recommended reading

DHS yanks deal to use license plate database to track illegal immigrants

Katrina Brown/Shutterstock.com

The Homeland Security Department has halted today's planned purchase of a geo-tracking service that displays captured images of license plates to hunt for runaway illegal immigrants, DHS officials said.
 
Initially, on July 5, Immigration and Customs Enforcement, an arm of DHS, announced a deal with Vigilant Video to access a repository of more than 685 million tags after the agency's Google search and an inquiry to the General Services Administration turned up no competitors. But another vendor has come forward claiming to sell the same vehicle-tracking features, ICE officials said Tuesday. The agency did not disclose the name of the new company.
 
“Currently, the contract in question has not been awarded, as ICE is continuing to evaluate the capabilities of multiple vendors to provide this service,” ICE spokeswoman Danielle Bennett said in a statement. “ICE is focused on smart and effective immigration enforcement, which prioritizes the removal of convicted criminal aliens, threats to national security, recent border crossers, illegal re-entrants and immigration fugitives.”
 
Agency officials said they expect to finish assessing the newcomer’s offering within the next few weeks. Bennett said of the Vigilant Video monitoring program, “ICE is currently looking into the benefits of utilizing a widely-used mobile law enforcement database tool, which would allow officers to identify the whereabouts of  vehicles registered in the system, in order to better locate and apprehend at-large convicted criminal aliens."
 
Only the agency’s Dallas field office had requested the surveillance tool, called the National Vehicle Location Service, so it is not yet known whether other regions will make use of either technology. Other ICE offices are testing the concepts, officials later said. Under the $24,592 five-year agreement, the Vigilant Video application would be accessible via cellphone. ICE has not decided whether it will use the phone functionality, officials said on Tuesday. 

This story was updated to describe the potential scope of the technology deployment. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.