recommended reading

Homeland Security revises border security strategy

Gregory Bull/AP file photo

The Homeland Security Department is shifting away from a strategy of deploying more guards and technology to control U.S. borders to using intelligence to target areas of the border that present the greatest threats, a top department official said Tuesday. In addition, DHS is changing the way it measures the effectiveness of that plan.

Department officials won’t be able to assess the new strategy’s success until 2013, Border Patrol Chief Michael Fisher said Tuesday at a hearing before a House Homeland Security Committee’s border security panel.

DHS officials have long considered apprehensions, such as captures and arrests, a measure of success, but going forward, they also will consider additional factors such as community well-being and the number of repeat offenders crossing the border illegally. To achieve the highest levels of security under the new strategy, department officials will no longer deploy surveillance technology and drones evenly along U.S. borders, but instead will station more of those tools in areas of greatest risk, as determined by intelligence.

The benchmarks for success under the old plan -- the 2004 National Border Patrol Strategy -- included certain levels of “operational control,” which was defined by the amount of technology and personnel in place to stop illegal activity. But the term was not widely understood or applied consistently. In 2010, DHS reported achieving operational control of 1,107 miles of the 8,607 miles of northern, southwest and coastal borders, but an audit by the Government Accountability Office found the northern and coastal borders were especially vulnerable because of limited resources and poor access.

“Everyone had a different understanding of what operational control was,” Fisher told lawmakers.

In 2010, Homeland Security abandoned operational control as a performance metric and instead opted to gauge security based on the number of illegal border-crossers taken into custody. But studies have shown the number of apprehensions does not correlate to the effectiveness of homeland security because officials did not compare those statistics to crime rates along the border.

Although apprehensions along the southwest border have dropped 53 percent since 2008, Fisher acknowledged the limits of such data without context. “We’re taking a look at those apprehensions only as a starting point” to look at other dynamics, such as recidivism, and “not just look at whether apprehensions went up or down,” Fisher said. “Apprehensions in and of themselves don’t tell us anything about the extent to which we’re being successful and or levels of border security,” he added.

He noted seizures of money, drugs and weapons have increased recently. From 2009 through 2011, the department confiscated 74 percent more currency, 41 percent more drugs and 159 percent more weapons than it did from 2006 through 2008.

Government analysts at Tuesday’s hearing were optimistic the new benchmarks will be more relevant, but said it is too early to tell because they have not been used yet.

The “move more toward outcome-oriented measures” will help DHS gain a sense of how effective the Border Patrol is, said Rebecca Gambler, GAO’s acting director of homeland security and justice issues.

Marc R. Rosenblum, a specialist in immigration policy at the Congressional Research Service, said tallying unique apprehensions should offer more insight into the problem of repeat offenders.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.