border security and terrorism defense institute of international legal studies regional defense...
TRANSCRIPT
![Page 1: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/1.jpg)
Border Security and Terrorism
Defense Institute of International Legal Studies
Regional Defense Combating Terrorism Fellowship Program
![Page 2: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/2.jpg)
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
2
Introduction:Module Objectives
• Participants will be able to list the tools for effective border control
• Participants will be able to list effective ways to impede terrorist travel
• Participants will be able to describe the regional efforts to combat terrorism in Africa
![Page 3: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/3.jpg)
I. Introduction
• Global interconnectivity
• Terrorists target global infrastructure
• Primary goal: Prevent terrorism while respecting human rights and promoting economic development
3
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 4: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/4.jpg)
I. Introduction
• Two key aspects
• Physical security of the borders
• Treatment of alien nationals
4
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 5: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/5.jpg)
I. Introduction
UN Security Council Resolution 1373 requires that states “prevent the movement of terrorists or terrorist groups by effective border controls”
5
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 6: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/6.jpg)
II. An Interconnected World
• Total world merchandise exports in 2009 = $12.1 trillion
• 90% of world cargo moves by container
• Worldwide trade of 7.5 billion tons of goods by sea alone in 2006
• Terrorists exploit and target the connections
6
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 7: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/7.jpg)
II. Port Security Initiatives
• Smart Borders: dedicated pre-clearance lanes and public-private partnerships
• Container Security Initiative: identification of high-risk containers, pre-screening, high-tech inspection and “Smart” containers
7
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 8: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/8.jpg)
II. Prohibited Materials
• General Agreement on Tariffs and Trade (GATT)(1947) – right of States to take any action considered necessary for protection of essential security interests or maintenance of international peace and security
8
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 9: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/9.jpg)
II. Effective Border Control
• Convention on Marking Plastic Explosives for the Purpose of Identification (1991)
• A Convention on Suppression of Acts of Nuclear Terrorism was adopted by the General Assembly in April 2005
9
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 10: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/10.jpg)
II. Hot Pursuit
• Art. 23 of the Convention on the High Seas (1958) and Art. 111 of the Convention on the Law of the Sea (1982) create a right of (uninterrupted) hot pursuit into international waters but not into foreign seas
• No similar arrangement exists on land except by treaty arrangement
10
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 11: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/11.jpg)
II. No Safe Haven
• UN Security Council Resolution 1373 requires that states “deny safe haven to those who finance, plan, support, or commit terrorist acts.”
11
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 12: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/12.jpg)
II. Effective Border Control
• SCR 1373 also established the Counter-Terrorism Committee to promote best practice standards
12
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 13: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/13.jpg)
IV. Treatment of Aliens
• Generally no obligation to admit aliens
• State obliged to protect human rights and provide equal protection with no unreasonable distinctions
13
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 14: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/14.jpg)
IV. Dual-Check Admissions
• Dual-check admission system
• Consular review and visa issuance
• Separate Immigration Inspection at POE
• Special procedures for aliens from designated state sponsors ofterrorism
14
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 15: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/15.jpg)
IV. Competing Processes
• Criminal prosecution
• Extradition
• Deportation
• Voluntary return
15
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 16: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/16.jpg)
IV. Political Asylum
Under Articles 1(f) and 32 of the Refugee Convention States have no obligation to extend asylum to war criminals, those guilty of acts contrary to the UN Charter and individuals who would compromise national security or public order
16
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 17: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/17.jpg)
IV. Non-Refoulement
• Non-refoulement - forbids the expulsion of a refugee to a country where he or she might be at risk
16
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 18: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/18.jpg)
IV. National Security Exception
• From the 1951 Refugee Convention, its1967 Protocol and the 1984 Torture Convention
• Non-refoulement does not apply to a refugee who presents a danger to the security of the country in which he is, or has been, convicted of a particularly serious crime (Article 33)
18
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 19: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/19.jpg)
• Many other countries provide a legal basis to exclude or remove suspected alien terrorists or others who threaten national security
• Exclude such aliens from refuge and asylum protections; however, non-refoulement may apply
• Precise rules vary
19
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
V. Exclusion, Removal, and Asylum Laws
![Page 20: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/20.jpg)
• Terrorist exploit gaps in border security to facilitate attacks on domestic and foreign strategic targets
20
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
V. Exploiting Gaps in Border Security
![Page 21: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/21.jpg)
Targets may be:
• Government
• Strategic sites
• Military installations
• Federal or State government buildings
• Civilian
• Public transportation
21
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
V. Exploiting Gaps in Border Security
![Page 22: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/22.jpg)
Targets may be (continued):
• Airline
• Train
• National bus line
• Subway
• Large public facilities
• Sport stadiums or other large venues
• Houses of worship22
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
V. Exploiting Gaps in Border Security
![Page 23: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/23.jpg)
The ability to move freely between international boundaries allows terrorists to:
• Recruit terrorist members who have expertise (technical / cultural)
• Fundraise
23
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The Importance ofTerrorist Travel
![Page 24: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/24.jpg)
• Perform logistical tasks:
• Rent safe house
• Open bank accounts
• Facilitate employment / educational cover
• Purchase automobile for transportation
• Purchase surveillance equipment
24
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The Importance ofTerrorist Travel
![Page 25: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/25.jpg)
• Identify potential targets
• Conduct reconnaissance of potential targets
• Practice dry runs
• Conduct the attack
25
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The Importance ofTerrorist Travel
![Page 26: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/26.jpg)
• Failure on the part of countries to share information about known and suspected terrorists
• Lack of an international database system with terrorist screening information.
26
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Key Gaps in Preventing Terrorist Travel
![Page 27: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/27.jpg)
…failure to share information (continued):
•No database with identifying or biographical information on people with known or suspected links to terrorism.
27
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Key Gaps in Preventing Terrorist Travel
![Page 28: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/28.jpg)
• Widespread use of fraudulent travel documents
• Passports are easily counterfeited or doctored
28
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Key Gaps in Preventing Terrorist Travel
![Page 29: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/29.jpg)
• Corruption
• Issuance of official passports for fraudulent use
• Immigration officials allow terrorists to pass through checkpoints
29
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Key Gaps in Preventing Terrorist Travel
![Page 30: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/30.jpg)
• Identify known or suspected terrorists
• Ensure broad data sharing within own government and with partner nations
• Detect and apprehend terrorists wherever they reside
30
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Six Steps to Combat Terrorist Travel
![Page 31: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/31.jpg)
• Dismantle infrastructures and networks that facilitate terrorist travel
• Strengthen travel and document security
• Effectively screen travelers at point of departure and arrival
31
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Six Steps to Combat Terrorist Travel
![Page 32: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/32.jpg)
Hani Hanjour c.2000 Visa Application
32
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience and 9/11
![Page 33: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/33.jpg)
33
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience and 9/11
Abdulaziz Alomari c.2001 Visa Application
![Page 34: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/34.jpg)
34
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
• Umar Farouk Abdulmutallab
• A Story of Human and Systemic Failures
![Page 35: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/35.jpg)
Facts leading up to the flight:
• Umar traveled to Yemen to meet with al-Awlaki & pledged support to jihad. British intelligence notify U.S. intelligence of a “Umar Farouk”
35
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
![Page 36: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/36.jpg)
• Umar’s father warned U.S. Embassy officials of his son’s suspicious behavior and extreme religious views.
• Name is not added to the U.S. No-Fly List
36
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
![Page 37: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/37.jpg)
• State Department does not withdraw Umar’s U.S. visa citing U.S. intelligence request
• U.S. Intelligence concerned about compromising ongoing investigation
37
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
![Page 38: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/38.jpg)
• British officials previously denied visa application citing concerns about immigration fraud – not passed to U.S. because denial was not based on national security grounds
38
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
![Page 39: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/39.jpg)
• Was able to board a Northwest Airlines flight in Amsterdam without a passport by claiming he was a Sudanese refugee
39
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. The U.S. Experience Post 9/11
![Page 40: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/40.jpg)
• Intelligence collection, analysis, production, and dissemination
• Accomplishes this via:
• Foreign Terrorist Tracking Task Force
40
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel
![Page 41: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/41.jpg)
• Joint Intelligence Task Force – Combating Terrorism
• National Counterterrorism Center
• Human Smuggling and Trafficking Center
41
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel
![Page 42: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/42.jpg)
• Terrorist screening and information sharing with foreign partners
• Terrorist Interdiction Program
• Watchlisting
• Technical Support Working Group
42
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel
![Page 43: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/43.jpg)
• Assist international partners with capacity building
• Trans-Sahara Counterterrorism Partnership
• The Partnership for Regional East African Counterterrorism43
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel
![Page 44: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/44.jpg)
Unlike the United States, many countries do not have a Department of Homeland Security (DHS) but instead rely on various government offices to perform specific homeland security functions
44
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. International Approaches to Homeland Security and Terrorism
![Page 45: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/45.jpg)
Functions include funding, intelligence, civil defense, law enforcement, counterterrorism measures, domestic crisis management, emergency response, border control, transport security and countering CBRNthreats45
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. International Approaches to Homeland Security and Terrorism
![Page 46: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/46.jpg)
Comprehensive counterterrorism legislation
• DRC has no comprehensive counterterrorism legislation
46
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Democratic Republic of the Congo
![Page 47: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/47.jpg)
Countering terrorist financing
• DRC does have legislation criminalizing money laundering and terrorist financing
47
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Democratic Republic of the Congo
![Page 48: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/48.jpg)
• Has a Financial Intelligence Unit
• As of 18 Aug 2011, has not completed any money laundering prosecutions or convictions
48
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Democratic Republic of the Congo
![Page 49: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/49.jpg)
Regional and international cooperation
• 2010 ratified the International Convention for Suppression of Acts of Nuclear Terrorism
49
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Democratic Republic of the Congo
![Page 50: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/50.jpg)
Countering terrorist financing
• January 2011, Niger passed a law implementing the International Convention on the Suppression of Financing Terrorism
50
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Niger
![Page 51: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/51.jpg)
July 2011, Niger created the National Coordinating Committee on the Fight against Money Laundering and Terrorist Financing
Member of the Inter-Governmental Action Group against Money Laundering in West Africa – a financial action task force-style regional body
51
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Niger
![Page 52: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/52.jpg)
Member of the Inter-Governmental Action Group against Money Laundering in West Africa – a financial action task force-style regional body
52
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Niger
![Page 53: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/53.jpg)
Regional and international cooperation
• Cooperated with U.S. counterterrorism efforts and is a Trans-Sahara Counterterrorism Partnership country
53
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Niger
![Page 54: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/54.jpg)
• Entered partnership to establish and conduct operations with Mali, Algeria, and Mauritania
• Agreed to permit French forces to conduct surveillance operations in Niamey following a kidnapping in Arlit
54
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Niger
![Page 55: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/55.jpg)
Legislation and law enforcement
•Revised counterterrorism legislation has been stalled since 2008
•Lack of capacity hindered the ability of the National Police Force to respond to security and terrorist threats
55
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Nigeria
![Page 56: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/56.jpg)
Countering terrorist financing
•Economic and Financial Crimes Commission Act covers money collected to carry out terrorist acts but does not cover money collected to aid terrorist organizations or individuals
56
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Nigeria
![Page 57: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/57.jpg)
Regional and international cooperation
•Cooperated closely with the U.S. Department of Homeland Security and the International Civil Aviation Organization to strengthen Nigerian safety and security systems at 4 major international airports
•Member of the Trans-Sahara
Counterterrorism Partnership57
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Nigeria
![Page 58: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/58.jpg)
• Signed the Beijing Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation
• Signed the Protocol to the Convention for the Suppression of Unlawful Seizure of Aircraft
58
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Nigeria
![Page 59: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/59.jpg)
Legislation and law enforcement
• The Malian judiciary prosecuted one terrorist case – convicted four AQIM operatives for misdemeanor arms possession; released with time served
59
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Mali
![Page 60: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/60.jpg)
Countering terrorist finance
• November 2010 Malian National Assembly adopted legislation to strengthen the authority of the National Financial Information Processing Unit, Mali Financial Intelligence Unit
60
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Mali
![Page 61: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/61.jpg)
• National Assembly brought Malian code into conformity with regional standards and the International Convention on the Suppression of the Financing of Terrorism
• …BUT the legislation was not signed by the President
61
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Mali
![Page 62: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/62.jpg)
Regional and international cooperation
• Participated in training programs to increase the capacity of its security and military forces
62
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Mali
![Page 63: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/63.jpg)
• Member of the Inter Governmental Action Group against Money Laundering in West Africa
• Ratified the Amendment to the Convention on the Physical Protection of Nuclear Material
63
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
VI. Mali
![Page 64: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/64.jpg)
VI. Homeland Security and Terrorism
• Is a Trans-Sahara Counterterrorism Partnership Country
64
I. Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion, Removal and Asylum Laws
VI. Homeland Security
VII. Conclusion
![Page 65: Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program](https://reader036.vdocuments.us/reader036/viewer/2022062423/56649e3f5503460f94b2f71c/html5/thumbnails/65.jpg)
Border Security and Terrorism
Defense Institute of International Legal Studies
Regional Defense Combating Terrorism Fellowship Program