Thank you, Chairmen Buschon and Broun and Ranking Members Lipinski and Maffei, for the opportunity to testify today on the strategic planning and technology dimensions of land, air and sea border security.
As part of my job at RAND, I run one of five studies and analysis
In this capacity, we routinely use performance measurement and modeling to provide decisionmakers with policy insights and options. For example, if the Secretary of Defense wanted to add a major new weapon system, we would help identify the most cost-effective set of requirements by using well developed models to estimate the effects on mission and cost as performance on different dimensions is varied. The Secretary of Defense also typically has sophisticated combat models at his disposal to help understand how the equipment will perform in operational situations.
We also use modeling and simulation at a more tactical level. For example, we can employ campaign models to help the Secretary to determine the best mix of weapon systems and forces to execute a major contingency operation or to estimate how outcomes would likely change with the introduction of new technologies, new operational concepts, or larger forces.
But now let's turn to our nation's analytic capability in the border security arena. What if Secretary Johnson wanted to know the effectiveness of adding 10,000
It was these kinds of questions that I had in mind when I testified before
"If there is an overarching theme to this testimony, it is that we have woefully underinvested in developing, evaluating, and refining a comprehensive and integrated border security strategy. We have invested in numerous border security programs and initiatives but the impacts and cost effectiveness of virtually all of these initiatives are poorly understood. We are virtually flying blind on a topic of critical national importance."
Almost exactly eight years later, we are still struggling with some of these issues.
So, let me try to say it in a different way. We need investment in the basic policy science of homeland security. We need a strategy, data and technology infrastructure that lets us accomplish three things:
* Accurately and confidently measure and track the extent of relevant border activity, including illegal crossing activity and smuggling.
* Integrate that measurement and tracking data into frameworks that can be used to assess the effectiveness of border control policies.
* Integrate knowledge about effective border control policies into frameworks that help us understand the broader economic effects of border control.
Over the last decade, we have increased considerably the resources for border control with very little regard for the return on investment. Continuing the current investment patterns will be costly and provide progressively lower returns on investment.
Let me turn now to provide more detail on how we can get smarter about where to invest.
Measurement and Data Infrastructure
Effective border control begins with understanding why and how people cross the border. For purposes of the testimony today, I want to distinguish three different types of illegal border crossings. n4
First are those crossings that are motivated principally the opportunity for a path to a better life in the U.S., often through the economic opportunity of working here, and more recently represented by the surge of children at the southern border. Second are those crossings that are primarily motivated by another kind of economic opportunity, that which comes from smuggling contraband across the border. Finally, the third kind of illegal border crossing is one that is intended to support terrorist activity. Research on individuals apprehended at the border reveals that economic opportunity is a primary motivation for illegal border crossings. n5 Indeed, more than two-thirds of the apprehended border crossers reported that economic opportunity was the primary reason for repeated attempts to cross the border.
The same policies do not necessarily work well against each type of motivation. Migration motivated by economic opportunity, for example, may best be controlled by a combination of border deterrence and labor market enforcement programs. In contrast, smuggling-related border crossings may be best addressed by deterrence and technological detection. Terrorism-related border crossings will demand yet another mix of policies.
We have the capability to estimate these different types of attempts at illegal border crossings. Among the approaches that are promising are: n6
* Capture-recapture methods. These methods focus on the elapsed time between border apprehensions. The methods can be augmented by interviews with apprehended crossers to both understand crossing histories as well as intentions for the future.
* Stratified sampling of border segments. In this approach, the land border could be divided into low, medium and high risk zones, with enforcement resources allocated based on risk. Crossing estimates can then be constructed by weighting apprehensions with enforcement intensity.
* Population surveys. One promising method is based on interviewing migrants about their crossing intentions as they pass through towns and choke points on the southern side of the border. A second is to start with a non-random sample of migrants in the US and, through networking or "snowballing," build a larger, more representative sample.
* Synthetic and proxy measures. Examples in this category include building estimates from visa overstays and extrapolating from changes in the cost of coyote (human smuggling) services.
However, as far as I can tell, these estimation methods have not been formally adopted, and to the extent they have been examined, they have not received sustained or sufficient support for continued development and refinement.
The first two methods - capture-recapture and stratified sampling - are especially relevant to smuggled goods. However, other than
Resource Allocation, Program Effectiveness and Adaptive Behavior
Once this foundation of data and information is established, the data can then be combined into models - mathematical representations - of how the border and border control policies work.
The types of questions we can answer once we have the data and models are:
* Should we do more of something?
* What policies or technologies can we substitute for approaches that are not working especially well?
* How do adversaries - particularly smugglers and terrorists - adapt their behavior to policy changes?
