Successful Security Measures Cut to Make Room for Border Wall

Successful Security Measures Cut to Make Room for Border Wall

The Trump administration is cutting or delaying funding for proven security measures in lieu of funding the Border Wall.

President Donald Trump promised the American people a wall on the border of the United States and Mexico and that is just what the American people are going to get. The most difficult part of this campaign promise, however, is funding.

Under a spending plan submitted last week to Congress, the wall, which would span nearly 900 miles across the southern border, could cost $18 billion over the next 10 years. The cost is more than half of the $33 billion spending blueprint for border security over the next decade.

The New York Times reported that the Trump administration would cut or delay funding for proven security measures that officials and experts deem more effective than building a wall, such as custom agents, radar technology, border surveillance, canine units and patrol boats, in its upcoming spending plan to curb illegal immigration.

The reallocation of funds help to fund the border wall, but eliminate critical funding for border security programs or shifts money from them, threatening to leave holes in the country's border security program. For example, in a document viewed by The New York Times, the spending budget cuts money included for a remote video surveillance system in the Rio Grande Valley in South Texas, an area known for high numbers of border crossings and drug smuggling. The system is composed of infrared cameras mounted on poles, towers and buildings.

The document notes that the surveillance system is important, but said its funding requests were lowered "to offset the costs of presidential priorities not funding in the D.H.S. request."

The most alarming thing in the proposed budget is the absence of funds to support hiring new customs officers. Experts told The New York Times that not hiring any additional agents could potentially have the most impact on border security, the agents form the most crucial line of defense against smugglers and terrorist threats.

Security experts believe focusing on a wall rather than security measures that have proven to be successful ignores the constantly evolving nature of threats at the border, including terrorism, immigration and drug trafficking.

“A wall is the single most expensive thing you can do in terms of trying to secure the border, and not necessarily the most effective on its own,” said Doris Meissner, who was the top immigration official during the Clinton administration, in the NYT article. “If you want to be strategic about it, you want to invest in technologies and programs that can stop threats well before they can actually get to the border.”

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3