recommended reading

DHS leaks possible trade secrets on Southwest border project

Homeland Security Department officials accidentally released information that may have contained proprietary contractor data related to a Southwest border video surveillance project, prompting officials to delete online documents and block a website.

DHS officials did not state whose confidential information was exposed. Boeing Co. is the incumbent contractor on the department's now-defunct virtual fence in the same region. The company also operates the northern border's video surveillance project.

After issuing a solicitation for bids on a remote video surveillance system, or RVSS, Customs and Border Protection officials in March discovered that certain specifications posted online to help prospective vendors may have included corporate proprietary information, according to the contracting website The data in question was in a password-protected reading room accessible only to authorized vendors on a need-to-know basis and that had signed nondisclosure agreements.

"CBP has been notified that a document posted to the CBP RVSS Virtual Reading Room may contain information considered to be commercial/trade secret information," the alert states. "CBP has also identified one other document that contains similar information. In order to withdraw access to those two documents, CBP has withdrawn access to the entire reading room posted at"

The problematic documents, named 80' Monopole Dwgs.pdf and 80 Foot Monopole Spec's V1.0.pdf, apparently showed contractors' drawings and specs for monopole communications towers.

The video surveillance equipment is part of a larger DHS initiative to replace the $1 billion flawed virtual fence with proven weather-resistant technologies that already are on the market. Boeing supplied towers and other structures for the botched Secure Border Initiative network, or SBInet, and now provides CBP with a remote video surveillance system along the northern border.

The March CBP notice requested that everyone who has viewed the files "immediately delete and/or destroy any copies of those documents" and inform contract specialists after they have done so. CBP already has a list of everyone who accessed the files, so the agency also will be contacting individuals directly and asking them to confirm, in writing, that they have trashed the documents.

On Wednesday, CBP officials announced they had reopened the reading room after moving it to a different Web address.

It is unclear whether CBP's leak may have placed any companies at a competitive disadvantage, or will spark contract protests. Agency officials on Thursday said a tower manufacturer notified the agency that it believed a proprietary drawing of its tower was in the reading room. "CBP is reviewing the assertion that the material is proprietary," spokeswoman Jenny Burke said. "In the meantime, out of an abundance of caution, CBP has removed the questionable drawing."

She added, "The procurement under discussion is for cameras to attach to a tower and not for the towers themselves, so we do not expect the tower drawing information to impact competitive advantage in any way."

Boeing officials said they have no comment at this time.

In early March, shortly after the agency published an initial request for proposals, Boeing signaled its intent to compete for the new Southwest work.

"Boeing is proud of its role as the prime contractor to provide critical video surveillance capabilities along the U.S. northern border for Customs and Border Protection agents," the company said in a March 2 statement. "Our expertise and understanding of lessons learned delivering effective border-security capabilities -- often under extreme environmental conditions -- gives us confidence we can continue to deliver a cost-effective, commercial-off-the-shelf solution that will satisfy our customer's enduring need for the detection, tracking, identification and classification of illegal entries."

The video surveillance system is intended to let Border Patrol agents observe illicit activity across wide areas of the Arizona border and potentially at Texas locations, according to the solicitation. A draft work request stated that the "procurement is one element of a broader CBP strategy to rapidly acquire nondevelopmental (and ideally, commercially available,) systems to support border protection efforts."

CBP officials simultaneously are preparing to award a separate contract for rugged stationary towers in Arizona that would be available from military or industrial production lines immediately.

Threatwatch Alert

Accidentally leaked credentials / Misplaced data

Boeing Employee Emails 36,000 Coworkers’ Personal Info to Spouse

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.