Recall the dilemma I posed for Secretary Johnson at the beginning of this testimony: how effective would it be to add 10,000 additional
Relatedly, machines and other instruments are often good substitutes for, or good complements to, people. A motion sensor, for example, might be better than having a person stand on guard duty. Night vision goggles, in contrast, might increase the effectiveness of people serving on guard duty. Again, using data and different modeling methods, we could make better decisions about when to use people, when to substitute technology, and when to use them together.
We know smugglers adapt their strategies to border security measures. One such example is the proliferation of tunnels under the U.S.-Mexican border. Another is the shift to small submarines. But, with better data, we might be better able to predict how behavior might adapt. At a minimum, we would likely detect the changes earlier in the adaptation cycle.
Finally, we tend to treat the different border types - air, land and sea - separately and discretely and this is likely a mistake. There is potentially tremendous value in integrating our understanding of how these borders interact. For example, greater stringency in detecting illicit cargo coming through ports may increase the incentives to use land smuggling routes.
By way of comparison, we as a nation fund such basic science data collection in many other policy realms including substance abuse (
Understanding the Broader Economic and Social Implications of Border Control
Because our borders are so vital to commerce and the economy, policies implemented for border control purposes can propagate throughout the economy in unanticipated ways. Thus, it is not sufficient to know only whether a policy is effective at the narrow issue of border control. In many cases, we have to know something about a policy's broader economic and social effects before we can implement a policy with confidence.
Consider some examples.
Sometimes the effects of border control policies are relatively diffuse and difficult to document. The scale and complexity of US ports provides an example. Each year, approximately
In other cases, the consequences of border control may be difficult to detect. For example, visas became a target for reform in part because all 19 of the terrorists involved in the 9/11 attacks were in
In still other cases, border enforcement affects issues as fundamental to U.S. society as employment. Labor market enforcement is one example. Right now, labor market enforcement is relatively weak. For example, there were 639 criminal indictments and 586 convictions related to worksite enforcement investigations in 2011. n8 E-Verify, which allows employers to check the work eligibility of their employees, is currently voluntary. There are significant errors in the E-Verify database, which means that people legitimately able to work in this country are sometimes rejected. This is one reason that making E-Verify mandatory is a potentially risky step.
One mechanism for strengthening E-Verify and reducing errors is to have employers submit their verified
These opportunity costs - and many others - need to be accounted for in a national border control strategy.
Next Steps and Conclusions
Various pieces of legislation, including HR 1417 in the 113th
"estimates of the relative cost effectiveness of various border security strategies and operations, including deployment of personnel and technology, and construction of new physical and virtual barriers."
It is encouraging to see a call for this kind of modeling to inform decisions about where and how to invest. To my knowledge, no such modeling, and no such approach to border security, is currently being undertaken.
Finally, I would be remiss if I did not note how difficult it is to conduct effective policy analysis in this area. n9 It is difficult to get access to data to conduct effective modeling. It is also difficult to publish in the scientific literature in this area. The ability to get data and to publish are what help attract bright minds to policy challenges. But publishing is also important for another reason: by submitting the work to public and scholarly scrutiny, we ensure that the work is accurate. While I realize that border security presents many important security challenges, too often contracts with the
Let me close by repeating something I noted in my 2006 testimony: there is no single programmatic fix. Border security will be achieved through a network of mutually reinforcing, and to some extent redundant, layers of defenses. The solutions will span the bounds of cabinet agencies in the federal government. As a consequence, we need to consider not just the effects of individual programs, but the interaction effects of multiple programs. It is important that we get an analytic framework in place soon so that we can begin to make more informed decisions about border control resource issues.
n1 The opinions and conclusions expressed in this testimony are the author's alone and should not be interpreted as representing those of RAND or any of the sponsors of its research. This product is part of the
n2 This testimony is available for free download at http://www.rand.org/pubs/testimonies/CT415.html. wanted to know the impact of a proposed border detection and surveillance system? We simply do not have all of the information and analytic tools in place to address these kinds of questions about the border.
n4 While there may be other motivations for illegal border crossings - such as family reunifications and flight from persecution - these three kinds of illegal border crossings comprise the bulk of illegal border crossings.
n8 Andorra Bruno, "Immigration-Related Worksite Enforcement: Performance Measures",
Read this original document at: http://science.house.gov/sites/republicans.science.house.gov/files/documents/HHRG-113-SY14-WState-JRiley-20140731.pdf
Most Popular Stories
- Businesses, Investors Pressing for Green Policy
- 'The Voice' Sounds Different This Season
- NSHMBA to Rebrand With New Name, Logo
- Lower Used-Car Prices Roil the Auto Industry
- Chrysler and Google Launch Virtual Plant Tour
- Investors Fret Yahoo's Future, Stock Dips
- Perry Wants to Skip Court for Foreign Trip
- Liberty Power Helps USHCC Go Green
- Hispanic Designer Honored As Rising Star
- Porn Lovers Get a New Search Engine