Saturday, October 5, 2019

How technologies can be used to make the border system stronger Dissertation

How technologies can be used to make the border system stronger - Dissertation Example The topic of research is based on the concept of border security. In the past, the researcher has worked in the Homeland Security Centers of Excellence and it is through his experience at the department that directed him towards basing his research project on border security. Homeland Security dispatches a range of resources and funds to the federal, state and the local governments, allowing the amalgamation of a number of individually-operating agencies into a collective whole. The agencies work in collaboration with each other for the achievement of shared objectives. These objectives aim to uphold the integrity and security of the country and subserve to provide the utmost protection to the US population. The Homeland Security Centers of Excellence operate under the Office of University Programs and aim to recruit and attract renowned researchers and enthusiasts for carrying out research programs. The research brings together professionals from various fields and uses their expert ise to come up with solutions for homeland security. Each research center is affiliated with a university and their research ventures are supported and collaborated upon by a number of agencies including think tanks, laboratories, and private institutions. The research work carried out at the Security Centers is in line with the research requirements of the divisions of the Department of Homeland Security  Science and Technology Directorate. The collaboration helps to deliver top-of-the-line technology solutions for the problems facing the Department as well as the country on the whole (U.S. Department of Homeland Security 2009). In particular, one of the Centers, National Center for Border Security and Immigration, is focused on the promotion and enhancement of border security. This was the Center that I was associated with. The Centre is led and supported by two universities: one being the research co-lead while the other is the education co-lead. The Center is committed to the development of technologies, tools and sophisticated procedures to regulate and monitor immigration and business across the borders. This involves the development of projects that promote border security and make it stronger and more effective. There are a number of aspects relating to borders security that the Center focuses on; these include risks and weaknesses, better surveillance and screening, analysis of immigration patterns and improvements in immigration law enforcement (U.S. Department of Homeland Security 2009). The conditions that have developed after the 9/11 have exposed many gaps in the security and surveillance mechanisms. These gaps and vulnerabilities have become yet more acute in light of pressing security demands after the rise in terrorism over the previous years. Besides the post-9/11 conditions and terrorism there are other factors that have necessitated a revision of the immigration and border security systems. These include greater security reviews, insuffic ient collaboration with NGOs and the government, disputed policy tensions etc (Kerwin 2011). My research question is how important is border security today and what measures can be taken to improve it? The research project focuses in particular on the development and enforcement of better surveillance mechanisms and advanced technologies for regulating the influx of immigrants as well as goods such as false documents, illegal medicines, drugs and other illegal items. The project focuses on various aspects associated with development of such technologies, including their pros and cons. One of the key features that guarantees the success of a research project is the amount of information collected regarding it. Keeping this in mind, the research objectives can be defined as follows: Revisiting the importance of border security Identifying the need to develop better methods of surveillance and border security Reviewing the available literature and successful technologies used

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.