GET /api/v1/document/154846/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "resource_uri": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
    "id": 154846,
    "site_url": "https://fragdenstaat.de/dokumente/154846-border-security-research-3/",
    "title": "Border Security Research 3",
    "slug": "border-security-research-3",
    "description": "",
    "published_at": null,
    "num_pages": 10,
    "public": true,
    "listed": true,
    "allow_annotation": false,
    "pending": false,
    "file_url": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/border-security-research-3.pdf",
    "file_size": 6044618,
    "cover_image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p1-small.png",
    "page_template": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p{page}-{size}.png",
    "outline": "",
    "properties": {
        "title": "",
        "author": "",
        "_tables": [],
        "creator": "Canon iR-ADV C5550              ",
        "subject": "",
        "producer": "Adobe Acrobat Pro 2020 20 Paper Capture Plug-in",
        "_format_webp": true
    },
    "uid": "1cd2189b-c7d9-46f6-b4c1-db37b236dd21",
    "data": {},
    "pages_uri": "/api/v1/page/?document=154846",
    "original": null,
    "foirequest": null,
    "publicbody": null,
    "last_modified_at": "2022-05-09 14:44:16.617347+00:00",
    "pages": [
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 1,
            "content": "Acknowledgements In conducting this study, the RAND          representatives who took part in re-           Within RAND Europe, the team is Europe study team is grateful to the        search interviews. Appendix A of the        appreciative of the valuable contribu- many people who have provided their         Technical Annex lists their affiliations    tions of Jennifer Moroney and the ex- time, advice and support. The team is       and, in some cases, their names: some       perts group, comprising Alex Hall, Sonja grateful to Frontex for providing nu-       interviewees' identities have been an-      Marjanovic, Jon Freeman and Catriona merous contacts, coordinating survey        onymised at their request. Thanks are       Manville. Finally, the team is very grate- responses, and contributing valuable        also due to the Member State (MS) and       ful to the quality assurance reviewers feedback as the study has progressed .      industry survey participants for their val- Emma Disley and James Black for their The study team would like to thank      uable insights, as well to those who at-    constructive feedback. the policy officials, border security prac- tended the stakeholder workshop held titioners, academic experts, and industry   in Warsaw, Poland, ons September 2017. 21 of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p1-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 2,
            "content": "l. Introduction This report presents the results of a RAND          continued pressure on EU borders, with             Given the scale, severity and cross- Europe study examining the setup and                96 per cent of immigrants arriving in           border nature of these security threats, management of border security research              the Central Mediterranean region in 2016        integrated border management (IBM) within and beyond the European Union                stating that they had used the services of      remains a strategic priority for the EU, (EU) . Commissioned by the European                 illegal smuggling networks. 6 According         IBM is a concept that consists of five Border and Coast Guard Agency (Frontex) 3           to the European Union Agency for Law            elements: in December 2016, this study aims to in-            Enforcement Cooperation (Europa!),              ■ Border control (checks and surveil- form possible alternatives to the current           many of the organised crime groups in-             lance); model of contracting and managing bor-              volved in migrant smuggling are 'poly-          ■ Detection and investigation of cross- der security research, and explore the              criminal' and engage in a range of other           border crime; role that Frontex could play in facilitat-          criminal activities, including document         ■ Inter-agency cooperation for bor- ing uptake of research outputs by end               counterfeiting, property crime, drug traf-         der management and international users ('border guards'). 4 This chapter pro-        ficking, excise fraud, and trafficking in          cooperation; vides an overview of the study context,             counterfeit goods , Other forms of organ-       ■ Coordination and coherence of activi- its purpose and scope, and the research             ised crime posing security problems at             ties of MS and institutions; and approach employed.                                  EU borders include weapons smuggling            ■ Four-tier access control model': this and trafficking in human beings (THB).7            model supports the detection and Recent attacks in France, 8 Germany 9          investigation of cross-border crime 1.1.   Study context                                and Belgium also highlight that ter- 10                               through a combination of measures rorist threats are becoming more inter-            in third countries, cooperation with 1.1.1.   Diverse threats highlight                  national and cross-border in nature . 11 In        neighbouring countries, border con- the need to strengthen EU border                    particular, the Syrian conflict has at-            trol at the external border, and control security                                            tracted thousands of so-called 'foreign            measures within the Schengen area. 15 fighters' from Europe, many of whom Today, the EU faces a range of pressures            are likely to return as the Islamic State       By assigning strategic importance to on its external and internal borders.               (IS) continues to lose territory.\" As some      border security, the EU aims to ensure In 2016, Member States (MS) reported                of these individuals may pose a threat to       that EU citizens' freedom and security more than half a million detected ille-             internal security, the role ofFrontex13 and     are protected in full compliance with gal border crossings . While this figure            European border authorities in monitor-         the Union's values, including the rule represents a significant decrease from              ing their cross-border movements is in-         oflaw and fundamental rights . 16 Border the number of illegal crossings detected            creasingly important. 