The Secretary of Homeland Security shall-
The training program developed under paragraph (1)(C) shall include training in-
The Secretary of Homeland Security shall provide all border and immigration officials who inspect or review travel or identity documents as part of their official duties with the training described in paragraph (1)(C).
Not later than 12 months after December 17, 2004, and annually thereafter for a period of 3 years, the Secretary of Homeland Security shall submit a report to Congress that-
The Secretary of State shall provide all consular officers who inspect or review travel or identity documents as part of their official duties with the training described in paragraph (1)(C).
Not later than 12 months after December 17, 2004, and annually thereafter for a period of 3 years, the Secretary of State shall submit a report to Congress that-
The Secretary of Homeland Security may assist States, Indian tribes, local governments, and private organizations to establish training programs related to terrorist travel intelligence.
There are authorized to be appropriated such sums as may be necessary for each of the fiscal years 2005 through 2009 to carry out the provisions of this section.
8 U.S.C. § 1776
EDITORIAL NOTES
CODIFICATIONSection was enacted as part of the Intelligence Reform and Terrorism Prevention Act of 2004, and also as part of the 9/11 Commission Implementation Act of 2004, and not as part of the Enhanced Border Security and Visa Entry Reform Act of 2002 which comprises this chapter.
STATUTORY NOTES AND RELATED SUBSIDIARIES
FINDINGS Pub. L. 108-458, title VII, §7201(a), Dec. 17, 2004, 118 Stat. 3808, provided that: "Consistent with the report of the National Commission on Terrorist Attacks Upon the United States, Congress makes the following findings:"(1) Travel documents are as important to terrorists as weapons since terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack sites."(2) International travel is dangerous for terrorists because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points."(3) Terrorists use evasive, but detectable, methods to travel, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud."(4) Before September 11, 2001, no Federal agency systematically analyzed terrorist travel strategies. If an agency had done so, the agency could have discovered the ways in which the terrorist predecessors to al Qaeda had been systematically, but detectably, exploiting weaknesses in our border security since the early 1990s."(5) Many of the hijackers were potentially vulnerable to interception by border authorities. Analyzing their characteristic travel documents and travel patterns could have allowed authorities to intercept some of the hijackers and a more effective use of information available in government databases could have identified some of the hijackers."(6) The routine operations of our immigration laws and the aspects of those laws not specifically aimed at protecting against terrorism inevitably shaped al Qaeda's planning and opportunities. "(7) New insights into terrorist travel gained since September 11, 2001, have not been adequately integrated into the front lines of border security."(8) The small classified terrorist travel intelligence collection and analysis program currently in place has produced useful results and should be expanded."