Nobody downloaded yet

Securing the US Border - Term Paper Example

Comments (0) Cite this document
Summary
The paper focuses on securing the US border issue. The author describes a comprehensive border security plan known as the Smart Action Border Plan which the US sat down with the Canadian government to come up with  and which incorporated in it all aspects of the border security…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Securing the US Border
Read TextPreview

Extract of sample "Securing the US Border"

Download file to see previous pages A lot of other technological measures were also taken to enhance border security.
On September 11, 2001, two towers fell, but a nation of millions rose as one. The aftermath of the terrorist attacks was massive. It defied the whole foundation of US border security. People were left feeling unsafe in their own homes. The terrorist attacks cut a huge swath across the US policy landscape, ranging from major military and foreign policy actions to the biggest reorganization of the federal government since shortly after the end of World War II.
Since the hijackers entered the country through legally issued visas, immigration was automatically linked with terrorism and border security. As a result, the structures of the federal immigration bureaucracy and immigration policies at the borders and within the US interior have been dramatically reshaped, along with other border security measures and economic policies. 9/11 was an attack on the democracy and the open economy of the US.
US and Canada share a border that stretches across 8,893 kilometers of land and three oceans, and the US and Mexico share a border that is extended for 3141 km(Universalium,2010). It is the general consensus of the American population that the Mexican-US border needs to be more secure as to stop the smuggling of drugs and illegal immigrants but Senator Lieberman, in a report emphasized that the Canadian border should be more secure as there are more extremist Islamist families living in Canada.
Border patrolling dates back to as early as 1904, when mounted watchmen patrolled the border to prevent illegal Chinese immigrants. Now, border security is just not limited to patrolling watchmen, but also includes biometric scans, lasers, virtual fence, cameras, motion detectors, and sensors. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Securing the US Border Term Paper Example | Topics and Well Written Essays - 2500 words”, n.d.)
Securing the US Border Term Paper Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/politics/1590993-securing-the-border-final-cj453
(Securing the US Border Term Paper Example | Topics and Well Written Essays - 2500 Words)
Securing the US Border Term Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/politics/1590993-securing-the-border-final-cj453.
“Securing the US Border Term Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/politics/1590993-securing-the-border-final-cj453.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Securing the US Border

Sourcing and Securing Talent

...? Sourcing and Securing Talent at Delta Services Introduction Delta Services is a new company that is a product of a merge of a government run, based facility and two organizations. Delta Services has recently made it a goal to grow market share by 10% in the next three years. This new aggressive strategy targets the traditional areas. The new strategy will be exercised by promoting products through product innovation, hence, taking in the 'first to market' positioning. Because of this, the company has decided to form a new division that will focus on the technological innovation for this three year strategy. Delta Service has high hopes for this new division and they want a 'contribution mentality' in place. As the newly...
8 Pages(2000 words)Essay

US border patrol UAV programs in Texas

...is also controlled by the above Agency. Because of its crucial role in securing the safety of Americans from illegal activities, as indicatively mentioned above, the US Customs and Border Protection Agency has increased its value as a workplace offering many prospects to interested candidates. Current paper examines the profile of the specific Agency and its potentials/ value as a workplace; reference is made to a particular program of the above Agency: the US border patrol UAV programs in Texas. It is proved that the particular programs could offer a series of benefits to candidates who would be interested in working in the particular area. Of course,...
8 Pages(2000 words)Case Study

US-Mexico Border and Racism

...that the restrained primary refused Smith his defense under the law. All three cases addressed the issue of racial segregation that was sponsored by state laws and in each case the Supreme Court decided to eliminate discrimination on the basis of races and provided the ways for integration within all communities residing in a shared state (Foote 50). Communities residing along the border of Mexico and United States have a significant commonality, including two deserts, a shared history, rapidly growing population, deepening integration economically as well as thriving tourism. The routinely life of individuals living along the both sides of border is influenced by these general elements, in addition to...
3 Pages(750 words)Essay

Securing and Protecting Information

...? Security and Protecting Information Securing and protecting information Development of information securitystrategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007). This is even made worse by the porous and complex nature of modern transactions and the increasing demand for safe and secure information storage and retrieval mechanisms. The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection,...
3 Pages(750 words)Essay

Open Border

...it. K. Mangan writes, "A fence would send the wrong message" (Mangan, 2007). He adds that the United States government ought to "pursue an alternative to a border fence" (Mangan, 2007). While that statement, too, is correct, promoting good will is only one smart part of why the wall should never come to be. Another salient point is the fact that permission to build the wall has "enhanced Department of Homeland Security powers to suspend more than 30 laws" (Mclemore, 2008). Congress understands that this is happening, but using the excuse that the good of the wall will certainly outweigh the bad. The problem with this is that we are talking about 30 laws, not one or two. Obviously,...
5 Pages(1250 words)Essay

Forrensic computing - securing evidence

..., at a recent annual review meeting the shipping clerk Asif Iwud told his reviewer in confidence that he believed Axta had not ‘forgotten and forgiven but had other fish to fry’. He believes she will be resigning soon and is hoping to get her job. The layout and contents of the offices are shown in the diagram above. Evidence to be secured Evidence is the means and materials that enable a case to be proven. The evidence shows the actual events that took place in any situation, and evidence can either be Digital, Electronic or physical. Digital Evidence is the information that is transmitted or stored in computers in binary form, and which is admissible in a court of law. Electronic Evidence is evidence or data of...
4 Pages(1000 words)Essay

Securing the Cloud

...transfers of information currently, but these laws are still undecided in the case of cloud computing. For example, data transfer and security laws like EU Data Protection Directive (EC/95/46) may not seem to assist the case and it would be more difficult to implement data security in the cloud environment. The European clients using a particular cloud environment face this challenge of data transfer as they need to make sure the data transfer is safe for processing outside Europe, (Armbrust, Fox, Griffith, et al. 2009). In many cases, European companies need to obtain a permit in order to transfer data outside Europe explaining the means, goals, destination and safety techniques applied...
16 Pages(4000 words)Essay

Border

...; however, they all agreed that they were useful in preempting security breaches. In conclusion, the immigration station at the J.F.K International airport is an exemplary border. The screening tools used to ensure security at the airport help to prevent unlawful entry of undocumented immigrants into the country while preventing attacks such as the terror attacks that happened in 2001.... Borders Airports serve as a point of access for citizens from different countries; therefore, they qualify as geographical borders. A border refers to a boundary that limits accessibility to specific people. The focus of this essay is the Immigration station at the John F. Kennedy International Airport....
2 Pages(500 words)Essay

Securing the Border in Texas

...Statistics made a report that around 188, 382 illegal aliens who were in the state in year 2011 got deported and that only 23% of these had committed crimes (Simaski and Sapp 3). At a glance, this seems like the federal government is doing its best, but a close look at this issue shows the problem is worse that most Americans imagined. Sadly, most of the illegal immigrants that enter the U.S do so using the border at Texas and only a few of them are getting caught. In addition, the millions of illegal aliens in United States commit so many crimes, they drive without licenses and do not even have the ability to read the road signs in English. Conclusion People cannot be safe when the...
5 Pages(1250 words)Assignment

Benefits of Securing a Border

...Outline i. Introduction ii. Contemporary approach on Border security. iii. Constitutional amendment on the US Border security iv. Border security measures and status in the United States v. New developments in Border Security vi. Conclusion Introduction Nations across the world have always asked this important question “Do we need more border security?” The obvious answer is yes. Specifically, we need more efficient and cost-effective measures that identify those who seek to do us harm and keep them out or apprehend them. This...
4 Pages(1000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Securing the US Border for FREE!

Contact Us