Cover: Measuring the Effectiveness of Border Security Between Ports-of-Entry

Measuring the Effectiveness of Border Security Between Ports-of-Entry

Published Jun 23, 2010

by Henry H. Willis, Joel B. Predd, Paul K. Davis, Wayne Brown

Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.6 MB Best for desktop computers.

Use Adobe Acrobat Reader version 10 or higher for the best experience.

ePub file 2.5 MB Best for mobile devices.

On desktop computers and some mobile devices, you may need to download an eBook reader to view ePub files. Calibre is an example of a free and open source e-book library management application.

mobi file 0.7 MB Best for Kindle 1-3.

On desktop computers and some mobile devices, you may need to download an eBook reader to view mobi files. Amazon Kindle is the most popular reader for mobi files.

Summary Only

FormatFile SizeNotes
PDF file 0.2 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 Format Price
Add to Cart Paperback66 pages $20.00

Strategic planning is necessary if the U.S. Department of Homeland Security (DHS) is to carry out its border-security missions effectively and efficiently. As part of that, DHS leadership must define concrete and sensible objectives and measures of success. These can be used to assess results along the way, to guide allocation of resources, and to inform programming and budgeting for future capabilities and functions. This report offers research and recommendations on ways to measure the overall efforts of the national border-security enterprise between ports of entry. To be meaningful, the set of measures for effectiveness of border security should be sound, reliable, useful, and general. Three DHS missions appear to currently be of special interest to DHS leadership because they are especially problematic: illegal drug control, counterterrorism, and illegal migration. The report recommends measuring performance of three fundamental functions that border-security efforts contribute to achieving national policy objectives: interdiction, deterrence, and exploiting networked intelligence. If the steps described here are taken, DHS and its components will be in a better position to discuss past performance and to provide reasoned justifications for future allocation of resources. Further, they will be able to relate their efforts to those of other agencies in pursuit of national objectives.

This research was sponsored by the Department of Homeland Security and was conducted under the auspices of the RAND Homeland Security and Defense Center, a joint center of the RAND National Security Research Division and RAND Infrastructure, Safety, and Environment.

This report is part of the RAND technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.