Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

GAO: Technology Gaps Jeopardize U.S. Visa Entry System

Incomplete biometric identification is among the gaps the DHS needs to fill to secure the US-VISIT foreign visitors system.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
An incomplete biometric system is one of the gaps jeopardizing the security of the U.S. visa entry system, according to a government watchdog agency.

The Department of Homeland Security's U.S. Immigration and Customs Enforcement's Counterterrorism and Criminal Exploitation Unit (CTCEU) is in charge of enforcing laws that govern foreigners who overstay their time in the country. To help in this endeavor, the DHS has deployed a biometric-based identification system called US-VISIT to keep track of foreign nationals when they enter and leave the country.

Though the system is operating in ports of entry when people enter the country, it's not fully operational when they leave, according to a report by the Government Accountability Office (GAO). The report is based on testimony made by Richard M. Stana, director of Homeland Security and Justice Issues for the GAO, before the Subcommittee on Border and Maritime Security of the House of Representatives' Committee on Homeland Security.

Without this system fully in place, the DHS is relying on biographical data it has on foreign nationals to identify people who have overstayed their visas. However, "unreliable data hinder DHS's efforts to accurately identify overstays," said Stana.

The report noted that weaknesses in DHS processes for collecting departure data are making it difficult for the government to determine overstay rates.

Moreover, the DHS still has yet to define, plan, or justify biometric and other features of its US-VISIT exit projects on the basis of costs, benefits, and risks, despite a proposal to spend tens of millions of dollars on them, Stana testified.

"We concluded that, without a master schedule that was integrated and derived in accordance with relevant guidance, DHS could not reliably commit to when and how it would deliver a comprehensive exit solution or adequately monitor and manage its progress toward this end," said the report.

The DHS did not immediately respond to a request for comment Tuesday.

Join us for GovCloud 2011, a day-long event where IT professionals in federal, state, and local government will develop a deeper understanding of cloud options. Register now.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
CVE-2019-16307
PUBLISHED: 2019-09-14
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKe...
CVE-2019-16294
PUBLISHED: 2019-09-14
SciLexer.dll in Scintilla in Notepad++ (x64) before 7.7 allows remote code execution or denial of service via Unicode characters in a crafted .ml file.
CVE-2019-16309
PUBLISHED: 2019-09-14
FlameCMS 3.3.5 has SQL injection in account/login.php via accountName.