StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Border Security: How a Secure Border Plays a Role in National Security - Case Study Example

Cite this document
Summary
The writer of this paper states that since border security has become an international concern to many nations, there is a rising need to provide proper mechanisms in dealing with this problem. The main reason is that insecurity has risen to its highest level…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Border Security: How a Secure Border Plays a Role in National Security
Read Text Preview

Extract of sample "Border Security: How a Secure Border Plays a Role in National Security"

Border Security: How a Secure Border Plays a Role in National Security Since border security has become an international concern to many nations, there is rising need to provide proper mechanisms in dealing with this problem. The main reason is that insecurity has risen to its highest level in almost every where from the major towns to small town in many countries. There is a general feeling internationally that people who commit crimes always come from outside the target state. This has raised concern at many border points, which is the main official entry point for people and cargo. Most security measures have been taken into consideration at the border points to curb any insecurity threat to a country. The objective of this research paper is to analyze the role played by the border security in the national security matters. What People Are Worried about or Interested In Security Issues Internationally most governments and citizens are worried about the current terrorism threats. People fear attacks from external terrorists. For instance, Senator McCain and Keel had proposed to the federal government (USA) a 10 point plan that was meant to enhance border security (Hayworth 120). They also urged for effective enforcement of existing laws against terrorists. These terrorists have majorly posted big threat to many countries. The other threat is illegal immigration. The immigration problems are experienced by respective governments which have made them to be more cautious. There are significant dangers which include allowing people of questionable character into the country. The illegal migrants can commit crime silently by plotting for strategic points where bombs are implanted to meet their target. In addition, there is potential death incase one crosses the border. In USA, there is a body named “Bureau of Customs and Border protection,” which serves as a gatekeeper in preventing any illegal entry (Warner 108). These measures taken for instance “operation gatekeeper.” have made the illegal immigrants to look for alternative dangerous routes to get into the country. It had been found that most deaths of the immigrants occur when they travel by roads for instance, immigrants coming to US through Arizona desert roads. People are also concerned about drag trafficking. Most drugs are illegal and they are prevented from entering any country through the insecure borders. When drugs enter the state, people are worried because this problem brings about greater insecurity in terms of theft, death and general influence of other law abiding citizens. Problems Raised By Changes in Economy and Laws There are major problems that laws are able to address in many countries. These laws have been enacted to help in controlling illegal immigrants. These are immigration laws that bar all illegal immigrants into any specified country. For instance, in the US the immigration laws are well articulated and this enhances border security which then translates to good national security. The other major problem is based on the economy. Public opinion has it that illegal migration occurs due to unemployment (Edmonston 84). This is direct proportionality argument whereby in cases where there are high unemployment rates, there are also the greatest illegal migrants (Hayworth 79). In statements made by Mayor Bloomberg and Rupert Murdoch on partnership for new US economy in trying to influence public opinion and address the need for amnesty for illegal immigrants (Hayworth 80). From New York Times on May 2006, there was a poll showing that 53 % of Americans felt that illegal aliens take jobs which the Americans do not want (Hayworth 67). In fact, this was part of building the economy. When these unwanted jobs are taken, the federal government is able to get some tax revenue. This case would be different in a situation where the jobs are available but are not filled. At the same time, some of these illegal migrants are not of ill motives but they have skills they can use more effectively in developing the hosting nation. There are specific legal directions given on the type of technology to be implemented for border security issues. The main example is the USA where the congress has put such measures. This includes borders security and visa entry Reform act. There is provision of intelligence data network to fasten security enforcement measures (Warner 99). One economic problem that has been raised is that the national economy can perform dismally if there is no security within the borders. Any security concern leads to fluctuation in the stock market hence investors may decide to avoid further investment in that particular country (Edmonston 90). New Technologies in Addressing Border Security Issues There are technological developments which have been invented to curb any border security issues. These ensure proper security for the citizens and the government at large. Some of these technological security measures include biometric identification that enables automatic identification of travelers. This is through fingerprints, hand geometry, iris characteristics and other facial features. Secondly, there is land based surveillance. This electronic based surveillance helps in border protection mechanisms because it has cameras mainly triggered by sensors (Hart 21). Importantly, it provides effective detection capacity to all unwanted commodities and weapons at the border. In addition, technology also involves aerial surveillance. Helicopters are effective in accomplishing this operation. For instance, there is aerial surveillance along the coastal border of the USA. The aerial interdiction is an effective way of dealing with all security threats that can be observed through aerial view (Warner 89). This technology has worked in the previous cases where it was a successful mission in Afghanistan. The aircrafts were remotely piloted in Iraq and Afghanistan to enhance surveillance on security matters. This proved to be successful mission for the soldiers in protecting the people against insecurity. There are also security measures at the ports and shorelines. If more effective action is not taken, then the ports are prone to security threats because they are more open and public places where many travelers and cargo pass through. The measures which can be taken to fight the insecurity include electric fencing to the airports to enhance security. There is proper lighting system at the ports, biometric identification cards. Furthermore, the use of computer hardware and software improve and develop information architecture. The information is useful in sharing intelligence data by the specific security protocol in the ports and the state or the federal government (Hart 67). Effective security detection is also put in places, which include a radiation detectors used majorly to prevent dangerous nuclear attacks. All the measures above proved effective technological advances to uplift security situation in the nation. It is expected that more inventions are most appropriate methods to deal with new trends of threats that comes with technology. Precisely, many dangerous weapons or electronic gadgets are designed by terrorists with intention of possible attacks to the rival nation hence this causes increase of insecurity. Technology is replacing the old trends of guarding the gates by guns. There is great political goodwill from all over the world in embracing technological advancements just to deal will border security. To fully accomplish this, there are defining factors which include adaptability, interoperability and legislative requirements. On Going Problems in Border Security That Are Still Threats to National Security There are still areas of security concern at the ports. The port security is threatened by terrorists. The ports are found to be open places, and are exposed and susceptible to dangerous terrorist attacks. There are also threats of bomb to many nations, which call for appropriate actions to be taken to deal with the situation so that proper mechanisms are designed and observed by the all the countries (Dateline70). The security of nations is threatened if border security mechanisms and machineries are no up to date. Conclusion The research paper has explored out issues that pertain to national security. This has clearly demonstrated the need for security at all border points. It has become a concern internationally and many people and nations developed interest on the best possible preventive plan. As discussed, international security is threatened greatly if no stated measures are taken. Some of the major border security measures include strict laws that prevent illegal immigrants, technological application security measures such as increasing aerial surveillance, use of biometric identification procedures at the ports for security check ups and intensifying security at the ports. In addition, at the borders there are also cameras triggered by sensors as away of security enhancement to the nation. This discussion provides general information on the topic so that more researches can be done to raise the level of security in all countries across the world. Works Cited. Dateline, Tucson. Illegal Immigrants Tied to Costly. Arizona. Wildfires Associated Press September 9, July 2004. Edmonston, Smith. “The New Americans”: Economic, Demographic, and Fiscal Effects of Immigration. Washington, DC : National Academy Press. 2004. Print. Hart, Peter. Wall Street Journal Poll Conducted by the Polling Organizations. Newhouse (R). June 8–11, 2007 Hayworth, David. “Whatever It Takes”: Illegal Immigration, Border Security, and the War on Terror. New York. NY: Regnery Publishers. 2005. Print. Warner, Judith.”U.S. Border Security”: A Reference Handbook on Contemporary World Issues. New York. ABC-CLIO Publishers. July 20, 2010. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Border Security: how a Secure Border Plays a Role in National Security Essay”, n.d.)
Border Security: how a Secure Border Plays a Role in National Security Essay. Retrieved from https://studentshare.org/military/1435923-border-security-specifically-how-a-secure-border
(Border Security: How a Secure Border Plays a Role in National Security Essay)
Border Security: How a Secure Border Plays a Role in National Security Essay. https://studentshare.org/military/1435923-border-security-specifically-how-a-secure-border.
“Border Security: How a Secure Border Plays a Role in National Security Essay”, n.d. https://studentshare.org/military/1435923-border-security-specifically-how-a-secure-border.
  • Cited: 0 times

CHECK THESE SAMPLES OF Border Security: How a Secure Border Plays a Role in National Security

Role of national security advisor of US

Insert Name Insert Grade Course Insert Submission Date Role of national security Advisor of US Security is an imperative parameter that creates apprehension across the world when mentioned.... In this paper, I will analyze the role of the US national security Advisor and his place in offering advice to the government and the effect on the Instrument of National Power as a result of the course of action.... In this analysis, I will take into consideration the role of the US national security Advisor in the situation of Afghanistan and Pakistan....
14 Pages (3500 words) Essay

Systems Management and Security for Wal-Mart Business

SYSTEMS MANAGEMENT AND security FOR WAL-MART BUSINESS Systems Management and security for Wal-Mart Business Author Author Affiliation Date TABLE OF CONTEST INTRODUCTION 3 WAL-MART: BUSINESS OVERVIEW 4 INFORMATION security: BASIC NEED 6 WAL-MART INFORMATION security POLICY 8 INFORMATION security AT WAL-MART 10 Communications security Solution 10 Data Transfer security 11 Evaluation and Feedback 12 Audits 12 SUGGESTIONS FOR ORGANIZATIONAL security IMPROVEMENT 13 VPN (Virtual Private Network) 13 Improved Privacy Policy and IT security Strategy 13 PROBLEMS CAN EMERGE 14 References 15 INTRODUCTION Information security refers to the process of securing secret and important business as well as perso… nal data and information....
10 Pages (2500 words) Coursework

Effectiveness of the Department of Homeland Security

In the paper “Effectiveness of the Department of Homeland Security” the author analyzes the responsibilities of the Department of Homeland Security as far as prevention and emergency response by preventing terrorism and enhancing national security.... The first major responsibility of DHS is safeguarding the United States by preventing terrorism and enhancing national security (Charvat, 2012).... Therefore, to prevent such attacks in the future and to ensure that America becomes a secure country to live in and do business, George Walker Bush, undertook a proactive move that led to the establishment of the Department of Homeland Security....
8 Pages (2000 words) Research Paper

Cryptology Advancing National Security

hellip; This essay demonstrates that there are constant threats to national security with government servers constantly coming under attack, as people have now developed technology that is able to break advanced encryption protocols and in that way gain access to sensitive password-protected information.... In a day and age where people are very keen on computer programs and able to hack into national security databases, it is now more important.... In the same way that no one wants a thief having their bank details, we also do not want terrorists having sensitive national security information....
7 Pages (1750 words) Essay

Quadrennial Homeland Security

Private corporations have a major role in impacting the way the department is able to fulfill their mandate.... The Department of Homeland security is mandated with securing the united states of American on so many levels and grounds, starting from the borders to the cyberspace.... The private sector through firms in various sector has a fundamental impact on the way the homeland security department is able to accomplish this mission.... Technology firm in the private sector can also be very important in helping the department of homeland security to achieve this area....
5 Pages (1250 words) Assignment

Legal Issues in Aviation Security

In this study, the aspects of Aviation security are going to be examined in order to give us a clear perception of the existing situation, which would, in turn, help us to find safer methods of air travel.... Aviation security is that branch of Science that deals with the unlawful interference.... hellip; This essay discusses that Aviation security is making all efforts to analyze the legal issues in the field of civil aviation and providing us with improved methods by implementing new approaches to solving the various problems of unlawful interference....
12 Pages (3000 words) Essay

Border Security: PMSC

The research paper “border security: PMSC” analyzes the use of private military and security firms in its war against terror.... he main reason why the government contracted these security firms is the assets they have at their disposal.... These assets have been instrumental in operations by these security firms.... The Mexican border has presented a major challenge to the Homeland security department.... Inflow of immigrants into the United States through the Mexican border has posed major logistic challenges to the United States....
15 Pages (3750 words) Research Paper

Information Security as an Important Process

The paper 'Information security as an Important Process' presents Information technology that is an area that has received much prominence in recent times, following the need for businesses to globalize and exploit opportunities existing beyond the borders of the country.... his practice is hazardous because it can make away with information that may be detrimental to a country's security.... This paper examines the concept of data security and how individuals and companies can be proactive in searching for information to secure their information systems in the modern business environment....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us