border surveillance systems
TRANSCRIPT
P a g e | 1
THE EXISTING BORDER SURVEILLANCE SYSTEM
ABSTRACT:
The paper addresses the different aspects of the existing Border Surveillance System.
National borders are a security issue for all governments. Permeable borders can prompt pirating
of individuals, medications, weapons and stash, which help store criminal movement and can
prompt serious social issues over the globe. Frail Borders can likewise prompt more serious
issues, for example, insurrection, incursion and terrorist activity. With the end goal, governments
should ensure the country state and their nationals it is essentially vital that they control their
borders viably.
Notwithstanding, this can frequently show truly a test as borders may keep running for
hundreds if not a great many kilometers through differing and infrequently unfriendly territory.
There exists number of various items, manufacturers and solution providers who help to develop
a fully developed and integrated monitoring system so that this illegal movement of individuals
can be minimized. The paper provides a brief overview of different surveillance technologies in
border control applications, especially those used for controlling cross-border traffic, etc. In a
broader context, the paper presents the result of the research carried out for the existing border
surveillance systems that are available across the globe.
1. INTRODUCTION
Illegal movement is an activity conducted by individuals who want to relocate themselves
over the national borders. Illicit intersection of the international borders has high concern of
numerous nations to secure their native and to stop any potential danger to country security,
particularly because of the unfaltering increment in sorted out wrongdoing, terrorist dangers,
sneaking exercises, and so on. [1], [2] and [3]. Terrorists, runners and unlawful workers are the
genuine risk when they cross the international borders, along these lines, this intriguing issue and
major issue for some nations. Any crevice or observing free inside of the borders may bring
about an extreme harm to the security of that nation. These days, border reconnaissance is a test
and requires the high level of precision.
P a g e | 2
The new statistics demonstrates an increment in the quantity of dangers brought on by
unlawful action on the eastern border of Europe Union (EU). That incorporates tobacco pirating,
vehicle carrying, petroleum item sneaking, medications sneaking, and illicit border crossing. One
rate of tobacco pirating was found in the Belarus-shine outskirt worth of 15 million euro.
Additionally in one operation, 4 million cigarettes were pirated over the Russian-Finnish border.
In 2012, there was 77.437 illicit intersections in the EU, 1.597 were on the eastern border. These
intersections were led between Check Points. Latest figures demonstrate that 45% of the
distinguished area intersection of the Eastern Mediterranean side of the EU is in the Bulgarian-
Turkish border.
The EU-Ukraine border is the real risk permitting illicit intersection to the EU, as
indicated by the most recent FRONTEX report [2] it is "The focal travel and root of sporadic
movement at the basic border". The low wages is the principle driver for movement, and the
Ukraine normal wages is EUR 075 in the year 2012. Moreover, Ukraine is the fundamental
travel for Afghanistan, Eritrea, and Somalia illicit vagrants. The EU-Ukraine outskirt is around
24 000 square kilometers of area. The border is perplexing and extraordinary in land terms. An
area of this border is situated in the middle of Poland and Ukraine has 535 kilometers, figure 2
demonstrates the EU-Ukraine verge on the guide. It is Bug Stream in the north piece of the limit
encompassing by plain land while its mountains and woodland in the south. There are six rails
and six street checkpoints. Customarily, border checking is directed through manual method for
physical checkpoints or the putting of a whole military unit to screen the certain segment of the
border. The best type of border observation includes insignificant human intercession, which
comes as introducing of remote sensor arranges that recognize the movement in the region and
react as needs be. Numerous current frameworks intended to be for outskirt observing beginning
from wall and divider to extremely complex frameworks. There is rising enthusiasm for creating
canny border reconnaissance frameworks to build the proficiency and diminish the expense.
Modern surveillance systems have much more demanding requirements such as large,
busy and complex landscape, the use of heterogeneous technologies, the real-time acquisition
and interpretation of the evolving landscape, instantaneous flagging of potentially critical
situations in any weather and illumination conditions. Real-time monitoring of a landscape is
taking into account variable topography: coastal plains, high mountains, dune, and vast deserts.
P a g e | 3
In the later sections we portrayed the characteristics of border monitoring, the present border
perception systems, the imperative of the present systems, the challenges standing up to border
observation systems, the prerequisite for new system, and conclusion of this paper.
2. CHARACTERISTIC OF BORDER MONITORING
Border Monitoring can be characterized as precise action particularly went for watching
and archiving the progressions with outsiders and exile at the border.
Right when checking outskirts the people routinely don't ask raise concerning
unobtrusive components, techniques, practices or other specific information, the key request
would eventually be what periphery is weighing regardless . The thought of checking routinely
has a long tradition. This concerns watching distinctive conditions in confinement offices, and
imprisonment canters prisons and different workplaces where people are not permitted to move.
Five focuses are to be considered in term of border monitoring [1] which are
2.1 There are a potential high number of dangers / threats, and that could be unpredictable.
2.2 The surveillance operation happens amid peace condition.
2.3 Many natural/ environmental elements can make disarray and reason diversion.
2.4 The risk discovery and distinguishing proof can be made more convoluted by the
utilization of disguising methods.
Fig. 1. Demonstrates the EU border with Ukraine
P a g e | 4
2.5 The observed territory is ordinarily wide and obliges a substantial heterogeneous sensor
system. The greater parts of these attributes are normal in the majority of LWSNs
arrangements.
Those perspectives if considered can guarantee a superior checking system and thus more
secure borders. Those viewpoints address the conceivable vulnerabilities and additionally the
recognizable proof of segments of the system. A region of significance is highlighted in the study
and states that these reconnaissance operations typically happen amid typical circumstances over
the borders and the data so accumulated amid the periods of regularity are being utilized against
the nations as a part of a more drawn out run.
The use of insidious methods for detection and surveillance makes this task further intriguing.
The installation of monitoring devices on the ground or in a hidden manner can make these
devices more efficient and can keep them away from the naked eye. Usually, the borders
constitute a large geographical area that is combination of both rough and plain terrain and use of
those devices is preferred that are more robust, long lasting, efficient and compatible with rest of
the devices in place. Linear Wireless Sensor Networks, if added to the border monitoring setup,
can take the surveillance process to another level because the sensor networks directly reduce the
human dependency and work on embed artificial neural network. A fully embedded Linear
Wireless Sensor Network normally possesses all the essential components that are needed for a
successful border monitoring process.
3. The Existing Border Surveillance Systems
This section discusses the current systems used to monitor international borders. There
are lack of the resources to find detailed information about the current systems due to the
sensitive nature of these systems, we present the relevant systems based on the best available
resources.
The first system called Helios created by the British company called Fotech Solutions [4].
It is a Distributed Acoustic Sensor (DAS) consists of fibre-optic cables, lasers & detectors.
Helios is being implemented and proposed for surveillance across Southern Arizona borders in
concrete and other parts of America as well. It has number of features that separate it from the
P a g e | 5
other existing border surveillance devices. It minimizes the hassle of wires, has the considerably
larger scale and accuracy along with synchronization with the G.P.S.
The second system is Global Positioning System (GPS) based surveillance system. GPS
can operate either independently or in collaboration with the sensor networks. In the first case,
through the satellites, the motion can be detected, and traced into forward positions, and in the
event of sensor networks, the alarms are being sent through the nodes that are tracked through
the GPS devices and they enable further tracking of material across the no-go areas. The use of
GPS-based surveillance system can be extended to the Internet and HTTP protocol that will
allow finding the record in the database and hence reach the exact details of individuals. A
general characteristic of GPS-based surveillance system is the ability to detect weapons and
other metal based material which might not be traced through conventional forms of surveillance
devices. They enable identifying and detecting the movement done from the starting point and
hence and tell what might be hidden in the vehicles and other covered parts of the caravans in
form of the business and trade goods that normally go pass the borders [5].
The third system is change detection phenomena based monitoring [6]. This mode of the
border monitoring system involves capturing and recording of image and information of a
particular place at two different instances, mostly done through a satellite that monitors the
activity and location constantly and records any difference that has occurred in a fixed time slot.
This model is under the recommendation of European Union across the border of Ukraine for
preventing any illegal movement across the border territory. The working principle is to entail
capturing the images of a particular area at different intervals. The instruments calibration and
the resolution of the imaging device must be kept constant while taking images over two distinct
time frames. Image processing and voice signal threshold and modulation activities must be
performed to refine the image and voice that is recorded [7]. The system has been designed with
consideration of monitoring different geographical area. One challenge is differentiating the
change that may occur due to the natural reasons and change that might occur due to the humans
crossing the border threshold. This system is susceptible to the natural conditions such as the
cloud cover and other weather changes that can affect the accuracy of the results.
