Disrupting Terrorist Travel: Safeguarding America's Borders Through Information Sharing : Joint Hearing Before the Subcommittee on Infastructure and Border Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, Second Session, September 30, 2004

Front Cover

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 11 - Targeting travel is at least as powerful a weapon against terrorists as targeting their money. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility.
Page 13 - VISIT represents yet another major milestone in enhancing our nation's security and our efforts to reform our borders. It is a major step towards bringing integrity back to our immigration and border enforcement systems.
Page 14 - Affairs have created an entire continuum of identity verification measures that begins overseas collecting fingerprints, when a traveler applies for a visa, and continues upon entry and exit from this country. The system stores biometric and biographic data in a secure, centralized database and uses travel and identity documents to access that information for identity verification and watchlist checks.
Page 2 - To them, international travel presents great danger, because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points. In their travels, terrorists use evasive methods, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.
Page 59 - The US government cannot meet its own obligations to the American people to prevent the entry of terrorists without a major effort to collaborate with other governments. We should do more to exchange terrorist information with trusted allies and raise US and global border security standards for travel and border crossing over the medium and long term through extensive international cooperation.
Page 7 - US intelligence services, including the Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Office of Naval Intelligence (ONI). Other convicted spies have included "private citizens...
Page 15 - Database and the use of commercial data, will be as publicly transparent as possible without compromising national security. Testing and eventual implementation will be governed by strict privacy protections including passenger redress procedures, data security mechanisms, and limitations on use.
Page 9 - Targeting terrorist travel is at least as powerful a weapon against terrorists as targeting their finances. The Commission therefore has recommended that we combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility.
Page 13 - ... make a determination of whether a passenger may pose a significant risk to the safety and security of the United States and to fellow passengers on a plane; (2) PNR data submitted prior to a flight's arrival enables CBP to facilitate and expedite the entry of the vast majority of visitors to the US by providing CBP with an advance and electronic means to collect information that CBP would otherwise be forced to collect upon arrival; and (3) PNR data is essential to terrorism and criminal investigations...

Bibliographic information