NASSAU COUNTY CIVIC ASSOCIATION, INC.

"The government is us, we are the government, you and I." Teddy Roosevelt

 

Home Page

Return to Immigration


Safeguarding America's Sovereignty: A "System of Systems" Approach to Border Security

by James Jay Carafano, Ph.D.
November 28, 2005

Any effective solution for reducing illegal border crossings and the unlawful population in the United States must address all three aspects of the problem: internal enforcement of immigration laws, interna­tional cooperation, and border security. Internal enforcement and international cooperation are essential to reducing and deterring the flood of ille­gal entrants into the United States, making the chal­lenge of securing America’s borders affordable and achievable.

However, these initiatives will not be enough. A reduced flow at the border does not promise an absence of threat. The border will always need to be secured against terrorists and transnational criminals (e.g., human, drug, and arms smugglers). The federal government must do a better job of protecting the nation from these 21st century threats.

Homeland Security Secretary Michael Chertoff recently announced the Secure Border Initiative (SBI), a “vision” for securing America’s borders. How­ever, the plan does not appear to deliver the “transfor­mation” that the secretary touted in a speech announcing the Secure Border Initiative.[1]

The current “layered systems” approach to U.S. border security is inadequate and is still entrenched in the DHS mindset.[2] A layered defense suggests that the border can be secured by multiple security fea­tures, with each layer backing up the others so that no layer has to be perfect.

The problem is that the layered approach does not prioritize investments. Not all layers are of equal value. In fact, investments are often based more on politics than on sound strategy. The most powerful stakeholders and influential advocates tend to get their priorities funded first and best. Meanwhile, the United States has underinvested in the most important components of the system, such as infrastructure (e.g., adequate bridges and roads) at the points of entry.

Furthermore, there is no substantive require­ment that systems work together.[3] To fix the prob­lem, the Administration must build a “system of systems” that welds all of the nation’s border assets into a single coherent security enterprise that deploys the right asset to the right place at the right time to do the right thing. To create system-of-sys­tems security, the Administration and Congress will need to make key investments in infrastructure, organization, technology, and resources and sup­port these investments with legislation and policy reform. The Secure Border Initiative is a first step in the right direction, but more needs to be done.

Border Crossing Blues

Securing America’s border will require adequately addressing two significant challenges, which con­cern bothlegal and illegal border crossing.

Challenge #1: Screening the Points of Entry and Exit

Hundreds of millions of people cross the U.S. border each year in numbers approaching twice the population of the United States.[4] The overwhelm­ing majority travel through legal points of entry and exit, such as land border crossing points, air­ports, and harbors.[5] Billions of tons of goods, accounting for a third of the U.S. gross domestic product, transit America’s borders as well.[6]

Terrorists and transnational criminals have attempted to exploit every known legal means for moving people, goods, and services across U.S. borders. In fact, virtually every known or suspected terrorist has exploited legal opportunities to enter or remain in the United States. Most passed through screening at an established point of entry.[7]

These vulnerabilities make it likely that terrorists will continue to use sophisticated travel methods to enter the United States, including acquiring new passports to hide past travel. They will do this because there is still no viable, reliable means of ensuring that important information on terrorist travel gets to frontline officers.

Effective security at the points of entry and exit is essential not only to keeping bad things and bad people out of the United States, but also to protect­ing the border crossing cites, key nodes in the net­works that connect America to the world of global commerce. This security has to be provided while facilitating the free flow goods, people, services, and ideas that are the lifeblood of the American economy and a key competitive advantage for the United States in the worldwide marketplace.

As the 9/11 Commission rightly noted, “The challenge for national security in an age of terror­ism is to prevent the very few people who may pose overwhelming risks from entering or remaining in the United States undetected.”[8] The most vital national security mission for U.S. border assets is to identify high-risk people and cargo entering the United States and take appropriate action. Secre­tary Chertoff’s vision does not appear to address bolstering points of entry.[9]

Challenge #2: Securing the Border Between Points of Entry

While rooting out terrorists and other national security threats at the authorized border crossings must be the top priority, safeguarding the stretches of land, air, and ocean between the points of entry cannot be neglected. The vast expanses of the U.S. border are largely unsecured. Hundreds of thou­sands cross the southern U.S. border every year, adding to a swelling undocumented work force that could total up to 15 million according to some estimates.[10]

Even if reforms dampen the flow of illegal immi­gration into the United States, America’s unsuper­vised land and maritime borders will remain an inviting target. Drug smuggling and human traf­ficking offer some measure of the problem.[11] For example, drug shipments into the United States from South America often include tens or hundreds of kilograms of narcotics.[12] The current favorite option of drug smugglers is to employ non-com­mercial vehicles such as small, fast, private boats with concealed compartments capable of storing 30–70 kilograms of material.[13]

Terrorists might adopt many of the smuggling techniques used by criminals, including surveil­lance and tracking of Customs and Border Protec­tion and Coast Guard assets, scouting transport routes and target sites, and rehearsing opera­tions.[14] Future opportunities might be limited only by imagination. For example, in February 2002, U.S. authorities discovered an elaborate tunnel almost 300 meters long that had been used to smuggle drugs across the U.S.–Mexican border.[15] In addition, the use of sophisticated methods, vio­lence, and advanced technologies by individuals engaged in these criminal activities is growing.[16]

Indeed, as screening at legal points of entry improves, it is likely that terrorists and criminals will increasingly exploit the land and coastline in between them. The United States must have the capacity to control its open borders. In some cases, that will require persistent surveillance of activities along some border areas. In others, it will mean acquiring awareness of threats before they reach the border. In both cases, the right assets must be available to prevent illegal border crossings.

Secretary Chertoff’s Secure Border Initiative would improve infrastructure aggressively by “expand[ing] infrastructure systems throughout the border where appropriate to strengthen our efforts to reduce illegal entry to the United States.” This includes integrating an extensive system of surveillance.[17] That is good, but not enough. A sys­tems approach is lacking.

System of Systems

America’s borders require enhanced and secured infrastructure, appropriate screening, inspection of high-risk cargo and people, persistent surveillance, actionable intelligence, and responsive interdic­tion. Combining these instruments into effective border security requires not just integrating assets at the border, but also linking them to all activities involved in cross-border travel and transport, from issuing visas, passports, and overseas purchase orders to internal investigations and the detention and removal of unlawful persons. Such an enforce­ment architecture could be called a “system of sys­tems” or network-centric approach to border security.

Network-centric operations increase effective­ness by networking sensors, decision makers, and investigation and enforcement assets to achieve shared awareness, increased speed of execution, higher operational tempo, and greater efficiency. In essence, this means linking knowledgeable entities together so that they can share information and coordinate their actions. Such a system might pro­duce significant efficiencies in terms of sharing skills, knowledge, and scarce high-value assets, building capacity and redundancy as well as gain­ing the synergy of providing a common operating picture and being able to readily share information.

Another way of describing a system of systems is linking everything together so that one can get the right assets to the right place at the right time to do the right thing. Put even more simply, a system of systems means knowing what the system knows and being able to act on that information.

One example of a network-centric approach to border security would be the creation of “person-centric immigration files,” information systems that link all relevant transactions to an identifiable individual.[18] The current system is “application-centric,” meaning that files are organized by appli­cation, not by person, thereby permitting rampant fraud through multiple applications, assumed identities, and assorted other illicit practices. Given the more than 30 databases scattered across a host of departments and agencies that might contain relevant information, it is no wonder that the system often fails.

A person-centric approach would provide every­one in the system with the means to track people, not just to sift through documents. With more complete information at their disposal, immigra­tion, border, and investigation officials will make better decisions about entry, enforcement, and immigration benefits. Combining such a system with other systems, such as those that record bio­metric measurements[19] to identify individuals accurately, would further limit fraud and other deceptions used to circumvent border screening.

Establishing network-centric systems will require developing and implementing an overarching archi­tecture that describes how assets are linked together and what and how knowledge is shared. Imple­menting a systems approach will necessitate creat­ing information systems, practices, policies, and organizational designs that facilitate coordinated action.

Why a System of Systems

A network-centric approach makes sense for a number of reasons. Given the tens of thousands of miles of land and sea border to guard and the mil­lions of people and supply shipments to monitor, it is unrealistic to believe that there will ever be enough assets available to secure everything, everywhere.

A systems approach allows for focusing resources on the greatest risks. Such an approach could better:

In short, a system-of-systems architecture empha­sizes getting the most security possible from both existing and future capabilities.

A systems solution for border security promises more capability than simply increasing the capac­ity of existing border enforcement mechanisms would provide. In fact, experience shows that such approaches simply do not work. For exam­ple, throughout the 1990s, shoring up the south­west border was the number one priority in immigration policy. As a result, the U.S. Border Patrol was doubled from about 4,000 agents to about 8,000 agents. However, as Cato Institute analyst Douglas Massey concluded in a recent study:

Increased border enforcement has only succeeded in pushing immigration flows into more remote regions. That has resulted in a tripling of the death rate at the border and, at the same time, a dramatic fall in the rate of apprehension. As a result, the cost to U.S. taxpayers of making one arrest along the border increased from $300 in 1992 to $1,700 in 2002, an increase of 467 percent in just a decade.[20]

Just throwing money at the problem will not secure the border. Likewise, a systems approach to border security means much more than buying high-tech equipment. It will require deliberate and thoughtful improvements in infrastructure, organi­zation, resources, and technology, supported by appropriate legislation and policy reform. Any bor­der security initiative that does not address all of these will simply come up short. A systems approach will not work if it does not have the right stuff to link together.

