E.g., 04/23/2024
E.g., 04/23/2024
Technology & Infrastructure
Array

A new border architecture has emerged that seeks to respond effectively to the seemingly competing demands of facilitating mobility while better managing the risks associated with cross-border travel (terrorism, organized crime, and the entry of unwanted migrants). Information and technology are the centerpieces of this new architecture. This research explores the increased collection and sharing of traveler and other data, expanded use of interoperable information databases, and the new border-management technologies and infrastructure used at ports of entry and beyond.

Recent Activity

cover euroAtlanticBorders
Reports
October 2007
By  Deborah W. Meyers, Rey Koslowski and Susan Ginsburg
Articles
cover_new_chapter[1]
Reports
September 2006
By  Doris Meissner, Deborah W. Meyers, Demetrios G. Papademetriou and Michael Fix
cover_terrorist_mobility[1]
Reports
February 2006
By  Susan Ginsburg
Articles
Articles

Pages

Recent Activity

Reports
October 2007

This report, the product of two workshops held on border management in Belgium and Texas, addresses three arenas of significant change shared by the United States and the European Union: 1) new government organizations for controlling borders; 2) the use of information technology to secure borders; and 3) visa‐free travel policies.

Articles

Since 2000, Spanish authorities have used a technology-driven system for detecting and apprehending migrants attempting to reach Spanish territory by boat. Jørgen Carling of the International Peace Research Institute in Oslo explains how smugglers have responded and why illegal migration to Spain continues.

Reports
September 2006

The culminating report of the Independent Task Force on Immigration and America’s Future seeks to design a new and simplified immigration regime that averts illegal immigration, and at the same time, harnesses the benefits of immigration for the future.

Articles
Border control has evolved from a low-tech, one-agency exercise focused strictly on the Southwestern border to a far broader concept. MPI's Deborah Waller Meyers provides a detailed look at border-enforcement strategies and policies since the 1980s.
Reports
February 2006

This report examines how counterterrorism strategy relates to border security and immigration reform, and how terrorist mobility should be countered. The author argues that terrorist mobility comprises a set of problems distinct from the challenges of managing large-scale global migration.

Reports
June 2005

This report evaluates the United States Visitor and immigrant Status Indicator Technology (US-VISIT) program within the broader contexts of national and homeland security as well as immigration law enforcement and policymaking. In doing so, the author provides constructive criticism along with a framework for rethinking US-VISIT’s goal priorities, investment needs, and deadline expectations.

Articles

Rebekah Alys Lowri Thomas of the Global Commission on International Migration examines how the use of biometrics at borders may violate migrants' privacy rights.

Reports
March 2004

This report examines the transfer of immigration functions from the former Immigration and Naturalization Service to the newly established Department of Homeland Security and offers an analysis of the Department’s progress in its first year of existence toward accomplishing the two purposes for which it was created: (1) to ensure that immigration regulation and control enhances national security; and (2) to improve the performance of both the service and enforcement sides of the immigration system by allocating their respective functions to separate units within DHS. 

Pages