Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program I. Introduction: Module Objectives Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws • Participants will be able to list the tools for effective border control • Participants will be able to list effective ways to impede terrorist travel • Participants will be able to describe the regional efforts to combat terrorism in Africa VI. Homeland Security VII. Conclusion 2 I. I. Introduction Introduction II. Border Control • Global interconnectivity IV. Human Traffic • V. Exclusion, Removal and Asylum Laws Terrorists target global infrastructure • Primary goal: Prevent terrorism while respecting human rights and promoting economic development III. [Not used.] VI. Homeland Security VII. Conclusion 3 I. I. Introduction Introduction II. Border Control • III. [Not used.] Two key aspects IV. Human Traffic • V. Exclusion, Removal and Asylum Laws Physical security of the borders • Treatment of alien nationals VI. Homeland Security VII. Conclusion 4 I. I. Introduction Introduction II. Border Control UN Security Council Resolution 1373 requires that states “prevent the movement of terrorists or terrorist groups by effective border controls” III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 5 I. II. An Interconnected World Introduction II. Border Control • Total world merchandise exports in 2009 = $12.1 trillion V. Exclusion, Removal and Asylum Laws • 90% of world cargo moves by container VI. Homeland Security • Worldwide trade of 7.5 billion tons of goods by sea alone in 2006 • Terrorists exploit and target the connections III. [Not used.] IV. Human Traffic VII. Conclusion 6 I. II. Port Security Initiatives Introduction II. Border Control III. [Not used.] • Smart Borders: dedicated pre-clearance lanes and public-private partnerships • Container Security Initiative: identification of high-risk containers, pre-screening, high-tech inspection and “Smart” containers IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 7 I. II. Prohibited Materials Introduction II. Border Control • III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 8 General Agreement on Tariffs and Trade (GATT)(1947) – right of States to take any action considered necessary for protection of essential security interests or maintenance of international peace and security I. II. Effective Border Control Introduction II. Border Control III. [Not used.] • Convention on Marking Plastic Explosives for the Purpose of Identification (1991) • A Convention on Suppression of Acts of Nuclear Terrorism was adopted by the General Assembly in April 2005 IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 9 I. II. Hot Pursuit Introduction II. Border Control III. [Not used.] • Art. 23 of the Convention on the High Seas (1958) and Art. 111 of the Convention on the Law of the Sea (1982) create a right of (uninterrupted) hot pursuit into international waters but not into foreign seas • No similar arrangement exists on land except by treaty arrangement IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 10 I. II. No Safe Haven Introduction II. Border Control • III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 11 UN Security Council Resolution 1373 requires that states “deny safe haven to those who finance, plan, support, or commit terrorist acts.” I. II. Effective Border Control Introduction II. Border Control • III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 12 SCR 1373 also established the Counter-Terrorism Committee to promote best practice standards I. IV. Treatment of Aliens Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 13 • Generally no obligation to admit aliens • State obliged to protect human rights and provide equal protection with no unreasonable distinctions I. IV. Dual-Check Admissions Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 14 • Dual-check admission system • Consular review and visa issuance • Separate Immigration Inspection at POE • Special procedures for aliens from designated state sponsors of terrorism I. IV. Competing Processes Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 15 • Criminal prosecution • Extradition • Deportation • Voluntary return I. IV. Political Asylum Introduction II. Border Control Under Articles 1(f) and 32 of the Refugee Convention States have no obligation to extend asylum to war criminals, those guilty of acts contrary to the UN Charter and individuals who would compromise national security or public order III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 16 I. IV. Non-Refoulement Introduction II. Border Control • Non-refoulement forbids the expulsion of a refugee to a country where he or she might be at risk III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 16 II. Border Control IV. National Security Exception III. [Not used.] • From the 1951 Refugee Convention, its1967 Protocol and the 1984 Torture Convention • Non-refoulement does not apply to a refugee who presents a danger to the security of the country in which he is, or has been, convicted of a particularly serious crime (Article 33) I. Introduction IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 18 I. V. Exclusion, Removal, and Asylum Laws Introduction II. Border Control III. [Not used.] • Many other countries provide a legal basis to exclude or remove suspected alien terrorists or others who threaten national security • Exclude such aliens from refuge and asylum protections; however, non-refoulement may apply • Precise rules vary IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 19 I. V. Exploiting Gaps in Border Security Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 20 Terrorist exploit gaps in border security to facilitate attacks on domestic and foreign strategic targets I. V. Exploiting Gaps in Border Security Introduction II. Border Control III. [Not used.] Targets may be: IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security • Government • Strategic sites • Military installations • Federal or State government buildings • Civilian • Public transportation VII. Conclusion 21 I. V. Exploiting Gaps in Border Security Introduction II. Border Control III. [Not used.] Targets may be (continued): IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 22 • Airline • Train • National bus line • Subway • Large public facilities • Sport stadiums or other large venues • Houses of worship I. VI. The Importance of Terrorist Travel Introduction II. Border Control III. [Not used.] The ability to move freely between international boundaries allows terrorists to: IV. Human Traffic V. Exclusion, Removal and Asylum Laws • Recruit terrorist members who have expertise (technical / cultural) • Fundraise VI. Homeland Security VII. Conclusion 23 I. VI. The Importance of Terrorist Travel Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 24 Perform logistical tasks: • Rent safe house • Open bank accounts • Facilitate employment / educational cover • Purchase automobile for transportation • Purchase surveillance equipment I. VI. The Importance of Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 25 • Identify potential targets • Conduct reconnaissance of potential targets • Practice dry runs • Conduct the attack I. VI. Key Gaps in Preventing Terrorist Travel Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws Failure on the part of countries to share information about known and suspected terrorists • VI. Homeland Security VII. Conclusion 26 Lack of an international database system with terrorist screening information. I. VI. Key Gaps in Preventing Terrorist Travel Introduction II. Border Control III. [Not used.] …failure to share information (continued): IV. Human Traffic V. Exclusion, Removal and Asylum Laws • VI. Homeland Security VII. Conclusion 27 No database with identifying or biographical information on people with known or suspected links to terrorism. I. VI. Key Gaps in Preventing Terrorist Travel Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws Widespread use of fraudulent travel documents • VI. Homeland Security VII. Conclusion 28 Passports are easily counterfeited or doctored I. VI. Key Gaps in Preventing Terrorist Travel Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 29 Corruption • Issuance of official passports for fraudulent use • Immigration officials allow terrorists to pass through checkpoints I. VI. Six Steps to Combat Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws • Identify known or suspected terrorists • Ensure broad data sharing within own government and with partner nations • Detect and apprehend terrorists wherever they reside VI. Homeland Security VII. Conclusion 30 I. VI. Six Steps to Combat Terrorist Travel Introduction II. Border Control III. [Not used.] • Dismantle infrastructures and networks that facilitate terrorist travel VI. Homeland Security • Strengthen travel and document security VII. Conclusion • Effectively screen travelers at point of departure and arrival IV. Human Traffic V. Exclusion, Removal and Asylum Laws 31 I. VI. The U.S. Experience and 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic Hani Hanjour c.2000 Visa Application V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 32 I. VI. The U.S. Experience and 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic Abdulaziz Alomari c.2001 Visa Application V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 33 I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 34 • Umar Farouk Abdulmutallab • A Story of Human and Systemic Failures I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic Facts leading up to the flight: V. Exclusion, Removal and Asylum Laws • VI. Homeland Security VII. Conclusion 35 Umar traveled to Yemen to meet with al-Awlaki & pledged support to jihad. British intelligence notify U.S. intelligence of a “Umar Farouk” I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic • Umar’s father warned U.S. Embassy officials of his son’s suspicious behavior and extreme religious views. • Name is not added to the U.S. No-Fly List V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 36 I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] IV. Human Traffic • State Department does not withdraw Umar’s U.S. visa citing U.S. intelligence request • U.S. Intelligence concerned about compromising ongoing investigation V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 37 I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 38 British officials previously denied visa application citing concerns about immigration fraud – not passed to U.S. because denial was not based on national security grounds I. VI. The U.S. Experience Post 9/11 Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 39 Was able to board a Northwest Airlines flight in Amsterdam without a passport by claiming he was a Sudanese refugee I. VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security • Intelligence collection, analysis, production, and dissemination • Accomplishes this via: • VII. Conclusion 40 Foreign Terrorist Tracking Task Force I. VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 41 • Joint Intelligence Task Force – Combating Terrorism • National Counterterrorism Center • Human Smuggling and Trafficking Center I. VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic • V. Exclusion, Removal and Asylum Laws Terrorist screening and information sharing with foreign partners VI. Homeland Security • Terrorist Interdiction Program VII. Conclusion • Watchlisting • Technical Support Working Group 42 I. VI. Current U.S. Domestic Initiatives to Curb Terrorist Travel Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security • Assist international partners with capacity building • Trans-Sahara Counterterrorism Partnership • The Partnership for Regional East African Counterterrorism VII. Conclusion 43 I. VI. International Approaches to Homeland Security and Terrorism Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws Unlike the United States, many countries do not have a Department of Homeland Security (DHS) but instead rely on various government offices to perform specific homeland security functions VI. Homeland Security VII. Conclusion 44 I. VI. International Approaches to Homeland Security and Terrorism Introduction II. Border Control