Tuesday, August 30, 2005

Lessons learned after 9/11 regarding terrorist travel

This morning on C-Span2 the Center for Immigration Studies held a panel discussion at the National Press Club. There were two reports given and my focus here is on the one given by Janice Kephart, former counsel to the 9/11 Commission and the author of 9/11 and Terrorist Travel: A Staff Report of the National Commission on Terrorist Attacks Upon the United States.
Here's my gripe. My criticism of the conclusions of her report is that it seems to ignore the fact that even if all the rules were properly enforced, the fact is millions of individuals are streaming across our open borders every year. This is the greatest threat we face and we should first secure the border with Mexico as a priority. This Administration and President do not want to take this action because the business lobby is strong in this country. It makes profits from these illegal workers at the expense of legal aliens, who followed the rules, stood in line and waited to come to the land of opportunity. Janice needs to put her report in this context.

Read her Conclusion which I have taken from their report that I draw your attention to:

"Conclusion

The attack of 9/11 was not an isolated instance of al Qaeda infiltration into the United States. In fact, dozens of operatives both before and after 9/11(other than the 9/11 hijackers) have managed to enter and embed themselves in the United States, actively carrying out plans to commit terrorist acts against U.S. interests or support designated foreign terrorist organizations. For each to do so, they needed the guise of legal immigration status to support them. Al Qaeda has used every viable means of entry. The longer the duration of the permissible length of stay granted by the visa or the adjustment of status to permanent residency or naturalization, the easier the terrorist could travel both within and without the United States. No matter what the terrorist organization or mission, it is clear from this study that terrorists will continue to try to come to the United States to carry out operations, and their instructions will continue to include immigration-related plans.

Those who come to stay and embed themselves into communities throughout the United States will continue to rely on a false guise of legality. Sham marriages and student status that lead to legal permanent residency and an almost certain guarantee of naturalization will likely continue to be some of the most egregious immigration abuses by terrorists. It must therefore be a prerequisite for any strategy that seeks to attain border security to include the United States Citizenship and Immigration Service (USCIS) in fraud prevention and national security agendas.

Risk management as well as targeting and pattern analysis will help assure that tight resources are used more efficiently to target immigration benefit applications that may pose a national security risk. In addition, law enforcement agencies with criminal jurisdiction, such as the Bureau of Immigration and Customs Enforcement (ICE) and FBI-run Joint Terrorism Task Forces, must consider such investigations as priorities. Once it is discovered that a naturalized citizen is a terrorist, denaturalization should be automatically put in motion with a streamlined appeals process that harnesses the talents of both ICE and DOJ legal expertise.

To address fraud effectively, immigration benefits adjudicators must have access to comprehensive, biometrically based immigration histories that include information from the moment an individual first applies for a visa at a U.S. consulate or presents a passport at a port of entry through every subsequent request for an immigration benefit. USCIS needs to have a fully electronic applications process with biometrics embedded into each application and required on site interviews. Adequate human resources will be necessary to fulfill such a mandate while efficiently processing applications. Well-trained fraud specialists should be available at every immigration benefits center with access to the Forensic Document Lab. The practical result is that USCIS should not have to rely solely on fees for upgrading its data systems, technologies, security vetting procedures and other necessary national security tasks. Budgets must be allocated.

Also critical are security background checks, with real-time access to federal, state, and local law enforcement information upon request. The more access that is given to the national security or law enforcement information that exists on a foreign national, the less we will need to rely upon unwieldy name-based watchlists. The more security measures the United States incorporates into its own adjudications of immigration benefits before they are granted, the more success the United States will have in rebuffing terrorists who seek to embed here.

Underpinning practical improvements at USCIS must be a commitment to enforce the law with better and more resources. Better resources include clearer guidelines for processing immigration benefits in order to eliminate the arbitrary decision-making that inevitably takes place in their absence. In addition, comprehensive immigration reform must entail, in the long run, not only streamlining the overly complex immigration laws, but also providing sufficient human and technological resources to enforce the law on the border and in USCIS immigration benefits centers.

These recommendations should not be considered in a policy vacuum. Comprehensive immigration reform that includes review of all elements of our immigration security infrastructure seven fragments dispersed through six agencies) must be vigorously debated and addressed now. However, that does not mean that we should wait to provide sorely needed technological, informational, and human resources to our frontline personnel at U.S. consulates abroad, at our ports of entry, and our borders. Severe deficiencies have existed in these areas for years that must be redressed now; what we still lack are the metrics to determine exactly what measures will provide the best value on tight border budgets. We must find a way to acquire that information to assure our border system provides the value the American people deserve and have the right to demand."

0 Comments:

Post a Comment

<< Home

Technorati Profile