Advanced search Help
Searching for terms: ALL (Border AND Security) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Fact Sheet: Homeland Security Agencies Protect National Special Security Events, G-8 Summit in Georgia Will Utilize Many Departmental Assets
The upcoming G-8 Summit, taking place in Georgia from June 8-10, is an illustrative example of how the many agencies of DHS work together with the relevant local authorities toward the common goal of homeland security. Although Homeland Security is unable to provide specific information with respect to the security plan surrounding the G-8 Summit, this document provides an overview of how Homeland Security agencies are working together to provide security at one of our nation's most visible events. These agencies are: United States Secret Service (USSS), Immigration and Customs Enforcement (ICE), Federal Emergency Management Agency (FEMA), Coast Guard, Customs and Border Protection (CBP), Federal Law Enforcement Training Center (FLETC), Transportation Security Administration (TSA), Information Analysis and Protection Directorate (IAIP).
United States. Department of Homeland Security
2004-05-28
-
Memorandum Regarding Office of the Inspector General's ISP Draft Report No.10 Entitled 'An Evaluation of the Security Implications of the Visa Waiver Program'
This document provides Under Secretary for Border & Transportation Security, DHS Security Directorate, Asa Hutchinson's responses to the OIG report OIG-04-26.
United States. Department of Homeland Security. Office of Inspector General
2004-05-27
-
Border Security: Inspections Practices, Policies, and Issues [May 26, 2004]
"The United States now has a unified inspections operation at the borders; a single inspector is charged with examining people, animals, plants, goods, and cargo upon entry to the country. The transfer of these functions to the Department of Homeland Security (DHS) marks a significant policy shift for all of these functions, clarifying that- although there are important commercial, economic, health, humanitarian, and immigration responsibilities- ensuring the security of our borders is the top priority. The decision by DHS officials to further integrate the inspection duties so that there is 'one face at the border' now means that Customs and Border Protection (CBP) inspectors are essentially interchangeable and responsible for all primary inspections…Some argue that this reorganization of border inspections has been long needed and is resulting in a more streamlined and efficient set of procedures at the border with a clear, single, chain of command. Others warn that the different types of inspections are quite complex in their own right and that the reorganization is exacerbating the conflicting priorities at the border, ultimately resulting in many more people and goods being sent to secondary inspections. This report, which will not be updated, discusses a range of legal, administrative, and policy issues that are emerging with the implementation of the unified border inspections."
Library of Congress. Congressional Research Service
Wasem, Ruth Ellen; Lake, Jennifer E.; Seghetti, Lisa M.
2004-05-26
-
U.S. Government Workshop: Biometric Standards in Support of the Global War on Terrorism
"The need for technologies that can provide for better border security, force protection, and counterterrorism measures is essential to winning the Global War on Terrorism. In the context of this war, it is increasingly important for U.S. Government agencies to have the capability to leverage biometric technology to link individuals to their previous names, aliases, and prior activities. Standards are critical to this effort's success because they enable interoperability among different systems that collect, store, and exchange biometric data. This interoperability is essential to sharing national security threat information with U.S. Government agencies and allies. Recognizing this need, the Department of Defense (DoD) Biometrics Management Office (BMO), Department of Homeland Security (DHS), and the National Institute of Standards and Technology (NIST) co-sponsored the first U.S. Government Workshop on Biometric Standards in Support of the Global War on Terrorism on 25 May 2004." This document reports on the findings and conclusions that resulted from the workshop's activities.
United States. Department of Defense. Biometrics Management Office
2004-05-25
-
Secretary Tom Ridge Speaks at Drexel University in Philadelphia [May 24, 2004]
In these remarks, Homeland Security Secretary Tom Ridge addresses an audience at Drexel University on a wide variety of Homeland Security topics: critical infrastructure, transportation systems, borders, ports, skies, first responders, security technologies, and intelligence sharing.
United States. Department of Homeland Security. Press Office
Ridge, Thomas J.
2004-05-24
-
Undocumented Aliens: Questions Persist about Their Impact on Hospitals' Uncompensated Care Costs, Report to Congressional Requesters
About 7 million undocumented aliens lived in the United States in 2000, according to Immigration and Naturalization Service estimates. Hospitals in states where many of them live report that treating them can be a financial burden. GAO was asked to examine the relationship between treating undocumented aliens and hospitals' costs not paid by patients or insurance. GAO was also asked to examine federal funding available to help hospitals offset costs of treating undocumented aliens and the responsibility of the Department of Homeland Security (Homeland Security) for covering medical expenses of sick or injured aliens encountered by Border Patrol and U.S. port-of-entry officials. To conduct this work, GAO surveyed 503 hospitals and interviewed Medicaid and hospital officials in 10 states. GAO also interviewed and obtained data from Homeland Security officials. GAO recommends that the Secretary of Health and Human Services, in establishing a payment process under recently enacted legislation, develop appropriate internal controls to ensure payments are made only for unreimbursed emergency services for undocumented or certain other aliens. The Centers for Medicare & Medicaid Services concurred with GAO's recommendation. Homeland Security also agreed with the report's findings.
United States. General Accounting Office
2004-05-21
-
Aviation Security: Challenges in Using Biometric Technologies, Statement of Keith A. Rhodes, Chief Technologist Applied Research and Methods, Testimony Beofre the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives
"One of the primary functions of any security system is the control of people moving into or out of protected areas, such as physical buildings, information systems, and our national border. Technologies called biometrics can automate the identification of people by one or more of their distinct physical or behavioral characteristics. The term biometrics covers a wide range of technologies that can be used to verify identity by measuring and analyzing human characteristics--relying on attributes of the individual instead of things the individual may have or know. Since the September 11, 2001, terrorist attacks, laws have been passed that require a more extensive use of biometric technologies in the federal government."
United States. Government Accountability Office
2004-05-19
-
Aviation Security: Challenges in Using Biometric Technologies, Statement of Keith A. Rhodes, Chief Technologist, Applied Research and Methods, Testimony before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives
"One of the primary functions of any security system is the control of people moving into or out of protected areas, such as physical buildings, information systems, and our national border. Technologies called biometrics can automate the identification of people by one or more of their distinct physical or behavioral characteristics. The term biometrics covers a wide range of technologies that can be used to verify identity by measuring and analyzing human characteristics--relying on attributes of the individual instead of things the individual may have or know. Since the September 11, 2001, terrorist attacks, laws have been passed that require a more extensive use of biometric
technologies in the federal government. In 2002, GAO conducted a technology assessment on the use of biometrics for border security. GAO was asked to testify about the issues that it raised in the report, the current state of the technology, and the application of biometrics to aviation security."
United States. General Accounting Office
2004-05-19
-
Friends at the Gate: Why Turkey Matters in the U.S. & European Security
"A lingering post-Cold War ignorance of the geo-strategic importance of Turkey as a U.S., European, and NATO ally may risk long-term Turkish ambivalence or even animosity toward both the U.S. and Europe. Given the changed nature of our relations with Turkey, the U.S. can no longer take Turkish partnership, confined to the prism of NATO, or our ability to confront Iraq or other adjacent areas as a given, nor should we assume we can 'buy' Turkish support when it is convenient. Turks increasingly see their relations with the west in a triangular way with competing pressures between Turkish, EU, and U.S. interests. They feel the pressure, are aware of the souring in the Turkish-American relations, and may find it increasingly difficult to harmonize their interests with the U.S. and EU if they can't balance the divergent pressures from each. The DoD and EUCOM would be wise to study the Turks more closely, understand their intense nationalism, growing domestic democratic influence, fear of an independent Kurdish state on their border, and their strong national security interest in EU membership."
Naval War College (U.S.)
Davies, David A.
2004-05-18
-
Border Security: Immigration Issues in the 108th Congress [Updated May 18, 2004]
This report provides background information on the main immigration-related border security issues that have been raised as a result of the terrorist attacks and resulting concern for homeland security. It describes enacted legislation in the 107th Congress as well as in previous Congresses that focus on immigration-related border security issues. The report also poses possible immigration-related border security issues the 108th Congress may consider. This report will be updated to reflect any additional related legislation in the 108th Congress, as well as implementation issues.
Library of Congress. Congressional Research Service
Seghetti, Lisa M.
2004-05-18
-
Information Technology: Early Releases of Customs Trade System Operating, but Pattern of Cost and Schedule Needs to be Addressed, Report to Congressional Committees
The Department of Homeland Security's (DHS) Bureau of Customs and Border Protection (CBP) is conducting a multiyear, multibillion-dollar acquisition of a new trade processing system planned to support the movement of legitimate imports and exports and strengthen border security. By congressional mandate, expenditure plans for this system, called the Automated Commercial Environment (ACE), must meet certain conditions, including GAO review. This study addresses the extent to which the latest plan, for fiscal year 2004, satisfies these conditions, provides information about DHS's efforts to implement GAO's recommendations for improving ACE management, and makes observations about ACE. To assist DHS in managing ACE and increasing the chances that future releases will deliver promised capabilities on time and within budget, GAO is making recommendations to the Secretary of Homeland Security aimed at addressing recurring cost and schedule problems. DHS concurred with GAO's recommendations and described specific actions that it is taking to respond to each.
United States. General Accounting Office
2004-05-14
-
Undertakings of The Department of Homeland Security, Bureau of Customs and Border Protection (CBP)
These undertakings address the efforts of the US to support the plan of the European Commission to exercise the powers conferred on the US by Article 25(6) of Directive 95/46/EC and to adopt a decision recognizing the Department of Homeland Security Bureau of Customs and Border Protection (CBP) as providing adequate protection for the purposes of air carrier transfers of Passenger Name Record (PNR) data which may fall within the scope of the Directive. CBP outlines the following steps: legal authority to obtain PNR, the data requirements, treatment of "sensitive" data, the method of accessing PNR data, the storage of PNR data, the security of the CBP computer system, the CBP treatment and protection of PNR data, and the transfer of PNR data to other Government authorities. The undertakings also examines the notice, access and opportunities for redress for PNR data subjects, review and termination of undertakings, reciprocity, and compliance issues.
United States. Department of Homeland Security
2004-05-11
-
U.S. Support to Plan Colombia: A Heading Check
"In the 2002 National Security Strategy, President George W. Bush envisioned a democratic Western Hemisphere which advances 'security, prosperity, opportunity, and hope.' For some Latin American countries like Colombia, these ideals fall quite short of reality. Colombia is plagued by internal problems which restrict its ability to adequately govern its population and territory. For Colombians, reality is a poor economy with few available jobs, an inefficient judicial system, widespread corruption, and armed conflict with three insurgent groups operating within the national borders. Colombia's problems are not new. In 1999, Colombian President Andres Pastrana, developed a plan to address these challenges and to bring lasting peace and prosperity to Colombia. This strategy, known as Plan Colombia, was a five year proposal designed to fight the illegal drug trade which finances the insurgent groups, strengthen democratic institutions and the rule of law, expand economic development, institute judicial reform, protect human rights, and reinvigorate the peace process. The total cost for Plan Colombia was $7.5 billion with a significant share of that coming from the U.S in the form of military, economic and humanitarian assistance. U.S. assistance started in FY2000. After three years and $2.5 billion of U.S. assistance to Colombia, interim results are now available. Based on these results, it would be beneficial to reexamine the strategy from two perspectives. First, do the interim results indicate progress toward the desired objectives? Second, is the progress adequate to bring lasting peace and prosperity to Colombia and, if not, what else should be done?"
Army War College (U.S.)
Buckley, Kevin W.
2004-05-03
-
Domestic Counterdrug Mission: Increase DoD Support?
"There is no question the terrorist attacks of 11 September 2001 changed our national security environment. The operational tempo of the United States military, as a result of the Global War on Terrorism and other international contingencies and deployments, is at an all-time high. At the same time, drug trafficking and use inside our borders continue to have an extreme negative impact on our communities and neighborhoods. Although some experts argue the United States has made progress in the war on drugs, illegal drugs continue to be a threat to our national security. In fact, there are those throughout our country that believe drug trafficking and addictions pose a greater threat to national security than terrorists do. More importantly, the two threats become closely related, or integrated, when terrorists become involved in drug trafficking both to gain addicts to raise profits to fund their terrorist network and to weaken our will to resist them. What more can our federal government do to combat this cancer to our society? Should the Department of Defense (DoD) increase its support to the domestic counterdrug mission, or is DoD stretched to the point in which it cannot provide more support to this vital mission as it has done in the past? This analysis considers the alternatives and risks of whether or not the U.S. military should provide more support to the domestic counterdrug mission. It will also review the current U.S. national drug policy objectives as they pertain to DoD involvement and the employment of the U.S. military. It considers the methods the military can use in the domestic war on drugs."
Army War College (U.S.)
Dumoulin, John E.
2004-05-03
-
Reliable and Relevant National Communications System
"The National Communications System is a federal government command and control emergency communications system that requires a complete, comprehensive review and emerging technological overhaul to ensure its reliability and relevance. Since its establishment in the early 1960s, the system has gone through several organizational restructurings and System upgrades. With our nation under increased terrorist threats within our borders, the reliability of the National Communications System is under extreme scrutiny. In 2002, a Presidential Directive transferred oversight of the organization from the Department of Defense to the newly established Department of Homeland Security. This paper will analyze the current National Communications System, review its origins and recommend emerging technological improvements to support the National Security Council. It also will review the needs of federal, state and local governments, and then recommend implementation of emerging technological capabilities to enhance system reliability and relevance. Today, more than ever before, the commercial telecommunications infrastructure provides critical communications connectivity for our government's daily operations as well as emergency communications. The roles of civilian communications companies and their infrastructure also will be analyzed as it applies to emergency national communications support."
Army War College (U.S.)
Lake, Timothy L.
2004-05-03
-
What Every Member of the Trade Community Should Know About: Tariff Classification
"When goods are imported into the customs territory of the United States (the fifty states, the District of Columbia and Puerto Rico), they are subject to certain formalities involving the U.S. Bureau of Customs and Border Protection ('CBP') of the U.S. Department of Homeland Security. In almost all cases, the goods are required to be 'entered,' that is, declared to the CBP, and are subject to detention and examination by CBP officers to insure compliance with all laws and regulations enforced and administered by the CBP. The required entry process may take the form of a simple 'baggage declaration' (for individuals), or one of the many types of customs 'entries,' for consumption, warehousing, or transit. Low value importations may be subject to simplified or informal customs clearance procedures. For example, certain low value mail importations may be declared on a sticker obtainable at post offices whereas importations by individuals that do not exceed their duty free personal exemptions may often be made by an oral declaration to a CBP officer. On the other hand, in most cases involving commercial goods, and some involving non-commercial importations, the importer or his agent must "enter" the goods by filing an electronic or paper 'entry' to obtain release of the goods followed by an electronic or paper 'entry summary.' As part of the entry process, goods must be 'classified' in the Harmonized Tariff Schedule of the United States ('HTSUS') and their customs value must be determined."
U.S. Customs and Border Protection
2004-05
-
What Every Member of the Trade Community Should Know About: U.S. Rules of Origin, Preferential and Non-Preferential Rules of Origin
"The country of origin of merchandise imported into the customs territory of the United States (the fifty states, the District of Columbia and Puerto Rico) is important for several reasons. The country of origin of merchandise can affect, among other things, the rate of duty, the eligibility for special programs, admissibility, quota, procurement by government agencies and marking requirements. This publication summarizes the various rules of origin for goods imported into the customs territory of the United States. The discussion is divided into 'non-preferential' and 'preferential' rules of origin. 'Non-preferential' rules are those that generally apply to merchandise in the absence of bilateral or multilateral trade agreements. On the other hand, 'preferential' rules are those that apply to merchandise to determine eligibility for special treatment under various trade agreements or special legislation. Some of the rules use a 'tariff-shift' (or 'change in tariff classification') method, which is based on the Harmonized Commodity Description and Coding System ('Harmonized System'). The Harmonized System forms the core of the U.S. tariff system, the Harmonized Tariff Schedule of the United States ('HTSUS'). The rules of origin discussed below are administered by the U.S. Bureau of Customs and Border Protection ('CBP') of the U.S. Department of Homeland Security."
U.S. Customs and Border Protection
2004-05
-
JTF - WMD Elimination: An Operational Architecture for Future Contingencies
"When the U.S. military initiated the attack into Iraq to begin OPERATION IRAQI FREEDOM (OIF) in the spring of 2003, one of the main objectives was to find, exploit and eliminate Iraq's Weapons of Mass Destruction (WMD) program and capabilities. However, as forces sped north across the Kuwaiti border, they did so with an ad hoc organization that was hastily assembled and marginally trained to accomplish this task. Despite having approximately 1.5 million men and women on active duty, the U.S. military does not have a standing force trained and prepared to execute the WMD exploitation and elimination mission. The purpose of this paper is to review the organizations that were developed and assigned this mission for OIF, and determine how the Department of Defense should organize to accomplish this task in future operations. Based upon lessons learned from OPERATION IRAQI FREEDOM and the ongoing threat of WMD proliferation among state and non-state actors, the author proposes that a standing Joint Task Force is needed to execute this mission to provide for U.S national security and strategic interests. A recommended organizational structure, operational concept, employment scenarios and required resources are provided."
Industrial College of the Armed Forces (U.S.)
Currie, Jim
2004-04-28
-
European Community and Department of Homeland Security Sign Landmark Agreement to Improve Container Security and Expand CSI [April 22, 2004]
In this press release, the European Community and the Department of Homeland Security (DHS) signed an agreement that among other things, calls for the prompt expansion of Customs and Border Protection's (CBP) Container Security Initiative throughout the European Community. The agreement was signed by Homeland Security Secretary Tom Ridge and Irish Finance Minister Charlie McCreevy at the Ronald Reagan Building in Washington, DC.
United States. Department of Homeland Security. Press Office
2004-04-22
-
Critical Infrastructure Protection: Establishing Effective Information Sharing with Infrastructure Sectors, Statement of Robert F. Dacey, Director, Information Security Issues, Testimony before the Subcommittee on Cybersecurity, Science, and Research & Development and Infrastructure and Border Security, Select Committee on Homeland Security, House of Representatives
Critical Infrastructure Protection (CIP) activities that are called for in federal policy and law are intended to enhance the security of the cyber and physical public and private infrastructures that are essential to our nation's security, economic security, and public health and safety. As our reliance on these infrastructures increases, so do the potential threats and attacks that could disrupt critical systems and operations. Effective information-sharing partnerships between industry sectors and government can contribute to CIP
efforts. Federal policy has encouraged the voluntary creation of Information
Sharing and Analysis Centers ISACs) to facilitate the private sector's participation in CIP by serving as mechanisms for gathering and analyzing
information and sharing it among the infrastructure sectors and between the private sector and government. This testimony discusses the management and
operational structures used by ISACs, federal efforts to interact with and support the ISACs, and challenges to and successful practices for ISACs' establishment, operation, and partnerships with the federal government.
United States. General Accounting Office
2004-04-21
-
Second Quarterly Report on Iraq (April 5, 2004)
This is the second quarterly report required by Section 2207 of the Emergency Appropriations Act for Defense and for the Reconstruction of Iraq and Afghanistan, FY 2004. This report updates information contained in the report I submitted on January 5, 2004. As with the first report, this too relies on the capable planning and analysis of the Coalition Provisional Authority (CPA) in Baghdad and reflects the priorities Ambassador Bremer has identified as essential to Iraq's security, political stability and economic growth. This report discusses several revisions to the spending plan submitted on January 5, 2004. Specifically, resources were redirected to enhance training of the Iraqi Police Service, the Department of Border Enforcement, and the Facilities Protection Service; to increase the number of battalions in the Iraq Civil Defense Corps; and to create a new rule of law program designed to provide judicial, prosecutorial, and attorney training to ensure a more transparent and fair legal system. In addition, the report identifies resources to be used as operating funds for CPA's successor organization as permitted in the FY 2004 Supplemental.
United States. Office of Management and Budget
2004-04-05
-
Michael J. Garcia, Assistant Secretary, U.S. Immigration and Customs Enforcement, Remarks for U.S. Coast Guard Intelligence Coordination Center's Fourth Annual Human Smuggling and Illegal Migration Conference, April 6, 2004
Michael J. Garcia: "I appreciate the opportunity to speak to an increasingly serious threat to global security -- human smuggling and trafficking. The smuggling of human beings is not only a pressing law enforcement and security challenge in the United States. It also poses an urgent moral challenge here and around the world. The full scope of human smuggling and trafficking is difficult to ascertain. But we do know it is a common practice that is only becoming more widespread. It is estimated that existing networks facilitate the smuggling of up to two million people globally each year. We know the United States is a primary target for smugglers and traffickers, which means that literally tens of thousands of men, women, and children are entering this nation illegally each year " undocumented, undetected, and unprotected. Human smuggling networks are a serious vulnerability, posing a tremendous threat to our nations security. The global criminal networks that have made human smuggling and trafficking a profitable enterprise could readily be tapped - for the right price - to help terrorists cross our borders or gain entry to our ports. Similarly, the routes and methods they use to transport human cargo could easily be used to transport weapons of mass destruction across borders or into ports."
U.S. Immigration and Customs Enforcement
2004-04
-
Review of the Secure Electronic Network for Travelers Rapid Inspection Program
"The Secure Electronic Network for Travelers Rapid Inspection (SENTRI) program permits pre-enrolled travelers to enter the United States by personal vehicle from Mexico with minimal inspection by Customs and Border Protection (CBP) officers. Such reduced border inspection facilitates a more rapid entry into the United States. The SENTRI program is open to both United States citizens and non-citizens; participation is voluntary, fee based, and only for noncommercial vehicles. SENTRI is available at three southern land ports of entry (POE). CBP officers must assess the safety and security risks associated with travelers and their eligibility to enter the United States before the travelers are enrolled. CBP, within the Border and Transportation Security Directorate of the Department of Homeland Security (DHS), is responsible for SENTRI program operations. We concluded that the SENTRI program is generally accomplishing the two basic objectives for which it was established: to accelerate the inspection of pre-enrolled low-risk travelers at designated southern United States land POEs; and to maintain border integrity, security, and law enforcement responsibilities. However, certain program deficiencies must be corrected to enhance the program's overall effectiveness."
United States. Department of Homeland Security. Office of Inspector General
2004-04
-
World Law Bulletin: April 2004
This issue of the monthly publication of the Law Library of Congress includes the following relevant titles: 'Recent Developments in the European Union'. "Following the recent terrorist bombings in Madrid and the conclusion of the European Council of March 25-26, 2004, a recent Communication adopted by the European Commission introduces some new measures in order to intensify the European Union's response to terrorist attacks. A key feature of the Communication is the proposal to expand the obligation to exchange information among EU Members on all individual terrorist offenses and offenses committed by terrorist groups, including attempts to commit, complicity in, and incitement as well as financing of terrorism offenses. Members are also obliged to exchange information on all stages of criminal proceedings, including convictions. […] The European Commission and the United States worked diligently during 2003 to finalize an agreement on the processing and transfer of Passenger Name Record (PNR) data by airlines to the Department of Homeland Security, Bureau of Customs and Border Protection. The agreement allows U.S. authorities to access the PNR data electronically from the airlines' reservation/departure control system. Such access will continue to be available until the airlines develop a system to transmit the data themselves. The Draft Council Decision calls for the conclusion of this agreement on behalf of the EU. However, the agreement has raised serious privacy concerns, and there is a strong belief that it infringes on EU legislation on privacy."
Law Library of Congress (U.S.)
Johnson, Constance Axinn; Zeldin, Wendy I.
2004-04
-
Homeland Security: Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection, Statement of Richard M. Stana, Director, Homeland Security Issues, Testimony before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives
"After the attacks of September 11, 2001, concerns intensified that terrorists would attempt to smuggle a weapon of mass destruction into the United States. One possible method is to use one of the 7 million cargo containers that arrive at our seaports each year. Addressing the potential threat posed by the movement of oceangoing cargo containers falls to the Department of Homeland Security's U.S. Customs and Border Protection (CBP). Since CBP cannot inspect all arriving cargo containers, it uses a targeting strategy, including an Automated Targeting System. This system targets containers for inspection based on perceived level of risk. In this testimony, GAO summarizes its work on (1) whether the development of CBP's targeting strategy is consistent with recognized key risk management and modeling practices and (2) how well the strategy has been implemented at selected seaports. GAO recommends that CBP incorporate all the key elements of a risk management framework and recognized modeling practices in its targeting strategy and the Automated Targeting System. GAO also recommends, among other things, that CBP improve management controls to better implement the targeting strategy at seaports."
United States. General Accounting Office
2004-03-31
-
Homeland Security: Primary Role of the National Guard and the National Security Strategy
"Many agencies and organizations have redefined their roles as a result of the terror attacks on September 11, 2001. One organization whose role might change in light of 9/11 is the National Guard of the United States. Some people have suggested that homeland security should become the primary role of the National Guard, while others suggest it should become an agency of the Department of Homeland Security. The current Guard leadership has indicated its intention to restructure the Guard to meet the requirements of both warfighting and homeland security. Current definitions used by both the Department of Homeland Security (DHS) and the Department of Defense (DoD) reinforce the use of the National Guard as the primary reserve for the Army. The contemporary roles and missions of the National Guard under these definitions are in harmony with the vision of the nation's forefathers. The tasks outlined by the DoD and DHS may not support changing the mission of the National Guard to a homeland security force. This paper examines the capabilities, policy, guidance, laws, and regulations that govern the National Guard as well as the mission areas it would have to adopt if it were made an agency of DHS: intelligence and warning, border and transportation security, domestic counterterrorism, protecting critical infrastructure, defending against catastrophic terrorism, and emergency preparedness and response. The author concludes that to prepare and train one organization, the National Guard, to have homeland security as a primary role is not realistic. The National Guard is largely a part-time organization currently trained, resourced, and ready to respond as the reserve of the Army in support of homeland defense and most other missions assigned to the Army. As a supporting agency to federal, state, and local officials the National Guard can certainly be better organized to improve or assist with homeland security, but how to change the guard is currently a debate."
Army War College (U.S.)
Russo, Mark A.
2004-03-19
-
Sources of Terrorist Conduct March 2004
In this article, Hutchings draws an analogy between the U.S. strategy for Soviet containment, as identified in the 1947 Foreign Affairs article title "Sources of Soviet Conduct," and the sources of terrorist conduct. He arguest that in today's contemporary security environment that terrorist conduct is today's counterpart to soviet conduct. However, Hutchings did point out several key differences such as; the Soviets behavior was constrained by it being a sovereign state with defined borders, an established populace, recognized government, and official ideology. Terrorism, by contrast, does not operate within boundaries, nor play by any rules of diplomatic conduct. Thus containment is not likely to prove an appropriate strategy for dealing with such an elusive adversary. But neither, I would venture to say, is war a fully adequate concept for addressing terrorism as a long-term strategic challenge. Terror is the tactic, not the adversary itself. To deal with terrorism over the longer term, we have to focus on underlying causes.
National Security Council (U.S.)
Hutchings, Robert L.
2004-03-19
-
Mortuary Affairs - Is USNORTHCOM and the Department of Homeland Security Positioned for Contaminated Mass Fatality Management?
"The Global War on Terrorism has emphasized homeland defense and security as a priority for the Nation. The United States Northern command (USNORTHCOM) recently attained its initial operational capability as the Department of Defense executive agent for Homeland Defense. Terrorists have demonstrated the ability and willingness to obtain and use Weapons of Mass Destruction to further their goals. An unfortunate reality of the use of such weapons is the creation of contaminated remains. The recovery, identification, and disposition of such remains, including their decontamination, falls within the scope of Mortuary Affairs. This is a hugely sensitive issue. As USNORTHCOM and the Department of Homeland Security grapple with their transition to lead Homeland Defense and Homeland Security agencies, a seam in policy and capabilities may exist. USNORTHCOM's ability to provide support to meet surge requirements for decontaminating and processing human remains is not articulated or properly sourced. This paper looks at the threat posed within the Nation's borders that requires a synchronized response by USNORTHCOM and the Department of Homeland Security. Policies, directives, and programs that highlight current government capability to handle domestic contaminated mortuary affairs incidents and potential seams are identified, and recommendations for potential policy, training requirements, and force structure are discussed."
Army War College (U.S.)
Stewart, Joe M.
2004-03-19
-
Baltic Development and Engagement with the Commonwealth of Independent States
"This paper describes how the Baltic States have developed since independence and how they can help democracy develop in the Commonwealth of Independent States (CIS) after joining the European Union (EU) and the North Atlantic Treaty Organization (NATO). After enlargement of the EU and NATO in 2004, both organizations will border Russia and other countries of the CIS. Therefore, for the closest neighbors of Russia, who are going to be NATO and EU members, it is necessary to start thinking about cooperation with the CIS in terms of security. These closest neighbors are the Baltic states of Estonia, Latvia, and Lithuania. The main reason for Baltic cooperation with the CIS is to promote common human values (e.g., human rights, rule of law, free speech, freedom of worship, equal justice, respect for women, religious and ethnic tolerance, respect for private property, and limits on the absolute power of the state) in countries that lack them, and to build security in the region. It is not enough to just have good defense forces that can protect a homeland; something else is required. This "something else" is based on the previously mentioned values and includes political and economic freedom, peaceful relations with other states, respect for human dignity, and democracy. Many scholars have researched these topics and most of them agree that peace can be achieved between neighboring countries if they follow democracy. On a daily basis people associate democracy with common human values. In this essay, the author focuses on the importance of democratization in this region. Other topics addressed include the history of the Baltic states, role of the Armed Forces in developing democracy, security in the Baltic Sea region after joining NATO and the EU, Russian and Belarusian political development, Russian speakers in the Baltics, Kaliningrad, border agreements with Russia, transnational threats, and the Baltic states' cooperation with the CIS."
Army War College (U.S.)
Marlakovs, Juris
2004-03-19
-
Evolving Military Strategy and Developing Homeland Security: An Opportunity to Share Resources
"The end of the Cold War marked a shift in the evolution of U.S. military strategy. Thirteen years of military engagement with Iraq provide tangible evidence of how military strategy has changed. Threats to American interests have evolved from large scale conventional military forces overseas to non-state actors using asymmetric methods of attacking U.S. interests overseas or domestically. Current U.S. military strategy relies on technological advances that enhance the execution of military operations. Training in realistic simulated combat environments allows the Department of Defense (DOD) to develop refine and practice tactics that support military strategy. Training is a key element for integrating the human and technological elements into a force to conduct military operations. If viewed from the tactical level the implementing strategy for homeland security has many elements common to military strategy. The similarity of threats environments and techniques to defeat the threat provide opportunities for the DOD and the Department of Homeland Security (DHS) to efficiently develop and use training capabilities. The DHS should embrace elements of military strategy and technology to defeat asymmetric threats within the borders of the U.S. Cooperative efforts should foster better working relationships between DOD and DHS more efficiently use resources and promote commonality of technology between military and civil-military responders. Through these means the DOD and DHS can improve the inter-department integration for insuring security."
Army War College (U.S.)
Wheeler, Kenneth A.
2004-03-19