JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Monospaced Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2004

CYBER-SOCIETY-LIVE 2004

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: U.S. Nearing Deal on Way to Track Foreign Visitors

From:

J Armitage <[log in to unmask]>

Reply-To:

Interdisciplinary academic study of Cyber Society <[log in to unmask]>

Date:

Mon, 24 May 2004 12:40:26 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (142 lines)

May 24, 2004
U.S. Nearing Deal on Way to Track Foreign Visitors
By ERIC LICHTBLAU and JOHN MARKOFF
http://www.nytimes.com/2004/05/24/politics/24VISI.html?th
THE NEW YORK TIMES
WASHINGTON, May 22 - The Department of Homeland Security is on the verge of
awarding the biggest contract in its young history for an elaborate system
that could cost as much as $15 billion and employ a network of databases to
track visitors to the United States long before they arrive.
The contract, which will probably be awarded in coming days to one of three
final bidders, is already generating considerable interest as federal
officials try to improve significantly their ability to monitor those who
enter at more than 300 border-crossing checkpoints by land, sea and air,
where they are going and whether they pose a terrorist threat.
But with that interest have come questions - both logistical and
philosophical - from Congressional investigators and outside experts. Will a
company based outside the United States, in Bermuda, get the megacontract?
How much will it end up costing? What about the privacy concerns of foreign
visitors? And most critical, for all the high-end concepts and higher
expectations, can the system really work?
Interviews with government officials, experts and the three companies vying
for the contract - Accenture, Computer Sciences and Lockheed Martin - reveal
new details and potential complications about a project that all agree is
daunting in its complexity, cost and national security importance.
The program, known as US-Visit and rooted partly in a Pentagon concept
developed after the terrorist attacks of 2001, seeks to supplant the
nation's physical borders with what officials call virtual borders. Such
borders employ networks of computer databases and biometric sensors for
identification at sites abroad where people seek visas to the United States.
With a virtual border in place, the actual border guard will become the last
point of defense, rather than the first, because each visitor will have
already been screened using a global web of databases.
Visitors arriving at checkpoints, including those at the Mexican and
Canadian borders, will face "real-time identification" - instantaneous
authentication to confirm that they are who they say they are. American
officials will, at least in theory, be able to track them inside the United
States and determine if they leave the country on time.
Officials say they will be able, for instance, to determine whether a
visitor who overstays a visa has come in contact with the police, but
privacy advocates say they worry that the new system could give the federal
government far broader power to monitor the whereabouts of visitors by
tapping into credit card information or similar databases. The system would
tie together about 20 federal databases with information on the more than
300 million foreign visitors each year.
The bidders agree that the Department of Homeland Security has given them
unusually wide latitude in determining the best strategy for securing
American borders without unduly encumbering tourism and commerce.
Whoever wins the contract will be asked to develop a standard for
identifying visitors using a variety of possible tools - from photographs
and fingerprints, already used at some airports on a limited basis since
January, to techniques like iris scanning, facial recognition and
radio-frequency chips for reading passports or identifying vehicles.
"Each of these technologies have strengths and weaknesses," Paul Cofoni,
president of Computer Sciences' federal sector, said of the biometric
alternatives. "I don't know that any one will be used exclusively."
Virtual borders is a high-concept plan, building on ideas that have been
tried since the terrorist attacks of 2001.
But homeland security officials say making the system work on a practical
level is integral to protecting the United States from terrorist attacks in
the decades to come. "This is hugely important for the security of our
country and for the wise use of our limited resources," Asa Hutchinson,
under secretary for border security, said in an interview. "We're talking
here about a comprehensive approach to border security."
But the General Accounting Office, the investigative arm of Congress,
concluded in a report in September that "the program is a very risky
endeavor," given its enormous scope and complexity. "The missed entry of one
person who poses a threat to the United States could have severe
consequences," the report said.
An update issued by the accounting office earlier this month found that
while homeland security officials had made some headway in meeting
investigators' concerns about management and oversight problems, the
progress "has been slow." The update said major questions remained about the
project's cost and viability. "I don't think there's any less concern
today," Randolph Hite, who wrote the reports, said in an interview.
"This program is going to get more and more complex as time goes on, and you
can't count on human heroes bailing you out to ensure that the system
works," Mr. Hite said. With the program to be phased in over a decade, he
said, "the question you have to ask is: What value are we getting for these
initial increments, and is it worth it?"
Indeed, the costs are enormous, and Congressional investigators said they
did not believe officials had a clear handle on the financing. The bid
request set a maximum of $10 billion, but the accounting office found that
some of the cost estimates were outdated and the final price tag - when
financing from agencies like the State Department is considered - could
reach $15 billion by 2014.
The idea of virtual borders originated in 2002 with a group of researchers
at the National Defense University's Center for Technology and National
Security Policy. The group, led by Hans Binnendijk, the center's director,
was trying to find new ways to secure the nation's shipping containers.
"We got interested in this soon after 9/11 as a fairly obvious problem," he
said.
The group wrote an article discussing the need to inspect cargo long before
it arrived in United States harbors. They then briefed a range of government
agencies.
The virtual border is similar to the idea of an air traffic control center,
officials note. In this case, the system would allow homeland security
officials to monitor travel on a national level, shifting resources and
responding as necessary.
The air traffic control analogy is significant in part because Computer
Sciences and Lockheed Martin have traditionally been the nation's two
largest contractors for the Federal Aviation Agency in the development and
maintenance of the nation's air traffic control system.
The air traffic control parallel worries some executives. More than $500
million and 15 years were squandered on the effort to modernize the nation's
aging air traffic system beginning in the late 1980's and a prime contractor
was I.B.M.'s Federal Systems Division, now part of Lockheed Martin.
Another problem the system faces is the potential inability to get access to
all needed data from foreign countries and from the United States' own
intelligence community. Experts agree that no matter how good the
technology, the system will rely on timely and accurate information about
the histories and profiles of those entering the country to detect possible
terrorists. It will have no direct impact on illegal immigrants.
The system will lead to a broad interconnection of federal databases,
ranging from intelligence to law enforcement as well as routine commercial
data.
Officials say they will work to ensure that the privacy of foreigners is
protected and that the system will not be used to profile travelers, but
civil libertarians say they are nonetheless alarmed that databases could be
used to monitor both foreign visitors and American citizens, and they have
already challenged it in court.
Yet another issue irking some lawmakers is the fact that Accenture is
incorporated in Bermuda.
"I don't want to see the Department of Homeland Security outsourcing its
business to a Bermudan company," said Representative Lloyd Doggett, a Texas
Democrat who has pushed to close a loophole allowing foreign bidders on
federal contracts.
Federal officials say they are satisfied that Accenture, which has about
25,000 employees in the United States and less than a dozen in Bermuda,
meets the definition of a United States company and is eligible for the
contract.
Accenture, for its part, sees the issue as irrelevant.
Jim McAvoy, an Accenture spokesman, said, "The real question is: Should the
federal government be forced to select an inferior bid because the bidder is
incorporated in the U.S.?"

************************************************************************************
Distributed through Cyber-Society-Live [CSL]: CSL is a moderated discussion
list made up of people who are interested in the interdisciplinary academic
study of Cyber Society in all its manifestations.To join the list please visit:
http://www.jiscmail.ac.uk/lists/cyber-society-live.html
*************************************************************************************

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager