The operationalization of "pushbacks" along the Evros River and the Aegean maritime border has evolved from sporadic tactical maneuvers into a sophisticated, multi-tiered system of irregular border management. While conventional reporting focuses on the humanitarian optics of these events, a structural analysis reveals a deliberate strategic shift: the outsourcing of physical enforcement to non-state actors, specifically third-country nationals. This mechanism creates a "deniability loop" where the state maintains sovereign control over the border while decoupling itself from the legal and ethical liabilities of the physical act of expulsion.
The Tripartite Model of Irregular Enforcement
The execution of forced returns relies on three distinct operational layers that function in a vertical hierarchy. Understanding this structure is essential to identifying how state actors bypass international legal frameworks like the principle of non-refoulement.
- Command and Intelligence Layer: This consists of official state security forces (police, coast guard, or border patrol). Their role is logistical; they identify targets via thermal imaging and motion sensors, coordinate transport to "black sites" or transit points, and manage the timing of the operation.
- The Proxy Layer: This is the critical innovation in modern border strategy. Authorities recruit "auxiliary" migrants—often individuals of Middle Eastern or South Asian origin held in detention—to perform the physical labor of the pushback. These proxies act as the interface between the state and the target group.
- The Target Layer: The migrants being expelled. Because the interface is another migrant, the state can argue in judicial settings that the incident was a "clash between rival groups" or "smuggler-on-smuggler violence," rather than a state-led operation.
The Incentive Structure of Proxy Recruitment
The use of masked migrants is not a random occurrence but a calculated exploitation of the precarious legal status of detainees. The state utilizes a "Coerced Participation" framework to secure labor for these high-risk operations. The cost-benefit analysis for a migrant acting as a proxy is driven by two primary variables:
- Temporary Legal Immunity: Proxies are frequently promised "transit papers" or a 30-day stay permit in exchange for a specific period of service (often several weeks of night shifts on the river).
- Freedom of Movement: Unlike general detainees, these enforcers are often granted restricted freedom of movement near the border zones, effectively acting as "kapos" within the modern border regime.
From the state’s perspective, the "Cost of Enforcement" is drastically reduced. Traditional soldiers or police officers require training, salary, and psychological support for high-stress, morally dubious tasks. Proxies are expendable, require zero long-term investment, and—most importantly—possess no standing to testify in international courts against the state that employed them.
Geometric Realities of the Evros River Frontier
The geography of the Evros River (Maritsa) dictates the mechanics of these operations. The border is not a line but a fluid zone of high-velocity transit. The "Pushback Lifecycle" typically follows a rigid four-stage process:
Stage 1: Interception and De-Identification
Upon detection, migrants are stripped of mobile phones, identification documents, and often their outer clothing. This process of "de-identification" is vital. By removing the digital and physical evidence of a person's presence within the territory, the state resets the legal clock. If a person has no phone and no ID, they functionally do not exist in the state's administrative records.
Stage 2: Warehouse Consolidation
Targets are moved to unofficial detention centers—often abandoned warehouses or remote farm buildings. This prevents the "leakage" of information to NGOs or legal observers. The lack of official registration at this stage is what allows the subsequent pushback to remain "invisible" to the legal system.
Stage 3: The Proxy Interface
Masked men, speaking the same or similar languages as the targets (Arabic, Pashto, Farsi), are deployed at the riverbank. They operate the dinghies or small boats used to ferry migrants back to the Turkish side. The use of masks serves a dual purpose: it protects the proxy’s identity from the victims and ensures that any visual evidence (video or photos) captured by onlookers does not show the faces of state officials.
Stage 4: Forced Return and Strategic Abandonment
The targets are forced onto the riverbank or islets. The proxies return to the Greek side, and the state security forces provide oversight from a distance. The physical act of pushing—the most legally damning moment—is thus performed by a non-state actor.
The Legal Nullification Strategy
The use of proxies is a direct response to the increasing sophistication of international human rights litigation. By inserting a non-state actor into the chain of command, the state creates "Attribution Gaps." Under the Draft Articles on Responsibility of States for Internationally Wrongful Acts, a state is responsible for the conduct of its organs. However, proving that a masked migrant was acting under the specific direction and control of the state (the "Effective Control" test established in Nicaragua v. United States) is a monumental evidentiary hurdle.
The state effectively "hacks" the burden of proof. In a court of law, the testimony of a victim identifying a "masked man in a tracksuit" as the perpetrator is insufficient to convict a government official in a uniform miles away. This creates a zone of legal impunity that allows for the systematic violation of Article 3 of the European Convention on Human Rights (prohibition of torture and inhuman or degrading treatment) without immediate consequence.
Quantifying the Information Asymmetry
The success of these operations relies on maintaining a monopoly on the narrative. Modern border enforcement has become a battle of sensors vs. smartphones.
- State Advantage: High-altitude surveillance, thermal optics, and signal jamming in border zones.
- Migrant Advantage: Ubiquity of smartphone cameras and GPS tagging.
By seizing phones immediately upon interception, the state eliminates the "Migrant Advantage." The resulting data vacuum is then filled by official state communiqués that characterize all reports of pushbacks as "fake news" or "hostile propaganda." This creates a deadlock where international bodies have "consistent reports" but "insufficient forensic evidence," leading to diplomatic stagnation rather than policy change.
The Strategic Shift to Maritime Proxying
While the Evros River is the primary theater for land-based proxies, the Aegean Sea presents a different set of tactical challenges. In maritime environments, the "Life Raft Deployment" method has replaced direct boat-to-boat pushing.
In this scenario, migrants are intercepted on a seaworthy vessel, their engine is disabled or removed, and they are then placed on inflatable, motorless life rafts (often called "tents" by the victims). These rafts are then towed into Turkish territorial waters and abandoned. The presence of masked individuals on the Greek Coast Guard vessels during these maneuvers serves the same de-coupling function: they handle the physical transfer of bodies, ensuring that the uniformed officers are never seen "touching" the targets in a way that implies a violation of maritime law.
Economic and Geopolitical Drivers of Proxy Enforcement
The persistence of these tactics points to a deeper "Market Equilibrium" of border control. The European Union provides significant funding for border management through the Integrated Border Management Fund (IBMF). However, the political cost of high migration numbers is greater than the legal cost of irregular pushbacks.
Member states are essentially performing a "Shadow Hedging" strategy. They hedge against the rise of domestic far-right populism (by keeping migration numbers low through pushbacks) while simultaneously hedging against EU sanctions (by using proxies to make those pushbacks legally invisible). As long as the "Political Utility" of reduced arrivals exceeds the "Legal Penalty" of documented human rights violations, the proxy model will remain the dominant operational standard.
Future Projections: The Automation of Denial
The next phase of this evolution is the integration of "Autonomous Enforcement Systems." We are seeing the testing of sound cannons (Long Range Acoustic Devices) and automated surveillance towers. As technology advances, the "Proxy Layer" may transition from human agents to automated systems, further distancing the state from the physical act of expulsion.
However, the human proxy remains the most effective tool for "complex terrain" like the Evros River, where mechanical solutions are prone to failure or easy detection. The reliance on third-country nationals creates a self-perpetuating cycle: the state creates the conditions of illegality that force migrants into detention, and then offers a path out of that detention through the enforcement of that same illegality against others.
The strategic play for human rights observers and international legal bodies is not to focus solely on the identity of the masked men, but to map the logistical infrastructure that supports them. The transport vehicles, the holding cells, and the radio frequencies used to coordinate the "hand-off" between uniformed officers and masked proxies are the weak points in this system of deniability. Accountability requires shifting the focus from the "hand on the boat" to the "radio on the shoulder."