US Border Security

Running head: BORDER SECURITY 1
US Border Security
Name
Institution
BORDER SECURITY 2
Introduction
The level of insecurity between the borders and within the United States is attributed to
the upsurge of illegal activities such narcotic drug trafficking, physical border attacks, and
human trafficking. The spread of the implications alludes from the spillover effects of violence
witnessed between organizations carrying out such illegal. Several Drug Trafficking
Organizations have been set up in the US to help in the execution and distribution of illicit drugs
to the vast region of 230 cities (Andreas, 2003 pp.98). Ideally, illegal businesses lack the legal
defense mechanism hence disputes are always solved through threats of violence. Scientific
scholars also argued that excessive consumption of harmful drugs like marijuana causes the
unconscious use of memory leading to violence (Van 2007). America has been the victim
circumstance due to high demand for heroin and cocaine by its citizens. Also, the geographical
location between Columbia (leading producer of Cocaine) and Mexico (supplier of the heroine)
sets it as the central business area Kotrla, 2010 pp.188). This essay will focus on the major
security threats affecting the nation, how these risks affect the gathering of evidence and the
efforts applied by the counterintelligence unit to curb the upsurge of the activities.
Narcotic Drug Trafficking
According to Central Intelligence Agency report 2012, illicit drug trafficking has shifted
the US border security focus. The United States is at risk of spillover violence witnessed in
Mexico between the government and the drug kingpin like Pablo Escobar. With regards to the
Congressional Research Service report, it is relevant to note that the key DTOs from Mexico
have build connections within the state which when given a chance can do miserable activities to
paralyze the government (Kotrla, 2010 pp.185).
BORDER SECURITY 3
Despite the general denial of increased drug consumption and transportation within the
region, sources indicate that there are 22.1 million users of illicit drugs in the state at the age 12
and above. The statistics purport that more than 30 percent of youths consume marijuana, heroin,
and cocaine. Empirically, this is such a large generation that if not monitored with turns the
whole nation into security quagmire both internally and cross-border (Andreas, 2003 pp.80). It is
my view that narcotic drug trafficking is given special treatment precedence to other security
threats such as human trafficking and terrorism. This is because drug lords can use the proceeds
to hire and fund terrorist group to disturb the security organs of the nations thus making their
business smooth.
How Human Trafficking Affects the Gathering of Intelligence And Combats
Threats
Human trafficking is a global issue affecting countries across the world. Traced back
from the Abraham Lincoln’s reign, he asserted that neither involuntary servitude nor smuggling
of people should be tolerated. The estimates show that approximately 600000 to 800000 get
trafficked across borders (Finklea, 2013 pp. 7). According to John Torres, Director State Bureau
of Immigration and Customs Enforcement, human smuggling composes of greater national
security as smuggling pipelines act as avenues for entry to undocumented, illegal and undetected
persons into the country who eventually carry out terror activities. The latter escape legal contact
by passing through porous borders thus eliminating suffice evident to incriminate them.
Terrorism
Terror actions have been in the eye of the state as the key cause of public insecurity. Most
terror suspects are illegal immigrants who do not have an identity. The American Dream was
pointing to Mexico as the primary provider of dangerous people while the routes include Cuba
BORDER SECURITY 4
and Havana where people pass with false documents into the country. Furthermore, the groups
meet the Al Qaeda and Pakistan nationals who offer training to sabotage the country (Coleman,
2007 pp. 65). Failure to verify and filter the immigrants places the country into insecure position
without knowledge.
How Counterintelligence help in Combating Threats
In the recent past security threats have been blamed on the armed soldiers. With the new
era of the collective, offensive and defensive intelligence experts can sense, track and propose
events as they are organized by the opponents. Although the process needs intensive training,
counterintelligence help the investigator understand how criminal activities are planned and
executed. Secondly, they provide sufficient evidence for the prosecution of the culprits in a court
of law (Van, 2007).
Types of Intelligence
Human intelligence (HUMINT)
HUMINT is the oldest of the intelligence tactics that depends on human sources.
HUMINT takes various forms such as overt (open) intelligence, clandestine and sensitive
activities that explore support and supervise sources like conference hearings, unclassified
journals. The limitations include the sponsor of the must be protected from disclosure. In the
case of identification your reputation will be compromised hence exposing you to insecurity. It is
commonly performed by trained soldiers or diplomatic personnel (Rollins, 2010).
Signal Intelligence (SIGINT)
SIGINT comprises of all signals intercepted from one or all media communication
channels such as Communication intelligence, different instrumentation signals, for example,
voice records, facsimile messages and fiber optics. The signs identify the location, detect weapon
BORDER SECURITY 5
type like missiles. However, they have high fuel consumption. Misinterpretation of the prototype
might cause severe damages.
Conclusion
Indeed, it is the time to change the way of thinking towards the security of our nation.
Globalization has brought serious threats and opportunities that require intelligence to unearth
and respond. The traditional thought of soldier defense of border works hand in hand with
various disciplines like data units to detect, prepare and protect the country (Rollins, 2010). Most
illegal activities like human and drug trafficking have been linked with the development of
threats of violence. The federal government should collaborate with other nations to stop these
illegal businesses cutting from the cause.
BORDER SECURITY 6
References
Andreas, P. (2003). Redrawing the line: Borders and security in the twenty-first century.
International security, 28(2), 78-111. Available via the Trident Online Library.
Coleman, M. (2007). Immigration geopolitics beyond the MexicoUS border. Antipode, 39(1),
54-76. http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8330.2007.00506.x/full.
Retrieved on 4/5/2017
Finklea, K.M. (2013). Southwest border violence: Issues in identifying and measuring
spillover violence. Congressional Research Service. Retrieved
from http://www.fas.org/sgp/crs/homesec/R41075.pdf [Read pages 1-12].
Kotrla, K. (2010). Domestic minor sex trafficking in the United States. Social work, 55(2), 181-
187.
Memorandum of understanding between the United States' Human Smuggling and
Trafficking Center and The Royal Canadian Mounted Police on the
dissemination and exchange of information (2012). DHS. Retrieved
from http://www.dhs.gov/xlibrary/assets/opa/mou-hstc-rcmp-exchange-of-
information.pdf
Rollins, J. (2010). International terrorism and transnational crime: Security threats, US policy,
and considerations for Congress. DIANE Publishing.
Van Cleave, M.K. (2007). Counterintelligence and national strategy. Washington, D.C.: National
Defense University https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-
publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html. Retrieved on
04/05/2017
BORDER SECURITY 7

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.