{"id":27568,"date":"2019-06-28T18:27:00","date_gmt":"2019-06-28T18:27:00","guid":{"rendered":"http:\/\/f9ffd9fa-b573-4b35-bfde-91ab84b234fe"},"modified":"2019-06-28T18:27:00","modified_gmt":"2019-06-28T18:27:00","slug":"why-a-high-tech-border-wall-is-as-silly-as-a-physical-one","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/","title":{"rendered":"Why a high-tech border wall is as silly as a physical one"},"content":{"rendered":"<p>There&#8217;s a loud and growing chorus of opposition to a physical border wall. That view is shared by&nbsp;<a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjM7bXvuPPfAhX7HjQIHc-EBC0QFjAAegQIBxAB&amp;url=https%3A%2F%2Fwww.businessinsider.com%2Fmayor-of-mcallen-texas-where-trump-is-visiting-doesnt-support-border-wall-2019-1&amp;usg=AOvVaw3_U0PlunYCygnEhTGxq1-_\" target=\"_blank\" rel=\"noopener noreferrer\">leaders of border cities like McAllen, Texas<\/a>, by <a href=\"https:\/\/www.cbsnews.com\/news\/trumps-border-wall-every-congressperson-along-southern-border-opposes-border-wall-funding-2019-1-8\/\" target=\"_blank\" rel=\"noopener noreferrer\">every congressman representing a district along our 2000-mile-long southern border<\/a>, and by the <a href=\"https:\/\/thehill.com\/homenews\/administration\/423099-poll-majorities-oppose-trumps-wall-funding-demand-call-for-compromise\" target=\"_blank\" rel=\"noopener noreferrer\">majority of Americans<\/a> (to say nothing of a long list of bygone societies stretching from the Ming Dynasty to East Germany). Tying a partial government shutdown to funding for the wall has also been deeply unpopular, and the president&#8217;s <a href=\"https:\/\/news.gallup.com\/poll\/203198\/presidential-approval-ratings-donald-trump.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">historically low approval ratings<\/a> were <a href=\"https:\/\/thehill.com\/homenews\/administration\/425311-trumps-polls-sag-amid-wall-fight\" target=\"_blank\" rel=\"noopener noreferrer\">slumping further during the shutdown.<\/a><\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/pentagon-documents-the-militarys-growing-domestic-drone-use\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pentagon documents the military&#8217;s growing domestic drone use<\/strong><\/a><strong>&nbsp;<\/strong><\/p>\n<p>Out of the political jockeying during the longest partial government shutdown in American history, there&#8217;s one idea everyone seems eager to agree on: Technology can help redress serious problems at the border. It&#8217;s an attractive, almost magic-sounding solution, lending a Silicon Valley ring to a stale debate. In the rhetorical shoving match over a physical wall, it&#8217;s become the rallying cry for those seeking sensible alternatives.<\/p>\n<div class=\"relatedContent alignRight\" readability=\"8.0321285140562\">\n<h3 class=\"heading\"><span class=\"int\">Special feature<\/span><\/h3>\n<div class=\"thumb\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2016\/09\/01\/fa215859-76c8-4ab7-8b55-56a42e0d8950\/resize\/220x165\/cf651a47272fd8abf79b87f4b45ba3c4\/09-2016-special-feature-cover-art.jpg\" class alt=\"Cyberwar and the Future of Cybersecurity\" height=\"165\" width=\"220\"><\/span><\/a><\/div>\n<p class=\"title\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Cyberwar and the Future of Cybersecurity<\/a><\/p>\n<p class=\"dek\">Today&#8217;s security threats have expanded in scope and seriousness. There can now be millions &#8212; or even billions &#8212; of dollars at risk when information security isn&#8217;t handled properly.<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\" data-vanity-rewritten=\"true\">Read More<\/a><\/p>\n<\/div>\n<p>Unfortunately, border technology is not the panacea many people think. And in many of its applications it runs counter to our core values.<\/p>\n<p>Increasing border security with a force field of sensing and response technology, what many are calling a digital or virtual wall, isn&#8217;t a new idea &#8212; in fact, it&#8217;s about 50 years old and grew out of strategies and technologies first developed during the Vietnam War. And it hasn&#8217;t worked.<\/p>\n<h3>Technology already in place<\/h3>\n<p>There are currently about 12,000 motion and seismic sensors along the U.S. border with Mexico, along with a vast electronic perimeter of radar and high definition cameras. Predator B drones have extended the radar net in places and can pick out a snake slithering through brush a mile away. Miniature facial recognition&nbsp;<a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjowL2Xt_PfAhV1OX0KHaLFBwMQFjAAegQIChAB&amp;url=https%3A%2F%2Fwww.cato.org%2Fpublications%2Fimmigration-research-policy-brief%2Fdrones-border-efficacy-privacy-implications&amp;usg=AOvVaw3ZzIevftZcj5pu51wrBlb2\" target=\"_blank\" rel=\"noopener noreferrer\">drones<\/a>, 3D mapping technology, tethered blimps first developed to guard forward operating bases in Afghanistan, tunnel-navigating ground robots used in Iraq, invisible dyes dropped from the air to mark migrants, and acoustic deterrents of various types have all been tested or deployed along the border. (Here&#8217;s&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/features\/2018-04-09\/the-race-to-cash-in-on-trump-s-invisible-high-tech-border-wall\" target=\"_blank\" rel=\"noopener noreferrer\">an excellent article<\/a>&nbsp;on the history of this technology buildup by Lauren Etter and Karen Weise.)<\/p>\n<p>Meanwhile, electronic fingerprinting has been in use by immigration enforcement officials since the 1990s to track the massive flow of people, legal and illegal, across U.S. borders. Border security agents currently have access to&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/national-security\/2018\/11\/05\/border-protection-is-preparing-caravan-with-weapons-gear-designed-combat\/?noredirect=on&amp;utm_term=.ad4b50e2a9c3\" target=\"_blank\" rel=\"noopener noreferrer\">military-grade technology like nightscopes, suppressors, infrared and holographic sights, and a thick catalog of tactical weapons and gear<\/a>.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>We&#8217;re not talking about small-scale pilot programs or testbeds, either &#8212; far from it. In the mid-2000s, the America&#8217;s Shield Initiative and Integrated Surveillance Intelligence System cost taxpayers billions. The objective was &#8220;to use the right technology at the right places for the right terrain to \u2026 have the rapid response capability to get to the points of intrusions to increase our overall apprehension rate,&#8221;&nbsp;<a href=\"https:\/\/www.hstoday.us\/subject-matter-areas\/border-security\/what-is-the-america-s-shield-initiative\/\" target=\"_blank\" rel=\"noopener noreferrer\">CBP Commissioner Robert Bonner told the House Appropriations subcommittee on Homeland Security in 2006<\/a>.&nbsp;<\/p>\n<p>Soon after, George W. Bush kicked off the Secure Border Initiative, what he called &#8220;the most technologically advanced border security initiative in American History.&#8221; And just this past March, the latest government spending bill allocated $400 million for border technology. During what&#8217;s become a perennial state of frenzy over illegal immigration, it&#8217;s safe to say there&#8217;s been a decades-old gold rush to bring tech to the border. Rather than promoting new technology development, battle tested technology has migrated over from the defense sector. Contractors are reaping the benefits.<\/p>\n<p>And what are the results of all this technology on immigration? Well,&nbsp;<a href=\"https:\/\/www.nytimes.com\/interactive\/2019\/01\/11\/us\/politics\/trump-border-crisis-reality.html\" target=\"_blank\" rel=\"noopener noreferrer\">here&#8217;s how President Trump feels<\/a>: &#8220;We can&#8217;t have people pouring into our country like they have over the last 10 years.&#8221;&nbsp;<\/p>\n<p>Scrutinizing that assertion&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/stuartanderson\/2019\/01\/10\/there-is-no-border-crisis\/#370dafb46a52\" target=\"_blank\" rel=\"noopener noreferrer\">through the lens of reality<\/a>&nbsp;is an exercise in confronting just how bellicose and misinformed the immigration debate has become, but the important takeaway is that a lot of people believe there&#8217;s still a big problem at the border despite the massive investment in technology. Maybe it&#8217;s time to reevaluate our faith in a digital fix. Maybe it&#8217;s also time to reevaluate the problem.<\/p>\n<h2>Read More<\/h2>\n<p>The reality is that technology, while part of the equation for sensible immigration management and border security, can only do so much. Squaring off against the indomitable human drive for survival, a better life, or economic gain (oftentimes all three), even the most cutting edge deterrent and detection technology is bound to falter. It&#8217;s beyond troubling that the one group of migrants on the rise as this debate continues is&nbsp;<a href=\"https:\/\/www.nytimes.com\/interactive\/2019\/01\/11\/us\/politics\/trump-border-crisis-reality.html\" target=\"_blank\" rel=\"noopener noreferrer\">families, with record crossings for that group in recent months<\/a>. For many, migration is about desperation.<\/p>\n<p>Given that context, it&#8217;s not primarily a security crisis we&#8217;re talking about, but a humanitarian crisis. And combatting a humanitarian crisis with technology designed for the battlefield is not sensible. It&#8217;s certainly not the panacea many people across the political spectrum &#8212; and recently&nbsp;<a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=10&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwib8MuCxfPfAhXYGTQIHWmTB3sQFjAJegQIAxAB&amp;url=https%3A%2F%2Fwww.fastcompany.com%2F90291977%2Fprivacy-advocates-dems-technological-wall-proposal-could-do-even-more-harm-than-trumps-wall&amp;usg=AOvVaw1zhFsBI5yhZSjClEDxLt38\" target=\"_blank\" rel=\"noopener noreferrer\">Democrats have been just as keen to champion border technology<\/a>&nbsp;as Republicans &#8212; would hope.<\/p>\n<p>None of which is to say technology doesn&#8217;t have an important role to play alleviating massive problems with U.S. immigration, just as immigration has&nbsp;<a href=\"https:\/\/www.inc.com\/salvador-rodriguez\/why-tech-needs-immigrants.html\" target=\"_blank\" rel=\"noopener noreferrer\">a critical role to play in the competitiveness of the American tech sector<\/a>. (In fact,&nbsp;<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2017\/02\/how-trumps-immigration-rules-will-hurt-the-us-tech-sector\/515202\/\" target=\"_blank\" rel=\"noopener noreferrer\">the tech community has been one of the major losers<\/a>&nbsp;in this trumped up war against immigrants.) I&#8217;m all for putting our brightest minds to work on these pressing issues.&nbsp;<\/p>\n<p>Fortunately, some progress is already being made. Right now, technologists in the federal government are tackling one of the biggest challenges to the national immigration infrastructure:&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-technology-202\/2018\/12\/05\/the-technology-202-the-government-s-tech-unit-is-trying-to-reduce-wait-times-for-asylum-seekers\/5c06a8221b326b60d128010a\/?utm_term=.fd73e7dcddc9\" target=\"_blank\" rel=\"noopener noreferrer\">a backlog of nearly 750,000 asylum applications<\/a>. And as Katharine Schwab points out in Fast Company,&nbsp;<a href=\"https:\/\/www.fastcompany.com\/90254363\/lighting-the-way-through-the-maze-of-legal-immigration\" target=\"_blank\" rel=\"noopener noreferrer\">a new generation of technology startups is taking dead aim at the byzantine maze of immigration bureaucracy<\/a>. One of those startups,&nbsp;<a href=\"https:\/\/www.boundless.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Boundless<\/a>, is helmed by an immigrant.<\/p>\n<p>But inevitably technology will only be part of the answer to an economic and geopolitical problem as dynamic as international migration. Healthy immigration and true security at the border require deft political, economic, and diplomatic leadership, not quick fix solutions. The worst thing we can do is act rashly and out of accordance with our deepest values as a society.&nbsp;<\/p>\n<p>Building walls &#8212; real or virtual &#8212; certainly qualifies.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Opinion: Technology is an attractive answer, but it&#8217;s no panacea for economic and geopolitical problems at the border.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27569,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-27568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-28T18:27:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"220\" \/>\n\t<meta property=\"og:image:height\" content=\"146\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why a high-tech border wall is as silly as a physical one\",\"datePublished\":\"2019-06-28T18:27:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/\",\"name\":\"Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg\",\"datePublished\":\"2019-06-28T18:27:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg\",\"width\":220,\"height\":146},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why a high-tech border wall is as silly as a physical one\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/","og_locale":"en_US","og_type":"article","og_title":"Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-28T18:27:00+00:00","og_image":[{"width":220,"height":146,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why a high-tech border wall is as silly as a physical one","datePublished":"2019-06-28T18:27:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/","url":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/","name":"Why a high-tech border wall is as silly as a physical one 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg","datePublished":"2019-06-28T18:27:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one.jpg","width":220,"height":146},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-a-high-tech-border-wall-is-as-silly-as-a-physical-one\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why a high-tech border wall is as silly as a physical one"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27568"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27568\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27569"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}