National Guard border deployment begins Aug. 1

Senior Homeland Security officials said on Monday that on Aug. 1 they will begin deploying 1,200 members of the National Guard to boost security along the Southwest border. Nearly half that number -- 524 -- will be deployed to Arizona, where illegal immigration and smuggling are most prevalent and have become a major political issue for the Obama administration.

"These troops will provide direct support to federal law enforcement officers and agents working in high-risk areas to disrupt criminal organizations seeking to move people and goods illegally across the Southwest border," Homeland Security Secretary Janet Napolitano said in a statement.

California and Texas will receive 224 and 250 troops, respectively, and New Mexico will get 72. An additional 130 guardsmen will serve in command-and-control positions. DHS first requested the troops in May.

Customs and Border Protection Commissioner Alan Bersin and Immigration and Customs Enforcement Director John Morton joined National Guard Bureau Chief Air Force Gen. Craig McKinley at the Pentagon on Monday to discuss the deployment plan.

The deployment is scheduled to last for one year, during which time DHS will hire an additional 1,000 Border Patrol agents and personnel to work at ports of entry.

"The efforts of the National Guard will be to support the personnel that DHS has increased and placed on the Southwest border since 2009," said Bersin. In addition to the temporary influx of guardsmen, CBP will send about 300 more agents, more mobile surveillance systems, and six additional aircraft to the border, he said.

The National Guardsmen will help DHS personnel identify illegal border crossers and drug and arms smugglers as well as support intelligence operations, Bersin said.

Last year, ICE agents removed 387,000 people in the United States illegally, 136,000 of whom were criminals, Morton said. Like CBP, the immigration enforcement agency is focusing more of its efforts on the Southwest border. In June, ICE sent an additional 300 special agents, removal officers and intelligence analysts to the four border states and increased its presence in Mexico.

"We're also adding 68 National Guardsmen who will serve as intelligence analysts and will help us focus on our cross-border smuggling investigations," Morton said.

In addition, ICE plans to open a new investigative office in Arizona and send a jump team of specially trained agents to Douglas, Ariz., to help with investigations.

McKinley said the deployment would not hinder National Guard support to military operations in Iraq or Afghanistan, where 54,000 guardsmen currently serve. The border states collectively have about 50,000 National Guard personnel, he said, and supplying 1,200 personnel for the border security mission would have no negative impact on other missions.

"I rely on the adjutants general and the governors, who advise Defense Secretary [Robert] Gates and Secretary Napolitano, to tell me where the need is and right now I cannot see a case where we will be overextending the National Guard in this effort," McKinley said.

The troops will be taking the lead from law enforcement personnel, McKinley said. While they will be armed, they will use force only in self defense.

"They will be deployed only on the United States side of the border following the rules of engagement as set forth by the lead agencies here," McKinley said. "We have done this before and it is common practice for all soldiers and airmen to only take that action to extricate themselves from the situation and not be provocative."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.