New technology drives changes in border policy

The infrastructure at border crossings and other points of entry to the United States will look completely different in the next few years, driven in part by new technologies, a senior Homeland Security Department official said on Wednesday.

"We're halfway through restructuring our border policy," said Stewart Verdery, assistant secretary for policy and planning at Homeland Security's directorate on border and transportation security. "In a couple of years, [crossing the border] is going to be a hell of a lot different than it is today." Verdery made the comments after a speech to the Heritage Foundation.

But changes may not happen as quickly as Congress and some others want. Verdery said only three or four nations appear to be on track to complying with a law requiring that they implement biometric-readable passports to enter the United States by late October 2004. He said Homeland Security is working with Congress on the possibility of changing that deadline.

"We know we couldn't meet the deadline ... if it applied to us," Verdery said.

The Bush administration also is looking at possible changes to requirements for U.S. and Canadian citizens crossing the northern U.S. border. Currently, passports are not required for that border. "We're in the initial stages of this," Verdery said. "It's a very tricky issue."

One possibility is to expand the new "smart card" technology program known as Nexis for pre-cleared, regular border crossers, he said. Other changes include "smart" containers that reveal any tampering and a system for clearing shipments well before arrival.

Verdery also addressed questions about privacy and the use of counter-terrorist intelligence to nab common criminals identified along the way, the early success of which has "whet our appetite" for more uses. He highlighted the use of the new, electronic immigrant-tracking system in apprehending two criminals after their fingerprints and facial scans matched crime lists.

Verdery said that the use of counter-terrorism technologies for non-terrorist criminals is decided on a system-by-system basis but that law enforcement agencies are very much involved.

But the uses of computer system for pre-screening airline passengers that is near completion "is a different animal," he said, because it will involve U.S. citizens' personal data as well.

Jim Harper, editor of, which tracks privacy policy, said using the airline system for common criminals "is not just a privacy problem; it's a due-process problem." Citizens have a right to travel and not be searched or seized without suspicion, he said, adding that government officials "have to do some deep thinking about the program."

Verdery said he traveled to Brussels, Belgium, last week to try to finalize an agreement with European officials on sharing European Union citizens' data with U.S. authorities.

The European Commission on Wednesday adopted a proposal for a regulation to harmonize security standards, including biometrics, for EU citizens' passports using facial imaging. Additional proposals for visas and residence permits would require facial images and fingerprints. The proposal now goes to the EU Council of Ministers and the European Parliament.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.