Infrastructure Investment

Investments in infrastructure at ports and land border crossings are vital to network-centric secu­rity. However, the primary object should not be to harden infrastructure against terrorist attacks. Try­ing to turn every port and crossing site into a little Maginot Line is a losing strategy. Like the French defenses for World War II, this approach would be both very expensive and likely to fail because an innovative enemy will find a way around the defenses.

Rather than attempting to eliminate every vulner­ability, most infrastructure is best protected by securing the system as a whole by linking infra­structure protection to counterterrorism operations and law enforcement that focus on stopping threats.

Priority #1: Funding the Right Investments

Infrastructure investments should be focused on constructing an effective system of systems. Points of entry and exit must have the physical assets to support screening, inspection, and gath­ering, evaluating, and sharing critical informa­tion.[21] In addition, adequate infrastructure— including bridges and roads, especially road net­works that connect to rail terminals, seaports, and airports—is essential to providing the capacity, redundancy, and flexibility required to ensure that the free flow of trade and travel is not disrupted. This is particularly vital at the small number of transit nodes that handle most of the cross-border traffic.[22]

Priority #2: Addressing the Land Border First

While all border crossing sites require signifi­cant investment, land border crossing infrastruc­ture should be given high priority. They are the most congested and the most vulnerable to delays and disruption.[23] Joint assessments by American, Canadian, and Mexican officials esti­mate that infrastructure shortfalls total about $24 billion.[24]

Priority #3: Balancing Risks and Rewards

Establishing priorities and providing revenue for these investments is not solely or, in many cases, even primarily a federal responsibility. For example, local governments own most of the 26 motor vehicle crossings on the Texas–Mexico border.[25] Likewise, airports and seaports are owned and operated by a mix of public and pri­vate entities. An investment strategy will require better public–private partnerships, including tar­geting national transportation trust funds so that they are spent on national priorities rather than pork-barrel projects.

One possible solution could be to turn back the trust funds, such as the federal Highway Trust Fund, to the states or to allow states to opt out of the program in return for agreeing to meet a series of quantitative performance criteria.[26] Additionally, rather than relying heavily on subsi­dized public funding of infrastructure, invest­ments should focus on “project-based” financing that shifts the risks and rewards to the private sector.[27] In either case, a national infrastructure investment and prioritization strategy has to be part of the systems enterprise.

Organizational Innovation

Facilitating cooperation between multiple agencies is always difficult. The U.S. government has a poor track record in coordinating operations, integrating information technology systems, and harmonizing policies across multiple agencies and departments. Border security is particularly problematic.

Right now, eight mission elements are spread across four departments (Justice, State, Defense, and Homeland Security). Within the DHS, four dif­ferent agencies—Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), Citizenship Immigration Services, and the Coast Guard—are involved in protecting U.S. bor­ders and managing the flow of people and goods in and out of the United States.

One means for achieving systems integration is to consolidate activities, where it makes sense, under as few organizations as possible. Critical areas to consider are visa issuance and monitoring; land border surveillance; and screening, detention, investigation, and removal.

Visa Issuance and Monitoring.Congress should consolidate all visa activities in a single organization. While the Homeland Security Act of 2002 gave the Secretary of Homeland Security exclusive authority to issue regulations and admin­ister the visa program, consular officers remained part of the Department of State.

This was a mistake. The Bureau of Consular Affairs Office of Visa Services should be placed under the DHS. This would enable the DHS to focus on tightening, improving, and more broadly utilizing the visa function to meet the exigencies of homeland security.[28]

Border Security and Internal Enforcement. The creation of the DHS was supposed to consoli­date agencies with overlapping missions and better integrate the national border security effort. It has succeeded to some degree. Immigration border inspectors and Border Patrol agents have been merged with most of U.S. Customs and the border inspectors to create Customs and Border Protection. Customs and Immigration investigators and Deten­tion and Removal officers were combined into ICE, which is responsible for “internal enforcement.”

However, the reorganization exchanged one seam in U.S. security for another. Before creation of the DHS, people and goods entering the country were handled under separate systems. There were no common policies, programs, or standards. Dealing with dangers that involved both systems required coordination between two different agencies. Today, travelers and goods are handled by an integrated sys­tem, but border operations and interior enforcement are now bifurcated into two different organizations.

Complicating the border security picture is the mission of the Transportation Security Administra­tion (TSA). While most Americans associate the TSA with ground screeners at airports, it also has responsibility for overseeing security in all modes of transportation and the transportation of cargo. These missions have injected the TSA into border security and created friction with other DHS agen­cies. Consolidating CBP, ICE, and airport security screening into a single border services agency and transferring the remaining responsibilities of TSA to the critical infrastructure component under the DHS Undersecretary for Preparedness would effec­tively address all of these issues.[29]

An optimally organized border services agency would have command over (1) all visa issuance and monitoring activities; (2) integrated border enforce­ment teams organized on a regional basis that incor­porate border screening, detention and removal, and interior enforcement; and (3) a separate intelli­gence and targeting arm.

Technology Tools

While technology is not a silver-bullet solution for border security, it is essential to building an effective network-centric enterprise. To do that, acquisition must be conducted in a holistic man­ner. Therefore, the DHS must ensure that major acquisition programs with systems-wide impact are fully integrated into a master plan, are fully funded, and have the leadership and work force necessary to ensure success. Three programs should form the cornerstone of the DHS effort.

Deepwater. U.S. Coast Guard missions touch every aspect of protecting maritime borders. Yet the current funding level for Deepwater, the Coast Guard modernization program, is totally inade­quate. Increasing the annual budget for Deepwater to $1.5 billion per year would not only establish the needed capabilities more quickly, but also garner sig­nificant savings in lower procurement costs. Reduc­ing life-cycle expenses by retiring older and less capable systems would realize additional savings.[30]

Air Operations. The DHS acted correctly by merging ICE’s Office of Air and Marine Interdiction with Border Patrol aviation assets. This consolida­tion promises to achieve greater efficiency, flexibil­ity, and coordination for domestic airspace security and support operations.

Building greater aviation support capacity and flexibility into the DHS is critical to border security missions, supporting other federal law enforce­ment activities, and lessening demands on Defense Department air defense assets for homeland secu­rity missions. DHS assets also provide aviation law enforcement support to other federal agencies, negating their need to have their own “air forces.” Furthermore, general aviation is the fastest growing aviation sector, and the demand for forces to police the skies is growing.

What the DHS lacks is a suitable modernization plan for these assets as part of a network-centric security enterprise. This plan needs to be more than just an aviation modernization strategy. It needs to include the right complementary set of air, ground, intelligence, reconnaissance, surveillance, and response assets to support border security and interior enforcement.

US-VISIT. The United States Visitor and Immi­gration Status Indicator Technology (US-VISIT) program will record foreign visitors and workers leaving the country. This automated entry-exit sys­tem will rely on numerous information sources, including biometrics, to identify individuals and determine whether they should be admitted to the country. Through numerous processes, such as scanning of machine-readable passports, individual interviews, and fingerprinting of non-immigrant travelers, US-VISIT is intended to track a person’s immigration and visa status and alert authorities to expired visas. The collected information can then be checked against federal databases and watch lists.

Full implementation of US-VISIT faces numerous challenges, including meeting technical require­ments, ensuring adequate trained personnel, and obtaining sufficient physical infrastructure to sup­port screening operations and information technol­ogy needs.[31] Additionally, to support network-centric operations, the program must meet the needs of frontline officers. Information available to the Border Patrol needs to include the biometrically based “person-centric immigration files” so that scanning an illegal alien’s fingerprint will immedi­ately reveal any prior immigration history along with any current information from the Integrated Automated Fingerprint Identification System (IAFIS), DHS’s Automated Biometric Identification System (IDENT), and the National Criminal Infor­mation Center (NCIC) data base.

Legislation and Policy Reform

As Congress considers legislation on compre­hensive border and immigration security, it should include initiatives that will facilitate network-cen­tric operations.

State and Local Enforcement.The Secure Bor­der Initiative hits the mark in continuing the cur­rent policy to enhance relationships with state and local governments. A systems approach to border security requires cooperative relationships among federal, state, and local law enforcement agencies for immigration investigations. While using state and local law enforcement officers to enforce immi­gration laws has been controversial, such programs can be appropriate.

In June 2002, the Immigration and Naturaliza­tion Service (INS) and the State of Florida created a pilot program authorized by federal law that could serve as a model for enhanced and appropriate cooperation. It could be used by any state or polit­ical subdivision (e.g., city, county). The program trained selected state and local law officers to assist in domestic counterterrorism immigration investi­gations. The program’s memorandum of under­standing was renewed when the INS became part of the DHS.[32]

Congress should expand the program to include border enforcement, allow states to apply homeland security grants to the program (including overtime costs), and authorize additional ICE agents to sup­port this program.

