Multiple checkpoints, infrastructural deficits, manual documentation processes, poor connectivity, widespread extortion ...