recommended reading

Virtual border fence contract postponed due to fierce competition

Guillermo Arias/AP

A digital border security project slated to replace an aborted $1.5 billion system has been delayed by unexpected competition from vendors that want the work.

Customs and Border Protection had planned on a Jan. 1, 2013, deadline for selecting a contractor to revamp the now-abandoned Secure Border Initiative network. But a flood of submissions has left CBP pressed for time. The agency now expects to sign an eight and a half year deal by Oct. 1, 2013, which would mean a 2022 completion date.

When asked about the status of the contract this week, CBP officials said the job has not been assigned yet and referred to an October industry notice describing a new procurement timeline.

The agency is choosing from an unspecified “larger number of proposals than originally estimated,” and “the quantity of proposals will extend the schedule to complete the evaluation process,” the update stated.

The review is not just a matter of analyzing paperwork or inspecting equipment. Applicants judged to be “within the competitive range” must operate, in front of government eyes, production-line-ready technology that remains functioning under harsh desert conditions, according to contracting documents. Those presentations are scheduled to occur between January and April 1, 2013, the October notice stated.

The Homeland Security Department in 2011 canceled Boeing Co.’s SBInet contract after planners determined the demands of the system were unattainable and excessive. CBP began accepting applications for the new initiative in April.

The technology companies are vying to dot border areas with sets of camera-flanked surveillance towers suited to each region’s terrain. SBInet would have blanketed the Southwest with costlier, one-size-fits-all towers all networked together, and sporting radar and other sophisticated technology.

This second try will start in Nogales, Ariz., and then expand within the state to at most five tower clusters in Sonoita, Douglas, Casa Grande, Ajo and Wellton.

The system requirements no longer call for radar, which is futile in heavily trafficked towns, or the need to detect 70 percent of incursions within a given coverage area.

"We're starting with what is readily available," Mark Borkowski, assistant commissioner for CBP's Office of Technology Innovation and Acquisition, said in April.  "Industry has got to prove it to us it's readily available."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.