III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 45 Functions include funding, intelligence, civil defense, law enforcement, counterterrorism measures, domestic crisis management, emergency response, border control, transport security and countering CBRN threats I. VI. Democratic Republic of the Congo Introduction II. Border Control III. [Not used.] IV. Human Traffic Comprehensive counterterrorism legislation V. Exclusion, Removal and Asylum Laws • VI. Homeland Security VII. Conclusion 46 DRC has no comprehensive counterterrorism legislation I. VI. Democratic Republic of the Congo Introduction II. Border Control III. [Not used.] IV. Human Traffic Countering terrorist financing V. Exclusion, Removal and Asylum Laws • VI. Homeland Security VII. Conclusion 47 DRC does have legislation criminalizing money laundering and terrorist financing I. VI. Democratic Republic of the Congo Introduction II. Border Control III. [Not used.] • Has a Financial Intelligence Unit • As of 18 Aug 2011, has not completed any money laundering prosecutions or convictions IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 48 I. VI. Democratic Republic of the Congo Introduction II. Border Control III. [Not used.] IV. Human Traffic Regional and international cooperation V. Exclusion, Removal and Asylum Laws • VI. Homeland Security VII. Conclusion 49 2010 ratified the International Convention for Suppression of Acts of Nuclear Terrorism I. VI. Niger Introduction II. Border Control Countering terrorist financing III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 50 January 2011, Niger passed a law implementing the International Convention on the Suppression of Financing Terrorism I. VI. Niger Introduction II. Border Control July 2011, Niger created the National Coordinating Committee on the Fight against Money Laundering and Terrorist Financing III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws Member of the InterGovernmental Action Group against Money Laundering in West Africa – a financial action task force-style regional body VI. Homeland Security VII. Conclusion 51 I. VI. Niger Introduction II. Border Control Member of the InterGovernmental Action Group against Money Laundering in West Africa – a financial action task force-style regional body III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 52 I. VI. Niger Introduction II. Border Control Regional and international cooperation III. [Not used.] IV. Human Traffic • V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 53 Cooperated with U.S. counterterrorism efforts and is a Trans-Sahara Counterterrorism Partnership country I. VI. Niger Introduction II. Border Control • Entered partnership to establish and conduct operations with Mali, Algeria, and Mauritania • Agreed to permit French forces to conduct surveillance operations in Niamey following a kidnapping in Arlit III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 54 I. VI. Nigeria Introduction II. Border Control Legislation and law enforcement III. [Not used.] • Revised counterterrorism legislation has been stalled since 2008 • Lack of capacity hindered the ability of the National Police Force to respond to security and terrorist threats IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 55 I. VI. Nigeria Introduction II. Border Control Countering terrorist financing III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 56 Economic and Financial Crimes Commission Act covers money collected to carry out terrorist acts but does not cover money collected to aid terrorist organizations or individuals I. VI. Nigeria Introduction II. Border Control III. [Not used.] Regional and international cooperation IV. Human Traffic • Cooperated closely with the U.S. Department of Homeland Security and the International Civil Aviation Organization to strengthen Nigerian safety and security systems at 4 major international airports • Member of the Trans-Sahara Counterterrorism Partnership V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 57 I. VI. Nigeria Introduction II. Border Control III. [Not used.] • Signed the Beijing Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation • Signed the Protocol to the Convention for the Suppression of Unlawful Seizure of Aircraft IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 58 I. VI. Mali Introduction II. Border Control Legislation and law enforcement III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 59 The Malian judiciary prosecuted one terrorist case – convicted four AQIM operatives for misdemeanor arms possession; released with time served I. VI. Mali Introduction II. Border Control Countering terrorist finance III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 60 November 2010 Malian National Assembly adopted legislation to strengthen the authority of the National Financial Information Processing Unit, Mali Financial Intelligence Unit I. VI. Mali Introduction II. Border Control • National Assembly brought Malian code into conformity with regional standards and the International Convention on the Suppression of the Financing of Terrorism • …BUT the legislation was not signed by the President III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 61 I. VI. Mali Introduction II. Border Control III. [Not used.] Regional and international cooperation IV. Human Traffic • V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 62 Participated in training programs to increase the capacity of its security and military forces I. VI. Mali Introduction II. Border Control • Member of the Inter Governmental Action Group against Money Laundering in West Africa • Ratified the Amendment to the Convention on the Physical Protection of Nuclear Material III. [Not used.] IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 63 I. VI. Homeland Security and Terrorism Introduction II. Border Control III. [Not used.] • IV. Human Traffic V. Exclusion, Removal and Asylum Laws VI. Homeland Security VII. Conclusion 64 Is a Trans-Sahara Counterterrorism Partnership Country Border Security and Terrorism Defense Institute of International Legal Studies Regional Defense Combating Terrorism Fellowship Program