Threat framing

The scenario is simple to state and hard to dismiss. Nonstate actors with territorial aims have used subterranean infrastructure to bypass surface defenses, move fighters and materiel, and stage surprise attacks. Hezbollah and its affiliates have built deep, reinforced cross-border tunnels intended for combat operations against Israel. Mexican transnational criminal organizations have built long, sophisticated smuggling tunnels into the United States for contraband and people. The overlap of those two facts creates a plausible worst case: a Hezbollah-style, attack-oriented subterranean campaign introduced into the U.S.-Mexico border space, either by Hezbollah itself or by a proxy. That is the scenario this assessment plans against.

Baseline reality and constraints

There are three factual anchors you must accept before weighing this risk. First, Hezbollah has constructed combat-ready, cross-border tunnel systems in Lebanon that included ventilation, lighting, communications, and passages sized for troop movement and equipment, not just for smuggling. Those tunnels were designed to support offensive operations.

Second, along the U.S. southwest border criminal groups have already invested in highly engineered tunnels. Investigations since the 1990s and several high-profile discoveries in the 2010s and 2020s show tunnels with rail systems, ventilation, electricity, elevators, drainage, and lengths measured in thousands of feet. These were built to move bulk contraband and people, not to insert combat forces, but they demonstrate what technical capacity exists in the border ecosystem.

Third, detection and attribution of subsurface activity remain technically and operationally hard. Ground sensing technologies have limits based on soil, depth, urban clutter, and false positives. U.S. law enforcement consistently reports that human intelligence, tips, and bi-national investigations are the most reliable means of discovery. Policymakers have funded programs to improve persistent detection and to task dedicated tunnel units, but technology is not a silver bullet.

Feasibility assessment

Could a Hezbollah-style combat tunnel appear at the U.S.-Mexico border? It is feasible in absolute terms but difficult in practical terms. Feasibility drivers include engineering resources, local logistics and cover, corruption or access to construction sites, and time. Cartels already have engineering capacity and experience building long, deep tunnels. Hezbollah has organizational capacity to execute complex subterranean projects in friendly or permissive terrain. Where the feasibility gap grows is in the operational purpose. A combat tunnel requires staging areas, safe houses, supply lines, and trained fighters embedded locally or moved covertly. Those needs create intelligence footprints that are easier to detect than a smuggling-only tunnel. There is, as of this writing, no public reporting that Hezbollah has built or is building attack tunnels into the United States or Mexico. U.S. officials have historically reported little evidence of international terrorist organizations operating inside Mexico. That does not eliminate risk. It does lower near-term probability.

Threat vectors and tactics

If an adversary attempted a Hezbollah-style approach there are two logical paths: a direct import of expertise and material from abroad, or a local adaptation using existing cartel capabilities. The foreign-import path would require cross-border travel, covert shipments of heavy equipment, and clandestine logistics that increase exposure and risk. The local adaptation path is more likely. Cartels already control construction crews, warehouses, and the finances needed to pay for multi-month digs. The cartel model plus a sponsoring actor providing tactical guidance could yield a tunnel with offensive characteristics: multiple egress points, reinforced chambers for weapons and fighters, and systems for ventilation and communications. The sponsorship could be ideological, transactional, or clandestine. Evidence of training exchanges, unexplained foreign travel tied to known operatives, or atypical funding flows into border communities would be indicators to watch.

Indicators and early warning

Operational indicators that should trigger elevated threat posture include:

  • Large, unexplained heavy construction beneath industrial or residential lots, or repeated deliveries of bulk fill and construction materials to nominally small facilities.
  • Procurement patterns for ventilation systems, large-capacity pumps, rail track, and high-voltage electrical equipment tied to nonindustrial buyers.
  • Payroll or money movement spikes into labor pools that work in border warehousing and industrial zones, especially when routed through opaque corporate entities.
  • Intelligence of foreign operatives with tunnel-building experience traveling into the region, or local arrests that reveal cross-border operative links.
  • Signals of technical transfers such as cross-border shipment manifests showing tunneling equipment or procurement of D-class explosives and excavation machinery that do not match declared business activity.

