[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]
For sale by the Superintendent of Documents, U.S. Government Publishing Office,
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Publishing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, [email protected].
2017
BORDER SECURITY GADGETS, GIZMOS, AND INFORMATION: USING TECHNOLOGY TO
INCREASE SITUATIONAL AWARENESS AND OPERATIONAL CONTROL
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON
BORDER AND
MARITIME SECURITY
OF THE
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED FOURTEENTH CONGRESS
SECOND SESSION
__________
MAY 24, 2016
__________
Serial No. 114-72
__________
Printed for the use of the Committee on Homeland Security
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PUBLISHING OFFICE
23-244 PDF WASHINGTON : 2017
_________________________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Publishing Office,
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center,
U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free).
E-mail, [email protected].
COMMITTEE ON HOMELAND SECURITY
Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Peter T. King, New York Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Candice S. Miller, Michigan, Vice James R. Langevin, Rhode Island
Chair Brian Higgins, New York
Jeff Duncan, South Carolina Cedric L. Richmond, Louisiana
Tom Marino, Pennsylvania William R. Keating, Massachusetts
Lou Barletta, Pennsylvania Donald M. Payne, Jr., New Jersey
Scott Perry, Pennsylvania Filemon Vela, Texas
Curt Clawson, Florida Bonnie Watson Coleman, New Jersey
John Katko, New York Kathleen M. Rice, New York
Will Hurd, Texas Norma J. Torres, California
Earl L. ``Buddy'' Carter, Georgia
Mark Walker, North Carolina
Barry Loudermilk, Georgia
Martha McSally, Arizona
John Ratcliffe, Texas
Daniel M. Donovan, Jr., New York
Brendan P. Shields, Staff Director
Joan V. O'Hara, General Counsel
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON BORDER AND MARITIME SECURITY
Martha McSally, Arizona, Chairman
Lamar Smith, Texas Filemon Vela, Texas
Mike Rogers, Alabama Loretta Sanchez, California
Candice S. Miller, Michigan Sheila Jackson Lee, Texas
Jeff Duncan, South Carolina Brian Higgins, New York
Lou Barletta, Pennsylvania Norma J. Torres, California
Will Hurd, Texas Bennie G. Thompson, Mississippi
Michael T. McCaul, Texas (ex (ex officio)
officio)
Paul L. Anstine, Subcommittee Staff Director
Kris Carlson, Subcommittee Clerk
Alison Northrop, Minority Subcommittee Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable Martha McSally, a Representative in Congress From
the State of Arizona, and Chairwoman, Subcommittee on Border
and Maritime Security:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable Filemon Vela, a Representative in Congress From the
State of Texas, and Ranking Member, Subcommittee on Border and
Maritime Security.............................................. 4
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Prepared Statement............................................. 5
Witnesses
Mr. Ronald Vitiello, Acting Chief, U.S. Border Patrol, U.S.
Department of Homeland Security:
Oral Statement................................................. 7
Joint Prepared Statement....................................... 11
Mr. Major General Randolph D. ``Tex'' Alles, (Ret.-USMC),
Executive Assistant Commissioner, Office of Air and Marine
Operations, U.S. Customs and Border Protection, U.S. Department
of Homeland Security:
Oral Statement................................................. 8
Joint Prepared Statement....................................... 11
Mr. Mark Borkowski, Assistant Commissioner and Chief Acquisition
Executive, Office of Technology Innovation and Acquisition,
U.S. Customs and Border Protection, U.S. Department of Homeland
Security:
Oral Statement................................................. 9
Joint Prepared Statement....................................... 11
Ms. Rebecca Gambler, Director, Homeland Security and Justice,
U.S. Government Accountability Office:
Oral Statement................................................. 17
Prepared Statement............................................. 18
BORDER SECURITY GADGETS, GIZMOS, AND INFORMATION: USING TECHNOLOGY TO
INCREASE SITUATIONAL AWARENESS AND OPERATIONAL CONTROL
----------
Tuesday, May 24, 2016
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Border and Maritime Security,
Washington, DC.
The subcommittee met, pursuant to call, at 2:53 p.m., in
Room 311, Cannon House Office Building, Hon. Martha McSally
[Chairwoman of the subcommittee] presiding.
Present: Representatives McSally, Rogers, Duncan, Hurd,
Vela, Torres, and Thompson (ex officio).
Ms. McSally. The Committee on Homeland Security,
Subcommittee on Border and Maritime Security will come to
order. The subcommittee is meeting today to examine CBP's
procurement and use of technology to secure the Southern
Border. I recognize myself for an opening statement.
First, let me say thanks for your patience. I know we are
now nearly an hour behind. We will try to be as expeditious as
possible. We value your time, but you never know when votes are
going to come up. So I appreciate your grace and your patience
with that.
The Southwest Border of the United States is home to nearly
2,000 miles of majestic, yet rugged and often treacherous
terrain, terrain that makes Border Patrol access in some remote
areas a mere impossible proposition. Manpower alone, while
essential, will never be enough to secure the border. In order
to enhance situational awareness, we need to leverage
technological force multipliers that provide persistent
surveillance across wide swaths of remote areas along the
border.
Technology such as cameras, night vision goggles, motion
sensors, and surveillance equipment have become critical
elements of our border security operations. These technologies
have enhanced agent safety, provide a constant monitoring of
difficult-to-access areas, and extended situational awareness,
and the ability to interdict criminal activity faster.
Aviation assets, such unmanned aerial vehicles, or UAVs,
often considered UASs, unmanned aerial systems, equipped with
advanced radar capabilities, have also refined our
understanding of the significant threat that exists along the
border, and help reposition and redeploy assets as the flow and
the vulnerability shift. But technology cannot do any of these
things if CBP's acquisition and procurement process cannot get
these tools and the latest cutting-edge technology in the hands
of the men and women on the ground in a timely fashion.
Situation awareness is contingent on feeding information
from centralized operation centers far from the border down to
the individual agent level, so they can actually respond
accordingly. Technology has to be focused on meeting the
immediate needs of the agent, and not stovepiped into a command
center. I speak to this from first-hand information. I have
more experience than I would prefer to have in some cases on,
you know, time-sensitive targeting, on operations centers in
the military, and so these challenges are similar as far as
merging together information providing a good common
operational picture, situation awareness, but not just to the
generals, but to the troops and those that are actually doing
the mission. So that is always going to be my sort-of frame of
mind. Although it is not the same as in the military, there are
similar challenges as far as using technology, fusing
information, and providing real-time, near-time decision
quality information to leadership and to those that are out
there on the front lines.
CBP's border technology procurement efforts, to put it
mildly, have a bit of a checkered history of not delivering
timely acquisitions that include more failures than successes,
including the Secure Border Initiative, coastal interceptor
vessel, ultralight aircraft detection, and mobile surveillance
capability, which have all become synonymous with a deeply
troubled acquisition process. These procurements have run over
budget, behind schedule, been subject to litigation, and wasted
a good deal of taxpayer dollars to boot. In this time of
limited budgets, we cannot afford to waste $1 billion on a
failed system to learn what not to do. Border security cannot
continue to be held back by a system that has an astonishing
lack of urgency in getting it done for the people on the
ground.
Our agents and officers in the field desperately need the
capability they have asked for to do the job. But on the whole,
I don't believe CBP's Office of Technology Innovation and
Acquisition, OTIA, has delivered. OTIA's mission is to identify
and acquire products and services to improve CBP's performance
in securing the borders.
OTIA has been the lead agency responsible for acquiring
technologies associated with the Arizona technology plant. As
far as I can tell, the only procurement that is working well
and is on budget is the integrated fixed tower program located
principally in my district. However, this comes after chronic
delays and the cancellation of SBInet. Now on track, Chief
Vitiello recently certified to Congress that the program meets
its operational requirements.
With the exception of that outlier, industry officials we
have spoken to tell us over and over again, CBP's requirements
are often poorly drafted, ill-defined, and, perhaps, most
alarmingly not stable. Transparency is also a challenge as the
CBP's ability to forecast their needs so industry can spend the
research and development dollars to mature technology for use
in border security applications.
The Government Accountability Office, GAO, has, on several
occasions, criticized CBP for not following aspects of DHS's
acquisition management guidance with the Arizona border
technology plant and the lack of performance metrics to
determine if the cost is worth the border security improvement.
As a result of CBP's troubling procurement record, I
authored the Border Security Technology Accountability Act that
ensures border security programs are meeting costs, schedule,
and performance thresholds, and that technology is subjected to
a rigorous independent verification and validation process.
This legislation is vital to restore accountability, but it is
being held up for reasons unknown in the Senate, even though it
passed unanimously in the House.
I am interested to hear from our witnesses on how CBP
conducts market research, forges for emerging technology,
repurposes existing Department of Defense equipment, and
collaborates with DHS's Office of Science and Technology to
mature technology not quite ready for field deployment.
Congress repeatedly asked a very simple question when it comes
to border security: What will it take to gain situational
awareness and operational control of the Southern Border? Up
until now, the answer we received have been limited, or not
backed up by a requirements process, similar to what the
Department of Defense uses. In short, it was a guess.
The Border Patrol and Air and Maritime Operations are
involved in an effort called the ``capability gap analysis
process,'' or CGAP. It is an aerial-based exercise designed to
ferret out tactical weaknesses in our border security defenses
and, hopefully, inform the technological budget process.
Congress expects the Border Patrol and Air and Marines to be
able to quickly identify and justify the resources needed to
secure the border. I am optimistic the CGAP process is a much-
needed step in that direction.
Finding solutions to CBP's procurement woes and quickly
meeting the technology requirements of the men and women
charged with securing the border is the reason I am holding
this hearing today. I look forward to the witnesses' testimony.
[The statement from Chairwoman McSally follows:]
Statement of Chairwoman Martha McSally
May 24, 2016
The Southwest Border of the United States is home to nearly 2,000
miles of majestic, yet rugged and often treacherous terrain. Terrain
that makes Border Patrol access, in some remote areas, a near
impossible proposition.
Manpower alone, while essential, will never be enough to secure the
border. In order to enhance situational awareness, we need to leverage
technological force multipliers that provide surveillance across wide
swaths of remote areas along the border.
Technologies such as cameras, night vision devices, motion sensors,
and surveillance equipment, have become critical elements of our border
security operations. These technologies have enhanced agent safety,
provided constant monitoring of difficult to access areas, and extended
situational awareness and the ability to interdict criminal activity.
Aviation assets, such as Unmanned Aerial Vehicles, equipped with
advanced radar capabilities, have also refined our understanding of the
significant threat that exists along the border and has helped
reposition and redeploy assets as flow and vulnerabilities shift.
But technology cannot do any of those things if CBP's acquisition
and procurement process cannot get these tools and the latest cutting-
edge technology in the hands of the men and women on the ground in a
timely fashion.
Situational awareness is contingent on feeding information from
centralized operations centers, far from the border, down to the
individual agent level, so they can respond accordingly. Technology has
to be focused on meeting the immediate needs of the agent and not
stove-piped in a command center.
CBP's border technology procurement efforts, to put it mildly, have
a checkered history of not delivering timely acquisitions that include
more failures than successes, including the Secure Border Initiative,
Coastal Interceptor Vessel, Ultralight Aircraft Detection, and the
Mobile Surveillance Capability, which have all become synonymous with a
deeply-troubled acquisition process.
These procurements have run over budget, behind schedule, been
subject to litigation, and wasted a good deal of taxpayer dollars to
boot. In this time of limited budgets, we cannot afford to waste a
billion dollars on a failed system to learn what not to do.
Border security cannot continue to be held back by a system that
has an astonishing lack of urgency in getting it done for people on the
ground.
Our agents and officers in the field desperately need the
capabilities they have asked for to do the job, but on the whole, I do
not believe that CBP's Office of Technology and Acquisition or (OTIA)
has delivered.
OTIA's mission is to identify and acquire products and services to
improve CBP's performance in securing the borders. OTIA has been the
lead agency responsible for acquiring technologies associated with the
Arizona Technology Plan.
But as far as I can tell, the only procurement that is working well
and on budget is the Integrated Fixed Tower program, located
principally in my district, however, this comes after chronic delays
and the cancellation of SBInet. Now on track, Chief Vitiello recently
certified to Congress that the program meets its operational
requirements.
With the exception of that outlier, industry officials we have
spoken to tell us over and over again that CBP's requirements are often
poorly drafted, ill-defined and, perhaps most alarming, not stable.
Transparency is also a challenge, as is CBP's ability to forecast
their needs so industry can spend the Research and Development dollars
to mature technology for use in border security applications.
The Government Accountability Office has, on several occasions,
criticized CBP for not following aspects of DHS's acquisition
management guidance with the Arizona Border Technology plan, and the
lack of performance metrics to determine if the cost is worth the
border security improvement.
As a result of CBP's troubling procurement record, I authored the
Border Security Technology Accountability Act that ensures border
security programs are meeting cost, schedule, and performance
thresholds and that technology is subjected to a rigorous independent
verification and validation process.
This legislation is vital to restore accountability but is being
held up, for reasons unknown, in the Senate.
I am interested to hear from our witnesses how CBP conducts market
research, forages for emerging technology, repurposes excess Department
of Defense equipment, and collaborates with DHS's office of Science and
Technology to mature technology not quite ready for field deployment.
Congress repeatedly asks a very simple question when it comes to
border security: What will it take to gain operational control and
situational awareness of the Southern Border?
Up until now, the answer we received was limited, or not backed by
a requirements process similar to what the Defense Department uses. In
short, it was a guess.
The Border Patrol and Air and Marine Operations are involved in an
effort called the Capability Gap Analysis Process, or C-GAP, a
scenario-based exercise designed to ferret out tactical weaknesses in
our border security defenses and hopefully inform the technological
budget process.
Congress expects the Border Patrol and Air and Marine to be able to
quickly identify, and justify the resource needs required to secure the
border. I am optimistic that the C-GAP process is a much needed step in
that direction.
Finding solutions to CBP's procurement woes and quickly meeting the
technological requirements of the men and women charged with securing
the border is the reason I am holding this hearing today.
I look forward to the witness's testimony.
Ms. McSally. The Chair now recognizes the Ranking Member of
the subcommittee, the gentleman from Texas, Mr. Vela, for a
statement he might have.
Mr. Vela. Thank you, Madam Chairwoman. I am pleased to join
you for today's hearing, examining U.S. Customs and Border
Protection's efforts to enhance border security through the use
of technology.
As a Member of Congress representing a district in the
U.S.-Mexico border, I understand the importance of technology
to achieving improved situational awareness, enhanced security,
and improved facilitation of legitimate traffic along our
Nation's borders.
The Department of Homeland Security has, for years,
attempted to delay various kinds of technology to the borders
with mixed results. To be fair, identifying, acquiring, and
deploying the right mix of border security technology is no
easy task. Technology evolves over time. The flow of border
crosses and illicit traffic changes. America's borders are
varied places with different geography, terrain, and climate,
meaning that what works in Arizona may not work in South Texas,
and likely will not work on our northern borders. It is
important that this committee conduct careful oversight of
CBP's on-going border security technology efforts, including
the Arizona border surveillance technology plan, and deployment
of integrated fixed towers in Arizona, procurement of mobile
surveillance technologies, and the use of Predator B unmanned
aircraft.
The Government Accountability Office has reported on the
Arizona border surveillance technology plan identifying
management, scheduling, and cost concerns similar to those that
contributed to SBInet's problems.
I hope to hear from our GAO witness today about whether and
how those issues are being addressed by CBP. Given my
particular interest in South Texas, I also hope to hear from
our witnesses about the border security's technologies in use
or planned for the South Texas region. For example, I
understand that there was a protest with a contract award for
mobile video surveillance system units which consist of short-
and medium-range mobile surveillance equipment mounted on
telescoping masks mounted on Border Patrol vehicles. Many of
the projected 297 units are slated for deployment in the Rio
Grande Valley, and I hope to learn what the revised time line
is for deployment.
I also know that the weather in Corpus Christi has proven
challenging for flying CBP's Predator Bs prompting the agency
to fly the aircraft from other locations.
I hope to hear from CBP about how these issues have
affected situational awareness along the border in South Texas,
if at all.
Finally, I hope we can have a frank discussion with our
witnesses about how CBP can best position its on-going border
security technology programs for success. I thank the witnesses
for joining us today, and I yield back.
Ms. McSally. The gentleman yields.
Other Members of the committee are reminded that opening
statements may be submitted for the record.
[The statement of Ranking Member Thompson follows:]
Statement of Ranking Member Bennie G. Thompson
May 24, 2016
This committee has conducted vigorous oversight of DHS's attempts
to deploy security technology along our Nation's borders over the
years--and with good reason. Beginning with the Integrated Surveillance
Intelligence System (ISIS), later the America's Shield Initiative
(ASI), and more recently Project 28 and SBInet, DHS has consistently
over-promised and underdelivered border security technology.
For example, at the time then-Secretary Janet Napolitano canceled
SBInet, the program had been deployed to only 53 miles of border in
Arizona at a cost of about $1 BILLION. This committee has been
fortunate to have the Government Accountability Office (GAO) engaged on
each of these procurements, contributing significantly to our oversight
efforts.
With respect to its on-going program, the Arizona Border Security
Technology Plan, 2 years ago GAO reported that CBP was not following
best practices for scheduling, verifying cost estimates with
independent sources, testing technology to determine effectiveness and
suitability, or establishing performance metrics for the technology. In
short, GAO's initial work showed that the program suffers from some of
the same deficiencies that ultimately led the Department to cancel the
SBInet program.
In March of this year, GAO reported on CBP's Integrated Fixed Tower
(IFT) acquisition, a key component of the Arizona Border Surveillance
Technology Plan. Announced in March 2012, the IFTs--53 fixed
surveillance tower units equipped with ground surveillance radar,
infrared cameras, and communications systems--were intended to address
the capability gap left when SBInet was canceled.
Unfortunately, DHS was forced to re-baseline the IFT program in
December 2015, about 3 years after CBP determined the program could not
meet its initial schedule goals. The program's full operational
capability date has so far slipped from September 2015 to September
2020, and acquisition costs have increased by $53 million. Those of us
who participated in SBInet oversight had hoped CBP learned its lessons
from that program and would be applying them to this newer effort in
Arizona.
I hope to hear from CBP and GAO today about the reasons for the
cost, schedule, and performance changes for the IFTs. Similarly, I want
to have a frank discussion about CBP's other major border security
technology acquisitions and assets, including Mobile Surveillance
Capabilities (MSCs), aerostats, and Predator Bs. I continue to support
using technology as a force-multiplier along our Nation's borders.
However, if there is anything our oversight of DHS's efforts have
shown, border security technology must be procured, deployed, and
utilized in an appropriate, cost-effective manner. Otherwise, CBP could
be left with yet another border security technology system that fails
to deliver as promised.
Ms. McSally. We are pleased to be joined by 4 distinguished
witnesses to discuss the important topic today:
Ronald Vitiello, the acting chief of the U.S. Border
Patrol. As a chief operating officer, he is responsible for the
daily operations of the U.S. Border Patrol and assist the
commissioner of U.S. Customs and Border Protection in planning
and directing Nation-wide enforcement. Chief Vitiello began his
Border Patrol career in 1985, and has served in the Swanson,
Tucson, and Laredo sectors.
Randolph Alles is the executive assistant commissioner for
CBP's Office of Air and Marine, a position he has held since
January 2013.
In this role, Mr. Alles is charged with overseeing the AMO
mission of using aviation and maritime assets to detect,
interdict, and prevent acts of terrorism, and the unlawful
movement of drugs and other contraband from entering the United
States.
Before joining the AMO, he spent 35 years in the United
States Marine Corps--Semper Fi--retiring in 2011 as a major
general.
Mark Borkowski became the assistant commissioner for the
Office of Technology Innovation and Acquisition, or OTIA, at
U.S. Customs and Border Protection, or CBP, in July 2010. In
this role, he is responsible for ensuring technology efforts
are properly focused on mission, and well-integrated across
CBP. Prior to his appointment as assistant commissioner, Mr.
Borkowski was the executive director of the Secure Border
Initiative, SBI.
Rebecca Gambler is the director in the House U.S.--sorry.
Let me do this again--is a director in the U.S. Government
Accountability Office, Homeland Security and Justice team,
where she leads GAO's work on border security, immigration, and
the Department of Homeland Security's management and
transformation. Prior to joining GAO, Ms. Gambler worked at the
National Endowment for Democracy's International Forum or
Democratic Studies.
The witnesses' full written statements will appear in the
record. The Chair now recognizes Chief Vitiello for 5 minutes.
STATEMENT OF RONALD VITIELLO, ACTING CHIEF, U.S. BORDER PATROL,
U.S. DEPARTMENT OF HOMELAND SECURITY
Mr. Vitiello. Thank you, Chairwoman McSally, Ranking Member
Vela, and distinguished Members of the subcommittee. It is an
honor to appear before you today on behalf of the dedicated men
and women of the United States Border Patrol, and discuss the
role of technology in our border security operations between
the ports of entry. This Saturday, the 28th, marks the Border
Patrol's birthday. Since 1924, the men and women of this agency
have made significant contributions to securing the homeland,
from mounted watchmen riding the line in 1924; to guarding Nazi
prisoners of war; in 1961, securing domestic air flights as
marshals; and integrating universities in Oxford and Montgomery
in 1962.
Proven to be a versatile and effective workforce, our
agents have helped to capture escaped felons in New York in
June of last year. On our borders, we try to innovate and use
technology that enhances agent effectiveness and keeps them
safe.
In 1935, we were advanced enough to install and use two-way
radios in cars and stations. Today, the advanced technology
deployed along our borders not only enhances the security of
our Nation by providing us with increased situational awareness
of illegal activity, it also significantly increases the safety
of our front-line agents. While the basic Border Patrol mission
is to secure the Nation's border from illegal entry of persons
and goods has not changed in the past 92 years, the operational
environment in which we work and the threats we face have
changed significantly.
Today, our mission includes deterring acts of terrorism,
detecting and intercepting human drug and weapon smuggling and
trafficking, and preventing and responding to other criminal
activity. The effective deployment of fixed and mobile
technology is critical to the Border Patrol operations. With
these resources, our front-line agents are better-informed,
more effective, and safer. There is no doubt that technology is
a critical factor of the Border Patrol strategic plan, which
implements a security approach based on risk, and emphasizes
unity of effort through integrated planning and execution with
our partners.
Detection technology extends the visual range and awareness
of front-line agents. Ground sensors alert agents to movements
and activity, while mounted cameras and sensors on fixed--on
aircraft fixed towers and Border Patrol vehicles can be
controlled remotely to verify a target.
All of this technology works together, and ultimately
enables the Border Patrol to gain situational awareness, direct
a response team to the best interdiction location, and forewarn
agents of any danger otherwise unknown along the way.
The Border Patrol continually evaluates our situational
awareness posture, adjusts our capabilities as required to
secure our borders. We work closely with our operational
intelligence and acquisition colleagues within CBP and DHS to
identify and develop technology, such as tunnel detection, and
monitoring technology, small unmanned aircraft systems,
tactical communication upgrades, and border surveillance tools
tailored for the Southwest Border and northern borders.
In coordination with the DHS joint requirements process,
the Border Patrol will continue to use the capability gap
analysis process to conduct mission analysis and identify
capability gaps and potential operational requirements over the
short, medium, and long term.
With all our border technology, CBP works closely with
agents on the ground to develop operational requirements,
conduct testing and evaluation, and obtain user feedback to
ensure the right tools are applied to the right capability gap.
Thank you, again, for the opportunity to discuss how
technology enhances the Border Patrol's capabilities and
strengthens our efforts in securing the border. I look forward
to your questions.
Ms. McSally. Thank you, Mr. Vitiello.
The Chair now recognizes Major Alles for 5 minutes.
STATEMENT OF MAJOR GENERAL RANDOLPH D. ``TEX'' ALLES, (RET.-
USMC), EXECUTIVE ASSISTANT COMMISSIONER, OFFICE OF AIR AND
MARINE OPERATIONS, U.S. CUSTOMS AND BORDER PROTECTION, U.S.
DEPARTMENT OF HOMELAND SECURITY
Mr. Alles. Good afternoon, Chairwoman McSally and Ranking
Member Vela and Members of the committee. It is an honor to
appear before you today to discuss the critical role of
technology, and specifically CPB's Air and Marine assets in
securing our Nation's borders. CBP's Air and Marine Operations,
or AMOs as we call ourselves is a critical component of the
CBP's layered border security strategy. AMO's 1,272 law
enforcement agents operate 243 aircraft and 360 vessels, and
has sophisticated domain awareness network across the United
States, Puerto Rico, and the Virgin Islands. AMO's critical
aerial and maritime missions fall under 4 core competencies:
Domain awareness, investigation, interdiction, and contingency
operations and National taskings. AMO is a vital contributor to
the security of our borders interdicting illicit traffic in the
air, on the land, and the littoral waters of the United States
through the coordinated use of integrated Air and Marine
forces.
All our highly-specialized law enforcement agents provide
unique expertise and capability domains in which we operate.
Since the consolidation of Air and Marine assets within AMO 11
years ago, we have transformed from a force composed primarily
of light observation aircraft into a modern air and maritime
fleet equipped with sophisticated surveillance sensors and
communication systems. We are working to increase the
connectivity and networking among all our Air and Marine
assets. AMO is continuing the efforts to reduce the number of
our aircraft types and position our assets for highest
utilization, which will increase both efficiency and
effectiveness of our operations.
I would like to take this opportunity to highlight a few of
our key assets and describe how this technology furthers CBP's
capability to detect, identify, monitor, and appropriately
respond to threats in our Nation's borders.
First, our multi-role enforcement aircraft are highly
capable and equipped with sophisticated technology systems that
enable it to be effective over both land and water. These
aircraft are replacing several older single-mission assets and
enhance CBP's interdiction and investigative capabilities.
Second, beyond our borders in the source and transit zone,
CBP's P-3 long-range aircraft has been instrumental in
countering narcotic operations, transnational criminal
organizations, and vessels thousands of miles from the
homeland. I might mention, they have just completed a rewinging
of 14 aircraft, a $410 million program which came in under cost
and ahead of schedule.
Third, in the maritime environment working in conjunction
with the aviation assets, our new coastal interceptor vessels
are physically designed and engineered with the speed
maneuverability, integrity, and endurance to intercept and
engage in a variety of suspect noncompliant vessels in offshore
waters as well as the Great Lakes and on the Northern Border.
Finally, a vital component of our doing awareness is the
Intermarine Operations Center. IMOC leverages advanced
surveillance systems, integrates information from Federal,
State, local, international, law enforcement, and intelligence
sources to detect, identify, track, and direct the interdiction
of suspect criminal use of noncommercial air and maritime
conveyances approaching, crossing, or operating inside the
United States--operating inside the borders of United States
and Puerto Rico.
We work closely with our operation and acquisition
colleagues at CBP, including the DHS Science and Technology
Directorate to identify and develop surveillance and detection
technology. AMO is also working with Domestic Nuclear Detection
Office at DHS to develop and test radiological and nuclear
detection threats beyond--threats aboard our small vessels.
Chairwoman McSally, and Ranking Member Vela, and
distinguished Members of the committee, thank you for this
opportunity to discuss AMO's technology assets, capabilities,
and efforts in securing our borders. I look forward to your
questions in a few moments. Thank you.
Ms. McSally. Thank you, General Alles.
The Chair now recognizes Mr. Borkowski for 5 minutes.
STATEMENT OF MARK BORKOWSKI, ASSISTANT COMMISSIONER AND CHIEF
ACQUISITION EXECUTIVE, OFFICE OF TECHNOLOGY INNOVATION AND
ACQUISITION, U.S. CUSTOMS AND BORDER PROTECTION, U.S.
DEPARTMENT OF HOMELAND SECURITY
Mr. Borkowski. Thank you, Chairwoman McSally, Ranking
Member Vela, and distinguished Members of the committee. It is
a pleasure to be back before you.
As you suggested, Chairwoman McSally, it certainly has been
a challenging few years, and I share your frustration with the
delays. The procurement system is very frustrating, I think, to
all of us. I look forward to a discussion of that.
When I was last here before you 2 years ago, we were just
getting to the point where we were awarding contracts, and in
many cases, there were 2 years of delays in getting to those
contract awards. A number of reasons for that, some of it is
cultural, some of it is structural, but that has been a
continuing frustration. However, since that time, actually, the
performance on these contracts has been relatively good.
You cited the IFT, the Integrated Fixed Towers. As you may
recall, that contract was awarded at a 75 percent cost savings
compared to our original estimate and continues to perform
consistently with that, and has performed pretty well against
its schedule.
The remote video surveillance system is the other large
significant program in Arizona. That program also has clicked
along with--it was awarded at a reduced cost compared to our
estimate. We have already deployed 4 AORs, the fifth will be
completed by this year, and it has performed well on its cost.
The mobile surveillance capability is completely deployed
to Arizona and is now extending its deployment outside of
Arizona. That was awarded below its estimated cost and
performed on cost. In addition, those systems have delivered on
their performance.
So I think one of the things I would say is that is as an
acquisition person, I essentially have 4 degrees of freedom
that I play with: Cost, schedule, performance, and risk.
For the most part, I think we have not done well on
schedule. I would have to acknowledge that. We have failed on
schedule. We are trying to attack that. I am still looking for
more ways to do that. But on the cost, schedule, and
performance on these systems, I actually think we have done
well once we got them going.
So Arizona is well under way compared to the baseline. The
next area of emphasis on the Southwest Border has been Texas.
Because of the money we saved, we were actually able to free up
resources to do what our--they started out as pilots with DOD
reuse, Department of Defense reuse systems. I think the most
visible of those are the tactical aerostats. We now have 6
flying in Texas. We are putting up 17 of the towers that are
associated with those--with cameras and potentially radars in
areas that, frankly, would not have had technology until
probably 2018, 2019 because we were able to generate savings,
and by working with the Department of Defense, we are able to
get a little more speed in delivery.
Having said that, though, that is not the long-term plan
for Texas. The long-term plan for Texas has been remote video
surveillance systems, mobile video surveillance systems. Those
contracts are underway. The challenge in Texas has to do with
environmental land clearances, land acquisition. Those are
challenges. We are working through those, but that is an 18- to
24-month problem that we are working through.
We have gotten tremendous support from Congress on funding
for that. We are working our way through that.
Sir, Congressman Vela, with respect to the mobile video
surveillance systems, those are also, as you suggested,
designated for Texas. They are very critical there.
The current contract will provide about 127 of those. The
protest has been resolved in our favor. The contract is under
way. We expect to deliver the first 4 of those toward the end
of this year for testing, and then, over the next 2 years,
deliver 127 that will be covered under the contract.
So I think we have made some progress. Am I completely
satisfied? No. We do have some work to do in terms of, how do
we handle this very, very slow acquisition process? How do we
improve that? I look forward to discussions on that.
Having said that, I do think the programs that we have
awarded have largely been successful once we have gotten over
that procurement hump. I look forward to questions going
forward.
[The joint prepared statement of Mr. Vitiello, Mr. Alles,
and Mr. Borkowski follows:]
Prepared Statement of Ronald Vitiello, Randolph D. ``Tex'' Alles, and
Mark Borkowski
May 24, 2016
Chairwoman McSally, Ranking Member Vela, and distinguished Members
of the committee. It is a pleasure to appear before you today on behalf
of U.S. Customs and Border Protection (CBP) to discuss the acquisition
and deployment of border security technology between our Nation's ports
of entry (POE).
Along the more than 5,000 miles of border with Canada, 1,900 miles
of border with Mexico, and approximately 95,000 miles of shoreline, CBP
secures our borders and associated airspace and maritime approaches to
prevent illegal entry of people and goods into the United States. The
border environment in which CBP works is dynamic and requires continual
adaptation to respond to emerging threats and changing conditions. We
appreciate the partnership and support we have received from this
committee, whose commitment to the security of the American people has
enabled the continued deployment of advanced technology assets needed
to secure the border.
In the acquisition and deployment of border security technology,
CBP ensures that investments are effective and that procurement
processes are efficient, transparent, and compliant with Federal law
and Department of Homeland Security (DHS) policy. With all our
programs, operations, and activities, we welcome oversight and embrace
our responsibility as stewards of American taxpayer resources.
When CBP was formed in 2003, it was an organization comprised of
components that had different approaches, methods, and policies
regarding acquisition and management activities. Although our
operations had been integrated under one mission, CBP, and in a broader
context DHS, lacked a standardized and unified acquisition structure,
including governance and oversight, strong requirements development
process, and centralized resource allocation. In order to strengthen
and streamline acquisition management throughout the Department,
Secretary Johnson launched the Unity of Effort initiative, which
established a more collaborative process for decision making, including
those that shape acquisition and resource allocation.
A key element of the Unity of Effort initiative is the
establishment of the Joint Requirements Council (JRC), designed to
improve the quality and validity of the Department's requirements
generation and oversight process. The JRC creates a stronger focus
earlier in the investment life cycle--at the requirements development
stage--to better position DHS components, including CBP, to effectively
and efficiently execute acquisition strategies and budgets that
ultimately close capability gaps.
As part of this initiative, CBP is the sponsoring component for DHS
Joint Task Force West and a participating component in Joint Task Force
East and Joint Task Force for Investigations. These Joint Task Forces
are conducting the DHS Southern Border and Approaches Campaign Plan
(SBAC), launched in early 2015, which put the assets and personnel of
the Department to use in a combined and strategic way to
collaboratively plan and execute multi-component DHS operations to
better protect the border. Aimed at leveraging the range of unique
Department roles, responsibilities, and capabilities, the Campaign
enhances our operational capability to address comprehensive threat
environments in a unified way. Together, the DHS Unity of Effort
initiative and the Campaign will drive border security investments and
direct DHS resources in a much more collaborative fashion to address
the range of threats and challenges, including illegal migration,
smuggling of illegal drugs, human and arms trafficking, the illicit
financing of such operations, and threat of terrorist exploitation of
border vulnerabilities.
Our testimony today will discuss CBP's technology investments
between the POEs, highlight some of CBP's deployed border technology
assets, and describe the agency's path forward to ensure that CBP's
acquisition strategies and structure is in place to meet the challenge
of a dynamic border threat environment.
technology investments between ports of entry
For CBP, the use of technology in the border environment is an
invaluable force multiplier to increase situational awareness. Thanks
to the support of Congress, CBP continues to deploy proven, effective
technology to strengthen border security operations between the POEs--
in the land, air, and maritime environments. With enhanced surveillance
capabilities, CBP can improve its situational awareness remotely,
direct a response team to the best interdiction location, and warn the
team of any additional danger otherwise unknown along the way. As a
result, these investments increase CBP's visibility on the border,
operational capabilities, and the safety of front-line law enforcement
personnel.
It is imperative that DHS and CBP promote operational agility by
leveraging technological advances and innovative practices. A key
element of CBP's acquisition strategy, innovation is not simply the
process of buying the newest technology; rather, it is the product of a
collaborative culture that supports creativity, optimizes resource
allocation and pursues the greatest return on investment and delivery
of prioritized operational capabilities.
This committee is familiar with the outcome of CBP's SBInet
program, an earlier component of the DHS Secure Border Initiative (SBI)
that was designed as a comprehensive and integrated technology program
to provide persistent surveillance across U.S. borders. The program
experienced significant schedule delays and cost overruns because it
did not allow necessary flexibility to adapt to differing needs in the
various regions of the border. SBInet eventually delivered systems to 2
Areas of Responsibility (AORs) in Arizona that continue to operate
successfully. Nevertheless, DHS cancelled SBInet on January 14, 2011,
because it was too costly and the idea of one, all-encompassing program
was unnecessarily complex for border technology.
