How Has The Smart Port Security, The Safe Port Act, And The Small Vessel Security Strategy Impacted Port Security? Essay Samples
Intellectual Property and National Security
Please address the following as they pertain to Intellectual Property: What is Intellectual Property (IP) and how does counterfeit merchandise impact the U.S. economy?
What safety and health concerns are posed by counterfeit products? How does IP theft pose an existential threat to national security?
The Intellectual Property (IP) is a legal word which denotes the conception or creation of one’s thoughts. It has two categories, first is the copy right category which includes artistic and literary works like painting, sculptures, novels and poems, designs, music, films, radio and television programs. The second category is the industrial property which covers the rights with regard to trademarks, discoveries, inventions and others. All the owners of this property have definite rights created for them. However, many businesses produce counterfeit products which had great impacts or effects to the U.S. economy and to the society as well. One of the impacts is that the profits came from the taxes are inevitable gone, corruption, bribery, foreign investment and trade lose, for legitimate businesses such as profits loss and danger in firm’s reputation.
Concerning the safety and health, the counterfeit products containing chemicals and harmful ingredients could result to injury and death. Examples of this are the food and medicines, once consumed, individuals might experience allergic reactions, infections, burns, or poisonings. Other counterfeit products are substandard electronics, commodities, and supplies that lead to fire, explosions, accidents, and even cause death. Moreover, there are reports of cyber-crimes, crooks or hackers who infiltrate and stole information, secret or sensitive issues on individual, companies, discoveries and specifically information on security and defense in government. If they steal that critical information they could easily cyber-attacks against critical infrastructure, destroy computer networks and threatened the security and safety of the people. With the knowledge of the existing threat to the national security, government need to continuously monitor the system, its policy and implementation efforts.
Explain the purpose of and reasoning behind Executive Order 13133. Specifically, what were the goals of the working group that was established by the Executive Order?
Because of the fact that one live in the world of modern technology, it is very evident that the use of internet is one of the fastest and easy way to educate, communicate and to be involve in business. However, there is also a possibility of using the internet in illegal activities. Among the activities are selling of explosives, guns, regulated substances, and prescription drugs, pornography, cybersex, fake commodities, fraud, distribution of computer software, and others. With this, the Executive Order was created for the purpose of addressing any illegal ways of using internet. Since it is difficult to monitor and guarantee the protection of the individual to use this technology, the government established a working group to handle the study of the legal issues and policies as well.
The working group was generated to oversee the laws and policies with regard to the internet use. The said group will formulate endorsements on possible tools for different approaches such as communication, storage devices and targets in order to educate and facilitate the internet users of the effect. Also, the collaboration of private sectors in implementing the laws for both domestic and international businesses to minimize and prevent its risks and even to protect the intellectual property rights will ensure constructive benefits and not to harm anyone.
Explain the concept of "Smart Borders".
The “Smart Borders” is a declaration of a deal between two nations, the United States and Canada in 2001. The purposes of this declaration were enhance or improve the sharing of information, collaboration of the two nations with regard to enforcement of the laws and continue border security. Using advanced technology, Europe had proposed this to facilitate and implement procedures in checking the borders for travelling foreigners.
The smart borders include two regulations. First regulation is the Registered Traveller Programme (RTP) to which it uses simplified check on borders allowing regular travelers from third world nations to come into the EU. They were subject to inspection and pre-screening. The second is the Entry/Exit System (EES) which is used to keep records of the entry and exit of these people. Using the modern technology, EU authorities and institutions implement new systems that could detect those over stayed people and prevent irregular border crossings. The system will issue an alert to national securities when there are irregularities to the EES.
The focus of the National Retail Federation (NRF) was the security regulation of the supply chain on ports. The Securing Maritime Activities through Risk-Based Targeting (SMART) for Port Security Act focuses on securing the supply chain using the risk-based method, finding the cost savings with the collaboration with international, local and state, enhancing security measures overseas before the threats reach the United States shore, encouraging the department of homeland security to cooperate in maritime operations and security. The Security and Accountability for Every (SAFE) Port Act also covers the port security and to which online gambling measure. This act involves programs to improve security of the ports such as creation of the identification cards for transportation workers, security grant program, foreign port assessments, additional requirement for maritime facilities and custom trade partnership against terrorism and others.
The Small Vessel Security Strategy address the danger of the small vessels which in many cases used by the smuggle terrorists, waterbone improvised explosive device, weapon of mass destruction in the U.S. The purpose of this strategy is to develop a partnership with the small vessel community for maritime domain awareness, and influence technology to detect, inter and indirect threat. There were also improvement in maritime security and safety, improve cooperation on international domain and to prevent possible exploitation on small vessels.
Compare and discuss the similarities and differences of the external borders of New Europe to that of the U.S. Mexico border.
The external borders New Europe and U.S. Mexico have similarities and differences. One of the similarities is their objective of border security for their protection, technology and defence structure. The second similarity is the existence of fence structure, limited access and tightened and control security measures. The third one is the use of traditional entry and exit system, documentary proof of citizenship. The threat of migratory pressure, organized crime and terrorism exist globally.
In terms of differences, one of those is the constitutional values where underlies the legal systems and political structures. The United States has a federal political system with local and state sovereignty while Mexico had a greatly centralized and the local and state dependent to federal government in terms of decision making and funding. The differences in economic strength and political power where the collaboration of cross borders remains a selective implementation. Another difference is the geography where the border lines of the U.S. are longer, a very advance on technology and management of borders. They have endless land borders and short-distance maritime waters combined with strong migratory pressure represent a major challenge to any border – even where equipped with hi-tech surveillance devices. The third difference is the method of controlling migration. The Europe implements the traditional way like identification cards and work permits checking. However, the U.S. implements the electronic verification for internal enforcement of immigration laws.
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA