Main Content

Syllabus

CRIMJ 435 Border Security (3)

Border Security (3) This course provides knowledge about the government organizations charged with securing the sovereign borders of the United States, the laws and policies they enforce, and the geopolitical, economic, and legal issues they face.


The information contained on this page is designed to give students a representative example of material covered in the course. Any information related to course assignments, dates, or course materials is illustrative only. For a definitive list of materials, please check the online catalog 3-4 weeks before the course start date.

Overview

This is an advanced course intended to address the complex issues surrounding a key component of homeland security: securing the nation's borders. The goal is to provide the homeland security professional with a body of knowledge regarding threats to the security of international borders and the issues which cause those threats. The course focuses on three areas:

  1. infrastructure of the United States border security apparatus, historical development of that apparatus and federal laws pertaining to border security
  2. socio-political forces perpetuating contemporary threats to U.S. sovereignty
  3. specific discussions of current threats to the U.S. border
An inter-disciplinary understanding of complex border issues is presented, emphasizing critical thinking, policy analysis, and current research. The opportunity to examine a key issue in depth through a research paper is required.

The Border Security course provides depth of knowledge of key border issues for homeland security professionals.  The course achieves this goal by focusing on border integrity strategies, the motivation and nature of criminal organizations which violate borders, the policies established by governments to maintain border integrity, identification of the key players in maintaining the border, and the relevant legal issues in enforcing laws on the border.   This course allows the student to apply principles and concepts of homeland security to a specialized and very relevant area. Understanding of key principles will be measured through preparation of a written analysis of a key border security issue, with alternative strategies consistent with current policy and legal constraints.

 

Course Objectives

By the end of this course, students should be able to:

  1. Demonstrate an understanding of the motivations, means, and methods of criminal organizations which threaten the integrity of the United States border, either for profit or for cause.
  2. Demonstrate an understanding of the broad range of federal policies and procedures enacted to protect the United States border throughout our nation's history.
  3. Demonstrate an understanding of the organizations involved in border security, how they are organized, how they interrelate, and their specific roles. This includes federal organizations, such as the Department of Homeland Security and Department of Defense, the National Guard, and state and local law enforcement agencies.
  4. Interpret, analyze, and evaluate ill-defined border security issues and responses.
  5. Demonstrate a depth of knowledge of border security issues and concepts, from which to advise on future homeland security issues as a leader in the field.

Required Course Materials

Most World Campus courses require that students purchase materials (e.g., textbooks, specific software, etc.). To learn about how to order materials, please see the Course Materials page. You should check LionPATH approximately 3–4 weeks before the course begins for a list of required materials.

This course requires that you access Penn State library materials specifically reserved for this course. You can access these materials by selecting Library Resources in your course navigation, or by accessing the Library E-Reserves Search and search for your instructor's last name.

Library Resources

Many of the University Libraries resources can be utilized from a distance. Through the Libraries website, you can

  • access magazine, journal, and newspaper articles online using library databases;
  • borrow materials and have them delivered to your doorstep—or even your desktop;
  • get research help via email, chat, or phone using the Ask a Librarian service; and
  • much more. 

You must have an active Penn State Access Account to take full advantage of the Libraries' resources and service.  The Off-Campus Users page has additional information about these free services.


Using the Library

Many of the University Libraries resources can be utilized from a distance. Through the Libraries website, you can

  • access magazine, journal, and newspaper articles online using library databases;
  • borrow materials and have them delivered to your doorstep—or even your desktop;
  • get research help via email, chat, or phone using the Ask a Librarian service; and
  • much more. 

You must have an active Penn State Access Account to take full advantage of the Libraries' resources and service.  The Off-Campus Users page has additional information about these free services.


Technical Requirements

For this course we recommend the minimum World Campus technical requirements listed below:

Technical Requirements
Operating System

Canvas, Penn State's Learning Management System (LMS), supports most recent versions of Microsoft Windows and Apple Mac operating systems. 

To determine if your operating system is supported, please review Canvas' computer specifications.

