DHS Special Report | Who's Who at the Border

 

Connecting state and local government leaders

The Homeland Security Department has quietly put together a wide-reaching net of screening and targeting programs, working not only within its several internal organizations'such as Customs and Border Protection, the Coast Guard and Citizenship and Immigration Services'but with other agencies such as the Justice and State departments.

As a car creeps toward the U.S. border, a computer, gathering data viacameras and using modeling technology, sends an alert to a patrol officer.

Cargo: the other half of the secure-border equation

Rod MacDonald, assistant commissioner of
Customs and Border Protection's Office of Information
Technology, is the point man for the
Automated Commercial Environment, the
computerized system that checks cargo coming
into the country at both land and sea
ports.


Working both with U.S. Visit and National
Targeting Center officials, ACE collects electronic
cargo data and passes it on to appropriate
officers in the field for further analysis.


'Every bit of information we can get in advance
all helps us pinpoint where there might
be a threat,' MacDonald said.


Although ACE has been in existence since
2000, the program morphed considerably in
late 2003 with the ACE Secure Data Portal,
an online one-stop shop to CBP systems, including
the Border Release Advanced Screening
and Selectivity System, the Pre-arrival
Processing System, and the Free and Secure
Trade system. It also contains monthly periodic
payment and statement features that
streamline accounting and report processing
for importers and government officials.


ACE is continuing to roll out its electronic
manifest feature for trucks, an application
that lets highway shippers file their manifests
prior to a truck's arrival at a border point, expediting
the processing of their cargo.


Although e-Manifest just launched this
past December, MacDonald said CBP likely
will mandate the system later this year.


'We can't stop every truck and open every
container, but this gives us a better idea of
what's coming,' he said.


Like U.S. Visit, ACE's rollout has not been
totally smooth. CBP delayed its rollout last
year because of security add-ons that contributed
to escalating costs. In fact, according
to the Government Accountability Office,
CBP in April 2005 raised its expected budget
to $3.1 billion from $1.3 billion in 2001. It also
was expected to be fully completed in 2006,
but CBP has pushed that date back to 2010.


And in a report released late last month, the
audit agency said that although ACE has
made progress, DHS has been slow to address
management issues that continue to
plague the program.


CBP also has set unrealistic performance
goals that have hampered ACE's success,
GAO said. 'For example, in fiscal year 2005,
the program set a target that 11 percent of
all Customs and Border Protection employees
would use ACE,' auditors said. 'However,
this target does not reflect the fact that
many CBP employees will never use the
system.'


Despite these issues, DHS is counting on
ACE to complement U.S. Visit and other
screening and targeting programs.


'Rob Thormeyer

WHO GOES THERE? The Homeland Security Department launched US-VISIT, a program using biometric technologies, to enhance the nation's security and facilitate travel in 2004. This test was at Dulles International Airport outside Washington.




Drawing on information from multiple
Homeland Security Department agencies'
data such as the car's make, model,
license plate, location and time of day'
the software predicts whether the car is
likely to contain undocumented persons
or counterfeit goods hidden in the trunk.


The information is quickly processed
and presented to the border guard, who
can then determine'before the car reaches
the gate'whether to take further action
based on the analysis.


This predictive modeling technology,
which DHS' Customs and Border Protection's
National Targeting Center is still
rolling out, can lead to the arrest of undocumented
persons and seizure of illegal
goods at land borders. Officials declined
to discuss specifics about the modeling
technology.


Casting a wide net

DHS officials say the scenario is one of
many examples of how the agency, despite
its struggles, has quietly put together a
wide-reaching net of screening and targeting
programs, working not only within its
several internal organizations'such as
CBP, the Coast Guard and Citizenship and
Immigration Services'but with other
agencies such as the Justice and State departments.


Through internal programs such as the
targeting center, the Automated Commercial
Environment, and the U.S. Visitor
and Immigrant Status Indicator System,
and intergovernmental initiatives
such as Justice's Terrorist Screening Center,
DHS is breaking down the stovepipes
of its agencies, the officials said. And it is
also helping remove long-standing bureaucratic
silos that have, in the past, prevented
intelligence and security agencies
from communicating.


'We've made unbelievable strides ... and
our ability to team with other agencies has
really grown exponentially,' said Charles
Bartoldus, executive director of national
targeting and screening for CBP.


Scott Hastings, CIO of U.S. Visit, agreed:
'We are seeing very large initiatives taking
big chunks out of the connect-the-dot
problem.'


For example, two DHS flagship programs'
U.S. Visit and ACE'operate on
the same network and share the same infrastructure
and routers. A separate initiative,
the Terrorist Screening Center, houses
employees from several different agencies.
And some officials, such as Bartoldus,
serve on steering committees for other
projects. In Bartoldus' case, he is a member
of ACE's board of directors.


'This is really the leader as far
as information sharing,' said
Donna Bucella, director of TSC.
'This is one place where the rubber
meets the road and is useful.'
In practice, the targeting center
and the Terrorist Screening Center
offer perhaps the best models
of technology and interoperability
coming together.


NTC, established just after the
Sept. 11, 2001, terrorist attacks
and later rolled into DHS, targets
suspicious people and cargo
entering and leaving the country.
It uses data gathered from CBP's
cargo and trade processing system,
the Automated Commercial
Environment, U.S. Visit and the
National Counterterrorism Center's
classified Terrorist Identities
Datamart Environment.


The information is fed into
NTC's Automated Targeting
System, a program responsible
for risk assessment at the borders.
With predictive modeling technology,
the center's officials use
the targeting system to determine
if a car trying to cross the border
likely contains undocumented people or a
shipment coming into a seaport contains
counterfeit goods.


Bartoldus expects ATS-Land to finish its
deployment to all land border points in
the country by the end of June. The agency
also is launching a pilot at seaports this
summer that will track counterfeit goods
coming into the country, he said.


'With predictive modeling, the
computer is not giving me the data
to analyze. It is the computer looking
at the data and saying, 'This
pattern follows a pattern I've seen
before,' ' Bartoldus said.


If the pattern warrants further
attention, NTC officials contact
other border security and law enforcement
personnel, such as the
Transportation Security Administration,
to determine the next
course of action, Bartoldus said.


'We're all working on the same
issues at the same time, but it's a
clear handoff,' he said.


One link in the communications
chain is the Terrorist Screening
Center, which maintains the government's
consolidated terrorist
watch list.


TSC director Bucella said her
shop uploads biographical information
from multiple agencies'
the Defense Intelligence Agency,
CIA, State Department, FBI and
DHS'and places it into the Terrorist
Screening Database.


'We are a clearinghouse,' Bucella
said. 'What we do is ... connect up the
diplomatic world, the international intelligence
community, the law enforcement
community, and our state and locals.
Think of us as a facilitator.'


Data collections

The list Bucella's shop maintains is more a
collection of 'supported systems''various
watch lists and databases including U.S.
Visit, the FBI's National Crime Information
Center, and the State Department's
Consular Lookout and Support System.


The screening center also has access to
the National Counterterrorism Center's
classified Terrorist Identities Datamart
Environment, a database that contains
names and biographical information of
suspected international terrorists.


'While our database is a list of just
names and identities, we also have the
supported systems to be able to dive into
those to find out 'Why is that person on
the list?' and 'Is the person that's currently
being confronted and encountered ... in
fact a person on the watch list?' ' she said.


The list is used when, say, a person applying
for a visa overseas triggers a hit on
State's Consular Lookout and
Support System. The consular
official is told to contact TSC
to determine whether that
person is actually the person
on the watch list and should
be denied entry, Bucella said.


Because TSC draws on information
from so many
agencies, the office is set up
like a central repository, with
several agencies loaning staff
to run the operation.


For example, although Bucella
is an employee of the
Transportation Security Administration,
she reports to FBI director
Robert Mueller III. Other staff members
come from DHS, State, Justice, Treasury
and, briefly, the Postal Service.


'This is the theory I use: Why don't you
come join us? We are the U.S. government,
and we're trying to coordinate the
government's approach, not one agency's
approach,' she said. 'Let's see if it's a useful
tool to have somebody here and also if
we need a relationship. ... Everybody
walks in here and they become a screening
center employee. They bring their expertise
from different agencies, but their
mission is the Terrorist Screening Center.'


And while TSC is the repository, the
agencies and programs it feeds also adhere
to the intergovernmental approach that
screening and targeting demands.


DHS' U.S. Visit, a flagship program
launched by former secretary Tom Ridge,
uses fingerprint data collected by CBP and
consular officials overseas to determine
whether certain people attempting to enter
the country are using fraudulent identities
or could be on various terrorist watch lists.


The program also is trying to keep better
track of visa overstays and whether
visitors are actually leaving the country
when their visas expire.


The system runs on the existing
Automated Biometric Identification
System fingerprint
database, known at IDENT,
which currently collects two fingerprint
images. DHS checks
and verifies visa-seekers' fingerprints
against IDENT and databases
maintained by the FBI
and others to ensure that the
person is not on any terrorist or
criminal watch lists.


'Data sharing and interoperability
are key drivers for this
program,' Hastings said. 'We
see ourselves as a transformation
program.'


The program 'extends our
borders' to the overseas consular
offices, he said, because it
gives DHS officials a prescreening
tool that prevents an
individual on any terrorist or
criminal watch lists'once his
identity has been verified'
from entering the country.


Although he could not provide
specifics, Hastings said the
program has prevented murderers,
pedophiles, drug traf-
fickers and immigration violators from
crossing the border.


U.S. Visit also provides data to DHS' Immigration
and Customs Enforcement of-
fice on people who may have overstayed
their visa dates, Hastings said. 'For the
first time, we've taken enforcement actions
on overstays based on our system,' he
said. 'That's a pretty powerful indication'
of U.S. Visit's reach.


Checkout trouble

But here is where U.S. Visit runs into criticism,
because it has no way to tell when or
if people have left the country.


Hastings admitted the exit program still
has its work cut out for it: Although there
are 14 pilot programs at exit points
throughout the country, it is still little
more than an honor system.


'We're fully aware of the shortcomings,
and there are some issues DHS is looking
at seriously' to bolster the project, Hastings
said.


At this point, the pilot system consists
mainly of an unmanned U.S. Visit kiosk at
an airport or another exit location where a
person signs in (or perhaps more appropriately,
checks out) and, presumably,
leaves the country.


'The only way you know where people
are is if they comply with' the exit program,
said Rich Pierce, executive vice
president of the National Border Patrol
Council, a union for border security
guards. 'Unless someone has been arrested
and fingerprinted previously, we can't
find them.'


Jim Stolarski, program manager at Accenture Ltd.'s Smart Border Alliance,
which manages U.S. Visit, said that although
improvements are necessary, the
pilots have provided invaluable lessons
going forward.


'The current solution, while imperfect, is
an improvement over nothing,' Stolarski
said. 'If we wait for the perfect solution,
what happens between then and now?'


Most officials and homeland security experts
agree that, at this moment, the infrastructure
for an effective exit system just
does not exist.


And with DHS secretary Michael
Chertoff focusing more on such new programs
as the Secure Border Initiative,
some experts wonder if U.S. Visit will ever
have an effective exit program.


'The biggest challenge with an
exit/entry system isn't the technology,'
said one industry official. 'The problem
is the amount of money and time that's
going to be required to have an effective
program.' For instance, the source said,
the systems must be durable enough to
withstand hostile conditions in the field.


GAO: Watch the exits

The Government Accountability Office
has pointed to the program's shortcomings
including its failure to find a sustainable
exit system.


'They do have an entry and pre-entry
program,' said Randy Hite, GAO's director
for IT architecture and systems issues.
'They've created a deterrent effect for
keeping terrorists out of the country, and
that's good. But has it accomplished everything?
No.'


In particular, GAO in February found
that U.S. Visit has yet to implement a system
security plan or a privacy impact
statement'recommendations the congressional
watchdog agency made more
than two years ago. Also, GAO concluded
that DHS has not added cost-effective
controls to address risk and weigh the project's
value.


As a result, the verdict on U.S. Visit is 'a
mixed bag,' Hite said. 'There's examples of
success, and there's examples of where
they haven't met commitments.'


Despite valid criticisms, U.S. Visit and
ACE have achieved some real success, at
least in part because they share the same
infrastructure, and many of the same principals
and information.


This interoperability has resulted in the
apprehension of suspected terrorists and
criminals, while at the same time maintaining
a constant flow of traffic and trade
at the borders, officials said.


'We give ourselves a pretty good report
card,' Hastings said.


Communications between the several
agencies, 'something that used to be very
complex, is resolved within minutes because
everyone knows their roles,' said
CBP's Bartoldus.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.