Use of Technology For Border Surveillance

by Satish Seth

Background

The geographic borders of India have a total span of 15,106.7 km, out of which, India shares a border of 4,096.7 km with Bangladesh, 3,323 km with Pakistan and 1,751 km with Nepal [1]. These 3 borders have resulted in illegal immigration of 20 Million people as per media reports in spite of best efforts put in by the Border Security Force and other organisations. In addition to illegal immigration these extensive borders are also used to smuggle terrorists, arms, drugs, fake currency and other contraband material. Porous borders are a huge risk to the security of India.

Current Scenario

In times of peace, the borders of India are manned by the Border Security Force which was established in 1965 and is under the Ministry of Home Affairs. It currently has strength of 240,000 personnel and 186 Battalions along with its own Air Wing, Marine Wing and artillery regiments, which support the General Duty Battalions in their operations. India’s borderlines pass through many greatly isolated and uninhabitable areas. As a result, even though being one of the world’s largest Border Patrol forces, it’s virtually impossible for the BSF to secure each and every mile from smugglers, drug dealers, illegal immigrants and terrorists entering the country. Border infiltration for various objectives has resulted is serious threat faced by India.

Border Surveillance - Approach

Considering the increasingly critical nature of border protection and physical limitations faced in protecting over 14,000 km of border of India, following approach needs to be taken:
  1. Augment present efforts for border security by use of technology.
  2. Leverage the decreasing cost of electronics with scale to create a massive integrated monitoring, warning, data-gathering and counter-offensive system to be installed on the border.
  3. The system may be implemented in phases and in long run may be expanded across entire vulnerable border area.
  4. The system can integrate into the functioning of Border Security Force and other entities responsible for protecting the border.

System Features

  1. Basic component of the proposed system would be as follows:
    • Cameras: Traditional video (for day) and infrared (night-vision) long-range tele-visual cameras capable of monitoring over 15 km. They can be mounted on high towers, well fenced-off, to protect them from floods, animals and human saboteurs. The cameras would be activated by motion sensors or by remote control and will have a 360˚ field of vision.
    • Motion Sensors: For activating the cameras based on movement
    • R/F Transmitters: to relay the images captured to towers erected at central monitoring stations and then to central control room.
    • Warning Lights & Announcement: Installed on the towers the search lights can be remotely or automatically operated based on motion sensors. A PA system with recorded messages would be part of the system.
    • Central Control Room: To be located locally as well mirroring system at central location to ensure efficient communication and command system.
    • Weapon System: Weapon systems capable of firing warning shots as well as actual ammunition can be an advanced feature.

System Operations

  1. All information can be integrated into a single tactical view overlaid on a digital map of the area under surveillance which will include:
    • Sensor Location
    • Sensor Line of sight
    • Alarms to activate personnel and control room
    • Location of Targets
    A person sitting at a remote location should be able to respond to specific alarms, monitor, escalate to superiors and take action as per commands. This person can also communicate to the nearest patrol team (if available) for initiating action.
  2. Manual control of the sensors through remotely located Control room
    • Integration of motion detection, along with display of targets on map.
    • Real-time tracking & warning facilitated by transmission of video images.
  3. Command Control & Data Logging
    • Command and action logging and storage of data would ensure that the actions taken are properly logged and no discretionary measures are initiated.
    • The system will generate invaluable evidence and information that will go a long way in enhancing intelligence about infiltrators, terrorist movements, drug traffickers etc.
  4. Warning Systems
    • A feature to remotely / automatically activate the local search lights would act as warning system for intruders. Since most of infiltration is attempted during nights this would effectively warn the intruders.
    • It can be followed by similar recorded message over PA system to warn the intruders and ask them to retract.
    • A warning system itself would be an effective measure to stop majority of the infiltration.
  5. Weapon System This can be implemented as last phase of the project with following provisions:
    • Remotely operated weapons that can fire rubber bullets as a first warning.
    • In case of a counter offensive or continued infiltration capability to fire fatal ammunition as well as flares in the air to warn nearby patrols.

Advantages

  1. A few years ago such system would have been prohibitively expensive to implement. Reducing cost of electronics and data transmission over the years has made it viable to consider implementation of proposed system.
  2. Its initial implementation cost will be paid back in the form of reducing operating cost for border protection forces.
  3. It will ensure more efficient monitoring and accountability.
  4. A lot of infiltration is also facilitated by corruption and bribery. Remote monitoring and data gathering can be an effective deterrent.
  5. It is efficient solution for a country like India which has very long borders with other nations.
india
border
surveillance
technology

Share