Impact scenarios

A bolt-from-the-blue cross-border assault through tunnels is not the only danger. More likely operational impacts are:

  • Secure infiltration of weapons and specialized fighters for targeted attacks inside border cities.
  • Establishment of subterranean sanctuaries that complicate law enforcement raids and prolong kinetic engagements.
  • Use of tunnel networks to move terrorist operatives around ports of entry and staging areas while evading surface sensors.

Any of these outcomes would impose strain on local law enforcement, require interagency kinetic responses, and create acute political pressure to harden border policy and measurements. The social and economic impact on border communities would be severe, even if a plot were disrupted in the construction phase.

Mitigation and recommended posture

Treat this as a layered problem. No single investment will stop a committed, well-funded subterranean threat. Follow these priorities.

1) Harden intelligence fusion and tip channels. The highest return remains human intelligence and targeted investigations. Expand regional task forces that combine HSI, DEA, Border Patrol, local police, and Mexican counterparts under established tunnel task force models. Ensure secure, fast information sharing and legal authorities to act on cross-border leads.

2) Prioritize port-of-entry and industrial-zone surveillance for nonstandard procurement and construction. Build analytic flags for purchases of ventilation, pumping, rail components, and large concrete pours that do not match declared business activity. Mix traditional financial surveillance with on-the-ground inspections.

3) Invest selective technology with realistic expectations. Ground-penetrating radar and seismic systems have use cases but deliver limitations. Procurement should prioritize integrated persistent monitoring over one-off hardware buys. Unattended ground sensors, interior warehouse inspections, aerial surveillance, and forensic geotechnical analysis tied to human leads are more operationally useful today than searching for a magic detection sensor. Congress and DHS have already funded programs to build a Cross-Border Tunnel Threat capability and to stand up task forces. Use those authorities to push practical fielding and sustainment, not speculative gadgets.

4) Harden response options and remediation authorities. When a tunnel is discovered the physical remediation and operational response must be safe, rapid, and unambiguous. Lawmakers have proposed statutory tunnel task forces and subterranean operations programs. Agencies need preapproved remediation plans and contracts for engineering work so cleanup does not get delayed by procurement friction.

5) Community resilience and awareness. Border communities are the first sensors. Outreach programs that incentivize reporting and protect sources are a force multiplier. Provide secure hotlines and witness protection options for those supplying actionable intelligence.

Red team conclusions

The worst-case scenario is technically possible but operationally difficult and detectable if the right nodes are monitored. Cartel engineering capacity lowers the bar for subterranean construction in the border environment. That increases the risk of an attack-capable tunnel being built by a hybrid actor. The most practical asymmetric risk is a local cartel adopting offensive tunnel design features with outside guidance or sponsorship. Absent public evidence to date that Hezbollah has executed cross-border subterranean operations into Mexico or the United States, this remains a credible but low-probability, high-impact contingency. Agencies must treat it with seriousness proportionate to impact, not with panic.

Actionable next steps for policymakers and operators

  • Fund and operationalize cross-border tunnel task forces with clear metrics for detection, interdiction, and remediation.
  • Shift procurement toward integrated persistent monitoring and analytic fusion rather than chasing single-sensor miracles.
  • Expand financial and supply-chain detection for suspicious industrial procurement in border warehouse districts.
  • Deepen liaison with Mexican security forces on construction permits, heavy-equipment tracking, and joint investigations into tunnel networks.
  • Maintain public messaging that clarifies threat posture and encourages reporting without stigmatizing border communities.

Final word

Do not be distracted by exotic headlines. The more dangerous path is slow, methodical, and capital intensive. That path leaves traces. Detecting those traces requires the basics executed well: trained investigators, cross-border partnerships, persistent surveillance where human intelligence points, and remediation playbooks ready at hand. Treat subterranean threats as part of the broader border security architecture and fund solutions that accept complexity rather than promise instant miracles.