100% (1)
Pages:
5 pages/≈1375 words
Sources:
1
Style:
Turabian
Subject:
Law
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Border security, port security, intelligence & homeland security

Essay Instructions:

Essay 1 (350 words) Examine the economic impact of border protection. 1) What are "Smart Borders"? 2) What is Intellectual Property (IP) theft...How is or how can IP violations be rendered undesirable or unprofitable...Is enforcing IP violations worth the trouble...Why or why not? 3) Fully discuss Executive Order 13,133. How can the use or misuse of the Internet affect the economy? Textbook to use Andreas, Peter. Border Games: Policing the U.S.-Mexico Divide, Second Edition. Ithaca: Cornell University Press, 2009. Essay 2 (350 words) Examine Vessel and Cargo Operations, the current terrorism threats to port maritime operations, Access Controls and Physical Security Issues in the Port Facility, and Safety and Emergency Management measures. 1. How does port facility technology interface with homeland security? 2. What is Continuity of Operations Planning? 3. How does situational awareness and situational readiness affect port safety and emergency management? 4. Why is technology so vital in port facility security? Textbook to use Christopher, Kenneth. Port Security Management. Boca Raton, FL: CRC Press Taylor & Francis Group, 2009 (ISBN # 13: 978-1-4200-6893-1) e-book. Chapter 11 (pages, 223-244) Chapter 12 (pages, 247-263) Essay 3 (500 words) What approaches can an analyst use to reduce cognitive and perceptual biases? Resources to use Collier, Mike. “Intelligence Analysis: A 9/11 Case Study.” In Homeland security and intelligence, edited by Logan, Keith. Santa Barbara, CA: Praeger Security International, 2010. ezproxy.apus.edu/login?url= psi.praeger.com/doc.aspx?d=/books/gpg/C9095C/C9095C-1079.xml U.S. Government. (2009). A tradecraft primer: Structured analytic techniques for improving intelligence analysis. McLean, VA: Sherman Kent School’s Center for Analytic Tradecraft, US Central Intelligence Agency. Retrieved from: www(dot)cia(dot)gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/Tradecraft%20Primer-apr09.pdf Heuer, R. (1999). Chapter 8, Analysis of Competing Hypotheses. Psychology of intelligence analysis. Washington, DC: US Government Printing Office. Retrieved from: www(dot)cia(dot)gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf Heuer, R. (1999). Chapter 14, Improving Intelligence Analysis. Psychology of intelligence analysis. Washington, DC: US Government Printing Office. Retrieved from: www(dot)cia(dot)gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf Note to writer: PLEASE ANSWER EACH QUESTION SEPARATELY WITH REFERENCES/CITATIONS AT THE END OF EACH ANSWER. ALSO STATE THE QUESTION AND THE ANSWER FOLLOWS. THANKS

Essay Sample Content Preview:

Border security, port security, intelligence & homeland security
Name
Course
Instructor
Date
Economic impact of border protection
1. Smart borders are the boundaries between countries meant to improve efficiency in the administration of borders and bring mutual benefits to both sides of the border. The smart border accord was signed between the US and Canada in 2001, and also covers parts of the US Mexican border. The main aim was to ease congestion and improve surveillance of the border. Through increased cooperation and border patrols there is increased ease in movement of goods facilitating international trade, but also facilitating security by minimizing the possibility of terrorist threats in America.
2. Intellectual Property (IP) thefts relates to patents, trademarks, designs and copyright infringement without the owner’s permission. IP violations can be rendered undesirable and unprofitable through more rigorous laws to combat IP violations, and increasing protection of intellectual property through anti counterfeiting programs. Enforcing IP violations is necessary as this reduces smuggling across national borders. Similarly, it acts as a deterrent to IP violations but there should be criteria to distinguish organized criminals ordinary consumers and innovators. Most laws against IP violations focus on digital infringement without distinguishing users. Loss of billions through IP violations imposes a heavy burden through reduced competitiveness, and disrupts fair competition in the market. Thus, enforcing laws against IP violations instills confidence on the regulator’s ability to deal with IP threats.
3. Executive order 13,133 relates to combating human trafficking, and was an amendment to Executive order 13527. President Bush reaffirmed the government’s commitment to create relevant policies to combat international trafficking through the executive branch. This is a follow up on border security because it requires the collaboration of countries to combat the vice and strengthen local communities in dealing with human trafficking.
Internet use improves communication, but there are also increased cases of IP theft through computer crimes and illegal infiltration of computer systems. Even though, there is increased efficiency in many sectors the threat of computer crimes slows down business and can cause massive losses to businesses. Thus, there is a need to have balance in combating economic crimes and ensuring that there is respect of privacy for internet users.
Marine safety, control, operations, emergency and terrorism
1. There is a connection between the US port facilities and Homeland security on the threat of cyber terrorism. Most port facilities are interconnected through computer systems to facilitate movement of goods and the nation’s security is also at risk from the vulnerabilities of the computer networks. Thus, Homeland security and the US Coast Guard need to ensure that there is adequate security in the ports. Marine safety is a top priority for the Homeland Security, although there are fewer efforts to upgrade the infrastructure of ports than other sectors of the economy. The U.S. Customs and Border Protection which is an agency of the Homeland Security is tasked with protecting ports and the maritime environments as well as facilitate trade and technology is important to achieve this.
2. A Continuity of Operations Plan (COOP) is the method devised for a port facility to carry on operations in case of emergency with a view to resume full operations. The planning takes place to ensure that the port management runs smoothly in a way that facilitates sustainability when there are disasters and emergencies. Coordination of activities is paramount as this facilitates easier access to the port facilities among the parties involved. In planning operations during emergencies, it is necessary to delegate roles among the parties, and the planning should also make it easier for personnel to retrieve information.
3. Situational awareness and readiness affect the way port authorities communicate and share information. Through situational awareness, it is possible to issue alerts and ensure adequate preparation. Similarly, situational readiness manage facilitates port safety and improves emergency management as information is easily accessed by parties. Situational awareness and readiness facilitates protection and rapid response as there is easier coordination of activities during emergencies. Situational awareness precedes situational readiness where measures are put in place before there is response in mitigating risks for anticipated emergencies.
4. Technology is an integral part of port facility security where ports are able to adapt business models in line with port security requirements. In essence, port facilities now integrate business models with port facilities in a way that increase efficiency of ports while also integrating security measures in the system. In particular, the ability to verify and record all persons working and entering the port facilities ensures that there is no infiltration by outsiders. Additionally, the staff is able to verify arrival and departures of goods ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!