Home / The Blog @ Homeland Security / Main Homeland Security Site

Leadership Journal

Monday, June 1, 2009

Western Hemisphere Travel Initiative: Boosting Border Security and Efficiency

CBP Officer Adam Roberts directing a traveler on how to use the RFID technology at the Peace Bridge border crossing in the Port of Buffalo, NY at 7 a.m. today Photo:CBPBefore January 2008, United States and Canadian citizens were not required to present specific travel documents when entering the United States through a land or sea port. That meant that a U.S. Customs and Border Protection (CBP) officer might only have the traveler’s word on which to base his or her decision to allow someone to enter the United States. Not surprisingly, this practice significantly hampered our ability to quickly verify a traveler's identity or citizenship, determine if they pose a threat, and importantly, hampered our ability to speed legitimate travelers across the border. Every day, CBP encountered hundreds of individuals trying to game the system and pass themselves off as American or Canadian—an untenable scenario that turned each traveler into a potential imposter.

On June 1, CBP will implement the Western Hemisphere Travel Initiative (WHTI), a result of the Intelligence Reform and Terrorism Prevention Act of 2004 and a key recommendation of the 9/11 Commission that requires U.S. and Canadian travelers to present a secure travel document that denotes identity and citizenship when entering our country. WHTI narrows the list of acceptable identity and citizenship documents to those in which we have great confidence because of their issuance process and physical security features. As a result, WHTI will strengthen our borders as we facilitate entry for U.S. citizens and legitimate foreign travelers – a core component of CBP's mission.

CBP is fully prepared to implement WHTI—we have ensured that you, the traveling public, have a choice among travel documents to best meet your needs; we have installed infrastructure in our ports to make your entry and inspection process go more quickly and more smoothly; and we have worked hard to communicate the new requirements to you well in advance of the June 1 deadline. We have also heard your concerns and made special provisions to accommodate U.S. and Canadian children under age 16—and those under age 19 traveling in school, sports, religious or other office groups—who need only present a copy of a birth certificate or alternative proof of citizenship to enter the United States by land or sea from Canada, Mexico, or the Caribbean.

WHTI compliant identification cards including passport, NEXUS, Enhanced Drivers License, SENTRI and FAST cardsNow we need your help to make these improvements to our border security as successful as they can be. We encourage you to obtain WHTI-compliant travel documents for entering the U.S. on June 1 and beyond. Approved documents include the traditional passport book as well as cards that are equipped with radio frequency identification (RFID) technology to make your trip even faster and more efficient: the U.S. passport card, a NEXUS, SENTRI or FAST Trusted Traveler Program card, or a state- or province-issued enhanced drivers license.

RFID-enabled documents are easy to use. When entering the United States from Mexico (or Canada), hold up your travel card (and those of any passengers in your car), drive slowly toward the inspection booth, and stop for an interview with the officer. The automated read of the RFID tag (a unique number that contains no personally identifiable information) links to a secure CBP database. Before you arrive at the booth, the CBP officer can review your photograph, biographic information, and the results of law enforcement checks. By queuing up this information while you’re still driving toward the booth, the officer can more quickly verify your identity and focus more attention on talking to you while shaving 6 – 8 seconds off of the current inspection process. Because all the RFID-enabled travel cards can be read at one time, it saves the officer from having to manually type information about each individual in your car.

We realize that some travelers arriving at the border will not have WHTI-compliant documents. I encourage you to continue with your travel plans and to obtain facilitative and secure WHTI travel documents as soon as possible. U.S. and Canadian citizens who lack WHTI-compliant documents but are otherwise admissible will not be denied entry into the United States on June 1 and during the subsequent transition period.

Obtaining a WHTI-approved document and complying with the law will help make our borders more secure. Getting your WHTI-compliant document will help make your border crossings easier and faster.

For more information on new documents that go into effect on June 1, please visit www.getyouhome.gov.

Jayson P. Ahern
Acting Commissioner, U.S. Customs and Border Protection

Originally published in the May 30, 2009 edition of the Houston Chronicle

Labels: ,

2 Comments:

  • To ALL Respective members of DHS,FBI, USCIS, CBP, and ICE.

    I would respectfully like to submit my findings and thoughts with regards to the efforts to secure the Homeland.

    I am a research analyst for Bio-authentication, Enrollment, Authentication and Verification. I have become entrenched in legislature and CONOPS that pertain to the "Transformation Progrom"

    It is CRITICAL to Identify Correctly who someone is upon Entry or Exit into borders of air, land, sea and VIRTUALLY in CYBERSPACE. The thought of corporate spies keystrokes away from critical computer systems that wage attacks on Fortune 500 Companies, Financial markets and even Governments is a frightening thought. The fight against Terrorism also means Anti-money laundering. With the pandemic of identity theft it leaves ALL borders vulnerable to attacks, not to mention results in 100's of billions of lost dollars. So my first of four questions is;

    1.How do we secure the borders, when we don't know where and who the enemy is?
    2.What are the enemies doing within the borders? 3.How are they using the economy to benefit in the black market trade and spend the USD with the vehicle being ID.THEFT.

    Secure Boarder Initiative, WHTI, US-VISIT, NEXUS, FAST,REAL ID, SENTRI, IDENT and IAFIS have all in some part failed and now there is the USCIS backlog of over 1.5 million and counting are waiting for FBI background checks and various other naturalization and immigration manual paper based channels and biometric enrollment make the wait times ridiculous and unacceptable.

    A solution as the USCIS Ombudsman stated is to build a Remote Virtual Up-front processing IVR Kiosk system that is language independent and can enroll, authenticate and verify who someone is. If you apply the CONOPS of the Information sharing environment (ISE) to USCIS the KEY is unification of information into the Biometric Storage System and Global On-line Enrolment System. The greatest fault within the 2.0 Billion US-VISIT program is that the system does not have data mining built into the system and unfortunately DHS and CBP, FBI and ICE do not know if someone EXITED the US or if they are still lingering within the borders. The last question is;

    How do you get them out?

    Under Section 326 of the Patriot Act
    (Verification of Identification) along with the IRTPA SEC. 7208. The solution was biometrics. The GOALS simply have not been met and they are as follows; .

    BIOMETRIC ENTRY AND EXIT DATA SYSTEM. ENTRY-EXIT SYSTEM GOALS. —The Department of Homeland Security shall operate the biometric entry and exit system so that it—
    (1) serves as a vital counterterrorism tool;
    (2) screens travelers efficiently and in a welcoming manner;
    (3) provides inspectors and related personnel with adequate real-time information;
    (4) ensures flexibility of training and security protocols to most effectively comply with security mandates;
    (5) integrates relevant databases and plans for database modifications to address volume increase and database usage; .
    (6) improves database search capacities by utilizing language algorithms to detect alternate names.


    We must all collaborate and solve this conundrum together so that we may locate the True Enemies and Terrorists and know their true name with their own ONEVOICE. If we can't touch or feel them, perhaps we can hear them better.

    Be well & live well, Zeliha Artan.

    By Anonymous Zeliha Artan, At June 1, 2009 1:27 PM  

  • 1.How do we secure the borders, when we don't know where and who the enemy is?
    2.What are the enemies doing within the borders? 3.How are they using the economy to benefit in the black market trade and spend the USD with the vehicle being ID.THEFT

    By Anonymous online casino, At June 4, 2009 2:07 AM  

Post a Comment

Thank you for leaving a comment at the Department of Homeland Security Leadership Journal. Comments submitted to the Department of Homeland Security Leadership Journal will be reviewed before posting.



Create a Link

<< Home