Nobody downloaded yet

Securing our Borders - Thesis Example

Comments (0) Cite this document
Securing our borders Quintan A. Brown Instructor: Kenneth Davis 24 January 2011 Securing our borders After 9/11, most Americans would like to think that the United States borders are tighter than ever; some articles stressed that they are wrong. Time International correspondents Barlett et al…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Securing our Borders
Read TextPreview

Extract of sample "Securing our Borders"

Download file to see previous pages borders with Mexico and Canada. Several sources indicated the need for greater border security through a wide range of technological, legislative, and military interventions (Meyers, 2003; Military Technology, 2010), as well as global agreements (Taylor, 2005). Despite the need of securing the borders, however, there are also calls for the consideration of ethical and human rights dimensions of border security (Arreolo, 2010). The U.S. government is also pressed to consider the rights of poor workers and people searching for an asylum to migrate to the U.S., where they can find shelter, freedom, and livelihood. In addition, some sources argued for the importance of understanding cultural geography, when finding and evaluating solutions to border issues (Arreolo, 2010). The borders are not seen as boundaries by illegal immigrants, but as opportunities for a new and better life (Hemphill, 2009; Huemer, 2010). This paper will explore the literature on the U.S. borders and border security. The research questions are: What are some of the strategies that the U.S. government should pursue to enhance border security? Should the government ensure that these interventions are humane and ethical? This paper will discuss existing border patrol strategies. It will also discuss recommended strategies that aim to enhance border security. ...
Finally, it examines the ethical implications of border security measures and the need for international efforts for managing borders. The Honey of Illegal and Legal Immigrant Bees One of the primary goals of border security is to control immigration, particularly illegal immigration (Marek, 2007). The U.S. continues to symbolize the land of milk and honey for many people around the world, especially those from the Third World. An estimated 500 million people cross the U.S. borders every year, and this consists of people seeking for employment or business opportunities and refugees, as well as unfavorable border crossers, such as criminals and terrorists (Antal, 2010, p.54). The U.S. prides itself as a democratic front for human rights that include the rights to travel and immigrate to other countries. The U.S., despite immigration controls, accepts more legal immigrants as permanent residents than all other countries combined (Antal, 2010, p.54). In 2008, more than a million immigrants became natural U.S. citizens (Antal, 2010, p.54). In 2009, the U.S. granted legal immigrant status to 1.1 million immigrants (Antal, 2010, p.54). The U.S. however, also controls the number of legal immigrants, which push some people to resort to illegal immigration methods. Illegal immigration remains as significant concern, since the U.S. cannot realistically put enough people to monitor wide borders. The U.S.-Canada border extends 5,525 miles; while the border with Mexico covers 1,989 miles long (Antal, 2010, p.54). Furthermore, the U.S. also envelops more than 95,000 miles of shoreline, thousands of airports, and 360 naval ports of entry (Antal, 2010, p.54). It is projected that almost 22,000 containers cross these naval ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Securing our Borders Thesis Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from
(Securing Our Borders Thesis Example | Topics and Well Written Essays - 1500 Words)
“Securing Our Borders Thesis Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Securing our Borders

Borders Group Inc

...? (Assignment) Borders Group Inc ‘Borders Group Inc’, situated in Ann Arbor, Michigan has attained a prominent position in the book retail industry. The company today offers a wide range of services including online shopping facilities to its customers across the globe. It has employed nearly 19,500 individuals in the United States alone. The objective of this paper lies with discussing the Borders’ generic strategy, grand strategy, and long term objectives. 1. Generic Strategy Porter’s generic strategies reflect three optional components which can be adopted by any organization to achieve sustainable competitive advantages; they are cost leadership, differentiation, and focus strategies...
3 Pages(750 words)Essay

Sourcing and Securing Talent

...? Sourcing and Securing Talent at Delta Services Introduction Delta Services is a new company that is a product of a merge of a government run, based facility and two organizations. Delta Services has recently made it a goal to grow market share by 10% in the next three years. This new aggressive strategy targets the traditional areas. The new strategy will be exercised by promoting products through product innovation, hence, taking in the 'first to market' positioning. Because of this, the company has decided to form a new division that will focus on the technological innovation for this three year strategy. Delta Service has high hopes for this new division and they want a 'contribution mentality' in place. As the newly...
8 Pages(2000 words)Essay

Securing and Protecting Information

...? Security and Protecting Information Securing and protecting information Development of information securitystrategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007). This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use...
3 Pages(750 words)Essay

North American Studies - Borders

... No Country for Old Men No Country for Old Men is a United s Novel published by Cormac McCarthy in 2005. The story authored by the McCarthy occurs in the vicinity of Mexico-United States Boarder in a 1980s setting (Greenwood, 2009). It tells the tales of illegal trade on drugs gone out of kilter in the Texas back country desert. The book is a boarder novel telling of the happenings in the two bordering countries. Its plot follows the interwoven paths of the three core characters set in motion by events relating to drug deals gone awry in the Mexican-American border in Terrell County, Southwest Texas. Ed Tom Bell, Anton Chighur and Llewelyn Moss are the three central characters upon which the events of the story revolve. The three... ...
5 Pages(1250 words)Essay

Maths Coursework Investigating Borders

...Investigating borders We will list the figures of the first three given patterns. In the first pattern we start with a black square and add the whitesquares on each side of the first black square. PATTERN 1 There are 4 squares on the border. PATTERN 2 There are 8 squares on the border. PATTERN 3 There are 12 squares on the border. Understanding the patterns The first pattern contains total 5 squares 1 + 3 + 1 = 5. In the second pattern, 5+3=8 new squares are added. So we get total 1 + 3 + (5 + 3) + 1 = 13 squares. In the third pattern, 7+5=12 new squares are added. So we get 1 + 3 +5+(7 + 5) + 3 + 1 = 25 squares. For the next pattern, we predict that the total number... borders...
4 Pages(1000 words)Essay

Forrensic computing - securing evidence

..., at a recent annual review meeting the shipping clerk Asif Iwud told his reviewer in confidence that he believed Axta had not ‘forgotten and forgiven but had other fish to fry’. He believes she will be resigning soon and is hoping to get her job. The layout and contents of the offices are shown in the diagram above. Evidence to be secured Evidence is the means and materials that enable a case to be proven. The evidence shows the actual events that took place in any situation, and evidence can either be Digital, Electronic or physical. Digital Evidence is the information that is transmitted or stored in computers in binary form, and which is admissible in a court of law. Electronic Evidence is evidence or data of...
4 Pages(1000 words)Essay

Securing the Cloud

...for the growth and expansion of cloud computing services. It has also been estimated that within a span of 5 years, an approximate of 15% of the software business will more in to the cloud computing environment and the business is expected to grow to $100 billion during that period. With such an exterminating speed of growth, it is possible that compromises with the security concerns be made. Therefore, it is necessary that the security issues must be address and resolved for this new concept of computing environment, (Joseph, Ernest, and Fellenstein, 2004). Data protection offices and authorities have been worried over the implementation of laws like the Sarbannes-Oxley Act, which administers the...
16 Pages(4000 words)Essay

Securing the US Border

...expiration, a FAST Driver card remains valid beyond its printed expiration date until a new card is activated or the renewal is denied. Inter-modal marine containers comprise approximately 90% of all cargo moved globally. Canada and the United States are working together to improve container security by jointly targeting high-risk containers at the first point of arrival in North America. Joint targeting teams were created at five marine ports in March 2002. Technology is being leveraged wherever possible to ensure the free and secure movement of people and goods across our borders. From biometric readers, through automated targeting systems, to modeling traffic flows...
10 Pages(2500 words)Term Paper

Securing the Land Borders and Coastal Waterways from International Terrorism

...Securing the Land Borders and Coastal Waterways from International Terrorism Securing the Land Borders and Coastal Waterways from International Terrorism Abstract Terrorism has been a thorny issue in many countries all over the world. Many countries have tried to adopt as many, diverse technologies as possible to control and eventually curb the terrorism issue. The terrorists, who have made it their sole responsibility to frustrate such efforts, have upgraded their activities and practices (Young, 2006). They have mastered the art of penetrating the land borders without being caught by evading the proper border check points. They have invaded country’s coastal waterways, and they have used the forum to introduce weapons that aid... their...
2 Pages(500 words)Research Paper

Open Markets, Closed Borders

...and circulate wealth within the economy. 1. The aspect of “need to know” ought to be replace with “need to share,” as stipulated in the 9/11 report. I am of the opinion that if full disclosure of information by the commission is done, the public would appreciate the facts and figures as they happened and help them deal with closure. It is important to note and mention that the questions that the victims and families have regarding the sad events of 9/11 would be put to rest. This is to say that the victims, families and the society as a whole would have closure on the issue, appreciating successes and failures accordingly. 2. Relationship between the department of Defense and department of Homeland security regarding...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis on topic Securing our Borders for FREE!

Contact Us