To Read the Task Force Report

Total Page:16

File Type:pdf, Size:1020Kb

To Read the Task Force Report TASK FORCE The Donald C. Hellmann Task Force Program Big Brother on the Border: A Cross-National Analysis of Border Technology 2021 Henry M. Jackson School of International Studies University of Washington, Seattle Task Force Report Winter 2021 Big Brother on the Border: A Cross-National Analysis of Border Technology Faculty Advisor Dr. Jessica Beyer Evaluator Adrian Shahbaz Director for Technology and Democracy at Freedom House Editors Madeleine Cole Maya Green Coordinator Ekin Njotoatmodjo Researchers Rochelle Bowyer Morris Chang Yogasai Gazula Orlando Lugo Raphael Kyle Caoile Manansala Soraya Marashi Ekin Njotoatmodjo Nathaniel Poole Eleanor Roads Ashley Rho Dale Su Benjamin Visse Michelle Wu TABLE OF CONTENTS EXECUTIVE SUMMARY ............................................................................................................................................................... 2 REPORT FINDINGS....................................................................................................................................................................... 3 CASE STUDY METHODS ......................................................................................................................................................................................3 COMMON GOVERNMENT-DEFINED ISSUES ACROSS CASES .........................................................................................................................4 LEVEL OF BORDER TECHNOLOGY .....................................................................................................................................................................5 TECHNOLOGY TYPES ACROSS CASES ...............................................................................................................................................................6 PRIVATE ACTORS DRIVING THE GROWTH OF TECHNOLOGY AT BORDERS ..............................................................................................9 LEVEL OF BIOMETRIC DATA COLLECTION................................................................................................................................................... 12 BIOMETRIC DATA REGULATIONS .................................................................................................................................................................. 14 DATA COLLECTION AND PRIVACY ................................................................................................................................................................. 15 POLICY RECOMMENDATIONS TO THE UNITED NATIONS ......................................................................................... 16 CHAPTER 1: EUROPE ............................................................................................................................................................... 25 THE UNITED KINGDOM-FRANCE BORDER .................................................................................................................................................. 25 THE ITALIAN MARITIME BORDER................................................................................................................................................................. 37 CHAPTER 2: MIDDLE EAST .................................................................................................................................................... 47 THE ISRAEL-WEST BANK BORDER............................................................................................................................................................... 47 THE TURKEY-SYRIA BORDER ........................................................................................................................................................................ 58 CHAPTER 3: SUB-SAHARAN AFRICA .................................................................................................................................. 64 THE NIGERIA BORDER .................................................................................................................................................................................... 64 THE ETHIOPIA-KENYA BORDER .................................................................................................................................................................... 72 CHAPTER 4: ASIA AND OCEANIA ......................................................................................................................................... 79 THE INDIA-BANGLADESH BORDER ............................................................................................................................................................... 79 THE HONG KONG-CHINA BORDER ............................................................................................................................................................... 88 THE INDONESIA-MALAYSIA BORDER ........................................................................................................................................................... 97 THE AUSTRALIAN BORDER.......................................................................................................................................................................... 104 CHAPTER 5: THE AMERICAS .............................................................................................................................................. 112 THE COLOMBIA-VENEZUELA BORDER ...................................................................................................................................................... 112 THE HONDURAS-GUATEMALA BORDER ................................................................................................................................................... 118 THE UNITED STATES-MEXICO BORDER ................................................................................................................................................... 126 BIBLIOGRAPHY ....................................................................................................................................................................... 135 1 Executive Summary Crossing an international border can represent a shift in personal freedoms and economic opportunities, and for millions of people around the world each year, it marks a new beginning. However, borders are also politically charged and militarized spaces that nations have a mandate to secure. As technology advances, new systems are being developed and deployed in borderlands to monitor the movement of people. Border security technologies are developing faster than they can be regulated, resulting in dangerous opportunities for state and non-state actors alike to operate with little transparency or accountability. This report examines 13 international borders around the world and the technology used to monitor them in order to present a cross-national comparative analysis of border security technology and its human rights implications. The report investigates what nations define as their most pressing border issues and the technologies utilized in response. The borders include: UK-France, Italy’s maritime border, Israel-West Bank, Turkey-Syria, Nigeria, Ethiopia-Kenya, India-Bangladesh, Hong Kong-China, Indonesia-Malaysia, Australia, Colombia- Venezuela, Guatemala-Honduras, and US-Mexico. Our report finds 29 distinct types of technology deployed at the borders we studied. There are widespread concerns surrounding the use of technology at borders, especially in the areas of data privacy and human rights. These concerns must be addressed in order to ensure safety and security for all people moving through international borderlands. Drawing on findings from our case studies, we recommend the United Nations takes the following actions: 1. Establish guidelines for the collection, use, and security of personally identifiable data collected at international borders. 2. Develop guidelines to facilitate and regulate data sharing between states and between governments and private actors. 3. Urge states to implement a moratorium on the use of facial recognition technology as a part of border security systems until clear, enforceable regulations on its use are passed at a national level. 4. Condemn technology firms that sell products used for unethical purposes at borders. 5. Create an independent, multi-stakeholder advisory body to vet, analyze, and monitor the implementation of technology at international borders. 6. Conduct comprehensive international reviews measuring the negative human impacts of increased border securitization. 7. Urge states to increase transparency and oversight of border enforcement agencies to identify and replace strategies that violate human rights. 2 Report Findings Our report examines border security technology at international borders around the world to determine how the use of technology impacts humans moving through these regions. We examine both the benefits and the dangers of border technology in order to inform the United Nations of their impact. Our case study produced the following major findings: - In 10 of our 13 cases, migration is a major political issue. - All case studies find some form of border security technology implemented beyond physical barriers and markers. - The most widespread technologies applied at borders are biometrics, drones, cooperatively shared databases, closed-circuit television, and thermal imaging. - In 11 cases, borders deploy technology
Recommended publications
  • The Need for a Rights-Based Public Health Approach to Australian Asylum Seeker Health Jo Durham1* , Claire E
    Durham et al. Public Health Reviews (2016) 37:6 DOI 10.1186/s40985-016-0020-9 REVIEW Open Access The need for a rights-based public health approach to Australian asylum seeker health Jo Durham1* , Claire E. Brolan1,2, Chi-Wai Lui1 and Maxine Whittaker1,3 * Correspondence: [email protected] Abstract 1Faculty of Medicine & Biomedical Sciences, School of Public Health Public health professionals have a responsibility to protect and promote the right to School of Public Health, The health amongst populations, especially vulnerable and disenfranchised groups, such University of Queensland, Herston as people seeking asylum and whose health care is frequently compromised. As at Road, Herston, Queensland 4006, Australia 31 March 2016, there was a total of 3707 people (including 384 children) in immigration Full list of author information is detention facilities or community detention in Australia, with 431 of them detained for available at the end of the article more than 2 years. The Public Health Association of Australia and the Australian Medical Association assert that people seeking asylum in Australia have a right to health in the same way as Australian citizens, and they denounce detention of such people in government facilities for prolonged and indeterminate periods of time. The position of these two professional organisations is consistent with the compelling body of evidence demonstrating the negative impact detention has on health. Yet in recent years, both the Labour and Liberal parties—when at the helm of Australia’s Federal Government—have implemented a suite of regressive policies toward individuals seeking asylum. This has involved enforced legal restrictions on dissenting voices of those working with these populations, including health professionals.
    [Show full text]
  • Head 122 — HONG KONG POLICE FORCE
    Head 122 — HONG KONG POLICE FORCE Controlling officer: the Commissioner of Police will account for expenditure under this Head. Estimate 2002–03................................................................................................................................... 12,445.8m Establishment ceiling 2002–03 (notional annual mid-point salary value) representing an estimated 34 597 non-directorate posts at 31 March 2002 reducing by 337 posts to 34 260 posts at 31 March 2003......................................................................................................................................... 9,473.1m In addition there will be 77 directorate posts at 31 March 2002 and at 31 March 2003. Capital Account commitment balance................................................................................................. 305.3m Controlling Officer’s Report Programmes Programme (1) Maintenance of Law and These programmes contribute to Policy Area 9: Internal Security Order in the Community (Secretary for Security). Programme (2) Prevention and Detection of Crime Programme (3) Reduction of Traffic Accidents Programme (4) Operations Detail Programme (1): Maintenance of Law and Order in the Community 2000–01 2001–02 2001–02 2002–03 (Actual) (Approved) (Revised) (Estimate) Financial provision ($m) 6,223.6 5,995.3 5,986.4 6,081.8 (–3.7%) (–0.1%) (+1.6%) Aim 2 The aim is to maintain law and order through the deployment of efficient and well-equipped uniformed police personnel throughout the land regions. Brief Description 3 Law
    [Show full text]
  • Volume 26 | Number 1 | 2014
    Pacific-AsianVolume Education 26 –| Vol.Number 26, No. 1 11 | 2014 Pacific-Asian Education The Journal of the Pacific Circle Consortium for Education Volume 26, Number 1, 2014 ISSUE EDITOR Elizabeth Rata, The University of Auckland EDITOR Elizabeth Rata, School of Critical Studies in Education, Faculty of Education, The University of Auckland, New Zealand. Email: [email protected] EXECUTIVE EDITORS Kirsten Locke, The University of Auckland, New Zealand Elizabeth Rata, The University of Auckland, New Zealand Alexis Siteine, The University of Auckland, New Zealand CONSULTING EDITOR Michael Young, Institute of Education, University of London EDITORIAL BOARD Kerry Kennedy, The Hong Kong Institute of Education, Hong Kong Meesook Kim, Korean Educational Development Institute, South Korea Carol Mutch, Education Review Office, New Zealand Gerald Fry, University of Minnesota, USA Christine Halse, University of Western Sydney, Australia Gary McLean,Texas A & M University, USA Leesa Wheelahan, University of Toronto, Canada Rob Strathdee, RMIT University, Victoria, Australia Xiaoyu Chen, Peking University, P. R. China Saya Shiraishi, The University of Tokyo, Japan Richard Tinning, University of Queensland, Australia Rohit Dhankar, Azim Premji University, Bangalore, India Airini, Thompson Rivers University, British Columbia, Canada ISSN 10109-8725 Pacific Circle Consortium for Education Publication design and layout: Halcyon Design Ltd, www.halcyondesign.co.nz Published by Pacific Circle Consortium for Education http://pacificcircleconsortium.org/PAEJournal.html Pacific-Asian Education Volume 26, Number 1, 2014 CONTENTS Articles The dilemmas and realities of curriculum development: Writing a social studies 5 curriculum for the Republic of Nauru Alexis Siteine Renewal in Samoa: Insights from life skills training 15 David Cooke and T.
    [Show full text]
  • Border Force Partner Bulletin
    Partner Bulletin Essential information for Border Force’s partners May 2014 Message from Sir Charles Montgomery As Director General of Border Force I would like to welcome you to the May edition of Border Force Partner e-bulletin. I am committed to Border Force becoming the 'best in the world' and having effective partner engagement is very much at the heart of making this happen. This month Border Force experienced a challenging period in relation to problems at passport control. However this event also demonstrated the positive and essential role Border Force’s partners play in helping to secure our borders. Border Force staff and partners dealt with the situation effectively and professionally in a manner that was promoted positively and widely in media. I personally witnessed staff from both Border Force and partners working together and going the extra mile. I would again like to offer my sincere thanks to you and your staff for their support during this period. This month’s e-bulletin contains useful information about new ePassport technology being rolled out and the new security system that is being developed to keep our borders safe. You can also read more about how this month the Immigration Act received royal assent and how the Government launched a new Maritime Security Strategy. You can also find out more about our key partner meetings held this month, including the new Freight Sector Group and issues affecting the industry. The Partner Bulletin is now available on GOV.UK at Border Force/Publications. Please continue to give us your feedback by emailing the Border Force Partners inbox.
    [Show full text]
  • An Assessment of Waste Problems for the Buada Community, and Strategies Toward Community Waste Reduction in Nauru
    ISSN 1818-5614 The way ahead: an assessment of waste problems for the Buada community, and strategies toward community waste reduction in Nauru By IWP-Nauru and Alice Leney IWP-Pacific Technical Report (International Waters Project) no. 9 Global United Nations Pacific Regional Environment Development Environment Facility Programme Programme SPREP IRC Cataloguing-in-Publication Data Leney, Alice The way ahead: an assessment of waste problems for the Buada community, and strategies toward community waste reduction in Nauru / prepared by International Waters Programme, Nauru and Alice Leney. - Apia, Samoa; SPREP, 2004. 77 p. ; 29 cm IWP-Pacific Technical Report (International Waters Project) no. 9 ISBN : 982-04-0278-6 ISSN : 1818-5614 1. Conservation of natural resources – Buada community - Nauru. 2.Waste reduction – Buada community - Nauru. 3. Waste minimization – Buada community – Nauru. 4. Waste management – Buada community - Nauru. 5. Ecological risk assessment – Buada community - Nauru. 6. Pollution – Risk assessment – Buada community – Nauru. I. Implementation of the Strategic Action Programme of the Pacific Small Developing States Project no. RAS/98/G32. II. International Waters Programme (IWP). III. Nauru IWP National Programme IV. Secretariat for the Pacific Regional Environment Programme (SPREP). V. Title. 363.73 This report was produced by SPREP’s International Waters Project that is implementing the Strategic Action Programme for the International Waters of the Pacific Small Island Developing States with funding from the Global Environment Facility. The views expressed in this report are not necessarily those of the publisher. Cover design by SPREP’s Publications Unit Editing: Ms. Talica Koroi Layout: Ms. Sasa’e Walter Printed by Marfleet Printing Co.
    [Show full text]
  • Working with the UK Border Agency and Border Force
    This document was archived on 31 March 2016 Working with the UK Border Agency and Border Force archived This document was archived on 31 March 2016 Working with the UK Border Agency and Border Force UKBA works with key partner organisations Important facts Background to address key threats to the UK. These are the threats from: Controlling migration On 1 March 2012 Border Force was split from UKBA to become a separate law • terrorists; The Home Office is responsible for controlling enforcement command, led by its own migration to the UK, through the work of Border Force, Director General, and accountable directly to • criminals enabling illegal immigration which applies immigration and customs controls on Ministers. through fraud, forgery or other passengers arriving at the border, and of the UK Border organised attempts to cheat the Agency (UKBA). UKBA UKBA will protect the border and ensure that immigration system; Britain remains open for business, checking • processes visa applications overseas and people travelling to the UK before they arrive • organised illegal immigration to the applications for further stay from those already through visa checks, intelligence and the use UK; and, in the country, including students, workers, of the e-Borders system. family members and asylum seekers; • a crisis in another country that could At an operational level, Border Force ports lead to false or unfounded claims for • processes citizenship applications; and have local arrangements with the police, in asylum alongside legitimate refugee particular Special Branch, and, in Northern claims. • takes enforcement action against those found Ireland, the C3 Ports Policing Branch, for to be in the UK unlawfully.
    [Show full text]
  • Stopped at Uk Airport for Warrant
    Stopped At Uk Airport For Warrant Bartolomei panegyrizing incontrollably? If sooth or unrelieved Ajai usually hyperbolizes his chukker seethe spatially or withstand scornfully and profusely, how carangid is Gay? Cymose Doyle never springs so mucking or overpitch any Guarneri transversally. If you are not a citizen, border agents can refuse your entry to the US. GNR arrest two persons for theft after car chase. TSA woman told me she had to feel my bra area. Any case results presented on the site are based upon the facts of a particular case and do not represent a promise or guarantee. How many people leaving britain are stopped at uk airport for warrant was also extended a global entry form coming through passport flagging please enter your state is it is kept strictly confidential information is? Some have it was stopped at uk airport for warrant. Safe use of Internet and Social Media for the Young. HMM, then how did they get passed to get Global Entry? What is defined as a mask? Lucky strike unless allowed back i should have provided for at uk airport? What if i feel great result of a uk including a foot of sentence or redistributed without a walgreens, those who do a stop a better about putting real news was stopped at uk? SOR after I stand trial. You will be playing a lottery as it will be down to the countries discretion to let you in or not. UK, either before arrest on the extradition matter or at any point prior to extradition. On the first on any pending charges were withdrawn, on the second one I received the results I was hoping for and on the third one the results far exceeded any expectations I had and the charges were withdrawn.
    [Show full text]
  • Regulating Undercover Agents' Operations and Criminal
    This document is downloaded from CityU Institutional Repository, Run Run Shaw Library, City University of Hong Kong. Regulating undercover agents’ operations and criminal Title investigations in Hong Kong: What lessons can be learnt from the United Kingdom and South Australia Author(s) Chen, Yuen Tung Eutonia (陳宛彤) Chen, Y. T. E. (2012). Regulating undercover agents’ operations and criminal investigations in Hong Kong: What lessons can be learnt Citation from the United Kingdom and South Australia (Outstanding Academic Papers by Students (OAPS)). Retrieved from City University of Hong Kong, CityU Institutional Repository. Issue Date 2012 URL http://hdl.handle.net/2031/6855 This work is protected by copyright. Reproduction or distribution of Rights the work in any format is prohibited without written permission of the copyright owner. Access is unrestricted. Page | 1 LW 4635 INDEPENDENT RESEARCH Topic: Regulating Undercover Agents’ Operations and Criminal Investigations in Hong Kong: What Lessons can be learnt from the United Kingdom and South Australia? Student Name: CHEN Yuen Tung Eutonia1 Date: 13th April 2012 Word Count: 9570 (excluding cover page, footnote and bibliography) Number of Pages: 39 Abstract It is not a dispute that undercover police officers have a proper role to play in contemporary law enforcement. However, there is no clear legislation in Hong Kong on the issue of whether the undercover agent is, at law, an offender of crime(s). This paper would examine the limitations of the prevailing undercover policing laws in Hong Kong and suggest possible recommendations. In particular, a comparative study of the United Kingdom and South Australia would be made to investigate whether Hong Kong should enact a legislation regulating undercover operations and criminal investigations.
    [Show full text]
  • An International Analysis of Governmental Media Campaigns to Deter Asylum Seekers
    International Journal of Communication 14(2020), 1092–1114 1932–8036/20200005 An International Analysis of Governmental Media Campaigns to Deter Asylum Seekers SARAH C. BISHOP1 Baruch College, The City University of New York, USA In recent years, the governments of the United States, Australia, and Norway have developed and launched informational multimedia campaigns targeted at dissuading unwanted groups of asylum-seeking migrants and have disseminated these media in strategic international locales. This project investigates the visual and textual facets of these deterrence campaigns using critical narrative analysis. Asylum seekers globally occupy a precarious liminal position; this article interrogates the processes of governmentality at work in this liminal space. Specifically, I analyze the ways that government-funded deterrence campaigns offer material directives that (1) discursively bifurcate the nature of the threats posed when individuals seek asylum, and (2) omit requisite information about migrants’ human right to seek asylum, thereby advancing strategic ignorance in their audiences. Keywords: immigration, media, global communication, governmentality, migration deterrence There are currently around 3.5 million asylum seekers across the world—the highest number that the United Nations High Commissioner for Refugees (UNHCR) has ever recorded. In Europe, the number of individuals seeking asylum has increased nearly 4,000% in the last decade, and the rate of arrivals is accelerating (Eurostat, 2019). Displaced individuals often flee to neighboring areas, and about 85% of displaced people reside in developing regions that are often unable to provide the material resources and long-term social services necessary for a high-functioning asylum system (United Nations High Commissioner for Refugees [UNHCR], 2018b).
    [Show full text]
  • An Update on Security, Migration, and U.S. Assistance November 2015
    An Update on Security, Migration, and U.S. Assistance By Adam Isacson, Senior Associate for Regional Security; Maureen Meyer, Senior Associate for Mexico and Migrant Rights; and Hannah Smith, Program Assistant November 2015 Key Findings migration crackdown has been changes in how migrants are traveling. With decreased possibilities of boarding the train in Chiapas, migrants and smugglers are now relying on different and dangerous routes and modes of transportation, including by foot, vehicle, and boat. These routes expose migrants to new vulnerabilities while simultaneously isolating them from the network of shelters established along traditional routes. Raids and operations to prevent migrants from riding atop cargo trains, known collectively as La Bestia, have been the most visible and aggressive enforcement efforts under the Southern Border Program. Migration authorities have blocked migrants from boarding trains, pulled migrants off of trains, and raided establishments that migrants are known to frequent, detaining thousands. The train operations have prompted concerns about excessive use-of-force and other abuses by the authorities involved. U.S. assistance to help Mexico secure its southern border region has increased, though there is limited transparency regarding dollar values, recipient units, equipment, and training. Additionally, some of the U.S.-donated equipme has seen little use and was reported to be ill-suited for the terrain in this region. For example, U.S.-donated observation towers serve little purpose at the densely forested Mexico-Guatemala border. U.S.-donated biometric data equipment was also observed to be in disuse or only used sporadically. The Southern Border Program brought an increase in mobile checkpoints, and new customs facilities have opened since its launch.
    [Show full text]
  • Combatting Tax Crimes More Effectively in APEC Economies
    Combatting Tax Crimes More Effectively in APEC Economies Tax evasion and related financial crime threaten the strategic, political, and economic interests of all countries. Recognising the threat that such illicit financial flows pose to the Asia-Pacific region, APEC Finance Ministers developed the Cebu Action Plan, a road map for a more sustainable Combatting Tax Crimes financial future, calling on all APEC Economies to build their capacity to address financial crimes. To More Effectively in support these efforts, the OECD has developed this report which describes the range of OECD legal instruments, policy tools, and capacity APEC Economies building initiatives available to enhance the fight against tax crime in the Asia-Pacific region, drawing on examples and successful practices in APEC Economies. Combatting Tax Crimes More Effectively in APEC Economies This document, as well as any data and any map included herein, are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD or APEC, or of the governments of their respective member countries. Please cite this publication as: APEC/OECD (2019), Combatting Tax Crimes More Effectively in APEC Economies, Organisation for Economic Co-operation and Development and Asia-Pacific Economic Cooperation. www.oecd.org/tax/crime/combatting-tax-crimes-more-effectively-in-apec-economies.htm. Photo credits: Cover © The elements in the main cover illustration were adapted from images courtesy of Shutterstock/r.classen and Shutterstock/Anton Balazh.
    [Show full text]
  • Border Security Report
    BORDER SECURITY REPORT VOLUME 24 FOR THE World’s border prOTECTION, MANAGEMENT AND SECURITY INDUSTRY MAY / JUNE 2021 POLICY-MAKERS AND PRACTITIONERS COVER STORY BUILDING BETTER BORDERS IN SOUTHeast ASIA SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS An Unholy Alliance: Links A global review of the Fighting trafficking in human Latest news, views and between extremism and illicit latest news and challenges beings p.26 innovations from the trade in East Africa p.14 from border agencies and industry. p.59 agencies at the border. p.36 2 COMMENT contacts EU’s Southern Borders Under Growing Pressure In its monthly report Frontex has impact on this year’s upturn in migrant Editorial: estimated that the number of illegal numbers. Tony Kingham border crossings at Europe’s external Even when Standing Corps reaches E: [email protected] borders has reached 36,100 in the full strength, ten thousand sounds like first four months of 2021. About a third a lot, but if you divide that number into Assistant Editor: higher than a year ago. three or four working shifts, take away Neil Walker This report suggests that last year, routine days off, holidays, sickness, E: [email protected] irregular migration dropped due to paperwork and training courses, you travel limitations linked to the outbreak are probably left with only hundreds Design, Marketing & Production: of COVID. actually working at any one time, Neil Walker rather than thousands. E: [email protected] But given that illegal border crossings are not subject to COVID travel So, ten thousand doesn’t seem Subscriptions: restrictions, this may not be the whole that many, given the size of the EU Tony Kingham story.
    [Show full text]