Combating Criminal Narcotics Activity along the Southern Border

1450 Words 6 Pages
Combating Criminal Narcotics Activity along the Southern Border
The purpose of this proposal is to address the nations substantially growing concerns of narcotics trafficking along the southern boards of the Unites States, however, for the simplicity of this research, the scope we will focus upon the 1,241 miles of sophisticated security boarding within the Texas region (Beaver, 2006). Eradicating the human and narcotic aspects trafficking along the Texas boarder is the thesis in which this research will be based upon. The goal of this research is to uncover potential solutions to the already existing issue plaguing the southern boards of Texas; trafficking of human beings and the movement of metric tons of narcotic shipments. Currently,
…show more content…
Within the research, evaluating current laws include the anti-Drug Abuse Act of 1988 and the current controversial Patriot act (Schmalleger, 2009, pp. 586-87). Evaluating such laws will provide us with a means of filling missing gaps that were non conceivable at the time of enactment. Known and unknown check point within the Texas stretch must also be evaluated for its usefulness and/or ineffectiveness. This will allow us to facilities additional measures and controls in furthered reducing trafficking ventures. Current technologies, as outlined within the case study suggest that vital communication are hindering the completeness of cordial coordination’s, however, although A/V alerting systems are strategically placed, relaying such vital and pivotal pieces of information must be effectively enhance. It is apparent that the Texas Police Department would greatly benefit from an upgraded department –wide technological management system with enhanced patrol connectivity.
Information Technology System Capabilities
According to the Office of Justice Programs, the availability of information is crucial to the success of any responding unit, however, impeding the process of disseminating real-time information places offices and communities within harm’s way (Assistance, 2014, pp. 5-7). According to the case study,

Related Documents