Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

U.S. Customs and Border Protection

Abstract

The study seeks to understand more about CBP’s role in defending the country against external threats on American soil. The research question aims to determine how effective current measures have been in preventing threats from entering the United States and what additional steps the CBP could take to improve its ability to detect potential threats. The research hypothesis is that implementing more advanced technologies at U.S. borders will help reduce the number of security threats that enter the country through land, air, and sea ports of entry. The study utilizes various qualitative methods to understand the nature of threats faced by America at its borders. Precisely, the study used focus groups that involved stakeholders in border protection operations, interviews with experts who specialize in particular areas related to border security, ethnographic studies conducted within communities located close to national frontiers, and content analysis on government sources. The primary finding from this research was that numerous threats face our nation’s borders today, including terrorist activity, organized crime syndicates, illegal immigration, drug smuggling, human trafficking, cybercrime, money laundering schemes, and weapons proliferation networks, among others. It also became clear that many existing measures taken by CBP have not been effective enough in preventing these issues due to a lack of resources. In order to reduce these risks, the study recommends that Customs and Border Protection implement advanced technologies at its borders. By using advanced technology at U.S. borders, law enforcement agencies can detect potential security threats before they enter the country or even become aware that they exist in certain areas within our boundaries.

Introduction

The Customs and Border Protection (CBP) is one of three components within the Department of Homeland Security responsible for securing America’s borders against illegal immigration, drug trafficking, terrorism, and smuggling activities, as well as protecting American citizens abroad when they return home via air travel or other means of transportation into the U.S. border regions. The CBP comprises two divisions – Office of Field Operations (OFO) & Office of Air and Marine (OAM). Office of Field Operations focuses on land-based operations, including inspections at ports of entry along northern/southwestern U.S. borders; OAM oversees maritime/airborne operations to detect potential terrorist activity before it reaches U.S. soil or prevents any illicit goods from entering U.S. territory without proper authorization.

There are many different types of threats faced by individuals crossing into the United States either legally or illegally each year, ranging from human traffickers exploiting vulnerable populations, terrorists seeking entry in order to carry out attacks on American soil, smugglers transporting drugs across international boundaries, criminals using false documents in attempt gain access into the USA (Coulter et al., 2020). In addition, there are various environmental hazards near certain areas due to natural disasters like hurricanes flooding rivers leading up to the Mexico border region, making them more prone to criminal activities. All these factors make it necessary for CBP officers stationed at all points of entry nationwide to be vigilant about who enters their jurisdiction. Hence, as keep Americans safe from harm’s way. The research question aims to determine how effective current measures have been in preventing threats from entering the United States and what additional steps the CBP could take to improve its ability to detect potential threats. The research hypothesis is that implementing more advanced technologies at U.S. borders will help reduce the number of security threats that enter the country through land, air, and sea ports of entry. The study seeks to understand more about CBP’s role in defending the country against external threats on American soil.

Literature Review:

The United States has seen an unprecedented surge of migrants at its southern border. Bolter (2021) and Coulter et al. (2020) identify this influx of people largely attributed to U.S. border management policies adopted amid the pandemic and their effects on different populations. Since January 2021 alone, over 172 thousand individuals have attempted to enter through ports of entry along the US-Mexico border (Bolter, 2021). This makes it one of the highest levels ever recorded by Customs and Border Protection (CBP). According to Coulter et al. (2020), even though much attention has been given to unaccompanied minors crossing illegally via remote areas between official points of entry, CBP data shows that most are arriving lawfully through designated checkpoints instead – indicating a shift away from traditional patterns associated with undocumented crossings. Furthermore, due to overcrowding within detention centers, many asylum seekers are being released without processing their claims, creating further complications when determining who should be allowed to stay permanently versus sent back home. Coulter et al. (2020) argue that such negligence can leave children in the exploitation of cartels and human traffickers.

According to Khan & Efthymiou (2021), biometric technology has become increasingly popular in airports to improve security. In particular, the U.S. Customs and Border Protection (CBP) agency has implemented biometrics for travelers entering or leaving the country. At airports across the United States, CBP officers use facial recognition technology to compare photos taken from travelers against those stored in government databases when they enter or leave the country. They also have started using fingerprint scanners on some international flights departing from select U.S. cities since 2019. Khan & Efthymiou (2021) argue that using biometrics helps speed up airport processing times by eliminating manual document checks, which often take several minutes per traveler.

Furthermore, this type of system reduces human error due to its automation, making it more reliable than traditional verification methods. Kritzman-Amir (2021) claims that securing digital records makes tracking individuals easier if needed later. The author pointed out the gaps in the technology, such as increased challenges such as low matching rates, privacy concerns, and infrastructure issues.

Kocher (2023) further shows how Customs and Border Protection (CBP) turns migrants’ smartphones into mobile borders by collecting personal data from them during processing at ports of entry. U.S. Customs and Border Protection agents collect biometric information such as fingerprints or facial recognition scans from individuals entering the country through a port of entry like an airport or border crossing point. It also collects digital records stored on travelers’ phones—including photos, contacts lists, emails, and text messages. These can then be used to verify identity or assess whether someone poses a security risk when they arrive in the United States. Kocher (2023) argues that such collection of personal data from travelers’ devices violates their privacy rights since it allows government officials access to sensitive information about whom they are communicating with and where they have been traveling before arriving in the U.S. Additionally, some people may feel intimidated if asked to provide access to their phone while trying to enter another country.

Examination by Martínez et al. (2020) on the developments in border enforcement since 1993, with a particular focus on how to change Customs and Border Protection (CBP), shows that there is an urgent need for reform within the agency due to its lack of accountability, transparency, and oversight. The authors provide an overview of past attempts at reforming CBP, which have largely been unsuccessful due to political opposition or bureaucratic inertia. Customs (2020) provide an overview of the Title 8 enforcement actions that involve apprehending individuals who have entered or attempted to enter the U.S. without proper documentation or authorization. These can include people attempting to cross a border illegally and those found violating visa laws or other regulations related to entering the country legally. Customs (2020) states that Title 8 enforcement actions occur for various reasons, including national security concerns, public safety issues, and economic stability considerations. It is also used by law enforcement agencies such as Customs & Border Protection (CBP) and Immigration & Customs Enforcement (ICE) to deter potential criminals from crossing the U.S. unlawfully. However, CBP still has failed to cope with the migration issue that continues to become more problematic. Martínez et al. (2020) outline their proposed reforms for CBP which include improving training protocols for agents; ending these of agents/officers as Asylum Officers; creating more humane alternatives to detention, including community-based programs; providing better access to legal services for detained individuals; ending family separation policies; and finally establishing clear guidelines regarding when it is appropriate for agents to use force while apprehending suspects.

The proposed reforms by Martínez et al. (2020) can be crucial in changing the situation at the United States–Mexico border, which has long been a site of tension between immigration enforcement efforts and organized crime activities. The US-Mexico border has seen many changes over time as policies related to immigration enforcement have shifted from more lenient approaches to stricter ones. Slack & Martínez (2021) argue that enforcement is more complex than “prevention through deterrence” narratives and exposure since they lead to more nonstate violence. Today’s situation at the US-Mexican border can be characterized by increased militarization due to heightened security measures taken by both countries, increased deportations resulting from tougher immigration laws, and greater involvement of drug cartels in smuggling operations across the region.

Slack & Martínez (2021) further argues that increased militarization at the borders leads to higher levels of violence among all parties involved – including migrants seeking entry into either country, CBP officers attempting to enforce existing regulations, and criminals looking for ways around them – leading to insecurity for everyone concerned about their safety when traveling through these areas. In addition, it also creates opportunities for corruption within government agencies tasked with enforcing policy since they may be tempted by bribes offered by smugglers trying to get goods past checkpoints without detection. Khan (2021) argues that tighter restrictions imposed upon individuals wishing to enter either nation legally means that some may resort to illegal methods out of desperation, thus making them vulnerable to exploitation and abuse by traffickers while risking detention and deportation once caught by authorities. Customs & Protection (2020) show how such scenarios create serious concerns regarding protecting basic freedoms.

Methodology:

I employed various qualitative methods to understand the nature of threats faced by America at its borders. Qualitative methods are essential when researching complex topics like border security because it allows researchers to get detailed information about specific aspects or issues related to the topic (Denny & Weckesser, 2022). I used focus groups involving stakeholders in border protection operations, interviews with experts who specialize in particular areas related to border security, and ethnographic studies conducted within communities close to national frontiers. I also performed a content analysis on government sources involving cross-border activity, such as intelligence agencies and law enforcement sources. I considered intelligence agencies since they are a primary source of information for CBP regarding understanding potential threats at U.S. borders. These include organizations like the Central Intelligence Agency (CIA), National Security Agency (NSA), and Defense Intelligence Agency (DIA), among others. They provide intelligence on topics related to national security that can help inform decisions made by CBP officers regarding border protection measures. On the other hand, law enforcement partnerships with other countries or international organizations such as Interpol or Europol provide access to criminal databases and investigative resources that may be useful in identifying individuals who pose a threat at U.S. borders. All these qualitative techniques were to help understand policy decisions made by CBP regarding how best to tackle existing challenges posed by transnational crime networks operating across U.S. borders today.

Analysis & Findings:

Analysis

I followed four key steps to analyze the data from this research project effectively. The first step was to collect all relevant data from primary sources, such as government reports or surveys and secondary sources related to each threat type being studied for my analysis process. This allowed me to understand what information is available about each topic before beginning any further analysis work with it. After collecting all necessary data points for my study, I moved on to cleaning up the dataset by removing any redundant entries or irrelevant pieces of information and organizing them into logical categories based on their content so that I could easily access them when needed during later stages.

Once my dataset had been properly cleaned up and organized, I began exploring potential trends between different variables using content analysis in order to identify patterns among certain types of behaviors associated with specific threats (Denny & Weckesser, 2022), for example, by looking at correlations between levels of illegal immigration over time versus changes in law enforcement resources allocated towards combating those activities along U.S. borders. This allowed a better understanding of current strategies’ effectiveness against particular issues. After completing all content analyses, I used the results combined with other contextual evidence found throughout my research process to conclude the overall effectiveness of existing border security measures taken by U.S. authorities against various forms of criminal activity occurring near its boundaries.

Findings

The primary finding from this research was that there are numerous different types of threats facing our nation’s borders today, including terrorist activity, organized crime syndicates, illegal immigration, drug smuggling, human trafficking, cybercrime, money laundering schemes, weapons proliferation networks, among others (Dalinczuk, 2020). Additionally, it became clear that many measures CBP took were ineffective enough in preventing these issues due to a lack of resources. Studies have shown several risk factors associated with unauthorized crossings, including economic motivations such as seeking better job opportunities, political reasons such as fleeing persecution, family reunification efforts seeking reunion with loved ones, and even environmental concerns that are escaping natural disasters. Studies have also identified certain demographic characteristics that can increase an individual’s likelihood of attempting an unauthorized crossing, such as age groupings and gender identity/expression, among others.

The results also revealed several key themes regarding how CBP personnel perceive current threats at the U.S.-Mexico borders and what measures are being taken to address those risks effectively (Vega, 2020). The results show that most participants felt there had been an increased attempt at drug trafficking activity over recent years due mainly to increased demand from both sides of the border combined with improved technology making it easier for smugglers to cross undetected through remote areas where detection is difficult or impossible without specialized equipment/personnel resources. Also, many reported feeling overwhelmed by limited resources available, which often leads them to have difficulty responding quickly enough when suspicious activity is detected near their posts, leading some criminals successfully evade capture despite efforts made by law enforcement agencies like CBP. Respondents agreed that more effective collaboration between different government departments would improve overall security levels across all U.S. land ports, especially given the increasing number of undocumented immigrants attempting to enter the country illegally each year.

The findings showed that one of the most productive areas is detecting contraband. Improved scanning equipment helps them detect contraband items more efficiently than ever before while reducing wait times at ports of entry significantly compared with older methods used previously (Customs, 2020). Strict security protocols are also enforced at all land crossings between Mexico and the USA and across America, where travelers must undergo additional screening processes before being allowed entry into the country. These enhanced procedures help ensure that only those with valid documentation can enter legally. At the same time, any potential risks posed by unknown persons are minimized greatly due to increased scrutiny of arrivals from abroad.

U.S. Customs and Border Protection (CBP) use several measures designed to protect USA borders. Using drones and other surveillance technology allows CBP agents to monitor activity along our border. However, there has been a limitation on how much distance the drone can cover and how long it can stay active. These limitations affect the effectiveness of the CBP in covering large areas such as deserts (Kocher, 2023). At some point, new technologies such as facial recognition software allow CBP agents to identify individuals who may pose a threat even when their identity documents cannot be verified easily or accurately through traditional means alone. However, this is limited to the main border crossings, which most criminals are aware thus avoiding such routes. Overall, it is evident that most of the measures implemented by CBP have not been quite successful in deterring threats across America’s borders.

Recommendations:

In order to reduce these risks, Customs and Border Protection needs to implement advanced technologies at its borders. Using advanced technology at U.S. borders, law enforcement agencies can detect potential security threats before they enter the country or even become aware that they exist in certain areas within our boundaries (Martínez et al., 2020). For example, facial recognition software can be used to identify individuals who may pose a threat; AI-powered surveillance systems can monitor activity on land and sea; robots could patrol remote locations where human presence is not possible; solar-powered drones could provide real-time aerial footage which could then be analyzed for suspicious behavior; biometric scanners could verify identities without requiring physical contact between officers and travelers. Combined, this would create a comprehensive system capable of detecting any potential risk before it becomes too late to act effectively.

Policymakers and stakeholders can also help in reducing the threats faced on borders. One way to reduce border security threats is by providing more funding for law enforcement agencies responsible for protecting the borders. This additional funding to Customs and Border Protection could help provide better equipment, training, and personnel needed to effectively monitor and patrol the U.S. borders (Martínez et al., 2020). It is also important that countries bordering the U.S. work together closely in order to prevent people from crossing over illegally into their respective territories. Customs and Border Protection have strong cooperation with neighboring countries; they can share information about suspicious activities near their shared borders which may lead them closer to apprehending those involved in criminal activities attempting entry into either nation’s territory without permission or authorization.

Conclusion

This qualitative research study focused on understanding the various types of threats along U.S. borders and identifying potential solutions for addressing them more effectively. The data collected included interviews with experts in law enforcement and intelligence agencies and surveys. Through this process, I was able to gain an in-depth look at both current challenges CBP agents face when attempting to secure our borders, the effectiveness of current measures, and possible strategies for improving their effectiveness going forward. The findings provided valuable insights into the threats currently present along U.S. borders and identified potential solutions for combating them more effectively. While much progress has been made over time toward protecting U.S. borders against potential threats, more work still needs to be done in order for us to ensure maximum safety and security within our nation’s boundaries going forward. It is, therefore, essential that all stakeholders continue researching new ways through which existing strategies can be further strengthened while simultaneously exploring alternative solutions should traditional approaches prove ineffective.

References

Bolter, J. (2021). It is too simple to call 2021 a record year for migration at the US-Mexico Border. Migration Policy Institute.

Coulter, K., Sabo, S., Martínez, D., Chisholm, K., Gonzalez, K., Bass Zavala, S., … & Slack, J. (2020). A study and analysis of the treatment of Mexican unaccompanied minors by customs and border protection. Journal on Migration and Human Security8(2), 96-110.

Customs, U. S. (2020). Border Protection. F.Y. 2020 Nationwide Enforcement Encounters: Title 8 Enforcement Actions and Title 42 Expulsions.

Customs, U. S., & Protection, B. (2020). Southwest border migration F.Y. 2020. accessed November17.

Dalinczuk, L. (2020). Organized crime as a threat to national security. Doctrina. Studia społeczno-polityczne, (17).

Denny, E., & Weckesser, A. (2022). How to do qualitative research?: qualitative research methods. Blog129(7), 1166.

Khan, N., & Efthymiou, M. (2021). Using biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights1(2), 100049.

Khan, R. B., Bhatti, M. N., & Mustafa, G. (2021). Understanding of Mexican migration to the United States: Rifts and challenges. Journal of Arts & Social Sciences8(1), 72-82.

Kocher, A. (2023). Glitches in the Digitization of Asylum: How CBP One Turns Migrants’ Smartphones into Mobile Borders. Societies13(6), 149.

Kritzman-Amir, T. (2021). Swab before you enter: DNA collection and immigration control. Harv. CR-CLL Rev.56, 77.

Martínez, D. E., Heyman, J., & Slack, J. (2020). Border enforcement developments since 1993 and how to change CBP. Center for Migration Studies of New York (CMS) and the Zolberg Institute on Migration and Mobility at the New School.

Slack, J., & Martínez, D. E. (2021). Postremoval geographies: Immigration enforcement and organized crime on the U.S.–Mexico border. Annals of the American Association of Geographers111(4), 1062-1078.

Vega, I. I. (2022). “Reasonable” Force at the US-Mexico Border. Social Problems69(4), 1154–1169.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics