SlideShare a Scribd company logo
1 of 4
ARRESTED ON ENTRY: OPERATION STREAMLINE AND THE PROSECUTION OF
IMMIGRATION CRIMES
BY: DONALD KERWIN AND KRISTEN MCCABE


Analyzed By: Denise Mitchell
Overview
   The U.S. Mexico border has been the outlet
    for many strategies used to stop illegal
    immigration. Among these strategies is
    “Operation Streamline” which targets illegal
    border crossers for criminal prosecution prior
    to removal and deportation. The program
    instates a zero tolerance policy.
    http://www.migrationinformation.org/Feature/display.cfm?ID=780
Questions Raised
   What other strategies have been employed to lessen
    illegal immigration?
    The text lists, “border blockade strategies; construction
    of an actual fence and attempts to create a "virtual"
    fence consisting of towers, cameras, and remote
    sensors; use of the National Guard to support the Border
    Patrol; and prosecution of persons apprehended trying to
    cross the border illegally” as various strategies.
The above image serves as a metaphor for U.S. and Mexico border relations.

More Related Content

Viewers also liked

Viewers also liked (19)

Reviewing mexicanos
Reviewing mexicanosReviewing mexicanos
Reviewing mexicanos
 
Guía de estudio (1) 6°b
Guía de estudio (1) 6°bGuía de estudio (1) 6°b
Guía de estudio (1) 6°b
 
Attitudes
AttitudesAttitudes
Attitudes
 
Trials and Tribulations
Trials and TribulationsTrials and Tribulations
Trials and Tribulations
 
Caught between two migration realities, mexico passes
Caught between two migration realities, mexico passesCaught between two migration realities, mexico passes
Caught between two migration realities, mexico passes
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
 
Attitudes
AttitudesAttitudes
Attitudes
 
Mexicanos
MexicanosMexicanos
Mexicanos
 
What is history
What is historyWhat is history
What is history
 
Illegal immigration backlash worries, divides latinos
Illegal immigration backlash worries, divides latinosIllegal immigration backlash worries, divides latinos
Illegal immigration backlash worries, divides latinos
 
Bordering fires by cristina garcia
Bordering fires by cristina garciaBordering fires by cristina garcia
Bordering fires by cristina garcia
 
Guía de estudio (2) 6°b
Guía de estudio (2) 6°bGuía de estudio (2) 6°b
Guía de estudio (2) 6°b
 
Prueba (1)6°b
Prueba (1)6°bPrueba (1)6°b
Prueba (1)6°b
 
Guía república conservadora
Guía república conservadoraGuía república conservadora
Guía república conservadora
 
Guía de estudio (3) 6°b
Guía de estudio (3) 6°bGuía de estudio (3) 6°b
Guía de estudio (3) 6°b
 
Prueba (2) 6°b
Prueba (2) 6°bPrueba (2) 6°b
Prueba (2) 6°b
 
Prueba coeficiente dos liberales y conservadores
Prueba coeficiente dos liberales y conservadoresPrueba coeficiente dos liberales y conservadores
Prueba coeficiente dos liberales y conservadores
 
Prueba (3) 6°b
Prueba (3) 6°bPrueba (3) 6°b
Prueba (3) 6°b
 
Pbl mm
Pbl mmPbl mm
Pbl mm
 

Similar to Arrested on entry

Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...
Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...
Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...Daniel Vasquez
 
Project Agincort D&D Project 1
Project Agincort D&D Project  1Project Agincort D&D Project  1
Project Agincort D&D Project 1kporte82
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...John Cederstrom
 
Border security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionBorder security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionWanjang'i Gituku
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docxjackiewalcutt
 
Developing A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyDeveloping A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyThe Heritage Foundation
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
ROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYSharone Francis
 
Securing the United States-Mexico Border An On-Going Dilem.docx
Securing the United States-Mexico Border  An On-Going Dilem.docxSecuring the United States-Mexico Border  An On-Going Dilem.docx
Securing the United States-Mexico Border An On-Going Dilem.docxkenjordan97598
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking HighwaysFalascoj
 
Running Head BORDER SECURITY1BORDER SECURITY2.docx
Running Head BORDER SECURITY1BORDER SECURITY2.docxRunning Head BORDER SECURITY1BORDER SECURITY2.docx
Running Head BORDER SECURITY1BORDER SECURITY2.docxhealdkathaleen
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
Thesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human RightsThesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human RightsDan Sexton
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
Human Trafficking Cascade Training For Youth Leaders In Mexico
Human Trafficking Cascade Training For Youth Leaders In MexicoHuman Trafficking Cascade Training For Youth Leaders In Mexico
Human Trafficking Cascade Training For Youth Leaders In Mexicoteephuny
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 

Similar to Arrested on entry (20)

Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...
Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...
Evaluating the Efficacy of Border Enforcement as a Policy Response to the Inf...
 
Project Agincort D&D Project 1
Project Agincort D&D Project  1Project Agincort D&D Project  1
Project Agincort D&D Project 1
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
 
Border security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european unionBorder security of the southern parts of both the us and the european union
Border security of the southern parts of both the us and the european union
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
 
Developing A Strong Border and Immigration Policy
Developing A Strong Border and Immigration PolicyDeveloping A Strong Border and Immigration Policy
Developing A Strong Border and Immigration Policy
 
Chapter14
Chapter14Chapter14
Chapter14
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
ROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITY
 
Securing the United States-Mexico Border An On-Going Dilem.docx
Securing the United States-Mexico Border  An On-Going Dilem.docxSecuring the United States-Mexico Border  An On-Going Dilem.docx
Securing the United States-Mexico Border An On-Going Dilem.docx
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
Running Head BORDER SECURITY1BORDER SECURITY2.docx
Running Head BORDER SECURITY1BORDER SECURITY2.docxRunning Head BORDER SECURITY1BORDER SECURITY2.docx
Running Head BORDER SECURITY1BORDER SECURITY2.docx
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Thesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human RightsThesis Poster on Human Trafficking & Human Rights
Thesis Poster on Human Trafficking & Human Rights
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Human Trafficking Cascade Training For Youth Leaders In Mexico
Human Trafficking Cascade Training For Youth Leaders In MexicoHuman Trafficking Cascade Training For Youth Leaders In Mexico
Human Trafficking Cascade Training For Youth Leaders In Mexico
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 

Arrested on entry

  • 1. ARRESTED ON ENTRY: OPERATION STREAMLINE AND THE PROSECUTION OF IMMIGRATION CRIMES BY: DONALD KERWIN AND KRISTEN MCCABE Analyzed By: Denise Mitchell
  • 2. Overview  The U.S. Mexico border has been the outlet for many strategies used to stop illegal immigration. Among these strategies is “Operation Streamline” which targets illegal border crossers for criminal prosecution prior to removal and deportation. The program instates a zero tolerance policy. http://www.migrationinformation.org/Feature/display.cfm?ID=780
  • 3. Questions Raised  What other strategies have been employed to lessen illegal immigration? The text lists, “border blockade strategies; construction of an actual fence and attempts to create a "virtual" fence consisting of towers, cameras, and remote sensors; use of the National Guard to support the Border Patrol; and prosecution of persons apprehended trying to cross the border illegally” as various strategies.
  • 4. The above image serves as a metaphor for U.S. and Mexico border relations.