recommended reading

McCain suggests using military tech on Mexico border

Sen. John McCain says he is more concerned about the security of the border than he has ever been.Ross D. Franklin/AP

Sen. John McCain, R-Ariz., said on Thursday the operations of drug cartels along the U.S.-Mexico border are tantamount to war and urged a top military commander to deploy high-tech military systems to monitor activities in the area.

"I can make an argument that we are [engaged] in combat on the border," McCain said during a hearing of the Senate Armed Services Committee, which was considering the nomination of Vice Adm. James "Sandy" Winnefeld Jr. to head U.S. Northern Command. He called the $65 billion-per-year drug trade in that region, which has resulted in murders on both sides of the border, a "corrosive effect" on life in the Southwest.

McCain has represented Arizona, which shares a 1,400 mile border with Mexico, in the House and Senate since 1982. The senator said he was more concerned about the security of the border than he has ever been, given what he described as irregular warfare operations by drug cartels.

A 58-year-old rancher in southeast Arizona was found shot to death on March 27. Investigators speculated that he was killed by a drug smuggler who had illegally crossed the border.

McCain told Winnefeld the violence justifies a military response, including sending the kind of advanced systems the Defense Department is using in Iraq and Afghanistan to the Mexico border.

U.S. Northern Command, established in 2002 and headquartered at Peterson Air Force Base in Colorado Springs, Colo., is responsible for homeland defense. "We have an obligation to protect our borders," McCain said, adding he would like to see military surveillance systems, including unmanned aerial vehicles, used in the region.

Winnefeld said he shared McCain's "deep concerns over the level of violence on the border" and would make a trip to the area with the senator one his first priorities when taking over the command. Winnefeld did not address McCain's request to use the military's computer systems.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.