public safety assignment #2

 

read articles provided and watch videos provided then do 2 writing assignments

Don't use plagiarized sources. Get Your Custom Essay on
public safety assignment #2
Just from $13/Page
Order Essay

follow instructions and provide relevant work papers will be placed in turnitin

PAD4932: CONTEMPORARY ISSUES IN PUBLIC SAFETY

Mod 1 reading assignment there are 2 assignments attached to all the readings

Video Assignment watch these 3 videos:

Read these 2 assignments I have attached the pdf of them

Beware the Eye Spies. (2014). Scientific American, 310(1), 10.

http://db07.linccweb.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=93322272&site=ehost-live (Links to an external site.)

HODGE, R. D. (2012). Borderworld. Popular Science, 280(1), 56-81.

http://db07.linccweb.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=69913779&site=ehost-live (Links to an external site.)

Assignment 1 Locate and summarize one additional article tell how the formulation of a public policy (proposal) could be developed to respond to the selected issue. Discuss your article in relation to the reading (in 100-word s) and cite the source of your article using APA format.

Assignment 2 PLACE ALL ANSWERS IN THIS ASSIGNMENT ON ONE WORD DOCUMENT ONLY, IDENTIFYING EACH ACCORDINGLY. Prepare a 100-word response to each of the articles, summarizing them, and identifying specific concerns and strategies for response. Are there any multi-disciplinary approaches that could be implemented or are useful to consider?

PAD4932: CONTEMPORARY I
SSUES IN PUB
LIC
SAFETY

Mod

1 readin
g
assignment

there are 2
assignments

attached to all the readings

Video Assignment

watch these 3 videos:

Read these 2

assignments

I have attached the pdf of them

Beware the Eye Spies. (2014). Scientific American, 310(1), 10.

http://db
07.linccweb.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=93322272&site=
ehost

live (Links to an external site.)

HODGE, R. D. (2012). Borderworld. Popular Science, 280(1), 56

81.

http://db07.linccweb.org/login?url=http://search
.ebscohost.com/login.aspx?direct=true&db=a9h&AN=69913779&site=
ehost

live (Links to an external site.)

Assignment

1

Locate and summarize one additional article
tell

how the formulation of a public policy (proposal) could be
developed to resp
ond to the selected issue. Discuss your article in relation to the reading (in 100

word s) and cite the
source of your article using APA format.

Assignment

2

PLACE ALL ANSWERS IN THIS ASSIGNMENT ON ONE WORD DOCUMENT ONLY, IDENTIFYING EACH
ACCORDINGLY.

Prepare a 100

word response to each of the articles, summarizing them, and identifying specific
concerns and strategies for response. Are there any multi

disciplinary approaches that could be implemented or are
useful to consider?

PAD4932: CONTEMPORARY ISSUES IN PUBLIC SAFETY
Mod 1 reading assignment there are 2 assignments attached to all the readings
Video Assignment watch these 3 videos:


Read these 2 assignments I have attached the pdf of them
Beware the Eye Spies. (2014). Scientific American, 310(1), 10.
http://db07.linccweb.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=93322272&site=
ehost-live (Links to an external site.)
HODGE, R. D. (2012). Borderworld. Popular Science, 280(1), 56-81.
http://db07.linccweb.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=69913779&site=
ehost-live (Links to an external site.)
Assignment 1 Locate and summarize one additional article tell how the formulation of a public policy (proposal) could be
developed to respond to the selected issue. Discuss your article in relation to the reading (in 100-word s) and cite the
source of your article using APA format.
Assignment 2 PLACE ALL ANSWERS IN THIS ASSIGNMENT ON ONE WORD DOCUMENT ONLY, IDENTIFYING EACH
ACCORDINGLY. Prepare a 100-word response to each of the articles, summarizing them, and identifying specific
concerns and strategies for response. Are there any multi-disciplinary approaches that could be implemented or are
useful to consider?

Title:
Source:

Document Type:
Subject Terms:

Company/Entity:

NAICS/Industry Codes:
Abstract:

Full Text Word Count:
ISSN:

Accession Number:
Database:

Section:

Record: 1

Beware the Eye Spies.

Scientific American. Jan2014, Vol. 310 Issue 1, p10-10. 1p. 1 Color
Photograph.

Opinion

*BIOMETRIC identification
*RIGHT of privacy
*MASS surveillance
UNITED States

UNITED States. Federal Bureau of Investigation
UNITED States. Dept. of Homeland Security

922120 Police Protection

The article discusses privacy issues of biometric databases, arguing
that technology under development as of January 2014 has the potential
to invade personal privacy and rules of their use need to be established.
Topics include systems such as the Mobile Offender Recognition and
Information System (MORIS), the U.S. Federal Bureau of Investigation’s
(FBI) New Generation Identification database, and the U.S. Department
of Homeland Security’s Biometric Optical Surveillance System (BOSS).

709

0036-8733

93322272

Academic Search Complete

Science Agenda
Opinion and analysis from Scientific American’s Board of Editors

Beware the Eye Spies

Without explicit safeguards, your personal biometric data are destined for a government database
Security through biology is an enticing idea. Since 2011, police departments across the U.S. have been
scanning biometric data in the field using devices such as the Mobile Offender Recognition and Information
System (MORIS), an iPhone attachment that checks fingerprints and iris scans. The FBI is currently building its
Next Generation Identification database, which will contain fingerprints, palm prints, iris scans, voice data and
photographs of faces. Before long, even your cell phone will be secured by information that resides in a distant
biometric database.

Unfortunately, this shift to biometric-enabled security creates profound threats to commonly accepted notions
of privacy and security. It makes possible privacy violations that would make the National Security Agency’s
data sweeps seem superficial by comparison.

Biometrics could turn existing surveillance systems into something categorically new — something more
powerful and much more invasive. Consider the so-called Domain Awareness System, a network of 3,000
surveillance cameras in New York City. Currently if someone commits a crime, cops can go back and review
sections of video. Equip the system with facial-recognition technology, however, and the people behind the
controls can actively track you throughout your daily life. “A person who lives and works in lower Manhattan

would be under constant surveillance,” says Jennifer Lynch, an attorney at the Electronic Frontier Foundation,
a nonprofit group. Face-in-a-crowd detection is a formidable technical problem, but researchers working on
projects such as the Department of Homeland Security’s Biometric Optical Surveillance System (BOSS) are
making rapid progress.

In addition, once your face, iris or DNA profile becomes a digital file, that file will be difficult to protect. As the
recent NSA revelations have made clear, the boundary between commercial and government data is porous at
best. Biometric identifiers could also be stolen. It’s easy to replace a swiped credit card, but good luck
changing the patterns on your iris.

These days gathering biometric data generally requires the cooperation (or coercion) of the subject: for your
iris to get into a database, you have to let someone take a close-up photograph of your eyeball. That will not be
the case for long. Department of Defense-funded researchers at Carnegie Mellon University are perfecting a
camera that can take rapid-fire, database-quality iris scans of every person in a crowd from a distance of 10
meters.

New technologies will also make it possible to extract far more information from the biometrics we are already
collecting. While most law-enforcement DNA databases contain only snippets of the genome, agencies can
keep the physical DNA samples in perpetuity, raising the question of what future genetic-analysis tools will be
able to discern. “Once you have somebody’s DNA, you have all sorts of very personal info,” Lynch says.
“There is a lot of fear that people are going to start testing samples to look for a link between genes and
propensity for crime.”

Current law is not even remotely prepared to handle these developments. The legal status of most types of
biometric data is unclear. No court has addressed whether law enforcement can collect biometric data without
a person’s knowledge, and case law says nothing about facial recognition.

It is unfortunate that the only body capable of enacting broad and lasting protections against the misuse of
biometric data is the U.S. Congress. Yet perhaps legislators can agree that the law needs to catch up with
technology. If so, they should start with principles that Lynch and the Electronic Frontier Foundation have
proposed. Among other things, such legislation should limit the amount and type of data that the government
can store and where they can be stored. It should restrict the collation of different types of biometric data into a
single database. And it should certainly require that all biometric data be stored in the most secure manner
possible.

Identity theft, fraud and terrorism are real problems. Used properly, biometrics could help protect against them.
But the potential for misuse is glaringly obvious. We must begin setting rules to govern the use of these
technologies now.

SCIENTIFIC AMERICAN ONLINE
Comment on this article at ScientiflcAmerican.com/jan2014

PHOTO (COLOR)

~~~~~~~~
By the Editors

Scientific American is a registered trademark of Nature America, Inc. and its content may not be copied or
emailed to multiple sites or posted to a listserv without the copyright holder’s express written permission.
However, users may print, download, or email articles for individual use.

56 P O P U L A R S C I E N C E JA N UA R Y 2012

Borderworld

How the U.S. is reengineering homeland security

B Y R O G E R D. H O D G E

PSC0112_WL_Borders_FINAL.indd 56 11/15/11 11:38 AM

JA N UA R Y 2012 P O P U L A R S C I E N C E 57

THE CROSSING

The Zaragoza-Ysleta Inter-

national Bridge in El Paso,

Texas, is one of the 330 ports

of entry where customs offi-

cials inspect the more than

350 million travelers and

100 million vehicles, trains

and aircraft entering and

exiting the U.S. every year.

PSC0112_WL_Borders_FINAL.indd 57 11/15/11 11:38 AM

58 P O P U L A R S C I E N C E JA N UA R Y 2012

As a lone male in a rented minivan headed south on a remote

stretch of border highway, I almost certainly fit some kind of pro-

file. I passed several white pickups bearing the distinctive green

stripe of the U.S. Border Patrol, but my first direct encounter with

the authorities did not come until I pulled off the road to study

with my binoculars a white speck that I had spotted high in the

cloudless sky. It was not a Predator or any other UAV that I had

ever seen or read about. It looked like a blimp. I put down my bin-

oculars just as another of the green-and-white trucks pulled up.

We both lowered our windows and I asked, in my best Texan, what

that thing was floating up there in the sky. “It’s a weather bal-

loon,” the officer said with a smile. I thanked him, and we both

waved as I drove off, still headed south.

In El Indio, I stopped to buy a Dr Pepper and asked the old lady

behind the counter, in my best Spanish, whether she knew any-

thing about that white thing up in the sky. She did not. I decided

to inquire at the post office, but it was closed. I was wondering

what to do next when a minivan pulled up. I asked the driver if she

knew what that white thing was up in the sky.

“It’s a satellite for the drugs,” she said. “My brother-in-law works

for it.” A boy chimed in from the backseat that if I kept driving

south I’d see “the building that controls it.” I thanked the woman

and her boy and continued on my way. Border Patrol vehicles con-

tinued to pass me coming and going, and, as I neared the base of

what I could now see was in fact a tethered blimp, one of those

trucks quickly pulled up right behind me and showed no sign of

passing. Although I was doing nothing illegal, I began to sweat.

Soon I drove by a couple of white buildings, in front of which was

a sign: united states air force tethered aerostat radar site.

That settled the question. The tethered radar blimp (I have since

learned) is a relatively old surveillance device, part of a system

deployed decades ago when drug smugglers were having a grand

time flying over the border with their cargo. I’ve seen another aero-

stat on the ground in West Texas, near Marfa. Rumor has it that one

of them got loose in a high wind and was blown almost to Oklahoma.

Having attained my goal, I was now confronted with the more

urgent question of what to do about the Border Patrol vehicle that

was so determinedly following me. I had never driven this stretch

of highway before, and I feared I might drive for hours before

reaching another human settlement. I spotted a place to pull over

and decided to turn around. That’s when the flashing lights went

on behind me. I stopped, several more trucks pulled up, and soon E
d

d
A

R
A

C
k

/
G

E
t

t
y

I

m

A
G

E
S

;
P

R
E

C
E

d
IN

G
P

A
G
E
S

:
Im

A
G

E
©

J
H

E
N

R
y

F
A

IR
2

0
1

1
/

w
w

w
.J

H
e

n
r

y
F

a
ir

.c
o

m

of Del Rio, Texas, when my grandmother told

me she had seen a drone flying over El Indio,

a tiny village just east of the Mexican border,

about 75 miles down the river. Te newspapers

that summer were filled with stories about the

Predator drones poised to patrol the skies above

the Rio Grande, but the date of deployment

was not yet at hand, and in any case Predators

ordinarily fly far too high to be seen fom the

ground, so I decided to take the afernoon to

drive down to El Indio and investigate.

1. “YOU TURNED AROUND”

I was visiting
my hometown

Borderworld

PSC0112_WL_Borders_FINAL.indd 58 11/15/11 11:39 AM

JA N UA R Y 2012 P O P U L A R S C I E N C E 59

men in green uniforms were peering through all the windows of

my vehicle. “What seems to be the trouble, officer?” I asked. “You

turned around,” came the reply.

The lead agent was friendly enough, but he was insistent in his

inquiries. He wanted to know what I was doing out there on a remote

stretch of highway not far from Mexico. My explanation, that I had

driven south from Del Rio because I was curious about the secu-

rity infrastructure that had materialized along the border in the 25

years since I loaded up my car and drove off to college, struck him

as implausible and weird. I fought the urge to become indignant, to

assert my right as an American citizen to go where I pleased on a pub-

lic highway. Instead I explained again that I

was curious about that blimp up there, the

aerostat. Eventually, after much discussion,

it was determined that I had not committed

a detainable offense, and I was permitted to

continue on my way, at liberty.

2. “A VIRTUAL FENCE”
DRIVInG BAck UP the line to my grand-

mother’s house, as I passed one curiously

discontinuous segment of 18-foot-tall border fence after another, I

brooded over the larger meaning of my encounter with the authori-

ties. I had long nursed the belief that the borderlands where I came

of age, in which my neighbors and my family and I had crossed the

river to Mexico weekly if not daily with a minimum of inconve-

nience, had ceased to exist. But on that bright summer day in 2010,

I realized that I did not yet comprehend what was taking its place.

I had only begun to understand the complexities of the modern

border and its intricate economies of authority and surveillance.

So I decided to investigate, to experience the border complex as a

sympathetic journalist rather than a suspect tourist.

My initial question was relatively simple:

How does the border work? What devices

and systems have we invented to secure a

1,954-mile international boundary—of river

valleys and canyons, mountains, deserts and

vibrant communities straddling both sides of

the line—that people have crossed more or

less freely for hundreds of years? What I dis-

covered, over weeks and months of reporting,

is that no real agreement exists among poli-

The borderlands where
I came of age had ceased to

exist. But I did not yet
comprehend what was

taking its place.

EYE IN THE SKY

Since 1980, military

and border authorities

have been deploying

radar blimps in Texas

and elsewhere to

monitor low-altitude

aircraft penetrating

U.S. airspace.

PSC0112_WL_Borders_FINAL.indd 59 11/15/11 11:40 AM

60 P O P U L A R S C I E N C E JA N UA R Y 2012

PSC0112_WL_Borders_FINAL.indd 60 11/15/11 11:41 AM

JA N UA R Y 2012 P O P U L A R S C I E N C E 61

cymakers about how to define the border itself. Is

it an obstruction or a conduit? A military domain

or a civil and commercial one? Is it meant to join

communities or keep them apart? I searched in

vain among the pronouncements of our political

leaders for clarification of such questions.

Despite this ambiguity—or perhaps as a result

of it—the federal government has since 2003

doubled the flow of funds to Customs and Bor-

der Protection, the division of the Department of

Homeland Security with primary responsibility

for policing the border. CBP, which encompasses

the Border Patrol, has in turn deployed increas-

ingly advanced means not only to scrutinize,

search out, and seize an immense stream of drugs

and bodies (to use CBP parlance), but also to channel a concomitant

river of data—electronic manifests, lists of travelers’ names, dates of

entry, and untold terabytes of video footage—all of which must be

analyzed, quantified, indexed, and stored.

Technologies of surveillance and control all aim to achieve a

perspectival advantage over some adversary, but the vast quanti-

ties of data produced by these devices threaten to overload the

system, thus defeating the original goal. Fusing those rivers of

data into a comprehensive and intuitively manageable real-time

graphical interface, for instance, had been one of the foremost

aims of the Secure Border Initiative Network, or SBInet, the fed-

eral government’s doomed mega-contract with Boeing to build a

“virtual fence” along the nation’s borders. In January 2011, after

five years of effort and more than $1 billion had yielded a mere

53 miles of partially operative tactical infrastructure in southern

Arizona, the Department of Homeland Security canceled SBInet.

It was not yet clear what would take its place.

Despite the failure of SBInet, the border is increasingly defined

not by geography or war or acts of Congress, but innovation.

Border-control assets—from radar blimps to Predator drones to

virtual fences and other military-grade surveillance machines—

are evolving rapidly, if imperfectly, and with them so is the border

itself. What was once little more than a line on a map has become

a theater

of operations.

3. “I NEED TO TALK TO YOU”

my INveSTIgATIoN BegAN in Brownsville, Texas, on the front

line of what some have taken to calling a border war. Brownsville

lies just above the mouth of the Rio grande, at the southern tip

of the largely Spanish-speaking urban sprawl of 1.2 million peo-

ple that fills the lower Rio grande valley. my initial destination

was a Border Patrol station, where I would visit a state-of-the-art

command-and-control center. When I arrived at the station, just

in time for the 4-p.m.-to-midnight shift, I was immediately con-

fronted with one of the reasons they call it a war.

At the daily muster, where Border Patrol agents get their march-

ing orders for the day, much of the talk was about Jaime Zapata,

a special agent with Immigration and Customs enforcement who

had been shot dead six days earlier by members of Los Zetas, a
mexican drug cartel, at a roadblock several hundred miles south
of the border. Zapata was both a Brownsville native and a former

Border Patrol agent, so his murder was a major event. After his

funeral, hundreds of law-enforcement vehicles, sirens wailing,

would pass through the city as residents lined

the streets waving American flags. Some of the

agents I spoke to attributed the relative quiet

along the border that week to the Zapata kill-

ing—the bad guys were waiting to see what the

American response would be. The gulf Cartel,

a rival organization whose own war with the

Zetas for control of transborder commerce had

resulted in more than 1,000 deaths over the

past year, denounced Zapata’s killing. “It’s clear

that the federal government should act without

delay against these assassins,” the cartel said in

a statement. “Because the spilling of blood in

the country is now drowning society.”

I was unable to attend the Zapata funeral,

but I would eventually see high-definition video footage of the

burial ceremony taken from a CBP helicopter. The video was shot

from about three miles out; the mourners were probably not even

aware that a helicopter was in the area. I watched playback of that

video feed on the Web portal of a system called the Big Pipe, a

surveillance network developed by Kenneth Knight, the deputy

executive director of national air-security operations for the office

of Air and marine (oAm), a lesser-known division of CBP that

operates the largest law-enforcement air force in the world.

Knight is a physically imposing, ruddy man with a disarming

midwestern accent. When we met in Brownsville, he was dressed

in the khaki jumpsuit that all oAm pilots wear, and it turned

out that he was a helicopter pilot himself. I had no idea who he

was, but he already knew about me. “I need to talk to you,” he

said, decisively hijacking my tour of the station. Knight was in

town to coordinate air support for the Zapata funeral, and he

didn’t have much time for me right then, but he gave me a quick

briefing on the Big Pipe and then invited me to Washington,

where he promised to give a more detailed demonstration of his

project’s capabilities.

What was the Big Pipe? The answer wasn’t clear at first, but

Knight emphasized the concept of “total domain awareness” and

strongly suggested that he possessed the means of attaining that

state. Based on the briefing I received in Brownsville, the Big Pipe

sounded like it might be the framework for the elusive “common

operating picture” that would integrate and rationalize the increas-

ingly unwieldy data streams generated by our high-definition

surveillance systems. Perhaps the Big Pipe could succeed where

SBInet had failed.

4. “THE MIKE SIDE”

LATe THAT AFTeRNooN, when the low angle of the sun was

beginning to lengthen the shadows, agent Dan milian took me

down to the Rio grande to get a closer look at the border itself.

Weedy, fast-growing brush often chokes the meandering banks of

the Rio grande as well as the no-man’s-land between the river and

the border fence. Carrizo river cane, an invasive species that aids

and abets the passage of other such species, grows everywhere.

Narrow trails snake through the tall grass.

The Brownsville & matamoros Bridge, the oldest crossing in

Brownsville, loomed behind us as we walked along the river. Broken

shards of glass twinkled in the dense ground cover, and thick veg-

etation did a good job of hiding the ubiquitous debris of human

MILES AND MILES Helicopter-borne cameras near

Laredo, Texas, offer a heightened perspective to U.S.

Border Patrol agents tracking any undocumented

migrants who might attempt to cross the Rio Grande.

F
A

C
IN

g
P

A
g

E
:

JO
h

N
B

.
C

A
R

N
E

t
t

What was once little
more than a line

on a map has
become a theater

of operations.
Borderworld

PSC0112_WL_Borders_FINAL.indd 61 11/15/11 11:41 AM

62 P O P U L A R S C I E N C E JA N UA R Y 2012

civilization: cast-off soft-drink bottles and

small articles of clothing, socks, T-shirts,

a sneaker. Torn black plastic trash bags

rustled in the light breeze, especially

along the landing spots worn slick from

the passage of illegal bodies who slip out

of the oily black nighttime river, briefly

pause, quickly pull dry clothing and sup-

plies from the trash bags, and then dress

themselves and furtively crawl, scramble,

or run toward the black steel pickets. The

fence can be climbed, and so they climb.

In 2006, Congress mandated the construction of a new barrier

along the southwest border, and since then contractors have built

just under 700 miles of such fencing, at an average cost of $2.8

million per mile. Environmentalists and cynical bystanders in the

border communities hate it. Farmers who are cut off from their

fields resent the inconvenience. People whose homes ended up on

the wrong side of the fence feel sacrificed and abandoned. Ocelots

and other lovely wild creatures are said to be experiencing disrup-

tions of their migratory wanderings. Smugglers, meanwhile, have

used a catapult to hurl drugs into Arizona, as well as a portable

ramp that permits vehicles to drive right over the fence.

It’s easy to laugh at fencing that abruptly ends in a tangle of

brush. But agents here say they love even the intermittent version

because it gives them a bit more time to respond to border-crossing

attempts, which in Brownsville must be measured in seconds. The

fence adds perhaps a minute to the equation, Milian told me, and it

also channels the flow of aliens away from populated areas out into

the brush, where the response time is measured in hours and days.

A heavily trafficked and well-maintained dirt road ran along-

side the border fence. Dust lay thick on the ground and offered up a

rich testimony to a tracker versed in the art of sign cutting. Agents

drag bundles of tires behind their vehicles along such roads, both

here on the line and out in the brush country far from the river,

and check back periodically to see if any signs have appeared. The

best trackers can tell from a footprint whether the body in ques-

tion is heavy or light, fit or exhausted, his approximate age and

height, how fast he is moving, whether he is carrying a load, and

how heavy that load is likely to be. I’ve been told that at least one

agent can cut sign from horseback at a gallop.

We were in the middle of town, right next to a port of entry.

The river was perhaps 10 yards across, and the railroad bridge of

the port not more than 50 yards away. Even here, they cross. We

walked down a trail looking for fresh signs of traffic, and I noticed

how much thicker the brush was on the other side. We observed

no signs of human activity, but such appearances were deceptive.

Matamoros was right there; people lived and worked and per-

formed their daily routines just a few hundred yards away. Down

here, the cartels often employ spotters to watch the river. Some-

times they fish, but often they just sit and watch from the bank,

staring with impunity and insolence or maybe just boredom. The

cartels choose when and where to cross; they control the other

side, the “Mike side.” They own the monopoly on human traffic

just as they do the traffic in drugs. No one freelances anymore.

On our side, a Border Patrol camera tower looked almost pretty

against the evening sky as it peered, from a height of 60 feet, up

and down this broad bend in the river.

5. “BUGS”

BACk AT ThE COMMAND-AND-CONTrOl CENTEr a few hours

later, I found myself on the other side of that camera, studying

the same stretch of the river. The shift in perspective was dizzying.

Twenty large screens lined the front wall of the control room and

flickered from one surveillance camera to another; a television in

the middle of the wall had been tuned to Fox News. Agents sat

behind desks, scanning the monitors and occasionally speaking

on the radio with agents in the field.

The rio Grande Valley sector employs dozens of remote Video

Surveillance Systems, most of which are on fixed towers. Each

rVSS is made up of four cameras, two of which are infrared for

night duty. The agents who are assigned to camera duty in the

control room zoom and pan the cameras as needed. At night they

can manipulate the contrast of the infrared video, shifting from

“black hot” to “white hot,” rewinding and forwarding through

the digital file as needed to identify what is often merely a fleet-

SCANNERS Border

Patrol agents employ

backscatter x-rays to

detect cash, drugs,

firearms, humans and

other contraband, but

nothing is more effec-

tive than a dog’s nose.

JO
h
N
B
.
C
A
R
N
E
t
t

(
3

);
F

A
C

IN
g

P
A

g
E

:
S

C
O

t
t

O
L

S
O

N
/

g
E
t
t

y
I

m
A

g
E

S
)

HEAVY TRAFFIC

The Falfurrias Traffic

Checkpoint, 70 miles

north of the

border, maintains the

highest seizure rate

of any checkpoint in

the country.

Borderworld

PSC0112_WL_Borders_FINAL.indd 62 11/15/11 11:41 AM

JA N UA R Y 2012 P O P U L A R S C I E N C E 63

ing glimpse of an unidentified animal, possibly human. Sources

of thermal energy abound. rocks, concrete blocks and even the

plants radiate heat, but warm-blooded animals stand out most

vividly, and they move.

A seismic sensor buried alongside an active trail detects foot

traffic and transmits its radio signal to the command center. Such

unmanned ground sensors have been used for decades, but engi-

neers continue to reduce their size and increase their sensitivity.

Border Patrol agents have placed some 11,000 sensors along the

U.S. border, and they move them constantly in an effort to keep up

with the ever-shifting traffic patterns along the infinitely forking

paths that radiate outward from the line.

Agent Jose Mancillas demonstrated what happens when he receives

a signal from a ground sensor. he glanced left to a small screen dis-

playing the current locations of his “bugs” and quickly typed a few

keystrokes. One of three large flat-screen monitors at his desk instantly

displayed a river camera’s infrared image. Using a joystick controller,

he panned the camera and zoomed in. There wasn’t much to see just

then, so he pulled up a file of a recent incursion. Eight ghostly white

bodies sprang out of the brush and sprinted in an awkward hunkered-

down posture toward the steel pickets of the border fence. They had

activated the sensor about 50 yards south of the

levee, three miles away from the rio Grande. As

soon as he had confirmed that there was traffic

on the move, Mancillas had hit the radio, alerting

a unit he knew was standing by just around the

bend. We watched several members of the group

perch on the fence; then the agents came into view

and the aliens retreated. One leaped all the way

from the top of the fence and hit the ground hard.

We all winced. But he got up and ran south, back

toward Mexico, with the rest of his group.

Suddenly all motion stopped. The file ran backward as Man-

cillas worked the controls of the NetGuard-EVS video client. he

wanted to show me additional footage of recent traffic. Often you

get just a flash of white, and it takes an experienced eye to deter-

mine whether to respond. The cameras are a good tool, but they

can’t see everything, and the harsh South Texas weather degrades

their performance. In January, during a severe cold snap, the cam-

eras simply froze in place.

6. “A HUGE DIFFERENCE”

UPrIVEr FrOM BrOWNSVIllE lies McAllen, a more affluent

community where local conditions, both natural (thick brush) and

political (height restrictions), have prevented the deployment of

remote video surveillance towers. here the Border Patrol employs

mobile surveillance systems that can be moved to hotspots as

needed. Agent Jaime Medina joined us in McAllen and led an

excursion into the broad fields that run alongside the levees that

crisscross the fertile floodplain next to the rio Grande.

Driving along a levee in the dark is a disconcerting experience.

The land drops away sharply into an abyss of chirping crickets,

singing frogs and other loud, gregarious creatures of the subtropi-

cal darkness. As I traveled with agents Milian

and Medina through a night in which all fields

were black, I had to strain my eyes to find some

landmark. I tried to imagine what it was like

patrolling out here with nothing but flash-

lights and a good sense of direction. We finally

came to a “scope truck,” a pickup with a 20-foot

retractable camera tower mounted on its bed.

As with the stationary tower systems, the scope

truck can shift between daylight and infrared

viewing. We were parked on a kind of promon-

THE WEIGHT

Last year along the

Mexican border, U.S.

authorities seized 2.4

million pounds of mari-

juana, 10,182 pounds

of cocaine, 4,576

pounds of heroin and

933 pounds of

methamphetamine.

Customs and Border

Patrol does not expect,

or want, to stop
everything that

crosses the border.

PSC0112_WL_Borders_FINAL.indd 63 11/15/11 11:42 AM

64 P O P U L A R S C I E N C E JA N UA R Y 2012

tory or juncture in the levee. In daylight

we no doubt would have been treated to

a spectacular view of South Texas’s agri-

cultural production. Historically, most

of these vast fields have been worked by

Mexican migrant workers, many of them

undocumented.

Border Patrol officers monitor this area

day and night, using scope trucks and also personal night-vision

equipment such as the TAM-14, a short-range thermal monocular,

and the Recon III Lite, a heavy thermal binocular, often mounted

on a tripod, that includes a laser targeting system. The laser can

guide agents wearing night-vision goggles to a group by fixing

them with a beam invisible to the naked eye but brightly appar-

ent to anyone wearing the proper eyewear. Such equipment,

which was in short supply in previous years, is now widely used.

After an impressive demonstration of the scope truck’s long-range

thermal camera, the agents offered to show me the laser; wearing

night-vision goggles, I was able to clearly see the red beam as it

targeted a spot near the river.

Airplanes, helicopters and drones can highlight targets using

similar devices to even greater effect. I later rode in a helicopter

equipped with a FLIR Star Safire HD camera that was sensitive

enough to detect the heat signature left by a body in high grass

long after the body itself had moved on. The Star Safire comes

equipped with a laser targeting system and a powerful infrared

spotlight that can be slaved to the camera, and thereby bathe

groups of aliens in a light they cannot see. As Mancillas had told

me in the Brownsville control room, “it makes a huge difference

when you can see in the dark.”

7. “WE SEE IT”

cBP DoeS noT exPecT, or want, to stop everything that crosses the

border. Facilitating the flow of commerce is central to its mission,

and as a result Laredo is, on a given day, the busiest commercial

“land port” in the U.S. When I visited the World Trade Bridge there,

the facility was nearing the end of an expansion project that would

double the number of primary lanes used to help process the 1.5

million trucks that pass through the port every year.

Jose Uribe, the port’s amiable and efficient assistant director,

described his operation as he drove us across and against oncom-

ing truck traffic, dodging and weaving like a veteran player of

Grand Theft Auto. To my inexpert eye, the scene was a chaotic riot of

monstrous trucks and looming, barn-like scanners. Five thousand

trucks a day on average, laden with every conceivable commodity—

blue jeans, auto parts destined for just-in-time delivery to a factory

in Tennessee—pass through this facility. “I’ve been in Laredo for 34

years,” Uribe told me. “I can remember back in the late ’70s we had

mostly curios, some heavy steel.” Then came nafta. “now, you name

it and we see it. everything from laptops to three-piece suits.”

As Uribe’s tour progressed, patterns began to emerge before

my untrained eyes, and I could see that the operation here was a

miracle of logistics. each vehicle, as it passed through the layered

enforcement process that began with the submission of an elec-

tronic manifest at least one hour prior to its actual arrival, was

tracked from station to station. At any point, a customs officer

could create an “issue”: tagging the shipment for more-intensive

scrutiny, which might mean submitting to a higher-resolution

x-ray scan or offloading the complete contents of a shipment.

Inspectors at the World Trade Bridge deploy an impressive

array of scanning devices, from old-fashioned low-energy x-ray

machines to backscatter and high-energy x-ray and gamma-ray

scanners. The high-energy x-rays, which inspectors used to scan

the most visually challenging commodities, produce marvelous,

almost gallery-quality images. one can see the internal structure

of a large tractor-trailer rig with hallucinatory clarity—the gears

inside a transmission, the pushrods in the engine. Uribe showed

me scans of a road roller, the kind used to compress hot asphalt,

and inside the large, dense roller wheel were packages of drugs. A

load of gypsum board was laden with marijuana, the voids inside

the pallets revealed by the scan. Scans of a southbound truck car-

rying rolls of fabric revealed suspicious areas of density; using

software-enhancement tools, the scanning technician was able

to detect the presence of $1.2 million in cash, a small fraction of

the estimated $18 billion to $39 billion that the cartels smuggle

across the border every year (of which $147 million was seized in

2010). Another scan showed packages of cocaine stamped with

the logo of the Gulf cartel.

Smugglers are often stupid, and sometimes they are greedy,

as when they attempt to cram one or two more packages into a

well-concealed cavity in a vehicle. They are just as frequently inge-

nious, however, as when they hid a load of drugs inside a large

tank of used oil, which scanners can’t penetrate. These smugglers

were perfectly aware of the limits of the technology. What they

were unable to defeat, in that case, was the power of a dog’s nose.

Dogs, at border checkpoints as well as traffic checkpoints 70 miles

from the line, have found people hidden in the engine compart-

ments of trucks, sewn sitting upright into the backseats of cars,

and in one case wedged into a modified console such that when

customs officers opened the hatch between the front seats, they

saw a man’s face staring up. JO
h

N
B
.
C
A
R
N
E
t
t

DOWN BY THE RIVER

A “sky box” mobile

surveillance platform

near McAllen, Texas,

gives agents an excel-

lent perspective, but

its mere presence also

deters smugglers from

crossing the line.

Borderworld

PSC0112_WL_Borders_FINAL.indd 64 11/15/11 11:43 AM

JA N UA R Y 2012 P O P U L A R S C I E N C E 65

8. “PASSIVE SECURITY”

AT PoRTS SeRvInG the general public, such as the much smaller

but extremely modern crossing in Del Rio, security measures are

directed not only at the endless stream of commodities that pass

through these facilities, but at the bodies of the individual people

presenting themselves for entry: their facial expressions, postures,

affect, clothing and emotional dispositions.

Sharon Ansick, a tactical logistics officer who went to high

school with my sister, gave me the grand tour of the Del Rio facil-

ity. video cameras were everywhere, 150 in all. Doors and windows

were secured, and passage in and out of facilities, as well as from

one area to another within a compound or building, was tightly

controlled. Ansick explained that this was called passive security.

everyone who entered this facility, whether they knew it or not, had

entered a panopticon. Their every move was registered, recorded,

observed, and controlled. no one could leave without permission.

Border runners would be met with road spikes that jut up from the

pavement at the push of a distress button. Few would ever realize

the degree to which their liberty had been constrained.

All incoming and outgoing license plates are photographed, and all

drivers too. All recently issued passports, green cards and day-entry cards

contain radio-frequency ID chips that broadcast the identify of a traveler

at the primary checkpoint, and the Del Rio port is

the first to deploy a special RFID lane to speed pro-

cessing. When I was there, traffic was light and lines

were short, but there was a sense of high alertness

throughout the facility. Immigration and customs

enforcement agents armed with M-4 rifles loitered

near the secondary station. Supervisory agents, in

a glass-encased control room overlooking the

traffic lanes, kept watch over the whole proceeding,

monitored the video feeds, and maintained radio

contact with personnel all over the port.

The port’s noncommercial traffic—about two million vehicu-

lar travelers and 50,000 pedestrians annually—is not routinely

scanned. Instead, cBP officers interview drivers in a primary lane

and use special angled mirrors to inspect the underside of all vehi-

cles, and if a dog sniffs something suspicious or something about

the car seems unusual, or if the driver seems nervous or simply

came from an area of interest, the officer will call for a secondary

inspection. At that point, density meters, mirrors, x-ray scanners

and the whole repertoire of what cBP terms non-intrusive inspec-

tion techniques come into play. nowadays few cars are dismantled

or drilled without evidence derived from one of these methods.

one recent seizure came about because an officer manning the

primary lane noticed that a vehicle, driven by a lone male, was

uncommonly clean. A trip to the vAcIS x-ray scanner settled the

matter. After some probing and chipping, agents discovered sev-

eral pounds of heroin and methamphetamine.

As we passed through the port, the routine business of inspection

and seizure continued all around us, and it was that routine of pas-

sive and all-encompassing surveillance that seemed to offer the most

plausible model for what Kenneth Knight’s total domain awareness

might look like. The primary question taking shape in my mind was:

Where and how would the limits of the border domain be set?

As if in answer to my silent wonderment, Ansick pointed out

that cBP enforces regulations on behalf of 44 other governmental

agencies, including the FDA, the ePA and the USDA. Inspectors go

through agricultural loads by hand, searching for tiny insects, egg

casings under leaves, and other stowaways on legitimate imports.

Palo verde wood borers show up in stacks of firewood. cattle must

be examined for Rocky Mountain spotted fever ticks. In Del Rio,

people arrive with juicy, stinky fermenting cheeses, deer heads,

oranges, cowboy boots made from endangered species like sea

turtles. The guy with the sea-turtle boots was a recent case, a

native of San Luis Potosí, the state where Jaime Zapata was mur-

dered, and the officer interviewing him just happened to notice

the boots. The boots went into a freezer, and the poor man, who

naively admitted what they were, left in his socks.

9. “DIFFERENT PURPOSE. DIFFERENT MISSION.”

eveRyWHeRe I TRAveLeD along the Rio Grande, when I asked

questions about the different devices being used on the border, my

companions invoked the name Borkowski—as in, “you’d better ask

Borkowski about that.” They were talking about Mark Borkowski,

cBP’s assistant commissioner for the office of Technology Innova-

tion and Acquisition. All the most advanced equipment, and all

the new contracts, flowed through him. So I went to the source, to

Washington, D.c. I had many questions. The week before I arrived,

Borkowski had testified before congress about the failure of SBI-

net, the infamous virtual fence, so I asked him

to elaborate. In long, well-punctuated para-

graphs, he told me the story of the program’s

genesis and its fall.

In his view, the original sin of SBInet was

a pervasive naiveté—among the general pub-

lic, the media and the government—about the

ability of technology to solve a vexing political

problem. In the years after 9/11, when the bor-

der began to be regarded with a new sense of

urgency, there was a strong feeling that some-

Smugglers are often
stupid, and sometimes
they are greedy. They
are just as frequently
ingenious, however.

PSC0112_WL_Borders_FINAL.indd 65 11/15/11 11:43 AM

66 P O P U L A R S C I E N C E JA N UA R Y 2012

thing dramatic needed to be done

and that technology, which every-

one agreed was a good thing, would

somehow provide an answer. Unfor-

tunately, Borkowski told me, no one

had a clear theory of what exactly

technology was supposed to accom-

plish. That rush to find a universal

technological solution contributed

to the failure of SBInet, which was

plagued from the very beginning

by cost overruns, delays and poor

design on the part of Boeing and

bad program management on the

part of Homeland Security. Looking

forward, the immediate goal was to

find specific technological solutions

that fit the particular challenges

of different stretches of the border.

Policy changes, such as comprehen-

sive immigration reform—which,

Borkowski hastened to point out,

was not the same thing as amnesty—

could make a huge difference as well.

If Congress would create a rational

and orderly system to match immi-

grants with jobs in a legal manner,

and if the laws against hiring undoc-

umented aliens were consistently enforced, “that would cut off a

lot of the traffic between the points of entry. In fact, at a certain

point, you would only have the really bad people left, the drug

smugglers and the terrorists.”

At that point, though, technology would continue to play a

major role. Indeed, it would most likely be every bit as transfor-

mative for border operations as air power was in military affairs.

Borkowski singled out the domestic use of unmanned aerial sys-

tems as having the most potential for radical operational change.

SBInet might have failed, but the idea behind it was sound: watch-

ing as much of the border as possible, all the time. A drone has

a different, but complementary, mission: targeted surveillance.

“A UAV can get somewhere fast, and can stay there,” he said—far

longer than a conventional aircraft—“but it looks through a soda

straw. Different purpose. Different mission.”

Leaning forward on his desk, Borkowski was quick to credit

his fellow assistant commissioner Michael Kostelnik, the retired

Air Force general who runs OAM, for pushing the deployment of

drones along the border and elsewhere. OAM

has been operating Predators in domestic air-

space for six years now and is using them in

many situations that have little or nothing to

do with border security, notably in disaster-

recovery missions after hurricanes, fires and

floods, but also in what Kostelnik (at a border

summit I later attended in El Paso) called “pop

up” missions responding to contingent home-

land-security situations. For routine border

missions, OAM operates its unmanned aircraft

with a certificate of authorization from the FAA

that permits it to fly them over the entire southwestern border, as

well as the Gulf Coast as far east as New Orleans and the northern

border from Spokane, Washington, to the western end of the Great

Lakes. The agency also has transit certificates that allow it to fly

drones across the country from one area of operations to another.

The FAA will not yet permit OAM drones to fly over large met-

ropolitan areas on a routine basis, but Kostelnik said his agency

can now secure an emergency authorization and within a day put

a Predator drone in the sky anywhere in the country.

10. “THEY CAN’T DO WHAT WE DO”

WHEN KENNETH KNIGHT was in Brownsville to coordinate air

support for the Zapata funeral, one of his prime objectives had been

to set up the helicopter video feed, which was transmitted by direct

downlink to a microwave antenna he had installed on the roof of

the Border Patrol station. While I was there, Knight had pulled up

the Big Pipe portal on a Border Patrol PC, logged in, and within a few

mouse clicks we had that helicopter feed on the screen. The same

feed could be pushed out through the Big Pipe

to a local sheriff, the FBI, or any one of the hun-

dreds of other local, state and federal “customers”

with whom Knight works regularly. “We’re doing

some really cool shit,” he had explained.

Several weeks later at his spartan office in

Washington, Knight gave me the more compre-

hensive briefing he had promised. As things now

stood, sitting at his own desk or at any registered

computer (or tablet or smartphone) anywhere in

the world, Knight could click from a feed origi-

nating from a helicopter or a Predator or a P3

The primary
question was: Where
and how would the
limits of the border

domain be set? fR
O

m
T

O
P

:
G

A
R

y
W

IL
L

IA
m

S
/

G
E

T
T

y
I
m
A
G
E

S
;

JO
h
N
B
.
C
A
R
N
E
T
T

THE LONG VIEW

Customs and Border

Protection’s “Big Pipe”

surveillance system

will soon integrate video

from river cameras along

the border with

data from unmanned

aerial vehicles.

continued on page 81

Borderworld

PSC0112_WL_Borders_FINAL.indd 66 11/15/11 11:43 AM

surveillance plane to any other feed, includ-

ing a new test sight—a DHS camera pointed

at a security line inside Hartsfield-Jackson

Atlanta International Airport. Click, scroll,

click; just like that.

I asked Knight how this might all work

in practice, and he described a hypothetical

mission in which a Guardian drone (the mar-

itime version of the Predator) encounters an

unidentified watercraft in the waters off

Miami. The Big Pipe enables all the people

from all the agencies who have an interest

in the mission to be logged in simultane-

ously, each one watching the same video

feed in real time, along with the same charts

and maps and other mission data. The OAM

drone operator might not be able to identify

the craft, but a Coast Guard analyst could

pronounce his take on the matter without

having to wait for the pilot to verbalize what

he thinks he’s seeing on the water.

That all sounded useful and efficient,

but the real advantage, Knight continued,

was not just being able to see things; it

was being able to switch perspectives on

the fly. Say the target vessel is approach-

ing Miami, a major metropolitan area and

therefore off limits. The drone could hand

off the target to a manned Dash 8 aircraft.

Then, as the vessel enters the port, it could

be handed off again, now to fixed video

cameras, whereupon ground personnel

could also play a role. One platform can’t

do it all—the air assets can’t stay airborne

forever or go wherever you want them; the

still cameras can’t move—“but if you start

putting all these camera systems together,

you’ve functionally closed the gap.”

It was becoming clear that the

Big Pipe, with its persistent and per-

vasive surveillance capacity and its

ability to archive everything into an

easily accessible mission data package

for intelligence analysis, could soon out-

strip the command-and-control software

used by American soldiers in war zones

around the world. Knight wasn’t just talk-

ing about a specific operational zone like

the Rio Grande Valley sector or the waters

off the coast of Florida. He was target-

ing a much larger domain: the national

air radar picture and the coastal marine

surface radar picture, not just the sur-

veillance cameras in the ports and along

the border but also the surveillance cam-

eras in metropolitan areas—airports,

train stations, on the side of buildings,

anywhere—such that the theater of

operations was expanded to the widest

possible extent. This broad spectrum of

surveillance was really what Knight had

in mind when he told me about total

domain awareness, an operating picture

that encompassed pretty much the entire

country. Total domain awareness meant

the ability to apply these tools, at will and

as needed, anywhere in the U.S.

As I listened to Knight describe his

vision, I recalled Borkowski’s skepticism

about the ability of technology, by itself,

to solve our border problems. It wasn’t

clear, for example, that a fully robust Big

Pipe could have prevented the gun that

was purchased near Dallas and later killed

Jaime Zapata from ending up in the Zetas’

arsenal—unless, of course, the movement

of goods and people inside our borders

were managed with the same rigor we

apply to the traffic crossing the border.

That level of operational control is beyond

reach for now, but judging from the logis-

tical expertise I saw demonstrated at the

World Trade Bridge, it is far from unat-

tainable. In October, a DHS official named

Mariko Silver, testifying before Congress

on border security, would make a similar

point, explaining that President Obama’s

border-security policy “requires us to

move beyond seeing border management

as simply guarding or policing the juris-

dictional line between the United States

and Mexico. The border and the interior

are inextricably linked.”

The mission of securing our national

borders has thus become indistinguishable

from a new and still emerging under-

standing of what constitutes homeland

security. The border has become a labora-

tory in which new security techniques can

be perfected and where military tactics

can be adapted for domestic application.

Indeed, it is hard to avoid the conclusion

that the border is slowly expanding to fill

the entire continent.

Knight had tried to explain all of this

to me back in Texas, but at that point I

hadn’t fully understood what he meant.

Now I could see. “The military does some

of the same stuff, but they can’t do what

we do. They work in the classified world.

We actually cross domains,” he had said.

“We are paving the way.”

Roger D. Hodge is the former editor of

Harper’s Magazine and the author of The

Mendacity of Hope. He lives in Brooklyn.

OVER 2000 FUN HANDS-ON ACTIVITIES

MORE THAN 100 STAGE SHOWS

EXPO & BOOK FAIR
APRIL 28 & 29, 2012

GRAND FINALE

WALTER E. WASHINGTON CONVENTION CENTER,

WASHINGTON, D.C.

USASCIENCEFESTIVAL.ORG

A FREE EVENT

MEET AWARD-WINNING AUTHORS AND

SCIENCE CELEBRITIES LIKE BILL NYE

THE SCIENCE GUY

NEW THIS YEAR:

CAREER PAVILION & BOOK FAIR

FESTIVAL HOST:

PROUD SPONSOR:

continued from page 66

JA N UA R Y 2012 P O P U L A R S C I E N C E 81

Borderworld

PSC0112_WL_Borders_FINAL.indd 81 11/15/11 11:43 AM

Copyright of Popular Science is the property of Bonnier Corporation and its content may not be copied or

emailed to multiple sites or posted to a listserv without the copyright holder’s express written permission.

However, users may print, download, or email articles for individual use.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy