Porous Nodes: Specific Vulnerabilities

View Segments Segment :

  • Citations
  • Add to My List
  • Embed
  • Link
  • Help
  • Citations
  • Add to My List
  • Embed
  • Link
  • Help
Successfully saved clip
Find all your clips in My Lists
Failed to save clip
  • Transcript
  • Transcript

    Auto-Scroll: ONOFF 
    • 00:09

      SPEAKER: There's a great deal of traffic entering United States.And the question is, with these porous nodes, that is,aviation, transportation, seaborne traffic,what is the greatest threat?And generally speaking, the greatest threatis simply the fact that smuggling occurs.If people can be smuggled into the United States easily

    • 00:32

      SPEAKER [continued]: and weapons can be smuggled in and out of the United Stateseasily, other things can too.Certainly, extremists can come in with the human trafficking.Certainly weapons or other devicescan come in with the drugs in the same matterthat the drugs come in.So the real threat here is, how do youstop this illicit traffic coming into the United States?

    • 00:56

      SPEAKER [continued]: The answer is, we try.But we haven't done it yet.We have tons and tons of cocaine coming through tunnels,coming in seaborne traffic into the UnitedStates on a daily basis.You can imagine weapons and extremistsusing that transportation network.We have many thousands of people coming into the United States

    • 01:17

      SPEAKER [continued]: illegally or undocumented through tunnels,in transportation, overland, whatever it might be.You can imagine extremists actually comingin the same way.And then there's the container trafficcoming into the United States.Not too long ago, we intercepted a freighter thathad a lot of cocaine on it.

    • 01:38

      SPEAKER [continued]: A ton of cocaine.With Spanish speaking Ukrainians on board.That's where we see that transnational organized crimeis collaborating worldwide.You can imagine them being paid enough to smuggle extremistsin.This is a completely plausible scenario,a very dangerous scenario.We also see in this hemisphere the tri border area

    • 02:01

      SPEAKER [continued]: in South America, in which there isan almost lawless region that spansthree borders in which you do havea lot of transnational organized crime, drug trafficking,human trafficking coming out thereas well as Hezbollah and Hamas.They actually send money back home from that area.

    • 02:22

      SPEAKER [continued]: You can imagine them using the transportation,the portals and the porous nodes,through Mexico, through other areas.This is something that may already have happened.This is something that is not theoretical.It is a true threat to our security.

Porous Nodes: Specific Vulnerabilities

View Segments Segment :

Abstract

Professor C. Augustus Martin comments on the flow of illicit traffic in and out of the United States and surrounding countries. He highlights the 'porous nodes' of the border areas and how smuggling and trafficking pose a threat to national security.

Porous Nodes: Specific Vulnerabilities

Professor C. Augustus Martin comments on the flow of illicit traffic in and out of the United States and surrounding countries. He highlights the 'porous nodes' of the border areas and how smuggling and trafficking pose a threat to national security.

Copy and paste the following HTML into your website

Back to Top