Risk
2/22/2010
03:17 PM
Connect Directly
RSS
E-Mail
50%
50%

DHS May Scrap Border Patrol Project

The Department of Homeland Security is reevaluating a plan to add security cameras, radar, and sensors, to patrol efforts along the U.S. Mexico border.

The Department of Homeland Security has ordered a drastic reassessment of a Mexican-border fence project that, due to delays and technology glitches, may never be completed.

A project known as SBInet to install cameras, radar, and ground sensors along the fence on the border between the U.S. and Mexico was originally meant to be completed by 2014.

In addition to providing technologic reinforcement to the U.S. Border Patrol, the project also is meant to provide personnel with a unified dashboard that lets them view the information collected by the various technology.

Despite this plan, only a prototype of the final solution is currently in use, and the DHS is considering whether to scrap the entire project.

Boeing created the prototype -- called Project 28, or P28 -- by cobbling together a variety of off-the-shelf hardware and software. Doing so made developing a workable system more difficult than anticipated, and it took two years before the DHS accepted the P28 solution for use in 2008, said Jenny Burke, a spokeswoman for Customs and Border Protection (CBP). The CBP is overseeing the project along with the DHS.

P28 is currently deployed along a 28-mile stretch of the Arizona border near the Sasabe point of entry into the U.S., and Boeing remains the contractor of record for the project, she said.

Originally, however, the DHS expected to cover the entire Arizona border with a complete deployment of the technology -- not a prototype -- by next year. That has been delayed indefinitely, Burke said.

An early phase of that deployment -- called Block One -- should be completed by the end of the year, after which the DHS will assess whether completing the rest of the border is worth the investment, she said.

"The [attitude] right now is to ensure the quality and operational effectiveness before continuing with other investments," Burke said.

Block One's first phase will cover a 23-mile stretch of border near Tucson, Arizona, and another 30 miles near Ajo, Arizona, she said. It also will overlay the prototype system.

In the meantime, the DHS plans to evaluate whether to deploy some aspects of the original system to help border patrol officers secure the border in lieu of the entire scope of the SBInet project, she said.

"A lot of them were anticipating having SBInet deployed," Burke said. The DHS and CBP would rather provide them with some of the technology than none at all, she said.

If completed, the DHS now expects the entire SBInet project to cost $6.7 billion, a readjustment from the original projected budget of $8 billion. P28 cost $20 million and to date the DHS has spent about $700 million on Block One, which had a total budget allotment of $898 million.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio