Page:United States Statutes at Large Volume 118.djvu/3839

From Wikisource
Jump to navigation Jump to search
This page needs to be proofread.

118 STAT. 3809 PUBLIC LAW 108–458—DEC. 17, 2004 systematically, but detectably, exploiting weaknesses in our border security since the early 1990s. (5) Many of the hijackers were potentially vulnerable to interception by border authorities. Analyzing their char- acteristic travel documents and travel patterns could have allowed authorities to intercept some of the hijackers and a more effective use of information available in government data- bases could have identified some of the hijackers. (6) The routine operations of our immigration laws and the aspects of those laws not specifically aimed at protecting against terrorism inevitably shaped al Qaeda’s planning and opportunities. (7) New insights into terrorist travel gained since Sep- tember 11, 2001, have not been adequately integrated into the front lines of border security. (8) The small classified terrorist travel intelligence collec- tion and analysis program currently in place has produced useful results and should be expanded. (b) STRATEGY.— (1) IN GENERAL.—Not later than 1 year after the date of enactment of this Act, the Director of the National Counterterrorism Center shall submit to Congress unclassified and classified versions of a strategy for combining terrorist travel intelligence, operations, and law enforcement into a cohe- sive effort to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility domestically and internationally. The report to Congress should include a description of the actions taken to implement the strategy and an assessment regarding vulnerabilities within the United States and foreign travel systems that may be exploited by international terrorists, human smugglers and traffickers, and their facilitators. (2) COORDINATION.—The strategy shall be developed in coordination with all relevant Federal agencies. (3) CONTENTS.—The strategy may address— (A) a program for collecting, analyzing, disseminating, and utilizing information and intelligence regarding ter- rorist travel tactics and methods, and outline which Federal intelligence, diplomatic, and law enforcement agencies will be held accountable for implementing each element of the strategy; (B) the intelligence and law enforcement collection, analysis, operations, and reporting required to identify and disrupt terrorist travel tactics, practices, patterns, and trends, and the terrorist travel facilitators, document forgers, human smugglers, travel agencies, and corrupt border and transportation officials who assist terrorists; (C) the training and training materials required by consular, border, and immigration officials to effectively detect and disrupt terrorist travel described under sub- section (c)(3); (D) the new technology and procedures required and actions to be taken to integrate existing counterterrorist travel document and mobility intelligence into border secu- rity processes, including consular, port of entry, border patrol, maritime, immigration benefits, and related law enforcement activities; 50 USC 404o note. Deadline. Reports. VerDate 11-MAY-2000 13:54 Nov 10, 2005 Jkt 029194 PO 00000 Frm 00343 Fmt 6580 Sfmt 6581 C:\STATUTES\2004\29194PT4.001 APPS10 PsN: 29194PT4