Explain briefly U.S. Border
Security and the challenges in enforcing it?
U.S.
implemented a border protection security
act in 2009 through Department of Homeland Security (DHS). DHS implemented
Western Hemisphere Travel Initiative (WHTI) to facilitate secure land and earth
traveling to U.S. The initiative enforced Mexican and Canadian citizens to
securely present passport or other relevant documents to gain permission to
enter U.S borders. The passports acted as the identity that denoted U.S
citizenship. Custom Border Protection is implementing radiation Portal monitors
as well other improved radiation detecting technologies to track and monitor
seaports, and land boundaries (Official website of the Department of Homeland
Security, 2015).
Challenges
Even
with enforcement of Western Hemisphere Travel Initiative (WHTI) Canadian and
Mexican citizens some faked documents or present any documents to cross USA
borders. They have been negotiating
their rights as a legal citizen of USA through word of mouth. The installation
of Radiation surveillance tools has contributed to different aspects of data
and information where only 68% of arriving tracks and passenger vehicles were
tracked. The systems deployed in southern border never worked according to USA
plan (U.S. Customs and Border Protection, 2013).
What are the major issues that the
U.S. government is facing in protecting its borders from illegal immigration?
Immigration
and Naturalization Service (INS) has faced challenges in implementing legal
enforcement on immigration policies. INS faced challenges such as lack of
reliable data and information to determine staff needs and analysis. INS had
inadequate power ‘and potential to implement information technology security
parameters to promote total security at immigration borders. INS lacked clear
procedures as well as consistent guidelines to facilitate procedures for
adequate working level staff. Selection of experienced and expert staff in the
implementation of security is a challenge to INS due to lack of full
commitments and sacrifice to secure borders (U.S. Customs and Border
Protection, 2014). INS lacked support and effective collaboration with other
agencies that enforce security making efforts implemented lack effectiveness in
their enforcement. NIS Organization has faced challenges whereby it lacked
performance measures to access results of programs implemented by the organization.
How have those issues been
addressed?
The
Bureau of Immigration and Customs Enforcement (BICE) assumed responsibility for
implementing strategies of NIS. The various measures needed to be considered to
improve security includes ensuring resources are well allocated to sensitive
matters that enforce security. BICE should implement advanced technology in
implementing security. The operations involving surveillance, monitoring as
well as recognizing fake documents should implement the application of
information technology. BICE should facilitate collaboration with other
agencies to ensure the organization enforces duties and reliability of security
services. BICE should establish a close
alliance with Bureau of Citizens and Immigration Services (BCIS) for proper
management and adjudication of benefits and operations of the organization. New
collaboration with Bureau of Customs and Border Protection (BCBP) should be
established to help BICE in implementing anti-smuggling investigations and providing
intelligence operations and information. BICE should concentrate on
facilitating training to the employees as well as guiding them through
enforcing internal controls and governing operations involving the
implementation of antiterrorism securing procedures activities (Matt, et al.,
2011).
Throughout
the history of emergency management in the United States, priorities set for
government emergency management agencies have been driven by the most widely
perceived threat or hazard. In your opinion, is DHS’s current focusing on
terrorism the right area to be focused on, or should more attention be paid to
natural disaster management?
Emergency
management covers aspects dealing with risk and risk avoidance. According to
principle foundation of DHS was to facilitate security by fighting terrorism
attacks. Aims and objectives guiding DHS are focused on ways to improve rampant
attacks from terror groups, cyber espionage as well as cyber crime attacks. The
nature of the organization is to implement processes that cu9rb and deal with
terror groups. Diverting original attention of the group means that the
organization has comprised to security and surrendered to the terrorists. Main
operations and objectives of DHS will lack meaning and integrate hence security
will become second priority.
DHS
has experience in dealing with physical matters implemented by terror groups.
Investments implemented by DHS focus at improving and mitigating terror acts.
From a technology point of view advancement of the group has facilitated great
changes in technology to make current technology manage nature of security. DHS
well understands secrets and codes for implementation of security. Changing and
diverting their expertise to another field is equally giving them a total failure
in their new jurisdiction. Strategies and effort employed by DHS allow proper
implementation of security work by their office.
Responsibilities
duties and roles allocated to DHS are well outlined by their long term and
short term goals. The effectiveness of operations within the organization of
DHS focuses at implementing their strategic plan. The entire perfection of
activities of nature of system should effectively actively embed within systems
of DHS. Through functions of DHS established links and association with
intelligence groups would lose meaning upon allocating DHS more extra duties
(Julie, & Jonathan, 2012). Adding extra operation to DHS is expanding their
operations thus making them more stressed in dealing with extra work.
Policies and standards set by DHS reveal their
traditions and active work of dedicated services. The various coordination of
activities within the organization of DHS and settings that correspond to the
cooperation of nations should be actively completed and accomplished by DHS
while operati0nkg in its original work and office. Through the allocation of
work and dealing with operations like computer crimes, biometric security
enforcement, and several projects were accomplished, through operations
involving DHS. The efforts of DHS were actively involved in accomplishing tasks
security projects.
According
to the needs analysis, natural disasters should come second in the process of
prioritizing security aspects. A dedicated body should be set aside to deal
with natural disasters. Improvising m successful organizations to carry out
other duties is denying other area progress and development. Security to
humanity from attacks by terrorist it is one of major risk that operates and
occurs more recently and progressively compared to disaster attacks. The kind
of tremor developed by terror attacks is more severe as compared to the
disasters caused by natural phenomenon. More stigma is developed by people who
encounter natural disasters while little stigma has been noted on individuals who
encounter other forms of disasters. Entirely disaster mitigating group should
be separate from organization that deals with security of entire nations.
References
Julie D., & Jonathan I. (2012). Governing
Immigration Through Crime: A Reader. USA: Stanford university Press
Matt A. M., James J. C., and
Jessica Z.
(2011). Homeland Security 4.0: Overcoming Centralization, Complacency, and
Politics. Source: (heritage.org). Retrieved from
http://www.heritage.org/research/reports/2011/08/homeland-security-4-0-overcoming-centralization-complacency-and-politics
Official website of the Department of
Homeland Security (2015). Securing and Managing Our Borders. Source: (dhs.gov).
Retrieved from https://www.dhs.gov/securing-and-managing-our-borders
U.S. Customs and Border Protection
(2013). United States Border Patrol – Border Agent Staffing by Fiscal Year,
U.S. Customs and Border Protection
(2014)Total Illegal Alien Apprehensions by Fiscal Year. Source: (cbp.gov).
Sherry Roberts is the author of this paper. A senior editor at Melda Research in legitimate research paper writing services if you need a similar paper you can place your order for buy narrative essay.
No comments:
Post a Comment