DHS Nixes Use of RFID In Border Security Program
Technology's performance, accuracy found lacking
The Department of Homeland Security is abandoning plans to use radio frequency identification (RFID) technology in a key part of its border security system after it failed to work as expected in a 15-month test.
A spokeswoman for the DHS border security program said the agency is now "exploring alternatives," such as biometric technologies, for tracking foreign visitors as they pass through checkpoints entering and exiting the U.S.
The agency tested the technology in an effort to improve its U.S. Visitor and Immigration Status Indicator Technology (US-VISIT) program, created by Congress in Jan., 2004 to track foreign nationals within the United States. The US-VISIT spokeswoman said the agency hoped to use RFID technology to automate and speed up the process of getting an accurate record of who left the country.
A testing period from Aug., 2005 to last November found the technology wanting for multiple reasons, DHS officials said. DHS Secretary Michael Chertoff disclosed the failure of the technology on Feb. 9 in testimony to the Homeland Security Committee of the U.S. House of Representatives.
In his testimony, Chertoff cited a Government Accountability Office (GAO) report, released on Jan. 31, that also found the RFID test to be a failure due to performance and reliability problems.
The agency tested the technology at five entry points on the borders of Mexico and Canada. RFID tags were added to I-94 immigration documents, which show an immigrant's country of origin and legal status in the U.S., and were to be read at the selected checkpoints. For the test, the tags were added to the documents of some 200,000 immigrants who entered the country at checkpoints near the five test sites, the spokeswoman said.
The RFID tagged documents were to be scanned as the visitor passed through a border crossing, and his or her exit from the country were recorded in a DHS database.
The GAO report found that during a one week period at one test site, only 14% of 166 RFID tags that crossed the border were read by scanners. The DHS had set a goal for the test of reading 70% of tagged documents crossing the border.
The GAO report also noted that even if RFID tags were read as they crossed the border, the DHS had no way to prove that the person carrying the document was the one to whom it was issued.
Rod McDonald, CIO of DHS Customs and Border Protection unit, said the agency had hoped the test would determine that chips stored in vehicles traveling at 40 miles per hour would be read.
"Unfortunately, the pilot was unsuccessful at reaching a reasonable read rate and for us to verify the exits," he said. "We're still interested in RFID, but just in that specific pilot we have to look for some alternative."
The US-VISIT spokeswoman said the agency is working closely with government and private-sector partners to deploy alternative, more viable, technology for the project. No schedule has been set for selecting the technology, she said.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts