recommended reading

U.S. border agents to snag drug-smuggling jets with Canadian military radar

The Homeland Security Department this fall plans to employ military-grade radar feeds from Canada to spot low-altitude aircraft smuggling drugs, but officials have not stationed any license-plate cameras to catch vehicles carrying the cash that funds such illicit flights.

While drug trafficking is more prevalent along the southern border than the U.S.-Canadian border, the narcotics trade often goes undetected on the northern border, according to recent reports by federal auditors. Responding to congressional concerns, Alan Bersin, the top official at Homeland Security's Customs and Border Protection, said on Tuesday, "We expect that 22 Canadian radar feeds will be sent to the [CBP's] Air and Marine Operations Center by the third quarter, November 2011."

It's hard to measure the extent of illegal cross-border activity because northern drug runners often transport their cargo on low-flying planes that CBP technology cannot see, Government Accountability Office auditors reported in December 2010. In 2008, Border Protection agents in Spokane, Wash., an entry point popular among high-potency marijuana dealers, borrowed Pentagon radar equipment for a month to gain greater visibility into the region's wild terrain. The experiment pinpointed significantly more aircraft than the number of planes normally identified in a given year.

"We've had a major problem on the northern border with the smuggling of drugs -- methamphetamines and ecstasy as well as marijuana -- and these drugs are smuggled into the country using low-flying planes," Sen. Chuck Schumer, D-N.Y., told Bersin during a Judiciary Immigration, Refugees and Border Security Subcommittee hearing where the CBP commissioner was invited to discuss northern border security. In February, Schumer urged Homeland Security Secretary Janet Napolitano to permanently deploy military radar for counternarcotics operations; he said he welcomed the November start date.

However, Homeland Security has not made any headway in setting up computerized cameras along the northern border to flag cars funneling the dollars and guns that fuel the drug trade.

"If we can find a way to stop the money, then we can go a long way to defeating the cartels," said Sen. John Cornyn, R-Texas. Citing March GAO statistics, he added, "ATF officers at the U.S.-Mexico border have indicated that one of their challenges in intercepting illegal firearms heading south is the ability to provide vehicle information to CBP officers on a timely basis."

Currently, license plate readers are attached to only 48 of the 118 outbound lanes on the southwest border, according to the auditors. "And none has been installed -- none -- on the 179 outbound lanes on the northern border," Cornyn noted.

Bersin acknowledged CBP has more work to do. "I cannot give you a definite date on which we will have all lanes completed with regard to [license plate readers]," he said.

Federal officials are trying not to slow legitimate traffic along the U.S.-Canadian border, which facilitates trade valued at more than $1 billion a day, Bersin said.

"Building up a competitive United States economy in concert with Canada, so that North America can compete with East Asia, with the Indian subcontinent and with Brazil and South America is a critical dimension of our work," he said. "We recognize that security and economic competitiveness go hand in hand."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.