In addition, the Immigration Reform Act of 1996 (Section 642) prohibits any federal, state, or local government entity or official from preventing its employees from sharing important information with the INS “regarding the citizenship or immigra­tion status, lawful or unlawful, of any individual.” In theory, this law effectively disallows (but does not sanction) so-called sanctuary cities, or local or state laws that block local or state law enforcement from cooperating with federal law enforcement in the area of immigration. As with federal government and state and local government cooperation in enforcing immigration laws generally, there is no need for new legislation. What is needed is for the federal government to prevent the active hindrance by states and localities of those laws being enforced.

State Defense Forces.There is nothing wrong with civilian volunteers wanting to help to secure the border or protect their property. However, if they are to be effective, they need to be part of the system.

There is already an appropriate vehicle for orga­nizing volunteers to support border security under state defense forces (SDFs). States are authorized to raise and maintain SDFs under the U.S. Constitu­tion and U.S. Code Title 32, Section 309. An SDF is under the command of the governor and reports to the state adjutant general. The state constitution and laws prescribe the SDF’s duties and responsibil­ities. These forces are state troops and are not funded by the federal government. In order for these troops to use armories, train on military instal­lations, and receive in-kind support, states must comply with federal standards for the National Guard. Personnel receive no pay for training but may be paid for active duty under state control.

Border security is an ideal mission for these vol­unteers. Congress can help by establishing a legisla­tive framework to require appropriate cooperation on SDF matters among the Defense Department, the Department of Homeland Security, and the state governments.[33]

Strengthened and Fully Applied Laws. On the legal side, the U.S. needs legislation that will help sys­tems to operate effectively. For example, expanded use of expedited removal and civil forfeiture laws to alien smuggling cases would help to minimize the time that border agents spend on individual illegal entrants while providing stronger penalties against those seeking to use “stash” houses for smuggled aliens. In addition, except for political asylum claims, Congress should bar those who voluntarily depart or are removed based on expedited removal from receiving U.S. immigration benefits.

The DHS and the Justice Department should propose tougher anti-fraud laws, especially in situ­ations in which document and other forms of illicit travel facilitation are linked to terrorists. Whenever travel documents are verified as fraudulent, they should be confiscated.

Getting the Resources Right

Exactly what resources are needed to gain con­trol of the borders remains unclear. No one really knows how many agents or what types of technol­ogies are needed to support the mission. Little or no information about what resources are needed to achieve an efficient and enforceable border has led to poor use of government money and a cycle of skepticism in Congress about authorizing and appropriating truly necessary sums. Key issues that need to be addressed include:

Boots on the Ground. Nothing can replace bor­der agents, but without analytical modeling to determine what combination of technologies, com­munications, vehicles, and people is needed, it is all a guessing game. Former INS Commissioner Jim Ziglar testified before the 9/11 Commission that an increase of 20,000 border agents to a total of about 31,700 is needed. However, that number must be matched against the increased efficiency achieved through technologies, the number of agents neces­sary to respond to the increased detection, and the impact of other immigration and border security reform.

Fences. The border patrol has incorporated the construction of physical barriers but has concluded that, while barriers in combination with ground enforcement proved effective, they were “fiscally and environmentally costly.”[34] Some border secu­rity advocates argue that border barriers can be an effective and efficient tool for discouraging illegal border crossing.[35] We need better data to deter­mine who is right.

Detention and Removal.Currently, the immi­gration detention system has 18,000 beds. The 2006 DHS appropriation bill included funding for only 2,000 more beds, bringing the number up to 20,000. This is still not enough. As a result, appre­hended unlawfully present persons are often released on their own recognizance until an immi­gration judge rules on their status. Many abscond before they are deported from the United States.

Addressing the problem requires doing some­thing. One way is to focus on increasing detention capacity, dramatically expanding available bed space. Another is to increase the speed of the process to limit bed-space needs. The most cost-effective means to effect removal must be determined. The United States must end the practice of “catch and release.” The Secure Border Initiative correctly dedi­cates resources to address this problem to “aggres­sively…reengineer the removal process.”[36] Speedy removal will be an effective deterrent and an impor­tant component of network-centric border control.

Today, none of the information needed to answer these and other pressing resource questions exists in a manner that would allow it to be used to make sound policies about the deployment and acquisi­tion of human and technical resources.

The Way Forward

The DHS’s Secure Border Initiative is a good step in securing the U.S. borders in the 21st century. However, while the SBI is called “transforma­tional,” it still needs to embrace a network-centric strategy. It must serve as a road map to the DHS’s future and inform congressional border and immi­gration reform efforts.

