Immigration Enforcement in the United States

Immigration Enforcement in the United States
Author:
Publisher:
Total Pages: 175
Release: 2013
Genre: Border security
ISBN: 9780983159155

This report describes for the first time the totality and evolution since the mid-1980s of the current-day immigration enforcement machinery. The report's key findings demonstrate that the nation has reached an historical turning point in meeting long-standing immigration enforcement challenges. The question is no longer whether the government is willing and able to enforce the nation's immigration laws, but how enforcement resources and mandates can best be mobilized to control illegal immigration and ensure the integrity of the nation's immigration laws and traditions.

Science and Security in a Post 9/11 World

Science and Security in a Post 9/11 World
Author: National Research Council
Publisher: National Academies Press
Total Pages: 136
Release: 2007-11-10
Genre: Political Science
ISBN: 0309111919

Based on a series of regional meetings on university campuses with officials from the national security community and academic research institutions, this report identifies specific actions that should be taken to maintain a thriving scientific research environment in an era of heightened security concerns. Actions include maintaining the open exchange of scientific information, fostering a productive environment for international scholars in the U.S., reexamining federal definitions of sensitive but unclassified research, and reviewing policies on deemed export controls. The federal government should establish a standing entity, preferably a Science and Security Commission, that would review policies regarding the exchange of information and the participation of foreign-born scientists and students in research.

9/11 Commission Recommendations

9/11 Commission Recommendations
Author: John Iseby
Publisher: Nova Publishers
Total Pages: 234
Release: 2008
Genre: History
ISBN: 9781604565201

This title presents the 9/11 Commission's recommendations and the status of their implementation.

The Closing of the American Border

The Closing of the American Border
Author: Edward Alden
Publisher: Harper Collins
Total Pages: 372
Release: 2008-09-16
Genre: Political Science
ISBN: 0061558397

Edward Alden presents a[n] ... investigation into the consequences of America's effort to secure its borders since 9/11. The result is a[n] ... assessment of the dangers faced by a U.S. that cuts itself off from the rest of the world--[Source unknown]

Beyond 9/11

Beyond 9/11
Author: Chappell Lawson
Publisher: MIT Press
Total Pages: 401
Release: 2020-08-11
Genre: Political Science
ISBN: 0262361337

Drawing on two decades of government efforts to "secure the homeland," experts offer crucial strategic lessons and detailed recommendations for homeland security. For Americans, the terrorist attacks of September 11, 2001, crystallized the notion of homeland security. But what does it mean to "secure the homeland" in the twenty-first century? What lessons can be drawn from the first two decades of U.S. government efforts to do so? In Beyond 9/11, leading academic experts and former senior government officials address the most salient challenges of homeland security today.

Security, Risk and the Biometric State

Security, Risk and the Biometric State
Author: Benjamin Muller
Publisher: Routledge
Total Pages: 323
Release: 2010-02-25
Genre: History
ISBN: 1135161399

This book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on increasingly sophisticated and invasive technologies across a burgeoning field of applications has accelerated, giving rise to the term 'biometric state'. This book explores how these ‘virtual borders’ are created and the effect they have upon the politics of citizenship and immigration, especially how they contribute to the treatment of citizens as suspects. Finally and most importantly, this text argues that the rationale of 'governing through risk' facilitates pre-emptory logics, a negligent attitude towards 'false positives', and an overall proliferation of borders and ubiquitous risk, which becomes integral to contemporary everyday life, far beyond the confined politics of national borders and frontiers. By focusing on specific sites, such as virtual borders in airports, trusted traveller programs like the NEXUS program and those delivered by airlines and supported by governmental authorities (TSA and CATSA respectively), this book raises critical questions about the emerging biometric state and its commitment and constitution vis-à-vis technology of ‘governing through risk’. This book will be of interest to students of biopolitics, critical security, surveillance studies and International Relations in general. Benjamin J. Muller is assistant professor in International Relations at Simon Fraser University, Burnaby, Canada. He completed his PhD in the School of Politics and International Studies at Queen’s University Belfast, Northern Ireland, in 2005.

The Long Shadow of 9/11

The Long Shadow of 9/11
Author: Brian Michael Jenkins
Publisher: Rand Corporation
Total Pages: 227
Release: 2011
Genre: History
ISBN: 083305838X

This book provides a multifaceted array of answers to the question, In the ten years since the 9/11 terrorist attacks, how has America responded? In a series of essays, RAND authors lend a farsighted perspective to the national dialogue on 9/11's legacy. The essays assess the military, political, fiscal, social, cultural, psychological, and even moral implications of U.S. policymaking since 9/11. Part One of the book addresses the lessons learned from America's accomplishments and mistakes in its responses to the 9/11 attacks and the ongoing terrorist threat. Part Two explores reactions to the extreme ideologies of the terrorists and to the fears they have generated. Part Three presents the dilemmas of asymmetrical warfare and suggests ways to resolve them. Part Four cautions against sacrificing a long-term strategy by imposing short-term solutions, particularly with respect to air passenger security and counterterrorism intelligence. Finally, Part Five looks at the effects of the terrorist attacks on the U.S. public health system, at the potential role of compensation policy for losses incurred by terrorism, and at the possible long-term effects of terrorism and counterterrorism on American values, laws, and society.--Publisher description.

The NSA Report

The NSA Report
Author: President's Review Group on Intelligence and Communications Technologies, The
Publisher: Princeton University Press
Total Pages: 287
Release: 2014-03-31
Genre: Political Science
ISBN: 1400851270

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.

Borders and Security Governance

Borders and Security Governance
Author: Marina Caparini
Publisher: LIT Verlag Münster
Total Pages: 332
Release: 2006
Genre: Political Science
ISBN: 9783825894382

"Geneva Centre for the Democratic Control of Armed Forces (DCAF)"--Cover.

Borderlands

Borderlands
Author: Emmanuel Brunet-Jailly
Publisher: University of Ottawa Press
Total Pages: 404
Release: 2007-05-05
Genre: Political Science
ISBN: 0776615513

Border security has been high on public-policy agendas in Europe and North America since the September 11, 2001 attacks on the World Trade Centre in New York City and on the headquarters of the American military in Washington DC. Governments are now confronted with managing secure borders, a policy objective that in this era of increased free trade and globalization must compete with intense cross-border flows of people and goods. Border-security policies must enable security personnel to identify, or filter out, dangerous individuals and substances from among the millions of travelers and tons of goods that cross borders daily, particularly in large cross-border urban regions. This book addresses this gap between security needs and an understanding of borders and borderlands. Specifically, the chapters in this volume ask policy-makers to recognize that two fundamental elements define borders and borderlands: first, human activities (the agency and agent power of individual ties and forces spanning a border), and second, the broader social processes that frame individual action, such as market forces, government activities (law, regulations, and policies), and the regional culture and politics of a borderland. Borders emerge as the historically and geographically variable expression of human ties exercised within social structures of varying force and influence, and it is the interplay and interdependence between people's incentives to act and the surrounding structures (i.e. constructed social processes that contain and constrain individual action) that determine the effectiveness of border security policies. This book argues that the nature of borders is to be porous, which is a problem for security policy makers. It shows that when for economic, cultural, or political reasons human activities increase across a border and borderland, governments need to increase cooperation and collaboration with regard to security policies, if only to avoid implementing mismatched security policies.