Border security in the United States explained

In the United States, border security includes the protection of ports, airports, and the country's 3017miles land border with Canada and 1933miles border with Mexico.

Central to U.S. national security, border security incorporates responses to issues such as terrorism, illegal immigration, smuggling, and human trafficking. The Department of Homeland Security (DHS), established after the September 11 attacks, is the primary institution responsible for adapting border security measures to counter perceived threats effectively.

The U.S. approach to border security has evolved in response to incidents like the 9/11 terrorist attacks, which triggered extensive policy reforms to increase the resources provided for homeland protection. These reforms also included the tightening of visa issuance procedures and stricter border controls, accompanied by ongoing debate over the balance between open borders and national security, especially on the politically sensitive US-Mexico border.

Historical context

Immediately after the events of September 11, 2001, the Federal Government placed a higher priority on homeland security, such as intelligence reform. Following 9/11, the border security apparatus was heavily scrutinized and became the target of public criticism. Moreover, border security issues drew additional criticism from the public and from senior officials in the government after it emerged that the 9/11 hijackers held temporary U.S tourist visas,[1] which allowed legal entry into the US.[2] Following the 2001 attacks, various measures have been implemented to increase border security, including the creation of the Department of Homeland Security (DHS) in 2002, as well as a number of other new policies and procedures.

Threats of terrorism

Land borders

The sheer sizes of both the Canada–US and Mexico–US borders present the Federal Government's security forces with challenges with regards to their ability to protect the homeland. According to a 2004 report from the Congressional Research Service, there are "great difficulties in securing the many points through which people and goods may enter legally, and the thousands of miles of ‘lines’, thinly guarded stretches of coasts and land borders which entry is illegal."[3]

Given the phenomenon of undocumented migration at the U.S.-Mexico border, some government officials and political candidates have made public statements referring to the threat of terrorists crossing the Southwest border.[4] [5] The Washington Office on Latin America Border Fact Check blog has pointed out that the Mexico section of the State Department's 2012 Country Reports on Terrorism notes that "No known international terrorist organization had an operational presence in Mexico and no terrorist group targeted U.S. citizens in or from Mexican territory".[6] In 2011, the DHS affirmed that it did not have "any credible information on terrorist groups operating along the Southwest border".[7]

Ports

The Federal Government faces threats to national security through its many ports. As part of her testimony at a Congressional Hearing on container security, JayEtta Hecker, Director for Physical Infrastructure Issues at the Government Accountability Office, said "drugs and illegal aliens are routinely smuggled into this country, not only in small boats but also hidden among otherwise legitimate cargoes on large commercial ships. These same pathways are available for exploitation by a terrorist organization or any nation or person wishing to attack us surreptitiously."[8] Ms. Hecker's testimony also touched on the fact that the sheer number of cargo containers that enter the United States augments this threat.[9] According to the March 2008 edition of Scientific American, more than 42 million 20feet containers enter U.S. ports each year.[10]

Airports

More than 87 million people enter the U.S. every year through airports, which makes them a primary point of entry for potential terrorists. For example, in May 2012, the Central Intelligence Agency (CIA) revealed that it uncovered a plot to bring down a commercial plane using explosive devices. According to the CIA, these plans belonged to members of Al-Qaeda.[11] [12]

Current policies and security mechanisms

Land borders

In a 2008 article for the Manhattan Institute, Rudolph Giuliani argued that border security was one of the most critical issues facing the United States, and should by monitored by a single organization that embraced CompStat, the organizational philosophy of the NYPD.[13] A myriad of agencies guard U.S. land borders, including the United States Border Patrol, U.S. Immigration and Customs Enforcement (ICE), the DHS, and the National Guard.[14]

The DHS has completed nearly 700 miles of fencing along the borders,[15] and, as of 2011, 20,700 border patrol agents were employed to guard the border.[15] [16] In addition, the Border Patrol now has more than 18,300 agents deployed on both the southern and northern border. The DHS uses technology along the border such as unattended ground sensors, truck-mounted mobile surveillance systems, remote video surveillance systems, unmanned aerial systems, fixed- and rotary-wing aircraft, and the Augmented Integrated Surveillance Intelligence System (ISIS).[17]

Ports

From 2001 to 2006, the Federal Government increased funding for port security by 700%.[18] This increase in funding allowed the DHS to implement a defense in depth against external threats. U.S. Customs and Border Protection, the U.S. Coast Guard, Terminal Operator, and the Port Authority shared responsibility for providing security at U.S. ports. In 2006, those agencies screened all cargo entering the country. U.S. Customs and Border Patrol utilized X-ray, gamma ray machines, and radiation detection devices to screen cargo, operating over 680 radiation portal monitors and over 170 large scale non-intrusive inspection devices. In addition, there were more than 600 canine teams that could "identify narcotics, bulk currency, human beings, explosives, agricultural pests, and chemical weapons" working U.S. ports of entry.

Airports

Due to the massive numbers of travelers, and the consequent pressure for airport security mechanisms to be quick, efficient, and effective, the DHS has implemented the Automated Targeting System, a data mining program. The Automated Targeting System works by collecting information from airlines such as passport data, credit card numbers, and identity information. That information is then run against a list of known terrorists, phone numbers connected to terrorist cells, and other pertinent intelligence data.[19]

On November 19, 2001, the United States passed the Aviation and Transportation Security Act, creating the Transportation Security Administration (TSA), and requiring airlines to pass information on all U.S. bound travelers to the DHS. This data is fed into the Automated Targeting System,[20] and helps TSA, FBI, CIA, and other organizations to create the Selectee and No Fly List.

In addition to the ATS System, another mechanism to deter terrorists is utilized in case they are not detected by the flagging protocols. Federal Air Marshals are the law enforcement branch of the Transportation Security Administration. They fly either in uniform or incognito and act as the law enforcement while on board to protect passengers and crew members from criminals and terrorists.[21]

The Secondary Security Screening Selection system flags passengers for extra surveillance while in the airport but does not prohibit them from flying. These individuals, often referred to as "selectees", are pulled aside at security checkpoints and searched thoroughly. Their luggage may be hand searched. Individuals are added to the lists through airport screening processes. Individuals are potentially flagged if they have purchased a ticket in cash, purchased a ticket within the previous 24 hours, purchased a one-way ticket, or arrived with no baggage.[22]

Starting in March 2010, the TSA begin a wide-scale deployment of full body scanners, in addition to metal detectors, to physically screen airline passengers.[23]

No Fly List

The No Fly List, a comprehensive list of individuals prohibited from flying into or out of the United States, has exponentially grown in size. The List existed before 9/11 but only contained the names of 16 people and now lists over one million names. The List includes high-profile individuals such as the Bolivian President and other foreign dignitaries. The List still contains 14 out of the 19 September 11 hijackers and several other deceased individuals.[24]

The system occasionally leads to a "false positive" which is the accidental flagging of individuals that have similar names to suspected terrorists or are on the List for illegitimate reason. In some cases, children under the age of five have been flagged as suspects. It contains many common names such as Gary Smith or Robert Johnson which makes traveling very difficult for all individuals with that name. Several U.S. congressmen have name matches on the list including Senator Ted Kennedy, who has subsequently been stopped at airports. The List does not include the names of individuals involved in the liquid explosive terrorist attack attempt. TSA also reported that some of the names of the most dangerous terrorists are not on the list in case the List is leaked. Daniel Brown, a U.S. Marine returning from Iraq, was denied entry into the United States because his name matched one on the list. He later found out that he had been flagged on a previous flight for having gunpowder residue on his boots which was likely acquired during an earlier tour of duty in Iraq.[25]

Impact of US-Mexico border security policies

Between 2010 and 2012, the DHS seized almost 75% more money, over a third more narcotics, and nearly double the weapons seized between 2006 and 2008 along the south-west border.[26] In the same period, south-west border states have experienced an average 40% drop in violent crime rates, and the four major cities with the lowest crime rates in the US are all in border states.

See also

Notes and References

  1. Web site: Identity and Immigration Status of 9/11 Terrorists . March 14, 2011 . February 2004 . Federation for American Immigration Reform.
  2. Web site: Background: U.S. Land Border Crossing Updated Procedures . March 14, 2011 . September 16, 2008 . US Department of Homeland Security . Beginning January 31, 2008 the Department of Homeland Security is: 1. Ending oral declarations at the border, except in extraordinary situations, 2. Accepting a list of about two dozen types of documents at the border instead of the over 8,000 documents currently being accepted.
  3. Port and Maritime Security: Background and Issues for Congress . Frittelli, John F. . 2005 . The terrorist attacks of September 11, 2001 heightened awareness about the vulnerability to terrorist attack of all modes of transportation. Port security has emerged as a significant part of the overall debate on U.S. homeland security. The overarching issues for Congress are providing oversight on current port security programs and making or responding to proposals to improve port security. . Congressional Research Service.
  4. News: Pallack. Becky. Grijalva slams Saucedo Mercer on 'Middle Easterner' comments (updated). Arizona Daily Star. August 29, 2012 . September 24, 2012.
  5. News: Isacson. Adam. Are terrorists crossing the border "from time to time?". Border Fact Check. Washington Office on Latin America. September 24, 2012.
  6. Web site: Country Reports on Terrorism: Western Hemisphere Overview. Country Reports on Terrorism. United States Department of State. September 24, 2012.
  7. News: Goerdt. Ana. Do terrorists use the U.S.-Mexico border to enter the United States?. Border Fact Check. Washington Office on Latin America. September 24, 2012.
  8. Web site: Container Security: Current Efforts to Detect Nuclear Materials, New Initiatives, and Challenges . March 15, 2011 . Hecker, JayEtta Z. . November 18, 2002 . United States General Accounting Office . United States Government . 3 . As indispensable as the rapid flow of commerce is, the terrorist attacks of September 11th have served to heighten awareness about the supply system’s vulnerability to terrorist actions. Drugs and illegal aliens are routinely smuggled into this country, not only in small boats but also hidden among otherwise legitimate cargoes on large commercial ships. These same pathways are available for exploitation by a terrorist organization or any nation or person wishing to attack us surreptitiously. The Brookings Institution reported in 2002 that a weapon of mass destruction shipped by container or mail could cause damage and disruption costing the economy as much as $1 trillion.3 Port vulnerabilities stem from inadequate security measures as well as from the challenge of monitoring the vast and rapidly increasing volume of cargo, persons, and vessels passing through the ports. Against this backdrop, it is not surprising that various assessments of national security have concluded that the nation’s ports are far more vulnerable to terrorist attacks than the nation’s aviation system, where most of the nation’s efforts and resources have been placed since September 11th..
  9. With more than 6 million containers a year entering U.S. ports, examining them all has not been possible. Instead, Customs has acknowledged that its approach relies on reviewing shipping manifests, invoices and other commercial documents, and intelligence leads to target approximately 2 percent of the containers that enter the country nationwide for physical inspection, though the actual percentage varies from port to port.
  10. Detecting Nuclear Smuggling . March 15, 2011 . Cochran, Thomas B. . McKinzie, Matthew G. . March 24, 2008 . 298 . 4 . 98–102, 104 . Scientific American. 10.1038/scientificamerican0408-98 . 18380147 . 2008SciAm.298d..98C.
  11. Alcorn, J. (2012, December 5). Airport security. The New York Times.
  12. Web site: A Jihadist's Tale . https://web.archive.org/web/20050329030017/http://www.time.com/time/magazine/article/0,9171,1042473,00.html . dead . March 29, 2005 . March 15, 2011 . MacLeod, Scott . March 28, 2005 . Time Magazine . Time Inc. . After he was denied entry at Chicago's O'Hare International Airport for apparently falsifying details on his visa application, al-Banna's life took a turn that led him down the path of radical Islam and ultimately to join the insurgency against the U.S. in Iraq. His odyssey ended on March 3 when al-Banna's brother Ahmed received a call on his cell phone from a man identifying himself as "one of your brothers from the Arab peninsula"--the term radical Islamists use to signify the core of the Muslim world, centered on the holy city of Mecca. Al-Banna's family says that as far as they knew, Ra'ed was in Saudi Arabia working at a new job. But the voice on the other end sounded Iraqi, Ahmed says. "Congratulations," the caller told him. "Your brother has fallen a martyr.".
  13. Web site: The Resilient Society . March 15, 2011 . Giuliani, Rudolph W. . Winter 2008 . City Journal . The Manhattan Institute . It’s also past time to rethink aviation security and to stop frisking toddlers and grandmothers trying to get onto planes. Instead, good intelligence, behavior analysis, biometrics, and trustedtraveler programs can help speed legitimate travelers through airports. For example, I don’t think that the Transportation Security Administration needs to spend much time searching Senator Ted Kennedy before he boards a plane—which is what the TSA did in August 2004 because a person on a watch list had a similar name. The federal Terrorist Watch List, which still has incomplete and inaccurate information, needs a serious cleanup..
  14. News: Archibold . Randal C. . 2010-05-25 . Obama to Send Up to 1,200 Troops to Border . 2024-02-22 . The New York Times . en-US . 0362-4331.
  15. News: Alden . Edward . Roberts . Bryan . 2011-06-16 . Are U.S. Borders Secure? . 2024-08-16 . Foreign Affairs . en-US . 90 . 4 . 0015-7120.
  16. Web site: Border Security and Immigration Enforcement Fact Sheet . March 14, 2011 . October 23, 2008 . US Departmentr of Homeland Security . Each day at America's ports of entry U.S. Customs and Border Protection officers inspect more than 1.1 million travelers, including 340,000 vehicles and over 85,000 shipments of goods approved for entry; process more than 70,000 truck, rail and sea containers; collect more than $88 million in fees, duties, and tariffs; seize more than 5,500 pounds in illegal narcotics; and intercept more than 4,400 agricultural items and pests at ports of entry. . https://web.archive.org/web/20110327015949/http://www.dhs.gov/xnews/releases/pr_1224777640655.shtm . March 27, 2011 . dead . mdy-all.
  17. Web site: Inspections and Surveillance Technologies – Extended . March 15, 2011 . May 5, 2005 . US Customs and Border Protection . Department of Homeland Security . [ISIS] consist of the Remote Video Surveillance (RVS) camera systems, sensors, and the Integrated Computer Assisted Detection (ICAD) database. ISIS serves to detect intrusion, aid in agent dispatching, and estimating attempts of illegal entry. . https://web.archive.org/web/20100410043043/http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/port_security/fact_sheet_cbp_securing.xml . April 10, 2010 . dead . mdy-all.
  18. Web site: Fact Sheet: Securing U.S. Ports . March 15, 2011 . February 22, 2006 . Department of Homeland Security . The Administration has dramatically strengthened port security since 9/11. * Funding has increased by more than 700% since September 11, 2001. * Funding for port security was approximately $259 million in FY 2001. * DHS spent approximately $1.6 billion on port security in FY 2005. Following 9/11, the federal government has implemented a multi-layered defense strategy to keep our ports safe and secure. New technologies have been deployed with additional technologies being developed and $630 million has been provided in grants to our largest ports, including $16.2 million to Baltimore; $32.7 million to Miami; $27.4 million to New Orleans, $43.7 million to New York/New Jersey; and $15.8 million to Philadelphia. . https://web.archive.org/web/20110327042404/http://www.dhs.gov/xnews/releases/press_release_0865.shtm . March 27, 2011 . dead . mdy-all.
  19. Baker. 7.
  20. Web site: Laurance. Castelli. Privacy Impact Assessment, CBP Automated Targeting System. Department of Homeland Security. March 26, 2011. ATS-Passenger (ATS-P) is the module used at all U.S. airports and seaports receiving international flights and voyages to evaluate passengers and crewmembers prior to arrival or departure. It assists the CBP officer’s decision-making process about whether a passenger or crewmember should receive additional screening prior to entry into or departure from the country because the traveler may pose a greater risk for violation of U.S. law. The system analyzes the Advance Passenger Information System (APIS) data from TECS, Passenger Name Record (PNR) data from the airlines, TECS crossing data, TECS seizure data, and watched entities. ATS-P processes available information from these databases to develop a risk assessment for each traveler. The risk assessment is based on a set of National- and user-defined rules which are comprised rule sets that pertain to specific operational/tactical objectives or local enforcement efforts..
  21. "TSA: Frequently Asked Questions." TSA. Nov 16, 2008 TSA: Privacy . April 22, 2007 . dead . https://web.archive.org/web/20070427205030/http://www.tsa.gov/research/privacy/faqs.shtm . April 27, 2007. >.
  22. "TSA: Mythbuster." Weblog post. TSA Watch List. July 14, 2007. Nov 16, 2008 .
  23. Web site: Advanced Imaging Technology (AIT) . TSA . March 26, 2011 . dead . https://web.archive.org/web/20120311010041/http://www.tsa.gov/approach/tech/ait/index.shtm . March 11, 2012.
  24. The 9/11 Commission Report : Final Report of the National Commission on Terrorist Attacks upon the United States. New York: Norton Paperbacks, 2004.
  25. Web site: 2006-04-12 . ‘No-fly’ list delays Marine's Iraq homecoming . 2024-08-16 . NBC News . en.
  26. Web site: National Southwest Border Counternarcotics Strategy . Nov 20, 2014 . 2013 . Office of National Drug Control Policy . https://web.archive.org/web/20170122090840/https://obamawhitehouse.archives.gov/sites/default/files/ondcp/policy-and-research/southwest_border_strategy_2013.pdf . January 22, 2017 . live . mdy-all.