IG finds problems persist with border, immigration units

Despite some improvement in coordinating their activities, two Homeland Security Department agencies responsible for enforcing customs and immigration laws still face significant problems with information sharing and limited resources -- sometimes leading to sloppy investigations, government inspectors conclude in a report released Friday.

The Homeland Security Department's inspector general assessed current relations between Customs and Border Protection, which enforces laws along the border, and Immigration and Customs Enforcement, which enforces laws inside the country.

The continuing problems cited in the report could give fresh ammunition to lawmakers who, in the past, have called for the agencies to be merged.

"At times, CBP and ICE would find that both were investigating the same targets, but neither would know of this beforehand," the IG wrote. "For example, CBP officials in Miami, Florida, said they occasionally interdict boats used to smuggle aliens or narcotics and discover the boat was being tracked as part of an ICE investigation."

In another example, CBP officials in Chicago executed a sting operation involving fraudulent documents. But CBP did not inform ICE of the operation prior to its start and an unexpected increase of seizures and cases being referred for investigation overwhelmed ICE agents, according to the report.

On the positive side, the report concludes that CBP and ICE have made progress in meeting recommendations previously made by the IG to improve relations. In response to the report, ICE and CBP officials agreed that better coordination is needed but also cited many efforts they have taken and plan to take.

"In regular meetings, joint planning and real-time coordination, CBP and ICE are working together to achieve a high level of operational information sharing to ensure optimum mission achievement," the officials said. "In fact, over the last year, CBP and ICE have initiated new information sharing efforts, including revised protocols for terrorist-related threats and warnings, daily incident and threat information and analysis, a joint strategy for utilization of biometrics, the pursuit of joint training opportunities, coordinated intelligence-driven special operations, [joint task force] program alignment and international notification protocols."

But in other areas, ICE officials said it is not unusual for agents to learn about a narcotics seizure at the border from the Drug Enforcement Administration rather than from the Border Patrol, which is part of CBP. And CBP officials cited many examples of ICE not informing them of investigative operations within their area of responsibility.

A CBP official said these unknown investigative operations create a concern for officer safety, especially in remote areas, the IG reported.

"Border Patrol agents said that ICE does not routinely share actionable intelligence [and] ICE then says that contraband seized by Border Patrol often is related to a pending ICE investigation," the IG report said. "In addition, ICE agents said that when information on pending investigations is provided to Border Patrol, Border Patrol uses it to interdict incoming contraband or smugglers, which disrupts the ICE investigation."

The Border Patrol and ICE also continue to have difficulty sharing resources, especially limited tactical aircraft. "For example, because many air assets have been temporarily assigned to Arizona ... other sectors, such as Laredo, Texas, do not have the air resources to support operations within their sector," the IG said.

Sometimes, ICE operations do not receive needed tactical air support because of a bureaucratic approval process inside the Border Patrol, the IG added.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.