2013 US Code
Title 8 - Aliens and Nationality
Chapter 15 - ENHANCED BORDER SECURITY AND VISA ENTRY REFORM (§§ 1701 - 1778)
Subchapter VI - MISCELLANEOUS PROVISIONS (§§ 1771 - 1778)
Section 1776 - Training program

View Metadata
Metadata
Publication TitleUnited States Code, 2012 Edition, Supplement 1, Title 8 - ALIENS AND NATIONALITY
CategoryBills and Statutes
CollectionUnited States Code
SuDoc Class NumberY 1.2/5:
Contained WithinTitle 8 - ALIENS AND NATIONALITY
CHAPTER 15 - ENHANCED BORDER SECURITY AND VISA ENTRY REFORM
SUBCHAPTER VI - MISCELLANEOUS PROVISIONS
Sec. 1776 - Training program
Containssection 1776
Date2013
Laws in Effect as of DateJanuary 16, 2014
Positive LawNo
Dispositionstandard
Source CreditPub. L. 108-458, title VII, §7201(d), Dec. 17, 2004, 118 Stat. 3811.
Statutes at Large References118 Stat. 3811, 3808
Public Law ReferencesPublic Law 108-458

Download PDF


Training program - 8 U.S.C. § 1776 (2013)
§1776. Training program (1) Review, evaluation, and revision of existing training programs

The Secretary of Homeland Security shall—

(A) review and evaluate the training regarding travel and identity documents, and techniques, patterns, and trends associated with terrorist travel that is provided to personnel of the Department of Homeland Security;

(B) in coordination with the Secretary of State, review and evaluate the training described in subparagraph (A) that is provided to relevant personnel of the Department of State; and

(C) in coordination with the Secretary of State, develop and implement an initial training and periodic retraining program—

(i) to teach border, immigration, and consular officials (who inspect or review travel or identity documents as part of their official duties) how to effectively detect, intercept, and disrupt terrorist travel; and

(ii) to ensure that the officials described in clause (i) regularly receive the most current information on such matters and are periodically retrained on the matters described in paragraph (2).

(2) Required topics of revised programs

The training program developed under paragraph (1)(C) shall include training in—

(A) methods for identifying fraudulent and genuine travel documents;

(B) methods for detecting terrorist indicators on travel documents and other relevant identity documents;

(C) recognition of travel patterns, tactics, and behaviors exhibited by terrorists;

(D) effective utilization of information contained in databases and data systems available to the Department of Homeland Security; and

(E) other topics determined to be appropriate by the Secretary of Homeland Security, in consultation with the Secretary of State or the Director of National Intelligence.

(3) Implementation (A) Department of Homeland Security (i) In general

The Secretary of Homeland Security shall provide all border and immigration officials who inspect or review travel or identity documents as part of their official duties with the training described in paragraph (1)(C).

(ii) Report to Congress

Not later than 12 months after December 17, 2004, and annually thereafter for a period of 3 years, the Secretary of Homeland Security shall submit a report to Congress that—

(I) describes the number of border and immigration officials who inspect or review identity documents as part of their official duties, and the proportion of whom have received the revised training program described in paragraph (1)(C)(i);

(II) explains the reasons, if any, for not completing the requisite training described in paragraph (1)(C)(i);

(III) provides a timetable for completion of the training described in paragraph (1)(C)(i) for those who have not received such training; and

(IV) describes the status of periodic retraining of appropriate personnel described in paragraph (1)(C)(ii).

(B) Department of State (i) In general

The Secretary of State shall provide all consular officers who inspect or review travel or identity documents as part of their official duties with the training described in paragraph (1)(C).

(ii) Report to Congress

Not later than 12 months after December 17, 2004, and annually thereafter for a period of 3 years, the Secretary of State shall submit a report to Congress that—

(I) describes the number of consular officers who inspect or review travel or identity documents as part of their official duties, and the proportion of whom have received the revised training program described in paragraph (1)(C)(i);

(II) explains the reasons, if any, for not completing the requisite training described in paragraph (1)(C)(i);

(III) provides a timetable for completion of the training described in paragraph (1)(C)(i) for those who have not received such training; and

(IV) describes the status of periodic retraining of appropriate personnel described in paragraph (1)(C)(ii).

(4) Assistance to others

The Secretary of Homeland Security may assist States, Indian tribes, local governments, and private organizations to establish training programs related to terrorist travel intelligence.

(5) Authorization of appropriations

There are authorized to be appropriated such sums as may be necessary for each of the fiscal years 2005 through 2009 to carry out the provisions of this section.

(Pub. L. 108–458, title VII, §7201(d), Dec. 17, 2004, 118 Stat. 3811.)

CODIFICATION

Section was enacted as part of the Intelligence Reform and Terrorism Prevention Act of 2004, and also as part of the 9/11 Commission Implementation Act of 2004, and not as part of the Enhanced Border Security and Visa Entry Reform Act of 2002 which comprises this chapter.

FINDINGS

Pub. L. 108–458, title VII, §7201(a), Dec. 17, 2004, 118 Stat. 3808, provided that: “Consistent with the report of the National Commission on Terrorist Attacks Upon the United States, Congress makes the following findings:

“(1) Travel documents are as important to terrorists as weapons since terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack sites.

“(2) International travel is dangerous for terrorists because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points.

“(3) Terrorists use evasive, but detectable, methods to travel, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.

“(4) Before September 11, 2001, no Federal agency systematically analyzed terrorist travel strategies. If an agency had done so, the agency could have discovered the ways in which the terrorist predecessors to al Qaeda had been systematically, but detectably, exploiting weaknesses in our border security since the early 1990s.

“(5) Many of the hijackers were potentially vulnerable to interception by border authorities. Analyzing their characteristic travel documents and travel patterns could have allowed authorities to intercept some of the hijackers and a more effective use of information available in government databases could have identified some of the hijackers.

“(6) The routine operations of our immigration laws and the aspects of those laws not specifically aimed at protecting against terrorism inevitably shaped al Qaeda's planning and opportunities.

“(7) New insights into terrorist travel gained since September 11, 2001, have not been adequately integrated into the front lines of border security.

“(8) The small classified terrorist travel intelligence collection and analysis program currently in place has produced useful results and should be expanded.”

Disclaimer: These codes may not be the most recent version. The United States Government Printing Office may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the US site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.