recommended reading

Why ICE Scrapped a Homemade Software Upgrade for Its Terrorist Watchlist

Immigration and Customs Enforcement

An impossible requirement to update a clearinghouse of terrorist-tracking data with custom software factored into a decision to halt development last June, a top official at Immigration and Customs Enforcement said on Thursday.

The Treasury Enforcement Communications System is the main Homeland Security Department database that Customs and Border Protection personnel use to screen foreigners against blacklists, and it manages case files for ICE. ICE assignments include money-laundering probes and online pornography investigations, among other things. Offices within CBP and ICE are simultaneously revamping their respective portions of TECS.

Within ICE’s project budget, previously pegged at $818 million, "about $20 million was for code development," ICE Chief Information Officer Thomas Michelli told lawmakers on Thursday during a House subcommittee hearing probing waste on the database modernization.

"We made the decision, after receiving at least one [program], that it was not a sustainable solution and we had to look at other alternatives,” he said. “What we did learn from that is, when we went out to do the market research, that the market has changed and that there are [commercial-off-the-shelf] programs that we could now use.”

Michelli added, "By moving from the custom code development to a commercial-off-the-shelf solution, early estimates in the market research is we could save money over the lifecycle cost estimate of the system." 

Last month, ICE told auditors that it has overhauled system requirements and expects to have a revised cost and schedule appraisal this spring.

Homeland Security estimates that TECS’s licensing and maintenance costs will be $40 million to $60 million in 2015, a Government Accountability Office official testified on Thursday. The project deadline had originally been set for 2015. 

The overload of requirements for the reconstruction reminded lawmakers of another border security effort that squandered $1 billion over more than half a decade before it was abandoned in 2011.  Creating a Secure Border Initiative network, or SBINet, to detect 70 percent of incursions within a given field of coverage and comply with other prerequisites busted budgets and schedules, when real-life technologies couldn’t meet expectations.

"Given the requirements process has been a problem in past DHS failures, and I point specifically to SBINet,  explain to me why CBP and ICE weren't able to get this right this time," asked Rep. Jeff Duncan, R-S.C.,  chairman of the House Homeland Security Subcommittee on Oversight and Management Efficiency.

In response, David Powner, GAO director for information technology management Issues, said that, to its credit, ICE has reached a "75 percent reeducation in requirements. That’s a big change and I’m glad that we’re getting it together now. But a lot of this is coming too late."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.