A new approach is being adopted in the name of BorderSense [8], which is a hybrid
system and makes use of the technologies and facilities available. One of the features being
P a g e | 6
tagged to this system is the minimum human involvement. The technologies embedded in the
entire system constitute the multimedia and sensing systems, under the surface sensing devices,
and mobile nodes. The system provides beyond the line of sight detection; also, if some material
it can be detected through its effective detection covers the target ability it enables tracking and
reaching the target. Underground sensing ability offers an extra plus because visibility
considered the weakness in many cases. The architecture of Border Sense monitoring system is
slightly different from the existing monitoring techniques that are available. Heterogeneous
nodes as assortments are proposed in this form of a surveillance system, which increases the
range as well as the accuracy and reducing the degree of false alarm at the same time. A major
advantage of this system is the compatibility with the aerial surveillance system. Since it is a
hybrid system, therefore it can absorb other systems features into itself. Therefore, this is the
most capable of recent systems [8].
Another Border Surveillance System is given by Thales [9] that is perfectly customized
according to the necessity got from the national security of distinctive nations. This System
serves to lead hazard appraisal, association change, and idea of operation and utilization
definition. It comprises of System configuration, mastering of key innovations (sensors,
information transfers, C2), reconciliation of legacy Systems and arrangement execution. Thales
additionally gives an operational and specialized preparing to the customers alongside long haul
bolster administrations. The customers get an advantage of enhanced marginal observing,
effective mediation through fruitful interferences and fortified control through better and faster
screening of individuals and products. Additionally, serves to reach snappier choice procedure.
Its observation System comprises of different identification instruments and ID sensors, for
example, radars, UGS, dynamic wall, electro-optical cameras.
OptaSense [10] is a greatly practical and hearty answer for border observation, checking and
security. It has been demonstrated in overall operations, in an assortment of commercial
ventures, more than five years, including border arrangements on different main lands. It lives up
to expectations working together with existing outskirt reconnaissance advances (e.g. radars,
EO/IR, UAVs, wall/boundaries). It screens the full border keeping in mind the end goal to
prompt the high esteem resources, and to advise security faculty about advancing outskirt danger
examples so resources can be sent and redeployed where required, subsequently lessening
P a g e | 7
expenses. This System additionally screens the entrance courses, screens a border zone or may
influence the current fibre structure.
Cassidian arrangements (Border observation Solution) [11]are taking into account an
extensive variety of stages and best in class advancements: radars (Synthetic Aperture Radar
Image), altered or versatile war rooms and data Systems, secure correspondences (TETRAPOL,
TETRA), database administration for security insight, satellite, air, waterfront, oceanic and land
abilities (light flying machine, helicopters, UAVs). In light of overall perceived skill in safeguard
and security Systems, Cassidian outlines and develops exhaustive and exceptionally incorporated
Green & Blue border security answers for suit its clients' necessities.
Westminster [12] can give an extensive variety of Border Security answers for the
reconnaissance, identification, and screening of persons intersection national land, ocean or air
Borders. Checkpoint screening of persons, merchandise and vehicles including Westminster's
remarkable ThruPort security arrangement. Westminster gives items that empower precise and
viable Vehicle Scanning and People Scanning to screen any movement intersection the Border.
By adding to a coordinated Border Security arrangement, Westminster can give nations capable
Border control capacities, paying little heed to length, multifaceted nature or territory.
Fig. 2.Border Surveillance and Control by Cassidian
P a g e | 8
DOLPHIN organization [13] gives an enhanced identification of small or quick vessels
utilized for medications trafficking and unlawful movement. The organization point is to propose
Border Surveillance is to enhance the choice making and reaction abilities of prevailing voices
accountable for the control and checking of European oceanic bordes. By taking after the three
key destinations, for example, lessening the loss of life of illicit migrants adrift through expanded
salvage operations; decreasing the quantity of unlawful workers entering the EU undetected; and
expanding the inside security of the EU by adding to the counteractive action of cross-border
wrongdoing.
