Terrorist and criminal watch list systems -- sometimes referred to as watchout, lookout, target, or tip-off systems -- are important tools in controlling and protecting our nation's borders. The events of 9/11, and other incidents since then, have highlighted the need to share these watch lists. In light of the importance of border security, this report identifies Fed. databases and systems that contain watch lists, the agencies that maintain and use them in protecting our nation's borders, the kind of data they contain, whether Fed. agencies are sharing info. from these lists with each other and with state and local governments and private org's., the structural characteristics of those lists that are automated, and whether opportunities exist to consolidate these watch lists. Ill.
For decades, the DoD has been challenged in modernizing its thousands of business systems. Since 1995, this effort has been designated as high risk. One key to effectively modernizing DoD¿s systems environment and satisfying relevant legislative requirements is ensuring that business system investments comply with an enterprisewide strategic blueprint, commonly called an enterprise architecture. For DoD¿s business systems modernization, it is developing and using a federated Business Enterprise Architecture (BEA), which is a coherent family of parent and subsidiary architectures. This report determines whether key Dept. of the Navy business systems modernization programs comply with DoD¿s federated BEA. Charts and tables.
The technology component of the Dept. of Homeland Security's (DHS) Secure Border Initiative (SBI), referred to as SBInet, is to put observing systems along our nation's borders and provide Border Patrol command centers with the imagery and related tools and information needed in deciding whether to deploy agents. SBInet is being acquired and deployed in incremental blocks of capability, with the first block to cost about $1.3 billion. This report determined the extent to which DHS has: (1) defined the scope of its proposed SBInet solution; (2) developed a reliable schedule for this solution; (3) demonstrated the cost-effectiveness of this solution; and (4) acquired the solution using key management processes. Charts and tables.
The Dept. of Homeland Security¿s (DHS) U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program stores and processes biometric and biographic info. to, among other things, control and monitor the entry and exit of foreign visitors. Currently, an entry capability is operating at almost 300 U.S. ports of entry, but an exit capability is not. It has been reported that there are limitations in DHS¿s efforts to plan and execute its efforts to deliver US-VISIT exit. Recommendations were made to improve these areas. This report determined: (1) the status of DHS¿s efforts to deliver a comprehensive exit solution; and (2) to what extent DHS is applying an integrated approach to managing its comprehensive exit solution. Illus.
Our Nation¿s overall election system depends on all levels of gov¿t. and the interplay of people, processes, and technology, which includes the voting systems that are used during an election. For this study, the following questions were asked relative to states, territories, and the D.C.: (1) what voting methods and systems are these entities using in fed. elections and what changes are underway; (2) how do they certify or otherwise approve voting systems; (3) what other steps do they take to ensure the accuracy, reliability, and security of voting systems; (4) how do they identify, evaluate, and respond to voting system problems; and (5) how do they view fed. voting system-related resources and services. Charts and tables.
The Dept. of Homeland Security (DHS) invested more than $6 billion in 2009 on large-scale, info. tech. (IT) systems to help it achieve mission outcomes and transform departmentwide operations. For DHS to effectively leverage these systems as mission enablers and transformation tools, it needs to employ a number of institutional acquisition and IT mgmt. controls and capabilities, such as using an operational and technological blueprint to guide and constrain system investments and following institutional policies, practices, and structures for acquiring and investing in these systems. Also, employing rigorous and disciplined system life cycle mgmt. processes and having capable acquisition and IT mgmt. workforces.
This report addresses the Immigration and Naturalization Service's (INS) management of information technology (IT) investments. Each year INS invests hundreds of millions of dollars on IT systems and activities. We found that INS has established some important capabilities for managing these investments, but it has considerable work ahead to fully implement mature and effective processes. We are making recommendations to strengthen INS' investment management capabilities.
The Federal Aviation Administration's (FAA) mission is to promote the safe, orderly, & expeditious flow of air traffic in the U.S. airspace system. To this end, FAA is modernizing its air traffic control systems, a multibillion dollar effort that has been designated as a high-risk program. Research into the practices of successful public- & private-sector organizations has shown that developing & using an enterprise architecture, or blueprint, to guide & constrain systems investments is crucial to the success of such a modernization effort. This report determines whether FAA has established an effective processes for managing the development & implementation of an enterprise architecture. Includes recommendations. Charts & tables.
The Help America Vote Act of 2002 established the Election Assistance Comm. (EAC) to help improve state & local admin. of fed. elections & authorized funding for state & local governments to expand their use of electronic voting systems. EAC began operations in Jan. 2004. However, reported problems with electronic voting systems have led to questions about the security & reliability of these systems. This report: (1) determines the significant security & reliability concerns identified about electronic voting systems; (2) identifies recommended practices relevant to ensuring the security & reliability of these systems; & (3) describes actions taken or planned to improve their security & reliability. Charts & tables.
The Dept. of Homeland Security¿s (DHS) Secure Border Initiative (SBI) is a multiyear, multibillion-dollar program to secure the nation¿s borders through, among other things, new technology, increased staffing, and new fencing and barriers. The technology component of SBI, which is known as SBInet, involves the acquisition, development, integration, and deployment of surveillance systems and command, control, communications, and intelligence technologies. This report assesses DHS¿s efforts to: (1) define the scope, timing, and life cycle management approach for planned SBInet capabilities; and (2) manage SBInet requirements and testing activities.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.