1•                        security is central to two of the European in 2015 (over a million), it is markedly                                                            Commission's Ten Priorities (or Europe, 17 and higher than any annual total between                6    Europol (2017).                            two of the three strategic priorities set 2010 (around 100 ooo) and 2014 (around              7    Frontex (2017),                            out in the European Agenda on Security . 18 290 ooo). 5 An increase in people-smug-             8    Tlle Guardian (2017); BBC (2016); BBC      Under the European Agenda on Migration, 19 (2015a); BBC (2015b). gling activities has contributed to this                                                            a number of measures have been taken to 9 TI1e Guardian (201 G) ; TI1e Telegraph (2016a) ; Tlle Telegraph (20 1Gb). reinforce the security of the EU's external 10 France 24 (2017). While Frontex is now officially named          11 European Commission (201 sc). the 'European Border and Coast Guard           12 Frnntex (2017).                              15  Council of the European Union (2006). Agency', it is still widely referred to as     13 Established in 2004, Frontex promotes,       16 European Commission (2015 d). 'Frontex'. In tl1is report, 'Frontex' and 'the      coordinates and develops European border   17 TI1ese priorities are •justice and fundamen- Agency· are used interchangeably to refer           management in line with the EU funda-          tal rights' and' migration'. See European to the organisation.                                mental rights charter and the concept of       Union (2015). 4    An ·end user ' in the context of this study         Integrated Border Management. See Fron·    18 TI1ese priorities focus on supporting a refers to the national or multinational             tex (n.d.).                                    strong EU response to terrorism and for· authority responsible for border manage·       14 While Fromex (2017) highligtlts IS as the        eign fighters and on tackling serious and ment. 1l1e terms 'end user' and 'border             main terrorist threat to EU borders, al-       organised crime, which both pose cross· guard' are used interchangeably through·            Qaeda, its affiliates and other terrorist      border challenges. See European Commis- out this document.                                  groups may similarly pose a threat to bar·     sion (2015e). Frontex (2017).                                     der security.                              19 European Commission (2017a). 22  of 156",
            "width": 2481,
            "height": 3507,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p2-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 3,
            "content": "Final Report borders and to support the national bor-       1.1.2. Research is important for                   cross-border dimension . 3' Horizon 2020 der guards deployed by MS. One such           border security                                    (H2020), which replaced the Seventh measure was the creation in October 2016                                                          Framework Programme (FP) for Research of a European Border and Coast Guard          Research 25 can help security officials un-        and Technological Development (FP7) (EBCG), comprising Frontex and the var-       derstand and respond to these threats              (2007- 2013), is the biggest EU R&I pro- ious national authorities responsible for      to border security, as well as support-            gramme, with around €8obn of funding border management at the MS level. 20          ing the development of evidence-based              available over seven years (2014- 2020). 32 To support these strategic objectives,     security policies and operational tools. 26        Border security research sits within the the funding, personnel and remit of                An important part of Frontex's man-            ' Secure Societies' strand of the H2020 Frontex have been increased since the          date involves monitoring and contribut-            programme, \" with a maximum amount EBCG came into force in 2016. EU fund-         ing to research developments relevant              of €73m and €55m available for border ing for Frontex is set to increase from        to the Agency's area of operations in              security research projects in 2014- 2015 €281m in 2017 to €322m in 2020, with the       order to bridge the gap between tech-              and 2016 - 2017, respectively. 34 'Secure number of staff members expected to rise       nological and research advancements                Societies' was set up to focus on 'multi- from 400 in 2016 to 1 ooo by 2020. 21 The      and the needs of border control author-            disciplinary, mission-oriented research' role and activities of the Agency have         ities . Responsibility for monitoring de -         which combines 'end users and suppli- been strengthened wi th, for example, a        velopments in these areas lies with the            ers in project definition and execution'. 35 new Rapid Reaction Pool of 1 500 border        Research and Development Unit (RDU). 27 guards and other officers being placed         Through projects, worl<shops and con-              1.1.3. Challenges remain in at the Agency's immediate disposal             ferences , the RDU aims to facilitate en-          incorporating research into since December 2016, alongside a Rapid         gagement and exchange of information               operational practice Reaction Equipment Pool consisting of          between border management authori- helicopters, vessels and other equipment       ties and providers of research, includ-            Despite the millions of euros invested in to carry out rapid border interventions . 22   ing research institutes, universities              EU border security research each year, Additional measures have been taken        and industry. Frontex is also responsi-            challenges remain in achieving 'impact' to improve situational awareness at the        ble for keeping MS and the European                through research; that is, improving EU 's external borders and to support the      Commission up to date with develop -               operational practices, contributing to detection of cross-border crime . For ex-      ments , and provides input to policy               an enhanced understanding of policy ample, underthe EU's earth-observation         development . 28                                   issues, and building capacity through programme 'Copernicus', the European               Beyond the border security research            skills development. 36 There is already Commission has agreed to provide               projects awarded directly by Frontex,              some evidence to suggest that the 'pull- €46.7m to Frontex between 2015 and 2020        several EU funding mechanisms for re -             through' of border security research can in order to implement satellite services       search and innovation 29 support the pri-          be challenging and that many promis- dedicated to border surveillance. 23 With      ori ties of the European Agenda on Security .30    ing insights are never incorporated into the agreement finalised on 10 November         These priorities focus on countering               practice . In some cases, research pro- 2015, the European Commission has en-          terrorism, organised crime and cyber-              jects can be 'overtaken by events' and lose trusted Frontex with the border sur-           crime as interlinked areas with a strong           their relevance over time, particularly veillance component of the Copernicus                                                             given that EU research funding tends programme. This involves supporting                                                               to be long-term in nature, while politi- the European Border Surveillance System        25   \"Research' is the detailed study of a sub-    cal priorities and personnel can change (EUROSUR) by providing real-time data               ject, especially in order to discover infor-  more rapidly. A lack of understanding mation orreach a new understanding (see on activities on land and sea around EU             \"Glossary of key terms', and fuller defini- among research providers of the opera- borders . Satellite data has already been           tion provided in Chapter 3). While a core     tional context and constraints affecting used in combination with ship report-               focus of this report is the in tegration of   end users can also reportedly limit the ing systems to identify smugglers and               research fi ndings in to operational prac-    relevance of research outputs to the end save lives at sea. 4 2 tice across these case studies , the report   user community. J1 focuses on both 'basic research', which is driven by interest in expand ing knowledge ratl1er than on developing n ew products. and 'applied research', which is designed     31   European Commission (2015a). to address practical problems.                32   European Commissiorr (n .d.-a) . 26   European Commission (2015a).                  33   European Commission (n.d.-b). 27   European Union (20 11).                       34   European Commission (2015e); European 28   European Urrion (2011).                            Commission (2 016a). 20  European Un ion (2016) .                   29   'Innovation' refers to a process that is able 35   European Secu rity Research Advisory Board 21  European Commission (2015a).                    to transform new ideas into products, ser-         (2 006). 22  European Commission (201Gb).                    vices and processes, also encompassirrg       36   Economic an d Social Research Council 23  Frontex (2015).                                 the process of invention with a focus on           (ES RC) (2017). 24  For example, 350 people were rescu ed af-       ensuring lhat such new ideas are applied      37   Startup project m eeting at Frontex offices, ter Copemirns helped identify four rub-         to the benefit of end users. See Chapler 3         Warsaw, 19 /anuary 201.7. See Section 3.2 ber dinghies leaving the coast of Libya on      and the glossary of key terms.                     for a more in-deplh discussi on of these 7 October 2015. See Copernicus (n.d.-a).   30   European Co mmission (2015d) .                     challenges and constraints. 23  of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p3-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 4,
            "content": "1.2.   Purpose and scope                            approach combining data-collection ac-             six organisations also operating in other tivities with a rigorous analytical pro-           domains - namely defence and space - Given the challenges inherent in pulling            cess. Figure 1.1 presents the overall              with a view to understanding different through operationally relevant research,            research approach, which is structured             functional roles for R&l. Frontex is interested in developing a bet-          around three Work Packages (WP) linked                The case studies conducted in WP3 fo- ter understanding of how border security            to the three RQs above.                            cused on the following six organisations: research is set up, managed and opera-                                                                 ■ European Space Agency (ESA): The tionalised by agencies operating at the             The RAND Europe project team used two                 ESA is the coordinating entity for national level within and beyond the                main research methods to conduct this                  European civilian space activities. It EU. This is intended to increase aware-             study: case studies (drawing on docu-                  is an intergovernmental organisation ness of alternative or new ways of set-             ment reviews, research interviews and-                 of 22 MS, dedicated to the exploita- ting up, managing and using research                for WP1 only - surveys) and workshops.                 tion of space science, research and outcomes that enable the faster integra-            As shown in Figure 1.1, the case studies               technology. tion of relevant research, make research            were conducted in two separate phases              ■ European Institute oflnnovation & more focused on operational needs, and              and with different purposes.                          Technology (EIT): The EIT is an in- ensure that its potential for positive im-                                                                 dependent EU body set up to sup- pact on EU and MS border security is fully          Case studies                                           port innovation in Europe. The EIT realised.                                                                                                 brings together universities, research To support this overarching objective,          In the first phase of the study, the WP1- 2            labs and companies to form partner- this study addresses three research ques-           case studies were used to answer the first             ships ('Knowledge and Innovation tions (RQs): 38                                     two research questions (RQ1 and RQ2)                   Communities') . ■ RQ1 : How is research and innovation              described in Section 1.2. As part of this          ■ Defense Innovation Unit - Experi- in the area of border security set up,          analysis, these case studies helped gen-               mental (DIUx): Headquartered in Sili- conducted and operationalised by EU             erate a high-level understanding of good               con Valley in California, DIUx is a US organisations and MS?                           practices and common challenges relat-                 Department ofDefense (DoD) organ- ■ RQ2: What approaches are used in the              ing to the operationalisation of border                isation focused on accelerating com- US, Canada and Australia to fund and            security research . As per WP1 and WP2,                mercial technology development for apply research in this area? 39                 this first set of case studies focused ex-             the US military. ■ RQJ : What 'good practices' from these            clusively on institutions or organisations         ■ Department of Homeland Security different approaches could be incor-            involved in border security research in                (DHS) Small Business Innovation porated into the EU approach?                   the following countries and regions: the               Research (SBIR) : The DHS SBIR EU, the US, Canada, Australia, Turkey                  programme aims to increase small While a central focus of the study is               and selected parts of North Africa (Egypt,             business participation in US federal on the integration of research findings             Morocco and Tunisia). 42 These case stud-              research that has the potential for into operational practice, this report fo-          ies are presented in Figure 1.2 on page 26,            commercialisation. cuses on both 'basic research', which is            along with an overview of the main gov-            ■ Homeland Security Innovation driven by interest in expanding knowl-              ernmental actors and EU institutions re-               Programs (HSIP) : The HSIP aims to edge rather than on developing new                  sponsible for the setup and management                 generate innovation in hubs across products, • and 'applied research', which 0                                      ofborder security research . Detailed de-              the US in order to solve DHS's most is designed to address practical problems           scriptions of the EU and non-EU case                   complex challenges through outreach of the modern world rather than to ac-              studies are presented in Chapters 2 and                to investors and funding for innova- quire knowledge for knowledge's sake. 4'            3, respectively, of the Technical Annex.               tive start-ups . ■ Centers of Excellence (COEs): COEs In the second phase of the study (WP3),                refer to a coordinated, university- 1.3. Research approach                              to inform the development of recommen-                 based programme that aims to har- dations for Frontex, the project team con-             ness expertise from US academic To achieve the objectives of the study,             ducted a more in-depth investigation of                institutions in order to support re- the project team deployed a structured                                                                     search efforts and deliver tools, technologies, knowledge products, 42  At Frontex·s request, the EU, US, Canada           training and expertise for the home- 38   More detailed informati on in response to          and Australia cases studies offer a more land security enterprise . RQ1, RQ2 and RQ3 can be found in Chap-             granular analysis of how researcl1 is set ters 2, 3 a nd 4, respectively, of t he Tecl1-      up, conducted and implemented in prac- nical Annex .                                       tice . while the Turl<ey and North Africa     The WP3 case studies were selected at 39 At the client's request, the study's anal-           cases offer a 'lighter-touch' analysis that    an internal analysis session. At this ses- ysis focuses on the EU, US, Canada, Aus -           provides a high-level description of: (il the sion, the study team identified research tralia and - (to a lesser ex tent) on Turkey        extent to which border security research is organisations for further, more in-depth and three North African countries: Egypt ,          already being conducted and operational- Morocco and Tunisia (see Section 1. 3).             ised in these councries; and (ii ) any exist- analysis from the first phase of the study 40 Lawrence Berkeley National Library (n .d. ).         ing or intended involvement in the Hori-       (SBIR, HSIP and COE), before agreeing on 41 Lawrence Berkeley National Library (n.d. ).          zon 2020 programme .                           organisations from other sectors with 24  of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p4-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 5,
            "content": "Final Report Figure 1.1 Overview of research approach Data collection              outcomes                  Analitical process r -     -    -     -                                      -     -     -   -    7        r---------                                    ------ --                     , WPl &.. WP2                                                                                     WP3 Case studies:                         Case studies:                                      Case studies:                        Workshop: EU border                        Non-EU border                                            Selected                     External experts security research                    security research                                    EU and non-EU                    (national border guard (EU organ isation and MS)              (Relevant authorites in                                organisations                     agencies, Frontex us, Canada, Austral ia,                                                                    and other EU (Incl uding those operating                 institutions) plus selected industries)                             in defence an d space Interviews                                                                                 sectors) Interviews                                            Interviews Literature review                     Literature review surveys                                                                              Literature review Understanding of              Stakeholders· perception Landscaping of good practices and challenges related ate border security research different operational             of Frontex role in the models                     context of research Consultat ion w it h internal experts                                                    Consultation with intern al experts Creation of R&J pathway fo r the operat ion a lisation of                                   Development of Option analysis border security research                                               org anisational functions Development of way forward ______________                                                              .J applicable lessons for border security R&l                   'grey' literature. 