FLIR's border reconnaissance Systems [14] join execution, scope, and dependability to make
the most productive answers for outskirt assurance, waterfront observation, vessel movement
checking, airplane terminal security, and other extensive edge security applications available
today. It joins warm cameras, radars, and a large group of different sensors to make a genuinely
industrious 360-degree observation answer for the recognition, evaluation and following of
various targets all the while from high reaches. EVPUDefence is a Czech Republic organization
[15], built up in 2001, is the pro being developed, outline and generation of unique settled and
portable checking and reconnaissance Systems proposed for the security and control of the
outskirts, airplane terminals, harbours and different territories of high hobby. They give
Stationary and portable multi-tangible Systems, checking and reconnaissance vehicles and
SAMBA - border assurance Systems.
RADIOBARRIER [16] is securing more than 3500 km of state outskirts around the world.
Since its first arrangement in 2006 the System has demonstrated itself as an exceptionally
productive answer for outskirt observation in any land and atmosphere conditions. It gives
outskirt observation a security and additionally pipeline security, Parameter insurance, a
foundation security. ISIS, Integrated Surveillance Intelligence System [17] along with DHS
Bureau of country security in USA cooperates for the observation ability of Border Patrol home
office, remote feature reconnaissance cameras, and a mixed bag of physical sensors. Remote
feature reconnaissance (RVS) Systems, sensors (seismic, attractive, and warm identification),
and Integrated Computer Assisted Detection (ICAD) are parts of the congressionally supported
Integrated Surveillance Intelligence System (ISIS).
P a g e | 9
The last application is the European outside outskirt reconnaissance System EUROSUR. The
system is proposed for reconnaissance over the Schengen border. The object is to diminish the
unlawful outsiders' development on the suburbs. It gives a typically specialized system needed to
defend participation and 24-hour correspondence between the Member States' powers and foster
the utilization of front line advancements for border observation. The primary point is to backing
the Member States in their endeavours to diminish the quantity of the unlawful outsiders. The
limit comes as intricacy as far as keeping up the coordination, and performing the specialized
operation.
Table of Summaries:
Product
name/Technology Description Objective Limitation
Thales BSS – Border
Security Systems
Tailor made solution
for catering national
security needs by using
sensors,
telecommunication, C2
To improve control
over borders as well
as improve security
of organizations by
providing customized
solutions.
Difficult to cater
smaller size clients,
constraints due to
environmental
variables
OptaSense – A Mature
and Proven
Technology for asset
protection
This provides a cost-
effective and robust
solution for border
surveillance,
monitoring and
protection by using
radars, EO/IR, UAVs,
fences/barriers
To detect border
security threats with
minimal nuisance,
includes personnel,
vehicles, tunnelling,
low-flying aircraft
(drone) and ultra-
light
Low humanitarian
aspiration
Air Bus - Border
Surveillance systems
(cassidian solutions)
An integrated and
customised border
security provider that
utilizes IR and video
cameras, ground
surveillance radars,
maritime surveillance
radars including HF
surface wave radars,
airborne surveillance
systems) connected to
command and control
centres
To ensure border
security efficiency
with platforms and
state-of-the-art
technologies like
radars (Synthetic
Aperture Radar
Image), fixed or
mobile command
centres and
information systems,
secure
communications
(TETRAPOL,
Superficial structure,
needs to adjust as
per climatic and
other changes
P a g e | 10
TETRA), database
management for
security intelligence,
satellite, air, coastal,
maritime and land
capabilities (light
aircraft, helicopters,
UAVs , drones)
Westminster
International – Border
Security
The company offers
bespoke Border
crossing solutions
involving Checkpoint
Screening of persons,
goods and vehicles
including ThruPort
security solution
To provide a wide
range of Border
Security solutions for
the surveillance,
detection and
screening of persons
crossing national
land, sea or air
Borders.
Limitation in
integrating all
technologies
together
Dolphin Border
Surveillance system
and technologies
The company utilizes
VTS/AIS, VMS, and
LRIT and remote
sensing observation
systems (radar / sonars)
to control border
security, drug
trafficking and illegal
immigrants.
To provide maritime
security for European
maritime (sea front)
borders
Restricted only to
sea intrusions
FLIR Military and
Defence Border
Surveillance systems
It uses thermal
cameras, radars, and
other sensors to
conduct 360-degree
surveillance solution.
The products include
Ranger HDC
MultiSensor, Star
SAFIRE 380-HD etc.
