Академический Документы
Профессиональный Документы
Культура Документы
Abstract: The Northern and Southern borders of the United States are comprised of
over 7.458 miles consisting upwards of over 109 official ports of entry, admitting
over 1.050.000 visitors a year (Wasem et.al, p. 2). The men and women of the United
States border patrol must meet the challenge of safeguarding our border from the
non-criminal illegal aliens, drugs, as well as the emergent threat of terrorism. Over
the past nine years, much has been done to increase the workload of the Customs and
Border Patrol (CBP); with little forethought to the need of increased man-power
and/or the development of a validated risk management strategy that supports the
abundance of dollars that has been spent on penetrable systems such as physical
fences.
27
Current Efforts
Efforts to strengthen border security were in effect long before the institution
of the Department of Homeland Security. In 1994, CBP implemented a program
titled Operation Gatekeeper, where tiers of agents were assigned to various points
within the San Diego Sector (Center for American Progress, p. 8). However, this
effort was isolated and expensive, resulting in Congress and the CBP realizing that a
more comprehensive approach to strengthening our border was necessary. Resulting
28
in 1996, the Illegal Reform and Illegal Immigrant Responsibility Act which gave the
government full authority to install additional physical security barriers. This method
of physical security has met substantial resistance as many contend that it does not
do an effective job of keeping illegal aliens out. As discussed in Securing Our
Borders, research conducted by the Center for Comparative Immigration Studies
shows that 97 percent of illegal immigrants are successful in penetrating the fences
on their second and/or third attempt.
The Homeland Security Act of 2002 positioned the Department of Homeland
Security (DHS) as the primary federal agency responsible for securing our borders.
Within DHS is the Directorate of Border and Transportation Security (BTS), which
is charged with securing the borders, territorial waters, terminals, waterways, and air,
land, and sea transportation systems of the United States (Seghetti, p. 4). These
efforts are supported by the Bureau of Customs and Border Protection (CBP),
Immigration and Customs Enforcement (ICE), Immigration and Naturalization
Services (INS), the U.S. Border Patrol, Animal and Plant Health Inspection Services
(APHIS), the United States Coast Guard (USCG), and the Transportation Security
Administration (TSA).
Current policies at the border can be separated into two major categories:
people related security and goods related border security (Seghetti, p. 4).
Investigations have found that the 9/11 terrorists entered the United States through the use of
29
Department has stepped up their security posture when issuing visas by doubling the
names and amount of information on the lookout system.
30
U.S. VISIT Program. In 2004 to further meet the challenges of the new
asymmetrical threats posed by international and domestic terrorist alike the
Department of Homeland Security (DHS) embarked on an ambitious journey to
institute a $10 billion dollar program titled US-VISIT. This program is intended to
create a virtual border that can screen the millions of foreign travelers who enter and
leave the U.S.
Western Hemisphere Travel Initiative. Requires U.S. and Canadian travelers
to present a passport and/or other form of document that denotes identity and
citizenship when entering the U.S., this program is a result of the Intelligence
Reform and Terrorism Prevention Act of 2004 (IRTPA). The goal of WHTI is to
facilitate entry for U.S. citizens and legitimate foreign visitors, while strengthening
U.S. border security. Standard documents will enable the Department of Homeland
Security to quickly and reliably identify a traveler.
Immigration and Nationality Action Section 287 (g). The Illegal Immigration
Reform and Immigration Responsibility Act (IIRAIRA), effective September 30,
1996, added Section 287 (g), performance of immigration officer functions by state
and local officers and employees, to the Immigration and Nationality Act (INA).
Section 287 (g) authorizes the secretary of the U.S. Department of Homeland
Security (DHS) to enter into memorandums of understanding (MOU) to allow
designated officers to perform immigration law enforcement activities provided that
the officers and/or employees have received appropriate training and function under
the supervision of a sworn U.S. Immigration and Customs Enforcement (ICE)
officers. The program provides a flexible solution for ICE and state and local law
enforcement agencies to combat terrorism and criminal activities conducted by
illegal aliens.
31
11 stowaways were found on a containers ship originating from the Caribbean entering the US. The
individuals aboard were said to be seeking a better life here in the U.S. While these individuals were
not focused on nefarious acts, this shows the ease in which stowaways can enter the US aboard
container ships.
8
Pre-arrival Processing System (PAPS) is a U.S. Customs and Border Protection (CBP) system
designed to provide CBP with advance information on goods entering the U.S. It expedites
clearances, reduces traffic congestion at ports of entry and enables CBP to perform risk assessment
and clearance in advance of goods arriving at the border. Shipments entering the U.S. at overland
ports of entry along the Canada - U.S. border must utilize the Pre-Arrival Processing System (PAPS),
the Border Release and Selectivity System (BRASS) or the FAST National Customs Automation
Program (FAST/NCAP) procedures.
9
The Automated Broker Interface (ABI) is a component of the U.S. Customs Service's Automated
Commercial System that permits qualified participants to electronically file required import data with
Customs. ABI is a voluntary program available to brokers, importers, carriers, port authorities, and
independent service centers. Currently, over 96% of all entries filed with Customs are filed through
ABI.
10
FAST is a joint program between Canada and the United States to enhance security at the border
while keeping the shared border open to the free flow of identified low risk shipments. The FAST
program relies on the integrity of the supply chain, technology and in identifying shipments that are
low risk.
11
CBP provides sensors to selected importers to be secured inside a container. The sensors can detect
32
secure containers. Under this program officers are sent to participating ports to
collaborate with host nations to identify and pre-screen high risk cargo.
Customs-Trade Partnership Against Terrorism. Initiated in April 2002 and
offers importers expedited processing of cargo if they comply with CBP
requirements for securing their entire supply chain. This program is a self assessment
that is reviewed by CBP officials so that they gain and understanding of the
companys security policy and posture. Based on the review the company and CBP
official will work together to address any security concerns and/or further reduce the
companys risk score.
Recommendations
As with any issue there must be direct documentation and information
available to all persons who have a vested interest in border security. This is not
limited to border States and federal agencies who play an active role in securing our
border; but each and every state and federal agency who have critical infrastructure
and key resources that can be targets to those intent on executing nefarious acts
within the United States. Iessence border security is a National issue that impacts
each and every State and local, federal, and private sector partners alike. Since the
attacks of September 11, policy doctrine such as the Target Capability List (TCL)12
and the National Response Framework13 has articulated what needs to be
strengthened in order to safeguard the Homeland from another attack. The key
elements of the TCL such as Planning, Risk Management, and Information Sharing
and Dissemination all have direct feeds into the Border Security. By strengthening
these areas and developing a formulated and comprehensive risk management
strategy that has governmental and private sector support, would limit the vast
whether the container has been tampered with prior to entry into the US.
12
The Target Capabilities List identifies the thirty six capabilities required to prevent, protect against,
respond to, and recover from incidents of national significance. The list also establishes the plans,
procedures, system relationships, training/exercises, and mutual aid agreements required to do so. The
list partitions the thirty six target capabilities into five broad categories: Common Target Capabilities,
Prevent Mission Area Target Capabilities, Protect Mission Area Target Capabilities, Respond Mission
Area Target Capabilities, and Recover Mission Area Target Capabilities.
13
The National Response Framework presents the guiding principles that enable all response partners
to prepare for and provide a unified national response to disasters and emergencies - from the smallest
incident to the largest catastrophe. The Framework establishes a comprehensive, national, all-hazards
approach to domestic incident response.
33
amount of dollars spent on failed systems such as the CAPP II. However, prior to
spending down of dollars on physical and virtual systems that are able to be
circumvented by the technological savvy and well funded/connected terrorist,
spending the money on information sharing networks and man-power would equally
enhance border security.
Over the past nine years information sharing has increased, however it is
nowhere near the levels needed to counter the shadowy threat of terrorism. What
makes terrorist cells hard to counter is that they are able to operate with little to no
chatter/intelligence until the time of the looming attack. In many cases, any
information found that is shared with all stakeholder agencies provides the impacted
area needed information to possibility counter the attack. I recommend that key
stakeholder work in concert to build an information sharing matrix that identifies a
single system, with redundancies, to disseminate pertinent information with each
other. The current argument is that the information supports an active investigation,
however, the reality is that traditional and non-traditional response agencies alike on
the lookout for nefarious activity have a better chance of mitigating a threat than law
enforcement on its own.
The FY2011 budgetary constraints have resulted in drastic cuts in CBP and
USCG personnel; however their mission has been increased. These two entities work
in tandem to safeguard our borders, a cut in man-power, but an increased in mission
focus will result in less time being spent on forward thinking and planning to
continue to enhance our border security posture.
To further enhance border security posture we must be able to expand our
screening and immigration control mechanisms. I contend that continued support and
direct funding for the 287 (g) program as a Freedom of Information Act request
dated 12 July 2005 Judicial Watch.org reveals that since its first implementation by
the Florida Department of Law Enforcement in 2002 and subsequent implementation
programs by Alabama Department of Public Safety, Arizona Department of
Corrections, Los Angeles County Sheriffs Department and the San Bernardino
County Sheriffs Department; each agency have been able to track the success of 287
(g)s implementation based on their specific needs. The documents show that there is
between a 1.3-1.9 percent difference between Federal indictments and Federal
34
convictions and less than a 0 and 2.5% percent difference between state arrests and
state convictions
35
operating in the state (Koback, 2005); to mitigate this that the state of Alabama
addressed the man-power shortfall by adding and implementing section 287 (g) and
committing its own officers.
What costs and tradeoffs does the security solution impose? The addition and
implementation of 287 (g) by state and local law enforcement agencies does not
require that their effort be placed strictly on the identification and processing of
undocumented aliens, instead it also provides a manner in which to combat violent
gang sects. This effort can be seen in Los Angeles area. Mara Savatrucha-13 (MS13) is one of the most violent, notorious, and fastest growing alien gang in the
country. It currently operates in over 33 states in the U.S., ranging from metropolitan
areas such as Los Angeles, CA to rural towns such as Wauchula, FL. Because the
number of the gang members are illegal aliens a robust and effective enforcement of
immigration laws would substantially mitigate the number of gang members thus,
violent crimes committed. Operation Community Shield in Las Angeles is a picture
of success resulting in over 103 MS-13 member arrests with approximately half
having prior arrest records for violent crimes (Kobach, 2005).
The average costs to support cross-discipline training of local and state law
enforcement officers and employees on average is $519.58 [287 (g) FOIA response].
This cost supports the student attending the 5-week 287 (g) Delegation of Authority
training, travel, student handouts, workbooks, training material, and law books; the
owning agency will pay for salary costs during the 5-week period. Information
Technology support and expenses needed to access the ICE database are funded by
ICE. Support and administration of designated law enforcement agents and
employees are administered by ICE. These cost savings are far greater than the
incarceration and re-incarceration of illegal aliens.
What are the risks? As with any security program there are inherit risks.
However, the risks for the 287 (g) program are lessened by the overall increase in
security posture that the program provides.
1.
36
Security
with
respect
to
Homeland
Security
What other risks does the security solution cause? Although I would contend
that there are minimal risks with supporting this security solution, the reality is that if
the aforementioned risks are realized, the focus of local law enforcement lends to
terrorist and criminals alike exasperating the vulnerability of law enforcement manpower; thus enhancing local threat levels.
37
References
Carafoano, J., (March) 2006, Heritage Foundation, Retrieved February 3, 2009.
Available
at:
http://www.heritage.org/Research/HomelandSecurity/upload/94536_1.pdf,
25.11.2010.
Center for American Progress, (April) 2010, Securing Our Borders, Retrieved 1
April,
2010.
Available
at:
http://www.americanprogress.org/issues/2010/04/secure_borders.html,
18.10.2010.
Hanley, R., (September) 1994, 11 Stowaways Found on Ship in Container,
Retrieved
April,
2010.
Available
at:
Ensuring the
Retrieved
February
4,
2009.
Available
at:
http://www.cairco.org/articles/art2005jul27_testimony_kobach.pdf,
18.10.2010.
Office of Pubic Affairs, Department of Homeland Security, (August 16) 2006,
Section 287 (g) Immigration and Nationality Action. A Law enforcement
Partnership,
Retrieved
February
1,
2009.
Available
at:
http://www.ice.gov/doclib/pi/news/factsheets/060816dc287gfactsheet.pdf,
25.11.2010.
Neto, B., (May) 2005, Border Security: Key Agencies and Their Missions, Library of
Congress, Washington D.C.
Seghetti, L., Lake, J., Robinson, W., (March) 2005, Border and Transportation
Security: Selected Programs and Policies, Library of Congress, Washington,
D.C.
38
39