Disrupting Terrorist Travel: Safeguarding America's Borders Through Information Sharing : Joint Hearing Before the Subcommittee on Infastructure and Border Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, Second Session, September 30, 2004 |
From inside the book
Results 1-5 of 25
Page 10
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... visa security officers in Saudi Arabia , the CBP officers at ports of entry , and the Border Patrol , and is also ...
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... visa security officers in Saudi Arabia , the CBP officers at ports of entry , and the Border Patrol , and is also ...
Page 11
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the ... visa issuance process oper- ating at 206 nonimmigrant posts , 115 airports ... Visa Waiver Program are being enrolled in US - VISIT . The Commission's report ...
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the ... visa issuance process oper- ating at 206 nonimmigrant posts , 115 airports ... Visa Waiver Program are being enrolled in US - VISIT . The Commission's report ...
Page 12
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... Visa Security Program , and CBP Officers at all of our ports of entry , as well as be- tween the ports through support ...
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... Visa Security Program , and CBP Officers at all of our ports of entry , as well as be- tween the ports through support ...
Page 14
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the ... visa , and continues upon entry and exit from this country . The system ... visa - issuing posts and 118 immigrant visa issuing posts capture finger scans ...
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the ... visa , and continues upon entry and exit from this country . The system ... visa - issuing posts and 118 immigrant visa issuing posts capture finger scans ...
Page 15
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... visa information . Applicants must also provide their finger- prints . All non - U.S . citizens who apply to U.S. flight ...
... Security and the Subcommittee on Intelligence and Counterrorism [sic] of the Select Committee on Homeland Security ... visa information . Applicants must also provide their finger- prints . All non - U.S . citizens who apply to U.S. flight ...
Other editions - View all
Common terms and phrases
9/11 Commission 9/11 Commission Report agencies airlines airports Answer assessments biometric Border Patrol CAMP capabilities CBP Officers Chairman CONG CONGRESS THE LIBRARY consular coordination database DAVE CAMP Department of Homeland deployed developed DHS components efforts enhance ensure Federal fingerprints fingers fraudulent documents GIBBONS HSOC HSTC Hughes human smuggling IAIP identity identity documents Immigration Information Analysis information sharing infrastructure intel Intelligence Community issue law enforcement LIBRA LIBRARY OF CONGRESS ligence lost and stolen National Targeting Center NIST operational PASCRELL passenger percent personnel poor image quality ports of entry RESS THE LIBRARY rorist Secure Flight stolen passports Subcommittee Targeting Center terrorism Terrorist Screening Terrorist Screening Center terrorist travel Thank tion trafficking Transportation Security Transportation Security Administration travel documents U.S. Government United US-VISIT US-VISIT program VERDERY Visa Security Visa Waiver Visa Waiver Program watch-list WEIN
Popular passages
Page 11 - Targeting travel is at least as powerful a weapon against terrorists as targeting their money. The United States should combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility.
Page 13 - VISIT represents yet another major milestone in enhancing our nation's security and our efforts to reform our borders. It is a major step towards bringing integrity back to our immigration and border enforcement systems.
Page 14 - Affairs have created an entire continuum of identity verification measures that begins overseas collecting fingerprints, when a traveler applies for a visa, and continues upon entry and exit from this country. The system stores biometric and biographic data in a secure, centralized database and uses travel and identity documents to access that information for identity verification and watchlist checks.
Page 2 - To them, international travel presents great danger, because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points. In their travels, terrorists use evasive methods, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.
Page 59 - The US government cannot meet its own obligations to the American people to prevent the entry of terrorists without a major effort to collaborate with other governments. We should do more to exchange terrorist information with trusted allies and raise US and global border security standards for travel and border crossing over the medium and long term through extensive international cooperation.
Page 7 - US intelligence services, including the Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Office of Naval Intelligence (ONI). Other convicted spies have included "private citizens...
Page 15 - Database and the use of commercial data, will be as publicly transparent as possible without compromising national security. Testing and eventual implementation will be governed by strict privacy protections including passenger redress procedures, data security mechanisms, and limitations on use.
Page 9 - Targeting terrorist travel is at least as powerful a weapon against terrorists as targeting their finances. The Commission therefore has recommended that we combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility.
Page 13 - ... make a determination of whether a passenger may pose a significant risk to the safety and security of the United States and to fellow passengers on a plane; (2) PNR data submitted prior to a flight's arrival enables CBP to facilitate and expedite the entry of the vast majority of visitors to the US by providing CBP with an advance and electronic means to collect information that CBP would otherwise be forced to collect upon arrival; and (3) PNR data is essential to terrorism and criminal investigations...