I. Introduction - Partnership for Peace Consortium of Defense

advertisement
Border
Security
and
Terrorism
Defense Institute of International Legal Studies
Regional Defense Combating Terrorism Fellowship Program
I.
Introduction:
Module Objectives
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
•
Participants will be able to list
the tools for effective border
control
•
Participants will be able to list
effective ways to impede
terrorist travel
•
Participants will be able to
describe the regional efforts
to combat terrorism in
Africa
VI. Homeland
Security
VII. Conclusion
2
I.
I. Introduction
Introduction
II. Border Control
•
Global interconnectivity
IV. Human Traffic
•
V. Exclusion,
Removal and
Asylum Laws
Terrorists target global
infrastructure
•
Primary goal: Prevent
terrorism while respecting
human rights and
promoting economic
development
III. [Not used.]
VI. Homeland
Security
VII. Conclusion
3
I.
I. Introduction
Introduction
II. Border Control
•
III. [Not used.]
Two key aspects
IV. Human Traffic
•
V. Exclusion,
Removal and
Asylum Laws
Physical security of the
borders
•
Treatment of alien
nationals
VI. Homeland
Security
VII. Conclusion
4
I.
I. Introduction
Introduction
II. Border Control
UN Security Council
Resolution 1373 requires
that states “prevent the
movement of terrorists or
terrorist groups by effective
border controls”
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
5
I.
II. An Interconnected World
Introduction
II. Border Control
•
Total world merchandise
exports in 2009 = $12.1
trillion
V. Exclusion,
Removal and
Asylum Laws
•
90% of world cargo moves
by container
VI. Homeland
Security
•
Worldwide trade of 7.5
billion tons of goods by sea
alone in 2006
•
Terrorists exploit and target
the connections
III. [Not used.]
IV. Human Traffic
VII. Conclusion
6
I.
II. Port Security Initiatives
Introduction
II. Border Control
III. [Not used.]
•
Smart Borders: dedicated
pre-clearance lanes and
public-private partnerships
•
Container Security Initiative:
identification of high-risk
containers, pre-screening,
high-tech inspection and
“Smart” containers
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
7
I.
II. Prohibited Materials
Introduction
II. Border Control
•
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
8
General Agreement on
Tariffs and Trade
(GATT)(1947) – right of
States to take any action
considered necessary for
protection of essential
security interests or
maintenance of
international peace and
security
I.
II. Effective Border Control
Introduction
II. Border Control
III. [Not used.]
•
Convention on Marking
Plastic Explosives for the
Purpose of Identification
(1991)
•
A Convention on
Suppression of Acts of
Nuclear Terrorism was
adopted by the General
Assembly in April 2005
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
9
I.
II. Hot Pursuit
Introduction
II. Border Control
III. [Not used.]
•
Art. 23 of the Convention
on the High Seas (1958)
and Art. 111 of the
Convention on the Law of
the Sea (1982) create a
right of (uninterrupted) hot
pursuit into international
waters but not into foreign
seas
•
No similar arrangement
exists on land except
by treaty arrangement
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
10
I.
II. No Safe Haven
Introduction
II. Border Control
•
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
11
UN Security Council
Resolution 1373 requires
that states “deny safe
haven to those who
finance, plan, support, or
commit terrorist acts.”
I.
II. Effective Border Control
Introduction
II. Border Control
•
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
12
SCR 1373 also established
the Counter-Terrorism
Committee to promote best
practice standards
I.
IV. Treatment of Aliens
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
13
•
Generally no obligation to
admit aliens
•
State obliged to protect
human rights and provide
equal protection with no
unreasonable distinctions
I.
IV. Dual-Check Admissions
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
14
•
Dual-check admission
system
•
Consular review and visa
issuance
•
Separate Immigration
Inspection at POE
•
Special procedures for
aliens from designated
state sponsors of
terrorism
I.
IV. Competing Processes
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
15
•
Criminal prosecution
•
Extradition
•
Deportation
•
Voluntary return
I.
IV. Political Asylum
Introduction
II. Border Control
Under Articles 1(f) and 32
of the Refugee Convention
States have no obligation to
extend asylum to war
criminals, those guilty of
acts contrary to the UN
Charter and individuals who
would compromise national
security or public order
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
16
I.
IV. Non-Refoulement
Introduction
II. Border Control
• Non-refoulement forbids the expulsion of a
refugee to a country
where he or she might be
at risk
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
16
II. Border Control
IV. National Security
Exception
III. [Not used.]
•
From the 1951 Refugee
Convention, its1967
Protocol and the 1984
Torture Convention
•
Non-refoulement does not
apply to a refugee who
presents a danger to the
security of the country in
which he is, or has been,
convicted of a particularly
serious crime
(Article 33)
I.
Introduction
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
18
I.
V. Exclusion, Removal,
and Asylum Laws
Introduction
II. Border Control
III. [Not used.]
•
Many other countries provide a
legal basis to exclude or
remove suspected alien
terrorists or others who
threaten national security
•
Exclude such aliens from
refuge and asylum protections;
however, non-refoulement
may apply
•
Precise rules vary
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
19
I.
V. Exploiting Gaps in
Border Security
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
20
Terrorist exploit gaps in
border security to
facilitate attacks on
domestic and foreign
strategic targets
I.
V. Exploiting Gaps in
Border Security
Introduction
II. Border Control
III. [Not used.]
Targets may be:
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
•
Government
•
Strategic sites
•
Military installations
•
Federal or State
government buildings
•
Civilian
•
Public
transportation
VII. Conclusion
21
I.
V. Exploiting Gaps in
Border Security
Introduction
II. Border Control
III. [Not used.]
Targets may be (continued):
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
22
•
Airline
•
Train
•
National bus line
•
Subway
•
Large public facilities
•
Sport stadiums or other
large venues
•
Houses of worship
I.
VI. The Importance of
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
The ability to move freely
between international
boundaries allows terrorists to:
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
•
Recruit terrorist members
who have expertise
(technical / cultural)
•
Fundraise
VI. Homeland
Security
VII. Conclusion
23
I.
VI. The Importance of
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
24
Perform logistical tasks:
•
Rent safe house
•
Open bank accounts
•
Facilitate employment /
educational cover
•
Purchase automobile for
transportation
•
Purchase
surveillance
equipment
I.
VI. The Importance of
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
25
•
Identify potential targets
•
Conduct reconnaissance
of potential targets
•
Practice dry runs
•
Conduct the attack
I.
VI. Key Gaps in Preventing
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
Failure on the part of
countries to share
information about known
and suspected terrorists
•
VI. Homeland
Security
VII. Conclusion
26
Lack of an
international
database system with
terrorist screening
information.
I.
VI. Key Gaps in Preventing
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
…failure to share information
(continued):
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
•
VI. Homeland
Security
VII. Conclusion
27
No database with
identifying or biographical
information on people with
known or suspected links
to terrorism.
I.
VI. Key Gaps in Preventing
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
Widespread use of
fraudulent travel
documents
•
VI. Homeland
Security
VII. Conclusion
28
Passports are easily
counterfeited or
doctored
I.
VI. Key Gaps in Preventing
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
29
Corruption
•
Issuance of official
passports for
fraudulent use
•
Immigration officials
allow terrorists to
pass through
checkpoints
I.
VI. Six Steps to Combat
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
•
Identify known or
suspected terrorists
•
Ensure broad data
sharing within own
government and with
partner nations
•
Detect and apprehend
terrorists wherever they
reside
VI. Homeland
Security
VII. Conclusion
30
I.
VI. Six Steps to Combat
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
•
Dismantle
infrastructures and
networks that facilitate
terrorist travel
VI. Homeland
Security
•
Strengthen travel and
document security
VII. Conclusion
•
Effectively screen
travelers at point of
departure and
arrival
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
31
I.
VI. The U.S. Experience
and 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Hani Hanjour
c.2000
Visa
Application
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
32
I.
VI. The U.S. Experience
and 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Abdulaziz
Alomari
c.2001
Visa
Application
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
33
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
34
•
Umar Farouk
Abdulmutallab
•
A Story of Human and
Systemic Failures
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Facts leading up to the
flight:
V. Exclusion,
Removal and
Asylum Laws
•
VI. Homeland
Security
VII. Conclusion
35
Umar traveled to Yemen
to meet with al-Awlaki &
pledged support to jihad.
British intelligence notify
U.S. intelligence of a
“Umar Farouk”
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
•
Umar’s father warned U.S.
Embassy officials of his
son’s suspicious behavior
and extreme religious
views.
•
Name is not added to the
U.S. No-Fly List
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
36
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
•
State Department does
not withdraw Umar’s
U.S. visa citing U.S.
intelligence request
•
U.S. Intelligence
concerned about
compromising ongoing
investigation
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
37
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
38
British officials previously
denied visa application
citing concerns about
immigration fraud – not
passed to U.S. because
denial was not based on
national security grounds
I.
VI. The U.S. Experience
Post 9/11
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
39
Was able to board a
Northwest Airlines flight
in Amsterdam without a
passport by claiming he
was a Sudanese
refugee
I.
VI. Current U.S. Domestic
Initiatives to Curb
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
•
Intelligence collection,
analysis, production,
and dissemination
•
Accomplishes this via:
•
VII. Conclusion
40
Foreign Terrorist
Tracking Task Force
I.
VI. Current U.S. Domestic
Initiatives to Curb
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
41
•
Joint Intelligence Task Force
– Combating Terrorism
•
National Counterterrorism
Center
•
Human Smuggling and
Trafficking Center
I.
VI. Current U.S. Domestic
Initiatives to Curb
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
•
V. Exclusion,
Removal and
Asylum Laws
Terrorist screening and
information sharing with
foreign partners
VI. Homeland
Security
•
Terrorist Interdiction
Program
VII. Conclusion
•
Watchlisting
•
Technical Support
Working Group
42
I.
VI. Current U.S. Domestic
Initiatives to Curb
Terrorist Travel
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
•
Assist international
partners with
capacity building
•
Trans-Sahara
Counterterrorism
Partnership
•
The Partnership for
Regional East
African
Counterterrorism
VII. Conclusion
43
I.
VI. International
Approaches to
Homeland Security
and Terrorism
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
Unlike the United States,
many countries do not have
a Department of Homeland
Security (DHS) but instead
rely on various government
offices to perform specific
homeland security functions
VI. Homeland
Security
VII. Conclusion
44
I.
VI. International
Approaches to
Homeland Security
and Terrorism
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
45
Functions include funding,
intelligence, civil defense,
law enforcement,
counterterrorism measures,
domestic crisis
management, emergency
response, border control,
transport security and
countering CBRN
threats
I.
VI. Democratic Republic
of the Congo
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Comprehensive
counterterrorism legislation
V. Exclusion,
Removal and
Asylum Laws
•
VI. Homeland
Security
VII. Conclusion
46
DRC has no
comprehensive
counterterrorism
legislation
I.
VI. Democratic Republic
of the Congo
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Countering terrorist
financing
V. Exclusion,
Removal and
Asylum Laws
•
VI. Homeland
Security
VII. Conclusion
47
DRC does have
legislation criminalizing
money laundering and
terrorist financing
I.
VI. Democratic Republic
of the Congo
Introduction
II. Border Control
III. [Not used.]
•
Has a Financial
Intelligence Unit
•
As of 18 Aug 2011, has not
completed any money
laundering prosecutions or
convictions
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
48
I.
VI. Democratic Republic
of the Congo
Introduction
II. Border Control
III. [Not used.]
IV. Human Traffic
Regional and international
cooperation
V. Exclusion,
Removal and
Asylum Laws
•
VI. Homeland
Security
VII. Conclusion
49
2010 ratified the
International Convention
for Suppression of Acts
of Nuclear Terrorism
I.
VI. Niger
Introduction
II. Border Control
Countering terrorist financing
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
50
January 2011, Niger passed
a law implementing the
International Convention on
the Suppression of
Financing Terrorism
I.
VI. Niger
Introduction
II. Border Control
July 2011, Niger created
the National Coordinating
Committee on the Fight
against Money Laundering
and Terrorist Financing
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
Member of the InterGovernmental Action Group
against Money Laundering
in West Africa – a financial
action task force-style
regional body
VI. Homeland
Security
VII. Conclusion
51
I.
VI. Niger
Introduction
II. Border Control
Member of the InterGovernmental Action Group
against Money Laundering
in West Africa – a financial
action task force-style
regional body
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
52
I.
VI. Niger
Introduction
II. Border Control
Regional and international
cooperation
III. [Not used.]
IV. Human Traffic
•
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
53
Cooperated with U.S.
counterterrorism efforts
and is a Trans-Sahara
Counterterrorism
Partnership country
I.
VI. Niger
Introduction
II. Border Control
•
Entered partnership to
establish and conduct
operations with Mali, Algeria,
and Mauritania
•
Agreed to permit French
forces to conduct surveillance
operations in Niamey
following a kidnapping in Arlit
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
54
I.
VI. Nigeria
Introduction
II. Border Control
Legislation and law enforcement
III. [Not used.]
•
Revised counterterrorism
legislation has been stalled
since 2008
•
Lack of capacity hindered the
ability of the National Police
Force to respond to security
and terrorist threats
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
55
I.
VI. Nigeria
Introduction
II. Border Control
Countering terrorist financing
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
56
Economic and Financial
Crimes Commission Act
covers money collected to
carry out terrorist acts but
does not cover money
collected to aid terrorist
organizations or individuals
I.
VI. Nigeria
Introduction
II. Border Control
III. [Not used.]
Regional and international
cooperation
IV. Human Traffic
•
Cooperated closely with the
U.S. Department of Homeland
Security and the International
Civil Aviation Organization to
strengthen Nigerian safety
and security systems at 4
major international airports
•
Member of the
Trans-Sahara
Counterterrorism
Partnership
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
57
I.
VI. Nigeria
Introduction
II. Border Control
III. [Not used.]
•
Signed the Beijing Convention
on the Suppression of
Unlawful Acts Relating to
International Civil Aviation
•
Signed the Protocol to the
Convention for the
Suppression of Unlawful
Seizure of Aircraft
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
58
I.
VI. Mali
Introduction
II. Border Control
Legislation and law enforcement
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
59
The Malian judiciary
prosecuted one terrorist case
– convicted four AQIM
operatives for misdemeanor
arms possession; released
with time served
I.
VI. Mali
Introduction
II. Border Control
Countering terrorist finance
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
60
November 2010 Malian
National Assembly adopted
legislation to strengthen the
authority of the National
Financial Information
Processing Unit, Mali
Financial Intelligence Unit
I.
VI. Mali
Introduction
II. Border Control
•
National Assembly
brought Malian code into
conformity with regional
standards and the
International Convention
on the Suppression of
the Financing of
Terrorism
•
…BUT the legislation
was not signed by
the President
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
61
I.
VI. Mali
Introduction
II. Border Control
III. [Not used.]
Regional and international
cooperation
IV. Human Traffic
•
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
62
Participated in training
programs to increase
the capacity of its
security and military
forces
I.
VI. Mali
Introduction
II. Border Control
•
Member of the Inter
Governmental Action
Group against Money
Laundering in West Africa
•
Ratified the Amendment to
the Convention on the
Physical Protection of
Nuclear Material
III. [Not used.]
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
63
I.
VI. Homeland Security
and Terrorism
Introduction
II. Border Control
III. [Not used.]
•
IV. Human Traffic
V. Exclusion,
Removal and
Asylum Laws
VI. Homeland
Security
VII. Conclusion
64
Is a Trans-Sahara
Counterterrorism
Partnership Country
Border
Security
and
Terrorism
Defense Institute of International Legal Studies
Regional Defense Combating Terrorism Fellowship Program
Download