26.07.2013 Views

Border Security Council Report - Office of the Governor - Rick Perry

Border Security Council Report - Office of the Governor - Rick Perry

Border Security Council Report - Office of the Governor - Rick Perry

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section Five: Recommendations<br />

12<br />

Recommendation:<br />

Establish a crime mapping capability in <strong>the</strong> border region that includes index and all o<strong>the</strong>r crimes, to<br />

include Customs and <strong>Border</strong> Protection arrest and drug seizure data by location, date, and time.<br />

Discussion:<br />

All crime data, including vandalism, trespassing and federal and state arrests and drug seizures, is<br />

essential for identifying patterns and trends to proactively address evolving threats and to assess<br />

operations. The data should be updated daily to support <strong>the</strong> unified decision-making process.<br />

C. Audit Measures<br />

Recommendation:<br />

Continue to conduct 100 percent audits <strong>of</strong> border security funding. The <strong>Governor</strong>’s Division <strong>of</strong><br />

Emergency Management (GDEM) should continue to audit all state grant funds authorized by <strong>the</strong><br />

Texas Legislature to support border security.<br />

Discussion:<br />

100 percent audits will ensure optimal internal controls to minimize waste, fraud, and abuse <strong>of</strong> Texas<br />

taxpayer dollars. The Texas Department <strong>of</strong> Public Safety Division <strong>of</strong> Emergency Management (DEM)<br />

currently uses audit mechanisms from <strong>the</strong> various publications: U.S. Government Accountability<br />

<strong>Office</strong>, “Government Accounting Standards – GAO 17-7 1G”, July 2007 Revision; Uniform Grant<br />

Management Standards; OMB Circular A-1 ; and Standard Operating Procedures for Audit <strong>of</strong> <strong>Border</strong><br />

<strong>Security</strong> Enhancement Operations Reimbursement.<br />

These standard audit mechanisms ensure that all funds distributed are properly monitored and<br />

accounted for.<br />

D. Funding Recommendations<br />

Recommendation:<br />

Sustain funding for border operations at <strong>the</strong> state level.<br />

Discussion:<br />

Because funding for state led border operations has been successful in decreasing and deterring<br />

crime, <strong>the</strong> State should continue to fund operations at <strong>the</strong> state level. <strong>Border</strong> security funding should<br />

be used to support closely-coordinated, intelligence-driven patrol operations that utilize technology<br />

to maximize <strong>the</strong>ir impact. This could include:<br />

Overtime for local and state personnel involved in border operations.<br />

Funding to pay reserve deputies.<br />

Travel costs for personnel temporarily deployed to <strong>the</strong> border region.<br />

Operational costs such as fuel and maintenance for patrol vehicles, boats, and aircraft.<br />

Technology such as video surveillance, license plate readers, information sharing, and radio<br />

communications interoperability.<br />

Six Joint Operations and Intelligence Centers and <strong>the</strong> <strong>Border</strong> <strong>Security</strong> Operations Center.<br />

Equipment used to support border operations and patrols.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!