Government How Secure Is The Research Proposal

Length: 4 pages Sources: 6 Subject: Terrorism Type: Research Proposal Paper: #32005696 Related Topics: Government Agencies, Great Lakes, Government, Modest Proposal
Excerpt from Research Proposal :

S. - Canadian border. And what makes it all even worse is that even U.S. Border Patrol Agents need to sleep every once in a while so less than a third of the 1,000 are on duty at any one moment. The real number is secret but a safe guess could be that fewer than 250 agents are on-duty defending us from the dozens of known terrorist cells operating in Canada. Of the 22 U.S. Border Patrol Sectors, there are only seven are considered absolutely critical to a secure America (Northern Border, n.d.).

The Detroit Sector for instance is one of these. It is accountable for 804 miles of total wilderness between Michigan and Canada. The Detroit area is home not just to wilderness but to the city of Detroit which has the largest Muslim populace anywhere outside of the Middle East. With a Muslim population exceeding 150,000, Detroit is amending the city noise ordinance so that mosques might use loudspeakers for the call to prayer. According to federal records the Detroit Sector doubled its pre 2001 staff. The number of Border Patrol Agents now positioned between Muslim communities with known terrorist cells operating on both sides of the border is 76. The Detroit area agents patrol 806 miles of Great Lakes coastline and use boats, SUVs, and even snowmobiles. Taking into consideration shift work, days off, vacations, and sick leave, at any given time there are probably fewer than 10 agents guarding America from the known terrorist cells in Canada who are just waiting for their chance to attack (Northern Border, n.d.).

The Department of Homeland Security (DHS) has expanded the use of security cameras on the northern border with Canada to reduce the chances terrorists, illegal aliens, or contraband will slip over the northern border into the United States undetected. The department has positioned 44 cameras in Detroit along Lake St. Clair, which divides the city from Canada, and 20 cameras in Buffalo along the Niagara River. There are currently about 20 cameras along the entire 4,000-mile border between Canada and the continental U.S. The $20 million program is the department's first major effort to see whether the northern border, which has large swaths of woods, hills and lakes, can benefit from the extensive camera network. The new cameras were positioned in trees and buildings to monitor the border. This new program...


All of the research points to the use of technology as the way to go in the future. The government has begun to move in this direction with the implementation of cameras along the border, but more research needs to be done in order to see what other technological advances could be used in order to help the cause. The security threat along this border is a very real one and is something that needs to be addressed sooner than later. Everyday that goes by allows for the opportunity for a breach of security to happen which would not be a good thing to happen at all. There needs to be more work and effort into making sure that the Northern Border is as secure as possible so that everyone is safe.


Ackleson, Jason. (2009). From "Thin" to "Thick" (and Back Again?): The Politics and Policies

of the Contemporary U.S. -- Canada Border. Review of Canadian Studies. 39(4), p. 336-

Harwood, Matthew. (2009). DHS to Deploy More Cameras at Northern Border. Retrieved March 14, 2010, from Security Management Web site:


Kutz, Gregory D. And Cooney, John W. (2007). Security Vulnerabilities at Unmanned and Unmonitored U.S. Border Locations. Retrieved March 14, 2010, from Web site:

Lipowicz, Alice. (2009). Napolitano requests update on northern border security. Retrieved March 14, 2010, from Federal Computer Week Web site:

Meyers, Deborah Waller. (2003). Does "Smarter" Lead to Safer? An Assessment of the U.S.

Border Accords with Canada and Mexico. International Migration. 41(4), p5.

Northern Border. (n.d.). Retrieved March 14, 2010, from U.S. Border Patrol Web site:

U.S. tightens security on northern border. (2006). Retrieved February 19, 2010, from Government Security Web site:

Sources Used in Documents:


Ackleson, Jason. (2009). From "Thin" to "Thick" (and Back Again?): The Politics and Policies

of the Contemporary U.S. -- Canada Border. Review of Canadian Studies. 39(4), p. 336-

Harwood, Matthew. (2009). DHS to Deploy More Cameras at Northern Border. Retrieved March 14, 2010, from Security Management Web site:
U.S. tightens security on northern border. (2006). Retrieved February 19, 2010, from Government Security Web site:

Cite this Document:

"Government How Secure Is The" (2010, March 15) Retrieved November 26, 2022, from

"Government How Secure Is The" 15 March 2010. Web.26 November. 2022. <>

"Government How Secure Is The", 15 March 2010, Accessed.26 November. 2022,

Related Documents
Government and Its Role and
Words: 1157 Length: 4 Pages Topic: Government Paper #: 45219640

In this case, individuals are entitled to produce goods and services to meet their human need instead of private profit (Wolff, 2012). Prevention for Power and Privileges under Social Contract: While social contract provides power and privileges to all members of the society, ordinary people are usually prevented from executing the power and privilege that they are entitled to through various ways. Some of these ways include the state's legitimacy claims

Government & Policy the Joyan
Words: 1138 Length: 4 Pages Topic: Government Paper #: 43766218

Also, a very liberal strategy like the one that Mexico took after the NAFTA agreements is dangerous to a newly independent state. Extreme liberalization worked well for Mexico because a large and confident Mexico felt like it could benefit greatly from increased trade and labor transfer with the United States, without being pushed around in the agreement, and Canada helped to maintain neutrality. The Joyan Islands, on the other

Government Why Did the Framers
Words: 5873 Length: 18 Pages Topic: Government Paper #: 73276878

Republicans construed Obama as suggesting government bailouts for new industries, or at the slightest a more lively federal government function in generating or supporting jobs -- concepts abominations to a lot of conservatives. The Obama campaign countered the idea as political spin that does not replicate the president's feeling or meaning, pointing to full circumstances of the quotation as confirmation (Koch, 2011). Discuss the process of how a Bill becomes a

Government Contracting Process the Federal
Words: 2271 Length: 8 Pages Topic: Government Paper #: 79293492

(Vancketta, 1999) The 'Changes' clause enables the Government "to make unilateral changes to the contract during performance, so long as those changes fall within the contract's scope." The Standard 'Changes' clause utilized in fixes price supply contracts allows the CO to make changes in writing to: 1) the drawings, designs, or specifications when the item is being specifically manufactured for the government; 2) the method of shipment or packing; or 3) the place

Government Outsourcing the Outsourcing of
Words: 10988 Length: 35 Pages Topic: Government Paper #: 19825907

A micro considers the interests and rights of the individual company as the primary concern. Both of these views are valid depending on the lens that one wishes to use. The problem arises when the government is forced to develop policies regarding procurement in this volatile debate. The government must decide whether to take a micro view, favoring the rights of companies, or a macro view that places the

Securing the Electronic Transfer Securing
Words: 976 Length: 3 Pages Topic: Military Paper #: 38772049

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations