The numbers are plain and they are worrying. Border activity climbed to levels that strain screening and enforcement capacity, and the rise in people who match terrorism screening records demands immediate, pragmatic responses.

In December 2023 Customs and Border Protection recorded a monthly high at the southwest border, with total southwest border encounters reported above 300,000 for the month. That surge is the operational baseline that forced agents and officers to prioritize processing large flows over proactive patrol and intelligence-driven interdiction.

Parallel to the surge in overall encounters, CBP data show that matches to the Terrorist Screening Dataset at both ports of entry and between ports increased in fiscal year 2023 compared with prior years. Those matches remain an extremely small fraction of total encounters, but the trend matters because the watchlist itself has been broadened over time to include affiliates and other potentially risky associates, not just individuals formally designated as known or suspected terrorists. That expansion means a higher raw count of watchlist “hits” can reflect both real threats and the dataset’s growing footprint.

Put bluntly, a growing line at the border creates windows of vulnerability. When personnel and bedspace are consumed by volume, the process that validates identities, confirms watchlist status, and performs interagency handoffs is slower and more error prone. The operational result is predictable: some potentially dangerous persons are caught and processed, some are released pending proceedings, and others evade detection entirely. The so called “gotaways” problem is a persistent blind spot that DHS recognizes and that sensor and camera reports only partially quantify. That uncertainty is the friction point nonstate adversaries look to exploit.

Technology and process weaknesses amplify the risk. The CBP One scheduling and biometric processes were intended to channel flows into predictable, vetted ports of entry. But the app and related liveness checks have demonstrated usability and bias problems for some migrant populations and create pathway dynamics that smugglers and criminal facilitators can game. If lawful pathways fail or are perceived as unreliable, irregular movement increases and with it the chances that hostile actors will use the same routes as legitimate migrants.

This is not a call for panic. It is a call for blunt, targeted action.

First, treat watchlist hits as high-risk triage items. Every match requires immediate, layered intelligence checks and an enforced hold until identity and nexus are resolved. Where detention space is limited, prioritize national security screening slots and surge resources to hold and investigate watchlist matches rather than defaulting to release. CBP and ICE must have clear, published handoff protocols so that every confirmed or plausible match transfers to counterterrorism assets without delay.

Second, fix the choke points that let smugglers profit from failure. That means investing in more boots and analysts for the sectors that show the highest traffic and the greatest number of sensor-detected “gotaways.” It also means increasing targeted disruption of human smuggling networks with multiagency task forces that combine Border Patrol, DHS intelligence components, FBI field offices, and international partners. Volume overwhelms purely tactical responses; it requires strategic disruption upstream.

Third, harden vetting where technology is used. If CBP One and biometric checks are the primary funnel for lawful processing, the app must be usable, unbiased, and resilient to manipulation. That requires independent testing, rapid patch cycles for algorithmic failure modes, and fallback manual procedures so vulnerable populations are not forced into irregular crossing because the technology fails them.

Finally, be honest with the public and with the workforce. Border security is a resource allocation problem as much as a policy debate. Leaders must disclose where screening shortfalls exist and commit the people, authority, and legal tools necessary to close those gaps. The alternative is leaving the margin of error to chance while adversaries shop for seams.

The facts on record show a system under stress: record monthly volumes, rising watchlist encounters, persistent gotaway uncertainty, and technology gaps in lawful pathways. None of this requires hyperbole to be actionable. It requires resources, accountability, and a focus on the operational fixes that reduce those seams. Do that and you reduce the risk of a terror pipeline becoming a reality. Fail to do it and the trends that already concern operators today will be the crisis everyone reads about tomorrow.