This is the accessible text file for GAO report number GAO-08-361 
entitled 'Homeland Security: Strategic Solution for US-VISIT Program 
Needs to Be Better Defined, Justified, and Coordinated' which was 
released on March 31, 2008. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Chairman and Ranking Member, Committee on Homeland 
Security, House of Representatives: 

GAO: 

February 2008: 

Homeland Security: 

Strategic Solution for US-VISIT Program Needs to Be Better Defined, 
Justified, and Coordinated: 

Homeland Security: 

GAO-08-361: 

GAO Highlights: 

Highlights of GAO-08-361, a report to the Chairman and Ranking Member, 
Committee on Homeland Security, House of Representatives. 

Why GAO Did This Study: 

The Department of Homeland Security’s (DHS) U.S. Visitor and Immigrant 
Status Indicator Technology (US-VISIT) program’s goals are to enhance 
the security of U.S. citizens and visitors, facilitate legitimate 
travel and trade, ensure the integrity of the U.S. immigration system, 
and protect the privacy of visitors. It is to use biometric and 
biographic information to control and monitor the pre-entry, entry, 
status, and exit of foreign visitors. GAO was asked to determine (1) 
whether DHS has defined and economically justified a strategic solution 
for meeting US-VISIT goals; (2) the biometric technology options DHS 
has considered and the basis for the selected options; and (3) DHS’s 
efforts to define, manage, and coordinate the relationships between US-
VISIT and other immigration and border management programs. To 
accomplish this, GAO assessed key program documentation against 
relevant criteria and examined available biometric research. 

What GAO Found: 

DHS has partially defined a strategic solution for meeting US-VISIT’s 
goals. In particular, the US-VISIT program office has defined and begun 
to develop a key capability known as “Unique Identity,” which is to 
establish a single identity for all individuals who interact with any 
immigration and border management organization by capturing the 
individual’s biometrics, including 10 fingerprints and a digital image, 
at the earliest possible interaction. However, the program office has 
yet to define and economically justify a comprehensive strategic 
solution for controlling and monitoring the exit of foreign visitors, 
which is critical to accomplishing the program’s goals. Further, the 
department did not economically justify its ongoing investment in 
Unique Identity in a timely fashion. Specifically, the program office 
did not justify its investment until about 14 months after selecting 
and pursuing an alternative solution and obligating about $65 million. 
The absence of a fully defined strategic solution and timely economic 
justification hinders informed decision making about the best course of 
action for accomplishing strategic program goals and inhibits the 
ability to measure performance and promote accountability. 

DHS considered various biometric technologies, including fingerprints, 
facial, and iris technologies, and continues to use fingerprints as its 
foundational biometric technology. The focus on fingerprint technology 
is appropriate, given the opportunity to leverage existing DHS and 
Federal Bureau of Investigation identification systems and databases 
and to establish a single identity mechanism for all immigration and 
border management programs. In addition, research into fingerprints and 
other forms of biometric identification, such as facial recognition and 
iris scanning, show that fingerprints continue to be the most accurate 
biometric for identification purposes. 

DHS is taking a range of evolving actions, primarily at the department 
level, to coordinate relationships among US-VISIT and other immigration 
and border management programs. Thus far, this evolution has yet to 
progress to the point of reflecting the full scope of key practices 
that GAO has previously identified as essential to enhancing and 
sustaining collaborative efforts that span multiple organizations. To 
its credit, the department has defined common outcomes through its 
strategic plan and enterprise architecture and has taken steps to 
implement other collaboration practices, such as leveraging resources 
across its screening programs and developing screening performance 
indicators. However, the US-VISIT program office has yet to fully 
define its relationships with other immigration and border management 
programs. As a result, the department is at increased risk of 
introducing the inefficiencies and reduced effectiveness that result 
from suboptimizing how these programs collectively support its 
immigration and border management goals and objectives. 

What GAO Recommends: 

GAO is recommending that the Secretary of Homeland Security ensure that 
the strategic solution components are well-defined and economically 
justified before investing large sums of money and that they are 
effectively coordinated with related programs. DHS concurred with GAO’s 
recommendations and stated that it has initiated actions to implement 
them. 

To view the full product, including the scope and methodology, click on 
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-361]. 

For more information, contact Joel C. Willemssen at (202) 512-6222 or 
willemssenj@gao.gov. 

[End of section] 

Contents: 

Letter1: 

Results in Brief: 

Background: 

US-VISIT Strategic Solution Is Not Fully Defined, and No Aspects Were 
Economically Justified Prior to Solution Development: 

DHS Continues to Focus on Fingerprints as Its Primary Biometric 
Technology: 

Efforts to Define, Manage, and Coordinate Relationships among US-VISIT 
and Other Border Security Programs Are Evolving: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Overview of Legislative Underpinnings for the US-VISIT 
Program: 

Appendix III: Overview of Biometric Technologies: 

Appendix IV: Comments from the Department of Homeland Security: 

Appendix V: GAO Contact and Staff Acknowledgments: 

Figures: 

Figure 1: Simplified DHS Organizational Chart: 

Figure 2: Simplified Diagram of US-VISIT Related Systems: 

Figure 3: Simplified Diagram of Enumeration as Used by USCIS: 

Figure 4: Simplified Diagram of iDSM Architecture: 

Figure 5: Simplified Diagram of IOC Architecture: 

Abbreviations: 

ADIS: Arrival Departure Information System: 

APIS: Advance Passenger Information System: 

BioVisa: Biometric Visa Program: 

BCC: Border Crossing Card: 

CBP: U.S. Customs and Border Protection: 

CCD: Consular Consolidated Database: 

CLAIMS 3: Computer Linked Application Information Management System: 

DHS: Department of Homeland Security: 

DOJ: Department of Justice: 

DMIA: Immigration and Naturalization Service Data Management 
Improvement Act of 2000: 

EA: enterprise architecture: 

EAB: Enterprise Architecture Board: 

ESB: Enterprise Service Bus: 

FBI: Federal Bureau of Investigation: 

GES: Global Enrollment System: 

IAFIS: Integrated Automated Fingerprint Identification System: 

ICE: U.S. Immigration and Customs Enforcement: 

iDSM: interim Data Sharing Model: 

IDENT: Automated Biometric Identification System: 

IIRIRA: Illegal Immigration Reform and Immigrant Responsibility Act of 
1996: 

ISRS: Image Storage Retrieval System: 

IT: information technology: 

NIST: National Institute of Standards and Technology: 

POE: port of entry: 

RFID: radio-frequency identification: 

SCO: Screening Coordination Office: 

SBI: Secure Border Initiative: 

SEVIS: Student and Exchange Visitor Information System: 

TECS: Treasury Enforcement Communications Systems: 

US-VISIT: U.S. Visitor and Immigrant Status Indicator Technology: 

USCG: U.S. Coast Guard: 

USCIS: U.S. Citizenship and Immigration Services: 

WHTI: Western Hemisphere Travel Initiative: 

United States Government Accountability Office: 

Washington, DC 20548: 

February 29, 2008: 

The Honorable Bennie G. Thompson: 
Chairman: 
The Honorable Peter T. King: 
Ranking Member: 
Committee on Homeland Security: 
House of Representatives: 

For many years the Congress and the administration have sought better 
ways to record and track the arrival and departure of foreign visitors 
through U.S. air, sea, and land ports of entry (POE). Pursuant to a 
series of statutory mandates,[Footnote 1] the Department of Homeland 
Security (DHS), in concert with the Department of State, established a 
program to use biometric and biographic information to control and 
monitor the pre-entry, entry, status, and exit of foreign 
visitors.[Footnote 2] This program, which is called the U.S. Visitor 
and Immigrant Status Indicator Technology (US-VISIT) program, is 
intended to enhance the security of U.S. citizens and visitors, 
facilitate legitimate travel and trade, ensure the integrity of the 
U.S. immigration system, and protect the privacy of visitors to the 
United States. 

DHS has pursued US-VISIT in a series of four increments, with 
Increments 1 through 3 focusing on the near-term integration of 
existing systems, and Increment 4 intended to be a more strategic 
solution. As of February 2008, Increments 1 through 3 are completed, 
resulting in an entry capability that has been deployed and is 
operating at about 300 air, sea, and land POEs. 

Because of the strategic importance of US-VISIT to our nation's 
evolving immigration and border management process, you asked us to 
determine (1) whether DHS has defined a strategic solution for meeting 
US-VISIT goals and whether the solution has been economically 
justified; (2) the biometric technology options DHS has considered and 
the basis for the selected options; and (3) DHS's efforts to define, 
manage, and coordinate the relationships between US-VISIT and other 
immigration and border management programs. To accomplish our 
objectives, we reviewed key program documentation, including plans and 
analyses, and compared them with relevant criteria. We also examined 
available government research on biometric technology options and 
compared efforts taken to coordinate the efforts of different 
organizational entities involved in US-VISIT with published 
coordination best practices. We conducted our review from January 2007 
through January 2008, in accordance with generally accepted government 
auditing standards. Further details of our objectives, scope, and 
methodology are included in appendix I. 

Results in Brief: 

DHS has partially defined a strategic solution for meeting US-VISIT 
program goals. In particular, the program office has defined and begun 
to develop one of the two key components of its strategic solution 
known as Unique Identity, which is to establish a single identity for 
all individuals who interact with any immigration and border management 
organization by capturing the individual's biometrics, including 10 
fingerprints and a digital image, at the earliest possible interaction. 
However, the program office has yet to define and economically justify 
the second primary component of its strategic solution--exit, which is 
critical to accomplishing the program's goals. Compounding this is the 
lack of timely economic justification for the Unique Identity solution. 
For example, the program office did not economically justify its 
investment in Unique Identity until about 14 months after selecting and 
pursuing an alternative solution and obligating about $65 million. The 
absence of a fully defined strategic solution and timely economic 
justification hinders informed decision making about the best course of 
action for accomplishing strategic program goals and inhibits the 
ability to measure performance and promote accountability. 

DHS considered various biometric technologies, including fingerprints, 
facial, and iris technologies, and continues to use fingerprints as its 
foundational biometric. The focus on fingerprint technology is 
appropriate, given the opportunity to leverage existing DHS and Federal 
Bureau of Investigation (FBI) identification systems and databases, and 
to establish a single identity mechanism for all immigration and border 
management programs. Further, research into fingerprints and other 
forms of biometric identification, such as facial recognition and iris 
scanning, show that fingerprints continue to be the most accurate 
biometric for identification purposes. Going forward, the program 
office is taking steps to permit it to introduce other biometric 
solutions at some future point. 

DHS is taking a range of evolving actions, primarily at the department 
level, to coordinate relationships among US-VISIT and other immigration 
and border management programs, such as the Secure Border Initiative 
(SBI) and the Western Hemisphere Travel Initiative (WHTI). 
Specifically, the department has defined common outcomes through its 
strategic plan and enterprise architecture (EA), and has taken steps to 
implement other collaboration practices, such as leveraging resources 
across its screening programs and developing screening performance 
indicators. However, these actions do not yet reflect the full scope of 
key practices that we have previously identified as essential to 
enhancing and sustaining collaborative efforts that span multiple 
organizations. For example, the US-VISIT program office has yet to 
fully define either its relationships with WHTI and SBInet or its 
approaches relative to addressing outcomes shared by all three 
programs. As a result, the department risks suboptimizing how these 
programs collectively support its immigration and border management 
goals and objectives. 

We are making recommendations to the Secretary of Homeland Security to 
ensure that the strategic solution components are well-defined, 
economically justified before investing large sums of money, and 
effectively coordinated with related programs. In written comments on a 
draft of this report, signed by the Director, Departmental GAO/Office 
of Inspector General Liaison, the department stated that it generally 
agreed with our observations and concurred with our recommendations, 
and that it has initiated actions to implement our recommendations. DHS 
also provided technical comments, which we have incorporated into this 
report as appropriate. 

Background: 

US-VISIT's goals are to (1) enhance the security of U.S. citizens and 
visitors, (2) facilitate legitimate travel and trade, (3) ensure the 
integrity of the U.S. immigration system, and (4) protect the privacy 
of visitors. The program is to achieve these goals by: 

* collecting, maintaining, and sharing information on certain foreign 
nationals who enter and exit the United States; 

* identifying foreign nationals who (1) have overstayed or violated the 
terms of their visit; (2) can receive, extend, or adjust their 
immigration status; or (3) should be apprehended or detained by law 
enforcement officials; 

* detecting fraudulent travel documents, verifying visitor identity, 
and determining visitor admissibility through the use of biometrics 
(digital fingerprints and a digital photograph); and: 

* facilitating information sharing and coordination within the 
immigration and border management community. 

Federal Statutes Provide a Strategic Framework for US-VISIT: 

A series of statutes, dating back to more than a decade ago, have 
provided a framework for the strategic focus of US-VISIT. A brief 
summary of statutes is provided below, and additional detail is 
provided in appendix II. 

The Illegal Immigration Reform and Immigrant Responsibility Act of 1996 
(IIRIRA)[Footnote 3] required the Attorney General to develop an 
automated system to record the departure of every foreign national from 
the United States and then match it to the individual's arrival record. 
Subsequently, section 2 of the Immigration and Naturalization Service 
Data Management Improvement Act (DMIA) of 2000[Footnote 4] amended the 
original entry-exit provisions of the IIRIRA and required the Attorney 
General[Footnote 5] to implement an integrated entry and exit data 
system for foreign nationals.[Footnote 6] More specifically, the act 
required an electronic system that would provide access to and 
integrate foreign national arrival and departure data that are 
authorized or required to be created or collected under law and are in 
an electronic format in Department of Justice (DOJ) or Department of 
State databases, such as those used at POEs and consular offices. The 
system, as described in DMIA, is to compare available arrival records 
with available departure records, allow online search procedures to 
identify foreign nationals who may have overstayed their authorized 
period of admission, and use available data to produce a report of 
arriving and departing foreign nationals. DMIA also required the 
implementation of the system at airports and seaports by December 31, 
2003, at the 50 highest volume land POEs by December 31, 2004, and at 
all remaining POEs by December 31, 2005. 

Subsequent laws added specific biometric requirements to US-VISIT. The 
USA PATRIOT Act,[Footnote 7] as amended, required the development and 
certification of a technology standard by January 26, 2003, including 
appropriate biometric identifiers that can be used to verify the 
identity of persons applying for a U.S. visa or seeking to enter the 
United States pursuant to a visa, for the purposes of conducting 
background checks, confirming identity, and ensuring that a person has 
not received a visa under a different name. The act also required DHS 
and the Department of State to focus on the utilization of biometric 
technology and the development of tamper-resistant documents readable 
at POEs for the integrated entry and exit data system. Additionally, 
the act required that a report be made to the Congress on the 
feasibility of enhancing the FBI's Integrated Automated Fingerprint 
Identification System (IAFIS) database and other identification systems 
in order to better identify aliens who may be wanted in connection with 
criminal investigations prior to the issuance of visas or entry into 
the United States. 

The Visa Waiver Permanent Program Act[Footnote 8] required DHS to 
develop and implement a fully automated system to control entry and 
exit of aliens at airports and seaports who enter the United States 
under the Visa Waiver Program. It also required that, by October 1, 
2002, inspectors at POEs have access to Department of State and DHS 
information to determine whether an alien seeking a waiver under the 
program is eligible to be admitted into the United States or to receive 
a visa. Further, the act required that visa waiver applicants be 
checked against watch list systems and that, by October 1, 2003, aliens 
applying for a visa waiver have a machine-readable passport.[Footnote 
9] The act was subsequently amended to require, not later than August 
3, 2008, an exit system using biometric information and recording the 
departure on a flight leaving the United States of every alien 
participating in the Visa Waiver Program.[Footnote 10] 

The Enhanced Border Security and Visa Entry Reform Act of 2002[Footnote 
11] required DHS, in consultation with the Department of State, to use 
the technology standard, including biometric identifier standards 
developed under the USA PATRIOT Act, at POEs by October 26, 
2005,[Footnote 12] to install equipment and software at all POEs to 
allow biometric comparison and authentication of all U.S. visas and 
other travel and entry documents issued to aliens, and passports with 
biometric identifiers to be issued by Visa Waiver Program participating 
countries.[Footnote 13] 

The Intelligence Reform and Terrorism Prevention Act of 2004[Footnote 
14] required the collection of biometric exit data for all categories 
of individuals required to provide biometric entry data under US- 
VISIT,[Footnote 15] regardless of the POE where they entered the United 
States. The law did not set a deadline for implementation of this 
requirement. The law also required DHS to develop a plan to accelerate 
the full implementation of the program. 

Overview of Program Structure and Organization: 

The US-VISIT program office is responsible for managing the 
acquisition, deployment, operation, and sustainment of US-VISIT. As of 
March 2007, the program office reports directly to the Under Secretary 
for National Protection and Programs. (See fig. 1.) 

Figure 1: Simplified DHS Organizational Chart: 

This figure is a "tree" chart displaying the hierarchy of DHS. The 
Secretary and Deputy Secretary is positioned at the top, and Customs 
and Border Protection, Citizenship and Immigration Services, and 
Federal Emergency Management Agency is at the bottom. 

[See PDF for image] 

Source: GAO analysis of DHS data. 

[End of figure] 

US-VISIT supports a series of homeland security-related mission 
processes that cover hundreds of millions of foreign national travelers 
who enter and leave the United States at about 300 air, sea, and land 
POEs. They are: 

* pre-entry, which is the process to evaluate a traveler's eligibility 
for required travel documents, enroll travelers in automated inspection 
programs, and prescreen travelers entering the United States; 

* entry, which is the process of determining a traveler's admissibility 
to the United States at air, sea, or land POEs; 

* status management, which is the process of managing and monitoring 
the changes and extensions of the visits of lawfully admitted 
nonimmigrant foreign nationals to ensure that they adhere to the terms 
of their admission and to notify appropriate government entities when 
they do not; 

* exit, which is the process of collecting information on persons 
departing the United States; and: 

* analysis, which is the capability to provide for the continuous 
screening against watch lists of individuals enrolled in US-VISIT for 
appropriate reporting and action. 

Overview of Program Status: 

DHS planned to deliver US-VISIT capabilities in a series of four 
increments: Increment 1 (air and sea entry), Increment 2 (air, sea, and 
land entry), Increment 3 (land entry), and Increment 4, which is to be 
a more strategic solution. Increments 1 through 3, which largely 
involved building interfaces among existing ("legacy") systems and 
enhancing the capabilities of these systems and supporting 
infrastructure, have been completed. As a result, a biometrically 
enabled entry capability is operating at about 300 POEs. More 
specifically, on January 5, 2004, the program office began operating 
most aspects of its planned biometric entry capability at 115 airports 
and 14 seaports for certain foreign nationals, including those from 
visa waiver countries.[Footnote 16] As of December 2006, the program 
office was operating this entry capability in the secondary inspection 
areas of 154 of 170 land POEs.[Footnote 17] 

In September 2006, the program office deployed a capability to exchange 
limited information with IAFIS, which is the FBI's automated 10- 
fingerprint matching system. This capability, known as the interim Data 
Sharing Model (iDSM), was initially deployed September 3, 2006, and, 
according to the US-VISIT program office, is operating with the Boston 
Police Department, the Dallas County (TX) Sheriff, the Harris County 
(TX) Sheriff, and the Office of Personnel Management. Within the iDSM, 
IAFIS users have access to DHS biometrically-based information on 
expedited removals and Category 1 Visa Refusals.[Footnote 18] 
Conversely, the Automated Biometric Identification System (IDENT) users 
have access to a limited set of IAFIS data that consists of active 
Wants and Warrants and Known/Suspected Terrorists. 

The key systems that support or are connected to US-VISIT are described 
below. A simplified diagram of the relationships among these systems is 
shown in figure 2. 

* IDENT collects and stores biometric data about foreign visitors, 
including information from the FBI, U.S. Immigration and Customs 
Enforcement (ICE) information on deported felons and sexual 
registrants, and DHS information on previous criminal histories and 
previous IDENT enrollments. 

* IAFIS, which, as mentioned above, is the FBI's automated 10- 
fingerprint matching system and is electronically connected to all 50 
states, as well as some federal agencies. 

* Arrival Departure Information System (ADIS), which stores noncitizen 
traveler arrival and departure data received from air and sea carrier 
manifests and provides query and reporting functions. ADIS matches 
entry, immigration status updates, and departure data to provide 
immigration status, including whether the individual has overstayed 
his/her authorized period of stay. 

* Student and Exchange Visitor Information System (SEVIS), which 
contains data on change of status throughout a foreign student's or 
exchange visitor's stay in the United States. 

* Computer Linked Application Information Management System (CLAIMS 3), 
which includes adjudication results on foreign nationals who request 
immigration benefits such as change of status, extension of stay, or 
adjustment to permanent resident status. 

* Treasury Enforcement Communications Systems (TECS), which maintains 
lookout (i.e., watch list) data, interfaces with other agencies' 
databases, and is currently used by inspectors at POEs to verify 
traveler information and update traveler data. 

* Advance Passenger Information System (APIS), which captures arrival 
and departure manifest information provided by air and sea carriers. 

* Consular Consolidated Database (CCD), which is owned by the 
Department of State and includes information on visa applicants. 

* Image Storage and Retrieval System (ISRS), which stores U.S. 
Citizenship and Immigration Services (USCIS) biometrics data, including 
the photo and fingerprints of individuals who have been issued a 
credential by USCIS. 

* The USCIS Enterprise Service Bus (ESB), which provides network 
connectivity in support of USCIS' "Inter-Country Adoption" program. 

* The Global Enrollment System (GES), which supports the U.S. Customs 
and Border Protection (CBP) programs for expedited processing of 
preapproved, international, and low-risk travelers who voluntarily 
exchange information in return for expedited transit at U.S. borders. 

* The U.S. Coast Guard's (USCG) Mona Pass Proof-of-Concept, which is to 
test the feasibility of deploying a mobile biometrics identification 
capability to a Coast Guard cutter in the Mona Passage.[Footnote 19] 

Figure 2: Simplified Diagram of US-VISIT Related Systems: 

This figure is a flowchart of US-VISIT related systems. 

[See PDF for image] 

Source: GAO analysis of US-VISIT data. 

[End of figure] 

Through fiscal year 2007, DHS had been appropriated about $1.7 billion 
and, as of October 2007, about $1.5 billion had been obligated for the 
US-VISIT program. For fiscal year 2008, the department has been 
appropriated $475 million for the program. 

According to DHS, US-VISIT has produced mission value. For example, as 
of June 15, 2007, the program reported that it had more than 7,600 
biometric hits in primary entry resulting in more than 1,500 people 
having adverse actions, such as denial of entry, taken against them. 
Further, about 14,000 leads were referred to the ICE immigration 
enforcement unit, resulting in 315 arrests.[Footnote 20] Another 
potential consequence is the deterrent effect of having an operational 
entry capability. Although deterrence is difficult to demonstrate, 
officials have cited it as a byproduct of having a publicized 
capability at the border to screen entry on the basis of identity 
verification and matching against watch lists of known and suspected 
terrorists. 

Overview of Biometric Technologies and Systems: 

Biometric technologies measure and analyze human physiological and 
behavioral characteristics. Identifying a person's physiological 
characteristics is based on direct measurement of a part of the body 
(e.g., fingertips, hands, face, eye retinas, and irises). Biometric 
measurements are theoretically effective personal identifiers because 
the characteristics measured (e.g., fingertips, hands, face, eye 
retinas, and irises) are thought to be distinct to each person. 
Therefore, unlike conventional identification methods that use 
something physical (e.g., an identification card), or a piece of 
information (e.g., a password), biometric identifiers are more 
reliable, cannot be forgotten, and are more difficult to lose, steal, 
or guess. 

Biometric identification systems function as pattern recognition 
systems. They use acquisition devices, such as cameras and scanning 
devices, to capture images, recordings, or measurements of an 
individual's characteristics and computer hardware and software to 
extract, encode, store, and compare these characteristics. 

Depending on the application, biometric systems can be used in one of 
two modes: identification or verification. Identification is referred 
to as one-to-many matching because an individual's presented biometric 
is compared against the stored biometric templates[Footnote 21] of all 
individuals enrolled in the system. It is used to establish a person's 
identity--that is, to determine who a person is. Verification--also 
called authentication--is referred to as one-to-one matching because an 
individual's presented biometric is compared against the biometric for 
that person, which was stored in the system during enrollment. It is 
used to verify a person's identity--that is, to authenticate that 
individuals are who they say they are. 

Other DHS Border Security and Immigration Initiatives: 

Besides US-VISIT, DHS has begun to plan and implement several other 
initiatives aimed at better securing our nation's borders and managing 
immigration matters, such as WHTI and SBI. WHTI was established 
pursuant to the Intelligence Reform and Terrorism Prevention Act of 
2004, which required the Secretary of Homeland Security, in 
consultation with the Secretary of State, to develop and implement a 
plan that requires U.S. citizens and foreign nationals of Canada, 
Bermuda, and Mexico to present a passport or other document or 
combination of documents deemed sufficient to show identity and 
citizenship to enter the United States.[Footnote 22] As of January 23, 
2007, citizens of the United States, Canada, Mexico, and Bermuda are 
required to present a passport to enter the United States when arriving 
by air from any part of the western hemisphere. This is currently not a 
requirement for these individuals when entering the United States via 
sea and land POEs from most countries within the western 
hemisphere.[Footnote 23] On June 26, 2007, DHS and the Department of 
State issued a notice of proposed rulemaking for the implementation of 
WHTI at the sea and land environments. According to the proposed rule, 
DHS and the Department of State expect to implement WHTI by the summer 
of 2008.[Footnote 24] We recently issued a report on the status of WHTI 
implementation to the House Homeland Security Committee's Subcommittee 
on Border, Maritime and Global Counterterrorism.[Footnote 25] 

SBI is a multiyear program that is to secure the borders and reduce 
illegal immigration by installing physical infrastructure and 
surveillance technologies along the border, increasing border security 
personnel, and ensuring information access to DHS personnel at and 
between POEs. A major component of SBI is called SBInet, which is to 
integrate personnel, infrastructures, technologies, and rapid response 
capabilities. DHS reports that SBInet is to encompass both the northern 
and southern land borders, including the Great Lakes, under a unified 
border control strategy whereby CBP is to focus on the interdiction of 
cross-border violations between and at the land POEs, funneling traffic 
to the land POEs. As part of SBI, DHS also plans to focus on interior 
enforcement--disrupting and dismantling cross-border crime into the 
interior of the United States while locating and removing aliens who 
are in the United States illegally. We are currently conducting work 
for the House Homeland Security Committee to assess the development and 
deployment of SBInet's command, control, and communications systems, 
and surveillance and detection systems. We are also reviewing DHS's use 
of performance-based services acquisition. 

DHS's Enterprise Architecture Is Evolving and Is an Important Tool for 
Optimizing the Relationships among Related Programs: 

Effective use of an EA is a hallmark of successful private and public 
organizations. Generally speaking, an EA connects an organization's 
strategic plan with program and system solutions by providing the 
operational and technical information needed to guide and constrain 
implementable investments in a consistent, coordinated, and integrated 
fashion. This information consists of snapshots of both the 
enterprise's current ("As Is") environment and its target ("To Be") 
environment. These snapshots consist of "views," which are one or more 
interdependent and interrelated architecture products (e.g., models, 
diagrams, matrices, and text) that provide various representations of 
the enterprise. Managed properly, an EA can clarify and help optimize 
the interdependencies and relationships among an organization's 
business operations and the underlying information technology (IT) 
infrastructure and applications that support those operations. 
Moreover, when an EA is employed in concert with other important 
management controls, such as portfolio-based capital planning and 
investment control practices, it can greatly increase the chances that 
an organization's operational and IT environments will be configured to 
optimize mission performance. Our experience with federal agencies has 
shown that investing in IT without defining the investments in the 
context of an architecture often results in systems that are 
duplicative, not well integrated, and unnecessarily costly to maintain 
and interface.[Footnote 26] 

DHS issued the initial version of its EA in September 2003 and has 
continued to develop it since then, adding more scope and content to 
subsequent versions. In 2007, we reported on the third version of DHS's 
EA, stating that DHS had partially addressed shortcomings that we had 
identified in the previous versions. Since then, the department has 
further developed its architecture and issued an updated version. In 
doing so, it has continued to address our prior findings and 
recommendations. 

Prior GAO Reviews of US-VISIT Have Identified Several Areas for 
Improvement: 

Since 2003, we have issued numerous reports[Footnote 27] highlighting 
fundamental challenges that DHS continues to face in defining the 
program. For example, we reported that DHS was investing in US-VISIT 
without a clearly defined operational context that included explicitly 
defined relationships among related border and immigration enforcement 
initiatives. In the absence of a DHS-wide operational context, program 
officials made assumptions about certain standard issues, such as 
capturing 2 fingerprints rather than 10 to identify foreign nationals 
subject to US-VISIT. 

In December 2006,[Footnote 28] we reported that DHS had launched key 
major border security programs, such as WHTI and SBInet, without 
adequately defining their relationships to US-VISIT. As a result, we 
concluded that DHS faces substantial risk that US-VISIT will not align 
with other immigration and border management initiatives and thus not 
cost effectively meet mission needs. We recommended that DHS determine 
how it expects to align emerging land border security initiatives, such 
as WHTI and SBInet, with US-VISIT, and what facility or facility 
modifications would be needed at land POEs to ensure that technology 
and processes work in harmony. In August 2007,[Footnote 29] we reported 
that US-VISIT's strategic plan did not include any of the key elements 
associated with effective strategic plans. In particular, the plan did 
not explain the relationship between US-VISIT and other border 
management programs, such as WHTI, even though both programs involve 
the entry of certain foreign individuals at POEs. 

Over the last 5 years, we have also reported that DHS had not 
economically justified its investment in US-VISIT increments, including 
exit. For example, we reported in September 2003,[Footnote 30] that DHS 
had not economically justified the initial increment (which was to 
include an exit capability at air and sea POEs) on the basis of 
benefits, costs, and risks. As a result, we recommended that DHS 
determine whether proposed incremental capabilities would produce 
mission value commensurate with program costs and risks. Similarly, in 
February 2006,[Footnote 31] we reported that while DHS had analyzed the 
cost, benefits, and risks for its air and sea exit capability, the 
analyses did not demonstrate that the program was producing or would 
produce mission value commensurate with expected costs and benefits, 
and the costs upon which the analyses were based were not reliable. A 
year later, we reported[Footnote 32] that DHS had not adequately 
defined and justified its past investment in its air and sea exit 
pilots and its land exit demonstration projects. We recommended, among 
other things, that planned expenditures be limited for exit pilots and 
demonstration projects until such investments were economically 
justified. 

US-VISIT Strategic Solution Is Not Fully Defined, and No Aspects Were 
Economically Justified Prior to Solution Development: 

Thus far, DHS has partially defined a US-VISIT strategic solution. On 
the basis of available project documentation, we determined that the 
strategic solution consists of two primary components: (1) Unique 
Identity and (2) exit. Of these, the first is fairly well-defined, the 
second is not. Further, although Unique Identity is defined, it was not 
economically justified in a timely fashion, and thus DHS proceeded with 
its development in the absence of an analytically verifiable basis for 
doing so. The absence of a fully defined strategic solution and timely 
economic justification hinders informed decision making about the best 
course of action for accomplishing strategic program goals and inhibits 
the ability to measure performance and promote accountability. 

The Unique Identity Component of US-VISIT Strategic Solution Has Been 
Defined and Is Under Development: 

One of the two major components of the strategic solution is a project 
known as Unique Identity. The purpose of this project is to develop and 
deploy a capability that establishes a single identity for all 
individuals encountered across the immigration and border mission area. 
This is to be achieved by capturing the individual's biometrics, 
including 10 fingerprints and a digital image, at the earliest possible 
interaction with any immigration and border management entity (e.g., 
when the individual is applying for a visa or immigration benefit). It 
is also to enable an improved process for determining the risk 
associated with allowing entry to an individual or the individual's 
eligibility to receive benefits. 

Unique Identity consists of the development of three capabilities: (1) 
10-print identification, (2) enumeration, and (3) IDENT/IAFIS 
interoperability. These capabilities are to be fully deployed by 2010 
and as of November 7, 2007, the program office reported obligating 
about $65 million, and expending about $22 million,[Footnote 33] to 
develop and deploy Unique Identity. 

Ten-print Identification: 

Ten-print identification is to establish the means for capturing 10 
fingerprints and is to enable the other two Unique Identity components, 
as well as increase the fingerprint matching accuracy in IDENT. 

The first three increments of US-VISIT were deployed using 2-print 
identification and verification capability. In July 2005, DHS announced 
that it intended to biometrically screen foreign visitors to the United 
States based on a fingerprint standard of 10-print flat capture at 
enrollment and fewer than 10 fingerprints for verification thereafter. 
This work was required for POEs and the Department of State posts that 
were participating in the Biometric Visa (BioVisa) program,[Footnote 
34] both of which were collecting 2 fingerprints. Transitioning to 10 
fingerprints also required modifications to IDENT to accept and process 
the larger number of fingerprints. 

US-VISIT and other agencies that either had a need or developed 
guidance for biometrics (e.g., the FBI, Department of State, and the 
National Institute of Standards and Technology [NIST]) established a 
user group and began working with industry to determine whether there 
were 10-print scanners available that met their respective 
requirements, such as maximum size and processing speed. In December 
2005, the user group determined that the 10-print scanners available at 
that time did not meet these requirements, but that such scanners could 
be available within 12 months. In November 2006, the Department of 
State, which was able to employ the already available scanners, began 
to capture 10 fingerprints, as a pilot, during visa issuance in 
overseas embassies and consulates. According to the US-VISIT program 
office, the Department of State has deployed 10-print equipment to all 
of its visa-issuing posts. 

By January 2007, technology improved to the point where US-VISIT was 
able to evaluate vendor proposals for 10-print scanners. That same 
month, the program office awarded contracts to two scanner vendors that 
had developed technically suitable devices. Currently, the program 
office is deploying 10-print scanners on a pilot basis to 10 air 
locations[Footnote 35] that currently use a 2-print scanner and, 
according to a US-VISIT official, it plans to complete this deployment 
and begin evaluating the scanners' performance in March 2008. Full 
deployment to all locations that currently use a 2-print scanner 
(including primary inspection lanes in air and sea POEs and secondary 
inspection lanes in land POEs) is scheduled to be completed by December 
2008. 

Enumeration: 

Enumeration is to associate the biometric and biographical data within 
IDENT and IAFIS with individuals encountered by immigration and border 
management entities and thereby allow for improved risk and eligibility 
determinations for individuals entering the United States or applying 
to receive benefits. When decisions are made concerning entry or 
eligibility, details from these encounters are also to be recorded and 
linked to the individual's record. To accomplish this, a unique 
identifier, referred to as an enumerator,[Footnote 36] is assigned to 
the individual's record, stored within IDENT, and linked to the 
fingerprints and the individual's associated biographic information. 
Upon subsequent interactions, the individual's identity is to be 
biometrically verified and information about the individual, including 
past encounters, is to be available for risk and eligibility decisions. 

Enumeration begins with the person's initial encounter by immigration 
and border management entities. During this encounter, an individual's 
biometrics (i.e., 10 fingerprints and digital image) and limited 
biographical information are captured. Once this information is 
gathered, one of three enumeration services can be provided: identify, 
verify, or retrieve encounter details. These services are described 
here. 

* Identify: IDENT is searched using the biometrics captured from the 
individual during the initial encounter to determine whether biometric 
records are stored in the system. The individual's fingerprints are 
enrolled in IDENT and if no matching biometric record is found, an 
enumerator is assigned. If a biometric record is already stored in 
IDENT, but without an enumerator, one is assigned. IAFIS is then 
searched using the collected biometrics. 

* Verify: If a person has already been enumerated, IDENT and IAFIS are 
searched and the individual's identity is verified against the stored 
biometric records. 

* Retrieve Encounter Details: A request can be submitted for details of 
a particular previous encounter with the individual. Using the 
enumerator, biometric and related biographic information for the 
individual is retrieved and provided to aid the risk or eligibility 
decision. 

The results of these requests are packaged and returned by IDENT, and 
may include a list, and types, of the individual's previous encounters. 

Thus far, enumeration services have been implemented on a pilot basis. 
Specifically, in July 2007, USCIS implemented enumeration services as 
part of its Inter-Country Adoption process, which is to allow USCIS 
adjudicators and other users to store, retrieve, and update centrally 
stored information about inter-country adoption cases. A simplified 
diagram of the enumeration process, as utilized by USCIS, and the types 
of enumeration requests, can be found in figure 3. 

Figure 3: Simplified Diagram of Enumeration as Used by USCIS: 

This figure is a diagram of enumeration as used by USCIS. 

[See PDF for image] 

Source: GAO analysis of US-VISIT data. 

[End of figure] 

USCIS' Inter-Country Adoption Pilot is part of the USCIS transformation 
program, which is to transition USCIS from a form-based to a "person- 
centric," or customer account-based, service provider. Successful 
transition depends on the capability to uniquely identify and validate 
a person's identity in order to track and manage the ongoing 
relationship of the person with USCIS. According to the USCIS Chief 
Information Officer, USCIS plans to eventually associate all of its 
immigration and border management records with the enumerator.[Footnote 
37] 

However, future implementation of enumeration by other DHS 
organizations is uncertain. The US-VISIT Program Director told us that 
the use of enumeration has not been mandated across the department. He 
added that departmentwide use of the capability could be 5 years away, 
but that they are deploying the service to meet USCIS's requirement. 
Because of this, program officials stated that a deployment plan for 
departmentwide use of enumeration does not exist. Instead, they intend 
to provide the capability to DHS entities on an as requested basis. 

IDENT/IAFIS Interoperability: 

The purpose of IDENT/IAFIS interoperability is to enable DHS and the 
FBI to share biometric and related biographic, criminal history, and 
immigration history data. To achieve this interoperability, the program 
office is working with the FBI's Criminal Justice Information Services 
Division, which manages IAFIS. DHS and the FBI plan to deploy IDENT/ 
IAFIS interoperability in three phases, each of which is to build on 
the previous phase and to provide increased information sharing. The 
three phases are iDSM, Initial Operating Capability (IOC), and Full 
Operating Capability. 

* The interim Data Sharing Model is a proof-of-concept for long-term 
information sharing between DHS and the FBI. Under iDSM, as mentioned 
previously, DHS provides the FBI with information on expedited removals 
and Category 1 Visa Refusals, and the FBI provides DHS with information 
on active Wants and Warrants and Known/Suspected Terrorists. These data 
are shared by providing and storing copies of the data (e.g., Visa 
Refusals and Wants and Warrants, respectively) in repositories that are 
outside of the IDENT and IAFIS systems but that are located at the 
other agency's data center. Ownership and control of the agencies' data 
subsets are still maintained by the originating agency. 

To illustrate, copies of DHS fingerprint images and limited biographic 
information, such as name and date/place of birth, are transmitted from 
IDENT to the separate IDENT repository located in the DOJ data center. 
Once the information has been placed within the repository, it is then 
sent to the DOJ/IAFIS shared data fingerprint matchers,[Footnote 38] 
which reside within the IAFIS system. Once the information is in the 
matchers, minutiae are extracted from the fingerprint images and stored 
in the matchers along with the limited biographic information. DOJ/FBI 
shares the IAFIS data with DHS in the same way. 

When users submit a query, both the shared data matchers (which contain 
the copies of the other agency's data) and their own data matchers are 
searched for potential hits. For example, when an IDENT user submits a 
query, both the IDENT shared data matchers that contain copies of the 
FBI's Wants and Warrants and the Known/Suspected Terrorists data, and 
the IDENT matchers that contain DHS's biometric and biographical data 
are searched for biometric matches. (See fig. 4 for a simplified 
diagram of the iDSM architecture.) 

The iDSM was deployed September 3, 2006, and, according to the US-VISIT 
program office, is operating with the Boston Police Department, the 
Dallas County (TX) Sheriff, the Harris County (TX) Sheriff, and the 
Office of Personnel Management. 

Figure 4: Simplified Diagram of iDSM Architecture: 

This figure is a diagram of iDSM architecture. 

[See PDF for image] 

Source: GAO analysis of US-VISIT data. 

[End of figure] 

* Initial Operating Capability is to expand the data sets to be shared 
between IDENT and IAFIS. In addition to the data shared as part of 
iDSM, DHS is to also share its entire recidivist repository, USCIS 
benefits data, credentialing information, additional information from 
the BioVisa and BCC programs, DHS watchlist data, and enrollment/ 
enumeration and encounter data. In turn, the FBI is to share 55 million 
records in the Criminal Master File, as well as latent print data. 

In addition, IOC is to modify the architecture for sharing the expanded 
set of IDENT and IAFIS data. Under IOC, the data shared between IDENT 
and IAFIS as part of iDSM will continue to be shared as it is under the 
iDSM architecture (i.e., copies of the shared data are sent to separate 
repositories and data matchers). In addition, DHS and the FBI are to 
share the additional data sets (e.g., recidivist repository and 
Criminal Master File, respectively) by providing direct access to the 
actual fingerprint data (as opposed to copies in the iDSM architecture) 
stored in each other's fingerprint matchers. Similar to iDSM, all 
respective matchers are to be searched as part of a single query. To 
illustrate, when an IDENT user submits a biometric search query, three 
matchers are searched: (1) the IDENT shared data matchers that contain 
copies of the FBI's Wants and Warrants and the Known/Suspected 
Terrorists data, (2) the IDENT matchers that contain DHS's biometric 
data, and (3) the IAFIS matchers that contain the Criminal Master File 
and latent print data. Similar data matchers are searched for an IAFIS 
user query, except that the IDENT shared database is also searched 
because it includes DHS watchlist data, in addition to the IAFIS shared 
data. According to the US-VISIT Program Director, IOC is planned for 
September 2008. (See fig. 5 for a simplified diagram of the proposed 
IOC architecture.) 

Figure 5: Simplified Diagram of IOC Architecture: 

This figure is a flowchart of IOC architecture. 

[See PDF for image] 

Source: GAO analysis of US-VISIT data. 

[End of figure] 

* Full Operating Capability refers to the end state of interoperability 
between IDENT and IAFIS. It is to provide for interoperability and real-
time data sharing of an expanded set of biographic data for criminal 
and civil searches. However, the exact information to be shared by DHS 
and the FBI has not yet been determined. Full Operating Capability is 
planned for February 2010. 

The Exit Component of US-VISIT Strategic Solution Has Not Been 
Adequately Defined: 

Despite long-standing legislative requirements and a sizeable 
investment of time and resources, DHS has yet to clearly define the 
second major component of its strategic solution--exit. Moreover, while 
DHS has established milestones for several key air exit activities, 
such as fully implementing an air exit capability by the end of 2008, 
the program office has not provided any verifiable analysis and 
documentation that support these milestones, thus calling into question 
their reliability. According to DHS officials, the current state of 
exit capabilities owes largely to the fact that an exit capability is 
more challenging to implement than entry. Without an operationally 
effective exit capability, US-VISIT cannot meet its strategic goals, 
and the integrity of the nation's immigration system is limited. 
Further, the absence of any defined exit solution, including reliable 
milestones, means that this situation is not likely to change in the 
near future. 

As mentioned earlier, the legislative underpinnings for an exit 
capability were established in 1996.[Footnote 39] In response, DHS 
allocated about $260 million for exit-related efforts between 2003 and 
2007, and the program office reports that it expended about $157 
million. In particular, the program office conducted various exit 
pilots and demonstration projects at air, sea, and land POEs. 
Throughout this period, we reported on the limitations in how these 
activities were planned, defined, and justified. Most recently, we 
reported in August 2007[Footnote 40] that the lack of a well-defined 
and justified exit solution risks repeating failed and costly past exit 
efforts. We further reported that no exit program plans were available 
that defined what will be done, by what entities, and at what cost to 
define, acquire, deliver, deploy, and operate this capability, 
including plans describing expected system capabilities, defining 
measurable outcomes (benefits and results), identifying key stakeholder 
(e.g., airlines) roles/responsibilities and buy-in, and coordinating 
and aligning with related programs. 

DHS has recently reaffirmed its commitment to implementing an exit 
solution and reconstituted its efforts. In particular, DHS reports that 
it will focus first on a biometric air exit solution by leveraging 
existing commercial airlines processes. However, the means by which 
this integration is to be accomplished has yet to be defined and 
published. Currently, DHS plans to issue a Notice of Proposed Rule 
Making for establishing a biometric exit verification process at 
commercial international air exit points. 

To date, we have yet to receive further details on the proposed process 
beyond a high-level schedule of key milestones, which includes issuing 
the proposed and final rules by December 2007 and June 2008, 
respectively, and fully implementing the air exit solution by December 
2008. However, these milestones are not supported by the kind of 
verifiable analysis and documentation that is associated with reliably 
derived program schedules, such as (1) decomposition of the program 
into a work breakdown structure; (2) sequencing, integration, and 
resourcing of each work element in the work breakdown structure; and 
(3) identification of the critical path through the schedule of linked 
work elements. As a result, the reliability of the milestones remains 
questionable. Further, the milestones are dependent on several major 
unknowns. For example, until the proposed rule is issued and comments 
are received, DHS will not know the full scope and nature of any 
airline concerns and challenges, which may affect the content of the 
final rule; this final rule will in turn dictate what the airlines will 
be required to do and thus what their respective time lines will be for 
implementing their parts of the exit solution. Exacerbating this lack 
of reliability with the reported air exit milestones is the fact that 
the program office has already missed several near-term milestones. For 
example, it was to complete an alternatives analysis, the business 
requirements, and a concept of operations by August 2007, as planned. 
As of November 2007, the program office reported that these documents 
had yet to be approved. Further, it did not meet the December 2007 date 
for issuing the proposed rule.[Footnote 41] 

With regard to sea and land exit, a strategic solution is even less 
defined and thus more uncertain. While DHS reports that it will develop 
and deploy a sea exit capability that emulates its air exit solution, 
no plans are available that define what entities are to be involved, 
how much the solution will cost, or when it will be deployed. For land, 
DHS has not determined a time frame or cost estimates for even 
initiating a land exit solution. In lieu of deploying this capability, 
DHS plans to initially explore options for expanding the collection of 
biographic data on travelers crossing the borders. Specifically, the 
then-acting US-VISIT Director of Program Integration and Mission 
Services told us that US-VISIT is building relationships with Canada to 
foster future possibilities of sharing border operation information. 
Further, while the Comprehensive Exit Charter notes that, as biometric 
scanning technology develops and becomes more sophisticated, DHS will 
consider land exit options that provide for biometric capture without 
severely impacting the flow of travel across the border, but no further 
details are available. 

The longer the department goes without an exit capability, the more its 
ability to effectively and efficiently perform its border security and 
immigration enforcement missions may suffer. Without exit data, for 
example, DHS cannot ensure the integrity of the immigration system by 
identifying and removing those people who have overstayed their 
original period of admission--a stated goal of US-VISIT. 

DHS Did Not Economically Justify Investing in Unique Identity in a 
Timely Fashion: 

The decision to invest in any system should be based on reliable 
analyses of estimated system costs and expected benefits over the life 
of the investment. Given the importance of these analyses to informing 
the decision-making process, they should be completed prior to 
selecting and investing in a particular solution to ensure that the 
solution selected achieves the expected performance goals with the 
lowest life cycle costs and the least risk. This is consistent with 
Office of Management and Budget guidance, which states that individual 
increments of major systems are to be individually supported by 
analyses of benefits, cost, and risk.[Footnote 42] DHS has also issued 
guidance recognizing the importance of completing such economic 
analyses early in a project's planning stage to support informed 
decision making about what projects should be approved and 
funded.[Footnote 43] 

While DHS developed a cost-benefit analysis for Unique Identity, the 
analysis was completed after system development activities were well 
under way. Specifically, DHS completed an analysis for Unique Identity 
in August 2006, but the analysis did not address the alternative 
solution that DHS ultimately selected and is now being developed. 
Subsequent to the completion of the August 2006 analysis, the program 
office and the FBI elected to pursue a hybrid alternative solution that 
was not included in the initial analysis, in part to address the FBI's 
interest in maintaining control over FBI data to be shared with IDENT. 
According to program officials, when the hybrid solution was developed, 
they considered the degree of technology change required for the hybrid 
and, based on the potential changes, determined that any increased cost 
would be marginal. However, they could not provide any documented 
evidence to support this determination. 

Subsequently, in October 2007, DHS issued a revised analysis that 
included the alternative solution that is being pursued. However, this 
analysis was about 14 months after the initial phase of Unique Identity 
was deployed and after about $65 million was obligated, and $22 million 
was expended. According to program officials, the revised analysis 
confirmed that its costs and benefits were roughly equivalent to the 
original analysis and affirmed the program's decision to select and 
build this alternative. However, program officials agreed that given 
that the solution has been selected and is being developed, the value 
of such an "after-the-fact" analysis in informing investment decision 
making is lost. By following such a practice, DHS did not know whether 
it was pursuing the most cost effective investment option until after 
it had obligated tens of millions of dollars. 

In addition, DHS has yet to finalize a cost-benefit analysis for a 
comprehensive exit solution. According to program officials, the 
department intends to finalize such an analysis for its air exit 
solution as part of the Notice of Proposed Rule Making process. 
However, it is unclear if and when an analysis will be completed for 
the sea and land solutions. 

DHS Continues to Focus on Fingerprints as Its Primary Biometric 
Technology: 

DHS considered various biometric technologies, including fingerprints, 
facial, and iris technologies, and continues to use fingerprints as its 
foundational biometric. According to NIST and DHS, fingerprint 
technology is currently the most accurate form of biometric 
identification for matching one biometric record against many such 
records, which is a key requirement of US-VISIT. Notwithstanding this 
focus on fingerprints, the program office continues to participate in 
and review research efforts examining other forms of biometrics and how 
those technologies might be applied to US-VISIT. In recognition that 
one of these technologies may prove viable, the program office modified 
IDENT to allow an additional mode of biometric comparison if such 
technology becomes feasible. 

DHS Considered Various Biometric Technologies, Focusing on Fingerprints 
as Its Foundational Biometric: 

While DHS has considered various biometric technologies, including 
fingerprints, facial, and iris technologies, it maintains its focus on 
fingerprints as its foundational biometric technology for two primary 
reasons. First, fingerprint technology is currently the most accurate 
form of biometric identification for matching one biometric record 
against many. According to the Chief of NIST's Information Access 
Division, who is responsible for overseeing biometric technology 
research, no biometric technology, other than fingerprints, has been 
demonstrated operationally, or in independent testing, to automatically 
and accurately identify one-to-many matching on US-VISIT sized 
populations. Such matching is performed by IDENT, which contains 
fingerprints collected from a number of sources.[Footnote 44] Second, 
focusing on fingerprint technology provides DHS with access to the 
FBI's biometric database, known as IAFIS. 

However, IDENT's use of a 2-print model--one from the left index finger 
and one from the right index finger--has been identified as a major 
barrier for achieving interoperability with IAFIS, which is a 10-print 
system. Interoperability between IDENT and IAFIS provides DHS and US- 
VISIT access to the largest criminal biometric database in the world, 
the Criminal Master File, which, as mentioned previously, stores over 
50 million sets of 10 rolled fingerprints and corresponding criminal 
history information submitted by law enforcement agencies. IAFIS also 
contains a Civil Subject Index Master File, which stores noncriminal 
fingerprints (e.g., fingerprints of military, government, or authorized 
nongovernment personnel), and an Unsolved Latent File, which contains 
latent fingerprint[Footnote 45] images found at crime scenes. In May 
2007, DHS designated IDENT as the DHS biometric repository and 
committed to moving it to 10 fingerprints in order to enhance US- 
VISIT's ability to identify and verify a person's identity. According 
to NIST officials, this is because a system's accuracy increases as a 
greater number of fingerprints are used. 

The environment in which US-VISIT operates limits the effectiveness of 
other biometric technology options. A program official who works with 
biometrics told us that one of the limitations of capturing high- 
quality photographs for facial recognition is that the POE environment 
cannot be modified to, for example, change the background in the photos 
of individuals. Specifically, a backdrop for taking photos cannot be 
placed in a POE because it will restrict the CBP officers' view of the 
processing area. 

Other Biometric Technologies Remain a Future Option: 

Although DHS is using fingerprints as its primary biometric identifier, 
it has ongoing biometric research efforts. For example, the program 
office works with academic institutions, such as the Center for 
Identification Technology Research at West Virginia University, to 
explore the rapidly growing area of biometric identification 
technology. Further, the program office has contracted with NIST to 
conduct research and analysis on biometric capture devices, systems, 
and procedures in a range of operational environments. In addition, a 
program office representative chairs the DHS Biometrics Coordination 
Group, which facilitates DHS intradepartmental planning and 
coordination for biometrics research, development, testing, and 
evaluation. As part of this, the Research and Development, Testing and 
Evaluation Working Group within the Biometrics Coordination Group 
gathers research and development requirements and shares them with 
other groups, such as the Human Factors Division within the DHS Science 
and Technology Directorate and the National Science and Technology 
Council Subcommittee on Biometrics and Identity Management. 

In addition, program officials stated that US-VISIT is beginning to 
evaluate how to add the capability to process multiple types of 
biometrics--also known as multimodal biometrics--in the next 3-5 years. 
Further, program officials stated that IDENT has been modified to add 
the capacity and capability to eventually receive and match biometric 
data from technologies other than fingerprints, should another type of 
biometric mature to where it can be effectively used. Program officials 
also stated that US-VISIT plans to conduct prototype work on multimodal 
biometric data in order to increase the accuracy and efficiency of 
matches. Additional details about biometric technologies are in 
appendix III. 

Efforts to Define, Manage, and Coordinate Relationships among US-VISIT 
and Other Border Security Programs Are Evolving: 

Because optimizing an organization's ability to achieve its strategic 
goals and outcomes depends in part on its success in managing the 
interdependencies among related programs, it is essential that DHS 
define, manage, and coordinate its border screening programs in a way 
that embodies collaboration practices that our research shows are 
important to maximizing organizational performance and achieving 
organizational goals and outcomes. While DHS has established a few 
mechanisms for defining and managing related immigration and border 
programs, including US-VISIT, WHTI, and SBInet, and begun to implement 
key collaboration practices, these activities are still evolving. Going 
forward, it is important that DHS embrace and maximize the use of key 
organizational collaboration practices to effectively manage the 
relationships among these programs. Absent such collaboration, DHS 
risks potential overlap, duplication, and inconsistency across the 
programs, which could limit effective and efficient organizational 
performance and results. 

As we have previously reported,[Footnote 46] organizational 
collaboration can be viewed as any joint activity that is aimed at 
producing more public value than could be produced when programs or 
organizations act alone. Among other things, our research shows that 
effective collaboration depends on the use of certain collaboration 
practices. These practices include: 

* establishing common outcomes: defining and articulating a shared or 
common outcome(s) or purpose(s) that organizations or programs are 
mutually seeking to achieve and that are consistent with their 
respective goals and missions; 

* establishing mutually reinforcing or joint strategies: creating 
strategies that work in concert with those of their partner 
organizations or programs, or that are joint in nature; 

* leveraging resources: identifying the human, technological, physical, 
and financial resources needed to initiate or sustain the collaborative 
effort; 

* agreeing on roles and responsibilities: working together to define 
and agree on respective roles and responsibilities, including how the 
collaboration efforts will be led; 

* establishing a compatible means to operate across organizational 
boundaries: creating compatible standards, policies, procedures, and 
data systems that will be used in the collaborative effort; and: 

* developing mechanisms to monitor, evaluate, and report on results: 
putting in place the means to monitor, evaluate, and report on the 
collaborative effort to identify areas for improvement. 

Most of these practices are reflected to some degree in department- 
level mechanisms that are in place and are evolving, such as the DHS EA 
and the Screening Coordination Office (SCO). Similarly, limited program-
to-program collaboration efforts are occurring. As these efforts 
continue to evolve, it is important to examine the expanded use of 
these collaboration practices. DHS's implementation of each of the 
practices, along with opportunities for their expanded use, is 
discussed below. 

Establishing a Common Outcome: 

DHS's strategic plan and EA (the department's blueprint for 
implementing its strategic plan), define outcomes for securing our 
nation's border that are shared by US-VISIT, WHTI, and SBInet. In 
particular, one of the goals in the department's strategic plan is to 
detect, deter, and mitigate threats to our homeland, and one of its 
objectives for achieving this goal is to secure our borders against 
terrorists, the means of terrorism, illegal drugs, and other illegal 
activity. US-VISIT, WHTI, and SBInet program documentation explicitly 
link their programs to this common goal and objective. For example, one 
of US-VISIT's goals is to enhance the security of U.S. citizens and 
visitors and one way it seeks to achieve this is by matching foreign 
nationals' biometrics against watch lists, thereby preventing those 
visitors who may pose a threat from entering the country. 

In addition, the EA's draft transition plan groups programs, including 
US-VISIT and WHTI, that have a common purpose (namely, assessing the 
risk and determining the eligibility of persons seeking to enter the 
United States, or obtain a benefit or credential)[Footnote 47] into a 
portfolio of screening programs.[Footnote 48] According to the DHS 
Chief Architect, SBInet will be included in the screening/watchlist 
portfolio and reflected in the department's next EA transition plan. 

Notwithstanding DHS's efforts to link the three programs to common 
strategic outcomes, other shared aspects of the programs are not as 
well-established. For example, the EA does not define how these 
programs are expected to share common services and data. Specifically, 
it does not yet include an inventory of services to be provided by each 
program such as the biometric services that US-VISIT provides in 
support of the department. Similarly, it does not include a complete 
inventory of DHS data assets relevant to the screening 
programs.[Footnote 49] For example, while it identifies and describes 
20 data assets, including IDENT and ADIS, the EA does not include all 
of the biographic data assets that support identity management and 
screening processes, such as SEVIS, which ICE uses to manage and 
monitor the stay of foreign students in the United States. 

Moreover, program-to-program level activities aimed at identifying and 
pursuing common strategic outcomes are not apparent. Specifically, 
while US-VISIT program officials told us that potential relationships 
with other immigration and border management programs, including WHTI 
and SBInet, exist, they have not yet been defined. With regard to WHTI 
in particular, a program official said that the program office intends 
to work with the WHTI program office to implement radio-frequency 
identification (RFID) technology[Footnote 50] for US-VISIT land exit, 
but efforts for accomplishing this have yet to go beyond providing the 
WHTI program office with the results of US-VISIT's land exit RFID 
"proof-of-concept" pilot projects, as well as the associated 
hardware.[Footnote 51] Similarly for SBInet, while the business needs 
assessment for US-VISIT's mobile biometric link project[Footnote 52] 
identifies SBInet as a potential user of this capability, the 
assessment states that SBInet is to develop a solution to enable border 
patrol agents to process biographic and biometric information in remote 
border areas. According to US-VISIT officials, the US-VISIT/SBInet 
relationships have not yet been defined. 

Establishing Mutually Reinforcing or Joint Strategies: 

On July 31, 2006, the DHS Secretary established SCO to, among other 
things, coordinate and integrate the department's screening and 
credentialing efforts and create unified screening standards and 
policies. In July 2007, SCO issued a framework to help ensure the 
integration and alignment of screening programs. In short, the 
framework is to help identify opportunities for convergence and synergy 
among the related programs, as well as improvements in efficiency and 
mission effectiveness by providing a common method or process for the 
collection and use of data across these programs. According to the 
coordination office, the framework will eventually include a transition 
plan, including major activities, milestones, and associated time lines 
and costs. The SCO Associate Director told us that a draft transition 
plan is currently being reviewed within the department. The SCO is also 
the portfolio manager for the EA's screening/watchlist portfolio and, 
as such, works closely with the DHS Enterprise Architecture 
Board[Footnote 53] (EAB) to ensure that its investments (e.g., those 
related to screening activities) are aligned with the EA and that the 
investments' resources are shared and effectively leveraged. However, 
as mentioned above, the EA is still evolving and does not define key 
aspects of the program's relationships and dependencies. Moreover, we 
have previously reported that DHS processes for ensuring that programs 
are aligned with its EA are not grounded in an explicit risk-based 
methodology and associated compliance criteria. 

Leveraging Resources: 

In May 2007, the DHS Chief Information Officer and the SCO Director 
jointly issued a memo that, among other things, directed all programs 
that collect and use fingerprints when determining an individual's 
eligibility for entry or benefits to use US-VISIT's IDENT. In 
particular, programs were directed to provide the US-VISIT program 
office with their respective requirements for biometric vetting and 
storage. In doing so, DHS's aim is to leverage its IDENT resource as a 
shared capability or service for all DHS programs. Nevertheless, it is 
not clear that other opportunities to leverage resources across US- 
VISIT, WHTI, and SBInet are being exploited because doing so depends in 
large part on defining program-to-program relationships and plans for 
implementing SCO's screening framework, which have yet to be fully 
defined. 

Agreeing on Roles and Responsibilities: 

Certain department-level roles and responsibilities have been defined 
and agreed upon. As mentioned above, for example, SCO is responsible 
for coordinating the department's screening and credentialing programs 
and creating unified screening standards and policies, and has 
developed a framework and, according to the SCO Associate Director, a 
draft transition plan for achieving this. Also, the EAB is responsible 
for ensuring that DHS investments are aligned with the department's EA 
and that the investments' resources are shared and leveraged. However, 
as also mentioned above, program-level relationships, which would 
include roles and responsibilities for implementing the framework and 
interacting with related programs, have yet to be defined. 

Establishing Compatible Policies, Procedures, and Other Means to 
Operate Across Organizational Boundaries: 

The department has established several mechanisms for facilitating how 
the US-VISIT, WHTI, and SBInet programs interact and operate with one 
another. For example, the DHS EA serves as a common frame of reference 
for programs to map to in an effort to minimize duplication and promote 
capability, and DHS's process for determining program alignment is 
intended to facilitate this. To illustrate, documentation from US- 
VISIT's most recent EA alignment review shows that the DHS Enterprise 
Architecture Center of Excellence[Footnote 54] raised questions about 
the program's efforts to coordinate capabilities with other DHS 
programs, including SBInet. However, the EA is still evolving as a 
means for managing related programs, such as US-VISIT, WHTI, and 
SBInet. For example, US-VISIT's representation in the EA business 
model--which associates the department's business functions with the 
organizations that support and/or implement them--does not align US- 
VISIT with certain business functions (e.g., verify identity and 
establish identity) that the program office identifies as a critical 
part of its mission. Additionally, the EA does not associate US-VISIT 
with all the data systems that it owns and manages, and it does not 
define all system interfaces for IDENT. For example, the EA identifies 
ADIS and IDENT as being owned by CBP and ICE, respectively, even though 
both systems are owned by the US-VISIT program office. Also, it does 
not identify the interface between IDENT and GES, even though US-VISIT 
officials confirm that the interface exists and is operating. According 
to the DHS Chief Architect, the next version of the EA is to address 
such inaccuracies. 

Another mechanism to support interaction across programs is the SCO, 
which provides a means to coordinate and integrate the department's 
screening and credentialing activities, including a framework that 
provides for having a common method or process for collecting and using 
data. In addition, the coordination office provides other means for 
coordinating screening programs, such as weekly meetings with other 
programs. Specifically, SCO sponsors, and US-VISIT participates in, a 
weekly meeting to discuss WHTI implementation. According to the SCO 
Director, SCO also provides budget formulation and policy development 
advice to screening/watchlist portfolio programs to help limit overlap 
and redundancies and to leverage resources among programs. 

At the program level, the US-VISIT program office has established a 
standard protocol for sending biometric information to and from IDENT 
and has developed interface control agreements to describe how the 
protocol will be used with other organizations. 

Developing Mechanisms to Monitor, Evaluate, and Report on Results: 

SCO, through the EA draft transition plan, has developed performance 
indicators for the screening/watchlist portfolio. Such indicators 
include reducing the number of false positives from screening 
operations and increasing the use of technology to verify legitimacy of 
credentials. However, the data to be collected to implement such 
measures have not been defined. 

Conclusions: 

The success of US-VISIT depends in large part on how well the program 
is defined, economically justified, and coordinated with related 
immigration and border management programs. While DHS has addressed 
each of these areas to some degree, none have been performed in a 
manner that fully reflects relevant federal guidance and related best 
practices, even though the program is now into its sixth year of 
activity, and more than a billion dollars has been invested in it. Of 
particular concern is that, after 5 years and tens of millions of 
dollars, DHS has yet to fully define and economically justify a 
comprehensive exit capability, including a plan describing what the 
capability will be, and how, when, and at what cost it will be 
delivered. Further, the Unique Identity component of the US-VISIT 
solution was not economically justified in a timely fashion to 
determine whether it was the most cost-effective solution before 
committing tens of millions of dollars. Therefore, DHS continues to 
lack a clear and fully defined strategic direction for how it will 
deliver on all its strategic program goals, and it continues to invest 
in the program without first knowing that its decision will produce 
cost effective and affordable results. 

To DHS's credit, it has appropriately selected fingerprints as the 
biometric of choice for US-VISIT. Further, it has taken positive steps 
to coordinate US-VISIT with related immigration and border management 
programs, which provide the department opportunities to better reflect 
important collaboration practices. 

Recommendations for Executive Action: 

To ensure that US-VISIT's strategic solution, including a comprehensive 
exit solution, is better defined, economically justified, and 
coordinated, we recommend that the Secretary of Homeland Security take 
the following two actions: 

* Direct the Undersecretary for National Protection and Programs to 
have the US-VISIT Program Director: 

- develop a plan for a comprehensive exit capability, which includes, 
at a minimum, a description of the capability to be deployed, the cost 
of developing, deploying and operating the capability, identification 
of key stakeholders and their respective roles and responsibilities, 
key milestones, and measurable performance indicators; and: 

- develop an analysis of costs, benefits, and risks for proposed exit 
solutions before large sums of money are committed on those solutions, 
and use the analysis in selecting the final solution. 

* Direct the appropriate DHS parties involved in defining, managing, 
and coordinating relationships across the department's border and 
immigration management programs to address the program collaboration 
shortcomings identified in this report, such as fully defining the 
relationships between US-VISIT and other immigration and border 
management programs and, in doing so, to employ the collaboration 
practices discussed in this report. 

Agency Comments and Our Evaluation: 

In written comments on a draft of this report, signed by the Director, 
Departmental GAO/Office of Inspector General Liaison and reprinted in 
appendix IV, the department stated that it generally agreed with our 
observations and concurred with our recommendations. 

In addition, the department stated that it has initiated actions to 
implement our recommendations. With respect to our recommendation to 
develop a plan and cost-benefit analysis for a comprehensive exit 
capability, DHS stated that the department remains committed to 
deploying an air exit solution by December 2008 and has completed a 
cost-benefit analysis for air and sea exit implementation. It is 
important that this cost-benefit analysis be used in selecting the 
final exit solution to ensure that the solution selected achieves the 
expected performance goals with the lowest life cycle costs and the 
least risk. 

Regarding our recommendation to define, manage, and coordinate 
relationships across the department's border and immigration management 
programs, DHS stated that US-VISIT, along with appropriate parties, is 
developing and implementing an internal DHS governance board, which 
will include senior executives from programs such as WHTI and SBI, and 
which will provide a forum for collaboration and communication about 
the program. DHS also noted that, as part of its strategic planning 
efforts, US-VISIT solicits input from stakeholders such as DHS 
headquarters, CBP, ICE, and other federal agencies. DHS also stated 
that US-VISIT is integrally involved in departmental working groups on 
WHTI, SBI, and other immigration reform efforts. We support DHS's 
efforts in this area and emphasize the need for DHS to continue to 
implement the collaboration practices discussed in this report. 

DHS also provided technical comments, which we have incorporated into 
this report as appropriate. 

As we agreed with your office, unless you publicly announce the 
contents of this report earlier, we plan no further distribution of it 
until 30 days from the date of this letter. We will then send copies of 
this report to the Chairmen and Ranking Members of the Senate and House 
Appropriations Committees and other Senate and House committees and 
subcommittees that have authorization and oversight responsibilities 
for homeland security. We will also send copies to the Secretary of 
Homeland Security and the Director of the Office of Management and 
Budget. We will also make copies available to others upon request. In 
addition, this report will be available at no charge on the GAO Web 
site at [hyperlink, http://www.gao.gov]. 

Should you or your offices have any questions on matters discussed in 
this report, please contact me at (202) 512-6222 or at 
willemssenj@gao.gov. Contact points for our Offices of Congressional 
Relations and Public Affairs may be found on the last page of this 
report. Key contributors to this report are listed in appendix V. 

Signed by: 

Joel C. Willemssen: 

Managing Director, Information Technology Issues: 

[End of section] 

Appendix I: Objectives, Scope, and Methodology: 

Our objectives were to determine: (1) whether the Department of 
Homeland Security (DHS) has defined a strategic solution for meeting 
U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) goals 
and whether the solution has been economically justified; (2) the 
biometric technology options DHS has considered and the basis for the 
selected options; and (3) DHS's efforts to define, manage, and 
coordinate the relationships between US-VISIT and other immigration and 
border management programs. 

To determine whether DHS has defined a strategic solution, we reviewed 
key program documentation, such as the US-VISIT strategic plan and 
implementation blueprint, program master schedule, program road map, 
Unique Identity project documentation (e.g., concept of operations, 
business requirements, system architectures, work breakdown structures, 
and project plans), and a high-level schedule for air exit. In doing 
so, we focused on determining such key factors as what program 
activities were planned, when and how they were to be accomplished, 
what resources were needed to accomplish them, and how they related to 
the program's strategic goals. We also interviewed program office 
officials and the Under Secretary for National Protection and Programs 
Directorate to obtain their views on the nature, content, and timing of 
the strategic solution. In cases where we were told of US-VISIT 
activities and capabilities that were not included in program 
documentation, we sought clarifications and plans for providing missing 
information. We also met with representatives from the U.S. Citizenship 
and Immigration Services (USCIS) to understand how that agency was 
implementing enumeration services. 

To determine whether the strategic solution had been economically 
justified, we requested documentation of any economic analyses that had 
been developed. We received and reviewed the Unique Identity cost- 
benefit analysis, dated August 2006, and compared it with key Office of 
Management and Budget criteria.[Footnote 55] However, a new analysis 
was completed in October 2007 and provided to us on November 30, 2007. 
We did not evaluate this analysis because it was not germane to the 
findings of this report. However, we interviewed program officials to 
understand the purpose and timing of this revised cost-benefit 
analysis. 

To examine the biometric technology options DHS has considered and the 
basis for its selected option, we reviewed documentation from DHS, US- 
VISIT, National Institute of Standards and Technology (NIST), and the 
Department of Justice. In particular, we reviewed the Homeland Security 
Council's National Strategy for Homeland Security, DHS's Biometric 
Coordination Group charter, US-VISIT's Unique Identity Concept of 
Operations, NIST's 2003 Fingerprint Vendor Technology Evaluation, and a 
2003 report to the Congress on the "Use of Technology Standards and 
Interoperable Databases With Machine-Readable, Tamper-Resistant Travel 
Documents," which was submitted by NIST, the Attorney General, and the 
Secretary of State. We also reviewed the Department of Justice's 
Inspector General's "Follow-up Review of the Federal Bureau of 
Investigation's Progress Toward Biometric Interoperability Between the 
Integrated Automated Fingerprint Identification System and the 
Automated Biometric Identification System." To understand how the 
information in these documents pertained to the program's biometric 
development efforts, we interviewed knowledgeable officials from the 
program office, DHS's Science & Technology Directorate, USCIS, and 
NIST. We also reviewed our past work on the use of biometrics in border 
security.[Footnote 56] Finally, we analyzed relevant laws related to 
the requirements for US-VISIT's use of biometrics, including the 
Uniting and Strengthening America by Providing Appropriate Tools 
Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT 
Act) and Enhanced Border Security and Visa Entry Reform Act of 2002. 

To identify DHS's efforts to define, manage, and coordinate the 
relationship between US-VISIT and other immigration and border 
management programs, we identified department and program-level efforts 
taken to coordinate US-VISIT with these programs. In particular, we 
reviewed the latest version of the DHS enterprise architecture[Footnote 
57] to determine the extent to which it identifies the relationships 
between these programs and interviewed DHS's Chief Architect to 
determine how the architecture is used to manage these relationships. 
We also reviewed DHS strategic planning documents, as well as DHS's 
Screening Coordination Office's Credentialing Framework. We interviewed 
representatives of the Screening Coordination Office to determine what 
actions are being taken to coordinate screening programs. 

We then compared actions taken with selected key practices that our 
research has found can enhance and sustain agencies' collaborative 
efforts,[Footnote 58] focusing on those practices that were 
particularly relevant and applicable to our objective. These practices 
include the following: 

* establishing common outcomes; 

* establishing mutually reinforcing or joint strategies; 

* leveraging resources; 

* agreeing on roles and responsibilities; 

* establishing a compatible means to operate across organizational 
boundaries; and: 

* developing mechanisms to monitor, evaluate, and report on results. 

To assess data reliability, we reviewed quality and access controls of 
the systems used to generate the data. We also reviewed related program 
documentation to substantiate data provided in interviews with 
knowledgeable agency officials. We have also made appropriate 
attribution indicating the data's sources. When we found data to be 
unreliable or did not assess the data's reliability, we annotated the 
data as such. 

We conducted our work at DHS headquarters offices in Washington, D.C., 
the US-VISIT Program Office in Rosslyn, Virginia, and NIST headquarters 
offices in Gaithersburg, Maryland. Our work was conducted from January 
2007 through January 2008 in accordance with generally accepted 
government auditing standards. 

[End of section] 

Appendix II: Overview of Legislative Underpinnings for the US-VISIT 
Program: 

A series of federal statutes have provided a framework for the 
strategic focus of the US-VISIT program. The first of these statutes 
dates back to more than a decade ago, and the latest law was passed in 
2007. The statutes are summarized here. 

The Illegal Immigration Reform and Immigrant Responsibility Act of 
1996[Footnote 59] required the development of an automated entry and 
exit control system to collect a record of departure for every alien 
departing the United States and then match the record of departure with 
the record of the alien's arrival in the United States; make it 
possible, through online searching procedures, to identify 
nonimmigrants who remain in the country beyond the authorized period; 
and integrate the overstay information into appropriate databases of 
the former Immigration and Naturalization Service[Footnote 60] and the 
Department of State, including those used at air, sea, and land ports 
of entry (POE) and at consular offices. The system was to be developed 
by September 30, 1998; however, the act was amended to change this 
deadline to October 15, 1998,[Footnote 61] and was amended again to 
change the deadline for land border POEs and seaports to March 30, 
2001.[Footnote 62] 

The Immigration and Naturalization Service Data Management Improvement 
Act of 2000[Footnote 63] replaced the 1996 statute in its entirety. 
Specifically, the act required an electronic system that would provide 
access to and integrate alien arrival and departure data that are 
authorized or required to be created or collected under law, are in an 
electronic format, and are in a database of the Department of Justice 
or the Department of State, including those created or used at POEs and 
at consular offices. The act specifically provided that it not be 
construed to permit the imposition of any new documentary or data 
collection requirements on any person for the purpose of satisfying its 
provisions, but it further provided that it also not be construed to 
reduce or curtail any authority of the Attorney General (now Secretary 
of Homeland Security)[Footnote 64] or Secretary of State under any 
other provision of law. The integrated entry and exit data system was 
to be implemented at airports and seaports by December 31, 2003, at the 
50 busiest land POEs by December 31, 2004, and at all remaining POEs by 
December 31, 2005. 

The act also required that the system use available data to produce an 
annual report of arriving and departing aliens by country of 
nationality, classification as an immigrant or nonimmigrant, and 
timeliness of departure from the United States. The system was to match 
an alien's available arrival data with the alien's available departure 
data, assist in the identification of possible overstays, and use 
available alien arrival and departure data for annual reports to the 
Congress. These reports were to include the number of aliens for whom 
departure data was collected during the reporting period, with an 
accounting by country of nationality; the number of departing aliens 
whose departure data was successfully matched to the alien's arrival 
data, with an accounting by country of nationality and classification 
as an immigrant or nonimmigrant; the number of aliens who arrived 
pursuant to a nonimmigrant visa, or as a visitor under the Visa Waiver 
Program, for whom no matching departure data have been obtained as of 
the end of the alien's authorized period of stay, with an accounting by 
country of nationality and date of arrival in the United States; and 
the number of identified overstays, with an accounting by country of 
nationality. 

The USA PATRIOT Act of 2001[Footnote 65] provided that, in developing 
the integrated entry and exit data system, the Secretary of Homeland 
Security and Secretary of State were to focus particularly on the 
utilization of biometric technology and the development of tamper- 
resistant documents readable at POEs. It also required that the system 
be able to interface with law enforcement databases for use by federal 
law enforcement to identify and detain individuals who pose a threat to 
the national security of the United States. 

The USA PATRIOT Act also required by October 26, 2003, the development 
and certification of a technology standard, including appropriate 
biometric identifier standards, that could be used to verify the 
identity of persons applying for a U.S. visa or persons seeking to 
enter the United States pursuant to a visa for the purposes of 
conducting background checks, confirming identity, and ensuring that a 
person has not received a visa under a different name. This technology 
standard was to be the technological basis for a cross-agency, cross- 
platform electronic system that is a cost-effective, efficient, fully 
interoperable means to share law enforcement and intelligence 
information necessary to confirm the identity of persons applying for a 
U.S. visa or persons seeking to enter the United States pursuant to a 
visa. This electronic system was to be readily and easily accessible to 
consular officers, border inspection agents, and law enforcement and 
intelligence officers responsible for investigation or identification 
of aliens admitted to the United States pursuant to a visa. Every 2 
years beginning on April 26, 2003, the Secretary of Homeland Security 
and the Secretary of State were to jointly report to the Congress on 
the development, implementation, efficacy, and privacy implications of 
the technology standard and electronic database system. 

The Visa Waiver Permanent Program Act[Footnote 66] required DHS to 
develop and implement a fully automated system to control entry and 
exit of aliens at airports and seaports who enter the United States 
under the Visa Waiver Program. The act also required that, by October 
1, 2002, inspectors at the POEs have access to Department of State and 
DHS information to determine whether an alien is eligible to be 
admitted into the United States or to receive a visa. Further, the act 
required that visa waiver applicants be checked against watch list 
systems, and, that by October 1, 2003, aliens applying for a visa 
waiver have a machine-readable passport.[Footnote 67] The act was 
subsequently amended to require, not later than August 3, 2008, an exit 
system using biometric information and recording the departure on a 
flight leaving the United States of every alien participating in the 
Visa Waiver Program.[Footnote 68] 

The Enhanced Border Security and Visa Entry Reform Act of 2002[Footnote 
69] required that, in developing the integrated entry and exit data 
system for the POEs, the Secretary of Homeland Security and Secretary 
of State implement, fund, and use the technology standard required by 
the USA PATRIOT Act at U.S. POEs and at consular posts abroad. The act 
amended the USA PATRIOT Act to move up the date for the development and 
certification of the technology standard to January 26, 2003, and moved 
up the date for the biannual reports to the Congress on the technology 
standard to October 26, 2002. The 2002 act also required the Secretary 
of Homeland Security and Secretary of State to establish a database 
containing the arrival and departure data from machine-readable visas, 
passports, and other travel and entry documents possessed by aliens and 
make interoperable all security databases relevant to making 
determinations of admissibility under section 212 of the Immigration 
and Nationality Act. In implementing these requirements, DHS and the 
Department of State were to utilize technologies that facilitate the 
lawful and efficient cross-border movement of commerce and persons 
without compromising the safety and security of the United States and 
were to consider implementing a North American National Security 
Program, for which other provisions in the act called for a feasibility 
study. 

The act, as amended, also established a number of requirements 
regarding biometric travel and entry documents. It required that, not 
later than October 26, 2004, the Secretary of Homeland Security and the 
Secretary of State issue to aliens only machine-readable, tamper- 
resistant visas and other travel and entry documents that use biometric 
identifiers and that they jointly establish document authentication 
standards and biometric identifiers standards to be employed on such 
visas and other travel and entry documents from among those biometric 
identifiers recognized by domestic and international standards 
organizations. It also required by October 26, 2004 (amended to October 
26, 2005), the installation at all U.S. POEs equipment and software to 
allow biometric comparison and authentication of all U.S. visas and 
other travel and entry documents issued to aliens and passports issued 
by visa waiver participants. Such biometric data readers and scanners 
were to be those that domestic and international standards 
organizations determine to be highly accurate when used to verify 
identity, that can read the biometric identifiers used under the act, 
and that can authenticate the document presented to verify identity. 
These systems also were to utilize the technology standard established 
pursuant to the USA PATRIOT Act. 

The Intelligence Reform and Terrorism Prevention Act of 2004[Footnote 
70] described the program as an "automated biometric entry and exit 
data system" and required DHS to develop a plan to accelerate the full 
implementation of the program and to report to the Congress on this 
plan by June 15, 2005. The report was to provide several types of 
information about the implementation of US-VISIT,[Footnote 71] 
including a "listing of ports of entry and other Department of Homeland 
Security and Department of State locations with biometric exit data 
systems in use." The report also was to provide a description of the 
manner in which the US-VISIT program "meets the goals of a 
comprehensive entry and exit screening system, including both entry and 
exit biometrics;" and fulfills the statutory obligations imposed on the 
program by several laws enacted between 1996 and 2002. The act provided 
that US-VISIT "shall include a requirement for the collection of 
biometric exit data for all categories of individuals who are required 
to provide biometric entry data, regardless of the port of entry where 
such categories of individuals entered the United States." 

The provisions in the 2004 act also addressed other areas related to US-
VISIT, such as the integration and interoperability of databases and 
data systems that process or contain information on aliens and federal 
law enforcement and intelligence information relevant to visa issuance 
and admissibility of aliens and maintenance of the accuracy and 
integrity of the US-VISIT data system. It further addressed using US- 
VISIT to track and facilitate the processing of immigration benefits 
using biometric identifiers; the goals of the program (e.g., serving as 
a vital counterterrorism tool, screening visitors efficiently and in a 
welcoming manner, integrating relevant databases and plans for database 
modifications to address volume increase and database usage, and 
providing inspectors and related personnel with adequate real-time 
information); and training, education, and outreach on US-VISIT, low- 
risk visitor programs, and immigration law. Finally, it addressed 
annual compliance reports by DHS, the Department of State, the 
Department of Justice, and any other department or agency subject to 
the requirements of the new provisions; and development and 
implementation of a registered traveler program. 

[End of section] 

Appendix III: Overview of Biometric Technologies: 

Biometric identification systems are human characteristic pattern 
recognition systems. While the biometric technologies used in these 
systems vary in complexity, capabilities, and performance, the 
technologies all share several elements. They use acquisition devices, 
such as cameras and scanning devices, to capture images, recordings, or 
measurements of an individual's characteristics and computer hardware 
and software to extract, encode, store, and compare these 
characteristics. Because the process is automated, biometric comparison 
is generally very fast, in most cases taking only a few seconds in real 
time. 

Depending on the application, biometric systems can be used in one of 
two modes: identification or verification. Identification is referred 
to as one-to-many matching because an individual's presented biometric 
is compared against the stored biometric templates[Footnote 72] of all 
individuals enrolled in the system. Verification--also called 
authentication--is referred to as one-to-one matching because an 
individual's presented biometric is compared against the biometric for 
that person, which was stored in the system during enrollment. 

How Biometrics Work: 

Biometric technologies are available today and are being used for a 
variety of applications, such as access control, criminal 
identification, and border security. While several biometric 
technologies are in use or being proposed, the more common technologies 
and the ones that the US-VISIT program office considered for its 
strategic solution are fingerprint recognition, facial recognition, and 
iris recognition. 

When used for personal identification, biometric technologies measure 
and analyze human physiological and behavioral characteristics. 
Identifying a person's physiological characteristics is based on direct 
measurement of a part of the body, such as fingertips, faces, and 
irises. The corresponding biometric technologies are fingerprint, 
facial, and iris recognition. Identifying a person's behavioral 
characteristics is based on data derived from actions, such as speech 
and signature, the corresponding biometrics being speaker recognition 
and signature recognition. 

Biometrics are theoretically effective personal identifiers because the 
characteristics they measure are thought to be distinct to each person. 
Unlike conventional identification methods that use something you have, 
such as an identification card to gain access to a building, or 
something you know, such as a password to log on to a computer system, 
these characteristics are intrinsic to who you are. Because they are 
inherent in an individual, they are more reliable, cannot be forgotten, 
and are less easily lost, stolen, or guessed. 

Although biometric technologies measure different characteristics in 
substantially different ways, all biometric systems involve similar 
processes that can be divided into two distinct stages: enrollment and 
identification or verification. No match is ever perfect in either an 
identification or a verification system because every time a biometric 
is captured, the template is likely to be unique. Therefore, biometric 
systems can be configured to make a match or no-match decision, based 
on a predefined number, referred to as a threshold, which establishes 
the acceptable degree of similarity between the trial template and the 
enrolled reference template. After the comparison, a score representing 
the degree of similarity is generated, and this score is compared with 
the threshold to make a match or no-match decision. For algorithms for 
which the similarity between two templates is calculated, a score 
exceeding the threshold is considered a match. For algorithms for which 
the difference between two templates is calculated, a score below the 
threshold is considered a match. Depending on the setting of the 
threshold in identification systems, several reference templates can be 
considered matches to the trial template, with the better scores 
corresponding to better matches. 

Types of Biometric Technologies: 

As mentioned above, the three biometric technologies that the US-VISIT 
program office considered for its strategic solution are fingerprint 
recognition, facial recognition, and iris recognition. These three 
technologies are discussed in the sections that follow. 

Fingerprint Recognition: 

Fingerprint recognition technology[Footnote 73] extracts features from 
impressions made by the distinct ridges on the fingertips. The 
fingerprints can be either flat or rolled. A flat print captures only 
an impression of the central area between the fingertip and the first 
knuckle; a rolled print captures ridges on both sides of the finger. An 
image of the fingerprint is captured by a scanner, enhanced, and 
converted into a template. Scanner technologies can be optical, 
silicon, or ultrasound technologies, with optical being the most 
commonly used. During enhancement, the definition of the ridges is 
augmented to offset such things as dirt, cuts, scars, and creases or 
dry, wet, or worn fingerprints. Template size ranges from 250 bytes up 
to 1,000 bytes, depending on which vendor's proprietary algorithm the 
system uses. Approximately 80 percent of vendors base their algorithms 
on the extraction of minutiae points relating to breaks in the ridges 
of the fingertips. Other algorithms are based on extracting ridge 
patterns. 

Facial Recognition: 

Facial recognition technology identifies people by analyzing features 
of the face not easily altered--the upper outlines of the eye sockets, 
the areas around the cheekbones, and the sides of the mouth. The 
technology is typically used to compare a live facial scan to a stored 
template, but it can also be used in comparing static images such as 
digitized passport photographs. Facial recognition can be used in both 
identification and verification systems. In addition, because facial 
images can be captured from video cameras, facial recognition is the 
only biometric that can be used for surveillance purposes. 

Iris Recognition: 

Iris recognition technology focuses on the distinctly colored ring 
surrounding the pupil of the eye. Made from elastic connective tissue, 
the iris is a very rich source of biometric data, having approximately 
266 distinctive characteristics. Formed during the eighth month of 
gestation, these characteristics reportedly remain stable throughout a 
person's lifetime, except in cases of injury. Iris recognition systems 
use a small, high-quality camera to capture a black-and-white, high- 
resolution image of the iris. They then define the boundaries of the 
iris, establish a coordinate system over the iris, and define the zones 
for analysis within the coordinate system. The visible characteristics 
within the zones are then converted into a 512-byte template that is 
used to identify or verify the identity of an individual. 

Using Biometrics to Enroll Individuals: 

In enrollment, a biometric system is trained to identify a specific 
person. The person first provides an identifier, such as an 
identification document. That person then presents the biometric (e.g., 
fingertips, face, or iris) to an acquisition device, and the biometric 
is linked to his or her identity. Depending on the technology, the 
biometric sample may be collected as an image, a recording, or a record 
of related dynamic measurements. Template size also varies, depending 
on the vendor and the technology, and can be stored remotely in a 
central database or within a biometric reader device itself; their 
small size also allows for storage on smart cards or tokens. 

Minute changes in positioning, distance, pressure, environment, and 
other factors influence the generation of a template, making each 
template likely to be unique, each time an individual's biometric data 
are captured and a new template is generated. Consequently, depending 
on the biometric system, a person may need to present biometric data 
several times in order to enroll. The reference template may then 
either represent an amalgam of the captured data or several enrollment 
templates may be stored. The quality of the template or templates is 
critical in the overall success of the biometric application. Because 
biometric features can change over time, people may have to reenroll to 
update their reference template. Some technologies can update the 
reference template during matching operations. 

The enrollment process also depends on the quality of the identifier 
the enrollee presents. The reference template is linked to the identity 
specified on the identification document. If the identification 
document does not specify the individual's true identity, the reference 
template will be linked to a false identity. 

Using Biometrics to Identify Individuals: 

In identification systems, the purpose is to identify who the person 
is. To find a match, the trial template is compared against the stored 
reference templates of all individuals enrolled in the system. 
Identification systems are referred to as one-to-many matching because 
an individual's biometric is compared against multiple biometric 
templates in the system's database. 

There are two types of identification systems: positive and negative. 
Positive identification systems are designed to ensure that an 
individual's biometric is enrolled in the database. The anticipated 
result of a search is a match. A typical positive identification system 
controls access to a secure building or secure computers by checking 
anyone who seeks access against a database of enrolled employees. The 
goal is to determine whether a person seeking access can be identified 
as having been enrolled in the system. 

Negative identification systems are designed to ensure that a person's 
biometric information is not present in a database. The anticipated 
result of a search is a nonmatch. Comparing a person's biometric 
information against a database of all who are registered in a public 
benefits program, for example, can ensure that this person is not 
"double dipping" by using fraudulent documentation to register under 
multiple identities. 

Another type of negative identification system is a surveillance system 
that uses a watch list. Such systems are designed to identify people on 
the watch list and alert authorities for appropriate action. For all 
other people, the system is to check that they are not on the watch 
list and allow them normal passage. The people whose biometrics are in 
the database in these systems may not have provided them voluntarily. 
For instance, for a surveillance system, the biometrics may be faces 
captured from mug shots provided by a law enforcement agency. 

Using Biometrics to Verify Individuals: 

In verification systems, the purpose is to verify that a person is who 
he or she claims to be (i.e., the person who enrolled). After the 
individual provides the identifier he or she used to enroll, the 
biometric is presented, which the biometric system captures, generating 
a trial template that is based on the vendor's algorithm. The system 
then compares the trial biometric template with this person's reference 
template, which was stored in the system during enrollment, to 
determine whether the individual's trial and stored templates match. 

Verification is often referred to as one-to-one matching. Verification 
systems can contain databases ranging from dozens to millions of 
enrolled templates but are always predicated on matching an 
individual's presented biometric against his or her reference template. 
Nearly all verification systems can render a match or no-match decision 
in less than a second. An example of a verification application is a 
system that requires employees to authenticate their claimed identities 
before granting them access to secure buildings or to computers. 

US-VISIT functions both as an identification system and a verification 
system. In the case of identification, US-VISIT serves as a negative 
identification system by utilizing watchlist information, such as the 
Federal Bureau of Investigation's Criminal Master File, to identify 
individuals that should be denied entry into the United States and 
possibly apprehended or detained by law enforcement officials. In the 
case of verification, US-VISIT is used to verify the identities of 
travelers who have been enrolled in the system. 

[End of section] 

Appendix IV: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

Homeland Security: 

February 19, 2008: 

Mr. Randolph Hite: 
Director, Information Technology Architecture And Systems Issues: 
U.S. Government Accountability Office: 
Washington, DC 20548: 

Dear Mr. Hite: 

Thank you for the opportunity to review the draft report, Homeland 
Security: Strategic Solution for US-Visit Program Needs to Be Better 
Defined, Justified, and Coordinated (GAO-08-361). 

US-VISIT generally agrees with the GAO's observations contained in the 
draft report and has initiated actions to address the recommendations. 
In addition, US-VISIT has provided specific substantive and technical 
comments on the draft report. 

Recommendation 1: The Undersecretary for National Protection and 
Programs direct the US-VISIT Program Director to 

* Develop a plan for a comprehensive exit capability, which includes, 
at a minimum, a description of the capability to be deployed, the cost 
of developing, deploying and operating the capability, identification 
of key stakeholders and their respective roles and responsibilities, 
key milestones, and measurable performance indicators. 

* Develop an analysis of costs, benefits, and risks for proposed exit 
solutions before large sums of money are committed on those solutions, 
and use the analysis in selecting the final solution. 

Response: 

US-VISIT concurs with this recommendation. 

* US-VISIT continues to refine the definition of a DHS-wide solution 
for establishing an exit capability at air and sea environments. In 
November 2007 the then-Acting Under Secretary for National Protection 
and Programs convened a Departmental planning session to ensure a 
coordinated approach to implementing air and sea exit operations by 
December 2008. 

* DHS is proposing to establish an exit system at all air and sea ports 
of departure in the United States. This rule proposes to require aliens 
subject to US-VISIT biometric requirements upon entering the United 
States to also provide biometric identifiers prior to departing the 
United States from air or sea ports of departure. DHS is working 
aggressively on getting the Notice of Proposed Rule Making published, 
with plans to implement the procedures by the end of 2008. 

* In conjunction with the Notice of Proposed Rule Making, US-VISIT has 
completed a cost benefit analysis for air and sea exit implementation. 

* In addition, US-VISIT is developing a revised strategic plan that 
recognizes its evolving role in DHS and the National Protection and 
Programs Directorate (NPPD) and that is fully compliant with the 
requirements of the Government Performance and Results Act. The 
emphasis of the Strategic Plan is to align the mission and be results 
oriented so that the program can measure, achieve, and control the 
program resources and projects. 

Recommendation 2: The Secretary of Homeland Security direct the 
appropriate DHS parties involved in defining, managing, and 
coordinating relationships across the department 's border and 
immigration management programs to address the program collaboration 
shortcomings identified in this report, such as fully defining the 
relationships between US-VISIT and other immigration and border 
management programs, and in doing so, to employ the collaboration 
practices discussed in this report. 

Response: 

US-VISIT concurs with the recommendation. 

* US-VISIT, along with the appropriate parties, is developing and 
implementing an internal to DHS governance board, which will include 
senior executives from DHS headquarters and operational components—many 
of whom control and operate border protection programs, such as the 
Western Hemisphere Travel Initiative (WHTI) and the Secure Border 
Initiative (SBI). This board will provide a forum for collaboration and 
communication about the program. 

* US-VISIT is continually redefining, managing, and coordinating 
relationships with other immigration and border management programs, as 
appropriate. As part of its strategic planning, US-VISIT solicits input 
from four groups of critically important stakeholders: (1) DHS 
headquarters, including the office of the Chief Information Officer, 
the Screening Coordination Office, and the Office of Policy; (2) DHS 
component organizations, including U.S. Customs and Border Protection 
and U.S. Immigration and Customs Enforcement; (3) other Federal 
agencies, including the Department of Defense, the Federal Bureau of 
Investigation, the Department of State, and the National Institute of 
Standards and Technology; and (4) affected non- Government 
organizations, including the Travel Industry Association and the 
American Immigration Lawyers Association. US-VISIT is also integrally 
involved in Departmental working groups on WHTI, SBI, and immigration 
reform efforts. 

We again thank you for the opportunity to comment and for the 
professionalism of the GAO team that worked on this engagement. 

Sincerely, 

Signed by: 

Steven J. Pecinovsky: 
Director: 
Departmental GAO/OIG Liaison Office: 

[End of section] 

Appendix V: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Joel C. Willemssen, (202) 512-6222, or willemssenj@gao.gov: 

Staff Acknowledgments: 

In addition to the individual named above, Deborah Davis, Assistant 
Director; Harold Brumm; Neil Doherty; Kory Godfrey; Matthew Grote; 
Joshua Hammerstein; Dave Hinchman; Sandra Kerr; Kaelin Kuhn; Nicholas 
Marinos; Madhav Panwar; Sushmita Srikanth; Amos Tevelow; Jessica 
Waselkow; and Eric Winter made key contributions to this report. 

[End of section] 

Footnotes: 

[1] Applicable statutes are described in detail in appendix II. 

[2] Prior to the creation of DHS in 2002, the Immigration and 
Naturalization Service of the Department of Justice performed this 
mission. 

[3] Pub. L. No. 104-208, div. C, sec. 110 (Sept. 30, 1996). 

[4] 8 U.S.C. § 1365a. 

[5] Effective March 1, 2003, the Immigration and Naturalization Service 
became part of DHS. 

[6] On April 29, 2003, the Secretary of DHS renamed the entry-exit 
system the US-VISIT system. 

[7] 8 U.S.C. § 1379. USA PATRIOT Act stands for the Uniting and 
Strengthening America by Providing Appropriate Tools Required to 
Intercept and Obstruct Terrorism Act of 2001. As applicable here, the 
Act's requirements for the Immigration and Naturalization Service were 
taken over by DHS. 

[8] Pub. L. No. 106-396 (Oct. 30, 2000). 

[9] Between October 1, 2003, and September 30, 2007, the Secretary of 
State could waive the requirement for machine-readable passports if the 
country (1) was making progress toward ensuring that machine-readable 
passports are generally available to its nationals and (2) it has taken 
appropriate measures to protect against misuse of passports it issued 
that do not meet the requirements. 

[10] 8 U.S.C. § 1187(i). 

[11] Pub. L. No. 107-173 (May 14, 2002). 

[12] Pub. L. No. 108-299 (Aug. 9, 2004) extended the deadline from 
October 26, 2004, to October 26, 2005. 

[13] Countries participating in the Visa Waiver Program are Andorra, 
Australia, Austria, Belgium, Brunei, Denmark, Finland, France, Germany, 
Iceland, Ireland, Italy, Japan, Liechtenstein, Luxembourg, Monaco, The 
Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore, 
Slovenia, Spain, Sweden, Switzerland, and the United Kingdom. 

[14] Pub. L. No. 108-458, § 7208 (Dec. 17, 2004). 

[15] US-VISIT currently applies to a certain group of foreign 
nationals--nonimmigrants from countries whose residents are required to 
obtain nonimmigrant visas before entering the United States and 
residents of certain countries who are exempt from U.S. visa 
requirements when they apply for admission to the United States for up 
to 90 days for tourism or business purposes under the Visa Waiver 
Program. US-VISIT also applies to (1) Mexican nonimmigrants traveling 
with a Border Crossing Card (BCC), who wish to remain in the United 
States longer than 30 days or who declare that they intend to travel 
more than 25 miles into the country from the border and (2) Canadians 
traveling to the United States for certain specialized reasons. See 8 
C.F.R. § 235.1(f). 

[16] On September 30, 2004, US-VISIT expanded biometric entry 
procedures to include individuals from visa waiver countries applying 
for admission. 

[17] According to program officials, 14 of the remaining 16 POEs have 
no operational need to deploy US-VISIT because visitors subject to US- 
VISIT are, by regulation, not authorized to enter into the United 
States at these locations. The other two POEs do not have the necessary 
transmission lines to operate US-VISIT, and thus they process visitors 
manually. 

[18] Under section 212 of the Immigration and Nationality Act (INA), as 
amended, an alien (nonimmigrant) is inadmissible if he/she does not 
have a valid passport, nonimmigrant visa, or border crossing 
identification card at the time of application for admission. 8 U.S.C. 
§ 1182(a)(7)(B). Under the INA's expedited removal process, if an alien 
is inadmissible under section 212, the inspection officer may order the 
alien removed from the United States, without further hearing or 
review, unless the alien can demonstrate a credible fear of returning 
to his/her home country. 8 U.S.C. § 1225(b)(1)(A). Category 1 Visa 
Refusals include all the permanent ineligibilities for entry into the 
United States based on national security concerns, criminal activity, 
and the threat of spreading contagious disease. 

[19] The Mona Passage is located between the Dominican Republic and 
Puerto Rico. The objective of this effort is to demonstrate the 
feasibility of using biometric data (fingerprints) to identify and 
support prosecution of interdicted individuals. Interdicted individuals 
are enrolled in US-VISIT's IDENT database and are biometrically checked 
against known and suspected terrorists, aggravated felons, previous 
deportees, and recidivists. 

[20] We did not verify this information. 

[21] After a biometric system extracts the features of an individual's 
body part, it uses an algorithm to encode the features and store the 
information in a biometric template that can be used for future 
comparison. 

[22] Pub. L. No. 108-458, § 7209 (Dec. 17, 2004), as amended by Pub. L. 
No. 109-295, § 546 (Oct. 4, 2006) and Pub. L. No. 110-161, div. E, § 
545 (Dec. 26, 2007). 

[23] In November 2006, DHS and the Department of State issued a final 
rule announcing that, beginning on January 23, 2007, citizens of the 
United States, Canada, Mexico, and Bermuda are required to present a 
passport to enter the United States when arriving by air from any part 
of the western hemisphere. 71 Fed. Reg. 68,412 (Nov. 24, 2006). (To be 
codified at 8 C.F.R. Parts 212 and 235 and 22 C.F.R. Parts 41 and 53.) 

[24] Since the date of the proposed rule, the Department of Homeland 
Security Appropriations Act, 2008, was enacted, which extended the WHTI 
implementation deadline. Pub. L. No. 110-161, div. E § 545 (Dec. 26, 
2007). Specifically, the implementation shall not be earlier than the 
date that is the later of 3 months after the Secretaries of State and 
Homeland Security certify that certain criteria have been met, or June 
1, 2009. 

[25] GAO, Observations on Implementing the Western Hemisphere Travel 
Initiative, GAO-08-274R (Washington, D.C.: Dec. 20, 2007). 

[26] See, for example, GAO, Homeland Security: Efforts Under Way to 
Develop Enterprise Architecture, but Much Work Remains, GAO-04-777 
(Washington, D.C.: Aug. 6, 2004); GAO, DOD Business Systems 
Modernization: Limited Progress in Development of Business Enterprise 
Architecture and Oversight of Information Technology Investments, GAO- 
04-731R (Washington, D.C.: May 17, 2004); GAO, Information Technology: 
Architecture Needed to Guide NASA's Financial Management Modernization, 
GAO-04-43 (Washington, D.C.: Nov. 21, 2003); GAO, DOD Business Systems 
Modernization: Important Progress Made to Develop Business Enterprise 
Architecture, but Much Work Remains, GAO-03-1018 (Washington, D.C.: 
Sept. 19, 2003); GAO, Business Systems Modernization: Summary of GAO's 
Assessment of the Department of Defense's Initial Business Enterprise 
Architecture, GAO-03-877R (Washington, D.C.: July 7, 2003); GAO, 
Information Technology: DLA Should Strengthen Business Systems 
Modernization Architecture and Investment Activities, GAO-01-631 
(Washington, D.C.: June 29, 2001); and GAO, Information Technology: INS 
Needs to Better Manage the Development of Its Enterprise Architecture, 
GAO/AIMD-00-212 (Washington, D.C.: Aug. 1, 2000). 

[27] GAO, Information Technology: Homeland Security Needs to Improve 
Entry Exit System Expenditure Planning, GAO-03-563 (Washington, D.C.: 
June 9, 2003); GAO, Homeland Security: Risks Facing Key Border and 
Transportation Security Program Need to Be Addressed, GAO-03-1083 
(Washington, D.C.: Sept. 19, 2003); GAO-04-586; GAO, Homeland Security: 
Some Progress Made, but Many Challenges Remain on U.S. Visitor and 
Immigrant Status Indicator Technology Program, GAO-05-202 (Washington, 
D.C.: Feb. 23, 2005); GAO, Homeland Security: Recommendations to 
Improve Management of Key Border Security Program Need to Be 
Implemented, GAO-06-296 (Washington, D.C.: Feb. 14, 2006); GAO, Border 
Security: US-VISIT Program Faces Strategic, Operational, and 
Technological Challenges at Land Ports of Entry, GAO-07-248 
(Washington, D.C.: Dec. 6, 2006); GAO, Homeland Security: Planned 
Expenditures for U.S. Visitor and Immigrant Status Program Need to Be 
Adequately Defined and Justified, GAO-07-278 (Washington, D.C.: Feb. 
14, 2007); GAO, Homeland Security: U.S. Visitor and Immigrant Status 
Program's Long-standing Lack of Strategic Direction and Management 
Controls Need to Be Addressed, GAO-07-1065 (Washington, D.C.: Aug. 31, 
2007). 

[28] GAO-07-248. 

[29] GAO-07-1065. 

[30] GAO-03-1083. 

[31] GAO-06-296. 

[32] GAO-07-278. 

[33] Since 2006, we have reported that the system that US-VISIT uses to 
manage its finances, ICE's Federal Management System has reliability 
issues. Although many issues are no longer considered material 
weaknesses, independent auditors are still unable to express an opinion 
on DHS's balance sheets as of September 30, 2007. 

[34] Section 303 of the Enhanced Border Security and Visa Entry Reform 
Act of 2002 (Pub. L. No. 107-173) requires that no later than October 
26, 2004, the Department of State issue visas that use biometric 
identifiers. Pub. L. No. 108-299 (Aug. 9, 2004) extended the deadline 
from October 26, 2004 to October 26, 2005. 

[35] The 10 planned locations are Washington Dulles International 
Airport (Chantilly, VA), John F. Kennedy International Airport (New 
York, NY), Detroit Metropolitan Wayne County Airport (Detroit, MI), 
William B. Hartsfield International Airport (Atlanta, GA), Chicago 
O'Hare International Airport (Chicago, IL), General Edward Lawrence 
Logan International Airport (Boston, MA), Orlando International Airport 
(Orlando, FL), San Francisco International Airport (San Francisco, CA), 
Miami International Airport (Miami, FL), and Houston International 
Airport (Houston, TX). 

[36] The enumerator is an alphanumerical identifier that is to link 
disparate records pertaining to an individual, such that these records 
can be linked and accurately retrieved, regardless of location, 
platform or issuing entity. It can be used for identification purposes 
within DHS and by other immigration and border management 
organizations. 

[37] Although US-VISIT plans to have enumeration search and link to 
information found in IAFIS, the USCIS Chief Information Officer stated 
that, initially, USCIS will not search IAFIS information when making a 
request because of fees charged by the FBI for accessing IAFIS, noting 
that USCIS already had an interface to IAFIS. According to the same 
official, USCIS plans to make use of IDENT/IAFIS interoperability once 
it is deployed. 

[38] A fingerprint matcher is an automated identification system that 
searches against databases that store minutiae information for 
fingerprint images. A minutiae point is a break in a fingertip ridge in 
a fingerprint image. A typical fingerprint image may produce between 15 
and 50 minutiae, depending on the portion of the image captured. These 
minutiae are used in matching with other fingerprints. 

[39] Specifically, the IIRIRA required the development of an automated 
system to record and then match the departure of every foreign national 
from the United States to the individual's arrival record. 
Subsequently, the Immigration and Naturalization Service Data 
Management Improvement Act of 2000 amended the IIRIRA and required an 
electronic system to record the entry and exit of certain foreign 
nationals, and the Intelligence Reform and Terrorism Prevention Act of 
2004 specifically required that US-VISIT include the collection of 
biometric exit data for all individuals for which entry data was 
available. 

[40] GAO-07-1065. 

[41] In its technical comments on a draft of this report, DHS stated 
that it had developed a project management plan. 

[42] Office of Management and Budget, Planning, Budgeting, Acquisition 
and Management of Capital Assets, Circular A-11, Part 7 (Washington, 
D.C.: June 21, 2005). 

[43] Department of Homeland Security, Capital Planning and Investment 
Control: Cost-Benefit Analysis (CBA) Guidebook (February 2006). 

[44] Includes data such as: FBI information on all known and suspected 
terrorists, selected wanted persons (foreign-born, unknown place of 
birth, previously arrested by DHS), and previous criminal histories for 
high-risk countries; DHS ICE information on deported felons and 
registered sex offenders; and DHS information on previous criminal 
histories and previous IDENT enrollments. 

[45] A latent print is fingerprint "image" left on a surface that was 
touched by an individual. The transferred impression is left by the 
surface contact with the friction ridges, usually caused by the oily 
residues produced by the sweat glands in the finger. 

[46] GAO, Results-Oriented Government: Practices That Can Help Enhance 
and Sustain Collaboration among Federal Agencies, GAO-06-15 
(Washington, D.C.: Oct. 21, 2005). 

[47] A credential is a certified document showing that a person has a 
certain privilege, right, or status. 

[48] Portfolios are groupings of related investments, projects, 
systems, and services. 

[49] A data asset is a managed container for data such as a database, 
Web site, document repository, or directory. 

[50] RFID technology can be used to electronically identify and gather 
information contained on a tag. 

[51] US-VISIT utilized RFID technology embedded in a tag on a visitor's 
arrival/departure form--which an electronic reader at the POE was 
intended to detect. For the implementation of WHTI in the land 
environment, DHS anticipates that RFID infrastructure will be rolled 
out to cover the top 39 POEs (in terms of number of travelers). 

[52] This project is to enable IDENT backend services, such as IDENT 
watch list checks and enrollment in US-VISIT, to customers with mobile 
capability requirements. 

[53] The DHS EAB acts as the Executive Steering Committee for DHS IT 
programs and has the primary responsibility to oversee the department's 
EA.  

[54] The DHS Enterprise Architecture Center of Excellence is 
responsible for conducting reviews of program alignment, technology 
insertions, service insertions and other decision requests to ensure 
alignment with the department's enterprise architecture. It is composed 
of members from the components including CBP and US-VISIT as well as 
specialty reviewers such as the Privacy Office. 

[55] Office of Management and Budget, Guidelines and Discount Rates for 
Benefits-Cost Analysis of Federal Programs, Circular A-94 (Washington, 
D.C.: Oct. 29, 1992). 

[56] GAO, Technology Assessment: Using Biometrics for Border Security, 
GAO-03-174 (Washington, D.C.: Nov. 15, 2002). 

[57] Homeland Security EA 2007. 

[58] GAO-06-15. 

[59] Pub. L. No. 104-208, div. C, sec. 110 (Sept. 30, 1996). 

[60] Effective March 1, 2003, the Immigration and Naturalization 
Service became part of DHS. 

[61] Pub. L. No. 105-259 (Oct. 15, 1998). 

[62] Pub. L. No. 105-277 (Oct. 21, 1998). 

[63] Pub. L. No. 106-215 (June 15, 2000). 

[64] The Homeland Security Act of 2002 transferred the border patrol, 
detention and removal, intelligence, investigations, and inspections 
programs previously under the Department of Justice's Commissioner of 
Immigration and Naturalization to DHS's Under Secretary for Border and 
Transportation Security. 6 U.S.C. § 251. 

[65] Pub. L. No. 107-56 (Oct. 26, 2001). 

[66] Pub. L. No. 106-396 (Oct. 30, 2000). 

[67] Between October 1, 2003, and September 30, 2007, the Secretary of 
State could waive the requirement for machine readable passports if the 
country (1) was making progress toward ensuring that machine-readable 
passports are generally available to its nationals and (2) it has taken 
appropriate measures to protect against misuse of passports it issued 
that do not meet the requirements. 

[68] 8 U.S.C. § 1187(i). 

[69] Pub. L. No. 107-173 (May 14, 2002). 

[70] Pub. L. No. 108-458 (Dec. 17, 2004). 

[71] On April 29, 2003, the Secretary of DHS renamed the entry exit 
system the US-VISIT system. 

[72] After a biometric system extracts the features of an individual's 
body part, it uses an algorithm to encode the features and store the 
information in a biometric template that can be used for future 
comparison. 

[73] Fingerprint recognition is one of the best known and most widely 
used biometric technologies. Automated systems have been commercially 
available since the early 1970s, and there are currently more than 75 
fingerprint recognition technology companies. Until recently, it was 
used primarily in law enforcement applications. 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability.  

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates."  

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to:  

U.S. Government Accountability Office: 
441 G Street NW, Room LM: 
Washington, D.C. 20548:  

To order by Phone: 
Voice: (202) 512-6000: 
TDD: (202) 512-2537: 
Fax: (202) 512-6061:  

To Report Fraud, Waste, and Abuse in Federal Programs:  

Contact:  

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470:  

Congressional Relations:  

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548:  

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: