Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States

Nonfiction, History, Military, United States, Social & Cultural Studies, True Crime
Cover of the book Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370429851
Publisher: Progressive Management Publication: March 17, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370429851
Publisher: Progressive Management
Publication: March 17, 2017
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction. Transnational criminal organizations (TCOs) have profited from the smuggling of contraband into the United States since its existence. Terror groups have explicitly stated their intent to target the citizens, infrastructure, and economy of the United States. This thesis examined the major TCOs operating across the borders of the United States and the capabilities they possess and utilize. This thesis also examined terror groups that have proclaimed a desire to attack the homeland. As a methodology to analyze the likelihood of terror groups converging with TCOs to exploit existing smuggling infrastructure to enter operatives into the United States, a purposive survey was delivered to a group of subject matter experts in the areas of counter-terrorism, border security, and disruption of TCOs. The majority of these subject matter experts agreed that terror groups will converge with TCOs to enter the United States.
CHAPTER 1 - INTRODUCTION * Introduction * Primary Question * Secondary Questions * Background * Assumptions * Definitions * Delimitations * CHAPTER 2 - LITERATURE REVIEW * TCOs * Capabilities of TCOs * Terror Groups Attacks * Inspiration * Convergence * Conclusion * CHAPTER 3 * RESEARCH METHODOLOGY * Survey Method * Delphi Method * Participants * Confidentiality * Surveys * CHAPTER 4 * ANALYSIS * Participants * Operational Environment * Summary * CHAPTER 5 * CONCLUSIONS AND RECOMMENDATIONS * Introduction * Interpretation of Findings * Mitigation * Recommendations *Summary and Conclusions

The United States has recognized the need to secure its borders since its inception. The formal history of border security in the United States can be traced to the origins of the U.S. Customs Service on September 2, 1789. Initially, the responsibilities of the U.S. Customs Service were primarily the collection of tariffs and duties as prescribed by law (U.S. Customs and Border Protection 2014a). In 1891, the United States formalized the recognized need to administer immigration inspections as well of traditional customs inspections. The 1891 Immigration Act was the impetus for the formation of the Office of the Superintendent of Immigration in the Treasury Department. This agency was charged with permitting or denying entry of immigrants into the U.S. based on their admissibility. This agency would eventually become the United States Immigration and Naturalization Service (INS). Both the INS and the U.S. Customs Service were primarily focused on traffic and enforcement at the official U.S. ports of entry. In 1924, the U.S. Border Patrol (USBP) was created as a solution to address the cross border criminal activity occurring between the official ports of entry into the United States In 1925, the purview of the USBP expanded to include the coasts of the United States as well as the contiguous borders with Mexico and Canada.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction. Transnational criminal organizations (TCOs) have profited from the smuggling of contraband into the United States since its existence. Terror groups have explicitly stated their intent to target the citizens, infrastructure, and economy of the United States. This thesis examined the major TCOs operating across the borders of the United States and the capabilities they possess and utilize. This thesis also examined terror groups that have proclaimed a desire to attack the homeland. As a methodology to analyze the likelihood of terror groups converging with TCOs to exploit existing smuggling infrastructure to enter operatives into the United States, a purposive survey was delivered to a group of subject matter experts in the areas of counter-terrorism, border security, and disruption of TCOs. The majority of these subject matter experts agreed that terror groups will converge with TCOs to enter the United States.
CHAPTER 1 - INTRODUCTION * Introduction * Primary Question * Secondary Questions * Background * Assumptions * Definitions * Delimitations * CHAPTER 2 - LITERATURE REVIEW * TCOs * Capabilities of TCOs * Terror Groups Attacks * Inspiration * Convergence * Conclusion * CHAPTER 3 * RESEARCH METHODOLOGY * Survey Method * Delphi Method * Participants * Confidentiality * Surveys * CHAPTER 4 * ANALYSIS * Participants * Operational Environment * Summary * CHAPTER 5 * CONCLUSIONS AND RECOMMENDATIONS * Introduction * Interpretation of Findings * Mitigation * Recommendations *Summary and Conclusions

The United States has recognized the need to secure its borders since its inception. The formal history of border security in the United States can be traced to the origins of the U.S. Customs Service on September 2, 1789. Initially, the responsibilities of the U.S. Customs Service were primarily the collection of tariffs and duties as prescribed by law (U.S. Customs and Border Protection 2014a). In 1891, the United States formalized the recognized need to administer immigration inspections as well of traditional customs inspections. The 1891 Immigration Act was the impetus for the formation of the Office of the Superintendent of Immigration in the Treasury Department. This agency was charged with permitting or denying entry of immigrants into the U.S. based on their admissibility. This agency would eventually become the United States Immigration and Naturalization Service (INS). Both the INS and the U.S. Customs Service were primarily focused on traffic and enforcement at the official U.S. ports of entry. In 1924, the U.S. Border Patrol (USBP) was created as a solution to address the cross border criminal activity occurring between the official ports of entry into the United States In 1925, the purview of the USBP expanded to include the coasts of the United States as well as the contiguous borders with Mexico and Canada.

More books from Progressive Management

Cover of the book Iraq in Perspective: Orientation Guide, Iraqi, Kurmanji, Sorani Cultural Orientation: Baghdad, Mosul, Geography, History, Military, Islam, Traditions, Cultures, Kurds, Yazidis, Hussein, Wars by Progressive Management
Cover of the book Det One: U.S. Marines Corps U.S. Special Operations Command Detachment 2003-2006 - Global War on Terrorism, Iraq War and Operation Iraqi Freedom, Marine Expeditionary Force by Progressive Management
Cover of the book Success in Opposite Direction: Strategic Culture and the French Experience in Indochina, the Suez, and Algeria, 1945-1962 - Decolonization After Second World War, First Indochinese War and Vietnam by Progressive Management
Cover of the book Defense Threat Reduction Agency Foreign Consequence Management Legal Deskbook - Tool for Responders to Weapons of Mass Destruction (WMD) and Terrorism Incidents on Foreign Soil by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume I: The Joint Chiefs of Staff and National Policy 1945 -1947 - Atomic Age Problems, Postwar Bases, Western Hemisphere Defense, China Standoff by Progressive Management
Cover of the book 21st Century FEMA Study Course: Multihazard Planning for Childcare and Childcare Providers (IS-36) - Crucial Planning and Emergency Information for Man-made and Natural Hazards (2012 Course) by Progressive Management
Cover of the book Air Force Doctrine Document 6-0: Command and Control - C2 Processes, Planning, Technology, Training, Transfer of Forces and Command Authority by Progressive Management
Cover of the book 21st Century Pocket Guide to the U.S. Naval Academy at Annapolis: USNA Programs, Admissions, Cadet Life, History by Progressive Management
Cover of the book NSA Secrets Declassified: Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 - Enigma, Codebreakers, World War II, Jewish Refugees, Nazi Gold by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1989 Missions, STS-29, STS-30, STS-28, STS-34, STS-33 by Progressive Management
Cover of the book Africa's Oil Coast: How the Region's Strategic Importance May Cause Operational Challenges for AFRICOM as Currently Constructed - Organizational Structure, Forces and Allocated Resources by Progressive Management
Cover of the book Security Cooperation: An Old Practice for New Times - National Security, Defense, Military Strategies, Africa Command AFRICOM, Southern Command SOUTHCOM, Section 1206 by Progressive Management
Cover of the book Comprehensive Guide to Naval Aviation History: United States Naval Aviation 1910 - 1995 - Pioneers, World War II, Korea, Ships, Aircraft, Helicopters, Carriers, Pilot Heroes by Progressive Management
Cover of the book U.S. Air Force Mishap Prevention Program - Air Force Instruction (AFI) 91-202 - Main USAF Document and Air National Guard Supplement, Aviation, Nuclear, Space Safety by Progressive Management
Cover of the book 2014: The Future of American Airpower - America's Air Force: a Call to the Future, Agile USAF, Naval Aviation Vision 2014-2025, Air-Sea Battle, ISR, UCLASS, X-47B, F-35, 21st Century Deterrence by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy