Risk
2/22/2010
03:17 PM
Connect Directly
RSS
E-Mail
50%
50%

DHS May Scrap Border Patrol Project

The Department of Homeland Security is reevaluating a plan to add security cameras, radar, and sensors, to patrol efforts along the U.S. Mexico border.

The Department of Homeland Security has ordered a drastic reassessment of a Mexican-border fence project that, due to delays and technology glitches, may never be completed.

A project known as SBInet to install cameras, radar, and ground sensors along the fence on the border between the U.S. and Mexico was originally meant to be completed by 2014.

In addition to providing technologic reinforcement to the U.S. Border Patrol, the project also is meant to provide personnel with a unified dashboard that lets them view the information collected by the various technology.

Despite this plan, only a prototype of the final solution is currently in use, and the DHS is considering whether to scrap the entire project.

Boeing created the prototype -- called Project 28, or P28 -- by cobbling together a variety of off-the-shelf hardware and software. Doing so made developing a workable system more difficult than anticipated, and it took two years before the DHS accepted the P28 solution for use in 2008, said Jenny Burke, a spokeswoman for Customs and Border Protection (CBP). The CBP is overseeing the project along with the DHS.

P28 is currently deployed along a 28-mile stretch of the Arizona border near the Sasabe point of entry into the U.S., and Boeing remains the contractor of record for the project, she said.

Originally, however, the DHS expected to cover the entire Arizona border with a complete deployment of the technology -- not a prototype -- by next year. That has been delayed indefinitely, Burke said.

An early phase of that deployment -- called Block One -- should be completed by the end of the year, after which the DHS will assess whether completing the rest of the border is worth the investment, she said.

"The [attitude] right now is to ensure the quality and operational effectiveness before continuing with other investments," Burke said.

Block One's first phase will cover a 23-mile stretch of border near Tucson, Arizona, and another 30 miles near Ajo, Arizona, she said. It also will overlay the prototype system.

In the meantime, the DHS plans to evaluate whether to deploy some aspects of the original system to help border patrol officers secure the border in lieu of the entire scope of the SBInet project, she said.

"A lot of them were anticipating having SBInet deployed," Burke said. The DHS and CBP would rather provide them with some of the technology than none at all, she said.

If completed, the DHS now expects the entire SBInet project to cost $6.7 billion, a readjustment from the original projected budget of $8 billion. P28 cost $20 million and to date the DHS has spent about $700 million on Block One, which had a total budget allotment of $898 million.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5142
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter.

CVE-2010-5302
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb before 1.15 as of 20100908 (r88), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.

CVE-2010-5303
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in the displayError function in timthumb.php in TimThumb before 1.15 (r85), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to $errorString.

CVE-2014-0965
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted SOAP response.

CVE-2014-3022
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted URL that triggers an error condition.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.