Since 2011, DHS and CBP have approached our border technology
requirements, ranging from small to large, simple to complex, in more
manageable pieces tailored to specific regions on the border. For
example, CBP's Arizona Technology Plan (ATP), which focuses on
technology that specifically meets the needs of border conditions in
Arizona, is the first of many phases in a multi-year effort to provide
a cost-effective mix of fixed and mobile technology across the
Southwest Border. The ATP acquisition strategy leverages ``non-
developmental'' technology to the greatest extent possible, providing
more flexible, less risky, and less costly procurements and
deployments. Using the non-developmental approach, most of the programs
within the ATP are on contract and many systems have already been
deployed. Although it is too early to declare complete success, the
early indications of the acquisition strategy are quite positive and,
in some cases, far exceed our expectations.
There is no one-size-fits-all approach to border security
technology acquisition. CBP's Office of Technology Innovation and
Acquisition (OTIA) works collaboratively with the U.S. Border Patrol
(USBP) and Air and Marine Operations (AMO) to develop requirements,
test and evaluate technology, and deploy effective technology in
support of CBP's border security mission.
Fixed, Persistent Surveillance
Integrated Fixed Tower (IFT) systems are one of the technologies
that are in the process of being acquired and deployed to the Southwest
Border in Arizona as part of the ATP. IFTs are fixed surveillance
assets that provide long-range persistent surveillance. These systems
cover very large areas and incorporate a Common Operating Picture
(COP), a central hub that receives data from one or multiple tower
units. The tower systems automatically detect and track items of
interest, and provide the COP operator(s) with the data, video, and
geospatial location of selected items of interest to identify and
classify them. In February of this year, the USBP conditionally
accepted the IFT system and is currently looking to develop
improvements for the already-deployed system.
Remote Video Surveillance Systems (RVSS) are another fixed
technology asset used in select areas along the Southwest and Northern
borders. These systems provide short-, medium-, and long-range
persistent surveillance mounted on stand-alone towers, or other
structures. The RVSS uses cameras, radio, and microwave transmitters to
send video to a control room and enables a control room operator to
remotely detect, identify, classify, and track targets using the video
feed.
Without fixed-system technology such as IFT and RVSS, the Border
Patrol's ability to detect, identify, classify, and track illicit
activity would be decreased. Fixed systems provide line-of-sight
surveillance coverage to efficiently detect incursions in flat terrain.
The Border Patrol integrates mobile and portable systems to address
areas where rugged terrain and dense ground cover may allow adversaries
to penetrate through blind spots or avoid the coverage areas of fixed
systems.
Mobile Capabilities
The border environment between the ports of entry is dynamic.
Working in conjunction with fixed surveillance assets, CBP's mobile
technology assets provide flexibility and agility to adapt to changing
border conditions and threats. Mobile technologies are deployed in
California, Arizona, New Mexico, and Texas as well as several Northern
Border locations. Along the Southwest Border, Mobile Surveillance
Capability (MSC) systems provide long-range mobile surveillance and
consist of a suite of radar and camera sensors mounted on Border Patrol
vehicles. An agent deploys with the vehicle to operate the system,
which automatically detects and tracks items of interest and provides
the agent/operator with data and video of the observed subject.
Mobile Vehicle Surveillance Systems (MVSS) provide short- and
medium-range mobile surveillance equipment mounted on telescoping masts
and consist of a suite of camera sensors mounted on Border Patrol
vehicles. An agent deploys with the system, which detects, tracks,
identifies, and classifies items of interest using the video feed. The
agent/operator observes activity on the video monitor to detect
intrusions and assist agents/officers in responding to those
intrusions.
Another system, which does not need to be mounted to a vehicle, is
the Agent Portable Surveillance System (APSS). These systems provide
medium-range mobile surveillance, and are transported by 2 or 3 agents
and mounted on a tripod. Two agents remain on-site, one to operate the
system, which automatically detects and tracks items of interest and
provides the agent/operator with data and video of selected items of
interest.
In some areas along the Southwest Border, CBP also uses Unattended
Ground Sensors (UGS), which provide short-range persistent
surveillance. These sensors support our capability to detect, and to a
limited extent, track, and identify subjects. Sensor capabilities
include seismic, passive infrared, acoustic, contact closure, and
magnetic, although these capabilities are not necessarily available in
all deployed UGS. When a ground sensor is activated, an alarm is
communicated to a data decoder that translates the sensor's activation
data to a centralized computer system in an operations center. Some UGS
are used in conjunction with Imaging Sensors (IS). The UGS/IS include
an imaging capability to transmit images or video back to the
operations center. As with UGS, UGS/IS are monitored in a centralized
system and geospatially tracked.
CBP's Tactical Aerostats and Re-locatable Towers program,
originally part of the Department of Defense (DOD) Re-use program, uses
a mix of aerostats, towers, cameras, and radars to provide Border
Patrol with increased situational awareness through an advanced
surveillance capability over a wide area. This capability has proven to
be a vital asset in increasing CBP's ability to detect, identify,
classify, and track activity.
The absence of mobile surveillance technology would limit the
Border Patrol's ability to detect, identify, classify, track, and
rapidly respond to illicit activity. These technologies not only
provide significant security benefits and multiply the capabilities of
law enforcement personnel to detect, identify, and respond to
suspicious activity, but they also assist with public safety along the
border. Mobile surveillance technology systems enable agents to
position the technology where it is needed at a specific moment, extend
our observational capabilities, and increase the accuracy and speed of
our response.
Technology is critical to border security operations. A tailored
blend of fixed, mobile, and portable surveillance systems that
complement one another increases the Border Patrol's effectiveness in
targeting a response to high-risk areas, enabling rapid response
strategies to maximize limited manpower, and adjusting to seasonal/
periodic traffic patterns.
Air and Marine Capabilities
AMO increases CBP's situational awareness, enhances its detection
and interdiction capabilities, and extends our border security zones,
offering greater capacity to stop threats prior to reaching the
Nation's shores. Through the use of coordinated and integrated
surveillance capabilities--including aviation, marine, tethered
aerostats, and integrated ground-based radars--AMO detects, interdicts,
and prevents acts of terrorism and the unlawful movement of people,
illegal drugs, and other contraband toward or across the borders of the
United States. These assets provide multi-domain awareness for our
partners across the Department, as well as critical aerial and maritime
surveillance, interdiction, and operational assistance to our ground
personnel.
AMO's maritime assets are tailored to the conditions of the threat
environment in which we operate, and equipped with the capabilities
required to interdict attempted illicit smuggling of drugs and
undocumented aliens. Often there is little time to interdict inbound
suspect vessels and AMO has honed its maritime border security response
capability around rapid and effective interception, pursuit, and
interdiction of these craft. AMO employs high-speed Coastal Interceptor
Vessels (CIV) that are specifically designed and engineered with the
speed, maneuverability, integrity, and endurance to intercept and
engage a variety of suspect non-compliant vessels in offshore waters,
as well as the Great Lakes on the Northern Border.
CBP's aerial surveillance capabilities are enhanced through recent
investments and deployments of Multi-Role Enforcement Aircraft (MEA).
The MEA has a multi-mode radar for use over water and land, an electro-
optical/infrared camera system, and a satellite communications system.
The MEA replaces several older, single-mission assets and remains the
only asset customized to provide maritime support in the near-shore
customs waters. With its sophisticated technology systems, the MEA is a
highly capable, twin-engine aircraft and a critical investment in CBP's
maritime, land, and aerial surveillance capabilities.
P-3 Long-Range Trackers and Airborne Early Warning Aircraft provide
critical detection and interdiction capability in both the air and
marine environment. Sophisticated sensors and high-endurance capability
greatly increase CBP's range to counter illicit trafficking. AMO P-3s
are an integral part of the successful counter-narcotic missions
operating in coordination with the Joint Interagency Task Force--South.
The P-3s patrol in a 42-million-square-mile area that includes more
than 41 nations, the Pacific Ocean, Gulf of Mexico, Caribbean Sea, and
seaboard approaches to the United States. In fiscal year 2015, CBP's P-
3s operational efforts led to the total seizure or disruption of more
than 204,464 pounds of cocaine with an estimated street value of $15.3
billion.
Another important asset is the DHC-8 Maritime Patrol Aircraft
(MPA). It bridges the gap between the strategic P-3 and Unmanned
Aircraft System (UAS) assets and the smaller assets providing support
in the littoral waters. This tool allows AMO an unprecedented level of
situational awareness in the Gulf of Mexico and the Caribbean.
AMO's tactical resources have also received a number of
technological upgrades to add to their utility. The AS-350 helicopter
has received avionics upgrades to allow the operators to focus more of
their attention on the mission, making them more effective. AMO has
also added detection technology to its fixed-wing light observation
aircraft, greatly increasing its tactical capabilities.
Additionally, UAS are increasingly instrumental in CBP's layered
and integrated approach to border security. The UAS consists of an
unmanned aircraft, sensors, communication packages, pilots, and ground
control operators. UAS are used to meet surveillance and other mission
requirements along the Southwest Border, Northern Border, Southeast
coastal area, and in the drug source and transit zones. Four of CBP's
UAS are equipped with Vehicle and Dismount Exploitation Radar (VADER)
sensor systems, which are capable of detecting human movement along the
ground and increase CBP aerial surveillance, enforcement, and security
to prevent potential threats from illegally entering the United States.
Since 2012, VADER has detected over 40,000 people moving across the
Southwest Border. Since 2006, this versatile platform has been credited
with interdicting/disrupting 13,144 pounds of cocaine and 321,330
pounds of marijuana worth an estimated $1.8 billion. The UAS program
has achieved over 35,900 flight hours since program inception in fiscal
year 2006.
UAS and P-3 aircraft are equipped with technology that provides
full-motion video capture and provides real-time and forensic analysis.
This advanced detection and communication system enables CBP to
disseminate images and other sensor data to operational users in real
time, increasing response effectiveness and speed.
Perhaps the most important advancements come in the area of data
integration and exploitation. Downlink technology, paired with the
BigPipe system, allows AMO to provide a video feed and situational
awareness to its law enforcement partners in real time. In addition,
the Minotaur mission integration system will allow multiple aircraft to
share information from multiple sources, providing a never-before-seen
level of air, land, and sea domain awareness. As the Minotaur system
evolves, it will provide even greater awareness for a greater number of
users.
AMO also combats airborne and maritime smuggling with an integrated
long-range radar architecture comprised of ground-based radars and
elevated radars deployed on tethered aerostats. AMO, in partnership
with DOD, operates and maintains a large network of terrestrial radars
to establish and maintain wide-area, persistent surveillance of
commercial and non-commercial aircraft flying toward, arriving at, or
passing through our borders. With the awareness generated by this
sensor network, CBP can detect and respond to air and maritime movement
anomalies that could pose a threat to our homeland, including
trafficking organizations attempting to deliver contraband across the
border by flying beneath the radar field of view of our ground-based
radars.
AMO's Tethered Aerostat Radar System (TARS) monitors the low-
altitude approaches to the United States and denies this airspace for
illicit smuggling. With 8 aerostat sites--6 along the Southwest Border,
1 in the Florida Keys, and 1 in Puerto Rico--the TARS' elevated sensor
mitigates the effect of the curvature of the earth and terrain-masking
limitations associated with ground-based radars, enabling maximum long-
range radar detection capabilities. In fiscal years 2014 and 2015 TARS
recorded nearly 1,000 suspected cross-border attempts, approximately 85
percent of all Southwest Border radar detections.
A vital component of DHS's domain awareness capabilities, CBP's Air
and Marine Operations Center (AMOC) integrates surveillance
capabilities and coordinates with other CBP operational components,
including the USBP, Federal, and international partners \1\ to detect,
identify, track, and support interdiction of suspect aviation and
maritime activity in the approaches to U.S. borders, at the borders,
and within the interior of the United States. Coordinating with
extensive law enforcement and intelligence databases and communication
networks, AMOC's command-and-control operational system, the Air and
Marine Operations Surveillance System (AMOSS), provides a single
display that is capable of processing up to 700 individual sensor feeds
and tracking over 50,000 individual targets simultaneously. The 8 TARS
sites represent approximately 2 percent of the total available radars
in AMOSS, yet were able to account for detecting 53 percent of all
suspect target detections.
---------------------------------------------------------------------------
\1\ AMOC partners include the Federal Aviation Administration
(FAA), the Department of Defense (including the North American
Aerospace Defense Command (NORAD)), and the governments of Mexico,
Canada, and the Bahamas.
---------------------------------------------------------------------------
As we continue to deploy border surveillance technology,
particularly along the Southwest Border, these investments in fixed and
mobile technology, as well as enhancements of domain awareness
capabilities provided by the AMOC allow CBP the flexibility to shift
more officers and agents from detection duties to interdiction of
illegal activities on our borders.
cbp's acquisition strategy and realignment
Since its establishment in 2010, OTIA has led CBP's acquisition
oversight and coordination efforts and has been recognized as the
primary point of contact for CBP acquisition activities. While CBP's
intent was for all mission offices' acquisition program management,
requirement development, and oversight to be integrated and
consolidated under OTIA, because of the broad scope of CBP's mission
and diversity of operating environments, the management of several of
CBP's large acquisition programs were not migrated to OTIA. However, in
the past 5 years, OTIA has aligned CBP's acquisition policies,
procedures, and practices with DHS Department standards, consolidated
CBP's acquisition governance and accountability structure, brought
multiple high-impact programs back on track, and has contracted,
deployed and sustained critical border security technology assets.
In 2015, as part of on-going headquarters realignment efforts, CBP
Commissioner R. Gil Kerlikowske engaged the Defense Acquisition
University (DAU) to provide a review and recommendations of the state
of CBP acquisition management. The key DAU alignment-related findings
and recommendations included clarifying and strengthening the Component
Acquisition Executive (CAE) independent oversight authority on behalf
of the Commissioner; separating OTIA's key roles of oversight,
requirements, and program management; and aligning programs and
accountability with operational offices. To ensure that these
recommended improvements are possible, and to ensure CBP's acquisition
construct aligns with the DHS acquisition oversight framework, CBP is
in the process of redirecting acquisition, program, and requirements
management responsibilities.
This realignment is the next step forward in building off the
achievements OTIA has made possible, including the standardization of
acquisition policies, processes, and oversight and the development of
acquisition expertise in the CBP workforce. The separation and
redistribution of CBP's acquisition functions--including requirements
development and program management--from OTIA to other areas within
CBP's operational structure, increases acquisition effectiveness and
efficiency, and strengthens agency oversight of acquisition activities.
CBP's requirements function will be managed under the Operational
Support (OS) division, where technical experts will work directly with
front-line operators in the execution of a holistic, strategy-led
requirements development program. The execution of acquisition programs
will be aligned directly under CBP's operational components--USBP, AMO,
and the Office of Field Operations--to tighten the link between
acquisition programs, users, and funding. Acquisition program
oversight, policy and procedures promulgation, and acquisition
workforce management--under the leadership of the Chief Acquisition
Officer--will be part of CBP's Enterprise Services (ES) division to
create an even stronger alignment with the DHS acquisition framework.
The realignment will result in stronger management much earlier in the
acquisition investment life cycle, increased oversight, as well as
better integration of CBP personnel and operational expertise.
CBP works closely with other elements of DHS headquarters and
fellow Department components to ensure strategy-led, operationally-
informed requirements development. In coordination with the DHS joint
requirements process, the USBP and AMO will continue to use the
Capability Gap Analysis Process (CGAP) to conduct mission analysis and
identify capability gaps. From this analysis, OS will work with USBP
and AMO to identify and plan operational requirements over the short-,
mid-, and long-term and to identify potential solutions, which may (or
may not) include fencing, roads, or other solutions depending on the
nature, scope, severity, and geographic location of a given capability
gap. AMO began C-GAP in October 2015 using best practices and lessons
learned from the USBP process. The AMO process examines aviation and
maritime mission spaces and capabilities, while taking advantage of the
analytical models and processes the USBP has established. AMO and USBP
gap analyses inform the OS-led requirements process and are prioritized
and linked to Department activities and strategies. With all
technology, CBP works closely with agents on the ground to develop
operational requirements, conduct testing and evaluation, and obtain
user feedback to ensure that the right tool is applied to the right
capability gap. Terrain, threat, socio-economic, and political
considerations vary greatly across sectors and regions, making a ``one
size fits all'' approach ineffective.
CBP works closely with the DHS Science & Technology (S&T)
Directorate to identify and develop technology to improve our
surveillance and detection capabilities along our land and maritime
borders. This includes investments in tunnel detection and tunnel
activity monitoring technology; tactical communication upgrades, Small
Unmanned Aircraft Systems (SUAS); low-flying aircraft detection and
tracking systems, land and maritime data integration/data fusion
capabilities, and border surveillance tools tailored to the Southwest
and Northern Border, including unattended ground sensors/tripwires,
upgrades for mobile Surveillance Systems, slash camera poles, and wide-
area surveillance.
In addition to collaboration with our DHS partners, as part of
CBP's efforts to seek innovative ways to acquire and use technology,
CBP formed a partnership with DOD to identify and reuse excess DOD
technology. To date, CBP has acquired several types of technology,
including thermal imaging equipment, night vision equipment, and
tactical aerostat systems, which increase CBP's situational awareness
and operational flexibility in responding to border threats. We will
continue to pursue additional opportunities to leverage DOD excess
equipment. We will do this in a sustainable way by considering the full
life-cycle costs of the DOD equipment we are considering before
acquiring it.
conclusion
Technology is a primary driver of all land, maritime, and air
domain awareness. The information obtained from fixed and mobile
surveillance systems, ground sensors, imaging systems, and other
advanced technologies enhances domain awareness, informs situational
awareness, and better enables CBP to monitor, detect, identify, and
appropriately respond to threats in the Nation's border regions.
As we look to sustain and recapitalize our border security
technology assets, we will look to the DHS joint requirement process to
validate our mission requirements and the strengthened DHS budget and
acquisition processes to ensure we have the funding and sustainment to
operate existing equipment to maximum capacity and that we receive new
assets with the capabilities we require on time and on budget.
While there is always more work to do, CBP has made significant
strides to improve acquisition planning, management, and execution.
These efforts have produced more effective governance and significant
improvements to current and future acquisitions. Going forward, CBP
will work with its DHS management partners to improve oversight;
develop and increase our acquisition workforce; and improve the
quality, timeliness, and transparency of CBP contracting processes.
Knit together by the DHS SBAC and the joint requirements processes,
CBP's acquisition and rapid deployment of technology allows us to
achieve our strategic and operational objectives in effectively and
efficiently securing U.S. borders and the approaches.
Chairwoman McSally, Ranking Member Vela, thank you for the
opportunity to testify today. We look forward to your questions.
Ms. McSally. Thank you, Mr. Borkowski.
The Chair now recognizes Ms. Gambler for 5 minutes.
STATEMENT OF REBECCA GAMBLER, DIRECTOR, HOMELAND SECURITY AND
JUSTICE, U.S. GOVERNMENT ACCOUNTABILITY OFFICE
Ms. Gambler. Good afternoon, Chairwoman McSally, Ranking
Member Vela, and Members of the subcommittee. I appreciate the
opportunity to testify at today's hearing to discuss GAO's work
reviewing DHS's efforts to acquire and deploy various
technologies and other assets along U.S. borders. DHS has
employed a variety of assets in its efforts to secure the
Southwest Border, including various land-based surveillance
technologies, unmanned aerial systems, or UAS, and tactical
aerostats.
My remarks today will summarize some of GAO's past work on
management and oversight of various surveillance technologies.
I will also share some preliminary observations from our on-
going work for this subcommittee reviewing CBP's use of UAS and
tactical aerostats.
First, GAO has issued numerous reports on DHS's efforts to
plan for, deploy, and manage land-based surveillance
technologies under the former Secure Border Initiative and the
current Arizona Border Surveillance Technology Plan.
CBP has made progress in deploying programs under the plan,
including fixed and mobile surveillance systems, agent portable
devices, and ground sensors, and these technologies have aided
CBP's border security efforts. However, we have also reported
that CBP could do more to strengthen its management of the plan
and technology programs and better assess the contributions of
surveillance technologies to apprehensions and seizures.
For example, CBP has previously experienced delays in some
of its surveillance technology programs, and CBP's planned
dates for initial and full operational capability for the
Integrated Fixed Towers, for example, have slipped by several
years.
We have previously reviewed CBP's schedules and life-cycle
cost estimates for the highest-cost programs under the plan,
and compared them to best practices. Overall, the schedules and
estimates for the plans programs reflected some, but not all
best practices, and we found that CBP could take further action
to better ensure the reliability of its schedules and cost
estimates by more fully applying those best practices.
CBP has taken steps towards addressing our recommendations
in these areas, such as recently providing us with updated
schedules for some of the planned programs, and we will be
reviewing them going forward to determine the extent to which
they address our recommendation.
Further, CBP has identified the mission benefits of its
surveillance technologies such as improved situational
awareness and agent safety. CBP has also begun requiring Border
Patrol to record data within its database on whether or not an
asset, such as a camera, assisted in apprehension or seizure.
These are positive steps toward helping CBP assess the
contributions of its surveillance technologies to border
security. However, CBP needs to develop and implement
performance measures and analyzing data it is now collecting to
be able to fully assess the contributions of its technologies
to border security.
Second, with regard to UAS and tactical aerostats, based on
our on-going work for the subcommittee, CBP is currently
operating 9 Predator B aircraft from 4 locations across the
country. These aircraft may be equipped with video and radar
sensors, and they are used for a variety of functions,
including patrol missions to support Border Patrol and other
law enforcement agencies and to monitor natural disasters, like
wildfires or floods.
CBP operates the aircraft in designated airspace, and more
than 80 percent of flight hours from fiscal years 2011 to 2015
were associated with designated air space along border and
coastal areas.
CBP also operates 6 tactical aerostats along the border in
South Texas, as Mr. Borkowski mentioned, and these aerostats
assist Border Patrol in apprehension and seizures.
CBP's use of both UAS and tactical aerostat can be affected
by various factors, such as airspace access and weather.
In closing, we are continuing to examine CBP's use of UAS,
tactical aerostats, and other assets and technologies as part
of our on-going work. We will also continue to follow up on
actions taken by CBP in response to our recommendations for
improving management and measurement of technologies deployed
under the Arizona Border Surveillance Technology Plan,
This concludes my oral statement, and I am happy to answer
any questions Members may have.
[The prepared statement of Ms. Gambler follows:]
Prepared Statement of Rebecca Gambler
May 24, 2016
gao highlights
Highlights of GAO-16-671T, a testimony before the Subcommittee on
Border and Maritime Security, Committee on Homeland Security, House of
Representatives.
Why GAO Did This Study
CBP employs surveillance technologies, UAS, and other assets to
help secure the border. For example, in January 2011, CBP developed the
Arizona Border Surveillance Technology Plan, which includes 7
acquisition programs related to fixed and mobile surveillance systems,
among other assets. CBP has also deployed UAS, including Predator B
aircraft, as well as tactical aerostats to help secure the border. In
recent years, GAO has reported on a variety of CBP border security
programs and operations.
This statement addresses: (1) GAO findings on DHS's efforts to
implement the Arizona Border Surveillance Technology Plan and (2)
preliminary observations related to GAO's on-going work on CBP's use of
UAS and tactical aerostats for border security. This statement is based
on GAO products issued from November 2011 through April 2016, along
with selected updates conducted in May 2016. For on-going work related
to UAS, GAO reviewed CBP documents and analyzed Predator B flight-hour
data from fiscal years 2011 through 2015, the time period when all
Predator B centers became operational. GAO also conducted site visits
in Texas and Arizona to view operation of Predator B aircraft and
tactical aerostats and interviewed CBP officials responsible for these
operations.
What GAO Recommends
GAO has previously made recommendations to DHS to improve its
management of plans and programs for surveillance technologies and DHS
generally agreed.
border security.--dhs surveillance technology, unmanned aerial systems
and other assets
What GAO Found
GAO reported in March 2014 and April 2015 that U.S. Customs and
Border Protection (CBP), within the Department of Homeland Security
(DHS), had made progress in deploying programs under the Arizona Border
Surveillance Technology Plan (the Plan), but could take additional
actions to strengthen its management of the Plan and its related
programs. Specifically, in March 2014 GAO reported that CBP's schedules
and life-cycle cost estimates for the Plan and its 3 highest-cost
programs--which represented 97 percent of the Plan's total estimated
cost--met some but not all best practices. GAO recommended that CBP
ensure that its schedules and cost estimates more fully address best
practices, such as validating cost estimates with independent
estimates, and DHS concurred. As of May 2016, CBP has initiated or
completed deployment of technology for each of the 3 highest-cost
programs under the Plan, and reported updating some program schedules
and cost estimates. For example, in May 2016, CBP provided GAO with
complete schedules for 2 of the programs, and GAO will be reviewing
them to determine the extent to which they address GAO's
recommendation. GAO also reported in March 2014 that CBP had identified
mission benefits of technologies under the Plan, such as improved
situational awareness, but had not developed key attributes for
performance metrics for all technologies, as GAO recommended in
November 2011. As of May 2015, CBP had identified a set of potential
key attributes for performance metrics for deployed technologies and
expected to complete its development of baselines for measures by the
end of 2015. In March 2016, GAO reported that CBP was adjusting the
completion date to incorporate pending test and evaluation results for
recently-deployed technologies under the Plan.
GAO's on-going work on CBP's use of unmanned aerial systems (UAS)
for border security shows that CBP operates 9 Predator B aircraft in
U.S. airspace in accordance with Federal Aviation Administration (FAA)
requirements. Specifically, CBP's Air and Marine Operations operates
the aircraft in accordance with FAA certificates of waiver or
authorization for a variety of activities, such as training flights and
patrol missions to support the U.S. Border Patrol's (Border Patrol)
efforts to detect and apprehend individuals illegally crossing into the
United States between ports of entry. Predator B aircraft are currently
equipped with a combination of video and radar sensors that provide
information on cross-border illegal activities to supported agencies.
CBP data show that over 80 percent of Predator B flight hours were in
airspace encompassing border and coastal areas from fiscal years 2011
through 2015. CBP officials stated that airspace access and hazardous
weather can affect CBP's ability to utilize Predator B aircraft for
border security activities. GAO's on-going work shows that CBP has
deployed 6 tactical aerostats--relocatable unmanned buoyant craft
tethered to the ground and equipped with cameras for capturing full-
motion video--along the U.S.-Mexico border in south Texas to support
Border Patrol. CBP operates 3 types of tactical aerostats, which vary
in size and altitude of operation. CBP officials reported that airspace
access, hazardous weather, and real estate (e.g., access to private
property) can affect CBP's ability to deploy and utilize tactical
aerostats. Border Patrol has taken actions to track the contribution of
tactical aerostats to its mission activities.
Chairwoman McSally, Ranking Member Vela, and Members of the
subcommittee: I am pleased to be here today to discuss the Department
of Homeland Security's (DHS) efforts to acquire and deploy various
technology and assets to secure U.S. borders. Within DHS, U.S. Customs
and Border Protection's (CBP) U.S. Border Patrol (Border Patrol) is the
Federal agency with primary responsibility for securing the National
borders between U.S. ports of entry (POE).\1\ CBP's Air and Marine
Operations (AMO) has primary responsibility for detecting,
interdicting, and preventing acts of terrorism and the unlawful
movement of people, illegal drugs, and other contraband toward or
across U.S. borders utilizing aviation and maritime assets. In the last
3 fiscal years, over 70 percent of all annual apprehensions of illegal
entrants by Border Patrol have occurred along the Arizona and south
Texas borders.\2\ Seizures of marijuana and cocaine (in pounds) along
the Arizona and south Texas borders reported by Border Patrol, as a
percentage of all annual seizures, has ranged between 88 to 91 and 24
to 55 percent over the last 3 years, respectively.\3\
---------------------------------------------------------------------------
\1\ Ports of entry are facilities that provide for the controlled
entry into or departure from the United States. Specifically, a port of
entry is any officially designated location (seaport, airport, or land
border location) where DHS officers or employees are assigned to clear
passengers and merchandise, collect duties, and enforce customs laws,
and where DHS officers inspect persons applying for admission into the
United States pursuant to U.S. immigration law.
\2\ These apprehensions were reported by CBP for fiscal years 2013
through 2015 in the Tucson, Laredo, and Rio Grande Valley Border Patrol
sectors.
\3\ These seizures of marijuana and cocaine (in pounds) were
reported by CBP for fiscal years 2013 through 2015 in the Tucson,
Laredo, and Rio Grande Valley Border Patrol sectors.
---------------------------------------------------------------------------
DHS has employed a variety of technology and assets to assist with
its efforts to secure the border. For example, in November 2005, DHS
announced the launch of the Secure Border Initiative (SBI) program,
which was responsible for developing a comprehensive border protection
system using technology, known as the Secure Border Initiative Network
(SBInet). In January 2011, in response to internal and external
assessments that identified concerns regarding the performance, cost,
and schedule for implementing the systems, the Secretary of Homeland
Security announced the cancellation of further procurements of SBInet
systems. After the cancellation of SBInet, CBP developed the Arizona
Border Surveillance Technology Plan (the Plan), in January 2011, which
includes a mix of radars, sensors, and cameras to help provide security
for the Arizona border to support Border Patrol. Additionally, AMO
operates a fleet of air and marine assets in support of Federal border
security efforts, including surveillance through Predator B unmanned
aerial systems (UAS).\4\ CBP also operates tactical aerostats along the
border, which are relocatable unmanned buoyant craft tethered to the
ground and equipped with surveillance technologies.
---------------------------------------------------------------------------
\4\ CBP uses the term ``unmanned aircraft systems'' for these
assets. A UAS is composed of a remotely piloted aircraft, a ground
control station, a digital network, and other ground support equipment
and personnel required to operate and maintain the system.
---------------------------------------------------------------------------
Over the years, we have reported on the progress and challenges DHS
faces in implementing its border security efforts. My statement
discusses our findings on: (1) DHS's efforts to implement the Arizona
Border Surveillance Technology Plan and (2) preliminary observations
related to our on-going work for this subcommittee on the use of UAS
and tactical aerostats for border security.
This statement is based on reports and testimonies we issued from
2011 through April 2016 that examined DHS efforts to secure the U.S.
border. It also includes selected updates we conducted in May 2016 on
DHS's efforts to address our previous recommendations related to its
Arizona Border Surveillance Technology Plan. Our reports and
testimonies incorporated information we obtained and analyzed from
officials from various DHS components. More detailed information about
our scope and methodology can be found in our reports and testimonies.
For the updates on our Arizona Border Surveillance Technology Plan
work, we reviewed documents from DHS on actions it has taken to address
findings and recommendations made in our prior reports on which this
statement is based.
For on-going work related to UAS, we analyzed CBP policies,
reports, requirements, and Predator B flight-hour data from fiscal year
2011 through 2015, covering the time period when all Predator B centers
became operational. We also interviewed CBP officials responsible for
Predator B and tactical aerostat operations. To assess the reliability
of Predator B flight hour data, we reviewed guidance for reporting
flight hours, interviewed CBP officials about their policies and
procedures related to tracking flight hours, and compared monthly
report data with data from other CBP flight hour reports. We found the
data were sufficiently reliable for the purposes of reporting how CBP
allocates its Predator B flight hours. As part of our on-going work, we
also conducted site visits to Arizona in February 2016 and south Texas
in March 2016 where we observed Predator B and tactical aerostat
operations and interviewed CBP officials that operate and utilize these
assets.
We conducted our past and on-going work in accordance with
generally accepted Government auditing standards. Those standards
require that we plan and perform the audit to obtain sufficient,
appropriate evidence to provide a reasonable basis for our findings and
conclusions based on our audit objectives. We believe that the evidence
obtained provides a reasonable basis for our findings and conclusions
based on our audit objectives.
cbp has made progress in implementing the arizona border surveillance
technology plan, but could take additional actions to strengthen
management of the plan
CBP Has Initiated or Completed Deployment of Technologies Under the
Plan and Has Taken Actions To Update Program Schedules and Cost
Estimates
In March 2014 and April 2015, we reported that CBP had made
progress in deploying programs under the Arizona Border Surveillance
Technology Plan, but that CBP could take additional action to
strengthen its management of the Plan and the Plan's programs.\5\ As of
May 2016, CBP has initiated or completed deployment of technology to
Arizona for each of the programs under the Plan.\6\ Additionally, as
discussed further below, CBP has reported taking steps to update
program schedules and life-cycle cost estimates for the 3 highest-cost
programs under the Plan. For example, in May 2016, CBP provided us with
complete schedules for 2 of the programs, and we will be reviewing them
to determine the extent to which they address our recommendation.
---------------------------------------------------------------------------
\5\ GAO, Arizona Border Surveillance Technology Plan: Additional
Actions Needed to Strengthen Management and Assess Effectiveness, GAO-
14-368 (Washington, DC: Mar. 3, 2014), and Homeland Security
Acquisitions: Major Program Assessments Reveal Actions Needed to
Improve Accountability, GAO-15-171SP (Washington, DC: Apr. 22, 2015).
\6\ The Plan's 7 acquisition programs include fixed and mobile
surveillance systems, agent portable devices, and ground sensors. Its 3
highest-cost programs, which represent 97 percent of the Plan's
estimated cost are the Integrated Fixed Tower (IFT), Remote Video
Surveillance System (RVSS), and Mobile Surveillance Capability (MSC).
The IFT consists of towers with, among other things, ground
surveillance radars and surveillance cameras mounted on fixed (that is,
stationary) towers. The RVSS includes multiple color and infrared
cameras mounted on monopoles, lattice towers, and buildings and differs
from the IFT in, among other things, the RVSS does not include radars.
The MSC is a stand-alone, truck-mounted suite of radar and cameras that
provides a display within the cab of the truck.
---------------------------------------------------------------------------
In March 2014, we found that CBP had a schedule for deployment of
each of the Plan's 7 programs, and that 4 of the programs would not
meet their originally-planned completion dates. We also found that some
of the programs had experienced delays relative to their baseline
schedules, as of March 2013.\7\ Further, in our March 2016 assessment
of DHS's major acquisitions programs,\8\ we reported on the status of
the Plan's Integrated Fixed Tower (IFT) program, noting that from March
2012 to January 2016, the program's initial and full operational
capability dates had slipped.\9\ Specifically, we reported that the
initial operational capability date had slipped from the end of
September 2013 to the end of September 2015, and the full operational
capability to the end of September 2020. We also reported that this
slippage in initial operational capability dates had contributed to
slippage in the IFT's full operational capability--primarily as a
result of funding shortfalls--and that the IFT program continued to
face significant funding shortfalls from fiscal year 2016 to fiscal
year 2020.
---------------------------------------------------------------------------
\7\ The baseline schedule is to represent the original
configuration of the program plan and to signify the consensus of all
stakeholders regarding the required sequence of events, resource
assignments, and acceptable dates for key deliverables. The current
schedule is to represent the actual plan to date.
\8\ GAO, Homeland Security Acquisitions: DHS Has Strengthened
Management, but Execution and Affordability Concerns Endure, GAO-16-
338SP (Washington, DC: Mar. 31, 2016).
\9\ Initial operational capability is defined as the deployment of
7 IFT systems in the area of responsibility for the Nogales Border
Patrol station. Full operational capability is defined as deployment of
the IFT system in the additional areas of responsibility of the
Sonoita, Douglas, Ajo, Casa Grande, and Wellton Border Patrol stations.
---------------------------------------------------------------------------
Despite these delays, as of May 2016 CBP reported that it has
initiated or completed deployment of technology to Arizona for each of
the 3 highest-cost programs under the plan--IFT, the Remote Video
Surveillance System (RVSS), and the Mobile Surveillance Capability
(MSC). Specifically, CBP officials stated that MSC deployments in
Arizona are complete and that in April 2016, requirements to transition
sustainment from the contractor to CBP had been finalized. CBP also
reported that the RVSS system has been deployed, and testing on these
systems is on-going in 4 out of 5 stations. Further, CBP reported it
had initiated deployment of the IFT systems and as of May 2016 has
deployed 7 out of 53 IFTs in one area of responsibility. CBP
conditionally accepted the system in March 2016 and is working to
deploy the remaining IFT unit systems to other areas in the Tucson
sector.
With regard to schedules, we previously reported that CBP had at
least partially met the 4 characteristics of reliable schedules for the
IFT and RVSS schedules and partially or minimally met the 4
characteristics for the MSC schedule. Scheduling best practices are
summarized into 4 characteristics of reliable schedules--comprehensive,
well-constructed, credible, and controlled (i.e., schedules are
periodically updated and progress is monitored).\10\ We assessed CBP's
schedules as of March 2013 for the 3 highest-cost programs and reported
in March 2014 that schedules for 2 of the programs at least partially
met each characteristic (i.e., satisfied about half of the criterion),
and the schedule for the other program at least minimally met each
characteristic (i.e., satisfied a small portion of the criterion).\11\
For example, the schedule for the IFT program partially met the
characteristic of being credible in that CBP had performed a schedule
risk analysis for the program, but the risk analysis did not include
the risks most likely to delay the project or how much contingency
reserve was needed. For the MSC program, the schedule minimally met the
characteristic of being controlled in that it did not have valid
baseline dates for activities or milestones by which CBP could track
progress. We recommended that CBP ensure that scheduling best practices
are applied to the IFT, RVSS, and MSC schedules. DHS concurred with the
recommendation and stated that CBP planned to ensure that scheduling
best practices would be applied, as outlined in our schedule assessment
guide, when updating the 3 programs' schedules. In May 2016, CBP
provided us with complete schedules for the IFT and RVSS programs, and
we will be reviewing them to determine the extent to which they address
our recommendation.
---------------------------------------------------------------------------
\10\ GAO, GAO Schedule Assessment Guide: Best Practices for Project
Schedules, GAO-16-89G (Washington, DC: Dec. 2015). We developed this
guide through a compilation of best practices that Federal agencies and
industry use. According to this guide, for a schedule to be
comprehensive, among other things, the schedule should: (1) Capture all
activities, as defined in the work breakdown structure; (2) reflect
what resources are needed to do the work; and (3) establish the
duration of all activities and have specific start and end dates. To be
well-constructed, among other things, a schedule should have all of its
activities sequenced in the order that they are to be implemented with
the most straightforward logic possible. To be credible, the schedule
should reflect the order of events necessary to achieve aggregated
products or outcomes, and activities in varying levels of the schedule
map to one another. Moreover, a schedule risk analysis should be
conducted to predict a level of confidence in meeting the program's
completion date. For a schedule to be controlled, the schedule should
be updated periodically using actual progress and logic to
realistically forecast dates for program activities, and a baseline
schedule should be maintained to measure, monitor, and report the
program's progress.
\11\ GAO-14-368.
---------------------------------------------------------------------------
In March 2014, we also found that CBP had not developed an
Integrated Master Schedule for the Plan in accordance with best
practices. Rather, CBP had used separate schedules for each program to
manage implementation of the Plan, as CBP officials stated that the
Plan contains individual acquisition programs rather than integrated
programs. However, collectively these programs are intended to provide
CBP with a combination of surveillance capabilities to be used along
the Arizona border with Mexico, and resources are shared among the
programs. According to scheduling best practices, an Integrated Master
Schedule is a critical management tool for complex systems that involve
a number of different projects, such as the Plan, to allow managers to
monitor all work activities, how long activities will take, and how the
activities are related to one another. We concluded that developing and
maintaining an Integrated Master Schedule for the Plan could help
provide CBP a comprehensive view of the Plan and help CBP better
understand how schedule changes in each individual program could affect
implementation of the overall plan.
We recommended that CBP develop an Integrated Master Schedule for
the Plan. CBP did not concur with this recommendation and maintained
that an Integrated Master Schedule for the Plan in one file undermines
the DHS-approved implementation strategy for the individual programs
making up the Plan, and that the implementation of this recommendation
would essentially create a large, aggregated program, and effectively
create an aggregated ``system of systems.'' DHS further stated that a
key element of the Plan has been the disaggregation of technology
procurements. However, as we noted in the 2014 report, collectively
these programs are intended to provide CBP with a combination of
surveillance capabilities to be used along the Arizona border with
Mexico. Moreover, while the programs themselves may be independent of
one another, the Plan's resources are being shared among the programs.
We continue to believe that developing an Integrated Master Schedule
for the Plan is needed. Developing and maintaining an Integrated Master
Schedule for the Plan could allow CBP insight into current or
programmed allocation of resources for all programs as opposed to
attempting to resolve any resource constraints for each program
individually.
In addition, in March 2014, we reported that the life-cycle cost
estimates for the Plan reflected some, but not all, best practices.
Cost-estimating best practices are summarized into 4 characteristics--
well-documented, comprehensive, accurate, and credible. Our analysis of
CBP's estimate for the Plan and estimates completed at the time of our
review for the 2 highest-cost programs--the IFT and RVSS programs--
showed that these estimates at least partially met 3 of these
characteristics: Well-documented, comprehensive, and accurate. In terms
of being credible, these estimates had not been verified with
independent cost estimates in accordance with best practices. We
concluded that ensuring that scheduling best practices were applied to
the programs' schedules and verifying life-cycle cost estimates with
independent estimates could help better ensure the reliability of the
schedules and estimates, and we recommended that CBP verify the life-
cycle cost estimates for the IFT and RVSS programs with independent
cost estimates and reconcile any differences. DHS concurred with this
recommendation, but stated then that it did not believe that there
would be a benefit in expending funds to obtain independent cost
estimates and that if the costs realized to date continued to hold,
there may be no requirement or value added in conducting full-blown
updates with independent cost estimates.
We recognize the need to balance the cost and time to verify the
life-cycle cost estimates with the benefits to be gained from
verification with independent cost estimates. CBP officials stated that
in fiscal year 2016, DHS's Cost Analysis Division would begin piloting
DHS's independent cost estimate capability on the RVSS program.
According to CBP officials, this pilot is an opportunity to assist DHS
in developing its independent cost estimate capability and that CBP
selected the RVSS program for the pilot because the program is at a
point in its planning and execution process where it can benefit most
from having an independent cost estimate performed as these
technologies are being deployed along the Southwest Border, beyond
Arizona. CBP officials stated that details for an estimated independent
cost estimate schedule and analysis plan for the RVSS program have not
been finalized. CBP plans to provide an update on the schedule and
analysis plan as additional details become available, and provide
information on the final reconciliation of the independent cost
estimate and the RVSS program cost estimate once the pilot has been
completed at the end of fiscal year 2017. Further, CBP officials have
not detailed similar plans for the IFT. We continue to believe that
independently verifying the life-cycle cost estimates for the IFT and
RVSS programs and reconciling any differences, consistent with best
practices, could help CBP better ensure the reliability of the
estimates.\12\
---------------------------------------------------------------------------
\12\ GAO, 2015 Annual Report: Additional Opportunities to Reduce
Fragmentation, Overlap, and Duplication and Achieve Other Financial
Benefits, GAO-15-404SP (Washington, DC: Apr. 14, 2015).
---------------------------------------------------------------------------
CBP Has Made Progress Toward Assessing Performance of Surveillance
Technologies, but Has Not Fully Applied Performance Metrics or
Assessed the Contributions of Its Technologies
We reported in March 2014 that CBP had identified mission benefits
of its surveillance technologies to be deployed under the Plan, such as
improved situational awareness and agent safety. However the agency had
not developed key attributes for performance metrics for all
surveillance technologies to be deployed as part of the Plan, as we
recommended in November 2011.\13\ Further, in March 2014, we found that
CBP did not capture complete data on the contributions of these
technologies, which in combination with other relevant performance
metrics or indicators, could be used to better determine the impact of
CBP's surveillance technologies on CBP's border security efforts, and
inform resource allocation decisions. Although CBP had a field within
its Enforcement Integrated Database for data on whether technological
assets, such as SBInet surveillance towers, and nontechnological
assets, such as canine teams, assisted or contributed to the
apprehension of illegal entrants and seizure of drugs and other
contraband, according to CBP officials, Border Patrol Agents were not
required to record these data. This limited CBP's ability to collect,
track, and analyze available data on asset assists to help monitor the
contribution of surveillance technologies, including its SBInet system,
to Border Patrol apprehensions and seizures and inform resource
allocation decisions. We recommended that CBP require data on asset
assists to be recorded and tracked within its database, and once these
data were required to be recorded and tracked, that it analyze
available data on apprehensions and technological assists--in
combination with other relevant performance metrics or indicators, as
appropriate--to determine the contribution of surveillance technologies
to CBP's border security efforts. CBP concurred with our
recommendations and has implemented one of them. Specifically, in June
2014, CBP issued guidance informing Border Patrol Agents that the asset
assist data field within its database was now a mandatory data field.
Agents are required to enter any assisting surveillance technology or
other equipment before proceeding.
---------------------------------------------------------------------------
\13\ See GAO-14-368, and Arizona Border Surveillance Technology:
More Information on Plans and Costs Is Needed before Proceeding, GAO-
12-22 (Washington, DC: Nov. 4, 2011).
---------------------------------------------------------------------------
Further, as of May 2015, CBP had identified a set of potential key
attributes for performance metrics for all technologies to be deployed
under the Plan. However, CBP officials stated that this set of
performance metrics was under review as the agency continued to refine
the key attributes for metrics to assess the contributions and impacts
of surveillance technology on its border security mission.\14\ In our
March 2016 update on the progress made by agencies to address our
findings on duplication and cost savings across the Federal Government,
we reported that CBP had modified its time frame for developing
baselines for each performance measure and that additional time would
be needed to implement and apply key attributes for metrics. According
to CBP officials, CBP expected these performance measure baselines to
be developed by the end of calendar year 2015, at which time the agency
planned to begin using the data to evaluate the individual and
collective contributions of specific technology assets deployed under
the Plan. Moreover, CBP planned to use the baseline data to establish a
tool that explains the qualitative and quantitative impacts of
technology and tactical infrastructure on situational awareness in
specific areas of the border environment by the end of fiscal year
2016. While CBP had expected to complete its development of baselines
for each performance measure by the end of calendar year 2015, as of
March 2016 the actual completion is being adjusted pending test and
evaluation results for recently deployed technologies on the Southwest
Border. Until CBP completes its efforts to fully develop and apply key
attributes for performance metrics for all technologies to be deployed
under the Plan, it will not be well-positioned to fully assess its
progress in implementing the Plan and determining when mission benefits
have been fully realized.
---------------------------------------------------------------------------
\14\ GAO-15-404SP.
---------------------------------------------------------------------------
cbp utilizes unmanned predator b aircraft and tactical aerostats for a
variety of border security activities
Preliminary Observations on CBP's Utilization of Predator B Aircraft
Our on-going work shows that as of May 2016, CBP operates 9
Predator B from 4 AMO National Air Security Operations Centers (NASOC)
located in Sierra Vista, Arizona; Grand Forks, North Dakota; Corpus
Christi, Texas; and Jacksonville, Florida.\15\ Three Predator B
aircraft are assigned to the NASOCs in Arizona, North Dakota, and Texas
while the NASOC in Florida remotely operates Predator B aircraft
launched from the other NASOCs. AMO began operation of Predator B
aircraft in fiscal year 2006, and all 4 NASOCs became operational in
fiscal year 2011. See figure 1 for a photograph of a CBP Predator B
aircraft.
---------------------------------------------------------------------------
\15\ AMO's NASOCs perform specialized missions Nation-wide and in
the Caribbean, eastern Pacific, and Central America, using Predator B,
long-range patrol aircraft, and other aircraft. From 2010 to 2013, AMO
operated a NASOC in Cape Canaveral, Florida, for UAS operations.
CBP's Predator B aircraft may be equipped with video and radar
sensors utilized primarily to support the operations of other CBP
components, and Federal, State, and local law enforcement agencies.\16\
CBP's Predator B operations in support of its components and other law
enforcement agencies include patrol missions to detect the illegal
entry of goods and people at and between U.S. POEs and investigative
missions to provide aerial support for law enforcement activities and
investigations. For example, CBP's Predator B video and radar sensors
support Border Patrol activities to identify and apprehend individuals
entering the United States between POEs. CBP collects and tracks
information on the number of assists provided for apprehensions of
individuals and seizures of contraband, including narcotics, in support
of law enforcement operations by Predator B aircraft. In addition,
CBP's Predator B aircraft have been deployed to provide aerial support
for monitoring natural disasters such as wildfires and floods. For
example, CBP's Predator B were deployed in 2010 and 2011 to support
Federal, State, and local Government agencies in response to flooding
in the Red River Valley area of North Dakota.
---------------------------------------------------------------------------
\16\ Predator B sensors include: Electro-optical and infrared
camera that collects full-motion video, Vehicle and Dismount
Exploitation Radar (VADER) which collects radar images of moving
objects, synthetic-aperture radar that collects radar images that show
terrain and structures and allow for analysis to detect change over
time, and SeaVue radar which collects radar images of maritime vessels.
---------------------------------------------------------------------------
CBP's Predator B aircraft operate in the U.S. National airspace
system in accordance with Federal Aviation Administration (FAA)
requirements for authorizing all UAS operations in the National
Airspace System.\17\ In accordance with FAA requirements, all Predator
B flights must comply with a Certificate of Waiver or Authorization
(COA). The COA-designated airspace establishes operational corridors
for Predator B activity both along and within 100 miles of the border
for the Northern Border, and along and within 25 to 60 miles of the
border for the Southern Border, exclusive of urban areas. COAs issued
by FAA to CBP also include airspace for training missions which involve
take-offs and landings around a designated NASOC and transit missions
to move Predator B aircraft between NASOCs. As of May 2016, CBP has
utilized the NASOC in North Dakota as a location to train new and
existing CBP Predator B pilots. For our on-going work, we analyzed CBP
data on reported Predator B COA-designated flight hours from fiscal
years 2011 to 2015 and found that 81 percent of flight hours were
associated with COA-designated airspace along border and coastal areas.
For more information on Predator B flight hours in COA-designated
airspace, see figure 2.
---------------------------------------------------------------------------
\17\ See Federal Aviation Administration, Notice N JO 7210.889:
Unmanned Aircraft Operations in the National Airspace System (Oct. 27,
2015). The National Airspace System is the network of United States
airspace that includes the interconnected and interdependent network of
systems, procedures, facilities, aircraft, and people.
Based on our on-going work, we found that airspace access and
weather can impact CBP's ability to utilize Predator B aircraft.
According to CBP officials we spoke with in Arizona, Predator B flights
may be excluded from restricted airspace managed by the Department of
Defense along border areas which can affect the ability of Predator B
to support Border Patrol. CBP officials we spoke with in Arizona and
Texas told us that Predator B missions are affected by hazardous
weather conditions that can affect their ability to operate the
aircraft. According to CBP officials we spoke with in Texas, CBP took
steps to mitigate the impact of hazardous weather in January and
February 2016 by deploying one Predator B aircraft from Corpus Christi,
Texas, to San Angelo, Texas, at San Angelo Regional Airport which had
favorable weather conditions. CBP's deployment of a Predator B at San
Angelo Regional Airport was in accordance with a FAA-issued COA to
conduct its border security mission in Texas and lasted approximately 3
weeks. We plan to evaluate how these factors affect CBP's utilization
of Predator B aircraft as part of our on-going work.
Preliminary Observations on CBP's Utilization of Tactical Aerostats in
South Texas
Our on-going work shows that as of May 2016, CBP has deployed 6
tactical aerostats along the U.S.-Mexico border in south Texas to
support Border Patrol. Specifically, CBP deployed 5 tactical aerostats
in Border Patrol's Rio Grande Valley sector and 1 tactical aerostat In
Laredo sector. CBP utilizes 3 types of tactical aerostats equipped with
cameras for capturing full-motion video: Persistent Threat Detection
System (PTDS), Persistent Ground Surveillance System (PGSS), and Rapid
Aerostat Initial Deployment (RAID). Each type of tactical aerostat
varies in size and altitude of operation. See figure 3 for a photograph
of a RAID aerostat. CBP owns the RAID aerostats and leases PTDS and
PGSS aerostats through the Department of Defense. CBP operates its
tactical aerostats in accordance with FAA regulations through the
issuance of a COA.\18\
---------------------------------------------------------------------------
\18\ See 14 C.F.R. pt. 101. These rules govern operation in the
United States of, among other things, any balloon that is moored to the
surface of the earth or an object thereon and that has a diameter of
more than 6 feet or a gas capacity of more than 115 cubic feet. Id. at
101.1(a)(1).
Tactical aerostats were first deployed and evaluated by CBP in
August 2012 in south Texas. CBP's Office of Technology Innovation and
Acquisition manages aerostat technology and the operation of each site
through contracts, while Border Patrol Agents operate tactical aerostat
cameras and provide security at each site. As of May 2016, Border
Patrol has taken actions to track the contribution of tactical
aerostats to its mission activities. Specifically, agents track and
record the number of assists aerostats provide for apprehensions of
individuals and seizures of contraband and narcotics.
Based on our on-going work, we found that airspace access, weather,
and real estate can impact CBP's ability to deploy and utilize tactical
aerostats in south Texas.
Airspace access.--Aerostat site placement is subject to FAA
approval to ensure the aerostat does not converge on dedicated
flight paths.
Weather.--Aerostat flight is subject to weather
restrictions, such as hazardous weather involving high winds or
storms.
Real estate.--Aerostat sites utilized by CBP involve access
to private property and land owner acceptance, and right of
entry is required prior for placement. In addition, CBP must
take into consideration any relevant environmental and wildlife
impacts prior to deployment of a tactical aerostat, such as
flood zones, endangered species, migratory animals, among
others.
We plan to evaluate how these factors affect CBP's utilization of
tactical aerostats as part of our on-going work.
Chairwoman McSally, Ranking Member Vela, and Members of the
subcommittee, this concludes my prepared statement. I will be happy to
answer any questions you may have.
Ms. McSally. Thanks, Ms. Gambler.
I now recognize myself for 5 minutes for questions.
I want to start off with Ms. Gambler. Are you familiar with
our Border Security Technology Accountability Act?
Ms. Gambler. I am, yes, Chairwoman.
Ms. McSally. Can you share, from your perspective and your
expertise, and whether that is going to assist in any of the
challenges that you have raised in the past and continue to be
issues?
Ms. Gambler. Absolutely. That bill is very consistent with
the findings and messages from GAO's prior work looking at
CBP's efforts to deploy surveillance technologies. For example,
the bill calls for making sure that technologies have
acquisition program baselines in place, that the programs are
monitored according to cost schedule and performance, and those
address a number of the key findings that we have had related
to CBP's technology programs. I might also add that it is
reflective of leading practices and best practices for
acquisition management.
Ms. McSally. Great. Thank you.
I just want to say, again, this has unanimously passed in
the House. It is being held up in the Senate. It was reported
out of committee. I mean, we are hearing, you know, rumors that
it is being held up because our colleagues don't want us to
have a win on any border security issue. I hope from, just your
comments today and looking at the bill, that they would realize
that this is a win for the taxpayers; this is a win for our
improvement and processes for it being able to secure our
border, and I hope we can get past the partisan bickering, and
actually move this thing forward so we can put it into force.
Okay. Next question I want to ask, really, Chief Vitiello,
General Alles, Mr. Borkowski. As I opened up, I mentioned, I
think, some of the initiatives you are doing are increasing a
good common operational picture and providing good information
that might be good for intelligence assessment to understand,
kind-of, you know, where the cartels are operating. But if we
are not getting it into the agent's hand, if they are not
getting the information that the people back in the operation
center have, then, you know, we still have more steps to make,
right? So that they can, not have information overload, but
actually have the best situation awareness possible.
So of the technologies mentioned, or maybe some that are
under development, which ones are actually in the hands of the
agents that are out there intercepting the activity, or are
they getting information over a radio? I want to--I just want
to have a sense of, like, where they are in getting that
information and what other initiatives might be in the pipeline
in order to improve situation awareness for the agents that are
out there?
Mr. Vitiello. Thanks for that question.
A lot of what the agents, and what we have invested in, and
what we have been able to take from the DOD reuse, are
association with the Department of Defense to take some of
their excess material and equipment and put that in the hands
of agents. So, obviously, the things that they use, the
terminal binoculars, the long-range assistance to their vision,
those are all hand-held. Some of those are truck-mounted, so
those are all in the hands of the agents. So the agents that
are operating that equipment can, in real time, inform response
teams that are deployed with them in close proximity, the
towers, the cameras, the RVSS. There is a combination of some
of that being deployed at the sector level. So there is a
command center in Tucson where the sector is, and that activity
is then dispatched for response in that location.
Ms. McSally. But is that by voice? That is what I am trying
to get at. You might have a ground sensor; you have got a
predator flying; you have got the information from the IFTs. We
have perfect situational awareness in the command center.
Again, I have been there in the military, where you understate
exactly where the traffic is, but then you are telling the poor
guy, poor gal on the run on a radio, like, here is what is
happening. Are there tools that is actually getting that
situation awareness to the agent that is not just a voice call?
Mr. Vitiello. Yes. So it is via voice, but there are
precise measurements being taken by the hits that the sensors
get on the aircraft. Our own towers, our own sensors are
deployed. All of that material and those sensors are geo-
referenced, and the agents are getting precise details about
where that activity is occurring, and then the classification,
you know, what kind of threat do they face, how big are the
groups, et cetera, that does go over voice to them. But they
are deployed in that same proximity as well.
So there is a balance that has to be struck in terms of how
much goes over the air and how much they get in their--in their
hands as far as using tablets and all those kinds of things. We
are doing some experiments about getting the information closer
to them as it is occurring. There is also an information stream
that they need to be aware of. Right? So when the
classification comes through, that they prioritize the threat
information versus just activity writ large.
Ms. McSally. Great.
Is there anything, Mr. Borkowski, in the works? Again, when
I was flying my A-10, I am actually talking to guys on the
ground that are seeing what I am seeing, my targeting pod, so
their situational awareness increased.
Mr. Borkowski. We are clearly, as you suggest, getting
kind-of, demand for, give me blue force tracking, give me the
picture that the camera is showing. We don't have that today.
There are a couple of reasons. One is we don't have the
infrastructure to send it. So that is one of the things we are
struggling with.
Having said that, both with DHS and with DOD, which has
some of these technologies, our agents have been exposed and
are piloting those things. I still have to figure out how to
get the pipe, you know, to send it. But we are creating a
demand from that. We are looking at technologies that DOD has.
We have a project with DHS and border security awareness, which
will look at this question. We have to handle the pipeline.
One other thing I would add is, one of the things that
broke badly on SBInet was there was a tremendous investment in
this particular question that was not tightly defined. We
actually had to pull away from that in order to build the
hardware. Now that we have the hardware, we believe we are
starting to get a tighter definition. But you are right. We
need to crack that. There are a couple things that are really
in the way. The biggest one that bothers me is the bandwidth to
get the signal across.
Ms. McSally. Yes. Okay. Thank you.
All right, we are going to do a couple of rounds here, but
I wanted to give opportunity for others, including the Ranking
Member of the full committee.
Mr. Thompson. Thank you, Madam Chair, and thank you,
Ranking Member.
Some of us have been around a little while, and we have
seen procurements come and go. I guess I will ask Ms. Gambler:
Your review of the systems, can you share with the committee
your analysis of whether or not we are getting better at
procurements? Or we are about where we have been all the time?
Ms. Gambler. I think in this area, as it relates to border
security, I think there has been some progress made, even
relative to what we reported on 2 years ago as it relates to
technologies under the Arizona Surveillance Technology Plan.
CBP has been updating their schedules for some of the
programs. They--what is called rebaselined the IFT program late
last year. They are working on piloting an independent cost
estimate for the RVSS program. So I think in certain areas,
Ranking Member Thompson, they have made progress. I think there
are still some key areas where we would like to see some
additional progress, including for them to be able to assess
what they are getting out of the systems. We are also, as we
are starting some new work in these areas interested to see the
results of some of the testing that's been done on the systems
that has been recently deployed. So that is still, I think, an
open question for us.
Mr. Thompson. Thank you. I would--Mr. Borkowski, were you
around with SBInet?
Mr. Borkowski. Yes. I was brought in to try to clean up
SBInet, but yes, I was around for----
Mr. Thompson. So you know where I am going, right?
Mr. Borkowski. I have a suspicion, sir.
Mr. Thompson. Can you tell me if your clean-up has been
complete? Can you give the committee assurance that the
missteps made with SBInet won't be made again?
Mr. Borkowski. Well, I could never assure you that we would
never make another misstep. I can tell you that the odds of
such a misstep are much lower, the risk of such a misstep is
much lower than it was.
We learned a lot from SBInet, and you know, we accommodated
as much of that lesson as we could into this process. Having
said that, we are still in the process of training people to be
skilled acquisition program managers. They are getting better,
but we are still in the process of training people.
We are still----
Mr. Thompson. How much of a reliance--excuse me. Are we
relying on outside contractors to do that? Have we been able to
pull that capacity within the organization?
Mr. Borkowski. We do have contractors supporting us, but we
have built organic, you know, Government employee skills that
probably did not exist 4 years ago.
So we do have program managers who are skilled. I wish I
had more of them. I think that is part of the challenge is
having enough people to meet all of the demands. So we have a
mix of contractors, but in the past, we were much more reliant
on those contractors to augment our own lack of skills. We have
spent a great deal of time, both in CBP and in DHS in building
up the Government employee workforce skills.
Mr. Thompson. So is building up the Government workforce
capacity an issue of you not being able to find the people, or
you don't have the money if you found them, to employ them?
Mr. Borkowski. I think it is both. But there are people out
there. The money is a challenge. We compete, obviously, for
Border Patrol Agents, CBP Officers, and frankly, if you had to
ask what the priority is, I think it is Border Patrol Agents
and CBP Officers. So we compete. We come after that, as I think
we should. Money is an issue. There is also the hiring process
is very long for a whole variety of reasons.
So when we do identify people, sometimes it is very
difficult for them to wait out the hiring process. So there are
those kinds of issues as well.
Mr. Thompson. So how long does it take to hire somebody?
Mr. Borkowski. It can take a year-plus in some cases,
depending on where--you know, how many people are in the queue.
We are talking about Border Patrol Agents, CBP Officers, our
own mission support people. We have background investigations.
There are a whole bunch of people who are competing for the
resources to do background investigations, so it could be
months, and go to a year.
Mr. Thompson. Have you highlighted your lack of being able
to get people in a reasonable period of time as one of the
weaknesses in the operation?
Mr. Borkowski. I think as CBP corporately has spent a great
deal of time on that question and issue about being able to
hire people. Yes, sir.
Mr. Thompson. Madam Chair, I think at some point, we might
order from a human resources standpoint look at it, because all
of us running the people all the time who are very qualified,
who want to work for the Government----
Mr. Borkowski. Yes.
Mr. Thompson [continuing]. But if you tell them it takes a
year, something like that, we ought to be able to come up with
a better way of vetting people and getting them into the
system.
Mr. Borkowski. I agree.
Mr. Thompson. I guess the last point is, it costs more to
have outside contractors, right?
Mr. Borkowski. Not always, sir. It is actually a case-by-
case, so not always. But I believe it is--if I had my druthers,
I would have kind of a 2-1 ratio, Government-to-outside
contractors, and right now I am about 50-50. There are some
skills that are very difficult to get, frankly, at Government
salaries, but it depends. It is not always cheaper to have
Government than contractors. It depends on case-by-case.
Mr. Thompson. So you wanted two-thirds or one-third?
Mr. Borkowski. My sense is that would be about ideal. The
reason for that is I want the capacity to, first of all have,
surge, right? Government employees are good, steady state. I
want to be able to surge, and contractor employees are very
good for that.
The other reason that I think contractors sometimes help is
there are some very kind of scarce highly technical skills that
are more accessible through contractors in many cases than
through Government employees.
Mr. Thompson. Thank you, Madam Chair.
Ms. McSally. Thanks. I want to thank the Ranking Member of
the full committee.
In our last hearing here in the District of Columbia, we
highlighted some of these manning issues for the CBP Officers
at the port of entry. It took about 18 months. The Border Jobs
for Veterans Act, which we passed, such as my bill, supposed to
fast-track our veterans. The goal would be 90 days, but there
is still a lot of work to do and lot of concerns and
challenges. But, really, everybody on the subcommittee and
across the committee that we have heard, so I think we still
have a lot of work to do.
Mr. Thompson. Right. I am just trying to make sure that we
don't lose sight of the fact that that process is still--and
what have you, and I would like my full statement to be
admitted into the record.
Ms. McSally. Without objection. Thank you, Ranking Member.
Ms. McSally. The Chair now recognizes the Ranking Member of
the subcommittee, Mr. Vela.
Mr. Vela. So General Alles, what can you tell us about the
issues in Corpus Christi with the predator being the weather?
Mr. Alles. So for Corpus Christi, sir, that actually, for
the predator overall, weather is a challenge for the system.
Generally, it runs about a 20 percent higher cancellation
rate than our manned aircraft for weather. So one of the
efforts we are making currently, system-wide, is we are working
with General Thomas on our automatic take-off and landing
system which will improve the cross limitation of the aircraft.
That is one. Then, second, we are looking at working out of
divert fields, for instance, we used San Angelo this last year
that are better winter weather operating locations. We have
also deployed the asset to the transit zone during the
wintertime. We get more effective operation out of the
platform. We have two platforms right now in Columbia and
Barranquilla operating. So that is how we look at the
challenges there in Corpus Christi. We get efficiencies out of
the site. It is a P-3 site also, so the P-3 pilots not only fly
the P-3, but they fly the predator UAS at the same time. That
is a great efficiency force in terms of operations, and if we
split those sites up, we lose that efficiency. So that is how
we tackled it so far, sir.
Mr. Vela. So is the fog the issue basically, or----
Mr. Alles. Generally, it is ceilings. In the wintertime I
went through flight school actually in Kingsville, and I
remember on many days sitting there playing AC/DC in the
waiting room while the fog and whatever it was hung over. So
getting out of that kind of coastal interference zone, I think
is advantageous. San Angelo has been a good location.
Our challenge, honestly, has been the FAA there. We have
worked through those issues with them. They are very adverse to
us operating out of civilian airfields. That is the first time
an unmanned aircraft has operated out of a civilian airfield.
That has worked well.
Mr. Vela. Now, with respect to these tactical aerostats,
how are you dealing with the landowners?
Mr. Vitiello. So all of the sites need preparatory work, a
little bit of what my colleague, Mr. Borkowski, said as it
relates to our towers, real estate acquisition and permission
to enter lands, et cetera. So all of the sites that are
operating now are within--in conjunction with the landowners.
Sometimes that is via a lease, sometimes that is a different
kind of agreement. But it is all structured and scheduled so
that they are aware of our presence. So far, we haven't had any
challenges. It was difficult to move a couple of ones that were
up north. There was a couple operational decisions, we wanted
to move the ones closer to the border because of their effect,
and the efficiency that the agents were getting, but all is
going well so far.
Mr. Vela. So, Chief, I think you are well aware of the
challenges that we have on the other side of the border in
Tamaulipas, Mexico with respect to cartel activity,
kidnappings, and murders that have, you know, the State's
deteriorated, over, you know, the last several years. What I am
curious about, is there anything that we can do from your
standpoint, technologically, to help in that area?
Mr. Vitiello. It is a difficult challenge. We feel bad for
the people who are a part of those communities. It is such--it
is unfortunate that they face that situation. I think as it
relates to help from here is to strengthen our relationship and
provide Mexico with the mentorship, sharing of best practices,
mechanisms to exchange information quickly, and then support
their efforts to reform their domestic and their Federal law
enforcement.
Mr. Vela. So following up on that, what kind of shared
practices are you currently using with law enforcement in
Mexico?
Mr. Vitiello. In its best form, we have programs underway
under the border violence prevention protocols. It is a
systematic way for us to sit down and understand where the
violence is taking place, what it means to our deployments at
the border, between the ports and at the ports as well, and
then sharing information where it is critical and then it is--
in a deployment form, we do joint patrols with authorities in
Mexico, in places where we know that violence or smuggling is
occurring. It is a great benefit for them to have us close by
on our side and then doing the same in Mexico. Those have
worked out very well when they have the resources available to
do it.
Mr. Vela. Well, thank you.
Before I yield, I would just add that I agree with, Madam
Chair, with your perspective on the use of veterans. I think we
need to have a much more robust approach around the country
with respect to educating our veterans about the availability
of these jobs. I think it is something that I surely look
forward to working with you on.
Ms. McSally. I agree with the Ranking Member. As long as it
doesn't take 18 months for them to get a job. If we can get to
that in less than 90 days and while they are still on active
duty, that would be ideal. We have to keep working on that bill
being implemented for the intent that it was supposed to be. So
I appreciate it.
The Chair now recognizes Mr. Rogers from Alabama.
Mr. Rogers. Thank you, Madam Chairwoman.
I want to revisit this issue of the aerostats. Can you tell
me how many aerostats you have in--that are deployed at
present?
Mr. Vitiello. We have 6 deployed in the South Texas area.
Mr. Rogers. Are they the same model or version or do they
differ?
Mr. Vitiello. There are 2 separate versions, they are both
what we call the tactical version. They are both supported by
mobile towers that also work the border environment that give
us cameras and----
Mr. Rogers. What do you mean supported by mobile towers? I
see the tower on the truck here. Does that have to go somewhere
closer to the aerostats?
Mr. Vitiello. The aerostats, it is a deployment package.
They come with towers that could be put up remotely. So when
the envelope is flying, when the balloon is up in the air, it
has sensors hanging off of it, the EOIR and day cameras, high-
definition cameras, and then there are towers that support in
the area as well that can monitor the border for us that----
Mr. Rogers. They receive signals from the aerostat?
Mr. Vitiello. The signals go to a small command post, and
then the information that is obtained there is then dispatched
to response units in the field.
Mr. Rogers. So it doesn't go to the truck that is carrying
the tower?
Mr. Vitiello. So there are other vehicles that we have that
are Government equipment that are not DOD reuse; the MVSS, the
MSS, which are--have similar equipment on masks in the back of
mobile vehicles. Those are operated by Border Patrol Agents,
who can then obtain the information from the screens and then
distribute it via radio to response teams as well.
Mr. Rogers. Are all 6 of the aerostats deployed at present?
Mr. Vitiello. They are.
Mr. Rogers. How long do they stay up?
Mr. Vitiello. There is maintenance that is required,
recurring maintenance that is required. We are constantly
evaluating the readiness rate. They have to be brought down to
change envelopes when something happens, when the wind is too
high, things like that. But, generally, I think we talked about
the other day, they are in the neighborhood of 80 percent up
time, so while they are available. They are available 80
percent of the time that they are deployed. But there are
conditions which cause us to either do maintenance or bring
them down for weather events, et cetera.
Mr. Rogers. Are you keeping these in a particular sector?
Mr. Vitiello. Right now they are deployed in South Texas,
in what we call the Rio Grande Valley sector, which is the
McAllen Rio Grande City area. They are there because as my
colleague, Mr. Borkowski, said because we have a planned
deployment there for integrated fixed towers for RVSS, for
planned mobile trucks, et cetera. That stuff has to catch up
our work on the ground to get those sites ready to purchase
land, to do the environmental work is underway. In the mean
time, we have deployed the aerostats to fill that gap given the
activity levels that are in that part of the border.
Mr. Rogers. Are all 6 of these from the DOD?
Mr. Vitiello. They are all DOD reuse equipment that we have
gotten from them.
Mr. Rogers. Are there any remaining DOD aerostats available
that you have not accepted?
Mr. Vitiello. I believe they have more, but I am not aware
of any that they have that we are actually asking for. I think
we have 2 that we are getting ready to deploy elsewhere.
Mr. Borkowski. Sir, there are--there are 3--3 incarnations
of this, 2 large ones. DOD owns them, has not accessed them,
but basically leases them to us. The smaller ones, which are
called Raid. We own, I think, 8 of them. Two of them are
deployed, so we have additional ones in storage. We also have
towers that we can deploy independently of the Raid. So there
are additional aerostats available that we have in storage.
They cost, in like $3 million a year to run, so we are pretty
judicious in how we apply them and where we apply them, but we
do have smaller ones.
Mr. Rogers. Do you have a need for more than the 6?
Mr. Vitiello. We prefer to deploy the mobile technology
that is on its way to us.
Mr. Rogers. Why?
Mr. Vitiello. Excuse me?
Mr. Rogers. Why?
Mr. Vitiello. The aerostats are a good gap filler. We see
them as a temporary asset. We may not continue to use them in
south Texas as the technology plan, the fuller requirement gets
deployed. We will take them and use them in a place where the
technology has to catch up. So they are a good gap filler. But
because of the expense of their operation, operations and
maintenance is quite high, so we are looking forward to a time
where we have a more permanent infrastructure that is not
dependent on the kinds of costs that these bring to us.
Mr. Rogers. All of these are tethered, correct?
Mr. Vitiello. They are.
Mr. Rogers. At what altitude?
Mr. Vitiello. I believe there is one that is at 1,800 feet,
and the other one is something less than that, 12----
Mr. Borkowski. The smaller ones are around 1,000 feet.
Mr. Rogers. Have you all considered using some of the non-
tethered aerostats, then they can loiter for a longer periods
of time?
Mr. Borkowski. Like essentially blimps?
Mr. Rogers. Correct. The Marines use those?
Mr. Borkowski. We have looked at that. Right now, and the
problem is we probably have to buy those. Those haven't been
assessed. The advantage of these tethered aerostats, is that
although we have to pay the operation and maintenance, we
didn't actually have to buy the aerostat; we didn't have to buy
the tower; we didn't have to buy the camera. That is why these
were so attractive to us, and they seem to be the sensible
thing for the time being.
Mr. Rogers. One of the reasons I am so focused on these, is
in my trips to the Southwest Border, we have had just a world
of trouble with cameras, whether cameras on poles or trucks or
whatever. To my knowledge, those problems still exist. Also, I
like the fact that they are up high, and you can see further
across the border where there is people gathering.
So I am just curious, and this would be my final question,
I know my time has expired: What is the downside?
Mr. Borkowski. There are two. One is the cost. We are
trying to drive those costs down. But it is $3 million or more
for the bigger ones a year for these things.
The second thing is that they are very weather-dependent.
The Chief talked about 80 percent, but there are times of the
year where we can have availability down to 60 percent
depending on the weather. So you really have to kind-of have to
trade their availability for the mission and their cost. So our
sense is that there are probably areas where aerostats will
make sense, but they are probably not the right long-term
solution. We are using them like very high towers, as you
suggested. And there are areas where they see over foliage, but
in the areas where we are using them, we actually think the
lower cost, more permanent, more highly-available fixed
infrastructure makes more sense for the long term. We are still
studying where the aerostats might have a long-term future, but
it will probably be in spots.
Mr. Rogers. I won't ask any more questions, but I would,
Madam Chairwoman, like to, at some point, revisit the idea of
micro sats to see if they are using any of those.
With that, I yield back.
Ms. McSally. The gentleman yields.
The Chair now recognizes Ms. Torres of California for
questions for 5 minutes.
Mrs. Torres. Thank you, Chairwoman.
How is CBP measuring the effectiveness of the technology
deployed at the border, and what matrix are used and how does
that compare over time?
Mr. Vitiello. So we are collecting all--several elements of
what you might call output measures, the number of arrests that
have been made, how often in a particular area, agency
assaults, the kinds of seizures that are being made, and we
look at that in conjunction with the kinds of deployments that
exist in those areas. As our colleague from the GAO reported,
we are looking at systems that allow us at the time of arrest,
as we are recording activity, to then attribute the--when there
is a seizure or an arrest made, attribute the assist of the
technology in those areas. Over time, you can start to look at
the effect of certain kinds of deployments and how they
contribute to seizures and arrests. That way, we can see which
are the most valuable kinds of assets and how they are deployed
or whether we need to make changes to those deployments.
Mrs. Torres. So over time, is this technology going to be
able to utilize over actual manpower?
Mr. Vitiello. So we--our experience is, is that when we
deploy in an area with the technology, be it mobile or fixed,
we start to see more activity, because we turn the
information--the information is more available. You know more
about an area once these deployments occur. So there is usually
more activity in the beginnings of those deployments.
But over time, smuggling patterns change. The activity
changes, the arrest and the effectiveness of the deployments of
the agents themselves and the responses start to change that
activity, and the smugglers look for other locations to enter
in. So we have seen that sort of a spike in activity in the
immediate aftermath of a robust deployment, and then we see the
traffic shift and move, and then we--that is why it is
important to have these gap fillers, that is why it is
important to have mobile technology so we can be assured to be
in the right place at the right time.
Mrs. Torres. I understand that they are--there is a need to
make a serious commitment, financial commitment, and it is
going to be a lot more--it is a lot more costlier in the
beginning, but over time, you know, my question really is, is
it smart to spend this much money upfront? Are we going to save
it in having actual personnel costs, you know, a few years down
the road, and how long? Are we really looking at that, at those
statistics?
Mr. Vitiello. When you look at where we have gotten to on
how we decided on the deployment, the Arizona Technology Plan
is one, our plans for the other border deployments, we looked
at--and Mark can speak more precisely about the analysis of
alternatives--we looked at which technologies would be most
advantageous. We used our experience and the feedback from
users to decide in the CGAP process what technologies to use.
But you are going to have to have--it is our opinion and
our experience that you are going to have to have a mix. It
might be more expensive on the front end to install the
technology, but over time you see benefits of that. Sometimes
that is fewer deployments in particular areas so that we can
use the workforce more efficiently.
Mrs. Torres. Yeah. Over time, I can see where you can
modify equipment a lot easier than personnel habits.
How is CBP defining situational awareness and operational
control?
Mr. Vitiello. So, on the situational awareness side, we are
looking at the border in a couple of different ways.
Situational awareness, as defined, is us being able to
understand what is happening, have a predictive analysis, like,
know where particular areas of the border are going to be
problematic or where we know we are going to have traffic, and
then have the kind of assets that are available, technology and
the resources, agents on the line, in those locations to give
ourselves real-time information about what is going on in that
area.
Mrs. Torres. Are all of these metrics that you are
utilizing public, made public, this information?
Mr. Vitiello. So, on the CBP site, the CBP.gov, there are
output statistics about the kinds of activities, arrests. Those
are usually posted at the end of each month, and so people can
see that there.
Mrs. Torres. So this is where the public can better
understand whether these investments are actually paying out in
ensuring, you know, that we are minimizing the number of
crossings?
Mr. Vitiello. So the statistics that are typically on the
site don't attribute the work to the technology. It is more
sort of an output measure of what is happening month by month.
Mrs. Torres. Okay.
Thank you.
Ms. McSally. All right. Great. I am going to continue on
with another round here. I have a lot of questions now that I
have you all here.
So I want to follow up, the Arizona Technology Plan, when
fully complete--well, let me start with this, actually, Chief
Vitiello. Our first hearing I had when I took over, you stated
that, of the 2,000 miles of the border, you have situational
awareness of about 56 percent of that border, Southern Border,
right now.
So for the Arizona Technology Plan, what percentage of
that, of the miles of the Arizona border, did we have
situational awareness of? Then, when complete, when it is fully
rolled out, are we going to have 100 percent situational
awareness so if it moves we see it, when the whole plan is
implemented?
Mr. Vitiello. Yeah, so last time I was here I might not
have been as precise as I wanted to be as it relates to
situational awareness.
The 56 percent measure, at that time--and this changes
quarter by quarter--was the areas of the border where the
deployment itself advises the workforce, advises the response
agents, advises us of what is happening in real time. So, at
that time, about 56 percent of the border had a deployment that
was responsive enough to know in real time when activity
occurred at the border.
So a response in real time--within, you know, a shift,
agents knew about an entry and were able to mount a response.
Ms. McSally. Okay. So I think maybe that is a definition
issue. To me, that is operational control. Situational
awareness is, if you see it--I mean, if it moves, you see it.
That is, like, you know, metric No. 1. The second metric is,
when you see it, you can get to it and stop it. That is the
operational control piece, right?
So we were just trying to get a sense of, of the 2,000
miles of the border, if it moves and it is coming across the
border, it is trying to breach, you actually see it. You may
not be able to get to it, but you at least see it. So is there
a different number that is not 56 percent?
Mr. Vitiello. What we are trying do in this state of the
border reporting that we are putting in our system and using
for things like CGAP and using to inform our deployments, there
is a level of situational awareness across the entire border.
So the 56 percent number, that is happening in real time; the
sensors, the agents themselves, the deployments are picking up
that activity in real time and being able to respond to it.
The rest of the border, we are using other technology to
monitor it regularly, but there is not an immediate response in
each of those cases. That other part of the border, where we
are using GEOINT, where we are using change detection to
monitor the border, it is not solely that. We have other
methods of being able to monitor what is going on in those
areas. But there is not necessarily a deployment or a sensor
that picks up that activity. It is more of this change
detection, using the UAS, using other assets to monitor the
border.
But I would say that, as it relates to situational
awareness, how we see it, each and every zone of the border has
some level of monitoring that occurs in it, whether it be our
assets directly deployed, whether it be the community informing
us of things that are going on or our own assets that are doing
a monitoring that verify to us that there is or isn't activity
going on.
Ms. McSally. Okay. Yeah, I think we just have different
definitions of situational awareness. I mean, I appreciate that
some of the VADER stuff and change detection you are doing is,
after the fact, being able to look back and kind of see some of
the changes that have happened, which is really important for
intelligence and, you know, predictive analysis and all that.
Again, I am just a fighter pilot, and I am just trying to
get down to, like, a simple metric of, if it is breaching, if
it is about to cross the border, we see it in real time. In
2,000 miles of the border, where do we have--we may not be able
to get to it, we may lose it, but we see it happening real
time.
So, I mean, I don't want to waste a lot of time going back
and forth on this, but I think that is one of the frustrations,
I would say, of this committee and definitely of my
constituents, is we don't know what the answer is as far as
what can we see and then what can we actually get to? The price
of drugs on the street is the best indication that supply and
demand--there is still a lot of stuff that is getting through.
I think that is fair enough.
I think you said it yourself. Once we deploy technology, we
all of a sudden see all the stuff that we didn't see before. It
is not that they just started coming; it is just you can now
see it. Is that a fair statement?
Mr. Vitiello. I think it is fair as it relates to the state
of the border reporting and when we are using the GEOINT and
when we are using our own deployments.
Ms. McSally. Yep.
Mr. Vitiello. So it is accurate to say that the 56 percent
number, that is a real-time deployment, so we know when it is
happening in real time and can respond directly.
Ms. McSally. Okay.
Mr. Vitiello. In those other parts of the border, you may
or may not need that kind of deployment, but, in the aggregate,
you are aware of what is occurring over time.
Ms. McSally. Okay.
So, going back to my original question, when the Arizona
Technology Plan is complete--which I definitely want to make
sure I understand when that is going to be complete, based on
all the different parts of it--what level of, what you are
kind-of calling situational awareness, but I guess what I am
calling operational control--like, what will you be able to--
real-time, you can see it moving across the border, what
percentage of the, I think it is, you know, 360 miles of the
Arizona border--it is the Arizona Technology Plan, so you are
focusing on better technology for situational awareness in the
Arizona border. What is the end goal? What is the end state?
Mr. Vitiello. So that deployment is informed by agents on
the ground that know how the technology works and know our own
tactics for deployment and are aware of what the threat picture
is. So, when those AORs are complete, we will have 100 percent
monitoring of that border and being able to react in real time
to all activity.
Now, there are limits to the technology. There are deep
canyons. You have been to these places in Nogales where it is
really difficult to see on the ground even with the technology.
Ms. McSally. Right.
Mr. Vitiello. But those deployments are designed for us to
be 100 percent successful.
Ms. McSally. Okay. So 100 percent is the goal.
So can you give me the time line of when all of the
elements of the Arizona Technology Plan will be complete, as of
right now?
I don't know if that is for you to answer or you, Mr.
Borkowski.
Mr. Vitiello. I think Mark is probably better----
Ms. McSally. Okay.
Mr. Vitiello [continuing]. To tell us the precise detail.
Mr. Borkowski. The long and short of it is we believe
Arizona will be done by fiscal year 2019.
Ms. McSally. The end of fiscal year 2019?
Mr. Borkowski. Yes.
Ms. McSally. Okay.
Mr. Borkowski. That is due to 2 specific areas of
responsibility in the Tohono O'odham Nation. Except for those,
the remote video surveillance system will be done by the end of
this year; 3 out of the 5 AORs in Arizona for IFT will be done
by the end of fiscal year 2017. Then it is those 2 areas of the
Tohono O'odham Nation that lag in getting complete.
Ms. McSally. Okay.
Just for expectations, too, for our constituents, in this
fiscal year, what else is going in? I mean, the ranchers I was
talking to last week----
Mr. Borkowski. Right.
Ms. McSally [continuing]. You know, the IFTs--can we just
get a rundown of what is going in this fiscal year?
Mr. Borkowski. Sure. So all of the remote video
surveillance system, which are cameras and towers, the last
area for that is Yuma. That is the last one to go in. That will
be done by the end of this year.
For IFT, we are starting Douglas. Douglas should be
complete toward the end of this year. Sonoita will start going
contract this summer, so it should be done in about a year from
that. So those are the key activities going on between now and,
say, the summer of 2017.
Ms. McSally. Okay.
So, fiscal year 2019, if everything is on track, the
Arizona Technology Plan will be complete.
I know, Ms. Gambler, one of the points that you have
pointed out is there has not been an integrated schedule. They
have been sort of the piecemeal schedule. Is that still
something you think is needed for the Arizona Technology Plan
or for additional plans moving forward in Texas or other areas?
Ms. Gambler. Yeah, two points there, Chairwoman McSally.
No. 1, we still continue to believe that an integrated
master schedule for the whole plan would help CBP better
oversee the extent to which it is completing all of the
programs under the plan within expected time frames. I know CBP
disagrees with that. We continue to believe in that
recommendation.
Second, as I mentioned earlier, for 2 of the programs under
the plan, CBP has updated their schedules just for those
programs. We will be looking at those 2 schedules going
forward--we just recently received them--to see the extent to
which they meet best practices, which has been some of our
other recommendations. So, again, that is sort of an open
question for us, but it is progress that they have updated the
schedules.
Ms. McSally. Great. Thank you.
I want to switch to a different topic, which is the use of
tactical unmanned aerial systems or aerial vehicles. I know we
talked about this in the first hearing I held.
I realize the Predator provides situational awareness sort-
of at the operational or strategic level, but there are tools
that are out there that we are currently using in the military
where the agents could launch something that gives them
situational awareness tactically.
I know you all mentioned that it is being looked into, but
can I get a very specific answer as to whether there is a
requirement and a move to provide tactical UAVs to our agents
on the ground to improve situational awareness?
Mr. Vitiello. So we do have an operational requirements
document. So the Border Patrol at CBP, our partners in CBP writ
large are convinced that this is a technology that needs to go
into the hands of agents. We have made an operational
requirements document, sort-of the official recognition of
that. We are working with OTIA to understand what resources are
available and how we would deploy them. We are in discussions
with CBP Air and Marine to make sure that we are not in
conflict as it relates to the airspace issues.
Then we have 2 projects, the same project underway with the
Department of Homeland Security Science and Technology
Directorate, in which they have helped us identify what
resources are available, what the limitations for some of that
resource is, so we can start to narrow on which platforms will
be available to us.
We are in discussions for a memorandum of understanding
with the FAA on the certificate of authorization. Again, that
is part of the deconfliction piece. We are in a relationship
with Naval Systems Command about contracting vehicles and about
their own experience and best practices with using these
elements.
We believe that we are very well on our way to start these
deployments, because we think they are necessary for agents in
the field.
Ms. McSally. I agree.
Is one of the options--I don't know if there is any excess
property from the DOD. Is one of the options excess property or
just manufacturing capabilities that already are being deployed
with the DOD as opposed to reinventing the wheel?
Mr. Vitiello. So we are narrowing with S&T on what they
call the RVSS program to decide which of the things are
available either through DOD or through other vehicles for us
to use.
Ms. McSally. So what is the time line we are looking at for
that?
Major General Alles, you can jump in.
Then, Ms. Gambler, I want to make sure there is a--you
know, we don't want to have lessons identified that are
actually lessons learned from past procurement buffoonery. So
is this going along based on the lessons learned from previous
procurement issues?
General Alles, do you want to pipe in?
Mr. Alles. I was just going to mention one. We are going to
do a near-term program with Border Patrol soon. But that is
really to develop a COA in a particular area and apply the
technology and see how it works before we move forward to any
kind of procurement. So that would be step 1 in the process.
Just to note, the main problem here is the FAA still. So we
can probably work out a COA and carve out a piece of airspace
to work these smaller platforms in, but there are still no
rules issued to actually operate these things, big picture,
across the board. That still is coming and needs to be taken
care of.
Ms. McSally. Okay. Great.
Ms. Gambler.
Ms. Gambler. Yep, this is something that we are touching on
as part of some of our on-going work, looking at, you know,
this kind of small UAS program. So that is something we can
certainly follow up with you on and try to give you some more
information on going forward.
But it will be, you know, important for them to proceed,
you know, in line with kind-of good acquisition management, you
know, good testing, best practices, to ensure that, you know,
to the extent that they do end up deploying some type of a
system, that it meets requirements and that it is rolled out
according to cost, schedule, and performance expectations.
Ms. McSally. Great. Thank you.
I know I mentioned it last time, but Cochise College in
southern Arizona is co-located there, and they have a great UAV
program on the civilian side. They really want to have a
conversation to partner on anything that might be rolled out,
just to be able to, you know--not again having to reinvent
training schools and operations that they already have on-
going.
So I just want to lay that out there again, that I think
these types of innovative partnerships like that would be
really important if you are rolling anything like that forward.
I want to switch to ultralight detection. I think it was my
first week in office, when I went back home, I got a full day
with the Border Patrol team in the Tucson sector, to include a
Black Hawk ride where a radar picked up a potential ultralight
crossing, and we flew around in circles trying to find it. I
was helping looking out the window, using my fighter pilot
eyes, trying to help. It was like, you know, a needle in a
haystack. It is impossible, as you know, very difficult to be
able to detect these low-flying lightweight ultralights.
