Risk

2/22/2010
03:17 PM
50%
50%

DHS May Scrap Border Patrol Project

The Department of Homeland Security is reevaluating a plan to add security cameras, radar, and sensors, to patrol efforts along the U.S. Mexico border.

The Department of Homeland Security has ordered a drastic reassessment of a Mexican-border fence project that, due to delays and technology glitches, may never be completed.

A project known as SBInet to install cameras, radar, and ground sensors along the fence on the border between the U.S. and Mexico was originally meant to be completed by 2014.

In addition to providing technologic reinforcement to the U.S. Border Patrol, the project also is meant to provide personnel with a unified dashboard that lets them view the information collected by the various technology.

Despite this plan, only a prototype of the final solution is currently in use, and the DHS is considering whether to scrap the entire project.

Boeing created the prototype -- called Project 28, or P28 -- by cobbling together a variety of off-the-shelf hardware and software. Doing so made developing a workable system more difficult than anticipated, and it took two years before the DHS accepted the P28 solution for use in 2008, said Jenny Burke, a spokeswoman for Customs and Border Protection (CBP). The CBP is overseeing the project along with the DHS.

P28 is currently deployed along a 28-mile stretch of the Arizona border near the Sasabe point of entry into the U.S., and Boeing remains the contractor of record for the project, she said.

Originally, however, the DHS expected to cover the entire Arizona border with a complete deployment of the technology -- not a prototype -- by next year. That has been delayed indefinitely, Burke said.

An early phase of that deployment -- called Block One -- should be completed by the end of the year, after which the DHS will assess whether completing the rest of the border is worth the investment, she said.

"The [attitude] right now is to ensure the quality and operational effectiveness before continuing with other investments," Burke said.

Block One's first phase will cover a 23-mile stretch of border near Tucson, Arizona, and another 30 miles near Ajo, Arizona, she said. It also will overlay the prototype system.

In the meantime, the DHS plans to evaluate whether to deploy some aspects of the original system to help border patrol officers secure the border in lieu of the entire scope of the SBInet project, she said.

"A lot of them were anticipating having SBInet deployed," Burke said. The DHS and CBP would rather provide them with some of the technology than none at all, she said.

If completed, the DHS now expects the entire SBInet project to cost $6.7 billion, a readjustment from the original projected budget of $8 billion. P28 cost $20 million and to date the DHS has spent about $700 million on Block One, which had a total budget allotment of $898 million.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.