National Academies Press: OpenBook

Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274 (2003)

Chapter: D U.S. Bureau of Customs and Border Protection Use of Information Technology

« Previous: C Protecting International Trade Corridors: The Operation Safe Commerce Initiative
Page 69
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×

APPENDIX D
U.S. BUREAU OF CUSTOMS AND BORDER PROTECTION USE OF INFORMATION TECHNOLOGY1

The U.S. Bureau of Customs and Border Protection (Customs) has developed an extensive array of information systems that support the collection, processing, and analysis of data on goods, people, and conveyances entering and exiting the United States. These systems were developed over the past three decades with the involvement of many government agencies and the international business and transportation communities. The following statistics are intended to provide a brief picture of the magnitude of two of these systems:

  • The Automated Commercial System (ACS) currently processes more than 99 percent of the $1.8 trillion in imports and exports in all modes of transportation.

  • The ACS database has 4 terabytes of electronic storage and 6.2 billion records accessed 578 million times daily.

  • The Treasury Enforcement Communications System (TECS) currently processes more than 475 million travelers entering the United States by air, land, and sea.

  • The TECS database has 3 terabytes of DASD and a database of 5.3 billion records accessed 766 million times daily.

1

The material in this appendix is based on government-supplied information not independently verified by the committee.

Page 70
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
  • ACS and TECS support or have interfaces with more than 100 U.S. government agencies and foreign countries, nearly all international transportation carriers, and thousands of international businesses and service providers.

In August 2001, Customs embarked on a Modernization Program, a 15-year initiative to modernize and integrate its information technology infrastructure to support the government’s oversight of import and export trade compliance, border enforcement, and international passenger processing. Modernization will enable Customs and all participating government agencies to collect, analyze, collaborate on, and disseminate the right international trade and traveler information to internal and outside users in advance or in real time—to the right people, at the right time, and in the right place. Furthermore, the program will enable border-related government agencies and the international trade and travel private sector to transform the way they do business by implementing new processes that support future trade growth and changing business requirements.

BASELINE DESCRIPTION OF EXISTING SYSTEMS

Today, Customs has information systems in place at the 300 U.S. ports of entry to process all inbound and outbound cargo and passengers. Although these systems are antiquated, they still provide the platform for air and sea carriers to transmit cargo and passenger manifests in advance of arrival and enable importers to file their entries electronically. Customs interfaces with virtually every entity in the international supply chain process—importers, exporters, carriers, and a multitude of intermediaries and service providers.

Currently, Customs uses multiple systems that process international trade and travel and support a multitude of agencies and commercial businesses. The following are examples:

  • ACS tracks and monitors all imports of goods entering the United States.

  • The Automated Broker Interface is the central government system for the filing of commercial declarations on imported cargo.

  • The Automated Manifest System is a multimodular international cargo inventory control and release notification system for sea, air, and rail carriers.

Page 71
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
  • The Automated Export System is the central point through which export shipment data required by multiple agencies is filed electronically for all methods of transportation.

  • The Advance Targeting System assembles and screens commercial, transportation, and passenger data to identify high-risk imported cargo and arriving international passengers.

  • TECS is a megadatabase of law enforcement information shared by the Federal Bureau of Investigation, the Immigration and Naturalization Service, and Customs. It is used to screen all persons entering the United States.

  • The Interagency Border Information System meets the data-sharing, analytical, and processing needs of a multiagency (State, Treasury, Justice, Agriculture) border effort for international passengers and conveyances.

  • The Advance Passenger Information System receives and analyzes biographical data on international air passengers before their arrival in the United States. It covers about 85 percent of the 67 million passengers arriving.

The communications backbone is the Treasury Communications System Wide Area Network (Frame Relay) with multiple levels of protection and multiple remote access methods and controls.

CURRENT AND PLANNED DEVELOPMENTS

The Customs Modernization Program will integrate all Customs information systems that encompass imports and exports, conveyance and shipment tracking, passenger enforcement, investigative and intelligence support, human resources, and financial management.

The first components currently under development are the Automated Commercial Environment (ACE) and the International Trade Data System (ITDS) programs, which focus on cargo import and export operations. ACE and ITDS form a coordinated system that provides a “single window” allowing the international business community to interact with Customs and all government agencies on import/export requirements.

ACE will lay the technology foundation for all Modernization programs and deliver enhanced “cradle-to-grave” support of the cargo control and enforce-

Page 72
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×

ment process. All related functions in field operations and enforcement will be supported from a single common user interface, a single window for officers to perform their work. ACE will process both imports and exports and will be linked seamlessly to enforcement, revenue management, and mission support systems to enable integrated field operations and nationwide collaborative teaming among officers. Delivery of ACE functions will begin in the field in January 2004 and will continue in phases extending through April 2006.

The following are the major business functions of ACE that directly link to the freight transportation sector:

  • Portal—a universal, secure Internet “window” for all authorized system users (Customs, other government agencies, and the international transportation community) to transmit, analyze, and collaborate on supply chain data. Projected for spring 2003.

  • Account Management—provides a single comprehensive, nationwide account-based picture of all reported activity and relationships for an importer, an exporter, an international carrier, or a logistics/service provider. Projected beginning spring 2003 through 2005.

  • e-Release—provides for advance receipt of transportation data via transponders/electronic seal transmissions resulting in inspection or release information at the earliest point in the supply chain. Projected for truck transportation in 2004 and all other modes beginning in 2005.

  • Multimodal Manifest—provides for advance transportation data at the earliest point in the supply chain. Projected for truck transportation in 2004 and all other modes beginning in 2005; will track cargo across modes in 2007.

  • Cargo and Conveyance Tracking—provides for tracking shipments (including in-bond) and conveyances, and provides release or status of shipment subject to government agency control.

ITDS supports 101 agencies with information and actual operational interaction on shipments, crew, and conveyances crossing the border.

As stated by the ITDS multiagency Board of Directors:

ITDS is a federal government information technology (IT) initiative to implement a secure, integrated, government-wide system for the electronic collection,

Page 73
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×

FIGURE D-1 ACE architecture: conceptual view.

Page 74
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×

use and dissemination of international trade and transportation data … The ITDS Board of Directors has oversight responsibility and serves as a forum for harmonization of requirements and dispute resolution among federal agencies. The Board insures that ITDS goals and functionality are integrated with the needs of the public, the participating agencies and Customs modernization plans.

CUSTOMS INFORMATION TECHNOLOGY SYSTEMS SECURITY

Customs’ new Enterprise Architecture (EA) for ACE and the Modernization is established to support all field activities and align information technology with the strategic objectives of Customs and all agencies. The EA provides for a multi-layer security management system. The information Customs has made public is represented in Figure D-1.

POTENTIAL VULNERABILITIES

The Customs Modernization and ACE programs will be state of the art but are subject to cyberattacks, as are all information systems. The reality of connectivity with the international trade and transportation community and the electronic exchange of massive amounts of data and database queries add to the potential vulnerability.

Page 69
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 69
Page 70
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 70
Page 71
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 71
Page 72
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 72
Page 73
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 73
Page 74
Suggested Citation:"D U.S. Bureau of Customs and Border Protection Use of Information Technology." Transportation Research Board and National Research Council. 2003. Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274. Washington, DC: The National Academies Press. doi: 10.17226/10730.
×
Page 74
Next: Study Committee Biographical Information »
Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274 Get This Book
×
 Cybersecurity of Freight Information Systems: A Scoping Study -- Special Report 274
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB Special Report 274 - Cybersecurity of Freight Information Systems: A Scoping Study reviews trends in the use of information technology in the freight transportation industry and assesses potential vulnerabilities to a cyberattack. Special Report 274 Summary

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!