Border Security
Challenges in Implementing Border Technology
Gao ID: GAO-03-546T March 12, 2003
One of the primary missions of the new Department of Homeland Security (DHS) focuses on border control--preventing the illegal entry of people and goods into the United States. Part of this mission is controlling the passage of travelers through official ports of entry into the United States. Facilitating the flow of people while preventing the illegal entry of travelers requires an effective and efficient process that authenticates a traveler's identity. Generally, identifying travelers at the ports of entry is performed by inspecting their travel documents, such as passports and visas, and asking them questions. Technologies called biometrics can automate the identification of individual travelers by one or more of their distinct physiological characteristics. Biometrics have been suggested as a way of improving the nation's ability to determine whether travelers are admissible to the United States.
GAO found that biometric technologies are available today that can be used for border control. However, questions remain regarding the technical and operational effectiveness of biometric technologies in applications as large as border control. Before implementing any biometric border control system, a number of other issues would have to be considered, including the system's effect on existing border control procedures and people, the costs and benefits of the system, and the system's effect on privacy, convenience, and the economy. Furthermore, technology is only part of the solution. Effective security requires technology and people to work together to implement policies, processes, and procedures. At land border ports of entry, DHS faces several challenges including ensuring that the inspections process has sufficient integrity to enable inspectors to intercept those who should not enter our country, while still facilitating the entry of lawful travelers; ensuring that inspectors have the necessary technology, equipment, and training to do their job efficiently and effectively; and providing inspectors the access to necessary intelligence information.
GAO-03-546T, Border Security: Challenges in Implementing Border Technology
This is the accessible text file for GAO report number GAO-03-546T
entitled 'Border Security: Challenges in Implementing Border
Technology' which was released on March 12, 2003.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products‘ accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
Testimony:
Before the Subcommittee on Terrorism, Technology, and Homeland Security
and Subcommittee on Border Security, Immigration, and Citizenship,
Committee on the Judiciary, United States Senate:
United States General Accounting Office:
GAO:
For Release on Delivery Expected at 10:00 a.m. EST:
Wednesday March 12, 2003:
Border Security:
Challenges in Implementing Border Technology:
Statement of Nancy Kingsbury, Managing Director:
Applied Research and Methods:
Border Security Technology:
GAO-03-546T:
Mr. Chairmen and Members of the Subcommittees:
I appreciate the opportunity to participate in today‘s hearing on
border technology. The Department of Homeland Security (DHS) faces
enormous challenges to protect the nation from terrorism.[Footnote 1]
One of the primary missions of the new department focuses on border
control - preventing the illegal entry of people and goods into the
United States. Part of this mission is controlling the passage of
travelers through official ports of entry into the United States.
Facilitating the flow of people while preventing the illegal entry of
travelers requires an effective and efficient process that
authenticates a traveler‘s identity. Generally, identifying travelers
at the ports of entry is performed by inspecting their travel
documents, such as passports and visas, and asking them questions.
Technologies called biometrics can automate the identification of
individual travelers by one or more of their distinct physiological
characteristics. Biometrics have been suggested as a way of improving
the nation‘s ability to determine whether travelers are admissible to
the United States. Today, I will discuss the issues and challenges
associated with using biometrics in border control systems and the
significant management challenges we identified during our ongoing work
at land ports of entry.
My testimony today is based on a body of work we completed last year
examining the use of biometrics for border control and on preliminary
observations related to our ongoing work examining the inspection of
travelers at land border ports of entry. In our report on the use of
biometrics, we discussed the current maturity of several biometric
technologies, the possible implementation of these technologies in
current border control processes, and the policy implications and key
considerations for using these technologies.[Footnote 2] We are also in
the process of reviewing immigration inspections at land border ports
of entry, where our work has included examining the integrity of the
inspections process, programs to segregate low-risk travelers, the
technology and equipment used to conduct inspections, immigration
intelligence information, and inspector training issues.
In brief, biometric technologies are available today that can be used
for border control. However, questions remain regarding the technical
and operational effectiveness of biometric technologies in applications
as large as border control. Before implementing any biometric border
control system, a number of other issues would have to be considered,
including the system‘s effect on existing border control procedures and
people, the costs and benefits of the system, and the system‘s effect
on privacy, convenience, and the economy. Furthermore, technology is
only part of the solution. Effective security requires technology and
people to work together to implement policies, processes, and
procedures. At land border ports of entry, DHS faces several challenges
including ensuring that the inspections process has sufficient
integrity to enable inspectors to intercept those who should not enter
our country, while still facilitating the entry of lawful travelers;
ensuring that inspectors have the necessary technology, equipment, and
training to do their job efficiently and effectively; and providing
inspectors the access to necessary intelligence information.
Background:
The United States essentially relies on a two-step process to prevent
inadmissible people from entering the country. The Bureau of Consular
Affairs in the State Department is responsible for issuing
international travel documents, such as passports to United States
citizens and visas to citizens of other countries. On March 1, 2003,
the Bureau of Customs and Border Protection in the Department of
Homeland Security assumed responsibility for inspecting travelers at
and between ports of entry. Inspectors from the Immigration and
Naturalization Service (INS), the U.S. Customs Service, and the Animal
and Plant Health Inspection Service (APHIS) were brought together in
this new bureau.
In fiscal year 2002, there were about 440 million border crossings into
the United States at over 300 designated ports of entry (see table 1).
Of the more than 358 million border crossers who entered through land
ports of entry, almost 50 million entered as pedestrians. The rest
entered in more than 131 million vehicles, including cars, trucks,
buses, and trains. Further, the State Department processed about 8.4
million nonimmigrant visa applications and issued about 7 million
passports.
Table 1: Number of Inspections at U.S. Ports of Entry, Fiscal Year
2002:
(Continued From Previous Page)
Type of port: Sea; Number of inspections: 12,369,035.
Type of port: Air; Number of inspections: 69,679,190.
Type of port: Land; Number of inspections: 358,373,569.
Type of port: Total; Number of inspections: 440,421,794.
Source: GAO analysis of INS data.
[End of table]:
The term biometrics covers a wide range of technologies that can be
used to verify a person‘s identity by measuring and analyzing his or
her physiological characteristics, based on data derived from measuring
a part of the body directly. For example, technologies have been
developed to measure a person‘s finger, hand, face, retina, and iris.
Biometric systems are essentially pattern recognition systems. They use
electronic or optical sensors such as cameras and scanning devices to
capture images, recordings, or measurements of a person‘s
characteristics and computer hardware and software to extract, encode,
store, and compare these characteristics.
Using biometrics as identifiers for border security purposes appears to
be appealing because they can help tightly bind a traveler to his or
her identity by using physiological characteristics. Unlike other
identification methods, such as identification cards or passwords,
biometrics are less easily lost, stolen, or guessed. The binding is
dependent on the quality of the identification document presented by
the traveler to enroll in the biometric system. If the identification
document does not specify the traveler‘s true identity, the biometric
data will be linked to a false identity.
Applying Biometrics to Border Control:
In our work last year, we examined several different biometric
technologies and found four to be suitable for border control systems:
fingerprint recognition, facial recognition, iris recognition, and hand
geometry. Other biometric technologies were determined to be
impractical in a border control application because of accuracy or user
acceptance issues. For example, speaker recognition systems do not
perform well in noisy environments and do not appear to be sufficiently
distinctive to permit identification of an individual within a large
database of identities.
We defined four different scenarios in which biometric technologies
could be used to support border control operations. Two scenarios use a
biometric watch list to identify travelers who are inadmissible to the
United States (1) before issuing travel documents and (2) before
travelers enter the country. The other two scenarios help bind the
claimed identity of travelers to their travel documents by
incorporating biometrics into (1) U.S. visas or (2) U.S. passports.
Linking an individual‘s identity to a U.S. travel document could help
reduce the use of counterfeit documents and imposters‘ fraudulent use
of legitimate documents.
Biometrics have been used in border control environments for several
years. For example, the INS Passenger Accelerated Service System
(INSPASS), a hand geometry system first installed in 1993, has been
used in seven U.S. and two Canadian airports to reduce inspection time
for trusted travelers. Since April 1998, border crossing cards, also
called laser visas, have been issued to Mexican citizens that include
their photograph and prints of the two index fingers.[Footnote 3] The
Automated Biometric Fingerprint Identification System (IDENT) is used
by DHS to identify aliens who are repeatedly apprehended trying to
enter the United States illegally. IDENT is also being used as a part
of the National Security Entry-Exit Registration System (NSEERS) that
was implemented last year.[Footnote 4]
Laws passed in the last 2 years require a more extensive use of
biometrics for border control.[Footnote 5] The Attorney General and the
Secretary of State jointly, through the National Institute of Standards
and Technology (NIST) are to develop a technology standard, including
biometric identifier standards. When developed, this standard is to be
used to verify the identity of persons applying for a U.S. visa for the
purpose of conducting a background check, confirming identity, and
ensuring that a person has not received a visa under a different name.
By October 26, 2004, the Departments of State and Justice are to issue
to aliens only machine-readable, tamper-resistant visas and other
travel and entry documents that use biometric identifiers. At the same
time, Justice is to install at all ports of entry equipment and
software that allow the biometric comparison and authentication of all
U.S. visas and other travel and entry documents issued to aliens and
machine-readable passports.
Challenges and Implications to Applying Biometrics at the Border:
While biometric technology is currently available and used in a variety
of applications, questions remain regarding the technical and
operational effectiveness of biometric technologies in applications as
large as border control. In addition, before implementing any biometric
border control system, a number of other issues would have to be
considered including:
* The system‘s effect on existing border control procedures and people.
Technology is only part of an overall security solution and only as
effective as the procedures within which it operates.
:
* The costs and benefits of the system, including secondary costs
resulting from changes in processes or personnel to accommodate the
biometrics.
:
* The system‘s effect on privacy, convenience, and the economy.
Introducing Technology Affects People and Procedures:
The successful implementation of any technology depends not only on the
performance of the technology but also on the operational processes
that employ the technology and the people who execute them. The
implementation of biometrics in border security is no exception.
Further, the use of technology alone is not a panacea for the border
security problem. Instead, biometric technology is just a piece of the
overall decision support system that helps determine whether to allow a
person into the United States. The first decision is whether to issue
travelers a U.S. travel document. The second decision, made at the
ports of entry, is whether to admit travelers into the country.
Biometrics can play a role in both decisions. Sorting the admissible
travelers from the inadmissible ones is currently conducted by using
information systems for checking names against watch lists and by using
manual human recognition capabilities to see if the photograph on a
travel document matches the person who seeks entry to the United
States. When enabled with biometrics, automated systems can verify the
identity of the traveler and assist inspectors in their decision
making.
However, a key factor that must be considered is the performance of the
biometric technology. For example, if the biometric technology that is
used to perform watch list checks before visas are issued has a high
rate of false matches, the visa processing workload could increase at
the embassies and consulates. If the same biometric solution were used
at the ports of entry, it could lead to increased delays in the
inspection process and an increase in the number of secondary
inspections.
Exception processing will also have to be carefully considered.
Exceptions would include people who fail to enroll in the biometric
visa system or are not correctly matched by it. Exception processing
that is not as good as biometric-based primary processing could be
exploited as a security hole. Failure of equipment must also be
considered and planned for. Further, to issue visas with biometrics, an
appropriate transition strategy must be devised to simultaneously
handle both visas with biometrics and the current visa that could
remain valid without biometrics for up to the next 10 years.
Weighing Costs and Benefits:
Before any significant project investment is made, the benefit and cost
information of the project alternatives should be analyzed and assessed
in detail. A clear statement of the high-level system goals should
drive the overall concept of a U.S. border control system. System goals
address the system‘s expected outcomes and are usually based on
business or public policy needs, which for a border control system
could include items such as binding a biometric feature to a person‘s
identity on a travel document, identifying undesirable persons on a
watch list, checking for duplicate enrollments in the system, verifying
identities at the borders, ensuring the security of the biometric data,
and ensuring the adequacy of privacy protections. The benefits gained
from a biometric border control system should be based on how well the
system achieves the high-level goals.
A concept of operations should be developed that embodies the people,
process, and technologies required to achieve the goals. To put
together the concept of operations, a number of inputs have to be
considered, including legal requirements, existing processes and
infrastructure used, and known technology limitations. Performance
requirements should also be included in the concept of operations, such
as processing times. Business process reengineering, such as new
processes to conduct inspections of passengers in vehicles or to
maintain a database of biometric data, would also be addressed in the
concept of operations.
As we have noted, the desired benefit is the prevention of the entry of
travelers who are inadmissible to the United States. More specifically,
the use of a biometric watch list can provide an additional check to
name-based checks and can help detect travelers who have successfully
established separate names and identities and are trying to evade
detection. The use of visas with biometrics can help positively
identify travelers as they enter the United States and can limit the
use of fraudulent documents, including counterfeit and modified
documents, and impostors‘ use of legitimate documents.
However, the benefits gained by using biometric have several
limitations. First, the benefit achieved is directly related to the
performance of the biometric technology. The performance of facial,
fingerprint, and iris recognition is unknown for systems as large as a
biometric visa system that would require storage and comparison against
100 million to 240 million records. The largest facial, fingerprint,
and iris recognition systems contain 60 million, 40 million, and 30,000
records, respectively.
The population of the biometric watch list is critical to its
effectiveness. Policies and procedures would need to be developed for
adding and maintaining records in the watch list database. Key
questions that have to be answered include who is added to the watch
list, how someone is removed from the watch list, and how errors could
be corrected. Successfully identifying people on the biometric watch
list is also dependent on the effectiveness of the law enforcement and
intelligence communities in identifying individuals who should be
placed on the watch list.
Issuing visas with biometrics will only assist in identifying those
currently required to obtain visas to enter this country. For example,
Canadians, Mexicans with border crossing cards, and foreign nationals
participating in the visa waiver program do not have to have a visa to
enter the United States. The issuance of visas with biometrics is also
dependent on establishing the correct identity during enrollment. This
process typically depends on the presentation of identification
documents. If the documents do not specify the applicant‘s true
identity, then the travel document will be linked to a false
identity.[Footnote 6]
Further, biometric technology is not a solution to all border security
problems. Biometric technology can address only problems associated
with identifying travelers at official locations such as embassies and
ports of entry. While the technology can help reduce the number of
illegal immigrants who cross with fraudulent documents, it cannot help
with illegal immigrants who cross between the ports of entry. INS has
previously estimated that up to 60 percent of the 275,000 new illegal
immigrants a year do not present themselves at a port of entry to enter
the United States. In addition, biometrics cannot help to identify
foreign nationals who enter through ports of entry and are properly
admitted by an inspector but may overstay their visit.
The costs of any proposed system must be considered. Both initial costs
and recurring costs need to be estimated. Initial costs need to account
for the engineering efforts to design, develop, test, and implement the
system; training of personnel; hardware and software costs; network
infrastructure improvements; and additional facilities required to
enroll people into the biometric system. Recurring cost elements
include program management costs, hardware and software maintenance,
hardware replacement costs, training of personnel, additional personnel
to enroll or verify the identities of travelers in the biometric
system, and possibly the issuance of token cards for the storage of
biometrics collected for issuing visas. While specific cost estimates
depend on the detailed assumptions made for the concept of operations,
the costs are significant.
Effect on Privacy, the Economy, and International Relations:
The Privacy Act of 1974 limits federal agencies‘ collection, use, and
disclosure of personal information, such as fingerprints and
photographs. Accordingly, the Privacy Act generally covers federal
agency use of personal biometric information. However, as a practical
matter, the act is likely to have a more limited application for border
security. First, the act applies only to U.S. citizens and lawfully
admitted permanent residents. Second, the act includes exemptions for
law enforcement and national security purposes. Representatives of
civil liberties groups and privacy experts have expressed concerns
regarding (1) the adequacy of protections for security, data sharing,
identity theft, and other identified uses of biometric data and (2)
secondary uses and ’function creep.“ These concerns relate to the
adequacy of protections under current law for the large-scale data
handling in a biometric system. Besides information security, concern
was voiced about an absence of clear criteria for governing data
sharing. The broad exemptions of the Privacy Act, for example, provide
no guidance on the extent of the appropriate uses law enforcement may
make of biometric information. Because there is no general agreement on
the appropriate balance of security and privacy to build into a system
using biometrics, further policy decisions are required. The range of
unresolved policy issues suggests that questions surrounding the use of
biometric technology center as much on management policies as on
technical issues.
The use of biometric technologies could potentially impact the length
of the inspection process. Any lengthening in the process of obtaining
travel documents or entering the United States could affect travelers
significantly. At some consular posts, visas are issued the day
applications are received. Even without biometrics, the busiest ports
of entry regularly have delays of 2 to 3 hours. Increases in inspection
times could compound these delays. Delays inconvenience travelers and
could result in fewer visits to the United States or lost business to
the nation. Further studies will be necessary to measure what the
potential effect could be on the American economy and, in particular,
on the border communities. These communities depend on trade with
Canada and Mexico, which totaled $653 billion in 2000.
The use of biometrics in a border control system in the United States
could affect the number of international visitors and how other
countries treat visitors from the United States. Much visa issuance
policy is based on reciprocity--that is, the process for allowing a
country‘s citizens to enter the United States would be similar to the
process followed by that country when U.S. citizens travel there. If
the United States requires biometric identifiers when citizens of other
countries apply for a visa, those countries may require U.S. citizens
to submit a biometric when applying for a visa to visit their
countries. Similarly, if the United States requires other countries to
collect biometrics from their citizens and store the data with their
passport for verification when they travel here, they may require the
United States to place a biometric in its passports as well.
As more countries require the use of biometrics to cross their borders,
there is a potential for different biometrics to be required for
entering different countries or for the growth of multiple databases of
biometrics. Unless all countries agree on standard biometrics and
standard document formats, a host of biometric scanners might be
required at U.S. and other ports of entry. The International Civil
Aviation Organization plans to standardize biometric technology for
machine-readable travel documents, but biometric data-sharing
arrangements between the United States and other countries would also
be required.
Issues Raised in Joint Report from Justice, State, and NIST:
In January 2003, as required by the USA PATRIOT Act and the Enhanced
Border Security and Visa Entry Reform Act, the Attorney General, the
Secretary of State, and NIST jointly submitted a report that focuses on
specific legislative requirements related to interoperable databases,
biometric identifiers, and travel document authentication for entry
only.[Footnote 7] The report discusses the current border control
process, the need for a new approach, and identifies several issues
that need to be addressed to make a more extensive use of biometrics in
automated border control systems.
As a part of this report, NIST developed technical standards for
biometric identifiers and tamper-resistance for travel documents. NIST
reported that facial recognition and fingerprint recognition are the
only biometric technologies with sufficiently large operational
databases for testing at this time. NIST concluded that while iris
recognition is a promising candidate, it requires collection of a large
test database to test the uniqueness of iris data for large samples.
NIST recommends that 10 fingerprints be used for background
identification, and a dual biometric system using 2 fingerprint images
and a face image may be needed to meet projected system requirements
for verification. For tamper-resistance, NIST recommended the use of a
public key infrastructure to authenticate the source of travel
documents. According to the report, the Attorney General and the
Secretary of State have agreed to use a live-capture digital photograph
and fingerprints for identity enrollment, background checks, and
identity verification. However, the exact number of fingerprints
required at enrollment has not been finalized.
The report identifies several issues and considerations that need to be
further evaluated and resolved. The resolution of these issues will
have significant operational, technical, and cost implications.
According to the report, if the various stakeholders of this cross-
agency effort do not work out these details before major investments
are made, the estimated cost and expected results of the investment
will be at risk. Further, the report states that due to the size and
complexity of the effort, the deployment schedule will need to be
delayed at least 1 year from the October 26, 2004, target date
established in the legislation.
Many of the issues identified in the report are consistent with the
challenges we identified in our work last year. For example, the report
discusses the need to change the end-to-end business process to
incorporate the enrollment and verification of biometric information
from travelers. Further, the report cites the need to improve border
security without a major adverse effect on tourism, commerce, and
border traffic flow. Privacy issues and the effect on international
relations are also addressed. Exception processing is discussed.
According to the report, approximately 2 percent of the population
cannot provide good fingerprint images. As a result, an alternate
enrollment and identification procedure will be required for these
people. To develop the biometric border control system, the report
estimates it would cost about $3.8 billion including initial and
recurring costs over a six-year period.
The report cites a number of steps that need to be taken by a cross-
agency project team to clarify the scope, costs, benefits, and schedule
required to implement the legislative requirement. For example, the
report cites the need to develop a cross-agency concept of operations
for the entire end-to-end process that would guide the scoping,
requirements definition, and trade-off analyses required to develop and
deploy the system. The concept of operations would also help determine
how the proposed solution can balance identity verification and
efficient traffic flow objectives at land borders. The report also
discusses the need to update the overall costs and benefits of the
solution to confirm that the effort will achieve the benefits desired
at an acceptable cost. Steps will also need to be taken to align U.S.
biometric standards with those of other countries, particularly visa-
waiver countries, in a manner consistent with the concept of
operations. Finally, the report cites the need to define and establish
a cross-agency program management and governance structure to drive the
business change and deployment associated with this effort.
Current Inspection Challenges at Land Ports of Entry:
As the Department of Homeland Security and other agencies consider a
biometrics-based border security concept of operations, they may need
to address current challenges that we have observed during our ongoing
work at land ports of entry. At a minimum, these challenges represent
potential implementation issues that could affect the security benefits
intended by the new border security system. These challenges include:
* Integrity of the Inspections Process. The need to balance the dual
objectives of identifying those who should not be permitted entry into
the country and keeping traffic and trade flowing through the ports
creates potential weaknesses in the process that biometrics can help
resolve but not entirely. For example, we recently reported on our
ability to enter the country at ports of entry with erroneous answers
to inspector questions and counterfeit identification. [Footnote 8]
Also, at land ports of entry, computer checks are made on the vehicle
that travelers arrive in but not on the driver and passengers unless
inspectors suspect wrongdoing. Moreover, we observed that new security
procedures aimed at increasing process integrity were not consistently
followed. With respect to alternative inspection programs, various
trusted traveler programs, intended to process large numbers of pre-
screened travelers quickly so that inspectors can devote more time to
travelers whose risk is unknown, can be strengthened through wider use
of biometrics. Some current programs are not attractive to many
travelers because the cost of participation does not ensure time
savings when crossing the border.
:
* Providing Technology and Equipment to Inspectors. Some current border
operations are time-consuming because inspectors must separately log on
and off of several lookout databases that need to be checked when more
intensive, or secondary, inspections are required. This could increase
the risk that an inspector might overlook valuable information.
Further, inspectors still perform many routine administrative processes
by hand, although some ports of entry have successfully automated some
of these manual processes. Once the concept of operations for a new
border security system is adopted, extensive introduction of new
equipment and automated processes will require extensive training and
reinforcement.
:
* Access to Intelligence Information. The amount of intelligence
information border inspectors currently receive in a single day can be
overwhelming, and inspectors report that they do not have enough time
to read it. Further, because of the need to staff inspection lanes,
some ports of entry reported not having time to conduct daily
intelligence and safety briefings, as required. Ensuring that
intelligence information is relevant, and that inspectors have
sufficient time to review and absorb it, will present a significant
challenge for a new border security system.
:
* Adequate and Consistent Inspector Training. Merging INS and Customs
inspectors into a single shared inspection force will be a significant
challenge because INS and Customs train their inspectors at two
separate academies using two different curricula with little time
devoted to learning each other‘s laws and regulations. In addition,
training, particularly of new inspectors, is a continuing need after
deployment of inspectors, but the pressures of inspection itself has
taken precedence over both on-the-job training and formal training at
some ports.
In conclusion, biometric technologies are available today that can be
used for border security. However, it is important to bear in mind that
effective security cannot be achieved by relying on technology alone.
Technology and people must work together as part of an overall security
process. As we have pointed out, weaknesses in any of these areas, such
as those we identified at land ports of entry, diminishes the
effectiveness of the security process. We have found that three key
considerations need to be addressed before a decision is made to
design, develop, and implement biometrics into a border control system:
1. Decisions must be made on how the technology will be used.
2. A detailed cost-benefit analysis must be conducted to determine that
the benefits gained from a system outweigh the costs.
3. A trade-off analysis must be conducted between the increased
security, which the use of biometrics would provide, and the effect on
areas such as privacy and the economy.
A report recently issued jointly by the Attorney General, Secretary of
State, and NIST agrees with these considerations. As DHS and other
agencies consider the development of a border security system with
biometrics, they need to define what the high-level goals of this
system will be and develop the concept of operations that will embody
the people, process, and technologies required to achieve these goals.
With these answers, the proper role of biometric technologies in border
security can be determined. If these details are not resolved, the
estimated cost and performance of the resulting system will be at risk.
Mr. Chairmen, this concludes my statement. I would be pleased to answer
any questions that you or members of the subcommittees may have.
Contacts and Acknowledgments:
For further information, please contact Nancy Kingsbury, Managing
Director, Applied Research and Methods, at (202) 512-2700, or Richard
Stana, Director, Homeland Security and Justice, at (202) 512-8777.
Individuals making key contributions to this testimony include Yvette
Banks, Naba Barkakati, Michael Dino, Barbara Guffy, Richard Hung, Rosa
Lin, and Lori Weiss.
[End of section]
Related GAO Products:
Combating Terrorism: Observations on National Strategies Related to
Terrorism. GAO-03-519T. Washington, D.C.: March 3, 2003.
Homeland Security: Challenges Facing the Coast Guard as it Transitions
to the New Department. GAO-03-467T. Washington, D.C.: February 12,
2003.
Weaknesses In Screening Entrants Into The United States. GAO-03-438T.
Washington, D.C.: January 30, 2003.
Major Management Challenges and Program Risks: Department of Homeland
Security. GAO-03-102. Washington, D.C.: January 2003.
Homeland Security: Management Challenges Facing Federal Leadership.
GAO-03-260. Washington, D.C.: December 20, 2002.
Homeland Security: Information Technology Funding and Associated
Management Issues. GAO-03-250. Washington, D.C.: December 13, 2002.
Border Security: Implications of Eliminating the Visa Waiver Program.
GAO-03-38. Washington, D.C.: November 22, 2002.
Homeland Security: INS Cannot Locate Many Aliens Because It Lacks
Reliable Address Information. GAO-03-188. Washington, D.C.: November
21, 2002.
Container Security: Current Efforts to Detect Nuclear Materials, New
Initiatives, and Challenges. GAO-03-297T. New York, NY: November 18,
2002.
Technology Assessment: Using Biometrics for Border Security. GAO-03-
174. Washington, D.C.: November 15, 2002.
Coast Guard: Strategy Needed for Setting and Monitoring Levels of
Effort for All Missions. GAO-03-155. Washington, D.C.: November 12,
2002.
Border Security: Visa Process Should Be Strengthened as an
Antiterrorism Tool. GAO-03-132NI. Washington, D.C.: October 21, 2002.
Customs Service: Acquisition and Deployment of Radiation Detection
Equipment. GAO-03-235T. Washington, D.C.: October 17, 2002.
Homeland Security: Effective Intergovernmental Coordination Is Key to
Success. GAO-02-1013T. Washington, D.C.: August 23, 2002.
Port Security: Nation Faces Formidable Challenges in Making New
Initiatives Successful. GAO-02-993T. Washington, D.C.: August 5, 2002.
Identity Fraud: Prevalence and Links to Alien Illegal Activities. GAO-
02-830T. Washington, D.C.: June 25, 2002.
Immigration Enforcement: Challenges to Implementing the INS Interior
Enforcement Strategy. GAO-02-861T. Washington, D.C.: June 19, 2002.
National Preparedness: Integrating New and Existing Technology and
Information Sharing into an Effective Homeland Security Strategy. GAO-
02-811T. Washington, D.C.: June 7, 2002.
Customs Service Modernization: Management Improvements Needed on High-
Risk Automated Commercial Environment Project. GAO-02-545. Washington,
D.C.: May 13, 2002.
National Preparedness: Technologies to Secure Federal Buildings. GAO-
02-687T. Washington, D.C.: April 25, 2002.
INS Forensic Document Laboratory: Several Factors Impeded Timeliness of
Case Processing. GAO-02-410. Washington, D.C.: March 13, 2002.
Immigration Benefit Fraud: Focused Approach Is Needed to Address
Problems. GAO-02-66. Washington, D.C.: January 31, 2002.
Homeland Security: A Risk Management Approach Can Guide Preparedness
Efforts. GAO-02-208T. Washington, D.C.: October 31, 2001.
Immigration and Naturalization Service: Overview of Recurring
Management Challenges. GAO-02-168T. Washington, D.C.: October 17, 2001.
INS Southwest Border Strategy: Resource and Impact Issues Remain After
Seven Years. GAO-01-842. Washington, D.C.: August 2, 2001.
FOOTNOTES
[1] We recently designated the implementation and transformation of DHS
as a high-risk area due in part to the inherited operational and
management challenges faced by the department. See U.S. General
Accounting Office, Major Management Challenges and Program Risks:
Department of Homeland Security, GAO-03-102 (Washington D.C.: Jan.
2003).
[2] U.S. General Accounting Office, Technology Assessment: Using
Biometrics for Border Security, GAO-03-174 (Washington D.C.: Nov. 15,
2002).
[3] Border crossing cards allow Mexican citizens to enter the United
States for the purpose of business or pleasure without being issued
further documentation and to stay for 72 hours or less within 25 miles
of the U.S./Mexican border.
[4] Under NSEERS, certain nonimmigrants, who may pose a national
security risk, are being registered, and are fingerprinted and
photographed when they arrive in the United States. These nonimmigrants
are required to periodically report and update, when changes occur,
their registration information, and record their departure from the
country.
[5] See the Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA
PATRIOT Act) (Public Law 107-56, §403(c) and §414, Oct. 26, 2001) and
the Enhanced Border Security and Visa Entry Reform Act of 2002 (Public
Law 107-173, May 14, 2002).
[6] We have previously reported on weaknesses in the visa issuing
process. See U.S. General Accounting Office, Border Security: Visa
Process Should Be Strengthened as an Antiterrorism Tool, GAO-03-132NI
(Washington D.C.: Oct. 21, 2002).
[7] The Attorney General, Secretary of State, and the National
Institute of Standards and Technology, Report to the Congress: Use of
Technology Standards and Interoperable Databases with Machine-
Readable, Tamper-Resistant Travel Documents (Jan. 2003).
[8] U.S. General Accounting Office, Weaknesses In Screening Entrants
Into The United States, GAO-03-438T (Washington D.C.: Jan. 30, 2003).