top of page

Border Security Events

Organizational Context

This case examines border security event handling across the Department of Homeland Security, spanning U.S. Customs and Border Protection, Border Patrol sectors, ports of entry, intelligence units, law enforcement partners, and federal, state, and local coordination nodes.


Border security signals enter the system through sensor detections, encounters, surveillance reports, intelligence tips, maritime and air domain awareness feeds, and field observations.


• Thousands of border security events occur daily across land, air, and maritime domains.

• Standard authorities, response protocols, and reporting systems exist, but interpretation varies widely.

• Political pressure, humanitarian concerns, and security risk coexist in every decision.

• Similar border events frequently receive very different operational responses.


Leadership sought consistent, defensible responses to border events, but the deeper problem was that individual border incidents were being treated as equivalent when they were not.


How the Work Was Intended to Function

From a border security and enforcement perspective, event handling was expected to function predictably:

• Border activity is detected and reported.

• Events are assessed for legality, security, and humanitarian risk.

• Resources are deployed based on assessed priority.

• Actions are taken in accordance with law and policy.

• Outcomes are documented and reviewed.


Because authorities, protocols, and command structures existed, the system appeared controlled at an aggregate level.


What Was Actually Happening

Observed reality diverged materially:

• Two border encounters with similar surface characteristics could drive very different responses.

• Volume of encounters obscured early indicators of higher-risk activity.

• Low-risk humanitarian cases consumed security resources.

• High-risk precursors were sometimes processed as routine encounters.

• Coordination across sectors and agencies lagged operational tempo.

• Front-line personnel perceived guidance as inconsistent or reactive.


The underlying issue was not enforcement authority, but the absence of a shared way to interpret a single border event before committing resources.


How FLOW Was Introduced

Leadership sought to stabilize border event handling without rewriting immigration law or enforcement authorities. Specifically, they wanted:

• A common language for why border events behave differently.

• A method to separate urgency from true security impact.

• A lens focused on the individual event rather than encounter volume.

• Governance aligned to consequence breadth rather than political pressure.


FLOW was introduced as a classification lens applied before response escalation, resource deployment, or interagency coordination.


Identifying the Unit of Effort

The organization anchored analysis on a single, stable unit of work:

• Unit of Effort: One border security event requiring assessment, decision, and disposition.

• The unit may be an illegal crossing, suspicious movement, interdiction, or encounter.

• Multiple observations may inform the same unit without creating additional units.

• The unit does not change as impact expands; only response scope and governance change.


How Complexity Was Determined

Complexity was defined strictly as the amount of judgment required to assess legality, intent, and risk for one border event.


• Low complexity: clear humanitarian or routine enforcement case.

• Higher complexity: ambiguous intent or mixed indicators.

• Higher complexity: potential criminal, smuggling, or national security nexus.

• Higher complexity: tradeoffs between enforcement, humanitarian response, and safety.


This definition of complexity was applied uniformly across all FLOW levels.


How Scale Was Determined

Scale was defined as the breadth of security, humanitarian, and operational impact created by the same border event.


• Number of personnel, migrants, or assets involved.

• Downstream impact on sector operations or port throughput.

• Coordination required across agencies and jurisdictions.

• Extent to which the event constrains future border operations.


The same border event was treated as low scale when its effects remained localized to the immediate encounter, and as higher scale when its consequences altered sector posture or national security considerations.


Other Measures of Scale Considered

• Media attention.

• Political sensitivity.

• Public visibility.

• External reporting timelines.


These remain relevant inputs, but were not used as the primary definition of scale in this walkthrough.


Applying FLOW to Real Border Security Events

With complexity and scale definitions fixed, each border event was classified using the same logic. The unit remains constant across all examples; only judgment requirements and impact surface change.

• Classify complexity first.

• Classify scale second.

• Assign the single FLOW classification that best fits the unit.


FLOW A — Local, Contained Border Events

This example involves one border event. The unit does not change.


Example: a routine unlawful entry encounter with no aggravating factors.


• Complexity: low (clear case).

• Scale: low (localized impact).

• Handling implication: standard processing.


Built-out handling: agents process the encounter, provide required care, and complete documentation without escalation.


FLOW B — Broader Operational Impact from One Event

This example still involves one border event. The unit remains the same; impact expands.


Example: coordinated crossings strain staffing across multiple checkpoints.


• Complexity: low (pattern understood).

• Scale: moderate (resource coordination required).

• Handling implication: coordinated sector response.


Built-out handling: supervisors reallocate personnel, adjust patrol coverage, and coordinate support. The distinction from FLOW A is coordination breadth, not analytic depth.


FLOW C — Complex, Judgment-Driven Border Events

This example still involves one border event. Judgment requirements increase.


Example: encounter with indicators of smuggling or trafficking but incomplete evidence.


• Complexity: high (intent and risk unclear).

• Scale: low-to-moderate (potentially serious).

• Handling implication: careful assessment and coordination.


Built-out handling: agents and analysts integrate intelligence, conduct interviews, and coordinate with partners to determine appropriate action.


FLOW D — System-Level Impact from One Event

This example still involves one border event. The unit remains unchanged; dependency becomes enterprise-wide.


Example: discovery of organized cross-border activity affecting multiple sectors.


• Complexity: variable.

• Scale: high (enterprise border posture impact).

• Handling implication: elevated governance and interagency coordination.


Built-out handling: DHS leadership coordinates national response, adjusts posture, and aligns intelligence and enforcement resources.


FLOW S — Exceptional Border Security Events

This example still involves one border event, but normal governance pathways are inappropriate.


Example: imminent terrorist or mass-casualty threat at the border.


• Complexity and scale vary.

• Handling implication: explicit emergency authority.

• Key risk: irreversible harm.


Built-out handling: immediate interdiction, emergency coordination, and post-event stabilization once threat is neutralized.


What Changed After FLOW Classification

• Border responses became proportional and consistent.

• FLOW A events processed efficiently.

• FLOW B events received coordinated response.

• FLOW C events received focused judgment.

• FLOW D events received senior governance.

• FLOW S events followed emergency authorities.


Organizational Implications

• Security resources were better aligned.

• Humanitarian and enforcement balance improved.

• Early indicators surfaced sooner.

• Front-line confidence increased.

© SolveBoard 2026

bottom of page