Senator seeks interagency border security task force

The U.S. government should create an interagency task force to coordinate Southwest border-security operations and resolve conflicts between agencies, Sen. John Cornyn, R-Texas, said on Thursday.

Speaking at the U.S.-Mexico Congressional Border Issues Conference, Cornyn said he does not believe that the Obama administration has an adequate strategy for stopping illegal activity along the border.

"First, a good strategy would have an interagency approach," Cornyn said. "We already know that there are dozens of task forces across the Southwest border, and many of them are doing good work. But they are not yet coordinating our intelligence and interdiction operations as well as we should."

He said a "good model" for the administration to replicate along the border would be the Joint Interagency Task Force South in Key West, Fla. The task force is made up of officials from multiple agencies that target illicit trafficking in the waters of the Atlantic.

"This is designed to resolve the conflicts between different U.S. government agencies and make sure we know who's in the lead and what the chain of command is," Cornyn said. "This chain of command is important for coordinating the drug interdiction efforts in the Caribbean and South America."

"And many federal agencies, as well as representatives of sovereign nations, including Mexico, are part of it," he added. "This model has already drawn the attention of the Department of Homeland Security, but we have not yet seen that idea bear fruit."

Homeland Security Secretary Janet Napolitano, who spoke separately at the event, touted the administration's efforts to beef up security along the border with Mexico.

According to her, the administration has increased the number of Border Patrol agents to about 21,000; doubled the number of personnel assigned to Border Enforcement Security Task Forces; and deployed about one-quarter of all Immigration and Customs Enforcement agents to the Southwest border region-which Napolitano said is the most ever.

She added that the U.S. and Mexican governments have an unprecedented collaboration when it comes to law-enforcement cooperation, intelligence-sharing, and joint operations.

"We are not here to run a victory lap. We are here to tell you where we've been and where we are going," Napolitano said.

"This administration believes that security and economic prosperity are complementary. That's why we will continue to take actions on both fronts," she added.

Regardless, Cornyn, who has been a chief critic in Congress of the administration's handling of border security, cited a recent Government Accountability Office report that 1,120 miles of the U.S.-Mexico border are not under operational control.

"A good strategy should be resourced appropriately," Cornyn said. "My friend Secretary Napolitano talks about the resources that have been devoted -- the so-called inputs. Where I'm really more interested in what the results, or the outputs, are."

He added: "We're still not doing enough, in my view, to support local law enforcement that's had to bear the brunt of the federal government's failure to do its job along the border."

Cornyn said that the congressional stalemate over approving comprehensive legislation to overhaul the nation's immigration laws will continue unless more is done with regard to border security.

"Until the federal government does its job and regains the confidence of the American people that it will actually deliver a product as advertised … I think we're going to be where we are now, which is with no real opportunity in sight," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.