Biometrics’ Role in Enhancing Border Security in Arab Countries

Authors

Fahad Alharby , , Slim Masmoudi , , Shahla Eltayeb , , Jacopo Carbonari , , Margherita Natali

Keywords:

Security Studies, Biometric Technolog, National Security, Immigration and Border Security

Synopsis

Arab states consist of 22 Arab countries. The region stretches from the Atlantic Ocean in the west to the Arabian Sea in the east and from the Mediterranean Sea in the north to the Indian Ocean in the southeast. In recent years the region witnessed some of the most significant interregional and cross-regional border movements and crossings. Multifaced reasons including war, conflict, economic status, and security factors, determine the pivotal importance of border crossings in some Arab countries. Furthermore, border security in some Arab countries is of great importance globally as some of the Arab countries are located in  Northern Africa and Western Africa, which are considered crossing points for irregular migrants to Europe. The threats facing Arab countries’ border security are immense, including illegal migration, movement of terrorist groups, and transnational organized crime. However, there is a lack of information regarding the availability and use of biometrics to enhance border security in Arab countries.

Border security cannot be managed efficiently without using advanced biometric systems that allow overcoming security challenges. Biometrics provides intelligent control of borders (e-gates, e-visas, and e-passport) and provides the possibility of optimizing the use of biometric data for travelers, as well as the ability to collect, use, store and exchange information.

From this perspective, Naif Arab University for Security Sciences and its partners in IOM and UNCCT have developed the current report titled (Biometrics Role in Enhancing Border Security in Arab Countries). This partnership is an innovative approach to conducting a security related study across Arab countries, to combine field expertise and academia, to blend grey literature and academic production. The joint report aims to document the status of the use of biometrics in border security in Arab countries. The present report developed the BSBC Tool (Border Security Biometrics Checklist), a tool of 50 statements to collect evidence on the use of biometrics in Arab countries to enhance border security, and contains a quantitative and qualitative review covering four main areas: including identifying the legislative and regulatory frameworks and technical readiness in border security biometrics, as well as the standards and status in the Arab countries and best practices on the responsible use and sharing of biometrics to counterterrorism and current situation in the Arab countries. Furthermore, the report will present the operational capacities for border security biometrics and the technology implementation in border security biometrics (Current status and expected future). Finally, the report provided practical recommendations to decision-makers regarding the future use of biometrics in border security.

The current results showed that several criteria are absent in the three participating countries, including access to a centralized national database that stores collected personal/biometric data, regulatory framework for biometric data at borders, and regularity of risk assessments. Findings indicated a gap with respect to the application of biometric technologies, such as the issuance of secure biometric identity documents through the proof of identity process to verify a person's identity such as identifiers, using contactless fingerprints to identify/verify travelers (including suspicious ones), using facial recognition To identify/verify travelers (including suspects), use iris scanning to identify/verify travelers (including suspects), use the Gait method to identify/verify travelers (including suspects), and use biometrics to identify Suspicious behaviors (cognitive biometrics), such as emotional facial recognition.

The report recommended the following:

  • Developing a joint Arab strategy for the use of biometrics in border security, including the development of regulatory frameworks and appropriate legislation that allow the sharing of biometric data, and general data protection laws. ¤ Joint Arab cooperation to develop a national database dedicated to storing biometric data.
  • Develop a regulatory framework for border biometric data (for citizens, refugees and high-risk groups) from data collection to data deletion, including data, recording, use, review, processing, storage, retention and deletion.
  • Develop procedures for assessing cybersecurity risks and conducting these assessments periodically.
  • Strengthening the technicalcapabilities of border security personnel to enable them to handle and process biometric data, including the collection of personal biometric data and identification of  suspicious persons, and to effectively supervise the processing of biometric data.
  • Develop guidelines on public health and safety concerns, including international human rights standards, and risk assessments for the use of biometrics at borders.
  • Develop initiatives for effective oversight of counter-terrorism data processing, which include a specific regulatory framework for personal data of children associated with known or suspected terrorists, including terrorist fighters and returnees, and a regulatory framework for biometrics management of data related to known and suspected terrorists (from collection to deletion).
  •  
  • Develop robust communication networks to ensure that operational requirements are met, including timely processing of passengers, performing aircraft departures in a timely manner, and avoiding inefficiencies due to system disruptions. Likewise, stakeholder input is needed to provide funding and staff for the programme.
  • Engage the community and the traveling public with biometric technology through a transparent and direct educational campaign and the benefits it provides to them and improve the overall level of security in travel and transportation.

To achieve these recommendations, the report presented a number of QUICK WINS as follows:

 - Implementation of the ICAO Traveler Identification Program (TRIP)

  • Implementation of MIDAS, the Migration Information and Data Analysis System developed by the International Organization for Migration.
  • Develop principles to support the compliance of existing databases at Arab borders with the rules in force globally, and machine-readable travel documents compliant with the International Civil Aviation Organization (ICAO).

 Strengthening partnerships with international organizations to align their operational capabilities and benefit from capacity building programs to enhance border security in Arab countries.

Abomhara, M., Yayilgan, S. Y., Nymoen, A. H., Shalaginova, M., Székely, Z., & Elezaj, O. (2019, December). How to do it right: a framework for biometrics supported border control. In International Conference on e-Democracy (pp. 94-109). Springer, Cham.

Abomhara, M., Yayilgan, S. Y., Shalaginova, M., & Székely, Z. (2019, August). Border control and use of biometrics: reasons why the right to privacy cannot be absolute. In IFIP International Summer School on Privacy and Identity Management (pp. 259-271). Springer, Cham.

Abomhara, M., Yildirim Yayilgan, S., Elezaj, a., Sz´ekely, Z., Elezaj, O. (2020). How to do it right: A framework for biometrics supported border control. In Proceedings of the 8th International Conference on e-Democracy 2019, CCIS 1111, pp. 1–16, 2020.

Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.

Bilali, G. (2011). Know your customer-or not. U. Tol. L. Rev., 43, 319.

Biomterics-Institute. (2020). State of Biometrics Report – October 2020, pp. 1-14.

CTED. (2021). CTED Analytical Brief: Biometrics and Counter-Terrorism. Report. United Nations Security Council, Counter-Terrorism Committee Executive Directorate.

Dastbaz, M., Halpin, E., & Wright, S. (2013). Emerging technologies and the human rights challenge of rapidly expanding state surveillance capacities. Strategic Intelligence Management, 108-118

DerMarkar, C. (2022). Overview of the ICAO Traveller Identification Programme-TRIP. A paper presented at The 6th Border Management and Identity Conference, Bangkok, Thailand, 7-9 December 2022.

GAO, (General-Accounting-Office). (2002). Technology Assessment. Using Biometrics for Border Security (Issue November).

GaStat (General Authority for Statistics). (2022). Air traffic in Saudi Arabia’s airports 2021.

Gold, S. (2012). Border control biometrics and surveillance. Biometric Technology Today, 2012(7), 9-11.

Hanlon, Q., & Herbert, M. M. (2015). Border security challenges in the Grand Maghreb. United States Institute of Peace. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjBybin9Jv7AhVQeMAKHaarAwwQFnoECA4QAQ&url=https%3A%2F%2Fwww.files.ethz.ch%2Fisn%2F191018%2FPW109-Border-Security-Challenges-in-the-Grand-Maghreb.pdf&usg=AOvVaw2nHETAw_

ICAO (International Civil Aviation Organization). (2017). ICAO trip guide on border control management, https://www.icao.int/Meetings/TRIP-Jamaica-2017/Documents/ICAO%20TRIP%20Guide%20on%20BCM-For%20validation-16-11-2017.pdf

IOM. (2018). IOM and Biometrics (Issue November).

Jain, A. K., & Kumar, A. (2010). Biometrics of next generation: An overview. Second generation biometrics, 12(1), 2-3.

Kausch, K., Bonsoms, A., Kasapoglu, C., Schmitt, L., Švedkauskas, Ž. (2022). Liberty’s doom? Artificial intelligence In middle eastern security. Euromesco Policy Study (27). 1-100. https://www.euromesco.net/wp-content/uploads/2022/07/Policy-Study27.pdf

Khan, N., & Efthymiou, M. (2021). The use of biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights, 1(2), 100049.

Kingston, L. N. (2018). Biometric identification, displacement and protection gaps. Digital lifeline, 35-54.

Liu, N.Y. (2013). Bio-privacy: Privacy regulations and the challenge of biometrics. Routledge.

National Research Council, & Whither Biometrics Committee. (2010). Biometric recognition: Challenges and opportunities.

Renaud, A. (2022). Biometric borders: Leveraging technology for secure, contactless identity verification and passenger screening. A paper presented at The 6th Border Management and Identity Conference, Bangkok, Thailand, 7-9 December 2022.

Shaheed, K., Mao, A., Qureshi, I., Kumar, M., Abbas, Q., Ullah, I., & Zhang, X. (2021). A systematic review on physiological-based biometric recognition systems: current and future trends. Archives of Computational Methods in Engineering, 1-44.

Sharif, M., Raza, M., Shah, J.H., Yasmin, M., Fernandes, S.L. (2019). An Overview of Biometrics Methods. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_2

Székely, Z. (2020). Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute. Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2. 2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, 576, 259.

Thalesgroup. (2023a). Biometrics (facts, use cases, biometric security) (thalesgroup.com). https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/biometrics. Web link accessed 2023, January 04.

Thalesgroup. (2023b). Saudi Arabia builds a safer future with biometric borders (thalesgroup.com). https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/biometric-borders-saudi-arabia. Web link accessed 2023, January 06.

Thenuwara, S. S., Premachandra, C., & Kawanaka, H. (2022). A multiagent-based enhancement for multimodal biometric system at border control. Array, 14, 100171.

UNCTED, UNCCT. (2021). Survey on developing and Implementing systems to collect biometric data in order to responsibly and properly identify terrorists. Internal document.

UNOCT-UNCCT, CTED, & Biometric-Institute. (2018). United Nations Compendium of recommended practices for the responsible use and sharing of biometrics in counter-terrorism. https://www.un.org/sc/ctc/wp-content/uploads/2018/06/Compendium-biometrics-final-version-LATEST_18_JUNE_2018_optimized.pdf

Voigt, P., Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing.

Wendehorst, C., Duller, Y. (2021). Biometric Recognition and Behavioral Detection: Assessing the ethical aspects of biometric recognition and behavioral detection techniques with a focus on their current and future use in public spaces. Report. European Union. http://www.europarl.europa.eu/supporting-analyses

Xiao, Q. (2007). Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. IEEE Computational Intelligence Magazine, 2(2), 5-25.

Zhongping, F., Robert Hutchings, Kumar, R., Sidiropoulos, E., Wrobel, P., & Zagorski, A. (2009). Global security in a multipolar world. In European Union ISS Challiot’s papers (Vol. 118, Issue October). http://www.iss.europa.eu/publications/detail/article/global-security-in-a-multipolar-world/

Web links

Flyer_Morocco_US_A4_03-2020_Download.pdf

Jordan's Biggest Airport Trials Biometric Boarding - FindBiometrics

Spain deploying biometrics at Morocco land border for EES | Biometric Update

Flyer_Morocco_US_A4_03-2020_Download.pdf (veridos.com)

https://mideast.prio.org/utility/DownloadFile.ashx?id=65&type=publicationfile

Cover Image

Published

10-December-2023

Details about this monograph

ISBN-13 (15)

978-603-8361-53-5

doi

10.26735/978-603-8361-51-1

Physical Dimensions