Browser

Canvas supports the last two versions of every major browser release. It is highly recommended that you update to the newest version of whatever browser you are using.

Please note that Canvas does not support the use of Internet Explorer. Students and instructors should choose a different browser to use.   

To determine if your browser is supported, please review the list of Canvas Supported Browsers.


Note: Cookies must be enabled, and pop-up blockers should be configured to permit new windows from Penn State websites.
Additional Canvas Requirements For a list of software, hardware, and computer settings specifically required by the Canvas LMS, please review Canvas' computer specifications.
Additional Software

All Penn State students have access to Microsoft Office 365, including Microsoft Office applications such as Word, Excel, and PowerPoint.

Students will need a PDF reader, such as Adobe Reader.

Hardware

Monitor: Monitor capable of at least 1024 x 768 resolution
Audio: Microphone, Speakers
Camera (optional, recommended): Standard webcam - many courses may require a webcam for assignments or exam proctoring software.

Mobile Device (optional) The Canvas mobile app is available for versions of iOS and Android. To determine if your device is capable of using the Canvas Mobile App, please review the Canvas Mobile App Requirements.


Student Education Experience Questionnaire (SEEQ)

During the semester you will receive information for completing the Student Education Experience Questionnaire (SEEQ). Your participation is an opportunity to provide anonymous feedback on your learning experience. Your feedback is important because it allows us to understand your experience in this course and make changes to improve the learning experiences of future students. Please monitor email and course communications for links and availability dates.


One of the benefits of being a registered Penn State student is that you are eligible to receive educational discounts on many software titles. If you are interested in learning more about purchasing software through our affiliate vendor, please visit the Technology and Software page.

If you need technical assistance at any point during the course, please contact the Service Desk.

For registration, advising, disability services, help with materials, exams, general problem solving, visit World Campus Student Services!


 

Course Requirements and Grading

This course consists of a variety of assignments and activities that have been organized into the folowing categories (see table below). 

Grade Categories
Category Percentage
Discussions 20%
Writing Assignments 20%
Quizzes 30%
Research Paper 30%
Total 100%
Grading Scale

The following grading scale will be used to determine your final grade in the course (see table below).

Grade Scale
Grade Percentage
A 100% - 94%
A- <94% to 90%
B+ <90% to 87%
B <87% to 84%
B- <84% to 80%
C+ <80% to 76%
C <76% to 70%
D <70% to 60%
F <60% to 0

Please refer to the University Grading Policy for Undergraduate Courses for additional information about University grading policies.

If, for reasons beyond the student's control, a student is prevented from completing a course within the prescribed time, the grade in that course may be deferred with the concurrence of the instructor. The symbol DF appears on the student's transcript until the course has been completed. Non-emergency permission for filing a deferred grade must be requested by the student before the beginning of the final examination period. In an emergency situation, an instructor can approve a deferred grade after the final exam period has started. Under emergency conditions during which the instructor is unavailable, authorization is required from one of the following: the dean of the college in which the candidate is enrolled; the executive director of the Division of Undergraduate Studies if the student is enrolled in that division or is a provisional student; or the campus chancellor of the student's associated Penn State campus.

For additional information please refer to the Deferring a Grade page.

Course Assignments

The following table provides an at-a-glance look at the point value for each assignment type. Additional descriptions of each assessment type are also provided.

Assignment Breakdown
Assignment Point Value Total Points
Writing Assignments (12) 10 pts each 120
Discussions (12) 10 pts each 120
Quizzes (3)  100 each 300
Research Paper: . 160
Topic Selection 10 .
Abstract 10 .
Final Paper 140 .
. Total Point Value 700
Quizzes

There will be three multiple choice quizzes during the course to assess your mastery of the material. Quizzes must always be completed by the individual student, without outside assistance (with the exception of any documented accommodations) within the time period allotted.

Writing Assignments

There are twelve different writing assignments throughout this course. While the assignments vary from lesson to lesson, they have all been designed to prompt reflection and critical thinking about key issues related to border security. Your written assignment submissions should be at least two pages, double space, 12 point font, in an MS Word format.

Research Paper

Students will conduct independent research in an area of border security which interests them. The topic can be a particular population, crime, component of the criminal justice system, policy, etc. The paper should be at least 12-15 pages double spaced, APA format.

The final paper will be due in lesson 15; however, you will be working on this paper throughout the entire course. You will be asked to select your topic in Lesson 3. Following the topic selection, you will be collecting and analyzing information. An abstract summary of this research is due in Lesson 6.

Discussion & Participation

There are twelve discussion forums in this course. The purpose of the discussion forums is to encourage communication and to foster peer to peer learning. The effectiveness of the discussion forum depends on the quality and quantity of your contributions. For maximum points to be assigned for the online discussions, the student should provide one original post, answering each question asked in the assignment, and referencing any course readings or outside references in APA format.

Students should expect this post to be long enough to occupy about 1 page or more as an MS Word document, not counting citations. In addition, students are generally expected to provide a helpful, respectful, and knowledgeable reply to at least two other students’ posts. Simply saying “your post is great” or “I agree” is not sufficient.

Students who are having trouble developing a more substantial response are encouraged to search the university library or the internet for news stories and articles which may inform a more substantial reply. These should be cited in APA format as well. 

Course Schedule

Note: All due dates reflect North American eastern time (ET).

Course Schedule

Note that assignments are due based on the Eastern Time zone (ET). This ensures that all students have the same deadlines regardless of where they live.

  • Course begins:
  • Course ends:
  • Course length: 
Course Introduction
Orientation

Timeframe:

 

Readings:

  • Course Syllabus

Assignments:

  1. Review Orientation to Canvas Materials.
Lesson 1: Introduction to Contemporary Infrastructure of the Department of Homeland Security and Related Agencies
Lesson 1

Timeframe:

 

Readings:

Other Readings

  • United States Senate, Committee on Homeland Security and Governmental Affairs (2013). Border Security: Frontline Perspectives on Progress and Remaining Challenges
    • Required: Download and read member and witness statements
    • Optional: Watch the video of the testimony.
  • McConnell, F. (2010). The Fallacy and Promise of the Territorial Trap. Geopolitics, vol 15(4), 762 - 768.

Assignments:

  1. Scavenger Hunt Writing Assignment
  2. Measuring the Success of Bordering Discussion
Lesson 2: National Sovereignty and US Customs Law
Lesson 2

Timeframe:

 

Readings:

Other Readings

  • Bector, S. (2009). "Your Laptop, Please" The Search and Seizure of Electronic Devices at the United States border 
  • Clark, M.W. (August 2004). U.S. land border search authority. FBI Law Enforcement Bulletin, vol 7(8). Retrieved from: FBI Law Enforcement Bulletin: http://www.fbi.gov/publications/leb/leb.htm.
     

Assignments:

  1. "Your Laptop Please" Writing Assignment
  2. How Intrusive is Too Intrusive? Discussion
Lesson 3: History of US Immigration Law
Lesson 3

Timeframe:

 

Readings:

Other Readings

  • Deportation of Criminal Aliens - A Geopolitical Perspective
  • Svirnovskiy, S. (2017). Finding a Right to Remain: Immigration, deportation, and due process. Northwestern Journal of Law and Social Policy, vol 12(3).
  • Jordan, M. (January 8, 2018). Trump administration says that nearly 200,000 Salvadorans must leave. The New York Times Online. Retrieved from: https://www.nytimes.com/2018/01/08/us/salvadorans-tps-end.html?partner=bloomberg

Assignments:

  1. Deportation: Myth vs Reality Writing Assignment
  2. TPS Discussion
Lesson 4 Federal and International Maritime Law 
Lesson 4

Timeframe:

 

Readings:

Other Readings

  • 19 U.S.C. 1701-1711. (2002). Anti-Smuggling Act of 1935. (pp. 1039-1043).
  • Bowerman, M. (December 11, 2017). U.S. Coast Guard intercepts semi-submersible vessel packed with 3,800 pounds of cocaineUSA Today.
  • U.S. Department of Transportation (nd). Aviation Smuggling Investigators Handbook.
  • Casavant, A.J. (2017). In defense of the Maritime Drug Law Enforcement Act. Harvard National Security Journal, vol 8.

Assignments:

  1. Aviation Smuggling Redux Writing Assignment
  2. Coast Guard Seizure of Submersible Discussion
Lesson 5: Quiz One
Lesson 5

Timeframe:

 

Readings:

N/A

Assignments:

  1. Quiz One
  2. Research Paper Topic
Lesson 6: Dependency and Modernization Theories; Engines of Contraband and Exploitation
Lesson 6

Timeframe:

 

Readings:

Other Readings

  • Ferraro, V. (July 1996). Dependency theory: An introduction. Mount Holyoke College.
  • Lipset, S.M. (March 1959). Some social requisites of democracy: Economic development and political legitimacy. American Political Science Review, vol 53(1), pp 69 - 105.
  • Kazeem, Y. (January 30, 2018). A legal loophole has enabled years of environmental damage by global oil companies in Nigeria. Quartz Africa.

Assignments:

  1. Dependency and Modernization in Africa Writing Assignment
  2. Social Science Perspectives at the Border Discussion
Lesson 7: Migration Theory and Stratification; Sources of Border Security Threats
Lesson 7

Timeframe:

 

Readings:

Other Readings

  • Everett, Lee. (1966) A Theory of Migration. Demography, vol 3(1), pp 47-57.
  • Matsueda, R. L. (July 1988) The current state of differential association theory. Crime & Delinquency, vol. 34(3), pp 277 - 306.
  • Hirschmann, C. (July 18, 2004). Migration and National Security
  • Piore, M. (May, 1986). The shifting grounds for immigration. The Annals of the American Academy of Political and Social Science, vol 485. pp 23 - 33.
  • Raphelson, S. (January 30, 2018). Border Patrol Faces Backlash from Aid Groups Over Migrant Death. Here & Now, npr Special Series. Retrieved from:  https://www.npr.org/2018/01/30/581879808/border-patrol-faces-backlash-from-aid-groups-over-migrant-deaths.

Assignments:

  1. Immigration Labor Market Writing Assignment
  2. Differential Association on the Border Discussion
Lesson 8: International Terrorism
Lesson 8

Timeframe:

 

Readings:

Other Readings

  • Bruno, A. (September 16, 2016). Syrian refugee admissions and resettlement in the United States: In brief. Congressional Research Service.
  • Rabasa, A., et al (2009). The Lessons of Mumbai

Assignments:

  1. Vetting Refugees Writing Assignment
  2. Lessons from Mumbai Discussion
Lesson 9 The International Illicit Narcotics Industry
Lesson 9

Timeframe:

 

Readings:

Other Readings

  • Beittel, J (2013). Mexico’s Drug Trafficking Organizations: Source and Scope of the Violence
  • Department of the Treasury Financial Crimes Enforcment Network (February 18, 2010). Advisory to financial institutions on filing suspicious activity reports regarding trade-based money laundering.
  • DHS - ICE (November 23, 2010). ICE takes down Puerto Rican drug lord, dismantles largest drug trafficking organization in the Caribbean 

Assignments:

  1. Drug Trafficking and Recruitment Writing Assignment
  2. Money Laundering Discussion
Lesson 10: Quiz Two
Lesson 10

Timeframe:

 

Readings:

N/A

Assignments:

  1. Quiz Two
  2. Research Paper Abstract
Lesson 11: Human Trafficking and Modern-Day Slavery
Lesson 11

Timeframe:

Readings:

Other Readings

  • Bliss, K. (2009). Trafficking in the Mesoamerican Corridor
  • ​IACP guidebook. Developed by the Office on Violence Against Women, U.S. Department of Justice for the International Association of Chiefs of Police.
  • Radden Keefe, P. (April 24, 2006). The snakehead. The New Yorker Magazine.
  • UNODC United Nations Office on Drugs and Crime. (2011). Anti-human trafficking manual for criminal justice practitioners. 

Assignments:

  1. Human Trafficking Writing Assignment
  2. The Snake Head Discussion
Lesson 12: Illegal Immigration: Benefit or Burden?
Lesson 12

Timeframe:

 

Readings:

Other Readings

  • Motivans, M. (2013). Federal Justice Statistics 2010

Assignments:

  1. Federal Justice Statistics and Immigration Writing Assignment
  2. What to Do About Illegal Immigration Discussion
Lesson 13: Transnational Gangs - Local and National Threats
Lesson 13

Timeframe:

 

Readings:

Other Readings

  • National Gang Intelligence Center (2015) 2015 NGIC Gang Report. 

Assignments:

  1. Criminal Street Gangs Written Assignment Writing Assignment
  2. When the Gang Comes Home Discussion
Lesson 14 Weapons of Mass Destruction and Counter-Proliferation
Lesson 14

Timeframe:

 


NOTE: This time frame includes two lessons. Please refer to the next lesson for additional readings and activities due.

Readings:

Other Readings

  • Harbaugh, E. E. (2004). Proliferation Security Initiative. Strategic Insights, vol 3(7). (The article is titled The Proliferation Security Initiative: Counterproliferation at the Crossroads). 
  • Shea, D. & Gottron, F. (April 17, 2013). Ricin: Technical background and potential in terrorism. CRS report for Congress

Assignments:

  1. Catching Arms Dealers Writing Assignment
  2. The Greatest Threat Discussion
Lesson 15: Quiz Three
Lesson 15

Timeframe:

 

Readings:

N/A

Assignments:

  1. Quiz Three
  2. Research Paper Submission
Note: If you are planning to graduate this semester, please communicate your intent to graduate to your instructor. This will alert your instructor to the need to submit your final grade in time to meet the published graduation deadlines. For more information about graduation policies and deadlines, please go to the Graduation Information on the My Penn State Online Student Portal.

Formal instruction will end on the last day of class. Provided that you have an active Penn State Access Account user ID and password, you will continue to be able to access the course materials for one year, starting from the end date of the academic semester in which the course was offered (with the exception of library reserves and other external resources that may have a shorter archival period). After one year, you might be able to access the course based on the policies of the program or department offering the course material, up to a maximum of three years from the end date of the academic semester in which the course was offered. For more information, please review the University Course Archival Policy.

Academic Integrity

According to Penn State policy G-9: Academic Integrity , an academic integrity violation is “an intentional, unintentional, or attempted violation of course or assessment policies to gain an academic advantage or to advantage or disadvantage another student academically.” Unless your instructor tells you otherwise, you must complete all course work entirely on your own, using only sources that have been permitted by your instructor, and you may not assist other students with papers, quizzes, exams, or other assessments. If your instructor allows you to use ideas, images, or word phrases created by another person (e.g., from Course Hero or Chegg) or by generative technology, such as ChatGPT, you must identify their source. You may not submit false or fabricated information, use the same academic work for credit in multiple courses, or share instructional content. Students with questions about academic integrity should ask their instructor before submitting work.

Students facing allegations of academic misconduct may not drop/withdraw from the affected course unless they are cleared of wrongdoing (see G-9: Academic Integrity ). Attempted drops will be prevented or reversed, and students will be expected to complete course work and meet course deadlines. Students who are found responsible for academic integrity violations face academic outcomes, which can be severe, and put themselves at jeopardy for other outcomes which may include ineligibility for Dean’s List, pass/fail elections, and grade forgiveness. Students may also face consequences from their home/major program and/or The Schreyer Honors College.

How Academic Integrity Violations Are Handled
World Campus students are expected to act with civility and personal integrity; respect other students' dignity, rights, and property; and help create and maintain an environment in which all can succeed through the fruits of their own efforts. An environment of academic integrity is requisite to respect for oneself and others, as well as a civil community.

In cases where academic integrity is questioned, the Policy on Academic Integrity indicates that procedure requires an instructor to inform the student of the allegation. Procedures allow a student to accept or contest a charge. If a student chooses to contest a charge, the case will then be managed by the respective college or campus Academic Integrity Committee. If that committee recommends an administrative sanction (Formal Warning, Conduct Probation, Suspension, Expulsion), the claim will be referred to the Office of Student Accountability and Conflict Response.

All Penn State colleges abide by this Penn State policy, but review procedures may vary by college when academic dishonesty is suspected. Information about Penn State's academic integrity policy and college review procedures is included in the information that students receive upon enrolling in a course. To obtain that information in advance of enrolling in a course, please contact us by going to the Contacts & Help page .


Accommodating Disabilities

Penn State welcomes students with disabilities into the University's educational programs. Every Penn State campus has resources for students with disabilities. The Student Disability Resources (SDR) website provides contacts for disability services at every Penn State campus. For further information, please visit the SDR website.

In order to apply for reasonable accommodations, you must contact the appropriate disability resources office at the campus where you are officially enrolled, participate in an intake interview, and provide documentation based on the documentation guidelines. If the documentation supports your request for reasonable accommodations, your campus's disability resources office will provide you with an accommodation letter. Please share this letter with your instructors and discuss the accommodations with them as early in your courses as possible. You must follow this process for every semester that you request accommodations.


Additional Policies

For information about additional policies regarding Penn State Access Accounts; credit by examination; course tuition, fees, and refund schedules; and drops and withdrawals, please see the World Campus Student Center website.

  1. Students are responsible for online course content, taking notes, obtaining other materials provided by the instructor, taking tests (if applicable), and completing assignments as scheduled by the instructor.  As a general rule, students should plan on logging into the course at least three times per week and spending at least three hours per course credit per week on the course, e.g., if the course is three credits, the student should plan on spending at least 9-12 hours per week on the course, just as they would in a residence course.
  2. Students are responsible for keeping track of changes in the course syllabus made by the instructor throughout the semester.
  3. Students are responsible for monitoring their grades.
  4. Students must contact their instructor (and teammates when working on any collaborative learning assignments) as soon as possible if they anticipate missing long periods of online time due to events such as chronic illnesses, death in the family, business travel, or other appropriate events. The instructor will determine the minimal log on time and participation required in order to meet course responsibilities. In the event of other unforeseen conflicts, the instructor and student will arrive at a solution together.
    1. Requests for taking exams or submitting assignments after the due dates require documentation of events such as illness, family emergency, or a business-sanctioned activity.
    2. Conflicts with dates on which examinations or assignments are scheduled must be discussed with the instructor or TA prior to the date of the examination or assignment.
  5. Students are responsible for following appropriate netiquette (network etiquette) when communicating with their instructor and classmates. For reference, see the Academic Success Kit.
  6. Behaviors that disrupt other students’ learning are not acceptable and will be addressed by the instructor.
  7. For severe and chronic problems with student disruptive behavior, the following will be applied for resolution:
    1. Senate Committee on Student Life policy on managing classroom disruptions: Office of Student Accountability and Conflict Response.
    2. Penn State Principles

Veterans and currently serving military personnel and/or dependents with unique circumstances (e.g., upcoming deployments, drill/duty requirements, VA appointments, etc.) are welcome and encouraged to communicate these, in advance if possible, to the instructor in the case that special arrangements need to be made.

If you have a crisis or safety concern, mental health services are available to you as a Penn State student. Crisis and emergency contacts are available, no matter where you are located:

Penn State takes great pride to foster a diverse and inclusive environment for students, faculty, and staff. Acts of intolerance, discrimination, or harassment due to age, ancestry, color, disability, gender, gender identity, national origin, race, religious belief, sexual orientation, or veteran status are not tolerated and can be reported through Educational Equity via the Report Bias webpage.

In order to protect your privacy, course access is limited to those individuals who have direct responsibility for the quality of your educational experience. In addition to the instructor, a teaching assistant or college administrator may be provided access in order to ensure optimal faculty availability and access. World Campus technical staff may also be given access in order to resolve technical support issues.

Top of page