DHS Nixes Use of RFID In Border Security Program
Technology's performance, accuracy found lacking
The Department of Homeland Security is abandoning plans to use radio frequency identification (RFID) technology in a key part of its border security system after it failed to work as expected in a 15-month test.
A spokeswoman for the DHS border security program said the agency is now "exploring alternatives," such as biometric technologies, for tracking foreign visitors as they pass through checkpoints entering and exiting the U.S.
The agency tested the technology in an effort to improve its U.S. Visitor and Immigration Status Indicator Technology (US-VISIT) program, created by Congress in Jan., 2004 to track foreign nationals within the United States. The US-VISIT spokeswoman said the agency hoped to use RFID technology to automate and speed up the process of getting an accurate record of who left the country.
A testing period from Aug., 2005 to last November found the technology wanting for multiple reasons, DHS officials said. DHS Secretary Michael Chertoff disclosed the failure of the technology on Feb. 9 in testimony to the Homeland Security Committee of the U.S. House of Representatives.
In his testimony, Chertoff cited a Government Accountability Office (GAO) report, released on Jan. 31, that also found the RFID test to be a failure due to performance and reliability problems.
The agency tested the technology at five entry points on the borders of Mexico and Canada. RFID tags were added to I-94 immigration documents, which show an immigrant's country of origin and legal status in the U.S., and were to be read at the selected checkpoints. For the test, the tags were added to the documents of some 200,000 immigrants who entered the country at checkpoints near the five test sites, the spokeswoman said.
The RFID tagged documents were to be scanned as the visitor passed through a border crossing, and his or her exit from the country were recorded in a DHS database.
The GAO report found that during a one week period at one test site, only 14% of 166 RFID tags that crossed the border were read by scanners. The DHS had set a goal for the test of reading 70% of tagged documents crossing the border.
The GAO report also noted that even if RFID tags were read as they crossed the border, the DHS had no way to prove that the person carrying the document was the one to whom it was issued.
Rod McDonald, CIO of DHS Customs and Border Protection unit, said the agency had hoped the test would determine that chips stored in vehicles traveling at 40 miles per hour would be read.
"Unfortunately, the pilot was unsuccessful at reaching a reasonable read rate and for us to verify the exits," he said. "We're still interested in RFID, but just in that specific pilot we have to look for some alternative."
The US-VISIT spokeswoman said the agency is working closely with government and private-sector partners to deploy alternative, more viable, technology for the project. No schedule has been set for selecting the technology, she said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts