Borders and Sovereignty Ch.9 Verified Test Bank - Homeland Security 1e | Test Bank Givens by Austen D. Givens. DOCX document preview.
Chapter 9: Test Bank
Multiple Choice
- The world’s longest land border is shared by _______________________.
- Germany and Switzerland
- the People’s Republic of China and Vietnam
- the United States and Canada
- Spain and Portugal
- The Treaty of Westphalia brought an end to which conflict?
- Thirty Years War
- Franco-Prussian War
- World War I
- World War II
- Which of the following terms applies to an increase in numbers of border crossers?
- Globalization
- International migration
- Preclearance
- Sovereignty
- Which program provides a centralized location where advance information can be analyzed along with travel patterns, trade records, and watchlists about possible threats?
- Cargo Preinspection
- National Targeting Center
- North American Free Trade Agreement
- Secondary Inspection
- Which of the following is NOT one of the accomplishments of the Beyond the Border initiative?
- Sharing “No Fly” lists
- Expediting passport issuances
- Making trusted traveler programs reciprocal
- Reaching an agreement on preclearance
- Which of the following terms describes the practice in which authorities on different sides of the border treat crossings as a flow to be managed and collaborate throughout the process?
- Globalization
- International Migration
- Joint Border Management
- Secondary Inspection
True/False
- Borders define where one area of sovereignty ends and another begins.
- True
- False
- International flows of trade have existed since the beginning of recorded history.
- True
- False
- A risk management approach is essential to cope with contemporary volumes of trade and travel and effectively target inspection resources at the small percentage of goods or people who pose a threat
- True
- False
- Land border crossing infrastructure tends to be outdated and limited in its capacity.
- True
- False
- The Peace of Westphalia established the norm of non-interference by one nation in the affairs of other nation states.
- True
- False
- International air travel dropped significantly from the end of the Second World War to the oil crisis of the 1970s.
- True
- False
- Containerization offers positive economic benefits without any security challenges.
- True
- False
Short Answer
- Explain the significance of the Treaty of Westphalia.
- It led to the wide acceptance of the concepts of sovereignty, territorial integrity, and therefore the notion of separate countries and nationalities. The Peace of Westphalia established the norm of non-interference by one nation in the affairs of other nation states. As a result, borders between nation-states became more important than they had previously been both to the people who lived within their boundaries as well as to those who live outside of them.
- Detail the key to the NTC’s success.
- The key to the NTC’s success has been receiving advance information about goods and people in real time and having the ability to analyze the levels of risk presented and determine how to respond to threats. The system of advance information that was established after 9/11 had a number of key components. For passengers, CBP expanded the Advance Passenger Information System (APIS) to require that airlines provide certain information about all passengers who had checked in for a U.S.-bound flight an hour before it departed. This gave officers sufficient lead time to vet incoming travelers against law enforcement and national security watchlists to identify alerts ranging from known terrorists to outstanding warrants seeking the arrest of specific individuals. Significantly, CBP also established a partnership with the Government of Mexico to receive APIS data about air travelers entering Mexico, which allows far greater assurance that suspected terrorists would not be able to enter Mexico and then attempt to enter the United States across the southwest border.
- Detail some of the history about current partners of the trusted traveler programs.
- Student answers may vary but could include the following. The United States has several trusted traveler programs. The oldest is the Secure Electronic Network for Travelers Rapid Inspection (SENTRI), dating from the mid-1990s, which allows pre-vetted passengers to cross the southwest land border in specially designated lanes. The northern border equivalent is called NEXUS, which also provides travelers expedited privileges at airports. The primary air passenger program is Global Entry, which now has over five million members and is operational at fifty-three airports
- Describe some of the key elements in risk management between the ports of entry.
- Students should mention the following items: Forward deployed patrols at the border must be integrated with interior enforcement. Stationary surveillance assets and sensors are an important way to multiply the effectiveness of border agents and to ensure that remote areas are not being used by smugglers and traffickers. Mobile surveillance, including vehicle-mounted systems, aircraft, and unmanned vehicles are increasingly being used because of the flexibility that they provide and the ability to be targeted to specific activity. Physical infrastructure such as fences and walls is also an important component in managing risk at the border. The last component in managing risk at the border is a decision-making process about how to handle illicit crossers and how to apply the most appropriate consequences.
- What lessons can be learned from the Faisal Shazad bombing attempt?
- Shazad’s attempted attack demonstrates how understandings of borders are evolving. It is important to identify and track individuals who may have trained with terrorist groups and returned home. Effective border control can be as much about identifying who is leaving a country as who is entering it. And these changes in our understandings of borders have dramatic implications for the ways in which borders are managed.
Short Essay
- Describe the evolution of how borders work from development through to the future of border security.
- Explain some of the controversy surrounding joint border management.
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Quick Navigation
Benefits
Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party