Information Security

Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program Gao ID: GAO-07-870 July 13, 2007

Intended to enhance the security of U.S. citizens and visitors, United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program encompasses the pre-entry, entry, status management, and exit of foreign national travelers who enter and leave the United States at 285 air, sea, and land ports of entry. GAO was asked to determine whether Department of Homeland Security (DHS) has implemented appropriate controls to protect the confidentiality, integrity, and availability of the information and systems used to support the US-VISIT program. To do this, GAO examined the controls over the systems operated by Customs and Border Protection (CBP) that support the US-VISIT program.

The systems supporting the US-VISIT program have significant information security control weaknesses that place sensitive and personally identifiable information at increased risk of unauthorized and possibly undetected disclosure and modification, misuse, and destruction. Weaknesses existed in all control areas and computing device types reviewed. Deficiencies in access controls and other system controls exposed mainframe computer, network infrastructure, servers, and workstations to insider and external threats. For example, CBP did not implement controls to effectively prevent, limit, and detect access to computer networks, systems, and information. To illustrate, it did not (1) adequately identify and authenticate users in systems supporting US-VISIT; (2) sufficiently limit access to US-VISIT information and information systems; (3) ensure that controls adequately protected external and internal network boundaries; (4) effectively implement physical security at several locations; (5) consistently encrypt sensitive data traversing the communication network; and (6) provide adequate logging or user accountability for the mainframe, workstations, or servers. In addition, CBP did not always ensure that responsibilities for systems development and system production were sufficiently segregated and did not consistently maintain secure configurations on the application servers and workstations at a key data center and ports of entry. These weaknesses collectively increase the risk that unauthorized individuals could read, copy, delete, add, and modify sensitive information, including personally identifiable information, and disrupt the operations of the US-VISIT program. They make it possible for intruders, as well as government and contractor employees, to bypass or disable computer access controls and undertake a wide variety of inappropriate or malicious acts. These risks are not confined to US-VISIT information. The CBP mainframe and network resources that support US-VISIT also support other programs and systems. As a result, the vulnerabilities identified in this report could expose the information and information systems of the other programs to the same increased risks. A key reason for these weaknesses is that, although CBP has made important progress in implementing elements of the department's information security program, it did not effectively or fully implement essential program activities. For example, CBP did not fully characterize the risks facing critical systems, update interconnection security agreements in security plans, sufficiently test and evaluate security controls, incorporate required elements in remedial action plans, adequately implement incident detection and handling procedures, and consistently address privacy issues. Until DHS and CBP act to mitigate the weaknesses in CBP systems supporting the US-VISIT program and CBP effectively and fully implements its information security program, limited assurance exists that the US-VISIT program will achieve its goal of enhancing the security of U.S. citizens and its visitors.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-07-870, Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program This is the accessible text file for GAO report number GAO-07-1205 entitled 'Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program' which was released on August 3, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Report to Congressional Requesters: July 2007: Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program: GAO-07-870: GAO Highlights: Highlights of GAO-07-870, a report to congressional requester. Why GAO Did This Study: Intended to enhance the security of U.S. citizens and visitors, United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program encompasses the pre-entry, entry, status management, and exit of foreign national travelers who enter and leave the United States at 285 air, sea, and land ports of entry. GAO was asked to determine whether Department of Homeland Security (DHS) has implemented appropriate controls to protect the confidentiality, integrity, and availability of the information and systems used to support the US- VISIT program. To do this, GAO examined the controls over the systems operated by Customs and Border Protection (CBP) that support the US- VISIT program. What GAO Found: The systems supporting the US-VISIT program have significant information security control weaknesses that place sensitive and personally identifiable information at increased risk of unauthorized and possibly undetected disclosure and modification, misuse, and destruction. Weaknesses existed in all control areas and computing device types reviewed. Deficiencies in access controls and other system controls exposed mainframe computer, network infrastructure, servers, and workstations to insider and external threats. For example, CBP did not implement controls to effectively prevent, limit, and detect access to computer networks, systems, and information. To illustrate, it did not (1) adequately identify and authenticate users in systems supporting US-VISIT; (2) sufficiently limit access to US-VISIT information and information systems; (3) ensure that controls adequately protected external and internal network boundaries; (4) effectively implement physical security at several locations; (5) consistently encrypt sensitive data traversing the communication network; and (6) provide adequate logging or user accountability for the mainframe, workstations, or servers. In addition, CBP did not always ensure that responsibilities for systems development and system production were sufficiently segregated and did not consistently maintain secure configurations on the application servers and workstations at a key data center and ports of entry. These weaknesses collectively increase the risk that unauthorized individuals could read, copy, delete, add, and modify sensitive information, including personally identifiable information, and disrupt the operations of the US-VISIT program. They make it possible for intruders, as well as government and contractor employees, to bypass or disable computer access controls and undertake a wide variety of inappropriate or malicious acts. These risks are not confined to US- VISIT information. The CBP mainframe and network resources that support US-VISIT also support other programs and systems. As a result, the vulnerabilities identified in this report could expose the information and information systems of the other programs to the same increased risks. A key reason for these weaknesses is that, although CBP has made important progress in implementing elements of the department‘s information security program, it did not effectively or fully implement essential program activities. For example, CBP did not fully characterize the risks facing critical systems, update interconnection security agreements in security plans, sufficiently test and evaluate security controls, incorporate required elements in remedial action plans, adequately implement incident detection and handling procedures, and consistently address privacy issues. Until DHS and CBP act to mitigate the weaknesses in CBP systems supporting the US-VISIT program and CBP effectively and fully implements its information security program, limited assurance exists that the US-VISIT program will achieve its goal of enhancing the security of U.S. citizens and its visitors. What GAO Recommends: GAO recommends that the Secretary of Homeland Security direct CBP to fully implement information security program activities for systems supporting the US-VISIT program. In commenting on a draft of this report, DHS stated that it has directed CBP to complete remediation activities to address each of the recommendations. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-870]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen, (202) 512-6244, wilshuseng@gao.gov or Keith A. Rhodes, (202) 512-6412, rhodesk@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Objective, Scope, and Methodology: Significant Weaknesses Place US-VISIT Data at Risk: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Comments from the Department of Homeland Security: Appendix II: GAO Contacts and Staff Acknowledgments: Figures: Figure 1: Simplified Diagram of Key Systems supporting US-VISIT: Figure 2: Types of information used by the US-VISIT program: Abbreviations: ADIS: Arrival and Departure Information System: CCD: Consular Consolidated Database: CBP: United States Customs and Border Protection: CSIRC: Computer Security Incident Response Center: DHS: Department of Homeland Security: FISMA: Federal Information Security Management Act: ICE: United States Immigration and Customs Enforcement: IDENT: Automated Biometric Identification System: INS: Immigration and Naturalization Service: ISA: Interconnection Security Agreement: IT: Information Technology: LAN: Local-area Network: NCIC: National Crime Information Center: NIST: National Institute of Standards and Technology: OMB: Office of Management and Budget: PIA: Privacy Impact Assessment: POA&M: Plan of Action and Milestones: SORN: System of Records Notice: TECS: Treasury Enforcement Communications System: TECS/IBIS: Treasury Enforcement Communications System/Interagency Border Inspection System: USCIS: United States Citizenship and Immigration Services: US-VISIT: United States Visitor and Immigrant Status Indicator Technology: WAN: Wide-area Network: [End of section] United States Government Accountability Office: Washington, DC 20548: July 13, 2007: The Honorable Joseph I. Lieberman: Chairman: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Bennie G. Thompson: Chairman: Committee on Homeland Security: House of Representatives: In the years since the 2001 terrorist attacks, the need to secure U.S. borders has taken on added importance and has received increasing attention from Congress and the public. In an effort to avoid repetition of such attacks, and improve overall national security, Congress and the Administration have sought better ways to record and track the entry and departure of foreign visitors who pass through U.S. ports of entry [Footnote 1] by air, land, or sea; to verify their identities; and to authenticate their travel documentation. Pursuant to several statutory mandates, the Department of Homeland Security (DHS), in consultation with the Department of State, established the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program. As the federal government strives to integrate information on the entry and exit from the United States of foreign nationals, it is critical that the computer systems that support US-VISIT are properly protected through strong information security controls since a security breach could have a direct impact on our homeland and the security of U.S. citizens. For example, if controls for systems supporting US-VISIT were inadequately implemented there is a risk that unauthorized individuals could (1) delete or alter visitor records used or processed by US-VISIT and allow a drug smuggler, terrorist, or convicted felon to illegally enter the United States or (2) mount denial of service attacks and cripple computer processing at U.S. air, land, and sea ports of entry as well as the networks and infrastructure that support these ports of entry. As agreed, our objective was to determine whether the Department of Homeland Security has implemented appropriate information security controls to protect the confidentiality, integrity, and availability of the information and systems used to support the US-VISIT program. To accomplish this objective, we examined the controls over the systems operated by the United States Customs and Border Protection (CBP) that support the US-VISIT program. We performed our review at CBP facilities in the Washington, D.C. metropolitan area and selected ports of entry on the East and West Coast of the continental United States from February 2006 through April 2007, in accordance with generally accepted government auditing standards. In a separate report designated ’Limited Official Use Only,“ we are providing a more detailed discussion of the information security weaknesses affecting US-VISIT applications and additional technical recommendations. Results in Brief: Significant weaknesses in computer security controls threaten the confidentiality, integrity, and availability of critical CBP information and information systems used to support the US-VISIT program. CBP did not implement controls to effectively prevent, limit, and detect access to computer networks, systems, and information. For example, it did not (1) adequately identify and authenticate users in systems supporting US-VISIT; (2) sufficiently limit access to US-VISIT information and information systems; (3) ensure that controls adequately protected external and internal boundaries; (4) effectively implement physical security at several locations; (5) consistently encrypt sensitive data traversing the communication network; and (6) provide adequate logging or user accountability for the mainframe, workstations, or servers. In addition, CBP did not always ensure that responsibilities for systems development and system production were sufficiently segregated and did not consistently maintain secure configurations on the application servers and workstations at a key data center and ports of entry. As a result, increased risk exists that unauthorized individuals could read, copy, delete, add, and modify sensitive information”including personally identifiable information”and disrupt service on CBP systems supporting the US-VISIT program. A key reason for these weaknesses was that, although CBP made important progress in implementing elements of the department‘s information security program, it did not effectively or fully implement key program activities. For example, CBP did not fully characterize the risks facing critical systems, update interconnection security agreements in security plans, sufficiently test and evaluate security controls, incorporate required elements in remedial action plans, adequately implement incident detection and handling procedures, and consistently address privacy issues. We are making six recommendations to the Secretary of Homeland Security to effectively and fully implement key information security program activities for systems supporting US-VISIT. In written comments on a draft of this report (which are reprinted in app. I), DHS‘ Director of the Departmental GAO/OIG Liaison Office stated that CBP concurred with our recommendations and that CBP has already taken a number of significant steps toward mitigating many of the reported weaknesses. The director also stated that the department has directed CBP to complete remediation activities to address each of the six recommendations. Background: Information security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. It is especially important for government agencies, where maintaining the public‘s trust is essential. The dramatic expansion in computer interconnectivity and the rapid increase in the use of the Internet have changed the way our government, the nation, and much of the world communicate and conduct business. However, without proper safeguards, systems are unprotected from individuals and groups with malicious intent to intrude and use the access to obtain sensitive information, commit fraud, disrupt operations, or launch attacks against other computer systems and networks. This concern is well-founded for a number of reasons, including the dramatic increase in reports of security incidents, the ease of obtaining and using hacking tools, the steady advance in the sophistication and effectiveness of attack technology, and the dire warnings of new and more destructive attacks to come. Recognizing the importance of securing federal agencies‘ information and systems, Congress enacted the Federal Information Security Management Act of 2002 (FISMA) to strengthen the security of information and systems within federal agencies. [Footnote 2] FISMA requires each agency to use a risk-based approach to develop, document, and implement a departmentwide information security program for the information and systems that support the operations and assets of the agency. Overview of the US-VISIT Program: The Congress has long recognized the need for a border security system that collects information about foreign nationals entering and exiting the United States and identifies those who have overstayed their visits. Legislative efforts to create an entry exit control system to record and match arrival and departure records for foreign nationals traveling to the United States began as early as 1996 with the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA). [Footnote 3] Among other things, Section 110 of the of IIRIRA directed the former Immigration and Naturalization Service (INS) to develop an automated entry exit control system to collect records of departure from every alien leaving the United States and match it with the alien‘s record of arrival. In 2000, the Immigration and Naturalization Service Data Management Improvement Act [Footnote 4] amended section 110 of IIRIRA by replacing it in its entirety. This act, among other things, requires that the entry exit system integrate alien arrival and departure information contained in Department of Justice (including INS) and State Department databases. Since September 11, 2001, additional laws address, among other things, the use of biometric technology in an alien entry exit control system. For example, the USA PATRIOT Act [Footnote 5] mandates that this system be capable of interfacing with other law enforcement agencies, and that it uses biometric technology and tamper-resistant documents. In addition, the Aviation and Transportation Security Act [Footnote 6] requires air carriers to electronically transmit manifest information for all international flight passengers and crew members to the Commissioner of Customs before landing at a U.S. airport. Furthermore, the Enhanced Border Security and Visa Entry Reform Act [Footnote 7] further requires the use of biometrics in travel documents and expands the passenger arrival manifest requirements in the Aviation and Transportation Security Act to sea carriers and to air and sea departures. With the passage of the Homeland Security Act of 2002, [Footnote 8] 22 federal agencies and organizations merged into the Department of Homeland Security (DHS). Shortly after DHS assumed operational control, the Secretary of the Department of Homeland Security renamed the entry exit system US-VISIT. Most recently, the Intelligence Reform and Terrorism Prevention Act of 20049 calls for the Secretary of the Department of Homeland Security to accelerate the full implementation of an automated biometric entry and exit data system. Among other things, the act requires the biometric entry exit screening system to provide real-time updates on all information about entry exit history to relevant agencies. Today, the US-VISIT program is a multi-agency initiative. From fiscal year 2002 through fiscal year 2007, total funding for the US-VISIT program has been about $1.7 billion dollars. Since fiscal year 2002, Congress has directed GAO to review annual DHS plans, also called expenditure plans, describing how the agency plans to satisfy legislative conditions specified in the appropriations, including acting and complying with federal acquisition rules, requirements, guidelines, and systems acquisition management practices. These reviews have produced five reports, the latest being a review of the fiscal year 2006 US-VISIT expenditure plan. [Footnote 10] These reports and other recent reports on US-VISIT contract and financial management [Footnote 11] and US-VISIT operations at land ports of entry have identified fundamental challenges that DHS continues to face in meeting program expectations (i.e., delivering program capabilities and benefits on time and within cost). [Footnote 12] We have made many recommendations over the last 4 years to DHS to define and justify US- VISIT‘s future direction, strengthen program management, and ensure the delivery of promised system capabilities on time and within budget. Goals and Purpose: The goals of the US-VISIT program are to (a) enhance the security of U.S. citizens and visitors, (b) facilitate legitimate travel and trade, (c) ensure the integrity of the U.S. immigration system, and (d) protect the privacy of our visitors. Key US-VISIT functions include: * collecting, maintaining, and sharing information on certain foreign nationals who enter and exit the United States; * identifying foreign nationals who (1) have overstayed or violated the terms of their admission; (2) may be eligible to receive, extend, or adjust their immigration status; or (3) should be apprehended or detained by officials; * detecting fraudulent travel documents, verifying traveler identity, and determining traveler admissibility through the use of biometrics; and; * facilitating information sharing and coordination within the immigration and border management community. Information Systems Supporting the US-VISIT Program: The US-VISIT program is implemented via a ’system-of-systems“ [Footnote 13] in that the program is composed of different systems that are used to capture and store traveler information. Traveler information captured by US-VISIT includes such information as air, land, and sea port of entry admission data, commercial passenger and crew data, visa application data, and travel document (passport and visa) data. The type of data captured includes the person‘s complete name, date of birth, nationality, travel document issuing country, travel document number and type, applicant photo, and finger scans. [Footnote 14] The scope of the program includes the pre-entry, [Footnote 15] entry, [Footnote 16] status management, [Footnote 17] and exit [Footnote 18] of foreign national travelers who enter and leave the United States at 285 air, land, and sea ports of entry, and the provision of new analytical capabilities across the overall process. The entry aspect of the program, and the systems that support entry, are described below. US-VISIT Port of Entry Processing: When the applicant for admission arrives at a primary inspection booth, the CBP officer, using a document reader, scans the traveler‘s machine- readable travel documents or manually enters the information into a biographic system if the traveler is not in possession of machine readable documents. A biographic check is then made of the traveler to identify individuals who (1) are not known to pose a threat or is not suspected of posing a threat to the security of the United States; (2) have not violated the terms of their admission to the United States; or (3) are not wanted for commission of a criminal act in the United States or elsewhere. In addition, a photograph and summary biographical information of the individual is also displayed in cases where the individual has been issued a travel document by the Department of State or by DHS. Following the biographic check of the traveler by the CBP officer at the primary inspection booth, the officer then switches to a second biometric system to capture information pertaining to each traveler. The officer scans the individual‘s fingerprints (left and right index fingers) and takes a photograph. While the system is checking the finger scan, the officer questions the foreign national about the purpose of his or her travel and length of stay. If the officer determines the traveler is admissible, the officer enters the class of admission [Footnote 19] and duration of stay information into the system and also annotates the class of admission and ’admit until“ date on the I-94 form. [Footnote 20] The officer in the primary inspection booth then receives either a red or green light from the system indicating the results of the query. For example, if the query from the biographic system returns derogatory information or if the document issuance information does not match the traveler, the officer gets a red light from the system and then refers the traveler to secondary inspection for further questioning or actions. If the individual is then determined to be inadmissible in secondary inspection, the person is processed for removal or other actions. [Footnote 21] This information is then entered into the system by officers at the secondary inspection area and the appropriate actions are taken. A green light indicates that the traveler‘s biometrics did not match any records in the US-VISIT biometric watch list and, in cases of repeat travelers; there was no mismatch against the biometric data captured from the traveler‘s prior arrival(s). Systems Supporting US-VISIT Biographic Checks: The biographic system referred to above for the biographic check is performed by a system called the Treasury Enforcement Communications System/Interagency Border Inspection Service (TECS/IBIS). [Footnote 22] The IBIS ’service“ serves as a centralized, shared database of textual enforcement and lookout information, containing well over 10 million subject records. It supports approximately two dozen federal and other agencies [Footnote 23] and it resides on a CBP mainframe computer. IBIS keeps track of information on suspect individuals, businesses, vehicles, aircraft, and vessels. The types of data contained on the IBIS ’watch list“ include information from a variety of federal, state and local sources, which contributes to effective national security and law enforcement. Personal information about these individuals includes, but is not limited to, name, alias, date of birth, address, physical description, details and circumstances of a search, arrest, or seizure, case information such as merchandise and values, and methods of theft. Other Treasury Enforcement Communication System (TECS) systems besides IBIS that support US-VISIT are the: * Advance Passenger Information System (APIS), a system that returns current passenger and crew manifest records on individuals arriving into and departing from the U.S. APIS includes arrival and departure manifest information provided by air and sea carriers such as name, date of birth, travel document issuing country, gender, U.S. destination address, entry date, and departure date; and; * I-94, a system which has information derived from I-94 arrival and departure forms. CBP officers also have access to other TECS watch lists that according to US-VISIT officials are not used in conjunction with US-VISIT but are used in the border management process. For example, two systems which CBP officers have access through IBIS are (1) the National Crime Information Center (NCIC) database which was established by the Department of Justice as a service to all criminal justice agencies, as well as federal, state, and local users; and (2) the National Law Enforcement Telecommunication System (NLETS), which allows queries on state criminal history, vehicle registration, driver‘s license information, and administrative messages. In addition, the Automated Targeting System–Passenger is a module used at all U.S. airports and seaports receiving international flights and voyages to evaluate passengers and crew members prior to arrival or departure. US-VISIT officials told us that, although the system is not used in support of US-VISIT, it is used in the CBP officer‘s decision- making process about whether a passenger or crewmember should receive additional screening prior to entry into or departure from the country. Systems Supporting US-VISIT Biometric Checks: The biometric [Footnote 24] system behind the finger scan processing described above is complex as well. For example, after the CBP officer at the port of entry scans the fingerprints and takes a digital photograph of the visitor, the finger scans and photograph are sent to a system called the Automated Biometric Identification System (IDENT) which is managed by the US-VISIT program office. IDENT contains information on (1) known and suspected terrorists; (2) selected wanted persons (foreign-born, unknown place of birth, previously arrested by DHS); (3) deported felons and sexual registrants; (4) certain previous criminal histories; and (5) previous IDENT border crossing enrollments. Also included in IDENT is information on persons who have attempted illegal entry into the United States, persons who have applied for immigration and naturalization benefits, and persons who have applied for positions of public trust. IDENT checks visitors at U.S. borders against a US-VISIT biometric watch list of individuals for whom biometrics have been collected. These individuals include: * known or suspected terrorists; * wanted individuals; * deported felons, and; * individuals related to gang activity. Information on these individuals comes from a variety of sources, including: * the Federal Bureau of Investigation; * Interpol; * the California Department of Justice; * the Los Angeles County Sheriff‘s Office; * the Department of Defense, and; * Department of State visa application refusals. Each of the above organizations has its own computer systems sending data to IDENT. For example, in the case of the Department of State, IDENT receives enrollment data and visa refusal data from Consular officers abroad who collect finger scans as part of the visa issuance process. When the visa applicant‘s finger scans are captured, they are electronically sent, along with a digital photo of the applicant and biographic data, to the Department of State‘s Consular Consolidated Database (CCD) [Footnote 25] and from CCD the finger scans and photo are sent to IDENT. [Footnote 26] Information about the photo is also sent from the CCD to a TECS database called US-VISA Datashare. Information from the FBI comes to IDENT from the FBI‘s Integrated Automated Fingerprint Identification System. The IDENT system performs three basic biometric operations: identification, verification, and enrollment. Identification consists of searching databases, such as terrorist watch lists, to ensure that known or suspected terrorists are not admitted into the U.S. In verification, the claimed identity of a foreign visitor is confirmed by comparing the biometrics of an individual with stored biometrics associated with a travel document, such as a passport or visa. Enrollment ’registers“ individuals into the IDENT database. IDENT also stores finger scans collected during the inspection if they are of better quality than those already stored within the system. IDENT in turn transmits the finger scan identification numbers associated with biometrics captured at arrival in the United States to the Arrival Departure Information System (ADIS). ADIS, which is ’owned“ by the US-VISIT program office, [Footnote 27] is a database that stores traveler arrival, status management, and departure data. Arrival and departure data is received from (1) air and sea carrier manifests; (2) inspector data entries at ports of entry; (3) I-94 forms; and (4) biometric identifiers collected at arrival and certain departure locations. It matches entry, immigration status updates, and departure data to provide up-to date immigration status, including whether the individual has overstayed his/her authorized period of stay. ADIS also receives information from a variety of other sources. For example, information on student change of status is received from the Student and Exchange Visitor Information System (SEVIS). Schools and sponsors transmit information to SEVIS via the Internet throughout a foreign student‘s or exchange visitor‘s stay in the U.S. [Footnote 28] SEVIS in turn provides this information to ADIS. Another system called the Computer Linked Application Information Management System (CLAIMS 3) also sends information to ADIS. CLAIMS 3 is a system that contains information, including adjudication results on foreign nationals who request immigration benefits such as change of status, extension of stay, or adjustment to permanent resident status. ADIS consolidates the biometric and biographic information and transmits information to TECS linking the travelers‘ biographic information to their biometrics. ADIS transmits this information to the TECS Biometric Information File, which includes the traveler‘s name, date of birth, travel document information and the associated biometric identification number. As in the case of the biographic watchlists, the inspector has access to additional watchlists that are not part of the functionality of US- VISIT but are important in border management. For example, if a ’match“ is received from IDENT during primary inspection, the encounter data is stored as part of the US-VISIT process, and the traveler would be sent to secondary inspection for further action. During secondary inspection processing, the officer can access US-VISIT systems such as IDENT‘s Secondary Inspection Tool and ADIS to receive additional information, but the officer will also separately log into other CBP systems or interconnections such as NCIC, to retrieve the full case management information as part of the CBP border management and enforcement process. Figure 1 is a simplified diagram of key computer systems and networks that support the US-VISIT program. Figure 1: Simplified Diagram of Key Systems supporting US-VISIT: [See PDF for image] Source: GAO analysis. [End of figure] As shown in the diagram, air, land, and sea ports of entry are connected to Customs and Border Protection local-area networks [Footnote 29] which are connected to a wide-area network. [Footnote 30] The wide-area network is in turn connected to a data center network which houses a mainframe computer supporting TECS. The Customs and Border Protection data center network is also connected to other networks, such as the Department‘s wide-area network and the Immigration and Customs Enforcement network, where the IDENT and ADIS are located. Other government agencies such as the Department of State receive biometric and biographic data via the Customs and Border Protection data center network. Nongovernmental networks such as private sector trade business networks transmit passenger and crew manifest data to the data center network. Roles and Responsibilities for Systems Supporting US-VISIT: The US-VISIT Program Office is the information system owner [Footnote 31] for several of the systems that comprise US-VISIT functionality, such as the Automated Biometric Identification System and the Arrival and Departure Information System. However, the US-VISIT Program Office does not own all of the systems that support the program. For example, the: * U.S. Customs and Border Protection is the system owner for TECS, [Footnote 32] the data center network, the wide-area network, and air, land, and sea port of entry local-area local-area networks; * U.S. Immigration and Customs Enforcement is the system owner for the Student and Exchange Visitor Information System as well as the network that supports the Automated Biometric Identification System the Arrival and Departure Information System; * U.S. Citizenship and Immigration Services is the system owner for the Computer Linked Application Information Management System; * U.S. Coast Guard is the system owner for e-mail services; and; * The Department of State owns the Consular Consolidated Database system. Information and Information Systems Supporting US-VISIT Need Protection: The US-VISIT program relies extensively on computerized networks and systems to collect, access, or process a significant amount of personal and sensitive information on foreign visitors, immigrants, and legal permanent residents. Accordingly, effective information security controls are essential to ensuring that this information, depicted in figure 2, is adequately protected from inadvertent or deliberate misuse, fraudulent use, improper disclosure or manipulation, and destruction. The compromise of this information could subject these citizens and visitors to financial crimes such as identity theft and could impede the Department of Homeland Security from achieving the goals of the US-VISIT program. Figure 2: Types of information used by the US-VISIT program: [See PDF for image] This figure is an illustration of a computer screen displaying US- VISIT, with the following types of information emanating from the screen: * Photo; * Date of birth; * Name; * Nationality; * Flight Information; * Gender; * Finger Scan; * Passport number; * Terrorist watchlist; * Social Security Number; * Criminal history; * Citizenship. Source: GAO analysis. [End of figure] In addition, the US-VISIT program office has reported that threats to US-VISIT systems and information exist, not only because they are government assets, but also because they are a front line defense in the government‘s anti-terrorist identification effort. According to the program office, threats can fall into the broad categories of insiders, hackers, domestic/foreign terrorists, and other criminal elements. Because of their knowledge and access to systems, insiders are in a position to modify an individual computer system for personal gain, disrupt services, or embarrass the agency. Hackers, on the other hand, are a significant concern when connecting to the Internet. The specific attraction to US-VISIT might be to embarrass US-VISIT or gain notoriety by having defeated the security of an organization responsible for the Nation‘s border security. The program office also maintains that domestic or foreign terrorists are a threat since it is conceivable that these radical subversive groups could target US-VISIT to cause embarrassment to the program. Finally, other criminal elements such as international terrorists, organized crime, and foreign intelligence organizations could target US-VISIT systems to obtain US-VISIT data on various border programs. Objective, Scope, and Methodology: The objective of our review was to determine whether DHS has implemented appropriate information security controls to protect the confidentiality, integrity, and availability of information and information systems used to support the US-VISIT program. To accomplish this, we used elements of our Federal Information System Controls Audit Manual to evaluate information system controls within the CBP control environment and concentrated our efforts on the evaluation of logical access controls over major systems, applications, and networks used by CBP in support of the US-VISIT program. Selected systems included the US-VISIT aspects of TECS, the data center mainframe that supports TECS, US-VISIT interface servers, US-VISIT client applications, and the supporting network and physical infrastructure such as servers, routers, firewalls, and workstations for CBP components supporting US- VISIT. We reviewed results from other audits, assessments, and tests, conducted interviews, and obtained and reviewed technical documentation. In coordination with CBP officials, we identified control points and obtained detailed configuration data from selected devices. We then analyzed the output from each selected device and reviewed the results in context to the network and for impact on the mission. In addition, we evaluated aspects of CBP‘s information security program. This program includes assessing risk; developing and implementing policies, procedures, and security plans; testing and evaluating the effectiveness of controls; planning, implementing, evaluating, and documenting remedial actions to address security deficiencies; detecting, reporting, and responding to security incidents; and ensuring privacy for personally identifiable information. As part of this effort, we identified and examined pertinent CBP security policies, procedures, guidance, security plans, and relevant reports and reviewed corrective actions taken by CBP to address vulnerabilities identified in previous reviews and tests. We discussed whether system controls were in place, adequately designed, and operating effectively with key security representatives, systems administrators, and management officials. Our work was performed at DHS offices, a data center, and selected air, land, sea ports of entry on the East and West coast of the continental United States in accordance with generally accepted government auditing standards. Significant Weaknesses Place US-VISIT Data at Risk: Although CBP has implemented information security controls that are designed to safeguard US-VISIT data, its systems supporting US-VISIT have significant weaknesses in access controls and other controls designed to protect the confidentiality, integrity, and availability of its sensitive and personal information. CBP has implemented several important controls such as encrypting data transmitted between client and interface servers, deploying intrusion detection software, and performing daily backup procedures that synchronize the storage area network at a data center with its remote backup site. In addition, it controlled physical access systems for land and sea ports of entry and effectively secured some of its sensitive areas and computer equipment. However, CBP did not consistently implement effective access controls and other controls such as segregation of duties and configuration assurance for systems supporting US-VISIT. A key reason for these weaknesses was that CBP did not always effectively implement key program activities of the department‘s information security program for systems supporting the US-VISIT program. As a result, increased risk exists that unauthorized individuals could compromise systems that support US-VISIT. Access Controls are Inadequate: A basic management objective for any organization is to protect the resources that support its critical operations from unauthorized access. Organizations accomplish this objective by designing and implementing access controls that are intended to prevent, limit, and detect unauthorized access to computing resources, programs, and information. These controls include identification and authentication, authorization, boundary protection, physical security, cryptography, and audit and monitoring. Inadequate access controls diminish the reliability of computerized information and increase the risk of unauthorized disclosure, modification, and destruction of sensitive information and the disruption of service. Identification and Authentication: A computer system must be able to identify and authenticate different users so that activities on the system can be linked to specific individuals. When an organization assigns unique user accounts to specific users, the system is able to distinguish one user from another”a process called identification. The system must also establish the validity of a user‘s claimed identity by requesting some kind of information, such as a password, that is known only by the user”a process known as authentication. Users are also responsible for providing protection against loss or disclosure of passwords in their possession. DHS policy requires the implementation of automated identification and authentication mechanisms that enable the unique identification and authentication of individual users or processes acting on behalf of information system users. DHS did not ensure that CBP adequately identified and authenticated users in systems supporting US-VISIT. For example, users shared passwords for accessing remote consoles, thereby diminishing CBP‘s ability to attribute system activity to specific individuals. Moreover, individuals with physical access to workstations could change settings without authentication. In addition, one application server owned by US- VISIT allowed logins using vendor default credentials from CBP port of entry workstations. As a result, increased risk exists that a malicious individual could gain network access to CBP systems and sensitive US- VISIT data. Authorization: Authorization is the process of granting or denying access rights and privileges to a protected resource, such as a network, system, application, function, or file. A key component of authorization and a basic principle for securing computer resources and data is the concept of ’least privilege.“ Least privilege means that users are granted access to only those programs and files that they need in order to perform their official duties. To restrict legitimate users‘ access in this way, organizations establish access rights and permissions. ’User rights“ are allowable actions that can be assigned to users or to groups of users. File and directory permissions are rules that regulate which users have access to a particular file or directory and the extent of that access. To avoid unintentionally giving users unnecessary access to sensitive files and directories, as well as special machine instructions which programs used to communicate with the operating system, an organization must give careful consideration to its assignment of rights and permissions. DHS policy requires that each user or process be assigned only those privileges needed to perform authorized tasks. CBP did not sufficiently limit access to US-VISIT information and information systems. For example, over one thousand users with command line access could put a program designed to bypass security rules into a special system library. CBP users also inappropriately had local administrator privileges on their workstations that could be used to intentionally or unintentionally load programs that may adversely affect security. In addition, CBP did not effectively use access control lists to control connectivity to sensitive applications and network devices such as firewalls. As a result, the unnecessary level of access granted to CBP computer resources provided opportunities for individuals to circumvent security controls and deliberately or inadvertently read, modify, or delete critical or sensitive information relating to the US-VISIT program. Boundary Protection: Boundary protections demarcate logical or physical boundaries between unknown users and protected information and systems. Best practices dictate that organizations allocate publicly accessible information system components to separate sub-networks with separate physical network interfaces and that key components within private networks are also adequately segregated as sub-networks. Unnecessary connectivity to an organization‘s network increases not only the number of access paths that must be managed and the complexity of the task, but the risk of unauthorized access in a shared environment. NIST guidance states that organizations should control all remote access through a managed access control point. DHS requires that any connections to the Internet or to other external systems be through controlled interfaces. For example, DHS requires that any direct connection of DHS networks to the Internet or to extranets must occur through firewalls that have been certified and accredited. However, DHS did not ensure that controls adequately protected external and internal boundaries. For example, internal network traffic was not segregated. Moreover, workstations and many servers did not have host based firewalls. Consequently, there is a heightened risk that security checkpoints at the boundaries of CBP‘s network may not inspect all traffic entering the network. As a result, increased risk exists that individuals could gain unauthorized access to sensitive information and systems. Physical Security: Physical security controls are important for protecting computer facilities and resources from espionage, sabotage, damage, and theft. These controls restrict physical access to computer resources, usually by limiting access to the buildings and rooms in which the resources are housed, and by periodically reviewing the access granted in order to ensure that it continues to be appropriate. DHS policy requires (1) that physical access to rooms, work areas and spaces, and facilities containing departmental systems, networks, and data be limited only to authorized personnel and (2) the implementation of environmental controls that safeguard agency assets against loss, theft, destruction, accidental damage, hazardous conditions, fire, malicious actions, and natural disasters. CBP policy states that information assets are required to have consistent and documented protection, similar to a ’defense-in-depth“ concept, which means there are multiple layers of security protecting an asset. However, CBP did not effectively implement physical security at several locations. For example, CBP did not control access to its restricted information technology spaces since its physical access systems were controlled by local authorities. In addition, sensitive information technology areas at CBP were not adequately secured and many rooms containing sensitive IT equipment had no environmental controls. As a result, these weaknesses increase the risk that unauthorized personnel could access sensitive CBP computing resources supporting US-VISIT and inadvertently or deliberately access, misuse, or destroy network resources. Cryptography: Cryptography [Figure] 33 underlies many of the mechanisms used to enforce the confidentiality and integrity of critical and sensitive information. One primary principle of cryptography is encryption. Encryption can be used to provide basic confidentiality and integrity for data by transforming plain text into cipher text using a special value known as a key and a mathematical process known as an algorithm. DHS requires the encryption of highly sensitive system files. DHS did not consistently apply encryption to protect sensitive data traversing the communication network. For example, network routers, switches, and network management servers used unencrypted network protocols so that files traversing the network could be read. In addition, passwords were transmitted over the network in clear text and were stored using weak encryption. US-VISIT applications also used a single key to encrypt all communications between the clients and servers so that sensitive US-VISIT data could be compromised should the key be captured and decrypted. CBP also did not appropriately distribute its private certificate authority [Footnote 34] and users relied on unknown certificates. In addition, CBP applications did not assign unique certificates and used the same certificate for both the client and the server. As a result, these weaknesses could allow an attacker to have unauthorized access to CBP network resources on the internal network and view or modify the messages between the servers and any client supporting US-VISIT. Audit and Monitoring: To establish individual accountability, monitor compliance with security policies, and investigate security violations, it is crucial to determine what, when, and by whom specific actions have been taken on a system. Organizations accomplish this by implementing system or security software that provides an audit trail of needed information in the desired format and locations so they can use it to determine the source of a transaction or attempted transaction and to monitor users‘ activities. The way in which organizations configure system or security software determines the nature and extent of information that the audit trails can provide. A key aspect of this is management of audit logs. [Footnote 35] Organizations should periodically review audit log design, processes and procedures and implement changes as needed to ensure that logs effectively detect security threats. DHS policy requires the enforcement of auditing and accountability by configuring information systems to produce, store, and retain audit records of system, application, network, and user activity. DHS also requires that audit records contain sufficient information to establish what events occurred, when the events occurred, the source of the events, the cause of the events, and the event outcome. CBP also developed and implemented a monitoring list that tracks access to key operating system libraries with programs allowed to execute restricted functions. CBP did not provide adequate logging or user accountability for the mainframe, workstations, or servers. For example, monitoring lists for key operating system libraries on the mainframe did not capture needed data for all sensitive libraries in the desired locations. In addition, the monitoring list for key operating system libraries was out of date and irrelevant since it focused on 680 items that were no longer on the system. CBP also did not install central logging servers to ensure that key security-relevant events could be easily reviewed and safeguarded. As a result, CBP may allow unauthorized logical access to US-VISIT systems to go undetected. Weaknesses in Other Information System Controls Increase Risks: Segregation of Duties: Segregation of duties refers to the policies, procedures, and organizational structures that help ensure that no single individual can independently control all key aspects of a process or computer- related operation and thereby gain unauthorized access to assets or records. Often, segregation of duties is achieved by dividing responsibilities among two or more individuals or organizational groups. This diminishes the likelihood that errors and wrongful acts will go undetected because the activities of one individual or group will serve as a check on the activities of the other. Inadequate segregation of duties increases the risk that erroneous or fraudulent transactions could be processed, improper program changes implemented, and computer resources damaged or destroyed. DHS policy requires that segregation of duties be observed in order to eliminate conflicts of interest in the responsibilities and duties assigned to individuals. CBP did not always ensure that responsibilities for systems development and system operations or production were sufficiently segregated. For example, development and test servers and a development code repository were on the production network. In addition, mainframe system programmers were allowed to access application production data and developmental staff could access mainframe operating system libraries. Moreover, developmental staff had update access to the application production data. As a result, potential risk exists for these individuals to perform incompatible functions and increases the likelihood that they can corrupt critical processes. Configuration Assurance: Configuration assurance is the process of (1) verifying the correctness of the security settings in the operating systems, applications, or computing and network devices and (2) maintaining operations in a secure fashion. Patch management is an important element in mitigating the risks associated with software vulnerabilities. When software vulnerabilities are discovered, the software vendor may develop and distribute a patch or work-around to mitigate the vulnerability. DHS patch management policy states that components shall manage systems to reduce vulnerabilities by installing patches. Both DHS and CBP policies state that security patches need to be installed on servers and desktops in a timely and expeditious manner. Outdated and unsupported software are more vulnerable to attacks and exploitation. NSA guidance also states that it is important to install periodic updates to the operating system, since these updates contain fixes to vulnerabilities. CBP has taken steps to ensure that patches for the Windows operating systems were kept up-to-date. For example, CBP officials informed us that (1) CBP has documented its patch deployment process, manual patching procedures, and scan procedures for Windows and that (2) the Security Operations Center uses an automated tool to install patches on Windows devices within the ports of entry, the CBP wide-area network, and the CBP infrastructure. However, CBP did not consistently maintain secure configurations on the mainframe, applications servers, and workstations we reviewed at the data center and ports of entry. For example, production servers and workstations were missing critical operating system and software application security patches. CBP also used outdated versions of software and products that were no longer supported by the vendor. Further, CBP could not implement critical security features because it had not deployed the appropriate software on some workstations. As a result, increased risk exists that the integrity of the CBP mainframe, network devices, and administrator workstations supporting US-VISIT could be compromised and could lead to denial-of-service attacks or to individuals gaining unauthorized access to network resources. Aggregate Effect of Weaknesses: The aggregate effect of inadequate access controls and weaknesses in other system controls place information and information systems supporting US-VISIT at increased risk of unauthorized disclosure, use, modification, or destruction, possibly without detection. These weaknesses increase the risk that unauthorized individuals could read, copy, delete, add, and modify sensitive information”including personally identifiable information”on systems supporting the US-VISIT program. They make it possible for intruders, as well as government and contractor employees, to bypass or disable computer access controls and undertake a wide variety of inappropriate or malicious acts. These acts could include tampering with data; browsing sensitive information; using computer resources for inappropriate purposes, such as launching attacks on other organizations; and disrupting or disabling computer- supported operations. These risks are not confined to US-VISIT information. The CBP mainframe and network resources that support US-VISIT also support other programs and systems. As a result, the vulnerabilities identified in this report could expose the information and information systems of the other programs to the same increased risks. Information Security Program Is Not Fully Implemented: A key reason for these weaknesses is that, although CBP has made important progress in implementing the department‘s information security program, it has not effectively or fully implemented key program activities for systems supporting the US-VISIT program. CBP has taken several actions to implement elements of the department‘s information security program. For example, it has: * developed, documented, and disseminated information security policies, procedures, and plans. For example, CBP has (1) policies on security; (2) procedures for incident handling and patch management; and (3) configuration management plans; * used Trusted Agent FISMA [Footnote 36] as a tool to report component data for enterprise management and oversight of the departmentwide information security program; * established a central security group that monitors systems such as the ports of entry‘s regional local-area networks, and CBP‘s wide-area network; * established a security awareness training program. CBP reported a 99 percent security awareness training completion rate for employees and contractors for fiscal year 2006; * implemented a central data repository for its business continuity documents; and; * developed and tested continuity of operations and disaster recovery plans for recovering the production environment at CBP‘s data center which includes the TECS application. DHS also requires its components to implement information security program activities in accordance with FISMA requirements, OMB policies, and applicable NIST guidance. Among other things, FISMA requires agencies to develop, document, and implement: * periodic assessments of the risk and magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information or information systems; * plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate; * periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, performed with a frequency depending on risk, but no less than annually, and that includes testing of management, operational, and technical controls for every system identified in the agency‘s required inventory of major information systems; * a process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in information security policies, procedures, and practices of the agency; [Footnote 37] and * procedures for detecting, reporting, and responding to security incidents. In addition, the E-Government Act of 2002 also requires agencies to conduct privacy impact assessments (PIA) for information systems to (1) ensure the system conforms to applicable legal, regulatory, and policy requirements regarding privacy, (2) determine the risks and effects of collecting, maintaining and disseminating information in identifiable form in an electronic information system, and (3) examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. [Footnote 38] Insofar as protecting personal privacy is an essential element of information security, the privacy impact assessment is an important means by which an agency can identify related risks and needed information security controls. However, CBP did not fully or effectively implement these program activities. We identified risk assessments that did not fully characterize the risks facing critical systems, security plans that did not have updated interconnection security agreements, tests and evaluations of security controls that were inadequate, remedial action plans that lacked required elements, incident detection and handling procedures that had not been adequately implemented, and privacy issues that were not addressed in all cases. Risk Assessment: Identifying and assessing information security risks are essential to determining what controls are required. By increasing awareness of risks, these assessments can generate support for the policies and controls that are adopted. NIST guidelines state that identification of risk for IT systems require keen understanding of the system‘s processing environment, including data and information, system interfaces, system and data criticality, and system and data sensitivity. CBP completed risk assessments for the CBP mainframe and the local area networks within the last 3 years and the risk assessments identify key information such as threat sources, threat actions, risk levels, and business impact as described in NIST guidelines. However, the risk assessments CBP performed for systems supporting the US-VISIT program did not always fully characterize risks to the systems. For example, the risk assessment for TECS was conducted without the benefit of (1) a completed privacy impact assessment and (2) a complete inventory of all interconnections between TECS and other systems. As a result, CBP has less assurance that risks associated with these interconnections have been properly identified and that privacy controls have been implemented to mitigate risks. Security Plans: The purpose of an information system security plan is to provide an overview of the security requirements of the system and describe the controls that are in place or planned for meeting those requirements. According to NIST guidance, security plans should document all interconnected systems and describe the interaction among systems with regard to the authorization for the connection to other systems or the sharing of information. System interconnections, if not appropriately protected, may compromise connected systems and the data they store, process or transmit. DHS policy states that security protections for interconnected systems should be (1) documented in an interconnection security agreement approved and signed by both parties and (2) updated every three years or sooner whenever a significant change occurs to any of the interconnected systems. According to DHS policy, an interconnection security agreement is vital in protecting the confidentiality, integrity, and availability of data processed between interconnected systems. However, 52 of the 57 interconnection security agreements listed in the TECS security plan were not current since they had not been updated within 3 years. Without updated interconnection security agreements, CBP has limited assurance that appropriate security controls have been identified and documented in system security plans. Without current and complete documentation on the interconnection of systems supporting US- VISIT, unintended access may be granted to connecting parties and there is heightened risk of compromise for connected systems and the data they store, process, or transmit. CBP officials have acknowledged that many interconnection security agreements were not current and stated they are in the process of updating the interconnection security agreements. Security Testing: Another key element of an information security program is testing and evaluating system controls to ensure that they are appropriate, effective, and comply with policies. FISMA requires that agencies test and evaluate the information security controls of their major systems, and that the frequency of such tests be based on risk, but occur no less than annually. NIST requires agencies to ensure that the appropriate officials are assigned roles and responsibilities for testing and evaluating controls over systems. According to NIST, the security test results should be documented and that the objectives of testing are to (1) uncover design, implementation, and operational flaws that could allow the violation of security policy; (2) determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy; and (3) assess the degree of consistency between system documentation and its implementation. In addition, DHS has provided guidance to its component agencies on developing system test and evaluation plans, documenting the results, and using an automated tool to capture test requirements and test results. CBP test documentation did describe the vulnerabilities that we found during our audit such as the absence of one major application privacy impact assessment, the lack of the application‘s interconnection security agreements, and patch management problems at ports of entry‘s local-area networks. However, CBP did not adequately test security controls. For example, CBP tests of a major application and the mainframe did not identify or discuss certain vulnerabilities that we identified during our audit. Moreover, its testing did not reveal problems with the mainframe that potentially allowed unauthorized users to read, copy, change, delete, and modify US-VISIT and mainframe data. In addition, although testing requirements were stated in test documentation, the breadth and depth of the test, as well as the results of the test, were not always documented. As a result, without comprehensive tests and evaluations of security controls, CBP has limited assurance that security mechanisms enforce the security policy for systems supporting US-VISIT. CBP officials have acknowledged that there are deficiencies in how it documents, monitors, and reports test findings and stated that they are taking steps to resolve these deficiencies. Remedial Actions: The development and implementation of remedial action plans are key components of an effective information security program. These plans assist agencies in identifying, assessing, prioritizing, and monitoring the progress in correcting security weaknesses that are found in information systems. FISMA states that agencies must develop a process for planning, implementing, evaluating, and documenting remedial actions to address deficiencies in the information security policies, procedures, and practices of the agency. According to OMB guidance, a plan of action and milestones is a tool that identifies tasks that need to be accomplished and is to assist agencies in identifying, assessing, prioritizing, and monitoring the progress of corrective efforts for security weaknesses found in programs and systems. The plan details resources required to accomplish the elements of the plan, any milestones in meeting the task, and scheduled completion dates for those milestones. OMB also states that the resource estimates should include the anticipated source of funding and whether a reallocation of base resources or a request for new funding is anticipated. DHS policy requires, among other things, that (1) all ’significant“ deficiencies be addressed by a remedial action plan; (2) components use the Trusted Agent FISMA tool to identify, track, and manage all IT system weaknesses and associated plans of action and milestones to closure; (3) components identify an action as completed only when a weakness has been fully resolved and the corrective action has been tested and approved; and (4) remedial action plans must identify the necessary resources to correct identified weaknesses. However, CBP did not always address significant deficiencies in a remedial action plan as required by DHS policy. Several of these exceptions resulted in vulnerabilities or exposed US-VISIT information to increased risk of unauthorized disclosure and modification. For example, CBP patch management weaknesses that made workstations supporting US-VISIT vulnerable to attacks were not addressed in a corresponding remedial action plan. In addition, deficiencies found during security testing for the TECS application supporting US-VISIT were also not always entered in the Trusted Agent FISMA database. For example, 13 of the 19 exceptions found during security testing for one major application, were not entered in the Trusted Agent FISMA database. CBP also did not always accurately report the status of remedial actions. Weaknesses that were only partially resolved were sometimes reported as closed on remedial action plans. For example, an Office of Inspector General recommendation that CBP perform penetration testing was marked as ’completed“ in the remedial action plan even though it was not addressed and penetration testing was not performed for a key port of entry application. Furthermore, one application POA&M did not estimate the resources to correct deficiencies. For example, this application‘s POA&M stated that the requirement to authorize interconnections to all systems was funded in a budget but the list of required resources was described as ’$0.“ As a result, without ensuring that remedial action plans meet established requirements, CBP has limited assurance that information system weaknesses affecting systems supporting US-VISIT will be corrected in a timely manner. Incident Detection and Handling: Even strong controls may not block all intrusions and misuse, but organizations can reduce the risks associated with such events if they take steps to promptly detect and respond to them before significant damage is done. In addition, analyzing security incidents allows organizations to gain a better understanding of the threats to their information and the costs of their security-related problems. Such analyses can pinpoint vulnerabilities that need to be eliminated so that they will not be exploited again. Incident reports can be used to provide valuable input for risk assessments, help in prioritizing security improvement efforts, and illustrate risks and related trends for senior management. FISMA requires that agency information security programs include procedures for detecting and reporting security incidents. Furthermore, NIST guidance prescribes network and host-based intrusion detection systems as a means of protecting systems from the threats that come with increasing network connectivity. To ensure effective handling of incidents, DHS policy requires the establishment and maintenance of an incident handling capability that includes preparation, identification, containment, eradication, and recovery. Preparation includes developing policies and procedures, identifying supporting roles and responsibilities, and establishing and implementing tools and processes to ensure timely reporting of security incidents. Identification includes determining the cause of a suspicious event and notification to management. Containment includes mitigating the risks of continuing to operate the affected system by creating backups, keeping incident handlers informed, gathering logs for review and changing passwords. Eradication involves correcting the condition that caused the incident. Recovery involves testing and validating the system before bringing it back into production. CBP has (1) established a Computer Security Incident Response Center which is responsible for investigating, analyzing, documenting, and resolving reported incidents; (2) implemented policies and procedures pertaining to the preparation and identification processes for handling incidents; and (3) described what should be included in interconnection security agreements such as the security policies that will be followed, how incidents will be handled, and audit trail responsibilities for interconnecting organizations. However, CBP did not adequately establish and implement tools and processes to ensure timely detection of security incidents. For example, the CBP data center and the ports of entry have not fully implemented host-based firewalls and intrusion detection systems on their servers and workstations that process US-VISIT information. CBP has not established centralized log collection for all CBP servers supporting US-VISIT. Moreover, CBP does not have fully documented policies and procedures for responding to security incidents. For example, at the time of our review, CBP officials stated that policies and procedures for the containment, eradication, and recovery of incidents were currently under development. As a result, without consistent detection and reporting, CBP cannot be assured that it is detecting and handling incidents in systems supporting US-VISIT in an effective manner. Implementation of Policies Involving Personally Identifiable Information [Footnote 39]: In addition to FISMA, federal agencies are subject to privacy laws aimed at preventing the misuse of personal information. The Privacy Act of 1974 and the privacy provisions of the E-Government Act of 2002 contain the major requirements for the protection of personal privacy by federal agencies. The Privacy Act places limitations on agencies‘ collection, disclosure, and use of personal information maintained in systems of records [Footnote 40] and requires that when agencies establish or make changes to a system of records, they must notify the public by a system of records notice. [Footnote 41] The E-Government Act of 2002 strives to enhance protection for personal information in government information systems or information collections by requiring that agencies conduct privacy impact assessments. These privacy impact assessments include an analysis of how personal information is collected, stored, shared, and managed in a federal system. According to OMB guidance, these privacy impact assessments must analyze and describe how the information will be secured including administrative and technological controls and should be current. [Footnote 42] Further, DHS guidance requires them to describe how shared information is secured by the recipient and how the external system‘s security controls have been addressed to ensure the security of the information once it is shared. One goal of the US-VISIT program is to protect the privacy of our visitors. [Footnote 43] However, privacy documents for systems supporting US-VISIT were not current or complete. For example, DHS officials told us that the TECS system of records notice was out of date. In addition, privacy impact assessments have not been completed for other US-VISIT systems. For example, CBP did not complete assessments for two regional field local- area networks, [Footnote 44] nor was an assessment approved for TECS. [Footnote 45] Without fully developing privacy impact assessments and protecting the confidentiality of personal information in its computer systems through adequate computer security controls, there is a heightened risk that disgruntled employees or malicious users could alter personal information and compromise the confidentiality, integrity, and availability of US-VISIT data, as well as the data of other applications on the mainframe. Conclusions: CBP systems supporting the US-VISIT program were riddled with significant information security control weaknesses that place sensitive information”including personally identifiable information”at increased risk of unauthorized and possibly undetected disclosure and modification, misuse, and destruction, and place program operations at increased risk of disruption. Weaknesses existed in all control areas and computing device types reviewed. Deficiencies in identification and authentication controls, authorization controls, boundary protection measures, physical security, use of cryptography, audit and monitoring practices, segregation of duties, and configuration assurance controls exposed CBP‘s mainframe computer, network infrastructure, servers, and workstations to insider and external threats. While CBP has made important progress in implementing the department‘s information security program, it has not taken all the steps necessary to ensure the confidentiality, integrity, and availability of the information and information systems supporting the US-VISIT program. Consequently, such information may have been disclosed to or modified by unauthorized individuals. These weaknesses require immediate attention. Ensuring that weaknesses affecting CBP‘s computing resources are promptly mitigated and that controls are effective to protect US-VISIT information require senior management support and leadership, disciplined processes, effective coordination between CBP and other government organizations, and consistent oversight. Until DHS and CBP act to mitigate the weaknesses in CBP systems supporting the US-VISIT program and CBP effectively and fully implements its information security program, limited assurance exists that sensitive information will be sufficiently safeguarded against unauthorized disclosure, modification, and destruction, and that the US-VISIT program will achieve its goals. Recommendations for Executive Action: To help the Department effectively and fully implement information security program activities for CBP systems supporting the US-VISIT program, we are recommending that the Secretary of Homeland Security direct the Commissioner, U.S. Customs and Border Protection to: 1. fully characterize risks in risk assessments for systems supporting US-VISIT program; 2. update the interconnection security agreements in the TECS security plan; 3. enhance the procedures and documentation for testing and evaluating the effectiveness of security controls; 4. ensure remedial action plans address all significant security vulnerabilities, accurately report status of remedial actions, and identify necessary resources for completing actions; 5. fully develop and implement policies and tools for the timely detection and handling of security incidents; and 6. update and complete privacy documents for systems supporting the US- VISIT program. In a separate report designated limited official use only, we are making 54 detailed recommendations to the Secretary of Homeland Security to strengthen information security controls over CBP systems supporting the US-VISIT program. Agency Comments: We received written comments on a draft of our report from DHS‘ Director of the Departmental GAO/OIG Liaison Office (these are reprinted in app. I). The director stated that CBP concurs with our six recommendations and that it has already taken a number of steps toward mitigating many of our findings. The director also stated that the department has directed CBP to complete remediation activities to address each of the recommendations. As we agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution of it until 30 days from the date of this letter. We will then send copies of this report to the Secretary of the Department of Homeland Security; the Commissioner of Customs and Border Protection; the Director of the United States Visitor and Immigrant Status Indicator Technology Program; the DHS Inspector General; and other interested congressional committees. We will also make copies available to others on request. In addition, the report will be available at no charge on GAO‘s Web site at [hyperlink, http://www.gao.gov]. If you have any questions regarding this report, please contact Gregory C. Wilshusen at (202) 512-6244 or Keith A. Rhodes at (202) 512-6412. We can also be reached by e-mail at wilshuseng@gao.gov or rhodesk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are acknowledged in appendix II. Signed by: Gregory C. Wilshusen: Director: Information Security Issues: Signed by: Keith A. Rhodes: Chief Technologist: [End of section] Appendix I: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: June 28, 2007: Mr. Gregory C. Wilshusen: Director: Information Security Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Mr. Keith Rhodes: Chief Technologist: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Mr. Wilshusen and Mr. Rhodes: Thank you for the opportunity to review and comment on the U.S. Government Accountability Office's (GAO's) draft report GAO-07-870 entitled Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program. The draft report identified security weaknesses in information security controls for the Customs and Border Protection (CBP) systems supporting the US-VISIT program. CBP has already taken a significant number of steps toward mitigating many of GAO's findings. The weaknesses identified in the GAO report included: I) passwords and access controls; 2) wide-area network (WAN) issues; 3) patches and updates; and 4) local-area networks (LANs). CBP is currently in the process of upgrading its networks, systems and workstations. Once these implementations are completed, many of the GAO findings will be closed. CBP expresses its commitment to making the necessary improvements that have been identified in this draft report and concurs with GAO's six recommendations. The Department has directed CBP to complete remediation activities to address each of the six recommendations. An initial response to the recommendations is provided in an enclosure to this letter. Thank you again for the opportunity to comment on this draft report and we look forward to working with you on future homeland security issues. Sincerely, Signed by: Steven J. Pecinovsky: Director: Departmental GAO/OIG Liaison Office: Enclosure: Response To GAO Recommendations: Recommendation 1: Fully characterize risks in risk assessments for systems supporting US-VISIT program. Response: US-VISIT will review their Risk Assessments (RA) and work with CBP to understand their remediation plans. Should any residual risks remain, CBP and US-VISIT will document for review by the US-VISIT mission owner. Recommendation 2: Update the interconnection security agreements in the Treasury Enforcement Communications System (TECS) security plan. Response: CBP will update the TECS System Security Plan to include all interconnection security agreements. Recommendation 3: Enhance the procedures and documentation for testing and evaluating the effectiveness of security controls. Response: CBP will review its compliance with the Department's policy and procedures for annual testing of 800-53 controls. CBP will additionally review its scan requirements for high impact systems and address compliance monitoring. Recommendation 4: Ensure remedial action plans address all significant security vulnerabilities, accurately report status of remedial actions, and identify necessary resources for completing actions. Response: CBP will review all security vulnerabilities identified in the GAO report to ensure that Plans of Actions and Milestones (POA&M) are opened for each recommendation and remedial actions tracked to completion. Recommendation 5: Fully develop and implement policies and tools for the timely detection and handling of security incidents. Response: CBP will continue to improve its incident detection, incident reporting and incident handling procedures. CBP currently leverages a variety of tools to assist with security incident handling to include intrusion detection systems, anti-virus software. and event correlation systems. Process documentation will be updated to reflect the required improvements. Recommendation 6: Update and complete privacy documents for systems supporting the US-VISIT program. Response: US-VISIT will work with their Privacy Points of Contact (PPOC) to update any US-VISIT privacy impact assessments (Ms) which have not been completed. [End of section] Appendix II: GAO Contacts and Staff Acknowledgments: GAO Contacts: Gregory C. Wilshusen, (202) 512-6244, wilshuseng@gao.gov: Keith A. Rhodes, (202) 512-6412, rhodesk@gao.gov: Staff Acknowledgments: In addition to the individuals named above, William F. Wadsworth; Bruce E. Cain; Jason A. Carroll; Lon C. Chin; West E. Coile; Kirk J. Daubenspeck; Neil J. Doherty; Patrick R. Dugan; Denise E. Fitzpatrick; Edward M. Glagola Jr.; Kory W. Godfrey; Mustafa S. Hassan; David B. Hayes; Kaelin P. Kuhn; Vernetta Y. Marquis; Kevin C. Metcalfe; Jennifer U. Mills; Tammi L. Nguyen; Ronald E. Parker; David F. Plocher; John A. Spence; Henry I. Sutanto; Amos A. Tevelow; and Christopher J. Warweg, made key contributions to this report. [End of section] Footnotes: [1] A port of entry is generally a physical location, such as a pedestrian walkway and/or a vehicle plaza with booths, and associated inspection and administration buildings, at a land border crossing point, or a restricted area inside an airport or seaport, where entry into the country by persons and cargo arriving by air, land, or sea is controlled by U.S. Customs and Border Protection (CBP). [2] FISMA was enacted as title III, E-Government Act of 2002, Pub. L. No. 107-347 (Dec. 17, 2002). [3] Pub. L. No. 104-208 (Sept. 30, 1996), Div. C, sec. 110. [4] Pub. L. No. 106-215 (June 15, 2000), sec. 2(a). [5] Pub. L. No. 107-56 (Oct. 26, 2001), sec. 414. The official title of this act is the United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001. [6] Pub. L. No. 107-71 (Nov. 19, 2001), sec. 115. [7] Pub. L. No. 107-173 (May 14, 2002), sec 302, 303, 401 & 402. [8] Pub. L. No. 107-296 (Nov. 25, 2002). [9] Pub. L. No. 108-458 (Dec. 17, 2004), sec. 7208. [10] GAO, Information Technology: Homeland Security Needs to Improve Entry Exit System Expenditure Planning, GAO-03-563 (Washington, D.C.: June 9, 2003); GAO, Homeland Security: Risks Facing Key Border and Transportation Security Program Need to Be Addressed, GAO-03-1083 (Washington, D.C.: Sept. 19, 2003); GAO, Homeland Security: First Phase of Visitor and Immigration Status Program Operating, but Improvements Needed, GAO-04-586 (Washington, D.C.: May 11, 2004); GAO, Homeland Security: Some Progress Made, but Many Challenges Remain on U.S. Visitor and Immigrant Status Indicator Technology Program, GAO-05-202 (Washington, D.C.: Feb. 23, 2005); and GAO, Homeland Security: Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately Defined and Justified, GAO-07-278 (Washington, D.C.: Feb. 14, 2007). [11] GAO, Homeland Security: Contract Management and Oversight for Visitor and Immigrant Status Program Need to Be Strengthened, GAO-06- 404 (Washington, D.C.: June 9, 2006). [12] GAO, Homeland Security: US-VISIT Has Not Fully Met Expectations and Longstanding Program Management Challenges Need to Be Addressed, GAO-07-499T (Washington, D.C.: February 16, 2007). [13] A ’system of systems“ is a group of interdependent systems that are related or connected to provide a given capability. The loss of any part of the system will degrade the performance or capabilities of the whole. [14] A finger scan is an inkless capture of finger ridge pattern images. [15] Pre-entry refers to processes designed to evaluate a traveler‘s eligibility for required travel documents, enroll travelers in automated inspection programs, and pre-screen travelers entering the U.S. [16] Entry refers to the process of determining a traveler‘s admissibility to the U.S. at air, land, or sea ports of entry. [17] Status management is the process of managing and monitoring the changes and extensions of the visits of lawfully admitted non-immigrant foreign nationals to ensure that they adhere to the terms of their admission and to notify appropriate government entities when they do not. [18] Exit refers to the process of collecting information regarding persons departing the U.S. [19] A class of admission is a specific category to which an alien lawfully enters the United States, following inspection and authorization by an immigration officer. [20] The I-94 form is used to track the arrival and departure of nonimmigrants. It is divided into two parts. The first part is an arrival portion, which includes, for example, the nonimmigrant‘s name, date of birth, and passport number. The second part is a departure portion, which includes the name, date of birth, and country of citizenship. [21] Travelers are processed by US-VISIT at primary and secondary inspection at air and sea ports of entry. At land ports of entry, visitors are only processed by US-VISIT at secondary inspection. [22] Hereafter referred to as ’IBIS.“ [23] Some of these agencies are the Federal Bureau of Investigation, Interpol, Drug Enforcement Administration, Bureau of Alcohol, Tobacco, and Firearms, the Internal Revenue Service, the Coast Guard, the Federal Aviation Administration, the Secret Service, and the Animal Plant Health Inspection Service. Also, information from IBIS is shared with the Department of State for use by Consular Officers at U.S. Embassies and Consulates. [24] In the context of US-VISIT, biometrics consists of digital inkless finger scan images and a digital photograph of the visitor. [25] U.S. consular offices supporting US-VISIT collect biographic information, to include a photo as well as biometrics from the foreign national seeking to enter the United States and send it to the Consular Consolidated Database. [26] The Department of State CCD connects to both TECS and IDENT. CCD collects and sends finger scans to IDENT but does not store them. IDENT is the sole repository for finger scans collected on behalf of the US- VISIT program. [27] However, the ADIS contract is managed by CBP. [28] SEVIS applies to F, J, and M visa nonimmigrants and their dependents only. F visa nonimmigrants are foreign students pursuing a full course of study in a college, university, seminary, conservatory, academic high school, private elementary school, other academic institution, or language training program in the United States that has been approved to enroll foreign students. J nonimmigrants are foreign nationals who have been selected by a sponsor designated by the Department of State to participate in an exchange visitor program in the United States. M nonimmigrants are foreign students who are pursuing a full course of study in a vocational school or other recognized nonacademic institution in the United States that has been certified to enroll foreign students. [29] A local area network is the cabling, hardware, and software used to connect workstations, computers, and file servers located in a confined geographical area (typically within one building or campus). [30] A wide area network is a network that provides data communications to a large number of independent users and spans a large geographical area. [31]The information system owner has overall responsibility for the procurement, development, integration, modification, operation, and maintenance of the information system. [32] Some TECS components do not have a single system owner. For example, CBP officials stated that there is no one system owner for TECS/IBIS; rather it is a shared effort among all agencies that input data into it and use it. [33] Cryptography is the discipline that embodies principles, means, and methods for providing information security, including confidentiality, data integrity, non-repudiation, and authenticity. [34] A certificate authority is a provider that issues and manages security credentials and public keys for message encryption and decryption. As part of a public key infrastructure, a certificate authority checks with a registration authority to verify information provided by the requester of a digital certificate. If the registration authority verifies the requester‘s information, the certificate authority can then issue a certificate. [35] Log management is the process for generating, transmitting, storing, analyzing, and disposing of log data. [36] Trusted Agent FISMA is a DHS enterprise compliance and oversight tool used by CBP and other components to manage the collection and reporting of key information security practices and controls. [37] OMB requires agencies to address remedial actions through plans of action and milestones (POA&M) for all programs and systems where an information technology security weakness has been found. The plan lists the weaknesses and shows estimated resource needs, or other challenges to resolving them, key milestones and completion dates, and the status of corrective actions. [38] OMB Guidance for Implementing the Privacy Provisions of the E- Government Act of 2002, M-03-22, Sept. 26, 2003. [39] Personally identifiable information refers to any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual‘s identity, such as their name, social security number, date and place of birth, or biometric records, and any other personal information which is linked or linkable to an individual. [40] The act describes a ’record“ as any item, collection, or grouping of information about an individual that is maintained by an agency and contains his or her name or another personal identifier. It also identifies ’system of records“ as a group of records under the control of any agency by the name of the individual or by an individual identifier. [41] A system of records notice is a notice in the Federal Register identifying, among other things, the type of data collected, the types of individuals about whom information is collected, the intended ’routine“ uses of data, and procedures that individuals can use to review and correct personal information. [42] According to FY 2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, OMB Memo M-06-20, July 17, 2006, a privacy impact assessment or a system of records notice is current if that document satisfies the applicable requirements and subsequent substantial changes have not been made to the system. [43] GAO, Some Progress Made, but Many Challenges Remain on U.S. Visitor and Immigrant Status Indicator Technology Program, GAO-05-202 (Washington, D.C.: Feb. 2005). [44] CBP conducted an assessment for two of the field local-area networks and said that the local area networks did need privacy impact assessments since personal data was stored in logs; an assessment for another local area network said that no privacy impact assessment was needed because information was not stored on the network, to include audit logs. [45] The lack of a TECS PIA was noted in the TECS risk assessment. The DHS Privacy Office determined that the mainframe on which TECS resides did not need a PIA. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.