Counterfeit Documents

Read Complete Research Material

COUNTERFEIT DOCUMENTS

Counterfeit Documents

Counterfeit Documents

Introduction

Recently the news has focused on all the blood being shed on our southern border. While there is no doubt that this activity is scary and real, these gangs have to be a little lower key when they perform their day-to-day operations. In order to do this, they need to blend in with the rest of us. When setting up residence to operate their illegal businesses, these criminals need to appear legitimate. The way they do this is with a wide variety of counterfeit documents. These counterfeit documents enable the rest of the illegal activity to occur, which makes them a weapon that could be a lot more dangerous than an assault rifle, IED or RPG. Although the news media is drawing attention to this problem (yet again) because of the violence on the border, the violence and resulting concerns about border security are nothing new. Neither is the use of counterfeit documents by the criminal's crossing over the border and setting up residence in the United States. (Mark, 2004, 181)

A Case Study: Counterfeit Documents Enable Dangerous Criminal Activity

Research Method

For this study we have utilized the qualitative research approach. Qualitative research is much more subjective than quantitative research and uses very different methods of collecting information, mainly individual, in-depth interviews and focus groups. However, since this research study is a secondary qualitative research the data that has been collected for qualitative analysis has been through an extensive review of literature that has been published in the field in the past few years.

Secondary research is often less costly than surveys and is extremely effective in acquiring information about peoples' communications needs and their responses to and views about specific communications. It is often the method of choice in instances where quantitative measurement is not required.

Literature Selection Criteria

The selection criteria for the literature were twofold: relevance and the year of publication.

Search Technique

Libraries including online databases were accessed to get the most relevant and updated literature. Some of the online databases that were used are: EBSCO, Emerald, Blackwell, etc.

Case Analysis

A PBS Frontline story from 2001 illustrates the worst case scenario of this problem. It details how terrorists are specifically trained to use counterfeit documents to move across borders. The story states that using counterfeit documents is part of the security training of Al Qaeda operatives. This story also states that the terrorists affiliate themselves with organized criminal syndicates that smuggle humans and provide counterfeit documents to accomplish this. (Mark, 2004, 181)

If an undesirable person has documents that appear to be legitimate, it's no problem to cross a border or set up residence in a neighborhood just about anywhere.

Because of this, the plea bargain made with Pedro Castorena-Ibarra — who allegedly masterminded the production of high quality counterfeit documents from coast to coast — is an interesting chapter in the long running border security saga. Quite simply, these counterfeit documents enable all kinds of criminal and some say, potential terrorist activity.

At one time, Pedro Castorena-Ibarra was considered one of ICE's ...
Related Ads
  • Crime Report
    www.researchomatic.com...

    ... as fraud, crime in the financial sector, ...

  • Business
    www.researchomatic.com...

    This document assesses the domestic and exter ...

  • Counterfeit Drug Market
    www.researchomatic.com...

    The World Health Organization (WHO) defines counterf ...

  • Cyber Security
    www.researchomatic.com...

    Hacker hardware such as keystroke recorders enable h ...

  • Proprietary Rights
    www.researchomatic.com...

    ... one has to observe respect for the other& ...