To provide 360degree
coverage and 24/7
performance of the
system
State-of-the-art
systems, minimal
limitations for
security and
monitoring
EVPU Defence
systems
The company provides
customized solutions
either fixed or mobile
monitoring and
surveillance systems
that are intended for the
protection and control
of the borders, airports,
harbours and other
areas of high interest by
To provide security
ad monitoring
systems for borders
as well as other
smaller organizations
/ companies
Limited to Shallow
structure, needs to
alter as per
environmental and
other changes
P a g e | 11
using Pans/ Tilts , CCD
TV camera, laser range
finder, GPS and/or
digital magnetic
compass, control
system containing
powerful software.
Radio Barrier Border
Services
The company provides
border surveillance and
security of important
assets by using latest
technologies and
advancements such as
seismic sensors, multi-
sensors, RSL, etc .
The company aims to
provide border
surveillance, pipeline
security, perimeter
protection, and
critical infrastructure
security
Customized
solutions, very less
issues
Integrated Surveillance
Intelligence System -
ISIS
The company provides
border surveillance and
security along with
department of
homeland security DHS
for key assets and
border by using
innovative
technologies.
To provide an
integrated security
system for American
borders
Limited to USA
security and control
of illegal migrants.
4. LIMITATION OF CURRENT SYSTEMS
Most of the current methods can just claim robustness and unwavering quality for constrained
situations: with restricted sensor system, with restricted feature footage, constrained adaptation
to internal failure and little variability of scenes [Ref]. Not every proposed method assembles
complex models of the monitored spatial and fleeting advancement of the scene. Another
restriction confronted in the current reconnaissance systems is the level of exactness and scope of
being given by each of them. Different issues being confronted through the advanced
reconnaissance systems incorporate the false alerts that get on because of the common variables,
for example, wind and creatures.
5. CHALLENGES
Current systems are subject to human intervention and physical presence. They employ
large numbers of capital and human resources. The need is to make them independent of physical
presence of human patrolling. Deploying WSNs in Border surveillance has significant
advantages over the current system while raising some challenges. An effective remote
P a g e | 12
surveillance system must take into account these major issues toward successful WSNs
deployment for border surveillance [18]:
1. Reliability of the system.
2. Power efficiency
3. Appropriate maintenance to reduce downtime.
4. Deployment technique that is achievable in large unmanned area.
5. Architecture that limit the need of over constructor resources.
6. Efficient routing technique for effective data transmission [9].
7. Efficient MAC protocol that adopt duty-cycle technology.
Full coverage of the monitored area is important aspect of the surveillance system. The
coverage must combine with on time delivery, as late data delivery will result on losing the
surveillance mission of the system [MMSPEED]. On technical front MAC protocol is one of the
methods being employed to support border surveillance purpose. The vulnerability is faced in
form of each node’s ability to achieve its duty with lowest cost as possible. Maximising node life
span can be achieved in applying the suitable duty cycle MAC protocol while assuring prompt
data delivery and power conservation.
The line of sight factor limits the functioning to a greater degree, and it does not allow
monitoring behind the wall and any direction that has any obstacle. Many existing systems suffer
from this shortage and it reduces the performance not just in terms of long-range detection, but
also the expenditure incurred due to repetitive installation of surveillance elements. All these
factors do call up for an effective and dynamic surveillance system which will enable more
accurate monitoring that is less dependent on the human intervention and is relatively more
affective in terms of range and accuracy.
6. SET OF REQUIREMENTS
All there is a need to establish such a system that is compatible and versatile to variable
circumstances. It should have the feature of being scalable, its limit and access range should not
be limited. The system should be modelled in such a way that adjustments can be made without
cutting the entire project and surveillance device. The network must support heterogeneous node
P a g e | 13
deployment that will result in connection of multiple heterogeneous nodes and increase the
functionality. The monitoring devices must be multi-hop communication enabled which support
network scalability. It should not over consume power hundred thousand of sensor nodes needed
for one deployment. Sensor nodes are energy dependent, which is serious constraints that impose
the need for such a monitoring system that can extend the lifetime of sensor nodes without
risking the overall throughput. The energy consumption is a hot topic in remote areas where
nodes cannot be maintained or replaced on regular intervals, for this purpose, the incumbent
devices should be energy efficient. LWSNs are the key to effective border surveillance system.
They incorporate all those methods, tools and techniques, which are almost security proof and
enable large percentage of decrease in the trespassing across the borders and all other undesired
processes.
New deployment strategy specific for LWSNs is needed to fill up the gap in existing knowledge
and technology. The aim of this deployment method is to support heterogeneous, scalability, and
it is energy and cost efficient. The network must adopt heterogeneous node deployments which
allow different nodes capabilities and functionality for instance some nodes will be sensing
emotions and others might sense temperature. The new system should be energy efficient,
scalable, reliable, cost efficient, and independent of human intervention.
7. THE NEED FOR NEW SYSTEM
The aforementioned applications are an example of linear infrastructure that is required to be
fully secured. Any distraction or interruption to these applications might affect the public and
national security. The interruption could cause high financial crises and lead to major
interruption. This could happen in the very secure country such as Britain, which indicates higher
probabilities in developing countries and even more such as a country under war or revolution.
For instance, in late April 2014 a gang of thieves managed to steal thousands of gallons of diesel
from Britain’s most important pipeline that runs 130 miles from Fawley refinery to the west
midlands. Similar incidence happened in Nigeria as some community members stole oil from the
nation oil pipeline. That has not only disturbed the security forces and energy prices, but also has
it is impacted on the environment and caused high pollution. Another example is the railway
P a g e | 14
distraction can turn the busy nation into massive interruption when a cut on the main railway
link.
These examples highlight the importance of having very secure infrastructures that can
prevent any distraction that might occur to keep it in the first place. They also highlight number
of challenges. The infrastructures mentioned are national property, and they are costly in the
development. However, such expensive properties are the vital spine of the public needs in any
modern society. Such critical systems require high-security monitoring system that allows one-
time watch with the minimum cost. This raises a necessity to develop a complete generic system
that can provide a satisfactory level of security.
Current system are solving the problem from different angle depend on the applications.
The focus is raised from applications perspective rather than developing the general solution that
suits the applications that share same deployments features. Developing an integrated System for
border monitoring, such a System will adaptively utilize various approaches to border
monitoring to maximize the amount and quality of surveillance information while minimizing
resource utilization. By providing this standardized System, we anticipate promoting
interoperability and information integration. The author believes that the best border monitoring
system should integrate various technologies to achieve high performance and accuracy.
Implementing LWSNs will assure systematic coverage that fills the gap in other monitoring
systems. It is worth to mention that LWSNs system can utilize various type of sensors to detect
different variable such as acoustic, vibration, chemical, environment, weather, humidity, flow,
position, angle, displacement, distance, speed, light, etc. Besides, LWSNs technology can be
deployed to give the early alarm to prevent the potential threat to a border rather than flagging
when it has already happened.
The new system can also be used in other LWSNs Application that can benefit more from
their topological layout. Namely: Borders monitoring, Pipelines monitoring, Railways
monitoring, Alternating Current (AC) link monitoring. We choose these applications, as they
have been the largest application that will raise more challenges for the research area. There are
many approaches to addressing these applications. However, they are rather expensive,
unreliable, and difficult to implement. We believe it is more feasible to deploy LWSNs in these
applications to achieve better quality and energy saving.
P a g e | 15
8. CONCLUSION
There is no perfect technology; each technology has specific features that work well in
certain situations. The writer believes that right LWSNs can prevent risk to happen in border
surveillance system. It is also worth to mention that hybrid system that encompasses the features
of various systems that are available would serve the purpose of border monitoring more
efficiently. Taking the features of all and leaving behind the drawbacks of the respective system
will enable building a hybrid system which is not just efficient but according to the need of hour
in form of border surveillance.
The hybrid system should work independent of the natural changes in form of rain,
storms, compatibility in the deserts and other barren parts of the borders. While reliance is
directly on the sensor networks, the linear approach and accuracy measurement through the
linear aspect can help improving the entire process.
As this chapter proved the need for such a system, the rest of the research will start
studying the mechanisms of adopting WSNs to serve border-monitoring system. Therefore, the
following chapter will focus on communication schemes that designed for general WSNs to
study their applicability to serve LWSNs.
REFERENCES:
[1] Tni.org, 'Peace & Security | Borderline', 2015.[Online].Available:
http://www.tni.org/report/borderline.[Accessed: 20- May- 2015].
[2]A. Mazurenko, 'IMMOVEMENT DETENTION AND THE RULE OF LAW', Bingham
Centre For The Rule of Law, 2013.