43 The WP1-2 review fo-             ernment agencies and other stakehold- (ESA, EIT and DIUx) . Literature availa-                    cused on literature relating to the insti-              ers involved in the setup, management bility was also a considered as part of se-                 tutional setup of border security research              and operationalisation of research. The lection in order to ensure that there was                   across the case study countries and re-                 team included literature in the review sufficient source material to conduct an                    gions, while the WP3 review explored                    on the basis of relevance to the research informed analysis. Detailed descriptions                    the functional activities of the six case               questions and to the scope of the study, of the WP3 case studies are provided in                     study organisations . Both reviews were                 and findings were written up in a nar- Chapter 4 of the Technical Annex .                          conducted through Google and Google                     rative synthesis . As the following paragraphs describe                     Scholar searches and 'snowball' search- in more detail, the WP1-3 case studies                      ing. 44 Given the institutional and proce-              Research interviews are based on a combination ofliterature                     dural focus of the study, the study team                Complementing the literature review, a review and research interviews, with                        identified most of the literature reviewed              total of 32 semi-structured•5 telephone in- additional WP1 data collected through                       by searching the websites of relevant gov- two surveys . 45  Semi-structured interviews combine the 43   'Grey literature' is produced by organisa-              use of an interview protocol containing Literature reviews                                               tions outside of academic or commercial                specific questions with flexibility to asl< Across all WPs, data was collected through                       publish ing channels . Examples of grey li t-          unplanned follow -up quest ions. By con - structured reviews of peer-reviewed and                          eratu re include government documents,                  trast, structured interviews fo ll m,v an i n- technical re ports, wor ld n g papers, doc-             terview protocol w i th all interviewees toral theses and conference proceedings.               asked exactly the same questions in t h e 44   'S n owbal.l searching ' involves using a              same order, while unstructured interviews given document's reference li st to iden-              consist of a free -flow ing conversation on tify ocher relevant documents.                         a given topic. 25 of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p5-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 6,
            "content": "Figure 1.2 Overviev of WP1 and WP2 case studies Canada                                                            European Union                                     Turkey Main actors: Public Safety Canada, Defence                        Main actors: European Commission, DG HOME,         Main actors: Fcoo<e~e\\h.~ ,e ~,=yMS Research &. Development Canada (Centre for                                                                           Unknown (owning to political sensivities) Security Science), Canada Border Services Agency (Science&. Technology)                      _~    _ ~}. ;;; ,_ \"'ii. \"!_~ i,\\ 'If! . '-~ . ~ ·2~ United States Main actors: .   -~               ,'·· Departament of Homeland Security (Science and Technology Directorate, Coast Guard) Source: RAND analysis (2017). North Africa: Egypt, Morocco and Tunisia Acs:,,:< Main actors: Departament of Main actors: National Ministries of Defence and          Immigration and Border Protection, Ministries of Interior                                   Minister of Immi gration, Cabinet terviews were conducted across all WP. Interviewees were policy officials, bor- der guard practitioners, academic ex-                      Surveys                                            Workshops perts and industry representatives with expertise relating to the case studies un-                 To support the WP1 analysis, the study             In addition to the case studies, an ex- der analysis. 46 Interviewees were identi-                 team distributed two electronic sur-               ternal stakeholder workshop was held fied by conducting online searches and                     veys. The first survey was circulated              at Frontex premises in Warsaw, Poland, leveraging RAND's contact networks,                        to National Frontex Points of Contact              on 5 September 2017 with the participa- and through recommendations from                           (NFPOC) within all 28 EU MS, with a                tion of 30 experts from national border Frontex. An interview protocol was                         39 per cent response rate (n of 28 MS). 47         guard agencies, Frontex and other EU used to conduct these interviews (see                      In order to complement the MS survey               institutions.48 The purpose of this ex- Appendix B of the Technical Annex). This                   data with perspectives from research,              ternal stakeholder workshop was to an- guidance document was designed to help                     academic and industry representatives,             alyse different types of functional role interviewers cover all the desired topics                  Frontex circulated a second survey to 52           that Frontex could play in order to sup- while allowing scope for flexibility, and                  of their contacts from industry and aca-           port the operationalisation of border se- was adjusted for each of the case stud-                    demia, with a 10 per cent response rate            curity research (see Chapter 5). ies. It was also designed to ensure that                   (5 of 52 contacts). The purpose of these               To help structure our research ap- all topics of discussion were, as far as                   surveys was to expand on and validate              proach and synthesise findings, three possible, covered with all participants.                   the emerging findings of the WP1 lit-              internal analysis workshops were held We conducted 14 interviews focused                      erature review and interviews, as well             with a RAND Experts Group made up on EU border security research (WP1), 14                   as to provide further details about EU             of senior researchers and topic experts interviews focused on non-EU border se-                    border management processes and the                in research, innovation and border se- curity research (WP2), and 4 interviews                    roles of different agencies that were not           curity at RAND Europe. The purpose with representatives from R&l organisa-                    otherwise captured through the litera-              of the first internal workshop, held at tions (WP3). The majority of interviews                    ture review.                                        the early stages of the study, was to de- focused on WP1- 2, given that the WP3                                                                         velop a draft research and innovation case studies were intended to be based                                                                        pathway to map the possible processes primarily on a literature review. Table 1.1                47  7 NFPOC (Surveys A- G) provided completed       linking border security research and its presents the distribution of interviewees                      survey responses: 3 NFPOCs (Surveys H-J) informed che study team that they do not across countries and regions. perform activities related to border secu-      48  For information on supporting materials rity research, and 1 NFPOC (Survey K) was           used at the workshop and on workshop 46   A full list of interviewees is included in                unable to complete the survey due to other          findings, please refer to Appendices D and Appendix A of che Technical Annex,                        work commitments.                                   E of the Technical Annex, respectively. 26  of 156",
            "width": 2481,
            "height": 3507,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p6-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 7,
            "content": "Final Report Table 1.1 Distribution of interviews across countries and regions (WP1-3)49 North Africa, EU                    us                Canada             Australia            Turkey           (Tunisia, Morocco, Egypt) Interviews                  15                     5                     5                   4                  l                          2 conducted           (WPl: 14, WP3 : 1)     (WP2: 2, WP3 3)          {All WP2)           (All WP2)             (WP2)                  (Both WP2) Source: RAND analysis (2017). Figure 1.3 Structure of this report ANALYSIS OF CURRENT PRACTICES                       ANALYSIS OF FUTURE INTRODUCTION              CONCEPTUALI SATION                                                                           OPPORTUN ITI ES Chapter,                   Chapter 2                         Chapter3                       Chapter 4                    Chapters I                             I Technical Annex                 Technical Annex Chapters 2-3                     Chapter 4 '.                            ,,.                                                                                          ,,. Scoping of Background                                                                               Functional roles R&.I f ramework                  good practices                                              Recomendations and approach                                                                                   for R&.I &. chal leng es implementation by border guard author-                   innovation' to refer to the entire pro-                examples of 'research impact', 'end ities . The resulting framework was used                 cess that leads to the operationalisa-                 user involvement' and 'the operation- to structure the study team's approach                   tion of research and its related impact                alisation of research' were sought by to data collection (see Chapter 2). The                  on policy and operational practices.                   RAND researchers, in some cases little second internal workshop focused re-                     This process includes, but it is not                   detail on this could be elicited from spectively on refining the research and                  limited to, the 'research & develop-                   the available literature, interviews innovation pathway, and the third on                     ment' phase (see Chapter 2 for more                    and survey responses . validating the case study and external                   details).                                          ■   The identification of'good practices' stakeholder workshop findings.                        ■  Across the WP1-2 case studies, more                    and 'challenges' in the setup and literature and interview data was                      management of border security re- available for the EU and the US than                   search across the case studies is based 1.4. High-level assumptions                              for other countries and regions.s A        0           largely on the views of WP1-3 study relative shortage of data on Canada,                   interviewees representing policy, A number of high-level assumptions                       Australia, and in particular North                     practitioner, academic and industry should be noted in considering the find-                 Africa and Turkey (in part due to po-                  stakeholder communities. ings presented in this report:                           litical sensitivities) 5' has implications         ■   While the report highlights the main ■ From a terminology perspective, this                   for the depth of analysis on these fo-                 challenges and areas of good practice report uses the term 'research and                   cus countries and regions .                            identified through the WP1- 3 inter- ■  In a number of areas, the nature of                    views and literature review conducted the data available to the study team                   within the study timeframe, the 49   Since submission of the Interim Report              means that the WP1- 2 case study find-                 study team recognises that there are in June 2017, additional interviews have ings lack granularity. While specific                  likely to be good practices and chal- been conducted with EU stakeho lders (11=3) and Australian stakeholders (11=1 )                                                                 lenges not captured in this document, to update WP1 and WP2 content. A to -                                                                      and that those listed are not exclu- tal of 4 WP3 interviews l1ave also been          50  While comparatively few interviews were               sive to the case studies in which they conducted (11=3 US imerviews compris-                conducted with US stakeholders (11=2) , this          are outlined. ing 1 with SBIR, 1 with HSlP and 1 with              limitation was offset by the high ava.ila- ■   Relatively low WP1 survey response an anonymous US organisation; and 11=1               bility of US literature. EU interview with an anonymous EU                51  Please referto Section 2. 2. 3 of this repo rt        rates (39 per cent and 10 per cent re- organ isation).                                      and Section 3. 4 of the Technical Annex.              spectively for the MS and industry 27 of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p7-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 8,
            "content": "surveys) limited the generalisability  ■  Chapter 2 outlines the concepts of re- ■  Chapters 2-4 are the 'core' chapters of of the data collected from respond-       search and innovation, and presents       the Technical Annex, presenting case ents . However, complementing sur-        the research and innovation path-         study findings relating to EU border vey data with data from the research      way developed as part of this study       security research (WP1), non-EU bor- interviews ensured that our analy-        to guide our analysis .                   der security research (WP2), and the sis was informed by a wide range of    ■  Chapter 3 provides a summary of           functional roles for R&I within dif- stal<eholder perspectives.                findings across the WP1-3 case stud-      ferent organisations (WP3). ■  Discussions at external workshop          ies in relation to good practices and  ■  Appendix A lists the study were informed mainly by EU bor-           challenges for operationalising bor-      interviewees. der guards and Frontex representa-        der security research.                 ■  Appendices B-D present supporting tives, given that these stakeholder    ■  Chapter 4 explores a range of func-       research materials : interview ques- groups accounted for the majority of      tional roles that organisations can       tions (Appendix B), survey outlines attendees.                                play along the research and innova-       (Appendix C), and materials for the tion pathway described in Chapter 2 .     external workshop (Appendix D). ■  Chapters presents a series of forward- ■  Appendix E summarises proceedings 1.5. Structure of the report                 looking recommendations for consid-       and findings of the external stake- eration by Frontex.                       holder workshop. This report outlines the findings of this study and provides a set of recommen-     This report is accompanied by a Technical Figure 1.3 on the previous page high- dations for Frontex. In addition to this  Annex, the contents of which are as       lights the links between the chapters of introduction, this document contains      follows :                                 this report and the core chapters of the four substantive chapters :               ■ Chapter 1 provides an overview of the   accompanying Technical Annex. Technical Annex. 28 of 156",
            "width": 2481,
            "height": 3507,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p8-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 9,
            "content": "2. Conceptualising research and innovation This chapter introduces the concepts of           Whether basic or applied, research is           processes set out under the DOTMPLFI research and innovation, explaining how           part of innovation (though not all inno -       framework. While the definition of the latter relates to the adoption of re-         vation requires research), but it is lim-       capability and its constituent parts search by end users in the border secu-           ited to the creation and investigation          may vary by sector or country, the rity context. The following sections then         of new ideas and solutions - in simple          principle that it includes more than draw on established R&J models and theo-          terms, it goes only halfway to solving          just new technologies or new knowl- ries identified through a literature review       an identified gap since it does not in-         edge st ill holds true. The process to develop a bespoke 'research and inno-          clude all the steps that turn ideas into        through which new technologies and vation pathway', which serves two pur-             new products, services and processes.           new knowledge are integrated fully poses . First, this pathway offers a way of          Translating border security research         into operational practice is usually presenting case study findings related to         into operational practice goes beyond           referred to as capability development .57 EU and non-EU border security research            the success of any individual project (WP1-2) in a structured and consistent            and relies on the existence of two main     Given that the focus of this study is on way (see Chapters 2 and 3 of the Technical         processes:                                  research (both basic and applied) and in- Annex) .5' Second, a number of'functional          ■ From an industrial and academic           novation, analysis of the capability-de- roles' for R&J, identified through the case           perspective , it requires a process that velopment process is beyond the scope of study research (WP1-3), are mapped onto               is able to transform new ideas into      this report. However, Frontex should re- the pathway (see Chapter 4) in order to               new products, services and processes,    main cognisant of these considerations inform a set of recommendations for                   also encompassing the process of in-     when approaching R&J ifit is to take in- Frontex (see Chapters) .                              vention with a focus on ensuring that    novative new products and effectively such new ideas are applied to the ben-   put them into the field as fully matured, efit of end users. This process is usu-  supportable new capabilities. 2.1.   Overview of key                                ally known as 'innovation'. 55 definitions                                        ■ From a border security perspective , the acquisition of a newly available     2.2.   The research and Understanding the distinctions between                technology is not per sea new capabil-   innovation pathway 'research' and 'innovation' is important              ity. In most cases, 'capability' com- for enhancing awareness of how new                    prises a range of different constituent  In relation to research and innovation, it technology or knowledge can be more ef-               parts (e.g . pieces of equipment, in-    is possible to identify a series of sequen- ficiently and effectively translated into             frastructure and knowledge) . For        tial steps that connect the generation of operational practice. As described in                 example, the North Atlantic Treaty       an idea, or the identification of a capa- Section 1.2, one possible way of defin-               Organisation (NATO) identifies eight     bility gap, to the adoption of a solution ing research is by splitting the concept              elements that collectively mal<e up a    by end users and its related impact on into two categories:                                  capability: Doctrine, Organisation,      operational practices and its wider so- ■ 'Basic research' (also referred to as               Training, Materiel, Leadership and       cietal benefits . These steps are often in- 'fundamental' or 'pure' research),                Education, Personnel, Facilities, and    tegrated into the concept of a 'pathway' which is driven by interest in expand-            Interoperability (DOTMLPFI) .56 Even     in the literature. 58 Pathways are not lin- ing knowledge, rather than a focus on             when thinking only about new equip-      ear processes, but are often cyclical, with creating or inventing products; 53 and            ment or technology, it is not enough ■ 'Applied research' , which is designed              simply to procure it for border guards   57 This refers to the deve lopment and aper- ationalisation of a capability. Capability to solve practical problems of the                to use; there must also be an effec-          is defined as: 'Toe power to achieve a de - modern world, rather than to acquire              tive maintenance and support so-              sired operational effect in a nominated knowledge for knowledge's sake. 54                lution in place, in addition to the           environment within a specified t ime and wider changes to training, policy and         to sustain that effect for a designated pe - riod' (Australian Government Department 52   See in particular Sections 2. 1. 4, 3 .1, 4 ,                                                  of Defence (2014), 3. 2 .4 and 3 -3 .4 of the Technical 1,nnex.  55  Freeman et al. (2015).                  58 For an examp le of a research and inno - 53   Lawrence Berl<eley National Library (11. d.). 56  US Army Training and Doctrine Command        vation patl1way model, see Donovan and 54   Lawrence Berkeley i\\ational Library (n.d.).       (TRADOC ) (2013).                           Hanney (2011) . 29 of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p9-{size}.png"
        },
        {
            "document": "https://fragdenstaat.de/api/v1/document/154846/?format=api",
            "number": 10,
            "content": "Figure   2.1 Research and innovation as connected processes Source: RAND Europe analysis. Figure   2.2 The eight steps of the research and innovation pathway Research outputs Adaption by users Inputs to research Evaluation                   Research process Source: RAND Europe analysis. Please note that the steps of this graphic should be read in the order described on the previous page (i .e. beginning with 'needs identification and prioritisation', moving clockwise to 'project specification and selection', and continuing in the orde r indicated by the arrows). continuous feedback loops between each           ■  Project specification and selection:         ■  Research outputs: 'Outputs' are the of the steps.                                       This step includes the creation of tech-        products that result from project ac- Figure 2.1 illustrates how border se-         nical specifications to be addressed by         tivities (e.g. research publications, curity research and innovation are part             the research project, as well as the            toolkits, technologies/prototypes). of a cyclical process originating from the          overall selection process of suppliers.      ■  Adoption by end users: This step, identification of a capability gap (or area      ■  Inputs to research: 'Inputs' are the            also referred to as 'operationalisation', requiring improvement). Figures 2.2 and             components that provide a basis for             refers to the integration of research 2.3 elaborate on this pathway, which was            the research process to take place              outputs into operational practice. refined through a series of internal work-          (e.g. funding, technical expertise,          ■  Impact: While definitions vary, 'im- shops with RAND Europe border security              relationships, project management,              pact' can be defined as the extent and innovation experts.                             personnel).                                     to which research improves opera- Several steps follow the identification    ■  Research process : This includes all            tional practices, contributes to an of a need (e.g. a capability gap) to form           activities related to the delivery of           enhanced understanding of policy the research and innovation pathway.                the research against the technical              issues, and builds capacity through These include:s9                                    requirements (see definition of 'ba-            skills development. •   0 sic' versus 'applied research' above) . 59     RAND Europe analysis.                                                                     60  ESRC (n.d. ) . 30    of 156",
            "width": 2481,
            "height": 3508,
            "image": "https://media.frag-den-staat.de/files/docs/1c/d2/18/1cd2189bc7d946f6b4c1db37b236dd21/page-p10-{size}.png"
        }
    ]
}