Arab states consist of 22 Arab countries. The region stretches from the Atlantic Ocean in the west to the Arabian Sea in the east and from the Mediterranean Sea in the north to the Indian Ocean in the southeast. In recent years the region witnessed some of the most significant interregional and cross-regional border movements and crossings. Multifaced reasons including war, conflict, economic status, and security factors, determine the pivotal importance of border crossings in some Arab countries. Furthermore, border security in some Arab countries is of great importance globally as some of the Arab countries are located in Northern Africa and Western Africa, which are considered crossing points for irregular migrants to Europe. The threats facing Arab countries’ border security are immense, including illegal migration, movement of terrorist groups, and transnational organized crime. However, there is a lack of information regarding the availability and use of biometrics to enhance border security in Arab countries.
Border security cannot be managed efficiently without using advanced biometric systems that allow overcoming security challenges. Biometrics provides intelligent control of borders (e-gates, e-visas, and e-passport) and provides the possibility of optimizing the use of biometric data for travelers, as well as the ability to collect, use, store and exchange information.
From this perspective, Naif Arab University for Security Sciences and its partners in IOM and UNCCT have developed the current report titled (Biometrics Role in Enhancing Border Security in Arab Countries). This partnership is an innovative approach to conducting a security related study across Arab countries, to combine field expertise and academia, to blend grey literature and academic production. The joint report aims to document the status of the use of biometrics in border security in Arab countries. The present report developed the BSBC Tool (Border Security Biometrics Checklist), a tool of 50 statements to collect evidence on the use of biometrics in Arab countries to enhance border security, and contains a quantitative and qualitative review covering four main areas: including identifying the legislative and regulatory frameworks and technical readiness in border security biometrics, as well as the standards and status in the Arab countries and best practices on the responsible use and sharing of biometrics to counterterrorism and current situation in the Arab countries. Furthermore, the report will present the operational capacities for border security biometrics and the technology implementation in border security biometrics (Current status and expected future). Finally, the report provided practical recommendations to decision-makers regarding the future use of biometrics in border security.
The current results showed that several criteria are absent in the three participating countries, including access to a centralized national database that stores collected personal/biometric data, regulatory framework for biometric data at borders, and regularity of risk assessments. Findings indicated a gap with respect to the application of biometric technologies, such as the issuance of secure biometric identity documents through the proof of identity process to verify a person's identity such as identifiers, using contactless fingerprints to identify/verify travelers (including suspicious ones), using facial recognition To identify/verify travelers (including suspects), use iris scanning to identify/verify travelers (including suspects), use the Gait method to identify/verify travelers (including suspects), and use biometrics to identify Suspicious behaviors (cognitive biometrics), such as emotional facial recognition.
The report recommended the following:
To achieve these recommendations, the report presented a number of QUICK WINS as follows:
- Implementation of the ICAO Traveler Identification Program (TRIP)
Strengthening partnerships with international organizations to align their operational capabilities and benefit from capacity building programs to enhance border security in Arab countries.
Abomhara, M., Yayilgan, S. Y., Nymoen, A. H., Shalaginova, M., Székely, Z., & Elezaj, O. (2019, December). How to do it right: a framework for biometrics supported border control. In International Conference on e-Democracy (pp. 94-109). Springer, Cham.
Abomhara, M., Yayilgan, S. Y., Shalaginova, M., & Székely, Z. (2019, August). Border control and use of biometrics: reasons why the right to privacy cannot be absolute. In IFIP International Summer School on Privacy and Identity Management (pp. 259-271). Springer, Cham.
Abomhara, M., Yildirim Yayilgan, S., Elezaj, a., Sz´ekely, Z., Elezaj, O. (2020). How to do it right: A framework for biometrics supported border control. In Proceedings of the 8th International Conference on e-Democracy 2019, CCIS 1111, pp. 1–16, 2020.
Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
Bilali, G. (2011). Know your customer-or not. U. Tol. L. Rev., 43, 319.
Biomterics-Institute. (2020). State of Biometrics Report – October 2020, pp. 1-14.
CTED. (2021). CTED Analytical Brief: Biometrics and Counter-Terrorism. Report. United Nations Security Council, Counter-Terrorism Committee Executive Directorate.
Dastbaz, M., Halpin, E., & Wright, S. (2013). Emerging technologies and the human rights challenge of rapidly expanding state surveillance capacities. Strategic Intelligence Management, 108-118
DerMarkar, C. (2022). Overview of the ICAO Traveller Identification Programme-TRIP. A paper presented at The 6th Border Management and Identity Conference, Bangkok, Thailand, 7-9 December 2022.
GAO, (General-Accounting-Office). (2002). Technology Assessment. Using Biometrics for Border Security (Issue November).
GaStat (General Authority for Statistics). (2022). Air traffic in Saudi Arabia’s airports 2021.
Gold, S. (2012). Border control biometrics and surveillance. Biometric Technology Today, 2012(7), 9-11.
Hanlon, Q., & Herbert, M. M. (2015). Border security challenges in the Grand Maghreb. United States Institute of Peace. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjBybin9Jv7AhVQeMAKHaarAwwQFnoECA4QAQ&url=https%3A%2F%2Fwww.files.ethz.ch%2Fisn%2F191018%2FPW109-Border-Security-Challenges-in-the-Grand-Maghreb.pdf&usg=AOvVaw2nHETAw_
ICAO (International Civil Aviation Organization). (2017). ICAO trip guide on border control management, https://www.icao.int/Meetings/TRIP-Jamaica-2017/Documents/ICAO%20TRIP%20Guide%20on%20BCM-For%20validation-16-11-2017.pdf
IOM. (2018). IOM and Biometrics (Issue November).
Jain, A. K., & Kumar, A. (2010). Biometrics of next generation: An overview. Second generation biometrics, 12(1), 2-3.
Kausch, K., Bonsoms, A., Kasapoglu, C., Schmitt, L., Švedkauskas, Ž. (2022). Liberty’s doom? Artificial intelligence In middle eastern security. Euromesco Policy Study (27). 1-100. https://www.euromesco.net/wp-content/uploads/2022/07/Policy-Study27.pdf
Khan, N., & Efthymiou, M. (2021). The use of biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights, 1(2), 100049.
Kingston, L. N. (2018). Biometric identification, displacement and protection gaps. Digital lifeline, 35-54.
Liu, N.Y. (2013). Bio-privacy: Privacy regulations and the challenge of biometrics. Routledge.
National Research Council, & Whither Biometrics Committee. (2010). Biometric recognition: Challenges and opportunities.
Renaud, A. (2022). Biometric borders: Leveraging technology for secure, contactless identity verification and passenger screening. A paper presented at The 6th Border Management and Identity Conference, Bangkok, Thailand, 7-9 December 2022.
Shaheed, K., Mao, A., Qureshi, I., Kumar, M., Abbas, Q., Ullah, I., & Zhang, X. (2021). A systematic review on physiological-based biometric recognition systems: current and future trends. Archives of Computational Methods in Engineering, 1-44.
Sharif, M., Raza, M., Shah, J.H., Yasmin, M., Fernandes, S.L. (2019). An Overview of Biometrics Methods. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_2
Székely, Z. (2020). Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute. Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2. 2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, 576, 259.
Thalesgroup. (2023a). Biometrics (facts, use cases, biometric security) (thalesgroup.com). https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/biometrics. Web link accessed 2023, January 04.
Thalesgroup. (2023b). Saudi Arabia builds a safer future with biometric borders (thalesgroup.com). https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/biometric-borders-saudi-arabia. Web link accessed 2023, January 06.
Thenuwara, S. S., Premachandra, C., & Kawanaka, H. (2022). A multiagent-based enhancement for multimodal biometric system at border control. Array, 14, 100171.
UNCTED, UNCCT. (2021). Survey on developing and Implementing systems to collect biometric data in order to responsibly and properly identify terrorists. Internal document.
UNOCT-UNCCT, CTED, & Biometric-Institute. (2018). United Nations Compendium of recommended practices for the responsible use and sharing of biometrics in counter-terrorism. https://www.un.org/sc/ctc/wp-content/uploads/2018/06/Compendium-biometrics-final-version-LATEST_18_JUNE_2018_optimized.pdf
Voigt, P., Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
Wendehorst, C., Duller, Y. (2021). Biometric Recognition and Behavioral Detection: Assessing the ethical aspects of biometric recognition and behavioral detection techniques with a focus on their current and future use in public spaces. Report. European Union. http://www.europarl.europa.eu/supporting-analyses
Xiao, Q. (2007). Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. IEEE Computational Intelligence Magazine, 2(2), 5-25.
Zhongping, F., Robert Hutchings, Kumar, R., Sidiropoulos, E., Wrobel, P., & Zagorski, A. (2009). Global security in a multipolar world. In European Union ISS Challiot’s papers (Vol. 118, Issue October). http://www.iss.europa.eu/publications/detail/article/global-security-in-a-multipolar-world/
Web links
Flyer_Morocco_US_A4_03-2020_Download.pdf
Jordan's Biggest Airport Trials Biometric Boarding - FindBiometrics
Spain deploying biometrics at Morocco land border for EES | Biometric Update
Flyer_Morocco_US_A4_03-2020_Download.pdf (veridos.com)
https://mideast.prio.org/utility/DownloadFile.ashx?id=65&type=publicationfile