[3] Rand.org, 'Measuring Illegal Border Crossing Between Ports of Entry: An Assessment of
Four Promising Methods | RAND', 2011. [Online].Available:
http://www.rand.org/pubs/occasional_papers/OP328.html.[Accessed: 20- May- 2015].
[4]B. Institute, 'Meet the new boss, same as the old boss: Border surveillance tech redux', Baker
Institute Blog, 2011. [Online].Available: http://blog.chron.com/bakerblog/2011/02/meet-
the-new-boss-same-as-the-old-boss-border-surveillance-tech-redux/.[Accessed: 20- May-
2015].
[5] Media.bordermonitoring-ukraine.eu, 'Four Pakistani refugees failed to find a pathway to
P a g e | 16
Slovakia « Bordermonitoring Ukraine: Media articles', 2015. [Online].Available:
http://media.bordermonitoring-ukraine.eu/2015/05/06/four-pakistani-refugees-failed-to-
find-a-pathway-to-slovakia/.[Accessed: 20- May- 2015].
[6]D. Martosko, '957,000 illegal immigrants got US work permits during Obama presidency',
Mail Online, 2015. [Online].Available: http://www.dailymail.co.uk/news/article-
2937035/Nearly-1-MILLION-border-crossing-illegal-immigrants-received-work-permits-
Obama-s-presidency-shocking-documents-reveal.html.[Accessed: 20- May- 2015].
[7]P. Walker, 'Europe's migrant influx: illegal border crossings soar in 2014', the Guardian,
2014. [Online].Available: http://www.theguardian.com/uk-news/2014/sep/05/europe-
migrant-influx-illegal-border-crossings.[Accessed: 20- May- 2015].
[8] Americanchronicle.com, 'Illegal Immovement: An American Tragedy', 2007.
[Online].Available:
http://www.americanchronicle.com/articles/viewArticle.asp?articleID=21975.[Accessed:
20- May- 2015].
[9] Thalesgroup.com, 'Border surveillance system - Thales Group', 2015.[Online].Available:
https://www.thalesgroup.com/en/worldwide/defence/border-surveillance-system.[Accessed:
20- May- 2015].
[10] OptaSense, 'Border Monitoring | Border Protection | Military Road Transport', 2015.
[Online].Available: http://www.optasense.com/our-solutions/borders-military/protecting-
borders/.[Accessed: 20- May- 2015].
[11] Defenceandsecurity-airbusds.com, 'Border Surveillance & Control - Airbus Defence and
Space', 2015. [Online].Available: http://www.defenceandsecurity-
airbusds.com/pl_PL/1283.[Accessed: 20- May- 2015].
[12]W. Ltd., 'Border Security System and Equipment, Perimeter Access Control and
Surveillance', Wi-ltd.com, 2015.[Online].Available: http://www.wi-
ltd.com/Solutions_by_Sector/Border_Security.[Accessed: 20- May- 2015].
[13] Gmes-dolphin.eu, 'DOLPHIN in a Nutshell |GMES DOLPHIN', 2015. [Online].Available:
http://www.gmes-dolphin.eu/project-overview/19.[Accessed: 20- May- 2015].
[14]I. FLIR Systems, 'FLIR Border Surveillance Products | FLIR Systems', Flir.com,
2015.[Online].Available: http://www.flir.com/surveillance/display/?id=64968.[Accessed:
20- May- 2015].
P a g e | 17
[15] Army-technology.com, 'EVPU Defence - Monitoring and Surveillance Systems - Army
Technology', 2015. [Online].Available: http://www.army-
technology.com/contractors/surveillance/evpu-defence/.[Accessed: 20- May- 2015].
[16] Radiobarrier.com, 'Border Surveillance systems', 2015.[Online].Available:
http://www.radiobarrier.com/border-surveillance-1/.[Accessed: 20- May- 2015].
[17]J. Pike, 'ISIS', Globalsecurity.org, 2015.[Online].Available:
http://www.globalsecurity.org/security/systems/isis.htm.[Accessed: 20- May- 2015].
[18]D. Hayes and M.Vermeulen, 'Assessing the Costs and Fundamental Rights Implications of
EUROSUR and the "Smart Borders" Proposals', Borderline The EU's New Border
Surveillance Initiatives, 2012. [Online].Available:
http://www.statewatch.org/news/2012/jun/borderline.pdf.[Accessed: 20- May- 2015].