Secret Service Protection for Presidents Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

Clearly the Secret Service is expanding it's investigative arm; in 2010 the Service established it's second overseas Electronic Crimes Task Force (ECTF), this one in London (in 2009 the Service established an ECTF in Rome, Italy). The point of the ECTF is to provide an avenue through which European and American law enforcement agencies -- along with private sector and academia -- can work together to investigate, suppress and prevent computer-related criminal activity (USSS).

Again and again in the 72-page Fiscal Year 2010 Report readers are reminded of one of the main missions of the Secret Service -- to hunt down and arrest counterfeiters. In 2010 the Secret Service -- along with local authorities -- arrested four Colombian counterfeiters (in Bogota Colombia) that had been printing U.S. currency and distributing it in the United States. Columbia is one of the most prolific producers of counterfeit American money, the report explains, and since 2001 the Secret Service has seized around $263 million in counterfeit cash in Columbia, has arrested more than 700 suspects and "suppressed" over 110 counterfeit printing plants. Also in 2010, the Secret Service established the Peruvian Counterfeit Task Force (PCTF), responding to the "marked" increase in the production and passing of counterfeit U.S. currency (USSS).

Clearly, if an individual is involved in counterfeiting, or money laundering, or in mortgage fraud -- the Secret Service has a special Mortgage Fraud Section in its Criminal Investigative Division (CID) -- it won't be long before the Secret Service catches up to that person. The Secret Service has Financial Crimes Task Forces (FCTFs) that are currently 900-members strong and are operating in 38 regions, including San Juan, Puerto Rico. Also in its 2010 report the Service lists (in bullet form) the many cyber-criminal organizations it has dismantled. Moreover, the Service is heavily involved with investigating crimes related to ATM machines, the international trafficking of stolen credit cards and identities, and other electronic crimes.

The Electronic Crimes Special Agent Program (ECSAP) unit expects to have hired and trained 1,264 Level I special agents, 174 Level II special agents and 186 Level III special agents. Presently there are 30 ECSAP offices in the United States. The ECSAP was mandated by the legislation known as USA Patriot Act of 2001. The Secret Service was empowered at that time to investigate and attempt to prevent attacks on computers in critical financial infrastructures, albeit the criminals have not been shut down, as is evident from frequent news reports that vital computer systems in the government have been breached.

Secret Service Economics

The Secret Service budget for 2009 was over a billion dollars ($1,640,444); in 2010 the budget grew to $1,702,644; the president's 2011 budget proposal was $1,811,617 (Dept. Of Homeland Security). Meantime the Service is actively recruiting talent -- through advertising and by hosting what is called national diversity conferences specifically designed to recruit women, Native Americans, African-Americans, disabled people and Latinos -- and is offering a starting salary range of $43,964 to $74,891 (USSS Employment Opportunities). To be hired a person must of course be a U.S. citizen (between 21 and 37 years of age), be in excellent health and have visual acuity no worse than 20/60 correctable to 20/20 in both eyes.

To qualify for GL-7 (the top grade of agent) an applicant must have a bachelor's degree and be in the top third of one's graduating class -- or have a full year of graduate level education. Those fluent in a foreign language can receive a 25% boost in salary (USSS Employment).

FBI / CIA / Secret Service -- Are These Conflicting or Overlapping Agencies?

Given that the FBI has offices in virtually every corner of the world (9 in Africa, 13 in Europe and 13 in Asia, for example) and that the FBI investigates some of the same matters as the Secret Service handles (cyber crime and counter-intelligence, for example), is there a chance the two agencies (or the CIA) would be operating at cross-purposes? That question comes to mind based on an article in The Atlantic (Ambinder, 2011), in which journalist Marc Ambinder (after 18 months of peppering the Service with the same request and being turned down) was given access to the workings of the Secret Service during the 65 United Nations General Assembly in New York in 2011. While shadowing "Jack" -- a Secret Service agent assigned to protect controversial Iranian President Mahmoud Ahmadinejad -- Ambinder heard from sources that these "sometimes contradictory priorities within the intelligence community can create spy vs. spy" scenarios (Ambinder, 6).

