• STEM educationDHS seeking faculty, students for summer 2016 research programs

    The U.S. Department of Homeland Security (DHS) is seeking faculty, undergraduate, and graduate students interested in participating in one of its 10-week programs in summer 2016, including its Summer Research Team Program for Minority Serving Institutions and its Homeland Security — Science, Technology, Engineering and Mathematics (HS-STEM) Summer Internship Program. The deadlines for applying for both programs occur in December 2015.

  • SurveillanceIRS employed cellphone-surveillance technology

    The IRS spent $65,652 on surveillance technology which tracks people by capturing their cellphone calls through StingRays – devices which mimic legitimate cell towers. The devices are also known as IMSI-catchers or cell-tower simulators. In addition to locating cellphone users, StingRays also use the signals to identify the owner of the phone, and may also be able to capture the phone owner’s contacts, messages, and other content off the phone. More than a dozen federal agencies, and local police in twenty-two states, have also employed the technology.

  • Domestic terrorismJustice Department created new office to focus on domestic terrorists

    The Justice Department said this week that it has created a new office which would on homegrown extremists. Assistant Attorney General John P. Carlin announced the move on Wednesday. He said the new office, the Domestic Terrorism Counsel, will be the main point of contact for federal prosecutors working on domestic terrorism cases. Carlin said the new office was created “in recognition of a growing number of potential domestic terrorism matters around the United States.” Following the 9/11 attacks, U.S. law enforcement had shifted its attention, and the allocation of law enforcement and intelligence resources, from domestic to foreign terrorism. The result, security experts say, was that federal authorities had lost sight of domestic extremists. “Looking back over the past few years, it is clear that domestic terrorists and homegrown violent extremists remain a real and present danger to the United States. We recognize that, over the past few years, more people have died in this country in attacks by domestic extremists than in attacks associated with international terrorist groups,” Carlin said.

  • Risk analysisExperts are often fallible, so expert advice should be examined carefully

    Evidence shows that experts are frequently fallible, say leading risk researchers, and policy makers should not act on expert advice without using rigorous methods that balance subjective distortions inherent in expert estimates. Many governments aspire to evidence-based policy, but the researchers say the evidence on experts themselves actually shows that they are highly susceptible to “subjective influences” — from individual values and mood, to whether they stand to gain or lose from a decision — and, while highly credible, experts often vastly overestimate their objectivity and the reliability of peers. 

  • CBPHow many times does CBP’s Mark Borkowski get to fail?

    By Robert Lee Maril

    Once again Mark Borkowski has testified before Congress in recent months, detailing the status of the Arizona Technology Plan, or what he calls the “Plan.” According to Borkowski’s testimony, new border wall surveillance infrastructure and technology are already failing to meet management deadlines; he also acknowledges a highly critical GAO report on the status of his newest border security plan. The Plan is the lynchpin of the Southern Border and Approaches Campaign – previously called the Secure Border Initiative Network (SBInet). SBInet never worked and fell hopelessly behind schedule, and in 2011 DHS Secretary Janet Napolitano pulled the plug on it. SBInet was preceded by other costly border-security technology failure – for example, the Intelligent Computer-Aided Detection system (ICAD11 and ICAD 111), the Integrated Surveillance Intelligence System (ISIS), the American Shield Initiative (ASI),the Secure Border Initiative Tactical Initiative (SBI TI), and Project 28. Despite these failures, the CBP has not constructed a reasonable way in which to measure the success or failure of its new $1 billion dollar Plan. How many times does CBP’s Borkowski get to fail?

  • CBPMore significant CBP leadership changes: Possible reorganization

    By Robert Lee Maril

    Recently rocked by the largest scandal in its history, Customs and Border Protection (CBP) appears to be making significant personnel changes in recent months. There are also rumors of a major agency reorganization, rumors which have not been denied by agency leadership. Presumably such changes at CBP would be grounded in and address James F. Tomsheck’s allegations which find support in a number of government reports about significant problems at CBP. These institutional problems include increased employee violence, graft, and corruption as well as an institutional failure at CBP IA to investigate charges against its own employees.

  • view counter
  • CybersecurityEinstein 3 Accelerated (E3A) deployment gets a push forward

    The two recent network breaches at the Office of Personnel Management (OPM), which allowed the pilfering of sensitive personal information of millions of federal employees, their families, clearance applicants, and contractors, has drawn attention to the Department of Homeland Security’s $3 billion network monitoring program called Einstein. The question now is whether that program is the capable of preventing another intrusion in the future.

  • Capitol securityD.C. security gaps exposed by gyrocopter landing on Capitol grounds: Senate panel

    A Senate committee has concluded that the Florida man who flew a one-man gyrocopter and landed it on the U.S. Capitol grounds, had exposed security gaps and inadequate coordination among the agencies charged with protecting the Capitol, the White House, and other Washington landmarks. In addition to calling for better coordination among the different agencies responsible for securing important sites in Washington, D.C., the committee strongly recommends seeking new “technological solutions” to spot similar flights in the future, suggesting that Congress should also consider increasing penalties for those who breach the restricted airspace.

  • ImmigrationCBP violated rules in deporting thousands of unaccompanied children

    A U.S. Government Accountability Office (GAO) audit says U.S. Border Patrol agents were in violation of agency rules when, between 2009 and 2014, they deported thousands of unaccompanied immigrant children. The GAO said that Customs and Border Protection (CBP) repatriated 93 percent of unaccompanied children under age 14 from Mexico and Canada – and did so without documenting what procedures they followed to ascertain that the children would be safe when they return to their home countries.

  • AmmoQuestions arise over ammunition purchases at Hoover Dam

    Periodically, questions arise regarding the amount of ammunition purchased by the federal government’s non-military agencies. One must take into account the nature of an agency’s mission and the number of armed personnel included in its ranks. Factor in the number of rounds expended in training and practice, and it becomes clear that the large ammunition purchases make sense. One such instanced surfaced late last week, when it was disclosed that the federal Bureau of Reclamation has requested a purchase of 52,000 rounds of ammunition for law enforcement personnel at Hoover Dam and Lake Mead.

  • Counterterrorism grantsNew York state, city officials mismanaged millions in anti-terror grants: DHS IG

    A new report from DHS Inspector General found that New York City and the state of New York have mismanaged millions of dollars in federal grants meant to help improve homeland security. DHS IG found that New York officials spent nearly 10 percent – or $67 million of the $725 million granted during three years by the Federal Emergency Management Administration (FEMA) — on questionable costs not in line with homeland security goals or strategies.

  • CBPViolence and corruption scandal at CBP: FBI clean up or cover up? Pt. 6

    By Robert Lee Maril

    It has been more than a year since James F. Tomsheck, the senior executive at Customs and Border Protection Internal Affairs (CBP IA), was unceremoniously reassigned to a new position at CBP. In response to his demotion from assistant commissioner at CBP IA, Tomsheck lambasted CBP leadership with charges of rampant mismanagement and accused CBP employees of widespread violence and corruption. Have these systemic problems within the largest federal law enforcement agency in the land been resolved, or have the FBI, CBP, and DHS senior leadership chosen to ignore these problems? Is there reasonable public accountability for the alleged criminal behavior at CBP and CBP IA, or are the alleged victims — all the honest, hardworking CBP employees, and the general public — still in the dark about both the hard facts and the consequences of this unprecedented scandal? In short, has there been a clean-up or a cover up?

  • CBPCBP IA eliminates Tomsheck’s integrity program division

    Customs and Border Protection Internal Affairs (CBP IA) created a new division named the Threat Mitigation Division (TMD). According to an internal document, this new division — officially launched on 13 April — merges the Integrity Program Division (IPD) with the Counterintelligence and Operations Liaison Group (CIOLG).The stated mission of the new Threat Mitigation Division at CBP IA is, “To identify internal and external threats to CBP’s mission, information and people, and to develop and implement strategies to mitigate the identified threat.”

  • CybersecurityEfforts to improve cyber information sharing between the private sector, government

    Lately, Obama administration officials having been venturing West to encourage tech firms to support the government’s efforts to improve cyber information sharing between the private sector and government agencies. The House of Representatives last week passed two bills to advance such effort. The Protecting Cyber Networks Act and the National Cybersecurity Protection Advancement Act of 2015 authorize private firms to share threat data such as malware signatures, Internet protocol addresses, and domain names with other companies and the federal government. To the liking of the private sector, both bills offer companies liability protection for participating in cyberthreat information sharing.

  • CBPCBP IA Operation Hometown reduces violence and corruption: Tomsheck shuts it down -- Pt. 5

    By Robert Lee Maril

    Operation Hometown appears to be yet another example in a series of programs at Customs and Border Protection (CBP) demonstrating blatant dysfunctionality and mismanagement within the Department of Homeland Security. Meticulously designed to target border violence and corruption among CBP employees, Operation Hometown was labeled a success in reaching its stated objectives. CBP Internal Affair’s (IA) James F. Tomsheck,however, shut the program down. As Congress and President Obama debate various aspects of a new federal immigration policy,few politicians are willing to acknowledge the serious problems at CBP Internal Affairs – but they should, as these problems may directly impact the success of any or all new immigration reforms.