SlideShare a Scribd company logo
Vol. 23 – August 17, 2010




                             Developing a Strong
                         Border and Immigration Policy
THE ISSUE:                                                                      to soft audits and has instituted changes in the 287(g)
                                                                                program, a state and local immigration enforcement pro-
For far too long, the United States has failed to enforce
                                                                                gram, that will discourage participation. In FY 2009, the
its immigration laws. Its visa system does not adequately
                                                                                number of worksite arrests was down “by more than 50
serve the needs of the economy, legal immigrants, or U.S.
                                                                                percent” from the previous fiscal year.
citizens. Cartel violence and continued illegal immigration
along the U.S. southern border have many Americans con-                      •	 U.S. Visa Policies Are Broken. U.S. visa and naturaliza-
cerned. Americans are demanding a border and immigra-                           tion programs remain inefficient and lacking in significant
tion policy that will keep the U.S. free, safe, and prosper-                    infrastructure investments that could help legal immigra-
ous—not an amnesty that simply exacerbates the problem.                         tion to run more smoothly. The U.S. still has not explored
                                                                                a market-based temporary worker program that would
THE FACTS:                                                                      allow immigrants to come to work in the United States
                                                                                legally.
•	 Border Violence on the Rise, Illegal Immigration
   Continues. The U.S. has made progress on securing the                     •	 Amnesty Will Make the Problem Worse. The current
   border, but the border is still not secure. Drug cartels                     Administration has placed amnesty for the 10.8 million
   have seized control of major parts of Mexico’s northern                      illegal immigrants in the U.S. at the top of its policy
   border—with more than 6,000 murders in 2008 from                             agenda. Amnesty would simply encourage more illegal
   drug cartel violence. The threat of spillover violence in                    immigration, making the current problems even worse,
   the U.S., as well as continued illegal immigration,                          while remaining fundamentally unfair to those who came
   remains a significant problem.                                               to the U.S. legally.

•	 State and Locals Overwhelmed. Once in the U.S.,
   illegal aliens consume a significant share of government                  THE SOLUTIONS:
   services, such as health care, law enforcement, and
                                                                             •	 Provide Comprehensive Security. The United States
   education. Particularly hard-hit are state and local govern-
                                                                                must have a complete security system—from the point
   ments, which often bear the cost of footing this bill—a
                                                                                of origin, in transit, at the border, and within the United
   multibillion-dollar unfunded mandate. It is estimated that
                                                                                States—that strengthens all of the activities, assets, and
   in 2007 illegal aliens in California cost the state between
            ,
                                                                                programs necessary to secure America’s borders. Immi-
   $9 billion and $38 billion in public services.
                                                                                gration legislation should create an integrated security
•	 Interior Enforcement Rollbacks. Instead of building on                       system that addresses border infrastructure and links
   past progress, the current Administration has reversed                       border management to all activities involved in cross-bor-
   a number of effective interior enforcement efforts. For                      der travel and transport, from issuing visas and passports
   instance, it has switched from random workforce checks                       to internal investigations and the detention and removal



                                                        heritage.org/solutions
                    Protect America
                    The 21st century will be a dangerous place if America fails to protect itself and its allies. This product is part of the
                    Protect America Initiative, one of 10 transformational initiatives in our Leadership for America campaign.
of unlawful persons and the enforcement of immigration                     Department of Homeland Security for the purpose of
    and workplace laws.                                                        enhancing enforcement.

  •	 Allow for operational flexibility. Over the past 10                    •	 Authenticate Identification. Immigration reform should
     years, the United States has tripled border spending and                  include implementation of the Intelligence Reform and
     manpower as border incursions have skyrocketed. The                       Terrorism Prevention Act of 2004 and the REAL ID Act of
     Department of Homeland Security (DHS) must be given                       2005. These laws do not create a national identification
     operational flexibility to achieve its objectives, rather than            card, but rather establish that when key identification
     specific mandates from Congress to undertake specific                     materials, such as driver’s licenses (and the documents
     measures such as building border obstacles or deploying                   used to obtain them, like birth certificates), are issued at
     forces from the National Guard. Effective border security                 any level of government and used for a federal purpose
     must be measured by “outcomes, the results achieved
                                          ”                                    (such as security checks before boarding commercial
     on the ground, rather than “outputs, how much money
                                             ”                                 passenger planes), these documents must meet national
     Washington has poured into securing the border.                           standards of authenticity. Such documents should be
                                                                               issued only to persons living lawfully in the United
  •	 Invest in Adaptive Technologies and Assets. Federal,
                                                                               States. To prevent tampering, counterfeiting, or fraud,
     state, and local law enforcement must be provided
                                                                               and to enhance privacy protections, the laws also estab-
     technologies that will allow them to match the adaptive
                                                                               lish standard security features concerning identification
     threat of the transnational cartels and shifting patterns
                                                                               cards. Congress should appropriate the money to help
     of illegal immigrations. These technologies include small
                                                                               states establish systems to meet requirements under
     adaptive, unmanned vehicles, and fixed and mobile sen-
                                                                               the REAL ID Act.
     sors that detect and track border activity in real time.
     Wiser investments would also include funding cost-effec-               •	 Implement Effective Temporary Worker Programs.
     tive initiatives that would rapidly increase security at the              American employers need the means to get the work-
     border, such as private-sector contractors and using state                ers they need when they need them to help grow the
     defense forces as a means for organizing the contribu-                    economy and create more jobs. Pilots for new forms of
     tions of citizen volunteers.                                              temporary worker programs should be established and
                                                                               expanded as the U.S. economy recovers and the demand
  •	 Target Federal Support to State and Local Authorities.
                                                                               for temporary labor grows. While recognizing that a tem-
     To secure the border, Congress should allocate about
                                                                               porary worker program would contribute to the task of
     $400 million per year over the next three years out of the
                                                                               policing borders and coastlines, a comprehensive plan
     projected spending on homeland security grants. Con-
                                                                               for integrated border security must be implemented
     gress must resist the temptation to turn these grants
                                                                               and operational control of the border must be achieved
     into earmarked pork-barrel programs and direct these
                                                                               in concert with any new programs that substantially
     resources to state and local authorities for community
                                                                               increase permanent or temporary workers in the United
     policing and related public safety and security programs
                                                                               States. Triggers could be established to phase in tempo-
     for improving border security. The number of Border
                                                                               rary worker programs.
     Enforcement Security Task Forces should be increased
     and robust support provided for state, local, and tribal               •	 Establish a National Trust for Voluntary Return.
     participation. Federal support for 287(g) and Secure Com-                 Congress should charter a National Trust for Voluntary
     munities programs, which expand the capacity of local                     Return—a program to help and encourage illegal
     law enforcement to deal with illegal immigration, should                  aliens to return voluntarily to their home countries. The
     be greatly expanded.                                                      National Trust for Voluntary Return should be privately
                                                                               run and funded by private donations. It should be a
  •	 Enhance Workplace Enforcement. The use of E-Verify,
                                                                               community-based volunteer program. Individuals par-
     an electronic system for employee eligibility verification,
                                                                               ticipating in the program should be required to register
     should be expanded to the maximum extent practical.
                                                                               with US-VISIT before they exit and agree not to return
     By law, the Internal Revenue Service should be autho-
                                                                               unlawfully.
     rized to share Social Security “no-match” data with the




Solutions for America is a product of Heritage’s Leadership for America campaign. Our mission is to formulate and promote conservative public policies
     based on the principles of free enterprise, limited government, individual freedom, traditional American values, and a strong national defense.

More Related Content

What's hot

Anti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecastsAnti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecasts
claudiotarulli3
 
Understanding fatca icatt 07-01-15
Understanding fatca   icatt 07-01-15Understanding fatca   icatt 07-01-15
Understanding fatca icatt 07-01-15Derren Joseph
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Beyond Boundaries: East Africa
Beyond Boundaries: East AfricaBeyond Boundaries: East Africa
Beyond Boundaries: East Africa
stimson
 
ROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYSharone Francis
 
Ip commission report_052213
Ip commission report_052213Ip commission report_052213
Ip commission report_052213
Francesco Pompili
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
Talwant Singh
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
blogzilla
 
The cybercrimes act of tanzania an overview -all you need to know
The cybercrimes act of tanzania   an overview -all you need to knowThe cybercrimes act of tanzania   an overview -all you need to know
The cybercrimes act of tanzania an overview -all you need to know
HUMPHREY MORIS
 
Kenya Workshop 1540 Dual Benefit Assistance
Kenya Workshop 1540 Dual Benefit AssistanceKenya Workshop 1540 Dual Benefit Assistance
Kenya Workshop 1540 Dual Benefit Assistance
stimson
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américain
LaLibre
 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e China
Fábio Santos
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
 
Immigration presentation april 2012
Immigration presentation april 2012Immigration presentation april 2012
Immigration presentation april 2012bartleynorma
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra
Johan Westerholm
 

What's hot (20)

Anti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecastsAnti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecasts
 
Understanding fatca icatt 07-01-15
Understanding fatca   icatt 07-01-15Understanding fatca   icatt 07-01-15
Understanding fatca icatt 07-01-15
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Beyond Boundaries: East Africa
Beyond Boundaries: East AfricaBeyond Boundaries: East Africa
Beyond Boundaries: East Africa
 
ROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITYROLE OF IMMIGRATION IN NATIONAL SECURITY
ROLE OF IMMIGRATION IN NATIONAL SECURITY
 
Ip commission report_052213
Ip commission report_052213Ip commission report_052213
Ip commission report_052213
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
The cybercrimes act of tanzania an overview -all you need to know
The cybercrimes act of tanzania   an overview -all you need to knowThe cybercrimes act of tanzania   an overview -all you need to know
The cybercrimes act of tanzania an overview -all you need to know
 
Kenya Workshop 1540 Dual Benefit Assistance
Kenya Workshop 1540 Dual Benefit AssistanceKenya Workshop 1540 Dual Benefit Assistance
Kenya Workshop 1540 Dual Benefit Assistance
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américain
 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e China
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Immigration presentation april 2012
Immigration presentation april 2012Immigration presentation april 2012
Immigration presentation april 2012
 
HRC Res A 1
HRC Res A 1HRC Res A 1
HRC Res A 1
 
The patriot act
The patriot actThe patriot act
The patriot act
 
2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra
 
Cyber2
Cyber2Cyber2
Cyber2
 

Similar to Developing A Strong Border and Immigration Policy

Immigration reform plan 2013
Immigration reform plan 2013Immigration reform plan 2013
Immigration reform plan 2013
Jacob Sapochnick
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
jackiewalcutt
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
InteractiveNEC
 
Reform outline
Reform outlineReform outline
Reform outline
Jacob Sapochnick
 
1Running Head BORDER SECURITYPAGE 6 BORDER SECURITY.docx
1Running Head  BORDER SECURITYPAGE  6 BORDER SECURITY.docx1Running Head  BORDER SECURITYPAGE  6 BORDER SECURITY.docx
1Running Head BORDER SECURITYPAGE 6 BORDER SECURITY.docx
eugeniadean34240
 
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docxRunning Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
cowinhelen
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
The history of Immigration reform
The history of Immigration reformThe history of Immigration reform
The history of Immigration reformbartleynorma
 
House immigration reform part i 2013
House immigration reform part i 2013House immigration reform part i 2013
House immigration reform part i 2013
Nachman Phulwani Zimovcak (NPZ) Law Group, P.C.
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final ApprovedAdam Jones, LCC
 
SESTA BACKGROUNDER (Updated)
SESTA BACKGROUNDER (Updated)SESTA BACKGROUNDER (Updated)
SESTA BACKGROUNDER (Updated)
Internet Law Center
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
Falascoj
 
Information technology
Information technologyInformation technology
2014 policy brief3_denialofentry_en
2014 policy brief3_denialofentry_en2014 policy brief3_denialofentry_en
2014 policy brief3_denialofentry_enDr Lendy Spires
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?
Robert Bromwich
 
Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017
Internet Law Center
 

Similar to Developing A Strong Border and Immigration Policy (19)

Immigration reform plan 2013
Immigration reform plan 2013Immigration reform plan 2013
Immigration reform plan 2013
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
 
A Study on Immigration Reform in the U.S.
A Study on Immigration Reform in the U.S.A Study on Immigration Reform in the U.S.
A Study on Immigration Reform in the U.S.
 
The Power of Identity
The Power of IdentityThe Power of Identity
The Power of Identity
 
Heather Thesis Final
Heather Thesis FinalHeather Thesis Final
Heather Thesis Final
 
Reform outline
Reform outlineReform outline
Reform outline
 
1Running Head BORDER SECURITYPAGE 6 BORDER SECURITY.docx
1Running Head  BORDER SECURITYPAGE  6 BORDER SECURITY.docx1Running Head  BORDER SECURITYPAGE  6 BORDER SECURITY.docx
1Running Head BORDER SECURITYPAGE 6 BORDER SECURITY.docx
 
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docxRunning Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
Running Head ISSUES REGARDING IMMIGRATION1Issues Regardi.docx
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
The history of Immigration reform
The history of Immigration reformThe history of Immigration reform
The history of Immigration reform
 
House immigration reform part i 2013
House immigration reform part i 2013House immigration reform part i 2013
House immigration reform part i 2013
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final Approved
 
SESTA BACKGROUNDER (Updated)
SESTA BACKGROUNDER (Updated)SESTA BACKGROUNDER (Updated)
SESTA BACKGROUNDER (Updated)
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
Information technology
Information technologyInformation technology
Information technology
 
IMG_20150414_0003
IMG_20150414_0003IMG_20150414_0003
IMG_20150414_0003
 
2014 policy brief3_denialofentry_en
2014 policy brief3_denialofentry_en2014 policy brief3_denialofentry_en
2014 policy brief3_denialofentry_en
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?
 
Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017
 

More from The Heritage Foundation

Tracking the States' Responses to Obamacare
Tracking the States' Responses to ObamacareTracking the States' Responses to Obamacare
Tracking the States' Responses to ObamacareThe Heritage Foundation
 

More from The Heritage Foundation (20)

Tracking the States' Responses to Obamacare
Tracking the States' Responses to ObamacareTracking the States' Responses to Obamacare
Tracking the States' Responses to Obamacare
 
Marriage Poverty - United States
Marriage Poverty - United StatesMarriage Poverty - United States
Marriage Poverty - United States
 
Marriage and Poverty - Wisconsin
Marriage and Poverty - WisconsinMarriage and Poverty - Wisconsin
Marriage and Poverty - Wisconsin
 
Marriage and Poverty - West Virginia
Marriage and Poverty - West VirginiaMarriage and Poverty - West Virginia
Marriage and Poverty - West Virginia
 
Marriage Poverty - Washington
Marriage Poverty - WashingtonMarriage Poverty - Washington
Marriage Poverty - Washington
 
Marriage Poverty - Virginia
Marriage Poverty - VirginiaMarriage Poverty - Virginia
Marriage Poverty - Virginia
 
Marriage Poverty - Vermont
Marriage Poverty - VermontMarriage Poverty - Vermont
Marriage Poverty - Vermont
 
Marriage Poverty - Texas
Marriage Poverty - TexasMarriage Poverty - Texas
Marriage Poverty - Texas
 
Marriage Poverty - Tennessee
Marriage Poverty - TennesseeMarriage Poverty - Tennessee
Marriage Poverty - Tennessee
 
Marriage Poverty - South Dakota
Marriage Poverty - South DakotaMarriage Poverty - South Dakota
Marriage Poverty - South Dakota
 
Marriage Poverty - South Carolina
Marriage Poverty - South CarolinaMarriage Poverty - South Carolina
Marriage Poverty - South Carolina
 
Marriage Poverty - Rhode Island
Marriage Poverty - Rhode IslandMarriage Poverty - Rhode Island
Marriage Poverty - Rhode Island
 
Marriage Poverty - Pennsylvania
Marriage Poverty - PennsylvaniaMarriage Poverty - Pennsylvania
Marriage Poverty - Pennsylvania
 
Marriage Poverty - Oregon
Marriage Poverty - OregonMarriage Poverty - Oregon
Marriage Poverty - Oregon
 
Marriage Poverty - Oklahoma
Marriage Poverty - OklahomaMarriage Poverty - Oklahoma
Marriage Poverty - Oklahoma
 
Marriage Poverty - Ohio
Marriage Poverty - OhioMarriage Poverty - Ohio
Marriage Poverty - Ohio
 
Marriage Poverty - North Dakota
Marriage Poverty - North DakotaMarriage Poverty - North Dakota
Marriage Poverty - North Dakota
 
Marriage poverty - North Carolina
Marriage poverty - North CarolinaMarriage poverty - North Carolina
Marriage poverty - North Carolina
 
Marriage Poverty - New York
Marriage Poverty - New YorkMarriage Poverty - New York
Marriage Poverty - New York
 
Marriage Poverty - New Mexico
Marriage Poverty - New MexicoMarriage Poverty - New Mexico
Marriage Poverty - New Mexico
 

Recently uploaded

01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 

Recently uploaded (14)

01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 

Developing A Strong Border and Immigration Policy

  • 1. Vol. 23 – August 17, 2010 Developing a Strong Border and Immigration Policy THE ISSUE: to soft audits and has instituted changes in the 287(g) program, a state and local immigration enforcement pro- For far too long, the United States has failed to enforce gram, that will discourage participation. In FY 2009, the its immigration laws. Its visa system does not adequately number of worksite arrests was down “by more than 50 serve the needs of the economy, legal immigrants, or U.S. percent” from the previous fiscal year. citizens. Cartel violence and continued illegal immigration along the U.S. southern border have many Americans con- • U.S. Visa Policies Are Broken. U.S. visa and naturaliza- cerned. Americans are demanding a border and immigra- tion programs remain inefficient and lacking in significant tion policy that will keep the U.S. free, safe, and prosper- infrastructure investments that could help legal immigra- ous—not an amnesty that simply exacerbates the problem. tion to run more smoothly. The U.S. still has not explored a market-based temporary worker program that would THE FACTS: allow immigrants to come to work in the United States legally. • Border Violence on the Rise, Illegal Immigration Continues. The U.S. has made progress on securing the • Amnesty Will Make the Problem Worse. The current border, but the border is still not secure. Drug cartels Administration has placed amnesty for the 10.8 million have seized control of major parts of Mexico’s northern illegal immigrants in the U.S. at the top of its policy border—with more than 6,000 murders in 2008 from agenda. Amnesty would simply encourage more illegal drug cartel violence. The threat of spillover violence in immigration, making the current problems even worse, the U.S., as well as continued illegal immigration, while remaining fundamentally unfair to those who came remains a significant problem. to the U.S. legally. • State and Locals Overwhelmed. Once in the U.S., illegal aliens consume a significant share of government THE SOLUTIONS: services, such as health care, law enforcement, and • Provide Comprehensive Security. The United States education. Particularly hard-hit are state and local govern- must have a complete security system—from the point ments, which often bear the cost of footing this bill—a of origin, in transit, at the border, and within the United multibillion-dollar unfunded mandate. It is estimated that States—that strengthens all of the activities, assets, and in 2007 illegal aliens in California cost the state between , programs necessary to secure America’s borders. Immi- $9 billion and $38 billion in public services. gration legislation should create an integrated security • Interior Enforcement Rollbacks. Instead of building on system that addresses border infrastructure and links past progress, the current Administration has reversed border management to all activities involved in cross-bor- a number of effective interior enforcement efforts. For der travel and transport, from issuing visas and passports instance, it has switched from random workforce checks to internal investigations and the detention and removal heritage.org/solutions Protect America The 21st century will be a dangerous place if America fails to protect itself and its allies. This product is part of the Protect America Initiative, one of 10 transformational initiatives in our Leadership for America campaign.
  • 2. of unlawful persons and the enforcement of immigration Department of Homeland Security for the purpose of and workplace laws. enhancing enforcement. • Allow for operational flexibility. Over the past 10 • Authenticate Identification. Immigration reform should years, the United States has tripled border spending and include implementation of the Intelligence Reform and manpower as border incursions have skyrocketed. The Terrorism Prevention Act of 2004 and the REAL ID Act of Department of Homeland Security (DHS) must be given 2005. These laws do not create a national identification operational flexibility to achieve its objectives, rather than card, but rather establish that when key identification specific mandates from Congress to undertake specific materials, such as driver’s licenses (and the documents measures such as building border obstacles or deploying used to obtain them, like birth certificates), are issued at forces from the National Guard. Effective border security any level of government and used for a federal purpose must be measured by “outcomes, the results achieved ” (such as security checks before boarding commercial on the ground, rather than “outputs, how much money ” passenger planes), these documents must meet national Washington has poured into securing the border. standards of authenticity. Such documents should be issued only to persons living lawfully in the United • Invest in Adaptive Technologies and Assets. Federal, States. To prevent tampering, counterfeiting, or fraud, state, and local law enforcement must be provided and to enhance privacy protections, the laws also estab- technologies that will allow them to match the adaptive lish standard security features concerning identification threat of the transnational cartels and shifting patterns cards. Congress should appropriate the money to help of illegal immigrations. These technologies include small states establish systems to meet requirements under adaptive, unmanned vehicles, and fixed and mobile sen- the REAL ID Act. sors that detect and track border activity in real time. Wiser investments would also include funding cost-effec- • Implement Effective Temporary Worker Programs. tive initiatives that would rapidly increase security at the American employers need the means to get the work- border, such as private-sector contractors and using state ers they need when they need them to help grow the defense forces as a means for organizing the contribu- economy and create more jobs. Pilots for new forms of tions of citizen volunteers. temporary worker programs should be established and expanded as the U.S. economy recovers and the demand • Target Federal Support to State and Local Authorities. for temporary labor grows. While recognizing that a tem- To secure the border, Congress should allocate about porary worker program would contribute to the task of $400 million per year over the next three years out of the policing borders and coastlines, a comprehensive plan projected spending on homeland security grants. Con- for integrated border security must be implemented gress must resist the temptation to turn these grants and operational control of the border must be achieved into earmarked pork-barrel programs and direct these in concert with any new programs that substantially resources to state and local authorities for community increase permanent or temporary workers in the United policing and related public safety and security programs States. Triggers could be established to phase in tempo- for improving border security. The number of Border rary worker programs. Enforcement Security Task Forces should be increased and robust support provided for state, local, and tribal • Establish a National Trust for Voluntary Return. participation. Federal support for 287(g) and Secure Com- Congress should charter a National Trust for Voluntary munities programs, which expand the capacity of local Return—a program to help and encourage illegal law enforcement to deal with illegal immigration, should aliens to return voluntarily to their home countries. The be greatly expanded. National Trust for Voluntary Return should be privately run and funded by private donations. It should be a • Enhance Workplace Enforcement. The use of E-Verify, community-based volunteer program. Individuals par- an electronic system for employee eligibility verification, ticipating in the program should be required to register should be expanded to the maximum extent practical. with US-VISIT before they exit and agree not to return By law, the Internal Revenue Service should be autho- unlawfully. rized to share Social Security “no-match” data with the Solutions for America is a product of Heritage’s Leadership for America campaign. Our mission is to formulate and promote conservative public policies based on the principles of free enterprise, limited government, individual freedom, traditional American values, and a strong national defense.