On Guard

Despite criticism, DHS moves ahead with programs to beef up border protection and cybersecurity.

The Homeland Security Department has seen three secretaries, two administrations and several disasters, which served as crucial tests of its management capabilities. But in bureaucratic years the department is practically a newborn, and it is still struggling to define its role among its much older siblings in government.

DHS answers to 86 congressional committees and subcommittees, and its responsibilities range from preparing for a nuclear terrorist attack to rescuing Ohio fishermen stuck on an ice block in the middle of Lake Erie. In 2008, it continued to endure criticism that it is an ungainly bureaucracy without the focus or nimbleness needed to fight the electronic security wars of the 21st century. Despite haggling over privacy issues and its ability to oversee its projects, the department pushed for funding increases in the president's fiscal 2010 budget request. The common denominator, it seems, is technology.

Bricks-and-mortar spending accounts for much of the budget at DHS-including a Coast Guard request for $700 million in fiscal 2010 to purchase five cutters and two planes-but more and more funding is going to high-tech programs to protect the nation from dangerous intruders, whether they traverse the borders or cyberspace.

For instance, DHS has installed a new radio frequency identification system to monitor travelers passing through the Mexico border at San Ysidro, Calif., the largest land port of entry in the United States. The system allows DHS to quickly identify travelers with an enhanced passport, driver's license or State Department identification card to expedite the border-crossing process. The department deployed the system earlier this year and plans to expand it across the country as part of its Western Hemisphere Travel Initiative. In testimony on Capitol Hill, DHS Secretary Janet Napolitano touted RFID as one of many examples of how Homeland Security has developed specialized technology for border security, anti-terrorism and other functions.

Customs and Border Protection-the bureau that uses the radio frequency identification technology-saw its budget increase by nearly 20 percent in 2008, funding initiatives aimed at turning a technological eye on security, such as the E-Verify program and the Secure Border Initiative Network.

In 2008, Congress appropriated more than $1 billion for SBInet, which is heavily administered by Boeing Co. But the program has been saddled with delays and criticism on Capitol Hill. Despite some skepticism from Napolitano, who dealt with those issues firsthand when she was governor of Arizona, the Obama administration requested nearly $800 million for SBInet in 2010.

The 2010 budget request also includes $565 million for the Electronic Baggage Screening Program, an effort to scan all checked luggage at airports for explosives. And cybersecurity initiatives would get a boost of $355 million, or 20 percent, although the department has been criticized for lacking the clout to organize a governmentwide defense against online threats. In 2008, a nonpartisan panel suggested DHS shouldn't be in charge of cybersecurity. The administration has yet to act on all the recommendations, but it has shifted some of the coordination from DHS to the White House.

Both legislative chambers trimmed some of DHS' budget requests, but the department still is set to receive a funding increase of at least $2.6 billion in 2010.

Click here for the top 25 homeland security contractors.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.