FEDERAL · 8 U.S.C. · Chapter SUBCHAPTER VI—MISCELLANEOUS PROVISIONS
Training program
8 U.S.C. § 1776
Title8 — Aliens and Nationality
ChapterSUBCHAPTER VI—MISCELLANEOUS PROVISIONS
This text of 8 U.S.C. § 1776 (Training program) is published on Counsel Stack Legal Research, covering United States primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.
Bluebook
8 U.S.C. § 1776.
Text
(1)Review, evaluation, and revision of existing training programs
The Secretary of Homeland Security shall—
(A)review and evaluate the training regarding travel and identity documents, and techniques, patterns, and trends associated with terrorist travel that is provided to personnel of the Department of Homeland Security;
(B)in coordination with the Secretary of State, review and evaluate the training described in subparagraph (A) that is provided to relevant personnel of the Department of State; and
(C)in coordination with the Secretary of State, develop and implement an initial training and periodic retraining program—
(i)to teach border, immigration, and consular officials (who inspect or review travel or identity documents as part of their official duties) how to effectively dete
Free access — add to your briefcase to read the full text and ask questions with AI
Source Credit
History
(Pub. L. 108–458, title VII, §7201(d), Dec. 17, 2004, 118 Stat. 3811.)
Editorial Notes
Editorial Notes
Codification
Section was enacted as part of the Intelligence Reform and Terrorism Prevention Act of 2004, and also as part of the 9/11 Commission Implementation Act of 2004, and not as part of the Enhanced Border Security and Visa Entry Reform Act of 2002 which comprises this chapter.
Statutory Notes and Related Subsidiaries
Findings
Pub. L. 108–458, title VII, §7201(a), Dec. 17, 2004, 118 Stat. 3808, provided that: "Consistent with the report of the National Commission on Terrorist Attacks Upon the United States, Congress makes the following findings:
"(1) Travel documents are as important to terrorists as weapons since terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack sites.
"(2) International travel is dangerous for terrorists because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points.
"(3) Terrorists use evasive, but detectable, methods to travel, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.
"(4) Before September 11, 2001, no Federal agency systematically analyzed terrorist travel strategies. If an agency had done so, the agency could have discovered the ways in which the terrorist predecessors to al Qaeda had been systematically, but detectably, exploiting weaknesses in our border security since the early 1990s.
"(5) Many of the hijackers were potentially vulnerable to interception by border authorities. Analyzing their characteristic travel documents and travel patterns could have allowed authorities to intercept some of the hijackers and a more effective use of information available in government databases could have identified some of the hijackers.
"(6) The routine operations of our immigration laws and the aspects of those laws not specifically aimed at protecting against terrorism inevitably shaped al Qaeda's planning and opportunities.
"(7) New insights into terrorist travel gained since September 11, 2001, have not been adequately integrated into the front lines of border security.
"(8) The small classified terrorist travel intelligence collection and analysis program currently in place has produced useful results and should be expanded."
Codification
Section was enacted as part of the Intelligence Reform and Terrorism Prevention Act of 2004, and also as part of the 9/11 Commission Implementation Act of 2004, and not as part of the Enhanced Border Security and Visa Entry Reform Act of 2002 which comprises this chapter.
Statutory Notes and Related Subsidiaries
Findings
Pub. L. 108–458, title VII, §7201(a), Dec. 17, 2004, 118 Stat. 3808, provided that: "Consistent with the report of the National Commission on Terrorist Attacks Upon the United States, Congress makes the following findings:
"(1) Travel documents are as important to terrorists as weapons since terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack sites.
"(2) International travel is dangerous for terrorists because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points.
"(3) Terrorists use evasive, but detectable, methods to travel, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons with corrupt government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud.
"(4) Before September 11, 2001, no Federal agency systematically analyzed terrorist travel strategies. If an agency had done so, the agency could have discovered the ways in which the terrorist predecessors to al Qaeda had been systematically, but detectably, exploiting weaknesses in our border security since the early 1990s.
"(5) Many of the hijackers were potentially vulnerable to interception by border authorities. Analyzing their characteristic travel documents and travel patterns could have allowed authorities to intercept some of the hijackers and a more effective use of information available in government databases could have identified some of the hijackers.
"(6) The routine operations of our immigration laws and the aspects of those laws not specifically aimed at protecting against terrorism inevitably shaped al Qaeda's planning and opportunities.
"(7) New insights into terrorist travel gained since September 11, 2001, have not been adequately integrated into the front lines of border security.
"(8) The small classified terrorist travel intelligence collection and analysis program currently in place has produced useful results and should be expanded."
Cite This Page — Counsel Stack
Bluebook (online)
8 U.S.C. § 1776, Counsel Stack Legal Research, https://law.counselstack.com/usc/8/1776.