You know, the intended program to address that pretty much
failed. So is there any additional technologies and programs we
are looking at in order to solve this problem of the ultralight
detection?
Mr. Borkowski. Yes.
First of all, the ultralight threat when we started was
high-urgency. So we went after this program that was not
successful. If the ultralight threat were as urgent as it was,
though, we would probably use those, because they actually
could detect the ultralights; it is just they were very labor-
intensive.
So we are looking for options to that. The urgency for the
program is not as high as it was, but one of the things we are
looking at is a DOD reuse system. There is a----
Ms. McSally. Why is it not urgent anymore?
Mr. Borkowski. We are seeing a tremendous decline in the
number of ultralights.
Mr. Alles. I will just mention the numbers. The high was in
fiscal year 2010, 235. So far this year, 19.
Ms. McSally. Do we know why that is?
Mr. Alles. There are other methods of crossing the border
to move the drugs, ma'am.
Ms. McSally. Okay.
Mr. Borkowski. So, again, I think if it jacked back up, we
would probably go pull those ultralight aircraft detection
systems and use them, because they would be worth it for that
threat, but the threat has gone down.
Having said that, we have identified a couple of systems,
one of which we have access to from DOD--it requires some
modifications of software, and it is called a lightweight
counter-mortar radar--that shows some potential here.
We also continue to do market research with industry. I
don't always want to immediately go to DOD and, you know,
foreclose opportunities for industry. There are other radars in
industry as well.
But that is what we are looking at, and that lightweight
counter-mortar radar looks very promising.
Ms. McSally. Okay. Great. Thanks.
Do we know--I guess this would be to Mr. Borkowski.
Are there any other DOD excess property or any other
technology that we know exists within the DOD that you all are
looking at to get your hands on in order to help with the
situational awareness?
Mr. Borkowski. For situational awareness? Well, they
obviously have kind-of common operating picture command-and-
control-type systems that we look at. In fact, they have
something called ART/TSOA, if you are familiar with that--
Adaptive Red Team--where they bring a bunch of these industries
in and plug them in. So we participate in those, and we look at
those technologies.
With respect to, though, situational awareness, DHS S&T has
what is called an Apex Program, because they are trying to get
their arms around. As you can imagine, there is all kinds of
stuff to sort through. So DHS S&T is doing a border situational
awareness Apex Program basically to help us put all of that
information together and to choose what is the right approach.
I think that is where we will rely to make some smart decisions
going forward.
Ms. McSally. Okay. Great. Thank you.
Sorry. I am just firing off a bunch of questions here.
But I think it was in our first hearing I also asked a
question about looking at putting VADER on manned aircraft.
This is something that has been done in the past in other
departments. Is there any looking into that, due to the
limitations, both airspace and weather, of, you know, the
Predator ops?
Mr. Alles. So what we are looking at as an S&T effort is a
lighter VADER-type system to put on our smaller aircraft, not
necessarily the VADER operating on the UAS now. So that has
been kind of the current direction we are looking at. We are
looking at that, you know, through different, you know,
technological venues.
So nothing substantial yet on that. We are really exploring
the options at this point.
Ms. McSally. Okay. Thanks.
Then, in between the tactical UAVs and the Predator, are
there any other UAVs? There is a whole swath in that middle
area there that are smaller and potentially cheaper. Is there
any investigation or requirement that you are looking at to
procure any, sort-of, mid-level UAVs? I just made up that
terminology, but you know what I am saying--not quite the ones
that the agents are deploying but not quite the Predator.
Mr. Alles. So I think, to answer that, until we get full
use out of the Predator in the airspace, I would actually not
want to move in that direction. So, in my mind, the Predator
actually fills the high and medium gap. What Chief Vitiello
wants to do on the small side, which I think is a good effort,
will fill the low-altitude gap.
But the real issue is I can get a Scan Eagle or something
like that, I can't operate it in the airspace. The FAA won't
let me.
Ms. McSally. Yep.
Mr. Alles. So the rules still prevent that. Until we can
move beyond those and really get open use of the airspace with
the Predator, that is going to be the limitation.
We are moving in that direction with the due-regard radar.
We have a single Predator now equipped with that. We are going
to test that and see if that is going to help open up the
envelope with the FAA.
Ms. McSally. Great. Thanks.
I want to move into the, kind-of, procurement process big
picture. I know a lot of the things that Ms. Gambler, the GAO
has pointed out, trying to move DHS more in line with practices
in the DOD. Although I serve on the Armed Services Committee,
and I will tell you, you know, there are good things about the
DOD acquisition process, but that can also be quite painful and
slow and bureaucratic and not nimble. By the time we get
through all the machinations of the process, the technology has
already changed, and, you know, we are late to the game.
So we are actually putting in, you know, the defense bill
and additional legislation some changes to that process. So you
don't necessarily want to mirror all of the DOD. You want to
take the best of it but not the painful amounts of it. So, I
mean, is that part of what is being looked at? Or are we just
trying to mirror the DOD?
One of the issues in the DOD is getting project managers,
contracting officers. It is basically human resources, human
development, making sure we are recruiting, training,
equipping, and keeping, retaining, you know, those that have
this unique expertise that, thank God, I never had to have in
the Air Force myself.
But on the manpower side and the development of expertise,
I just wanted to hear perspectives on that and what is being
done to address that issue.
Ms. Gambler. Sure.
So your first question first, on kind-of the DHS
acquisition management process. I think the bottom line of
GAO's reporting on this has been that, across the Department,
not just with CBP but across the Department, DHS has a fairly
sound, knowledge-based process for managing its acquisition. So
that kind of foundational process, from our perspective, is in
place.
Where DHS has fallen down has been on the execution. So
what I mean by that is ensuring that acquisition programs go
through that process, have approved acquisition documents
before they move to the next phases in the process. That is
where, kind-of, DHS has fallen down in terms of implementation.
Again, they are making progress, but they still have a ways to
go.
I might add that DHS acquisition management challenges are
part of the reason why DHS management more broadly is part of
GAO's high-risk list. So that is point No. 1.
The other point that I would make with regard to having the
right acquisition management personnel in place to manage these
programs, that also has been a challenge that GAO has reported
on across the Department. It has also been something we have
reported on related to CBP.
Some of the challenges that we identified in our last
report regarding why some of the programs under the Arizona
Technology Plan were not meeting schedule had to do with CBP
and OITA not always having the resources in place they needed
to manage the acquisitions, review some of the proposals, and
that kind of thing.
So that, I think, has been a challenge in the past for DHS
and for CBP.
Ms. McSally. Mr. Borkowski, do you want to add anything to
that?
Mr. Borkowski. Yes, I think that is exactly right.
Now, certainly, obviously, DHS is working on this. So, for
example, I understand this issue about documentation, but I
will tell you that Under Secretary Deyo and Deputy Under
Secretary Fulghum have, frankly, been beating the, you know,
stuffing out of us. A lot of emphasis on getting that document
current. We had a big push at the end of last year. Mr. Fulghum
made a commitment to the Congress, and we all got that word,
and we did that. So that is clearly an area of emphasis.
This area of expertise in program management is a big
threat issue. We have spent a great deal of time on it. We have
a Homeland Security Acquisition Institute; we have sent people
to school. But the experience is the big thing.
A lot of my time is occupied on running reviews of
programs, not so much to collect status but to start getting
people to understand what it means to review a program. What
does cost even mean? You know, for example, cost in acquisition
really means, did you get for a dollar what you expected to
get? But you will get a lot of conversation about, do I have
the budget? That is a different question. So understanding what
a baseline is, the basics of program management.
I will tell you I think we have made tremendous progress
over the last few years. But you can imagine what that does to
acquisition, when you are doing the training while you are
deploying. Those have been challenges.
Then, of course, getting enough people and not burning
people out, as we discussed with Mr. Thompson, is another
issue.
Ms. McSally. Are you actively recruiting from the DOD those
that are separating or retiring?
Mr. Borkowski. In terms of acquisition positions, we don't
actually go to DOD and ask for people. However, we get a lot of
DOD applicants to our open applications. So I think the word
gets out.
Ms. McSally. It seems like that is where the experience
would be, right?
Mr. Borkowski. Yes.
Ms. McSally. So, I mean--although maybe they are leaving
and they want to go do something else. But, certainly, if they
have the experience in program management, that would be, you
know, transferable skills.
Mr. Borkowski. Right.
Ms. McSally. Okay.
I am going to keep going here. I have a couple more.
Chief Vitiello, I don't know if it is for you or General
Alles or both. Can you let us know when the CGAP analysis is
going to be available or to be shared with us here in Congress?
Mr. Vitiello. So we are happy to work with you on a
schedule to catch you up to where we think we are. But CGAP, by
its design and the work that we did with applied physics at
Johns Hopkins, is an iterative process.
Ms. McSally. Okay.
Mr. Vitiello. So what we have done up until now is sort-of
learn the process and learn the best practices, which comes
from our own experience plus what they have learned, along with
DOD, to help us identify what the mission needs are, how to
fill capability gaps, and what the use case is for identified
technologies or changes in tactics, et cetera.
So what we have done is we have trained a majority of the
workforce that are deployed in an effort to understand the
process, what CGAP is, how to apply it in their own AOR, and
then feed us that information at the headquarters to then turn
in to requirements. Then we can push over with our requirements
folks in our office and then over to OTIA to move the process
forward.
So we would be happy to come back and give you sort-of a
detailed brief about the number of people that have been
trained, the kinds of discoveries that we have made, and asking
agents for their feedback, how they would solve particular
problems; look at the material resources, like we need a tower,
we need a sensor, we need a tripwire, and then the other, the
non-material things, like consequences and things that happen
maybe post-arrest or information exchange with other
departments, et cetera.
So we would be happy to come back and give you sort-of the
full range of what has been trained and what it is designed to
do and then what the roll-up report looks like, but recognizing
that it is iterative. As the threats change, as conditions
change----
Ms. McSally. Right.
Mr. Vitiello [continuing]. We want to be able to update
those plans so that we are not investing in last year's problem
but are working ahead.
Ms. McSally. Great.
General Alles.
Mr. Alles. I think on the Air and Marine side we are in the
early stages of it. We would expect our really first
substantial output to be about a year away. So they are
currently early in the process, as discussed. As the chief
mentioned, it is an iterative process, but we would expect a
more substantial output here really next summer.
Ms. McSally. Okay. Great. Thank you. Yeah, let's follow up.
I don't know if some of it is Classified, but maybe with a
briefing we could do later on, just to kind-of see where we are
at.
You mentioned it, Chief Vitiello, but the actual agents are
part of that process, right? It is not just the sector
leadership and above?
Mr. Vitiello. That is correct. So the people who are
involved in the planning for their particular area.
Ms. McSally. Yeah.
Mr. Vitiello. So the station level, the people who are
actually deploying on the ground, are taking feedback from the
people who are making the arrests, who are deploying and they
are looking at the line each and every day. That feeds up into
the station, rolled up to the sector each, and then that comes
back to us. People are trained in each of those processes to
then feed to us. Then that turns into requirements, it turns
into forecasts for budgets and programming, et cetera.
Ms. McSally. Great. Thanks.
General Alles, I want to follow up on my earlier question
on getting information to the agents. I know the Big Pipe
allows the Predator feed to get to a desktop, but is there
something in the works to actually get it to an iPad or
something that is more mobile for the agents?
Mr. Alles. Yes, ma'am. A couple things there.
So, first off, we are pursuing the Minotaur system. This is
a Naval Air Systems Command system that is used on their patrol
aircraft to distribute information. So that is essential for us
to take information off our platforms--radar information, the
EOIR, signals information--and actually put it into a system
that can redistribute it to other assets that have Minotaur. It
goes back to the AMOC in Riverside and can be sent back out.
In terms of local agents, part of that is what Chief
mentioned in terms of looking down the Blue Force Tracker
route. We can already send video. We can distribute what is
called a carry viewer to agents on the ground so they can
actually see video if that is desired. Typically, we are using,
you know, actually, radio information to cue the agents.
There is a system we are looking at, which the name eludes
me, which will allow us to put that information on something
like an Android phone or an iPhone, which can actually form its
own local network, which could be advantageous for us in terms
of sending video from aircraft down to actual agents on the
ground.
So those are the directions we are going. I would say there
is a lot of work to be done there.
I think on the, kind-of, investigation side, supporting his
or those, we are able to move the video very easily in those
areas and give it to agents on the ground. In the more remote
areas, that is still an area that we need substantial work in.
Ms. McSally. Great. Thanks.
I also want to ask you, General Alles, about--the National
Guard has been supplementing with, you know, some of the air
assets, but this last year my understanding is that their
number of hours or support was cut in half.
When you guys are doing the CGAP analysis, are there
assumptions made on National Guard capabilities that are a part
of your plan, or are they assumed to not be there? How is that
impacting your operations or the gaps?
Mr. Alles. So, I mean, from our standpoint, a couple
things. First off, in the areas where we were using the
National Guard hours, we have made a substantial move of our
assets into those locations. So, in the south Texas area in
particular, we have increased our assets by over 50 percent,
along with our flight hours have gone up proportionally also.
In actually doing the CGAP analysis, we are not necessarily
counting on their support. As you are aware from the Armed
Services side, they have had substantial cuts in the DOD
budget. I mean, I have been reading the articles on the Marine
Corps and getting 30- or 40-percent readiness rates on their
aircraft. So they have major challenges there.
So we aren't necessarily looking for that in the analysis.
We are looking to support the Border Patrol and our other
operations with our own internal assets and analyze the gaps in
that method.
Ms. McSally. Okay. Great. Thanks.
Mr. Borkowski, can you talk about how you are sharing
requirements with industry so they can spend their R&D dollars
to meet, you know, agents' needs? Or how do you engage with
industry earlier in the process, you know, searching for new
technology?
Mr. Borkowski. Well, we do that through a whole bunch of
ways. So, first of all, when I am in town, I have probably a
meeting a day with anybody who wants to come and talk to me.
Sometimes they want to tell me what they have got; sometimes
they want us to discuss generally our issues.
We have reverse industry days, where we talk to industry
about our requirements. We speak at any number of conferences,
where we list our technology interests for industry. We also
work very closely with DHS S&T that has a very extensive
outreach program, including to nontraditional industry, right?
Because it is kind of easy to get to the traditional people
because they know how to connect with us, but the
nontraditionals.
Ms. McSally. Right.
Mr. Borkowski. So we have a whole bunch of ways that we
talk to them.
Now, the tricky thing is when we are getting ready for an
acquisition. That is where we have a more focused discussion
about: What are the requirements, how should we depict them,
what would industry be able to respond to. Then things get a
lot more detailed.
But in advance of that, it is a more general discussion of,
these are our interests in technology areas, this is what we
think we plan to do over the next few years. We do that through
a number of mechanisms.
Ms. McSally. Great. Thanks.
All right. I am about to wrap up, but I want to give the
opportunity for all the witnesses, if there is anything else
that you didn't get to share in your opening statement or
through the questions that came out. Is there anything else
that any of you want to present on the record for the
committee?
Chief.
Mr. Vitiello. Well, thank you for this opportunity. Just to
reiterate some of the testimony and what is in the prepared
remarks, we are interested in having the most effective and
efficient sustainable technology that is available.
I think it is important--and I think we have heard this
today--that we will never be as fast as the market to bring
these things into the hands of agents. We have wonderful men
and women out there that have really great ideas about how to
do the job more efficiently, but the bureaucracy doesn't always
support that rapid acquisition and putting those things in
their hands as quickly as even we would like them to.
But they are our best assets as it relates to that last--
what we call the last 50 meters. You have to have people on the
ground that support the technology, that the technology has to
support them. But, at the end of the day, they are the ones
that have to make contact with whatever that threat is.
So we appreciate them for that work. We appreciate you, in
your oversight role, in helping us prepare them to give us the
tools that they deserve to be successful. So thanks for that.
Ms. McSally. Great. Thanks, Chief.
General Alles.
Mr. Alles. I would just like to thank the committee
generally for the, you know, support they give to the agency in
terms of us performing our mission. You know, not only the
oversight part of it, but also the interest of the committee
Members--multiple trips and, you know, looking at the stuff
that we are working on.
I could list a list of things that we want. We can provide
that off-line. But just appreciate the participation of the
committee.
Ms. McSally. Absolutely. Thanks, General Alles.
Mr. Borkowski.
Mr. Borkowski. I would just add that, recognizing the
committee's frustration, we certainly have appreciated the
continued support despite the frustration. It has been very
significant to us, and it has helped us a great deal.
As we do go forward, I would like to have continued
discussion about what do we do about the cultural and
structural impediments, because the biggest beating I get is on
time. Yes, cost and performance are important. I think we have
done okay there. But the time is killing us all.
Some of that, I think, will require a different thinking
about how we accept risk. Because to innovate takes risk, and
that means occasionally we will have failures. What is the
right risk tolerance? Frankly, the community that works in this
business is very risk-averse, and that is one of the things we
really have to crack.
But I appreciate the opportunity to testify, and I
appreciate the committee's continued support.
Ms. McSally. Absolutely. Those are the same types of
discussions we are having, by the way, on the Armed Services
Committee related to the DOD.
Ms. Gambler.
Ms. Gambler. I just want to say thank you for inviting us
to testify today.
Just some of the last items that we were talking about
here, in terms of ultralight detection, the CGAP process,
technology metrics, we do have on-going work for the
subcommittee in a number of those areas. So we would be happy
to follow up with you and your staff to brief you at any time,
and look forward to that work coming out in the future here as
well.
Ms. McSally. Great. Thanks, Ms. Gambler. I appreciate it.
All right. I want to thank all the witnesses for your
valuable testimony and the Members for their questions.
The Members may have some additional questions for the
witnesses. We will ask you to respond to these, please, in
writing. Pursuant to committee rule 7(e), the hearing record
will be held open for 10 days.
Without objection, the committee stands adjourned.
[Whereupon, at 4:21 p.m., the subcommittee was adjourned.]
[all]