That is, when Ahmadinejad is in the U.S., the FBI's National Security Division sends teams of undercover agents to "keep tabs on everyone with whom he travels or meets." Hence, while the Secret Service's security detail and counter-surveillance teams find themselves looking out for "suspicious figures" that might threatened Ahmadinejad's safety they have to discern which of those ubiquitous figures also conducting surveillance in behalf of the United States are "friendly" agents. These kind of conflicts -- and potentially embarrassing or even injurious episodes -- help explain the "wariness" with which Secret Service agents view their assignments, Ambinder explains on page 6.


The vital importance of the protection and prevention services that the Secret Service provides to presidents and others mentioned in this paper cannot be minimized, given the danger of terrorism and other crimes that are part of the world's dynamics in the 21st millennium. The public may not realize how dramatically the Secret Service has expanded its roles and services, but from the literature available for this research paper, taxpayers are getting their money's worth and our president and his family are well-protected.

Works Cited

Ambinder, Marc. (2011). Inside the Secret Service. The Atlantic. Retrieved August 11, 2011,


Department of Homeland Security. (2011). Total Budget Authority by Organization. Retrieved August 10, 2011, from

Kessler, Ronald. (2010). In the President's Secret Service: Behind the Scenes with Agents in the Line of Fire and the Presidents They Protect. New York: Random House Digital,…[continue]

Some Sources Used in Document:


Cite This Research Paper:

"Secret Service Protection For Presidents" (2011, August 11) Retrieved October 26, 2016, from

"Secret Service Protection For Presidents" 11 August 2011. Web.26 October. 2016. <>

"Secret Service Protection For Presidents", 11 August 2011, Accessed.26 October. 2016,

Other Documents Pertaining To This Topic

  • Covert Action the President of the United

    Covert Action The President of the United States is responsible for the protection of the American people and in order to accomplish this objective the President, in his official capacity, is both the leading diplomat as well as the Commander in Chief of the armed forces. With this power he has the obligation to create a foreign policy that protects the interests of the nation and defends the people of the

  • Mediation Services and Church

    10) Any costs or fees associated with the ministry CMC is founded as a faith ministry and as a result will charge absolutely no fee for its mediation programs. Nor will we accept any private funds for the work we put in. On the contrary, we intend to request for travel as well as accommodation funds to be paid for by those families who wish to seek our help, once the

  • FBI and Witness Protection the

    Even thenm once in a while the heads of the more powerful families would meet to work out differences (Meltzer, 1990, pp. 40-41). Still, striking at the mob could not be effected easily by the use of normal investigative methods alone. Indeed, the failure of the FBI to use even those methods in a concerted manner is noted by Kessler (2002), who reports that Hoover usually claimed that the FBI

  • Protective Function

    Protective Function Privilege -- Definition / Description A definition of "protective function privilege" is offered by Michael Kennedy, a Law Clerk for District Judge Shira A. Scheindlin (in the U.S. District court for the Southern District of New York). Published in the Northwestern University Law Review, Kennedy's scholarly piece explains that a deliberative process privilege is a "…shield with which the executive branch deflects public scrutiny into its internal processes" (Kennedy,

  • Cbp Government Agencies Are Formed and Used

    CBP Government agencies are formed and used to both oversee and administer specific functions within a government. U.S. Customs and Border protection is a recently reorganized agency that is part of the Department of Homeland Security umbrella. U.S. Customs and Border Protection is charged with the regulation and facilitation of international trade, the collection of import duties, and the enforcement of U.S. regulations that include, but are not limited to, trade,

  • Protecting America s Internet Networks Better Plan Is Needed

    Law Enforcement -- Computer Security Three agencies that are part of the U.S. Federal Government's effort to thwart computer crimes are the Department of Homeland Security, the FBI, and the Secret Service. Computer crime (also known as cyber crime) is a growing and dangerous menace, not just to the government -- and to all 50 state governments -- but to corporate networks, private computers and educational institution computer networks as

  • Employee Privacy Torts

    Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Read Full Research Paper
Copyright 2016 . All Rights Reserved