Information and technology are centerpieces of a new border architecture that seeks to respond to the competing demands of facilitating mobility and managing cross-border risks while remaining cost-efficient and respectful of rights and privacy. This report shows how governments must approach border management systems to ensure properly balanced development.
This report details the post-9/11 programs and agreements implemented by U.S. and European governments to identify terrorists and serious transnational criminals through the collection and processing of increasing quantities of traveler data.
In the absence of new U.S. immigration reform legislation, this report examines the opportunities that exist within the executive branch and the administration to refine and strengthen current U.S. immigration laws and policies. The administration can exercise its authority to field policies, programs, and procedures that are effective and fair in advancing the goals of the U.S. immigration system.
An effective electronic eligibility verification system is an essential component of the U.S. immigration system, but questions as to whether the E-Verify employment verification system should be made mandatory remain. This report examines the strengths and weaknesses of E-Verify, and discusses proposals for reform.
Faced with enormous political pressure to stop illegal immigration and to prevent the entry of potential terrorists, the U.S. government has devoted ever more resources to enforcing border policies. It remains unclear, the author argues, whether the efficacy of these programs warrants their costs.