Risk
9/13/2011
04:57 PM
Connect Directly
RSS
E-Mail
50%
50%

GAO: Technology Gaps Jeopardize U.S. Visa Entry System

Incomplete biometric identification is among the gaps the DHS needs to fill to secure the US-VISIT foreign visitors system.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
An incomplete biometric system is one of the gaps jeopardizing the security of the U.S. visa entry system, according to a government watchdog agency.

The Department of Homeland Security's U.S. Immigration and Customs Enforcement's Counterterrorism and Criminal Exploitation Unit (CTCEU) is in charge of enforcing laws that govern foreigners who overstay their time in the country. To help in this endeavor, the DHS has deployed a biometric-based identification system called US-VISIT to keep track of foreign nationals when they enter and leave the country.

Though the system is operating in ports of entry when people enter the country, it's not fully operational when they leave, according to a report by the Government Accountability Office (GAO). The report is based on testimony made by Richard M. Stana, director of Homeland Security and Justice Issues for the GAO, before the Subcommittee on Border and Maritime Security of the House of Representatives' Committee on Homeland Security.

Without this system fully in place, the DHS is relying on biographical data it has on foreign nationals to identify people who have overstayed their visas. However, "unreliable data hinder DHS's efforts to accurately identify overstays," said Stana.

The report noted that weaknesses in DHS processes for collecting departure data are making it difficult for the government to determine overstay rates.

Moreover, the DHS still has yet to define, plan, or justify biometric and other features of its US-VISIT exit projects on the basis of costs, benefits, and risks, despite a proposal to spend tens of millions of dollars on them, Stana testified.

"We concluded that, without a master schedule that was integrated and derived in accordance with relevant guidance, DHS could not reliably commit to when and how it would deliver a comprehensive exit solution or adequately monitor and manage its progress toward this end," said the report.

The DHS did not immediately respond to a request for comment Tuesday.

Join us for GovCloud 2011, a day-long event where IT professionals in federal, state, and local government will develop a deeper understanding of cloud options. Register now.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.