Name:
Legal issues
Professor:
Institution:
Date:
Drug Trafficking at the Southwest Border
Government of united states gets a multi-billion dollars, in the illegal drug market. Based on recent research, 10.6% of the state’s population age 12 or older is found to have used illicit drugs. The drug enforcement administration, DEA reports that transnational criminal organizations from Mexico are the one dominating the U.S illegal drug market. TCOs are the one responsible for production and transportation of illicit drugs to north across the U.S-Mexico border.
In the process of countering drug trafficking, at the Southwest border, there are various associations formed. For example, the Organized Crime Drug Enforcement Task Force (OCDETF). The program targets drug trafficking and money laundry.
Another program called High-Intensity Drug Trafficking Areas (HIDTA) provides financial support for federal, state, local and tribal law enforcement agencies that operate in the regions where drug trafficking is critical. The 116th Congress may have a number of ways to deal with drug trafficking. These options include whether the policymakers will examine federal drug control agencies. Also, Congress wants to know if Trump will support existing strategies in the process of curbing drug trafficking. Kristin, (2019)
Energy Infrastructure Security
Due to immigration, there have been security threats against the current natural gas, oil and other refined products at the U.S. These threats have risen concerns to the federal linkage programs to provide security. In December 2018, the Government Accountability Office, coined that since the terrorist attack of September 11, 2001, the department of energy is no longer safe against security threats. Another security risk has evolved that is cyber-attacks. Preparedness act of the pipeline and LNG Facility Cybersecurity (H.R. 370, S. 300) requires Secretary of Energy to enable government agencies and the energy sector in pipeline security to work together in curbing this insecurity by supporting the development of cybersecurity applications and related technologies. Paul, (2019).
.
.