The Administration and Congress need to start making this vision a reality by:

Conclusion

Simply strengthening the current “layered sys­tems” approach to U.S. border security will not secure the border. Congress and the Administra­tion need to make key investments in infrastruc­ture, organization, technology, and resources and then support these efforts with appropriate legisla­tion and policy reform.

James Jay Carafano, Ph.D., is Senior Research Fel­low for National Security and Homeland Security in the Kathryn and Shelby Cullom Davis Institute for Interna­tional Studies at The Heritage Foundation. Janice Kephart, former counselor to the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission), contributed to this report.

 


[1]See press release, “Secure Border Initiative,” U.S. Department of Homeland Security, November 2, 2005, at www.dhs.gov/ dhspublic/interapp/press_release/press_release_0794.xml (November 2, 2005).

[2]As mentioned in the Secure Border Initiative, “DHS will improve border infrastructure in certain areas by increas­ing physical layers of security.” See Ibid.

[3]For example, Congress’s requirement (stated in the Enhanced Border Security and Visa Entry Reform Act of 2002) to inte­grate all visa issuance and monitoring data systems into Chimera (an interoperable, interagency system) has largely been ignored. James Jay Carafano, Ph.D., and Ha Nguyen, “Better Intelligence Sharing for Visa Issuance and Monitoring: An Imperative for Homeland Security,” Heritage Foundation Backgrounder No. 1699, October 27, 2003, at www.heritage.org/ Research/HomelandDefense/BG1699.cfm.

[4]In July 2005, the estimated U.S. population was over 295 million. Central Intelligence Agency, The World Factbook: 2005, Web ed., s.v., “United States,” at www.cia.gov/cia/publications/factbook/geos/us.html#People (November 15, 2005). The most widely quoted estimate of legal crossing of the U.S. border is 500 million people annually. For example, see National Com­mission on Terrorist Attacks Upon the United States, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (New York: W.W. Norton and Company, 2004), p. 383. Estimates of annual illegal entry at other than legal points of entry vary widely: 500,000 is a common estimate. Jim Edgar, Doris Meissner, and Ale­jandro Silva,“Keeping the Promise: Immigration Proposals from the Heartland,” Chicago Council on Foreign Relations, June 10, 2004, at www.ccfr.org/publications/immigration/ccfr%20immigration%20task%20force%202004%20report.pdf (Novem­ber 15, 2005).

[5]Travelers holding nonimmigrant visas comprise the majority of individuals entering the United States. Carafano and Nguyen, “Better Intelligence Sharing for Visa Issuance and Monitoring.” Additionally, others obtain immigration visas or are visitors carrying passports from the 27 countries participating in the visa waiver program. James Jay Carafano, Ph.D., and Richard Weitz, “Building the Alliance for Freedom: An Agenda for Improving and Expanding the Visa Waiver Program,” Heritage Foundation Backgrounder No. 1850, May 6, 2005, at www.heritage.org/Research/NationalSecurity/bg1850.cfm.

[6]In 2000, 11.5 million trucks, 2.2 million rail cars, 200,000 ships, and 11.6 million shipping containers crossed borders or entered through 314 American ports, while 80 million air passengers moved in and out of over 18,000 airports. See U.S. Department of Transportation, Transportation Annual Statistics Report 2000, BTS01–02, 2001, pp. 1–5, at www.bts.gov/
publications/transportation_statistics_annual_report/2000/pdf/entire.pdf
(November 15, 2005).

[7]A recent study of 94 foreign-born terrorists by Janice Kephart, former counsel for the 9/11 Commission, revealed that vir­tually all used some form of travel documentation to enter or remain in the United States. Janice Kephart, “Immigration Benefits and Terrorism,” Center for Immigration Studies, September 2005, p. 7.

[8]The 9/11 Commission Report, p. 383.

[9]Michael Chertoff, “Remarks by Homeland Security Secretary Michael Chertoff at the Houston Forum,” U.S. Department of Homeland Security, November 2, 2005, at www.dhs.gov/dhspublic/display?content=4920 (November 10, 2005).

[10]Estimates range from 9 million to 15 million. Jeffrey S. Passel, “Estimates of the Size and Characteristics of the Undocu­mented Population,” Pew Hispanic Center, March 21, 2005, pp. 2–4, at pewhispanic.org/files/reports/44.pdf (November 14, 2005), and Warren Strugatch, “The Changing Face of the Island’s Labor Force,” The New York Times, November 14, 2004, Section 14LI, p. 6. For additional estimates and a discussion of the difficulties in estimating the number of unlawful immi­grants residing or working in the United States, see Federation for American Immigration Reform, “How Many Illegal Aliens?,” updated February 2005, at www.fairus.org/site/PageServer?pagename=iic_immigrationissuecentersb8ca (November 15, 2005). Visa overstays account for about 2.3 million of the unlawfully present population in the United States. An even smaller number are stowaways or illegal maritime entrants, meaning that the overwhelming remainder entered illegally across one of the two land borders. U.S. General Accounting Office (now Government Accountability Office), Overstay Tracking: A Key Component of Homeland Security and a Layered Defense, GAO–04–82, May 2004, at www.gao.gov/new.items/ d0482.pdf (November 15, 2005).

[11]For example, see U.N. Office on Drugs and Crime, Global Illicit Drug Trends, 2002 (New York: United Nations, 2002), p. 87, at www.unodc.org/pdf/report_2002-06-26_1/report_2002-06-26_1.pdf (November 15, 2005), and James O. Finckenauer and Jennifer Schrock, “Human Trafficking: A Growing Criminal Market in the U.S.,” National Institute of Justice Interna­tional Center, at www.ojp.usdoj.gov/nij/international/ht.html (November 15, 2005).

[12]U.S. Department of Justice, National Drug Threat Assessment 2002, December 2001, p. 20.

[13]Office of National Drug Control Policy, Measuring the Deterrent Effect of Enforcement Operations on Drug Smuggling, 1991– 1999, August 2001, p. 1, at www.whitehousedrugpolicy.gov/publications/pdf/measure_deter_effct.pdf (November 15, 2005).

[14]Ibid., p. 14.

[15]Kevin Sullivan, “Tunnel Found Under Border with Mexico,” The Washington Post, February 22, 2002, p. A13.

[16]U.N.Office for Drug Control and Crime Prevention, Global Report on Crime and Justice (Oxford: Oxford University Press, 1999); National Intelligence Council, Global Trends 2015: A Dialogue About the Future with Nongovernment Experts (Washing­ton, D.C.: U.S. Government Printing Office, 2000), p. 41, at www.cia.gov/cia/reports/globaltrends2015/globaltrends2015.pdf (November 15, 2005); National Security Council, International Crime Threat Assessment, December 2000, at clinton4.nara.gov/WH/EOP/NSC/html/documents/pub45270/pub45270index.
html
(November 15, 2005); and U.S. General Accounting Office, International Crime Control: Sustained Executive-Level Coordination of Federal Response Needed, GAO–01–629, August 2001, at www.gao.gov/new.items/d01629.pdf (November 15, 2005).

[17]Press release, “Secure Border Initiative.”

[18]U.S. Department of Homeland Security, Office of Inspector General, “USCIS Faces Challenges in Modernizing Information Technology,” September 2005, at www.dhs.gov/interweb/assetlibrary/OIG_05-41_Sep05.pdf (November 15, 2005).

[19]Biometrics are methods of identifying a person based on physiological or behavioral characteristics, including the person’s face, fingerprints, hand geometry, handwriting, iris, retina, veins, and voice.

[20]Douglas S. Massey, “Backfire at the Border: Why Enforcement Without Legislation Cannot Stop Illegal Immigration,” Cato Institute Trade Policy Analysis No. 25, June 13, 2005, at www.freetrade.org/pubs/pas/tpa-029.pdf (November 15, 2005). Sim­ilarly, the Congressional Research Service concluded in a recent report that budget and manpower for the U.S. Border Patrol have tripled over the past 10 years. Apprehensions peaked at 1.6 million in 2000 and declined steadily to 905,065 in 2003. The report concluded that while the decline could be attributed to the “prevention through deterrence” strategy, which seeks to deter illegal border crossings by increased enforcement, the results might also reflect a downturn in the U.S. economy that offered fewer employment opportunities. In either case, it is clear that deterrence at the border alone has not significantly altered patterns of migrant labor. Blas Nunez-Neto, “Border Security: The Role of the U.S. Border Patrol,” Congressional Research Service Report for Congress, RL32562, September 7, 2004, p. 9.

[21]For example, even before 9/11, the General Accounting Office found that inspection space and inadequate roads connect­ing ports of entry were among the most significant factors contributing to northbound congestion at the border. U.S. Gen­eral Accounting Office, U.S.–Mexico Border: Better Planning, Coordination Needed to Handle Growing Commercial Traffic, GAO/NSIAD–00–25, March 2000, p. 14, at www.gao.gov/archive/2000/ns00025.pdf (November 15, 2005).

[22]For example, about 70 percent of Canada–U.S. cross-border truck traffic goes through just six crossing points. On the southern border, Laredo, Texas, is the gateway for 43 percent of the total tonnage moving across the U.S.–Mexico border. Likewise, nearly 95 percent of all non–North American foreign trade arrives by ship, but 50 of the over 350 U.S. ports account for 96 percent of all cargo tonnage, and 25 ports account for 95 percent of all container shipments. U.S. House of Representatives, Maritime Transportation Act of 2002, H. Rpt. 107–777, p. 4; National Chamber Foundation, “Trade and Transportation: A Study of North American Port and Intermodal Systems,” U.S. Chamber of Commerce, March 2003. In 2000, the top 20 U.S. gateway airports accounted for 90 percent of nonstop international air travel to and from the United States. See U.S. Department of Transportation, Bureau of Transportation Statistics, “Overseas Travel Trends,” at www.bts.gov/publications/us_international_travel_and_transportation_trends/
overtrends.html
(November 15, 2005).

[23]For example, in the wake of the 9/11 attacks, border security was tightened significantly. As a result, many truckers were delayed at border crossings for several hours. Because truckers are permitted to drive only 10 hours per day, significant delays at the border can add an extra day to delivery time. For example, after 9/11, Dairy Queen experienced huge delays in getting key ingredients for its ice cream cakes from Canada, and Ford Motor Company idled five U.S. manufacturing plants because of slow delivery from parts suppliers in Canada. Joseph Martha, “Just-in-Case Operations,” Warehouse Forum,Vol. 17, No. 2 (January 2002), at www.warehousing-forum.com/news/2002_01.pdf (November 15, 2005).

[24]Jeffrey N. Shane, “Innovative Finance and Border Infrastructure,” speech at FHWA/SCT Border Finance Conference, San Anto­nio, Texas, August 16, 2005, p. 3, at ostpxweb.dot.gov/S-3/Data/Border%20Finance%20Conf-San%20Antonio%20(8-16-05).pdf (November 15, 2005).

[25]Several are owned by the state and federal governments, and several are privately owned. Keith R. Phillips and Carlos Man­zanares, “Transportation Infrastructure and the Border Economy,” Federal Reserve Bank of Dallas, The Border Economy, June 2001, at www.dallasfed.org/research/border/tbe_phillips.html (November 15, 2005).

[26]Ronald D. Utt, Ph.D., “Congress Gets Another Chance to Improve America’s Transportation: Should It Be Its Last? (Draft),” Heritage Foundation WebMemo, March 7, 2005, at www.heritage.org/Research/SmartGrowth/highway-reauth2005.cfm.

[27]Project-based financing focuses on obtaining stand-alone investment from private investors and could include multiple investors, each with a different level of investment, varying rate of return, and different timeline for realizing those returns. Such strategies not only shift risk to the private sector, but also should lead to improved decision making about needed infrastructure investments. David Luberoff and Jay Walder, “U.S. Ports and Funding of Intermodal Facilities: An Overview of Key Issues,” unpublished paper, March 28, 2000.

[28]Carafano and Nguyen, “Better Intelligence Sharing for Visa Issuance and Monitoring.”

[29]James Jay Carafano, Ph.D., testimony before the Subcommittee on Management, Integration, and Oversight, Committee on Homeland Security, U.S. House of Representatives, March 10, 2005, at www.heritage.org/Research/HomelandDefense/ tst031005a.cfm.

[30]Robin F. Laird, Ph.D., Mark Gaspar, and Dan Proctor, “The Challenges to Developing a Effective Maritime Security Archi­tecture,” in James Jay Carafano and Alane Kochems, eds., “Making the Sea Safer,” Heritage Foundation Special Report No. 3, February 17, 2005, pp. 20–27, at www.heritage.org/Research/HomelandDefense/sr03.cfm.

[31]Rey Koslowski, “Real Challenges for Virtual Borders: The Implementation of US-VISIT,” Migration Policy Institute, June 2005, p. 2, at www.migrationpolicy.org/pubs/Koslowski_Report.pdf (November 15, 2005).

[32]James Jay Carafano, Ph.D., Paul Rosenzweig, and Alane Kochems, “An Agenda for Increasing State and Local Government Efforts to Combat Terrorism” Heritage Foundation Backgrounder No. 1826, February 24, 2005, at www.heritage.org/ Research/HomelandDefense/bg1826.cfm.

[33]James Jay Carafano and John R. Brinkerhoff, “Katrina’s Forgotten Responders: State Defense Forces Play a Vital Role,” Heri­tage Foundation Executive Memorandum No. 984, October 5, 2005, at www.heritage.org/Research/HomelandDefense/em984.cfm.

[34]Nunez-Neto, “Border Security,” p. 2.

[35]For example, see “We Need a Fence,” Web site, at www.weneedafence.com (November 17, 2005).

[36]Chertoff, “Remarks by Homeland Security Secretary Michael Chertoff at the Houston Forum.”

© 1995 - 2005 The Heritage Foundation http://www.heritage.org     
All Rights Reserved. Re-printed with permission.