Describe the challenges faced by us customs

Assignment Help Basic Computer Science
Reference no: EM13882743

Use Times New Roman (Font 12) and two paragraphs for each of the 5 questions (two pages of content). Additionally, I want you to state each topic question followed by your response.

Based on the assigned readings, your responses are to be in your own words with no copying except for minimal quotes that must be properly cited. What I am looking for here are your own thoughts and opinions that demonstrate your understanding of the topics and the course materials. Since, you will be using the assigned course materials to address the topic questions, you are not required to include a bibliography list.  I want you to share your own thoughts in your own words in completing this assignment.

If you have any questions or concerns with the assignment please contact me.

1) Describe the challenges faced by US Customs and Border Protection agents attempting to secure the border. Be sure to include:

What is the functional equivalent of the border?

What is the Fourth amendment exception as it pertains to border searches?

How are seizure statistics used to justify the mission of border security?

2) Explain "open markets and closed borders" as it pertains to smuggling, free trade, and border enforcement.

3) What are the challenges of facilitating legal border crossings while maintaining secure borders?

4) What has been the economic impact of terrorism on U.S. and Global Markets since 9/11?

5) Describe the impact of the General Agreement on Tariffs and Trade (GATT) and North American Free Trade Agreement (NAFTA) agreements on cross border trade in North America.


Glynco, Georgia 

CBP. The Border, Functional Equivalent of the Border, Extended Border. UNITED STATES CUSTOMS ACADEMY. Glynco, Georgia 
CRS Report for Congress. Protecting the U.S. Perimeter: Border Searches Under the Fourth Amendment. Congressional Research Service, June 29, 2009


CBP. Secure Borders, Safe Travel, Legal Trade. U.S. Customs and Border Protection Fiscal Year 2009-2014 Strategic Plan. U.S. Customs and Border Protection, July 2009.

The 9/11 Commission Report. Final Report of the National Commission Terrorist Attacks Upon the United States, Executive Summary.
DHS. DHS and DOD Announce Continued Partnership in Strengthening Southwest Border Security. For Immediate Release Office of the Press Secretary, December 20, 2011.

GAO-12-809. INFORMATION SHARING: DHS Has Demonstrated Leadership and Progress, but Additional Actions Could Help Sustain and Strengthen Efforts, September 2012.    

ALANBEAN:Tom Berry: "Ten Years of Waste, Immigrant Crackdowns and New Drug Wars". Friends Of Justice, June 30, 2012.

Thurston, Marty. Post-911 Security Policies On The Northern Border: Who Is At Fault?, July 29, 2009.
Borders and International Terrorism (pay and free riding) found in the "Resources".

STRATEGY TO COMBAT TRANSNATIONAL ORGANIZED CRIME: Addressing     Converging Threats to National Security. The White House,Washington, D.C., July 19, 2011.

UNODC. Transnational organized crime: the globalized illegal economy. United Nations Office on Drugs and Crime. 
Additional Resources

Treverton, et. al. Film Piracy, Organized Crime, and Terrorism. RAND, 2009.
UNODC. THE GLOBALIZATION OF CRIME A TRANSNATIONAL ORGANIZED CRIMETHREAT ASSESSMENT. United Nations Office on Drugs and Crime, June 2012. (accessed October 15, 2012).

18 U.S.C. Section 1545. Smuggling Goods into the United States. UNITED STATES CUSTOMS ACADEMY
Glynco, Georgia.

Reference no: EM13882743

Health level seven internationa

Health Level Seven International (HL7) is a not-for-profit, standards-developing organization dedicated to providing a comprehensive framework and related standards for the ex

Safe and secure packet transmission

Write about the advantages and disadvantages when the streaming stored audio runs over UDP protocol in 1 to 2 page along with references.Explain the given statement "TCP is ge

The government should never use fiscal policy

The government should never use fiscal policy to combat business cycle fluctuations coming from changes in autonomous investment if it also wishes to keep longer term movement

Deploy a highly developed ou structure to implement securit

WWTC office at New York is largely autonomous and few IT personnel to take care of day-to-day IT support activities such as password resets troubleshoot virus problems.  You a

Create an application that allows the user to input 5

Using Visual Basic in Excel Create an application that allows the user to input 5 stocks (pull stock data from yahoo finance) and return a portfolio optimization for those sto

A table of data from a text file

In this lab you will write a program to read in a table of data from a text file where each line represents a record, and manipulate it. Each line of the input file will consi

Program needs to be in pseudocode

Need help Designing a program that lets the user enter the total rainfall for each of 12 months into an array. The program should calculate and display the total rainfall for

Security professionals to find information about threats

Analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd