An Assessment of the Proposal to Merge Customs and Border Protection with Immigration and Customs Enforcement

Total Page:16

File Type:pdf, Size:1020Kb

An Assessment of the Proposal to Merge Customs and Border Protection with Immigration and Customs Enforcement DEPARTMENT OF HOMELAND SECURITY Office of Inspector General An Assessment of the Proposal to Merge Customs and Border Protection with Immigration and Customs Enforcement Office of Inspections and Special Reviews OIG-06-04 November 2005 Office of Inspector General U.S. Department of Homeland Security Washington, DC 20528 Preface The Department of Homeland Security (DHS) Office of Inspector General (OIG) was established by the Homeland Security Act of 2002 (Public Law 107-296) by amendment to the Inspector General Act of 1978. This is one of a series of audit, inspection, and special reports prepared as part of our DHS oversight responsibilities to promote economy, effectiveness, and efficiency within the department. Our review examined the operations and functions of Customs and Border Protection and Immigration and Customs Enforcement and the role of the Border and Transportation Security Directorate with regard to those entities. This review was conducted in response to a request from the Chairman, Senate Committee on Homeland Security and Governmental Affairs, to study the merits of merging the bureaus of Customs and Border Protection and Immigration and Customs Enforcement. It is based on interviews with employees and officials of relevant agencies and institutions, direct observations, and a review of applicable documents. We have made recommedations for improvement that we hope will result in more effective, efficient, and economical operations. To all who contributed to this report, we express our appreciation. Richard L. Skinner Inspector General Contents Executive Summary ..................................................................................................................... 1 Background................................................................................................................................... 10 Overview................................................................................................................................ 10 Organization of the Report..................................................................................................... 12 Establishment of Customs and Border Protection / Immigration and Customs Enforcement Structures ........................................................................................................... 14 Early Considerations for Structuring Border Security Operations ........................................ 14 Homeland Security Act of 2002 ............................................................................................ 16 Structural Recommendations Made by Transition Teams..................................................... 17 Opposition to a Single Border Security Agency.................................................................... 20 Announcement of Customs and Border Protection / Immigration and Customs Enforcement Structures............................................................... 20 Recent Discussions Concerning Customs and Border Protection / Immigration and Customs Enforcement Structures............................................................... 21 Customs and Immigration Enforcement Continuums.................................................. 22 The Continuums with Immigration and Naturalization Service / United States Customs Service .............................................................................................. 22 The Continuums with Customs and Border Protection / Immigration and Customs Enforcement ............................................................................... 23 Coordination of Apprehension and Detention and Removal Operations .............. 25 Operational Environment....................................................................................................... 26 Problems with National Coordination ................................................................................... 27 Problems with Field Coordination......................................................................................... 30 Consequences......................................................................................................................... 37 Coordination of Investigative Operations.......................................................................... 38 Operational Environment....................................................................................................... 38 Problems with Field Coordination......................................................................................... 40 Consequences......................................................................................................................... 46 An Assessment of the Proposal to Merge CBP and ICE Contents Coordination of Intelligence Activities................................................................................ 54 Operational Environment....................................................................................................... 55 Problems with National Coordination ................................................................................... 56 Problems with Field Coordination......................................................................................... 57 Overreliance on the Treasury Enforcement Communication System to Share Intelligence . 59 Lack of Collaboration to Produce Intelligence Reports......................................................... 60 Consequences......................................................................................................................... 61 Role of the Directorate of Border and Transportation Security ............................... 62 Inadequate Resources to Perform Mission ............................................................................ 62 Roles and Responsibilities Not Defined ................................................................................ 63 Consequences......................................................................................................................... 64 Other Organizational Structure Concerns........................................................................ 66 Federal Protective Service ..................................................................................................... 66 Federal Air Marshal Service .................................................................................................. 67 Forensic Documents Laboratory............................................................................................ 68 Organizational Options ............................................................................................................ 70 Option 1: Customs and Border Protection / Immigration and Customs Enforcement Report to the Deputy Secretary...................................................................... 72 Option 2: Create More Effective Coordination Mechanisms ............................................... 73 Option 3: Merge Customs and Border Protection / Immigration and Customs Enforcement ................................................................................ 74 Other Suggested Organizational Changes ............................................................................. 76 Recommendations for DHS Second Stage Review Implementation......................... 76 Management Comments and OIG Analysis...................................................................... 82 Overview of Management Comments ................................................................................... 82 Detailed Analysis of Management Comments ...................................................................... 85 An Assessment of the Proposal to Merge CBP and ICE Contents Appendices Appendix A Organizational Overview of the Immigration and Naturalization Service .. 100 Appendix B Organizational Overview of the United States Customs Service ................ 105 Appendix C Organizational Overview of the Border and Transportation Security Directorate.................................................................................................... 109 Appendix D Organizational Overview of Customs and Border Protection ..................... 114 Appendix E Organizational Overview of Immigration and Customs Enforcement ........ 119 Appendix F Operational Scenarios Illustrating the Interconnectedness of Customs and Border Protection / Immigration and Customs Enforcement ...................... 124 Appendix G Purpose, Scope, and Methodology............................................................... 134 Appendix H Management Response to the Draft Report................................................. 136 Appendix I Major Contributors to This Report .............................................................. 160 Appendix J Report Distribution ...................................................................................... 162 Abbreviations ABCI Arizona Border Control Initiative ACAP Alien Criminal Apprehension Program ACS Automated Case Support System ADIS Arrival Departure Information System AMO Air and Marine Operations APHIS Animal and Plant Health Inspection Service ASU Anti Smuggling Unit BORFIC Border Patrol Field Intelligence Center BTS Border and Transportation Security Directorate CAP Criminal Alien Program CBP Customs and Border Protection CCICC Command and Control Intelligence Coordination Center CD Controlled Delivery CFR Code of Federal Regulations CIA Central Intelligence Agency CIS Citizenship and Immigration Services CMC
Recommended publications
  • Rm7bll Yearly Smuggling
    Headline Ahmad Zahid M'sia loses RM7bil yearly due to smuggling activities at borders MediaTitle New Sabah Times English (KK) Date 18 Sep 2015 Language English Circulation 17,182 Readership 51,546 Section Home Color Black/white Page No 5 ArticleSize 245 cm² AdValue RM 524 PR Value RM 1,572 Ahmad lahid: M'sla loses RM7bll yearly due to smuggling activities at borders SINTOK: Deputy Prime "Min­ Home Minister, stressed that no a year due to the porous national ister Datuk Seri Ahmad Zahid new allocation or posts would be borders, including losses oh sub­ Hamidi yesterday announced created via the upgrading, but he sidised goods. that the Smuggling Prevention promised to reward the agency's He said goods worth RM38 Unit (UPP) would be upgraded officers and staff who exhibited million were seized from January into a Border Security Agency. excellent performance. to August this year by the UPP, He said the new entity ift­ "Believe me that when up by more than 100 per cent volving three core agencies, seizures of goods, smuggling of from RM18 million in 2014 and namely, the Royal Malaysian Po­ persons and human trafficking RM17 million in 2013. lice, Immigration Department can be reduced, there will be In this regard, Ahmad Zahid and Royal Malaysian Customs some reward which I will give as said collaboration among the en­ Department would also involve forcement agencies must be incentive. This is my promise. several other enforcement agen­ strengthened, including translat­ cies, as value added. "Change the approach, don't ing the National Blue Ocean ask first, but give first...no need "The policy paper on the pro­ to wait for a reward to motivate Strategy to avoid narrow think­ posal has been prepared and will ing.
    [Show full text]
  • Business PAGE 9 Vol 6, Issue 1
    U.S. Customsrontline and Border Protection H Vol 6, Issue 1 CBP gets America Back to Business PAGE 9 Vol 6, Issue 1 CONTENTS H COVER STORY 9 Business Unusual When Mother Nature strikes or other major events disrupt normal border operations, CBP’s business recovery program keeps traffic flowing and protects the U.S. economy. 9 H FEATURES 18 Riding Shotgun in the Arizona Skies Specially trained Border Patrol agents and CBP officers accompany Air and Marine pilots as supplemental air crew members. 22 Transformation at Land Border Ports of Entry 18 CBP’s land border ports of entry now benefit from improved technologies and resource optimization. 22 H DEPARTMENTS H ON THE COVER 2 CBP In Photos 36 CBP History The Ambassador Bridge, connecting Detroit with Windsor, Canada, is North 4 Around the Agency 40 Border Busts America’s busiest commercial international border crossing. During fiscal year 2012, 28 In Focus 42 Resources an average of $136 million of cargo CBP In The Spotlight crossed the bridge into the U.S. each 34 day or $5.7 million of cargo each hour. Cover photo by Lisa Przybyla CELEBRATING THE CAREER OF DAVID V. AGUILAR 2 H CBP IN PHOTOS H ACTING COMMISSIONER RETIRES AFTER 34 YEARS OF DISTINGUISHED SERVICE Frontline VOL 6, ISSUE 1 SECRETARY OF HOMELAND SECURITY Janet Napolitano ACTING COMMISSIONER, U.S. CUSTOMS AND BORDER PROTECTION THOMAS S. WINKOWSKI ASSISTANT COMMISSIONER, OFFICE OF PUBLIC AFFAIRS Melanie Roe EDITOR Laurel Smith MANAGING EDITOR Jason McCammack CONTRIBUTING EDITORS Susan Holliday Marcy Mason PRODUCTION MANAGER Tracie Parker PHOTOGRAPHERS James R.
    [Show full text]
  • Border Security
    BORDER SECURITY REPORT VOLUME 14 FOR THE World’s border prOTECTION, MANAGEMENT AND SECURITY INDUSTRY MAY / JUNE 2019 POLICY-MAKERS AND PRACTITIONERS COVER STORY BREXIT WILL PUSH UK BORDERS TO THE BRINK… UNLESS WE GET SMARTER WITH data SPECIAL REPORT AGENCY NEWS SHORT REPORT INDUSTRY NEWS Border Threat Detection A global review of the South Asia: Case of Least Latest news, views and – The Path to Artificial latest news and challenges Connected Borders p.18 innovations from the Intelligence p.14 from border agencies and industry. p.30 agencies at the border. p.20 2 COMMENT contacts Every Cloud Has a Silver Lining Editorial: They say every cloud has a silver lining, when it comes to the movement of Tony Kingham but you would be hard pushed to goods, big questions remain. Such as; E: [email protected] convince anyone in the UK that the how does technology really help with Assistant Editor: Brexit cloud has one right now. Political the import and export of agricultural Neil Walker deadlock in parliament means we are goods and foodstuffs, which of course E: [email protected] no closer to a deal and the recent poor need inspections if regulations don’t showing by the established parties match. And no matter how much Design, Marketing & Production: in the European elections is likely to the UK spends on technology and Neil Walker result in a harder line from any future whatever systems it puts in place, to E: [email protected] Conservative Prime Minister, making a work effectively that technology and Subscriptions: hard Brexit much more likely.
    [Show full text]
  • Border Wars the Arms Dealers Profiting from Europe’S Refugee Tragedy
    BORDER WARS THE ARMS DEALERS PROFITING FROM EUROPE’S REFUGEE TRAGEDY Mark Akkerman Stop Wapenhandel www.stopwapenhandel.org Border wars | 1 AUTHOR: Mark Akkerman EDITORS: Nick Buxton and Wendela de Vries DESIGN: Evan Clayburg PRINTER: Jubels Published by Transnational Institute – www.TNI.org and Stop Wapenhandel – www.StopWapenhandel.org Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images should be based on the copyright terms of the original source. http://www.tni.org/copyright ACKNOWLEDGEMENTS Thanks to Corporate European Observatory for some of the information on arms company lobbying. Border wars: The arms players profiting from Europe’s refugee crisis | 2 CONTENTS Executive Summary 1 Introduction: the EU war on immigration 3 Fueling the refugee tragedy: EU arms exports 6 EU response to migration: militarising the borders 9 – ‘Fighting illegal immigration’ – EUNAVFOR MED – Armed forces at the borders – NATO assistance – Border fences and drones – From Frontex to a European Border and Coast Guard Agency – Externalizing EU borders – Deal with Turkey – Selling militarisation as a humanitarian effort Lobbying for business 17 – Lobby organisations – Frontex and industry – Security fairs as meeting points EU funding for border security and border control 25 – Funding for (candidate) member states – Funding third countries’ border security – EU Research & Technology funding – Frontex funding for research – Future prospects for security research Which companies profit from border security? 34 – Global border security market – Frontex contracts – Major profiting companies – Detention and deportation Conclusion 43 EXECUTIVE SUMMARY The refugee crisis facing Europe has caused consternation in the corridors of power, and heated debate on Europe’s streets.
    [Show full text]
  • Connected Policing Framework White Paper Transforming Policing Through Technology
    A Microsoft Government Connected Policing Framework White Paper Transforming Policing Through Technology Published for the APCO-APA 2008 International Policing and Summer Conference The Microsoft Connected Policing Framework The Microsoft® Connected Policing Framework is the result of work between Microsoft, specialist partners and many public safety, law enforcement and judicial organizations to build solutions, technologies and services that assist in integrated and collaborative policing to combat crime and assist with citizen safety. We reuse this collective “Know-How” to share and reuse international best practices in areas such as combating cyber crime with innovative intelligence and investigation solution architectures. IMPROVED OUTCOMES FOR CITIZEN SAFETY AND SECURITY INFORMATION CHANNELS ITERATIVE FIRE POLICE JUSTICE INTELLIGENCE INTERNAL SERVICES SECURITY CYCLE EMERGENCY RESPONSE ER CASE & RECORDS MANAGEMENT INTEGRATED JUSTICE PLAN PARTNER SOLUTIONS PARTNER INTELLIGENCE & INVESTIGATION TRANSPORT & BORDER CONTROL CRITICAL INFRASTRUCTURE PROTECTION E-POLICING (CSP, PORTAL & CRM) PROCESS APPLICATION PLATFORM BLUEPRINTS GUIDES ORGANIZATIONAL PRODUCTIVITY REFERENCES REUSABLE IP INFRASTRUCTURE CORE INFRASTRUCTURE e.g. MIF PROGRESS PRIVACY ACCESSIBILITY USABILITY SECURITY/ID STANDARDS INTEROP POLICY CITIZENSHIP INITIATIVES (CETS & DART) REVIEW Contents Introduction 4 1.0 Public Safety 5 1.1 Emergency and disaster response 5 1.2 Crime and DisorderReduction Strategies 9 1.3 E-policing 10 1.4 Microsoft Citizen Service Platform 13 2.0
    [Show full text]
  • The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone
    The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman Dissertation submitted in partial FulFillment oF the requirements For the degree oF Doctor of Philosophy in the Graduate School of Duke University 2016 ABSTRACT The Hole in the Fence: Policing, Peril, and Possibility in the US-Mexico Border Zone, 1994-Present by Sophie Smith Graduate Program in Literature Duke University Date:_______________________ Approved: ___________________________ Rey Chow, Supervisor ___________________________ Michael Hardt ___________________________ Wahneema Lubiano ___________________________ Robyn Wiegman An abstract oF a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor oF Philosophy in the Graduate School oF Duke University 2016 Copyright by Sophie Smith 2016 Abstract The Hole in the Fence examines the design and efFects oF the contemporary border security regime. Since 1994, the growth oF military-style policing in the lands between the US and Mexico has radically reshaped the path oF illicit transnational migration. Newly erected walls, surveillance technology, and the stationing oF an army oF Federal agents in the border territory do not serve to seal oFF the national boundary. Border security rather works by pushing undocumented migration traFFic away From urban areas and out into protracted journeys on foot through the southwest wilderness, heightening the risks associated with entering the US without papers. Those attempting the perilous wilderness crossing now routinely Find themselves without access to water, Food, or rescue; thousands of people without papers have since perished in the vast deserts and rugged brushlands oF the US southwest.
    [Show full text]
  • Approaching Border Security from a Complexity Theory and Systems Perspective
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2012-12 Border cracks: approaching border security from a complexity theory and systems perspective Schwan, Michael J. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/27901 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE by Michael J. Schwan December 2012 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: Harold A. Trinkunas Approved for public release; distribution is unlimited Reissued 21 Mar 2013 to correct advisor’s name on cover page. THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2012 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS BORDER CRACKS: APPROACHING BORDER SECURITY FROM A COMPLEXITY THEORY AND SYSTEMS PERSPECTIVE 6.
    [Show full text]
  • SC70 Doc. 69.2
    Original language: English SC70 Doc. 69.2 CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA ____________________ Seventieth meeting of the Standing Committee Rosa Khutor, Sochi (Russian Federation), 1-5 October 2018 Reports of regional representatives ASIA 1. This document has been submitted by Kuwait. 2. General information: Regional Representative: Chain, Indonesia, Kuwait Alternate Regional Representative: Japan, Nepal, Republic of Korea Number of Parties in the Region: 38 Parties providing information for this Report: Afghanistan, Bahrain, China, Indonesia, Iraq, Japan, Kuwait, Lao People's Democratic Republic, Malaysia, Philippines, Saudi Arabia, Singapore, Syrian Arab Republic, United Arab Emirates, and Yem en 3. Introduction: This report summarized the activities of Parties between 69th Standing Committee Meeting (November 2017, Rosa Khutor) and 70th Standing Committee Meeting (October 2018, Rosa Khutor, Sochi). 4. Activities within each party 4.1 Afghanistan: 1.Participation in CITES meeting None 2.Cooperation with the parties and other None 3.Implimentation of CITES, including conservation, legislation and law enforcement activities a.Wild Animal Protection and hunting regulation law Afghanistan developed Wild Animal Protection and hunting regulation law, this law is currently drafted, on September, 2018 Afghanistan conducted more from three coordination meeting with relevant organization, asspacilly Ministry of agriculture irrigation and water regarding specification of National Environmental SC70 Doc. 69.2 – p. 1 Protection Agency (NEPA) and Ministry of Agriculture irrigation and livestock (MAIL) role in the implementation of this law to finalize as soon as possible. After adoption of this law, Afghanistan will be able to regulate wild animal illegal hunting, trapping and preventing the extinction of endangered species b.
    [Show full text]
  • COVER STORY Stopping Foreign Terrorist Fighters – Can API and PNR Play a Part? Strategic Partner
    Official Magazine of MAY / JUNE 2018 www.worldsecurity-index.com FEATURE: FEATURE: FEATURE: An Integrated Approach The Predator’s View: The World’s Biggest Marketplace Used in Nuclear Security Imperative for Critical Selling Internet Paralysing can be Adapted for Infrastructure Resilience DDOS Attacks Taken Down Protecting Critical National PAGE 14 PAGE 19 Infrastructure PAGE 9 COVER STORY STOPPING FOREIGN TERRORIST FIGHTERS – CAN API AND PNR PLAY A PART? Strategic Partner: In Partnership with: 17th-19th July 2018 Including Cyber Security (CIIP) The Waterfront Hotel, Kuching, Sarawak, Malaysia www.cip-asia.com ONE-DAY SPECIALIZED TRAINING COURSE brought to you by: further details at Developing resilient infrastructure www.cip-asia.com for a secure future Expert Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia Register Today for Early Bird Rates – Dato Dr Chai Khin Chung, Director, State Security Early Bird Deadline 17th June 2018 Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Register online at www.cip-asia.com/onlinereg Ministry of Transport and Digital Infrastructure, Germany The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading – Oliver Carlos G. Odulio, VP, Head of Asset stakeholders from industry, operators, agencies and governments to collaborate on Protection & Risk Management, PLDT Inc, securing Asia. Philippines – Elli Pagourtzi, Project Manager, Security for On behalf of the Organising Committee and co-hosts, the National Cyber Security Agency, Security Studies (KEMEA), Hellenic Ministry of CyberSecurity Malaysia and the State of Sarawak, you are invited to participate in the 3rd Critical Infrastructure Protection & Resilience Asia, taking place at The Waterfront Hotel, Interior, Greece Kuching, Sarawak, Malaysia on 17th-19th July 2018.
    [Show full text]
  • The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019
    The Yale Review of International Studies Table of Contents • Acheson Prize Issue 2019 19 Letter from Second Place: the Editor "Historical Elisabeth Mirrorism" Siegel Trinh Truong First Place: "Importing Arms, Exporting the Revolution" 38 Rosa Shapiro- Third Place: Thompson "A Transcript from Nature" 54 Oriana Tang Crossword Contest 56 Honorable Mention: "Developing 72 Socially Honorable Conscious Mention: Curricula "Reverse for Somali Cap-and- Schools" Trade for Refugees" Noora Reffat Jordan Farenhem 1 EDITOR-IN-CHIEF Putt Punyagupta Andrew Song Elisabeth Siegel Staff Zhen Tu Will Waddingham MANAGING EDITORS Jake Mezey GRAPHIC DESIGN Qusay Omran Elisabeth Siegel Lauren Song ASST. MANAGING EDITOR Mary Orsak Max Krupnick Numi Katz Leila Iskandarani OUTREACH COORDINATORS STAFF Juanita Garcia Coco Chai Tyler Jager Chase Finney Leila Iskandarani SENIOR EDITORS Tasnim Islam Max Krupnick Henry Suckow-Ziemer Alayna Lee Muriel Wang Joon Lee Jack McCordick EDITORS Mary Orsak Katrina Starbird Jorge Familiar-Avalos Juanita Garcia Ariana Habibi CONTRIBUTORS Tyler Jager Jordan Farenhem Numi Katz Noora Reffat Brandon Lu Rosa Shapiro-Thompson Deena Mousa Oriana Tang Minahil Nawaz Trinh Truong Sam Pekats ACHESON PRIZE JUDGING PANEL Ana de la O Torres, Associate Professor of Political Science Isaiah Wilson (Colonal, U.S. Army, ret.), Senior Lecturer at the Jackson Institute for Global Affairs Clare Lockhart, Director and co-Founder of the Institute for State Effectiveness & Senior Fellow at the Jackson Institute for Global Affairs Julia Adams, Professor of Sociology and International and Area Studies & Head of Grace Hopper College 2 Dear Reader, You might notice that we look a little different. Welcome to the brand new YRIS redesign, arriving just in time for my favorite issue of the year: the Acheson Prize Issue.
    [Show full text]
  • The Customs Excise and Preventive Service and Cross Border Crimes Management: a Case Study of the Eastern Frontier of Ghana
    THE CUSTOMS EXCISE AND PREVENTIVE SERVICE AND CROSS BORDER CRIMES MANAGEMENT: A CASE STUDY OF THE EASTERN FRONTIER OF GHANA by Francis Azure Junior BA (Hons.), M.A Int. Affairs A Thesis submitted to the Institute of Distance Learning, Kwame Nkrumah University of Science and Technology In partial fulfillment of the requirements for the degree of COMMONWEALTH EXECUTIVE MASTER OF BUSINESS ADMINISTRATION Institute of Distance Learning 30TH MAY, 2009 CERTIFICATION I hereby declare that this submission is my own work towards the CEMBA and that, to the best of my knowledge, it contains no material previously published by another person nor material which has been accepted for the award of any other degree of the university, excepted where due acknowledgement has been made in the text. Francis Azure Jnr. …………………….. …………………… Student # 20065838 Signature Date Certified By Ben Honyenuga (Mr.) …………………… …………………… Supervisor Signature Date Certified By ………………………… …………………… …………………… Head of Dept. Name Signature Date ABSTRACT Ghana can boast of a vast sub-regional market of about 220 million people sharing cultural linkages across borders and having similar tastes. In order to benefit from such a huge market, the intensification of trade between Ghana and her neighbours is essential. At the community level, this commitment is seen in the persistent efforts by member states to ensure free movement of persons, goods and services across national borders. In Ghana, the institution responsible for the implementation of free movement and trade facilitation is the Customs Excise and Preventive Service (CEPS). Over the years, cross border criminal activities have become a hindrance to free movement and trade. This is especially so along the Eastern Frontier of Ghana, which stretches from the border with Togo at Aflao to the fringes of northern Volta at Tinjase.
    [Show full text]
  • Transgovernmental Networks As a Tool to Combat Terrorism
    TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE A Dissertation submitted to the Graduate School-Newark Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Global Affairs written under the direction of Dr. Norman Samuels Ph.D: Professor and Provost Emeritus and approved by Newark, New Jersey January 2010 ABSTRACT OF THE DISSERTATION TRANSGOVERNMENTAL NETWORKS AS A TOOL TO COMBAT TERRORISM: HOW ICE ATTACHÉS OPERATE OVESEAS TO COMBAT TERRORIST TRAVEL By KEITH COZINE Dissertation Director: Dr. Norman Samuels Ph.D.: Professor and Provost Emeritus Globalization has led to a shift in the perceived threat to security from states to trans- border issues such as financial collapse, global warming, pandemics and threats from a variety of non-state actors. As a result of the terrorist attacks on New York, Bali, Madrid, London and Mumbai; international terrorism has become one of the most highly visible of these new threats. One mechanism of global governance employed to combat this threat is the use of transgovernmental networks comprised of government officials from various nations, forming both formal and informal global networks that reach out to their foreign counterparts. These networks are the foundation of a strategy of confronting “networks of terror with networks against terror.” This research seeks to understand how these networks operate to achieve their mission. The literature relating to transgovernmental networks and transnational advocacy networks (TANs) suggests that these two network types share numerous characteristics. These similarities led to the development of the hypothesis that transgovernmental networks operate to accomplish their missions in much the same way as TANs operate.
    [Show full text]