US-VISIT: Keeping America’s Doors Open and Our Nation Secure Scott Hastings Chief Information Officer US-VISIT United States …Department of Homeland Security.

Slides:



Advertisements
Similar presentations
NBTA International Convention & Expo Wednesday, August 26th.
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Evolution of the Trusted Traveler Concept September 2010.
DHS, National Cyber Security Division Overview
1 MRTD Programme: Consolidating Comprehensive Security and Enhancing Facilitation Mauricio Siciliano Mauricio Siciliano ICAO MRTD Programme ICAO/McGill.
All Rights Reserved: JusticeExperts.com Enterprise? What Enterprise? Enterprise Development.
An Introduction to Information Systems in Organizations
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Passenger Data Exchange
Information Systems Controls for System Reliability -Information Security-
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
Immigration Law Immigration law deals with bringing people into the U.S. Immigration and Nationality Act—The immigration code book Code of Federal Regulations.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
US-VISIT Program Overview United States Visitor and Immigrant Status Indicator Technology.
1 Data Strategy Overview Keith Wilson Session 15.
Competency Models Impact on Talent Management
FDA Recalls Risk Communication Advisory Committee David K. Elder Director, Office of Enforcement.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
PUSHING THE BORDERS BACK: Passenger Operations U.S. CUSTOMS AND BORDER PROTECTION FIELD OPERATIONS JFK INTERNATIONAL AIRPORT.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
Dr. Annetta L. Cheek Chair If you can’t read it, you can’t use it Usability and Plain Language June 17, 2008.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
Beyond the Border Action Plan: Implementing a Shared Canada – U.S. Vision for Perimeter Security and Economic Competitiveness Alan Langford – Customs and.
Environment, Safety and Occupational Health (ESOH) in the DoD Business Management Modernization Program April 2005 John Coho I&E Business Transformation.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
5th Annual International Public Sector Reform Symposium: New Models of Service Delivery for the 21st Century Ian Neill, e-Borders programme, UKBA Wednesday.
Policies Regarding International Students, Postdocs, and Visiting Scholars James A. Griffin, Ph.D.
Ohio Digital Government Summit Disease Surveillance (Homeland Security session) October 5, 2004 Rana Sen Deloitte Consulting LLP.
Canada Border Services Agency Update Presentation to: Transportation Border Working Group Bellingham, Washington June 7, 2006.
TBWG – The Ottawa Update Canada Border Services Agency Buffalo, New York April 9, 2014 Jay LaFrance.
US-VISIT Facilities & Engineering United States Visitor and Immigrant Status Indicator Technology Transportation Border Working Group Delta Bow Valley.
Mini Kanwal Core Data Type - PERSON December 02, 2004.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
Title: U.S. Department of Homeland Security Small Vessel Security Strategy Author: Sean K. Moon Economy: United States of America.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Overview of the Canada Border Services Agency Transportation Border Working Group Quebec City, Quebec October 27-28, 2010.
Linking Planning & NEPA Overview Mitch Batuzich FHWA Texas Division FHWA Texas Division April 17, 2007.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Title: U.S. National Strategy to Secure the Flow of Commerce in the Global Supply Chain Presenter’s Name: Sean K. Moon Economy: United States of America.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Created by: Ashley Spivey For Department of Homeland Security All information from:
December 2015 Visa Waiver Program Improvement & Terrorist Travel Prevention Act.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Kathy Corbiere Service Delivery and Performance Commission
Building Smarter Borders To Increase Security and Facilitate Trade International Visitors Program April 26, 2004.
FDA job description  Regulates about 25% of all consumer purchases  Mission summary: protect and advance public health  Products: food, cosmetics, drugs,
Overview September 2015 Centers of Excellence and Expertise.
U.S. Department of Agriculture eGovernment Program Smart Choice Pre-Select Phase Transition September 2002.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
U N I T E D S T A T E S D E P A R T M E N T O F C O M M E R C E N A T I O N A L O C E A N I C A N D A T M O S P H E R I C A D M I N I S T R A T I O N.
KENYA REVENUE AUTHORITY BUSINESS INTELLIGENCE OFFICE PRESENTATION INVESTIGATION & ENFORCEMENT DEPARTMENT SYMON YATICH 29 TH - 31 ST AUGUST 2012.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
ADVANCED TRANSPORTATION AND CONGESTION MANAGEMENT TECHNOLOGIES DEPLOYMENT (ATCMTD) PROGRAM 1 Bob Arnold, Director Office of Transportation Management,
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
0 Project Conference – Friday 8 February DEVELOPING THE NATIONAL CAPABILITY FOR INTEGRATED BORDER MANAGEMENT (IBM) IN LEBANON Project Funded by the European.
Centers of Excellence and Expertise Department of Homeland Security  Customs and Border Protection 1.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
US-VISIT Goals Enhance the security of our citizens and visitors
Continuity Guidance Circular Webinar
Copyright © 2012, Elsevier Inc. All rights Reserved.
Prevention, Intelligence
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

US-VISIT: Keeping America’s Doors Open and Our Nation Secure Scott Hastings Chief Information Officer US-VISIT United States …Department of Homeland Security North American Day 2005

"US-VISIT is an important new element in the global war against terrorism and will serve as a catalyst in the growing international use of biometrics to expedite processing of travelers” - DHS Secretary Tom Ridge “Since September 11, the United States has built the first phase of a biometric screening program, called US-VISIT… False identities are used by terrorists to avoid being detected on a watchlist. These biometric identifiers make such evasions far more difficult.” - 9/11 Commission Report US-VISIT Highlights

Positive Impacts of US-VISIT –Increased ability to biometrically identify known or suspected wanted persons i.e. fugitives, known terrorists –Enhanced ability to focus DHS enforcement efforts on overstays –Increased data sharing resulting with DHS and DOS in more effective and accurate visa and POE processing –Expedited service for low-risk frequent travelers –Increased reliability in matching departures and arrivals

US-VISIT Goals –Enhance the security of our citizens and visitors –Facilitate legitimate travel and trade –Ensure the integrity of our immigration system –Protect the privacy of our visitors

US-VISIT: A Continuum of Security Measures Pre-entry: More than 180 visa-issuing posts around the world are collecting biographic and biometric data as they issue visas. By October 2004, all 211 visa-issuing posts will be collecting biometric data.

US-VISIT: A Continuum of Security Measures Entry : Upon arrival at U.S. air or sea ports, digital index fingerscans are taken and compared against the one taken at the time of visa issuance and against watchlists. A digital photograph is taken.

US-VISIT: A Continuum of Security Measures Status Management: -Should the traveler seek to adjust status or extend his/her stay, US-VISIT would be updated with any modifications to the individual’s status. –Arrival and departure records are reconciled, and any inconsistency allows US-VISIT to determine when a visitor has overstayed.

Exit –A biometric departure solution is currently being tested involving automated kiosks. Additional alternatives will be tested and evaluated in –Visitors are required to check out of the country if leaving from a port with exit stations to record their status for future visits.

Who Is Processed Under US-VISIT Today, most visitors who require a nonimmigrant visa to enter the country are enrolled in US-VISIT currently. –Visitors under age 14 and over 79 are exempt –Certain classifications of non-immigrants (A, G, NATO) are exempt

Protecting Privacy Comprehensive privacy program, led by DHS’ Chief Privacy Officer and US-VISIT Privacy Officer, ensures that US-VISIT meets requirements and goals –Information use: Established rules governing collection, notice, and dissemination. –Redress policy: Established process for individual to correct data errors or problems. –Privacy Impact Assessment: Prepared a PIA in collaboration with advocacy, privacy, and immigration groups. Included detailed information about the program, technology and privacy protections used.

Vision Objectives and Scope Non-U.S. Citizens –Travel to, through, and from the U.S. –Activities within the U.S. –Identity and eligibility determination –Status management and enforcement U.S. Citizens –Travel to and from the U.S. –Passport processing –Identity determination Global, at U.S. borders, and within the U.S ObjectivesScope Create an overall vision for immigration and border management Identify the role of US-VISIT within this vision Identify and relate the role of other organizations to the success of the vision Develop a plan to build the capabilities necessary to achieve the vision

Vision Overview  Increased knowledge of individuals, provided in advance to decision-makers  Smooth and rapid facilitation of known, low-risk persons  Increased scrutiny of unknown, high-risk individuals  Transformation of the Immigration and Border Management system (people, processes, technology and facilities)  Expanded cooperation among U.S. Federal, state, and local agencies, foreign governments, and the private sector  Improved coordination of information to deliver the right information to decision-makers  Re-engineering of processes to streamline and simplify interactions, eliminating redundancy and delays

Public View Simplified, Consolidated, Purpose-based  One point of Interaction  Interactions are structured around a person’s purpose, rather than around the organizational bureaucracies and structures  Streamlined Interactions  Interactions with the government and private sector are consolidated and simplified – fewer steps needed to accomplish the purpose  Knowledge based Facilitation  Known and low risk people move quickly through the immigration and transportation systems, while those who are not known or higher risk will receive increased scrutiny Government View Knowledge of the Person, In Time to Act  Comprehensive view of people and the strategic environment (person-centric view)  Application, travel, and threat data is captured and stored electronically, shared across agencies as appropriate  A person’s identity and data are linked biometrically  Proactive and coordinated screening to identify risks and assess eligibility  Assessments based individual and demographic characteristics  Responsive to dynamic threat situations  Available in real-time, even remotely (e.g., on foot, aboard ship, in automobiles)  Simplified, informed facilitation processes; officers able to focus on unknown and high-risk individuals  Coordinated and focused law enforcement activities  Policy is informed by credible data Vision Overview

In Which Areas Must We Excel? Core Capabilities  Identify a Person: The capability to establish identity, connect to available information, and verify identity upon subsequent interactions  Assess Risk and Eligibility: The capability to determine if an individual is eligible to enter the U.S. or receive benefits  Record Entry, Exit and Status The capability to determine a person’s immigration status and when and where an individual entered or exited the country  Take Law Enforcement Actions The capability to intercept, process, detain, prosecute and remove persons of interest within U.S. territories and at the borders  Process Requests and Applications: The capability to receive, analyze, evaluate, and decide whether an individual should receive a benefit, as well as share data, information, and knowledge about the same  Communicate with External Entities: The capability to administer forms, fees, policies, and procedures  Manage Knowledge, Information and Intelligence: The capability to interact with visitors, immigrants, citizens, and external stakeholders, disseminating and receiving timely, accurate, and consistent information  Manage the Enterprise The capability to govern the integrated activities of the agencies involved in Immigration & Border Management—across organizations, bureaus, and agencies

What Can We Achieve? Key Capability Enablers  A Person-Centric View – providing to decision makers accurate and timely information about a person, relevant to the decision  A Virtual Border – re-engineering processes to leverage information so that decisions can be made when a person is encountered, not just at a physical border  A Cohesive Analysis Environment – enabling coordinated and comprehensive assessments of individuals and operations  An Immigration and Border Management Enterprise – unifying stakeholders with common objectives, strategies, processes, and infrastructures

For more information… Anna Hinken Kimberly Weissman Visit Our Web site: