Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States

Nonfiction, History, Military, United States, Social & Cultural Studies, True Crime
Cover of the book Threat of Convergence of Terror Groups with Transnational Criminal Organizations to Utilize Existing Smuggling Routes and Techniques to Aid the Covert Entry of Operatives into the United States by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370429851
Publisher: Progressive Management Publication: March 17, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370429851
Publisher: Progressive Management
Publication: March 17, 2017
Imprint: Smashwords Edition
Language: English

This report has been professionally converted for accurate flowing-text e-book format reproduction. Transnational criminal organizations (TCOs) have profited from the smuggling of contraband into the United States since its existence. Terror groups have explicitly stated their intent to target the citizens, infrastructure, and economy of the United States. This thesis examined the major TCOs operating across the borders of the United States and the capabilities they possess and utilize. This thesis also examined terror groups that have proclaimed a desire to attack the homeland. As a methodology to analyze the likelihood of terror groups converging with TCOs to exploit existing smuggling infrastructure to enter operatives into the United States, a purposive survey was delivered to a group of subject matter experts in the areas of counter-terrorism, border security, and disruption of TCOs. The majority of these subject matter experts agreed that terror groups will converge with TCOs to enter the United States.
CHAPTER 1 - INTRODUCTION * Introduction * Primary Question * Secondary Questions * Background * Assumptions * Definitions * Delimitations * CHAPTER 2 - LITERATURE REVIEW * TCOs * Capabilities of TCOs * Terror Groups Attacks * Inspiration * Convergence * Conclusion * CHAPTER 3 * RESEARCH METHODOLOGY * Survey Method * Delphi Method * Participants * Confidentiality * Surveys * CHAPTER 4 * ANALYSIS * Participants * Operational Environment * Summary * CHAPTER 5 * CONCLUSIONS AND RECOMMENDATIONS * Introduction * Interpretation of Findings * Mitigation * Recommendations *Summary and Conclusions

The United States has recognized the need to secure its borders since its inception. The formal history of border security in the United States can be traced to the origins of the U.S. Customs Service on September 2, 1789. Initially, the responsibilities of the U.S. Customs Service were primarily the collection of tariffs and duties as prescribed by law (U.S. Customs and Border Protection 2014a). In 1891, the United States formalized the recognized need to administer immigration inspections as well of traditional customs inspections. The 1891 Immigration Act was the impetus for the formation of the Office of the Superintendent of Immigration in the Treasury Department. This agency was charged with permitting or denying entry of immigrants into the U.S. based on their admissibility. This agency would eventually become the United States Immigration and Naturalization Service (INS). Both the INS and the U.S. Customs Service were primarily focused on traffic and enforcement at the official U.S. ports of entry. In 1924, the U.S. Border Patrol (USBP) was created as a solution to address the cross border criminal activity occurring between the official ports of entry into the United States In 1925, the purview of the USBP expanded to include the coasts of the United States as well as the contiguous borders with Mexico and Canada.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This report has been professionally converted for accurate flowing-text e-book format reproduction. Transnational criminal organizations (TCOs) have profited from the smuggling of contraband into the United States since its existence. Terror groups have explicitly stated their intent to target the citizens, infrastructure, and economy of the United States. This thesis examined the major TCOs operating across the borders of the United States and the capabilities they possess and utilize. This thesis also examined terror groups that have proclaimed a desire to attack the homeland. As a methodology to analyze the likelihood of terror groups converging with TCOs to exploit existing smuggling infrastructure to enter operatives into the United States, a purposive survey was delivered to a group of subject matter experts in the areas of counter-terrorism, border security, and disruption of TCOs. The majority of these subject matter experts agreed that terror groups will converge with TCOs to enter the United States.
CHAPTER 1 - INTRODUCTION * Introduction * Primary Question * Secondary Questions * Background * Assumptions * Definitions * Delimitations * CHAPTER 2 - LITERATURE REVIEW * TCOs * Capabilities of TCOs * Terror Groups Attacks * Inspiration * Convergence * Conclusion * CHAPTER 3 * RESEARCH METHODOLOGY * Survey Method * Delphi Method * Participants * Confidentiality * Surveys * CHAPTER 4 * ANALYSIS * Participants * Operational Environment * Summary * CHAPTER 5 * CONCLUSIONS AND RECOMMENDATIONS * Introduction * Interpretation of Findings * Mitigation * Recommendations *Summary and Conclusions

The United States has recognized the need to secure its borders since its inception. The formal history of border security in the United States can be traced to the origins of the U.S. Customs Service on September 2, 1789. Initially, the responsibilities of the U.S. Customs Service were primarily the collection of tariffs and duties as prescribed by law (U.S. Customs and Border Protection 2014a). In 1891, the United States formalized the recognized need to administer immigration inspections as well of traditional customs inspections. The 1891 Immigration Act was the impetus for the formation of the Office of the Superintendent of Immigration in the Treasury Department. This agency was charged with permitting or denying entry of immigrants into the U.S. based on their admissibility. This agency would eventually become the United States Immigration and Naturalization Service (INS). Both the INS and the U.S. Customs Service were primarily focused on traffic and enforcement at the official U.S. ports of entry. In 1924, the U.S. Border Patrol (USBP) was created as a solution to address the cross border criminal activity occurring between the official ports of entry into the United States In 1925, the purview of the USBP expanded to include the coasts of the United States as well as the contiguous borders with Mexico and Canada.

More books from Progressive Management

Cover of the book 2018 Energy Department Report on Assessment of Electricity Disruption Incident Response Capabilities, Cybersecurity of Federal Networks and Critical Infrastructure, Cyber Attack Threats and Impacts by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume V: The Joint Chiefs of Staff and National Policy 1953-1954 - Air Defense, Manpower, Atoms for Peace, Korea, Indochina, Taiwan, Western Europe by Progressive Management
Cover of the book 2011 Unmanned Aircraft Systems (UAS) Encyclopedia: UAVs, Drones, Remotely Piloted Aircraft (RPA), Weapons and Surveillance - Roadmap, Flight Plan, Reliability Study, Systems News and Notes by Progressive Management
Cover of the book Rangers Lead the Way: The Vision of General Creighton W. Abrams - The Post-Vietnam Army, The Ranger Battalion since World War II, the Wickham and Sullivan Charters, Lesson Learned by Progressive Management
Cover of the book 2013 China Military and Security Report: People's Liberation Army (PLA), Space, Cyber Attacks on American Military, Technology, People's Republic of China Force Modernization, Taiwan by Progressive Management
Cover of the book EMS Safety: Techniques and Applications, plus Alive on Arrival, Tips for Safe Emergency Vehicle Operations - Comprehensive Manual on Hazards Faced by Emergency Medical Services Providers by Progressive Management
Cover of the book Venezuela in Perspective: Orientation Guide and Cultural Orientation: Geography, History, Economy, Society, Rural and Urban Life, Security, Religion, Hugo Chavez, Simon Bolivar, Traditions by Progressive Management
Cover of the book Operational Culture for the Warfighter: Principles and Applications - Physical Environment, Economy, Social Structure, Political Structure, Iraq, Islam, Clausewitz, Wargaming by Progressive Management
Cover of the book Advanced Commercial Nuclear Reactor Licensing, Report to Congress: Innovative New Designs, Gas-Cooled, Sodium Fast, Small Module, Liquid Metal, Next Generation Nuclear Plant by Progressive Management
Cover of the book The Art of Naming Military Operations: Operations in the World Wars, Using Nicknames to Shape Perceptions, Korea, Vietnam, Desert Shield, Just Cause, Military Strategy by Progressive Management
Cover of the book The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program - Iraq War and Operation Iraqi Freedom, Anbar, Al Sahawa, Albu-Nimr Tribe in Hit, al-Qaeda Terrorism, Al Qaim, Sheikh Sattar by Progressive Management
Cover of the book The History of the XV-15 Tilt Rotor Research Aircraft: From Concept to Flight - XV-3 Program, Stability Issues, Army and Navy Participation, VTOL, Flight Research Incidents and Crash, V-22 Osprey by Progressive Management
Cover of the book People's Liberation Army After Next: China's PLA, Air Force Aircraft, Ballistic and Cruise Missiles, EMP, DF-11, DF-15, Silkworm, Fighter Aircraft, Taiwan, Advanced Technology, Military Space by Progressive Management
Cover of the book Engineering the Space Age: A Rocket Scientist Remembers - Aeronautical Engineering, Missiles, ICBMs, Manned Spacecraft, Mercury, Gemini, Space Shuttle, McDonnell Aircraft, Cyclogiro by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Security Sector Reform in Timor-Leste: Missed Opportunities and Hard Lessons in Empowering the Host-Nation by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy