Border Security Technology Deployment - Case Study Example

Comments (1) Cite this document
SBInet as a system represents a complex case of conflicts of interests whereby:
1. National Security concerns are marred by political interference. This is especially evident in the statement acquired from the contractor. Another case of political intrusion is mentioned by the Border Patrol Station Chief…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Border Security Technology Deployment
Read TextPreview

Extract of sample
"Border Security Technology Deployment"

Download file to see previous pages SBInet as a system represents a complex case of conflicts of interests whereby:
1. National Security concerns are marred by political interference. This is especially evident in the statement acquired from the contractor. Another case of political intrusion is mentioned by the Border Patrol Station Chief.He claims that some Washington based politicians had the towers installed approximately three hundred and thirty feet apart from the border so as to avoid “sending the wrong message.” Their new positions consequently minimised their capabilities. The Customs and Border Protection (CBP) Sector Chief and the Border Patrol Station Chief cite the Native American tribal councils as a major problem. According to Border Patrol Station Chief, there is a quick change of governance in the Native American tribal councils and every new leadership undermines all agreements that had been made by the previous leadership. To make matters worse Unmanned Arial Vehicles are not allowed to fly over their territories without permission. Neither can the border patrols cross without their permission. According to the CBP, Sector Chief Native American land is a preferred route for illegal immigrants due to its inaccessibility. The only way to deal with politics in this situation is to have a regulatory committee that tables the grievances of any trouble departments especially due to external interference. This is because some untouchables may have their way in jeopardising the SBInet operations due to their lack of professionalism in the particular field that is border security (CNN, 2012). It will be necessary to have the committee immune to manipulation or even intimidation so as to have a dependable body that is fair to all. 2. Conflicts between involved parties undermine border protection There are conflicts between the Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE). ICE, whose responsibility is to monitor, investigate and to resolve illegal immigration deeds seems to be at loggerheads with CBP. CBP whose responsibility is to patrol the border and to monitor illegal entry, apprehend and detain the illegal immigrants claims that ICE does not share information related to their common line of work. It is clear that the line of work between the two departments is very much related hence there is a need for co-operation especially from ICE. The ICE department claims that when the Department of Homeland Security was introduced the ICE, and CBP became one and blames the CBP for trying to take their assets. Meanwhile, CBP claims that ICE does not share their sensor data. According to the Border Patrol Station Chief it is difficult for the right hand to work without knowing what the left hand is doing. In as much as that makes perfect sense it is clear that the individual departments are supposed to be independent of each other. Hence it would be wiser to either have both departments combined into one with all their duties synchronised. Another option would be having their duties defined into clear, separate undertakings such that there will be no inter dependence between each other. This suggestion is mainly based on the reality that there may be policies within the individual departments that may make the ability to inter relate somehow constrained. The inter relations between the departments should also be put down on paper so that future conflicts be avoided and procedures of interactions be common knowledge. 3. Lack of accountability and responsibility hence blame games Blames games are commonplace in SBInet with no particular individual taking responsibility for any faults. For example, the Border Patrol ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Border Security Technology Deployment Case Study”, n.d.)
Border Security Technology Deployment Case Study. Retrieved from https://studentshare.org/systems-science/1399480-border-security-technology-deployment
(Border Security Technology Deployment Case Study)
Border Security Technology Deployment Case Study. https://studentshare.org/systems-science/1399480-border-security-technology-deployment.
“Border Security Technology Deployment Case Study”, n.d. https://studentshare.org/systems-science/1399480-border-security-technology-deployment.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
hamilljocelyn added comment 5 months ago
Student rated this paper as
At first, I thought 16 of pages is too much for such a topic. But now I see it could not be done better. As the author starts you see the difficulty of the question. I’ve read all at once. Precise research
RFID Technology Deployment

The author states that for Wal-Mart deployment was slow due to the overwhelming data available for the firm. This overwhelming data was a result of failure to adopt an incremental approach. In comparison, METRO Group, Nestle, and Albertsons each used an incremental approach and effectively succeeded in deploying the technology (RFID).

28 Pages(7000 words)Essay
In the daily experience, people expect their lives to be safer, smoother, and easier due to computer technologies which if considered in the context of history, are a fairly recent phenomenon. It has contributed to the rapid expansion of data sets, new information, great incredible knowledge acquisition and hopefully, the enhancement of human wisdom.
6 Pages(1500 words)Case Study
US border patrol UAV programs in Texas
The successful implementation of plans related to issues of national importance, such as the protection of a country’s borders, is usually depended on a series of factors, such as the resources and the time available.
8 Pages(2000 words)Case Study
The Case of Cross-Border Chemicals
During the formation of NAIOS, environmental treaties were not discussed. However, this has come back to haunt the regions bound by the treaty. The environmental issues have revealed a
1 Pages(250 words)Case Study
Using there published journals on computer science and information technology, the paper will draw up improvements and necessary changes that need to be done so as to make sure that the system works efficiently. The paper will also contain the steps
5 Pages(1250 words)Case Study
It security
The company has employee strength of about 500 including IT workgroup of 112 personnel. Given that DechTech Solutions is an IT company, most of its processes and functions are automated
3 Pages(750 words)Case Study
Recruitment, selection and deployment of human resources
ob role and responsibility of each employee in the shop; clarify goals and objectives among employees and managers and respective departments; analyze the critical factors that are relevant to job role and organization objectives; determine these factors; establish particular
1 Pages(250 words)Case Study
Recruitment, selection and deployment of human resources
needs to conduct a crash course in performance appraisal for the supervisors deployed in 24-7 shops, Super K and grocery lines, acquainting them with the fundamentals of rating, conducting of appraisal interviews and the documenting of appraisals. At the same time Kanata need to
1 Pages(250 words)Case Study
Homeland Security
The term Homeland security started in 2003 when there was a reorganization of the state agencies after the devastating September 11th attack, hence seeing the formation of the Department
5 Pages(1250 words)Case Study
Network Security
With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised.
3 Pages(750 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Case Study on topic Border Security Technology Deployment for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us