u s customs border protection tucson field office
play

U.S. Customs & Border Protection Tucson Field Office James Tong - PowerPoint PPT Presentation

U.S. Customs & Border Protection Tucson Field Office James Tong Assistant Director Field Operations Tucson, Arizona Fiscal Year 2010 Daily Activities $7.4 million spent in Arizona by visitors from Mexico* $52 million in commercial


  1. U.S. Customs & Border Protection Tucson Field Office James Tong Assistant Director Field Operations Tucson, Arizona

  2. Fiscal Year 2010 Daily Activities • $7.4 million spent in Arizona by visitors from Mexico* • $52 million in commercial imports • 66,000 travelers processed • 19,000 passenger vehicles • 21,000 pedestrians • 1,000 commercial trucks • 36 aircraft • 36 buses • 145 rail cars

  3. Priority Trade Issues • Import Safety – Protect U.S. consumers from harmful products. • AD/CVD – Indentify entries incorrectly entered as not subjected to a case. • IPR – Interdict goods that infringe on intellectual property rights. • Textiles – Ensure that textile importations are in compliance with the law. • Revenue – Identify and reclaim money owed to CBP. • Trade Agreements – Ensure the proper and uniform application of duty preferences. 3

  4. Cargo Overview Fiscal Year 2011 • $20.2 billion in commercial imports • 59,576 pounds of marijuana seized • $91.2 million in revenue generated • 354,461 trucks processed • 59,585 rail cars processed • 320,403 entries filed • 18,831 examinations

  5. Top Five Commodities by Value Commodity Imported Value Vehicles and Parts $4.8 billion Electronics and $4.7 billion Machinery Produce $2.5 billion U.S. Goods Returned $1.9 billion Aircraft and Parts $1.7 billion

  6. From Columbia And Brazil M ajor Trade Routes into M EXICO And Distribution Destinations From Asia From Columbia

  7. From Columbia And Brazil M ajor DRUG Routes into/ thru M EXICO & Distribution Destinations From Asia From Columbia

  8. To LA/ CA To TUC/ PHX M ajor Drug Routes into AZ/ CA And Distribution Destinations

  9. AVATAR • A utomated • V irtual • A gent for • T ruth in • R eal-Time

  10. How Does it Work • Applicants are asked standard question designee to elicit a specific responses • Sensors monitor behavioral and physiological responses • Algorithm performs a threat assessment of responses • If the applicant’s answer to a question is problematic, the AVTAR discontinues the interview and the officer on duty takes over • Analysis of the interview is provide to an officer for review for anomalies

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend