StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

U.S. Customs and Border Patrol's Role in Information Security - Essay Example

Cite this document
Summary
The intention of this report "U.S. Customs and Border Patrol's Role in Information Security" is to introduce the US-VISIT Program in the information security sphere in the US,  investigate the goals and purpose and information systems supporting the US-VISIT Program…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
U.S. Customs and Border Patrols Role in Information Security
Read Text Preview

Extract of sample "U.S. Customs and Border Patrol's Role in Information Security"

Running head: U.S. CBP’s Role in Information Security U.S. CBP’s Role in Information Security Introduction Any association which relies on information systems and computer networks for carrying out the duties it is responsible for has to place a major importance on information security. This importance becomes more when considered in context of government agencies, since they are responsible for the maintenance of public’s trust. Due to such a phenomenal development in computer interconnectivity along with such a major rise in the usage of the internet there have been great alterations in the manner the government, the country and the majority of the globe conducts their duties and communicates. Nevertheless, without there being appropriate security measures, there is a danger of the systems being misused by people and certain communities who have spiteful intentions of intruding and making use of the access for acquiring sensitive data, committing wrong, disrupting functions, or launching attacks in opposition to the other computer systems and network. Such a concern is not there without any reason. It is an issue of worry because of the remarkable rise in the incidents related to security, the easiness with which hacking devices can be obtained and used, the gradual progress that is occurring in regard to the complexity plus efficiency of attack technology, and the terrible cautions that are being given regarding the novel and increasingly hazardous attacks which may be there in the future. Overview of the US-VISIT Program Since a long time the Congress has identified that there is a requirement of a border security system which would gather data regarding the overseas citizens coming in and out of the United States and which would also recognize the persons who are overstaying their visits. In 1996 there was the implementation of the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) (Newton, 2008) in the United States which was one of the legislative attempts for the creation of an entry exit control mechanism which were to be used for recording and matching entries and exits of the overseas citizens who travelled to the United States. One of the requirements of this act is to see that there is integration by the entry exit system of the foreign entries and exit data that is recorded in the databases of the Department of Justice and State Department. Following the attacks of 9/11 there have been more laws addressing the usage of biometric technology within a foreign arrival departure control mechanism. For instance, there is the USA Patriot Act (Scheppler, 2005) which authorizes that such a mechanism should have the ability of interfacing with other law enforcement associations, and also that the system makes use of biometric technology and files which are tamper-resistant. Other than this, there is a requirement by the Aviation and Transport Security Act for the airplanes to electronically transfer apparent data for each of the intercontinental flight passengers and the crew members to the Commissioner of Customs prior to the plane landing at an airport in the United States. Additionally, there is the Enhanced Border Security and Visa Entry Reform Act which has the requirement of using biometrics in the files for traveling and this act expands the passenger entry apparent needs in the Aviation and Transportation Security Act to the ships as well as to the air and sea exits. Goals and Purpose and Information Systems Supporting the US-VISIT Program The US-VISIT agenda aims at enhancing the safety that is provided to the nationals and the visitors of United States, facilitating lawful travelling as well as trade, ensuring that the US immigration mechanism is honest, and to make sure that there is protection of the confidentiality of the tourists coming to US. There are several of the main US-VISIT operations of which one is gathering, preserving, and sharing data on particular overseas citizens who arrive in and exit from the US. Other functions include recognizing those overseas nationals who violate the agreement terms in relation to their entrance in the country, who may have the eligibility to obtain, increase, or modify their current immigration type, or the ones who should receive apprehension or should be arrested by authorities. Also, the program aims at finding out about the fake travel records, verify their identity, and determine traveler permissibility by means of biometrics; and also at providing facilitation to the sharing and organization of data in the immigration and border management group. The implementation of US-VISIT program is by means of a “system-of-system” wherein the composition of the program is various mechanisms which can be employed for capturing and storing data about the traveler. The data about the traveler which is gathered by US-VISIT comprises of data like air, land, and sea port of entrance permissibility information, commercial passenger and crew information, visa application information, and travel records (passport and visa) information. The data that is gathered consists of that individual’s full name, date of birth, ethnicity, the country that issued his travel document and also its number and kind, the picture of the person and his finger prints. Weaknesses Even though there has been an implementation of information security controls which have been planned for safeguarding the US-VISIT information, its mechanisms that support the US-VISIT certainly consists of major defects in availability controls and the other controls that have been planned for the protection of discretion, honesty, and accessibility of the personal data. There has been an implementation of many significant controls by the CBP, for example the encrypting of information transferred among the customer and interface servers, organizing interruption exposure software, and conducting regular support processes which harmonize the storage space network at some information base with its distant support area. Additionally, it had the control of the physical availability mechanisms at the land and sea ports of entry and efficiently made secure certain of the personal sites and computer devices. Nevertheless, there was not a constant implementation of efficient availability controls and other such controls like the distribution of responsibilities and pattern guarantee for mechanisms which support US-VISIT. A major cause behind such defects was that the CBP had not at all times maintained efficiency when implementing the major program activities of the department’s information security program for systems which supported the US-VISIT agenda. Resultantly, there was rising danger existing about the unauthorized persons compromising mechanisms which support US-VISIT. Conclusion According to the report by US GAO, there were several weaknesses found in the US-VISIT program with regard to the information security control. Due to this the sensitive data, which included the personal information, was placed at a lot of risk and could be accessed by the criminals and the unauthorized, and this could lead to unnoticed revelation and alteration, mishandling, and devastation, which could make the program functions to become disrupted, or at least at a risk of being disrupted. The report exhibited the fact that there were plenty of defects in “identification and authentication controls, authorization controls, boundary protection measures, physical security, use of cryptography, audit and monitoring practices, segregation of duties, and configuration assurance controls exposed CBP’s mainframe computer, network infrastructure, servers, and workstations to insider and external threats” (US GAO, 2007: 34). Although there is advancement to be seen in the way CBP has implemented the department’s information security program, there has been a lack of proper measures being taken for the ensuring of discretion, honesty, and the accessibility of data and information systems which support the program of US-VISIT. Due to this there may have been a disclosure or modification of information by persons who are not authorized and this needs to be checked. References Newton, L. (2008). Illegal, Alien, or Immigrant: The Politics of Immigration Reform. New York: NYU Press. Scheppler, B. (2005). The USA PATRIOT Act: Antiterror Legislation in Response to 9/11 (Library of American Laws and Legal. New York: Rosen Central. United States Government Accountability Office. (2007). INFORMATION SECURITY: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program. Washington, DC: United States Government Accountability Office. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“U.S. Customs and Border Patrol's Role in Information Security Essay”, n.d.)
U.S. Customs and Border Patrol's Role in Information Security Essay. Retrieved from https://studentshare.org/information-technology/1555789-us-customs-and-border-patrols-role-in-information-security
(U.S. Customs and Border Patrol'S Role in Information Security Essay)
U.S. Customs and Border Patrol'S Role in Information Security Essay. https://studentshare.org/information-technology/1555789-us-customs-and-border-patrols-role-in-information-security.
“U.S. Customs and Border Patrol'S Role in Information Security Essay”, n.d. https://studentshare.org/information-technology/1555789-us-customs-and-border-patrols-role-in-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF U.S. Customs and Border Patrol's Role in Information Security

Independent Federal Law Enforcement DHS Agency

customs and border Protection Division Institution Abstract This study analyzes the operations and activities of the U.... customs and border Protection (CBP), an arm of the DHS.... customs and border Protection, U.... customs and border Protection (CBP) division, noting the primary and subsidiary roles of the agency and how these two roles impact on the agency's ability to execute its primary responsibility.... government signed the Homeland security Act in 2002, establishing the Department of Homeland security (DHS) charged with primary responsibilities in terrorism prevention and response alongside emergency planning and response (DHS, 2002)....
7 Pages (1750 words) Assignment

Sea Ports and Port Security Management

The coast guards are the major unit active in the port area to maintain the security system.... The security atmosphere at seaports remains uncertain because of port infrastructure remaining uncompleted and also due to lack of proper co ordination in conveying of information about threats....
4 Pages (1000 words) Assignment

Border Security and How It Has Grown over the Decades

Border security force or customs and border Protection (CBP) is the largest law enforcement workforce in America.... The Homeland security Act of 2002 established border security as a major mission for the new Department of Homeland security (DHS) Approximately… About 375,000 people enter the U.... Border security is becoming an important topic for America, especially after the 9/11 incident.... Even though America was successful in patrolling its land and coastal boundaries, the loopholes in the security measures of the air boundaries have been revealed for the first time after the 9/11 incident....
10 Pages (2500 words) Research Paper

Roles in homeland security

The term homeland security is an umbrella phrase used by Americans to refer to the coordinated effort by the entire nation so as to have a homeland that is secure, safe, and one that can withstand terrorism and other dangers so as the Americans aspirations and interests, and the… way they live can develop well through the efforts of the nation to hinder terrorist attacks within the US, minimize the vulnerability to terrorism, and reduce the damage that results from the attacks that do happen (Bullock, et al 2012)....
5 Pages (1250 words) Essay

The Comparison of The United States and Africas Police Forces

This research paper highlights that the role of any police department is to protect lives and property.... Law enforcers' duties and roles in normal circumstances.... The US and South Africa police force have the mandate and obligation apprehend any person.... hellip; Both forces have the obligation to respond to calls from individuals at any time of the day in times of need....
7 Pages (1750 words) Research Paper

The Concept of the Extended Policing Family

This work also gives information about its operations, security, practice, and authority.... They also do patrol roles in public places and residential areas to ensure security and order have been bestowed in society.... The MSC is made up of special volunteers who are trained and confirmed as police officers and are majorly used in employer support schemes due to the increase in demand for security by most employers in the country.... To counter this, there was a need for organizations other than the central government to take initiative in fighting security concerns in the community through the purchase of additional policing and patrols....
9 Pages (2250 words) Term Paper

Electronic Security Solutions and the Creation of the Right Balance

The paper discusses the introduction of electronic security solutions has given rise to many debates regarding which between manned security and electronic security solutions is best suited for the consumers.... There is a dilemma which the best security solution option to use is.... hellip; Several security measures types are required in different areas to provide security solutions in different locations with different degrees of crime vulnerability....
16 Pages (4000 words) Research Paper

U.S. Border Patrol

customs and border Protection, the largest enforcement agency under federal administration.... customs and border Protection.... customs and border Protection (CBP) agency.... The author focuses on the homeland security in the US, under the jurisdiction of the U.... Department of Homeland security, its primary responsibility is the protection of the U.... Within it are other agencies, vital in offering various forms of administrative duties such as - the Citizenship and Immigration, and the Immigration and Customs Enforcement services, in addition to the crucial Homeland security Investigations agency....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us