Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Another Predator Drone Added to U.S.-Mexico Border as DHS Sums Up Progress

August 30, 2010

U.S. Department of Homeland Security (DHS) Secretary Janet Napolitano announced today that Predator Unmanned Aerial System (UAS) flights will begin out of Corpus Christi, Texas, beginning on Wednesday, Sept.1. With the deployment of an UAS in Texas, DHS unmanned aerial capabilities will now cover the Southwest Border—from the El Centro Sector in California all the way to the Gulf of Mexico in Texas—providing critical aerial surveillance assistance to personnel on the ground.

The new, border-wide use of the Predator aircraft, comes on the heels of the recently passed Southwest border security supplemental legislation, which will provide two additional UASs that will bolster these newly expanded operations.

These UAS efforts are just the latest steps in the historic approach—and unprecedented amount of resources – that the President and this Administration have directed to the southwest border since launching the Southwest Border Initiative in March 2009. Since then, the U.S. Department of Homeland Security has doubled the number of personnel assigned to border enforcement security task forces; tripled the number of Immigration and Customs Enforcement officers working along the U.S.-Mexico border; quadrupled deployments of border liaison officers; and begun screening 100 percent of southbound rail shipments for illegal weapons, drugs, and cash.

In addition, the President has authorized the deployment of an additional 1,200 National Guard troops to the border to provide intelligence surveillance and reconnaissance, and immediate support to counternarcotics enforcement while Customs and Border Protection recruits and trains additional officers and agents to serve on the border. The Administration is dedicating $600 million in new funding to enhance security technology at the border, share information and support with state, local, and tribal law enforcement, and increase federal law enforcement activities at the border. That effort will include the deployment of more agents, investigators, and prosecutors as part of a coordinated effort with states and cities to target illicit networks trafficking in people, drugs, illegal weapons, and money.

Among the progress achieved to date:

1 – Expand Unmanned Aircraft Systems operations to cover the entire Southwest Border.

Results: On Sept. 1st, CBP will expand Unmanned Aerial Systems (UAS) flight operations, covering all Southwest border states and providing critical aerial surveillance assistance to personnel on the ground.

2 – Dedicate historic levels of personnel to the Southwest border.

Results: The Border Patrol is better staffed than at any time in its 86-year history, having nearly doubled the number of agents from approximately 10,000 in 2004 to more than 20,000 today – including more “boots on the ground” in Arizona than ever before. Immigration and Customs Enforcement (ICE) has also deployed a record number of agents to the Southwest border with more than a quarter of its personnel deployed in this region, doubling the number of agents assigned to Border Enforcement Security Task Forces and tripling the number of ICE intelligence analysts working along the U.S.-Mexico border. Further, President Obama has ordered the deployment of 1,200 National Guard troops to the Southwest border to contribute additional capabilities and capacity to assist law enforcement agencies.

3 – Deploy additional technology and complete fencing construction along the Southwest border.

Results: Over the past 17 months, CBP has deployed additional Z-Backscatter Van Units, Mobile Surveillance Systems, Remote Video Surveillance Systems, thermal imaging systems, radiation portal monitors, and license plate readers to the Southwest border. DHS has also completed 646.5 miles of fencing out of nearly 652 miles mandated by Congress, including 298.5 miles of vehicle barriers and 348 miles of pedestrian fence, with the remaining construction scheduled to be complete by the end of 2010.

4 – Increase outbound inspections to interdict illegal weapons, drugs, and cash leaving the United States.

Results: In addition to placing an increased emphasis on screening southbound vehicle traffic, CBP began screening 100 percent of southbound rail shipments for illegal weapons, drugs, and cash – for the first time ever. These enhanced outbound inspections have yielded more than $39.2 million in southbound illegal currency – an increase of more than $29.4 million compared to 2008.

5 – Increase seizures of drugs, weapons, and currency to disrupt the operations of transnational criminal organizations.

Results: In 2009, DHS seized more than $103 million in illegal currency, more than 1.7 million kilograms of drugs and more than 1,400 firearms – increases of more than $47 million, more than 450,000 kilograms of drugs and more than 300 firearms compared to 2008.

6 – Deter illegal immigration through unprecedented investments in border security.

Results: Illegal border crossings have been significantly reduced, as apprehensions of illegal aliens decreased from 723,825 in FY2008 to 556,041 in FY2009, a 23 percent reduction, in part as the result of increased security along the southwest border.

7 – Increase employer audits to deter violations of employment verification laws and protect American workers.

Results: Since Jan. 2009, DHS has audited more than 2,785 employers suspected of hiring illegal labor, debarred more than 100 companies and 80 individuals, and issued more than $6.4 million in fines—more than the total amount of audits and fines issued in the entire previous administration.

8 – Deploy Secure Communities technology to all southwest border communities.

Results: The Obama Administration has expanded the Secure Communities initiative—which uses biometric information to identify criminal aliens in state prisons and local jails to expedite removal proceedings—from 14 to 567 locations, including all jurisdictions along the Southwest border. DHS expects to expand this program nationwide by 2013. As of July 31, 2010, this program had identified more than 287,500 aliens in jails and prisons who have been charged with or convicted of criminal offenses, including more than 43,000 charged with or convicted of major violent or drug offenses (level 1 offenses). Through Secure Communities, over 37,900 convicted criminal aliens have been removed from the United States, including more than 10,800 convicted of major violent or drug offenses (level 1 offenses).

9 – Target criminal aliens who pose a threat to public safety.

Results: The Obama Administration has fundamentally reformed immigration enforcement, focusing on identifying and removing criminal aliens who pose a threat to public safety. Overall, criminal removals/returns increased by almost 22,000 between FY 2008 and FY 2009, a 19 percent increase. So far this fiscal year, ICE has removed a record 170,000 criminals from the U.S. DHS will continue to increase focus on removing those convicted of crimes who pose a threat to the safety of communities.

10 – Boost funding for Southwest border infrastructure, technology, and law enforcement.

Results: The recent passage and signing of Southwest border security supplemental legislation will provide critical additional capabilities to secure the Southwest border at and between our ports of entry and reduce the illicit trafficking of people, drugs, currency and weapons. This law provides $14 million for improved tactical communications systems along the Southwest border and $32 million for two additional CBP unmanned aircraft systems – in addition to $176 million for an additional 1,000 Border Patrol agents to be deployed between ports of entry; $68 million to hire 250 new Customs and Border Protection (CBP) officers at ports of entry and to maintain 270 officers currently deployed to ports of entry; and $6 million to construct two forward operating bases along the Southwest Border to improve coordination of border security activities.

DHS and the General Services Administration (GSA) are also directing more than $400 million in Recovery Act funding to the Southwest border, including funds for:

Port and other infrastructure projects in Otay Mesa, California; Antelope Wells, New Mexico; Los Ebanos, Amistad Dam, Falcon Dam and Corpus Christi, Texas; and Nogales, Arizona.

Non-Intrusive Inspection Equipment at Southwest border ports of entry, including both low energy and large-scale systems;

Modernized tactical communications equipment for the El Paso and Rio Grande Valley Sectors; and

Tested, commercially available security technology including thermal imaging devices, ultra-light detection, backscatter units, mobile radios, cameras and laptops for pursuit vehicles, and Remote Video Surveillance System enhancements.

Further, DHS has increased the funds state and local law enforcement can use to combat border-related crime through Operation Stonegarden—a DHS grant program designed to support state, local, and tribal law enforcement efforts along our nation’s borders. Based on risk, cross-border traffic and border-related threat intelligence, nearly 83 percent of 2009 and 2010 Operation Stonegarden funds – more than 124 million dollars – went to Southwest border states, up from 59 percent in 2008.

Tweet your comments at http://twitter.com/securitymag

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!