recommended reading

Why ICE Scrapped a Homemade Software Upgrade for Its Terrorist Watchlist

Immigration and Customs Enforcement

An impossible requirement to update a clearinghouse of terrorist-tracking data with custom software factored into a decision to halt development last June, a top official at Immigration and Customs Enforcement said on Thursday.

The Treasury Enforcement Communications System is the main Homeland Security Department database that Customs and Border Protection personnel use to screen foreigners against blacklists, and it manages case files for ICE. ICE assignments include money-laundering probes and online pornography investigations, among other things. Offices within CBP and ICE are simultaneously revamping their respective portions of TECS.

Within ICE’s project budget, previously pegged at $818 million, "about $20 million was for code development," ICE Chief Information Officer Thomas Michelli told lawmakers on Thursday during a House subcommittee hearing probing waste on the database modernization.

"We made the decision, after receiving at least one [program], that it was not a sustainable solution and we had to look at other alternatives,” he said. “What we did learn from that is, when we went out to do the market research, that the market has changed and that there are [commercial-off-the-shelf] programs that we could now use.”

Michelli added, "By moving from the custom code development to a commercial-off-the-shelf solution, early estimates in the market research is we could save money over the lifecycle cost estimate of the system." 

Last month, ICE told auditors that it has overhauled system requirements and expects to have a revised cost and schedule appraisal this spring.

Homeland Security estimates that TECS’s licensing and maintenance costs will be $40 million to $60 million in 2015, a Government Accountability Office official testified on Thursday. The project deadline had originally been set for 2015. 

The overload of requirements for the reconstruction reminded lawmakers of another border security effort that squandered $1 billion over more than half a decade before it was abandoned in 2011.  Creating a Secure Border Initiative network, or SBINet, to detect 70 percent of incursions within a given field of coverage and comply with other prerequisites busted budgets and schedules, when real-life technologies couldn’t meet expectations.

"Given the requirements process has been a problem in past DHS failures, and I point specifically to SBINet,  explain to me why CBP and ICE weren't able to get this right this time," asked Rep. Jeff Duncan, R-S.C.,  chairman of the House Homeland Security Subcommittee on Oversight and Management Efficiency.

In response, David Powner, GAO director for information technology management Issues, said that, to its credit, ICE has reached a "75 percent reeducation in requirements. That’s a big change and I’m glad that we’re getting it together now. But a lot of this is coming too late."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.