Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States

Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States

    • 79,00 kr
    • 79,00 kr

Utgivarens beskrivning

This report has been professionally converted for accurate flowing-text e-book format reproduction. Transnational criminal organizations (TCOs) have profited from the smuggling of contraband into the United States since its existence. Terror groups have explicitly stated their intent to target the citizens, infrastructure, and economy of the United States. This thesis examined the major TCOs operating across the borders of the United States and the capabilities they possess and utilize. This thesis also examined terror groups that have proclaimed a desire to attack the homeland. As a methodology to analyze the likelihood of terror groups converging with TCOs to exploit existing smuggling infrastructure to enter operatives into the United States, a purposive survey was delivered to a group of subject matter experts in the areas of counter-terrorism, border security, and disruption of TCOs. The majority of these subject matter experts agreed that terror groups will converge with TCOs to enter the United States.
CHAPTER 1 - INTRODUCTION * Introduction * Primary Question * Secondary Questions * Background * Assumptions * Definitions * Delimitations * CHAPTER 2 - LITERATURE REVIEW * TCOs * Capabilities of TCOs * Terror Groups Attacks * Inspiration * Convergence * Conclusion * CHAPTER 3 * RESEARCH METHODOLOGY * Survey Method * Delphi Method * Participants * Confidentiality * Surveys * CHAPTER 4 * ANALYSIS * Participants * Operational Environment * Summary * CHAPTER 5 * CONCLUSIONS AND RECOMMENDATIONS * Introduction * Interpretation of Findings * Mitigation * Recommendations *Summary and Conclusions

The United States has recognized the need to secure its borders since its inception. The formal history of border security in the United States can be traced to the origins of the U.S. Customs Service on September 2, 1789. Initially, the responsibilities of the U.S. Customs Service were primarily the collection of tariffs and duties as prescribed by law (U.S. Customs and Border Protection 2014a). In 1891, the United States formalized the recognized need to administer immigration inspections as well of traditional customs inspections. The 1891 Immigration Act was the impetus for the formation of the Office of the Superintendent of Immigration in the Treasury Department. This agency was charged with permitting or denying entry of immigrants into the U.S. based on their admissibility. This agency would eventually become the United States Immigration and Naturalization Service (INS). Both the INS and the U.S. Customs Service were primarily focused on traffic and enforcement at the official U.S. ports of entry. In 1924, the U.S. Border Patrol (USBP) was created as a solution to address the cross border criminal activity occurring between the official ports of entry into the United States In 1925, the purview of the USBP expanded to include the coasts of the United States as well as the contiguous borders with Mexico and Canada.

GENRE
Historia
UTGIVEN
2017
17 mars
SPRÅK
EN
Engelska
LÄNGD
130
Sidor
UTGIVARE
Progressive Management
STORLEK
3,5
MB

Fler böcker av Progressive Management

Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center
2012
Mali in Perspective: Orientation Guide and Tamashek Cultural Orientation: Geography, History, Economy, Security, Niger, Timbuktu, Kidal, Dogon, Senufo, Tuareg, Mande, Fulani, Maure, Bamako, Mopti Mali in Perspective: Orientation Guide and Tamashek Cultural Orientation: Geography, History, Economy, Security, Niger, Timbuktu, Kidal, Dogon, Senufo, Tuareg, Mande, Fulani, Maure, Bamako, Mopti
2015
The Evolution of Los Zetas in Mexico and Central America: Sadism as an Instrument of Cartel Warfare - Drug and Human Smuggling, Money Laundering, Zeta Activities in the United States The Evolution of Los Zetas in Mexico and Central America: Sadism as an Instrument of Cartel Warfare - Drug and Human Smuggling, Money Laundering, Zeta Activities in the United States
2014
21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment 21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment
2010
China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy
2019
Aviation Artificial Intelligence: How Will it Fare in the Multi-Domain Environment? Unmanned Aerial Vehicles (UAVs) and Drones, Piloted Aircraft Risks, Autonomous Aircraft Benefits, Human - AI Teaming Aviation Artificial Intelligence: How Will it Fare in the Multi-Domain Environment? Unmanned Aerial Vehicles (UAVs) and Drones, Piloted Aircraft Risks, Autonomous Aircraft Benefits, Human - AI Teaming
2019