northwest Russian cooperation project. Around 80 participants attended the two-day conference to discuss ways of identifying victims and criminals and to find answer to the question of why we do not notice victims or criminals, even though we now have available to us facts, figures, research and knowledge about human trafficking as a part of international organized crime. TemaNord 2014:526 ISBN 978-92-893-2767-1 ISBN 978-92-893-2768-8 (EPUB) ISSN 0908-6692 conference proceeding TN2014526 omslag.indd 1 09-04-2014 07:18:39 Trafficking in Human Beings Report from a conference on Identification of victims and criminals – why we do not notice them TemaNord 2014:526 Trafficking in Human Beings Report from a conference on Identification of victims and criminals - why we do not notice them ISBN 978-92-893-2767-1 ISBN 978-92-893-2768-8 (EPUB) http://dx.doi.org/10.6027/TN2014-526 TemaNord 2014:526 ISSN 0908-6692 © Nordic Council of Ministers 2014 Layout: Hanne Lebech Cover photo: Beate Nøsterud Photo: Reelika Riimand Print: Rosendahls-Schultz Grafisk Copies: 516 Printed in Denmark This publication has been published with financial support by the Nordic Council of Ministers.
    [Show full text]
  • Walls and Fences: a Journey Through History and Economics
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Vernon, Victoria; Zimmermann, Klaus F. Working Paper Walls and Fences: A Journey Through History and Economics GLO Discussion Paper, No. 330 Provided in Cooperation with: Global Labor Organization (GLO) Suggested Citation: Vernon, Victoria; Zimmermann, Klaus F. (2019) : Walls and Fences: A Journey Through History and Economics, GLO Discussion Paper, No. 330, Global Labor Organization (GLO), Essen This Version is available at: http://hdl.handle.net/10419/193640 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu Walls and Fences: A Journey Through History and Economics* Victoria Vernon State University of New York and GLO; [email protected] Klaus F. Zimmermann UNU-MERIT, CEPR and GLO; [email protected] March 2019 Abstract Throughout history, border walls and fences have been built for defense, to claim land, to signal power, and to control migration.
    [Show full text]
  • Some Facts About Southeast Finland Frontier Guard
    THE SOUTHEAST FINLAND BORDER GUARD DISTRICT THETHE SOUTHEA SOUTHEASTST FINLAND FINLAND BORDER BORDER GUA GUARDRD DISTRICT DISTRICT Border guard stations 10 Border check station 1 II/123 Border crossing points 8 Uukuniemi International Pitkäpohja Kolmikanta Restricted Imatra BGA (Parikkala) Kangaskoski Immola Personnel 1.1.2006: • headquarters Lake Ladoga • logistics base Niskapietilä Officers 95 Lappeenranta BGA Pelkola Border guards 570 (Imatra) Others 87 Lappeenranta airport Total 752 Nuijamaa Common border with Vehicles: Vainikkala Russia 227 km Virolahti Cars 65 BGA Leino Motorbikes 15 Vyborg Snowmobiles 59 Patrol boats 11 Vaalimaa Vaalimaa Hurppu Dogs 95 (Santio) VI/11 Gulf of Finland BORDERBORDER SECURITYSECURITY SYSTEMSYSTEM ININ SOUTHEASOUTHEASTST FINLAFINLANDND (figures/2005) BORDERBORDER CO-OPERATION WITH SURVEILLASURVEILLANCENCE NATIONAL AUTHORITIES • exposed illegal border crossings 16 • accomplished refused entries 635 • executive assistances 23 • assistances, searches 25 4 3 2 1 CO-OPERATION OVER THE BORDER RUSSIAN BORDER GUARD SERVICE • apprehended ~80 • meetings: • border delegates/deputies 22 • assistants of the border delegates 70 BORDERBORDER CHECKSCHECKS CONSULATES • refusals of entry 707 • ST. PETERSBURG • discovered fraudulent documents 128 • MOSCOW • discovered stolen vehicles 13 • PETROZAVODSK • discovered fraudulent documents 88 BORDERBORDER CHECKSCHECKS Investment: v. 2004 392 man-years; 19,0 mill. € v. 2005 409 man-years; 19,5 mill. € PASSENGERPASSENGER TRAFFIC TRAFFIC 1996 1996 - -20052005 4 764 495 4 694 657
    [Show full text]
  • Building a Protective Wall Around Terrorists
    Fordham International Law Journal Volume 28, Issue 3 2004 Article 10 Building a Protective Wall Around Terrorists – How the International Court of Justice’s Ruling in The Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory Made the World Safer for Terrorists and More Dangerous for Member States of the United Nations Rebecca Kahan∗ ∗ Copyright c 2004 by the authors. Fordham International Law Journal is produced by The Berke- ley Electronic Press (bepress). http://ir.lawnet.fordham.edu/ilj Building a Protective Wall Around Terrorists – How the International Court of Justice’s Ruling in The Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory Made the World Safer for Terrorists and More Dangerous for Member States of the United Nations Rebecca Kahan Abstract Part I of this Note will examine two recent actions in the war against international terror- ism: the Israeli plan to build a separation barrier between Israel and the OPT, and the invasion of Afghanistan during Operation Enduring Freedom. Part II will discuss two important deviations by the ICJ from past interpretation of international law that were announced in the advisory proceed- ings against Israel: a new elucidation by the ICJ regarding principles of judicial propriety and a new analysis of the abilities of States to act in self-defense under Article 51 of the U.N. Charter. Part III will address the impact on the international community’s fight against terrorism, and the role of the ICJ as an international entity. BUILDING A PROTECTIVE WALL AROUND TERRORISTS HOW THE INTERNATIONAL COURT OF JUSTICE'S RULING IN THE LEGAL CONSEQUENCES OF THE CONSTRUCTION OF A WALL IN THE OCCUPIED PALESTINIAN TERRITORY MADE THE WORLD SAFER FOR TERRORISTS AND MORE DANGEROUS FOR MEMBER STATES OF THE UNITED NATIONS Rebecca Kahan* INTRODUCTION The nature of the threats posed to States has changed since the adoption of the U.N.
    [Show full text]
  • Gao-21-372, Southwest Border
    United States Government Accountability Office Report to Congressional Requesters June 2021 SOUTHWEST BORDER Schedule Considerations Drove Army Corps of Engineers' Approaches to Awarding Construction Contracts through 2020 GAO-21-372 SOUTHWEST BORDER Schedule Considerations Drove Army Corps of Engineers' Approaches to Awarding Construction Contracts through 2020 June 2021 Highlights of GAO-21-372, a report to congressional requesters Border Barrier Obligations, Fiscal Years 2018–2020 Why This Matters Following a 2019 Presidential Declaration of National Emergency, billions of dollars were made available for the U.S. Army Corps of Engineers’ use on border barrier construction. This report provides information on the Corps’ contracting for border barriers during fiscal years 2018–2020. Key Takeaways Some Department of Defense funding was only available for a short time before expiring, giving the Corps a tight schedule for awarding contracts. This—and the emergency declaration—led the Corps to depart from its planned acquisition approach. The Corps focused on starting construction quickly and How GAO Did This Study maximizing the miles of border barrier panels it could build. To do so, it: We reviewed all of the border barrier construction contracts the Corps awarded for projects from fiscal • Awarded $4.3 billion in noncompetitive years 2018 through 2020. We also reviewed relevant contracts. Competition helps ensure the federal procurement data and interviewed Corps and government gets a good price. Department of Homeland Security officials. • Started work before agreeing to terms. The Corps awarded several contracts before terms, such as What GAO Recommends barrier specifications and cost, were finalized. The Corps should assess the approaches used to build By focusing on expediency in contracting, the the border barriers and, as appropriate, reassess its government risks paying higher costs.
    [Show full text]
  • Border Management Reform in Transition Democracies
    Border Management Reform in Transition Democracies Editors Aditya Batara G Beni Sukadis Contributors Pierre Aepli Colonel Rudito A.A. Banyu Perwita, PhD Zoltán Nagy Lieutenant-Colonel János Hegedűs First Edition, June 2007 Layout Front Cover Lebanese-Israeli Borders Downloaded from: www.michaelcotten.com Printed by Copyright DCAF & LESPERSSI, 2007 The Geneva Centre for the Democratic Control of Armed Forces FOREWORD Suripto, SH Vice Chairman of 3rd Commission, Indonesian House of Representatives And Chariman of Lesperssi Founder Board Border issues have been one of the largest areas of concern for Indonesia. Since becoming a sovereign state 61 years ago, Indonesia is still facing a series of territorial border problems. Up until today, Indonesia has reached agreements with its neighbouring countries related to demarcation and state border delineation. However, the lack of an unequivocal authority for border management has left serious implications for the state’s sovereignty and its citizen’s security. The Indonesian border of today, is still having to deal with border crime, which includes the violation of the territorial border, smuggling and terrorist infiltration, illegal fishing, illegal logging and Human Rights violations. These kinds of violations have also made a serious impact on the state’s sovereignty and citizen’s security. As of today, Indonesia still has an ‘un-settled’ sea territory, with regard to the rights of sovereignty (Additional Zone, Economic Exclusive Zone, and continent plate). This frequently provokes conflict between the authorised sea-territory officer on patrol and foreign ships or fishermen from neighbouring countries. One of the principal border problems is the Sipadan-Ligitan dispute between Indonesia and Malaysia, which started in 1969.
    [Show full text]
  • Agency at the Frontier and the Building of Territoriality in the Naranjo-Ceibo Corridor, Peten, Guatemala
    AGENCY AT THE FRONTIER AND THE BUILDING OF TERRITORIALITY IN THE NARANJO-CEIBO CORRIDOR, PETEN, GUATEMALA By LUIS ALFREDO ARRIOLA A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2005 Copyright 2005 by Luis Alfredo Arriola To my beloved family, in appreciation of all they have endured. ACKNOWLEDGMENTS The sheer magnitude of a dissertation necessarily engages multiple collaborations. In consequence I render proper credit to the people and institutions who partook of this endeavor. My everlasting gratitude goes, first and foremost, to the people of Naranjo and Ceibo who taught more than I could ever learn from them. Intellectual support was always there when needed from committee members, namely Professors Allan Burns, Marianne Schmink, Michael Heckenberger, and Murdo MacLeod. They challenged my intellect in many positive, creative ways. My dissertation mutual support group is recognized for invaluable contributions to my refining of the manuscript’s content and form at several stages of its development. The insightful feedback from Alex Rodlach, Maxine Downs, Deborah Rodman, Paige Lado, and Fatma Soud helped me through difficult times. My editors, Martha Jeanne Weismantel, Tara Boonstra and Mark Minho, have but my highest regards. Other people who accompanied me in this intellectual journey and who deserve mentioning include Norman Schwartz, Victor Hugo Ramos, Edgar Calderón, Roberto Barrios, Kevin Gould, Georg Grumberg, Julio Cano and Werner Ramírez. Diverse kinds of support came from Tom Ankersen, Hugo Guillen, Bruce Ferguson, Richard Phillips, Paul Losch, Marie-Claire Paiz, Abimael Reinoso, Jorge Soza, Amilcar Corzo, Mario Mancilla and Luis A.
    [Show full text]
  • Smart Border Management an Indian Perspective September 2016
    Content Smart border management p4 / Responding to border management challenges p7 / Challenges p18 / Way forward: Smart border management p22 / Case studies p30 Smart border management An Indian perspective September 2016 www.pwc.in Foreword India’s geostrategic location, its relatively sound economic position vis-à-vis its neighbours and its liberal democratic credentials have induced the government to undertake proper management of Indian borders, which is vital to national security. In Central and South Asia, smart border management has a critical role to play. When combined with liberal trade regimes and business-friendly environments, HIğFLHQWFXVWRPVDQGERUGHUFRQWUROVFDQVLJQLğFDQWO\LPSURYHSURVSHFWVIRUWUDGH and economic growth. India shares 15,106.7 km of its boundary with seven nations—Pakistan, China, Nepal, Bhutan, Myanmar, Bangladesh and Afghanistan. These land borders run through different terrains; managing a diverse land border is a complex task but YHU\VLJQLğFDQWIURPWKHYLHZRIQDWLRQDOVHFXULW\,QDGGLWLRQ,QGLDKDVDFRDVWDO boundary of 7,516.6 km, which includes 5,422.6 km of coastline in the mainland and 2,094 km of coastline bordering islands. The coastline touches 9 states and 2 union territories. The traditional approach to border management, i.e. focussing only on border security, has become inadequate. India needs to not only ensure seamlessness in the legitimate movement of people and goods across its borders but also undertake UHIRUPVWRFXUELOOHJDOĠRZ,QFUHDVHGELODWHUDODQGPXOWLODWHUDOFRRSHUDWLRQFRXSOHG with the adoption of
    [Show full text]
  • UNIVERSITY of CALIFORNIA Los Angeles the Ground Plan As a Tool
    UNIVERSITY OF CALIFORNIA Los Angeles The Ground Plan as a Tool for The Identification and Study of Houses in an Old Kingdom Special-Purpose Settlement at Heit el-Ghurab, Giza A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Near Eastern Languages and Cultures by Mohsen E Kamel 2015 ABSTRACT OF THE DISSERTATION The Ground Plan as a Tool for The Identification and Study of Houses in an Old Kingdom Special-Purpose Settlement at Heit el-Ghurab, Giza by Mohsen E Kamel Doctor of Philosophy in Near Eastern Languages and Cultures University of California, Los Angeles, 2015 Professor Willemina Z. Wendrich, Chair The ground plan is an essential goal of the settlement archaeologist. For the archaeologist who would attempt to glean evidence of settlements of the Old Kingdom (c. 2543 - 2120 BCE), the ground plan is most often the ultimate goal, for although the seemingly eternal stone funerary monuments of Giza dominate the Old Kingdom landscape (both literally and figuratively), the Pyramid Age has not left standing the mudbrick walls of the houses within which people lived-- the preponderance of Old-Kingdom wall remnants comprising mere centimeters. Without an accurate ground plan, material culture and faunal and botanical evidence have no context. This study presents a detailed, concrete analysis and comparison of the ground plans of two structures that can be interpreted as houses from the Old Kingdom, 4th-dynasty (2543 – 2436 BCE) settlement site of Heit el-Ghurab at Giza. The houses whose ground plans are presented here are representative of a corpus of unpublished probable dwellings from this site, which excavation ii suggests was a “special-purpose” settlement that housed and provisioned the personnel engaged in the monumental constructions on the Giza plateau.
    [Show full text]